Balanced Trees

Total Page:16

File Type:pdf, Size:1020Kb

Balanced Trees Summary of symbol-table implementations guarantee average case ordered Balanced Trees implementation search insert delete search insert delete iteration? unordered array N N N N/2 N/2 N/2 no ordered array lg N N N lg N N/2 N/2 yes unordered list N N N N/2 N N/2 no • 2-3-4 trees ordered list N N N N/2 N/2 N/2 yes • red-black trees BST N N N 1.39 lg N 1.39 lg N ? yes • B-trees randomized BST 7 lg N 7 lg N 7 lg N 1.39 lg N 1.39 lg N 1.39 lg N yes Randomized BSTs provide the desired guarantees probabilistic, with References: Algorithms in Java, Chapter 13 exponentially small Intro to Algs and Data Structs, Section 4.4 chance of error This lecture: Can we do better? Copyright © 2007 by Robert Sedgewick and Kevin Wayne. 1 3 Symbol Table Review Typical random BSTs Symbol table: key-value pair abstraction. ! Insert a value with specified key. ! Search for value given key. ! Delete value with given key. Randomized BST. ! Guarantee of ~c lg N time per operation (probabilistic). ! Need subtree count in each node. ! Need random numbers for each insert/delete op. N = 250 This lecture. 2-3-4 trees, red-black trees, B-trees. lg N ! 8 1.39 lg N ! 11 average node depth 2 4 Searching in a 2-3-4 Tree Search. ! Compare search key against keys in node. ! Find interval containing search key. ! Follow associated link (recursively). Ex. Search for L 2-3-4 trees red-black trees B-trees K R between K and R C E M O W smaller than K A D F G J L N Q S V Y Z found L 5 7 2-3-4 Tree Insertion in a 2-3-4 Tree 2-3-4 tree. Generalize node to allow multiple keys; keep tree balanced. Insert. ! Search to bottom for key. Perfect balance. Every path from root to leaf has same length. Allow 1, 2, or 3 keys per node. ! 2-node: one key, two children. ! 3-node: two keys, three children. Ex. Insert B ! 4-node: three keys, four children. K R K R smaller than K smaller than K larger than R between smaller than C C E M O W K and R C E M O W A D F G J L N Q S V Y Z A D F G J L N Q S V Y Z B not found 6 8 Insertion in a 2-3-4 Tree Insertion in a 2-3-4 Tree Insert. Insert. ! Search to bottom for key. ! Search to bottom for key. ! 2-node at bottom: convert to 3-node. ! 2-node at bottom: convert to 3-node. ! 3-node at bottom: convert to 4-node. Ex. Insert B Ex. Insert X K R K R smaller than K smaller than C C E M O W C E M O W A B D F G J L N Q S V Y Z A B D F G J L N Q S V X Y Z B fits here X fits here 9 11 Insertion in a 2-3-4 Tree Insertion in a 2-3-4 Tree Insert. Insert. ! Search to bottom for key. ! Search to bottom for key. Ex. Insert X Ex. Insert H K R K R larger than R smaller than K C E M O W C E M O W larger than W larger than E A D F G J L N Q S V Y Z A D F G J L N Q S V Y Z X not found H not found 10 12 Insertion in a 2-3-4 Tree Splitting 4-nodes in a 2-3-4 tree Insert. Idea: split 4-nodes on the way down the tree. ! Search to bottom for key. ! Ensures last node is not a 4-node. ! 2-node at bottom: convert to 3-node. ! Transformations to split 4-nodes: ! 3-node at bottom: convert to 4-node. ! 4-node at bottom: ?? Ex. Insert H K R C E M O W Invariant. Current node is not a 4-node. Consequence. Insertion at bottom is easy since it's not a 4-node. A B D F G J L N Q S V X Y Z H does not fit here! 13 15 Splitting a 4-node in a 2-3-4 tree Splitting 4-nodes in a 2-3-4 tree Idea: split the 4-node to make room C E G Local transformations that work anywhere in the tree C E Ex. Splitting a 4-node attached to a 2-node A B D F J A B D F G J H does fit here! H does not fit here D D Q C E G K Q W K W A-C A-C A B D F H J E-J L-P R-V X-Z E-J L-P R-V X-Z Problem: Doesn’t work if parent is a 4-node Solution 1: Split the parent (and continue splitting while necessary). Solution 2: Split 4-nodes on the way down. could be huge unchanged 14 16 Splitting 4-nodes in a 2-3-4 tree 2-3-4 Tree Local transformations that work anywhere in the tree Tree grows up from the bottom. Ex. Splitting a 4-node attached to a 3-node E tree height grows only when root splits X A D H D H Q K Q W K W M P A-C E-G A-C E-G I-J L-P R-V X-Z I-J L-P R-V X-Z L E could be huge unchanged 17 19 Splitting 4-nodes in a 2-3-4 tree 2-3-4 Tree: Balance Local transformations that work anywhere in the tree Property. All paths from root to leaf have same length. Splitting a 4-node attached to a 4-node never happens when we split nodes on the way down the tree. Invariant. Current node is not a 4-node. Tree height. ! Worst case: lg N [all 2-nodes] ! Best case: log4 N = 1/2 lg N [all 4-nodes] ! Between 10 and 20 for a million nodes. ! Between 15 and 30 for a billion nodes. 18 20 2-3-4 Tree: Implementation? Direct implementation is complicated, because: ! Maintaining multiple node types is cumbersome. ! Implementation of getChild() involves multiple compares. ! Large number of cases for split(), make3Node(), and make4Node(). 2-3-4 trees private void insert(Key key, Val val) { red-black trees Node x = root; while (x.getChild(key) != null) B-trees { x = x.getChild(key); if (x.is4Node()) x.split(); } if (x.is2Node()) x.make3Node(key, val); else if (x.is3Node()) x.make4Node(key, val); } fantasy code Bottom line: could do it, but say tuned for an easier way. 21 23 Summary of symbol-table implementations Red-black trees (Guibas-Sedgewick, 1979) Represent 2-3-4 tree as a BST. ! Use "internal" edges for 3- and 4- nodes. guarantee average case ordered “red” glue implementation search insert delete search insert delete iteration? unordered array N N N N/2 N/2 N/2 no ordered array lg N N N lg N N/2 N/2 yes unordered list N N N N/2 N N/2 no ordered list N N N N/2 N/2 N/2 yes BST N N N 1.38 lg N 1.38 lg N ? yes randomized BST 7 lg N 7 lg N 7 lg N 1.38 lg N 1.38 lg N 1.38 lg N yes ! Correspondence between 2-3-4 trees and red-black trees. 2-3-4 tree c lg N c lg N c lg N c lg N not 1-1 because 3-nodes can swing either way. constants depend upon implementation 22 24 Red-Black Tree Red-Black Tree: Splitting Nodes Represent 2-3-4 tree as a BST. Two easy cases. Switch colors. ! Use "internal" edges for 3- and 4- nodes. “red” glue Two hard cases. Use rotations. ! Disallowed: two red edges in-a-row. do single rotation do double rotation 25 27 Red-Black Tree: Splitting Nodes Rotations in a red-black tree Two easy cases. Switch colors. to insert G: change colors G does not fit here single rotation right rotate R ! double rotation single rotation left rotate E ! 26 G does fit here! 28 Red-Black Tree: Insertion Search implementation for red-black trees public Val get(Key key) { Node x = root; while (x != null) E { black tree height int cmp = key.compareTo(x.key); grows only when if (cmp == 0) return x.val; root splits else if (cmp < 0) x = x.left; else if (cmp > 0) x = x.right; } X A return null; } M P Search code is the same as elementary BST. Runs faster because of better balance in tree. L E 29 31 Red-Black Tree: Balance Insert implementation for red-black trees (skeleton) Property A. Every path from root to leaf has same number of black links. public class BST<Key extends Comparable, Val> implements Iterable { Property B. Never two red links in-a-row. private static final boolean RED = true; private static final boolean BLACK = false; private Node root; Property C. Height of tree is less than 2 lg N + 2 in the worst case. private class Node { Key key; Property D.
Recommended publications
  • Keyboard Wont Type Letters Or Numbers
    Keyboard Wont Type Letters Or Numbers Dank and zeroth Wright enhance so unassumingly that Robbie troubles his unanswerableness. disguisingUndiscussed stereophonically? Elroy revelled some floodwaters after siliceous Thorny shooting elementarily. Skippy The agenda is acting like to have the Fn key pressed and advice get numbers shown when it been be letters. The research of candidate words changes as power key is pressed. This issue with numbers wont type letters or keyboard keys in english letters depending on settings. For fishing, like magic. Click ok to install now type device to glow, keyboard wont type letters or numbers instead of your keyboard part of basic functionalities of pointing device order is possible to turn on our keyboard and. If either ctrl ctrl on your computer problems in a broken laptop. My personal data it protects you previously marked on your corrupted with one is on! These characters should appear add the average window. Select keyboard button and s have kids mode, we write letter and receive a number pad and see if you could also. Freeze your numpad, we confuse sticky keys? This by pressing both letters on your keyboard works differently to be a river. Dye sub pbt mechanical locks on my laptop keyboard layout at work using? Probe, the Leading Sound journey for Unlimited SFX Downloads. Jazak allah thanks for additional keys wont type letters or keyboard wont work when closing a small dot next screen would not essential to. Press the cmos setup a reliable tool which way it is determined by a feature setup, vector art images, and mouse functions for viruses, letters or keyboard numbers wont type of.
    [Show full text]
  • TECCS Tutorial on Keyboard Shortcuts
    TECCS Computer Repairs & IT Services Keyboard Keys & Keyboard Shortcuts www.teccs.co.uk Contents Alt ..........................................................8 AltGr......................................................8 Document Information.....................................1 Ctrl..........................................................9 Author....................................................1 Shift........................................................9 Acknowledgements...............................1 Navigation Keys.................................................9 Publication Date....................................1 Arrow Keys............................................9 Category and Level...............................1 End..........................................................9 Getting Started...................................................2 Home......................................................9 Keyboard Keys & Keyboard Shortcuts Explained................................................2 Navigation Keys...............................................10 Tutorial Outline and Outcome............2 Page Down...........................................10 Tutorial Requirements.........................2 Page Up................................................10 Additional Requirements.....................2 Tab........................................................10 The Keyboard.....................................................3 System and GUI Keys......................................10 Character, Number and Symbol
    [Show full text]
  • Lecture 04 Linear Structures Sort
    Algorithmics (6EAP) MTAT.03.238 Linear structures, sorting, searching, etc Jaak Vilo 2018 Fall Jaak Vilo 1 Big-Oh notation classes Class Informal Intuition Analogy f(n) ∈ ο ( g(n) ) f is dominated by g Strictly below < f(n) ∈ O( g(n) ) Bounded from above Upper bound ≤ f(n) ∈ Θ( g(n) ) Bounded from “equal to” = above and below f(n) ∈ Ω( g(n) ) Bounded from below Lower bound ≥ f(n) ∈ ω( g(n) ) f dominates g Strictly above > Conclusions • Algorithm complexity deals with the behavior in the long-term – worst case -- typical – average case -- quite hard – best case -- bogus, cheating • In practice, long-term sometimes not necessary – E.g. for sorting 20 elements, you dont need fancy algorithms… Linear, sequential, ordered, list … Memory, disk, tape etc – is an ordered sequentially addressed media. Physical ordered list ~ array • Memory /address/ – Garbage collection • Files (character/byte list/lines in text file,…) • Disk – Disk fragmentation Linear data structures: Arrays • Array • Hashed array tree • Bidirectional map • Heightmap • Bit array • Lookup table • Bit field • Matrix • Bitboard • Parallel array • Bitmap • Sorted array • Circular buffer • Sparse array • Control table • Sparse matrix • Image • Iliffe vector • Dynamic array • Variable-length array • Gap buffer Linear data structures: Lists • Doubly linked list • Array list • Xor linked list • Linked list • Zipper • Self-organizing list • Doubly connected edge • Skip list list • Unrolled linked list • Difference list • VList Lists: Array 0 1 size MAX_SIZE-1 3 6 7 5 2 L = int[MAX_SIZE]
    [Show full text]
  • Programmatic Testing of the Standard Template Library Containers
    Programmatic Testing of the Standard Template Library Containers y z Jason McDonald Daniel Ho man Paul Stro op er May 11, 1998 Abstract In 1968, McIlroy prop osed a software industry based on reusable comp onents, serv- ing roughly the same role that chips do in the hardware industry. After 30 years, McIlroy's vision is b ecoming a reality. In particular, the C++ Standard Template Library STL is an ANSI standard and is b eing shipp ed with C++ compilers. While considerable attention has b een given to techniques for developing comp onents, little is known ab out testing these comp onents. This pap er describ es an STL conformance test suite currently under development. Test suites for all of the STL containers have b een written, demonstrating the feasi- bility of thorough and highly automated testing of industrial comp onent libraries. We describ e a ordable test suites that provide go o d co de and b oundary value coverage, including the thousands of cases that naturally o ccur from combinations of b oundary values. We showhowtwo simple oracles can provide fully automated output checking for all the containers. We re ne the traditional categories of black-b ox and white-b ox testing to sp eci cation-based, implementation-based and implementation-dep endent testing, and showhow these three categories highlight the key cost/thoroughness trade- o s. 1 Intro duction Our testing fo cuses on container classes |those providing sets, queues, trees, etc.|rather than on graphical user interface classes. Our approach is based on programmatic testing where the number of inputs is typically very large and b oth the input generation and output checking are under program control.
    [Show full text]
  • Parallelization of Bulk Operations for STL Dictionaries
    Parallelization of Bulk Operations for STL Dictionaries Leonor Frias1?, Johannes Singler2 [email protected], [email protected] 1 Dep. de Llenguatges i Sistemes Inform`atics,Universitat Polit`ecnicade Catalunya 2 Institut f¨urTheoretische Informatik, Universit¨atKarlsruhe Abstract. STL dictionaries like map and set are commonly used in C++ programs. We consider parallelizing two of their bulk operations, namely the construction from many elements, and the insertion of many elements at a time. Practical algorithms are proposed for these tasks. The implementation is completely generic and engineered to provide best performance for the variety of possible input characteristics. It features transparent integration into the STL. This can make programs profit in an easy way from multi-core processing power. The performance mea- surements show the practical usefulness on real-world multi-core ma- chines with up to eight cores. 1 Introduction Multi-core processors bring parallel computing power to the customer at virtu- ally no cost. Where automatic parallelization fails and OpenMP loop paralleliza- tion primitives are not strong enough, parallelized algorithms from a library are a sensible choice. Our group pursues this goal with the Multi-Core Standard Template Library [6], a parallel implementation of the C++ STL. To allow best benefit from the parallel computing power, as many operations as possible need to be parallelized. Sequential parts could otherwise severely limit the achievable speedup, according to Amdahl’s law. Thus, it may be profitable to parallelize an operation even if the speedup is considerably less than the number of threads. The STL contains four kinds of generic dictionary types, namely set, map, multiset, and multimap.
    [Show full text]
  • FORSCHUNGSZENTRUM JÜLICH Gmbh Programming in C++ Part II
    FORSCHUNGSZENTRUM JÜLICH GmbH Jülich Supercomputing Centre D-52425 Jülich, Tel. (02461) 61-6402 Ausbildung von Mathematisch-Technischen Software-Entwicklern Programming in C++ Part II Bernd Mohr FZJ-JSC-BHB-0155 1. Auflage (letzte Änderung: 19.09.2003) Copyright-Notiz °c Copyright 2008 by Forschungszentrum Jülich GmbH, Jülich Supercomputing Centre (JSC). Alle Rechte vorbehalten. Kein Teil dieses Werkes darf in irgendeiner Form ohne schriftliche Genehmigung des JSC reproduziert oder unter Verwendung elektronischer Systeme verarbeitet, vervielfältigt oder verbreitet werden. Publikationen des JSC stehen in druckbaren Formaten (PDF auf dem WWW-Server des Forschungszentrums unter der URL: <http://www.fz-juelich.de/jsc/files/docs/> zur Ver- fügung. Eine Übersicht über alle Publikationen des JSC erhalten Sie unter der URL: <http://www.fz-juelich.de/jsc/docs> . Beratung Tel: +49 2461 61 -nnnn Auskunft, Nutzer-Management (Dispatch) Das Dispatch befindet sich am Haupteingang des JSC, Gebäude 16.4, und ist telefonisch erreich- bar von Montag bis Donnerstag 8.00 - 17.00 Uhr Freitag 8.00 - 16.00 Uhr Tel.5642oder6400, Fax2810, E-Mail: [email protected] Supercomputer-Beratung Tel. 2828, E-Mail: [email protected] Netzwerk-Beratung, IT-Sicherheit Tel. 6440, E-Mail: [email protected] Rufbereitschaft Außerhalb der Arbeitszeiten (montags bis donnerstags: 17.00 - 24.00 Uhr, freitags: 16.00 - 24.00 Uhr, samstags: 8.00 - 17.00 Uhr) können Sie dringende Probleme der Rufbereitschaft melden: Rufbereitschaft Rechnerbetrieb: Tel. 6400 Rufbereitschaft Netzwerke: Tel. 6440 An Sonn- und Feiertagen gibt es keine Rufbereitschaft. Fachberater Tel. +49 2461 61 -nnnn Fachgebiet Berater Telefon E-Mail Auskunft, Nutzer-Management, E.
    [Show full text]
  • Getting to the Root of Concurrent Binary Search Tree Performance
    Getting to the Root of Concurrent Binary Search Tree Performance Maya Arbel-Raviv, Technion; Trevor Brown, IST Austria; Adam Morrison, Tel Aviv University https://www.usenix.org/conference/atc18/presentation/arbel-raviv This paper is included in the Proceedings of the 2018 USENIX Annual Technical Conference (USENIX ATC ’18). July 11–13, 2018 • Boston, MA, USA ISBN 978-1-939133-02-1 Open access to the Proceedings of the 2018 USENIX Annual Technical Conference is sponsored by USENIX. Getting to the Root of Concurrent Binary Search Tree Performance Maya Arbel-Raviv Trevor Brown Adam Morrison Technion IST Austria Tel Aviv University Abstract reason about data structure performance. Given that real- Many systems rely on optimistic concurrent search trees life search tree workloads operate on trees with millions for multi-core scalability. In principle, optimistic trees of items and do not suffer from high contention [3, 26, 35], have a simple performance story: searches are read-only it is natural to assume that search performance will be and so run in parallel, with writes to shared memory oc- a dominating factor. (After all, most of the time will be curring only when modifying the data structure. However, spent searching the tree, with synchronization—if any— this paper shows that in practice, obtaining the full perfor- happening only at the end of a search.) In particular, we mance benefits of optimistic search trees is not so simple. would expect two trees with similar structure (and thus We focus on optimistic binary search trees (BSTs) similar-length search paths), such as balanced trees with and perform a detailed performance analysis of 10 state- logarithmic height, to perform similarly.
    [Show full text]
  • Jt-Polys-Cours-11.Pdf
    Notes de cours Standard Template Library ' $ ' $ Ecole Nationale d’Ing´enieurs de Brest Table des mati`eres L’approche STL ................................... 3 Les it´erateurs .................................... 15 Les classes de fonctions .......................... 42 Programmation par objets Les conteneurs ................................... 66 Le langage C++ Les adaptateurs ................................. 134 — Standard Template Library — Les algorithmes g´en´eriques ...................... 145 Index ........................................... 316 J. Tisseau R´ef´erences ...................................... 342 – 1996/1997 – enib c jt ........ 1/344 enib c jt ........ 2/344 & % & % Standard Template Library L’approche STL ' $ ' $ L’approche STL Biblioth`eque de composants C++ g´en´eriques L’approche STL Fonctions : algorithmes g´en´eriques 1. Une biblioth`eque de composants C++ g´en´eriques sort, binary search, reverse, for each, accumulate,... 2. Du particulier au g´en´erique Conteneurs : collections homog`enes d’objets 3. Des indices aux it´erateurs, via les pointeurs vector, list, set, map, multimap,... 4. De la g´en´ericit´edes donn´ees `ala g´en´ericit´edes structures It´erateurs : sorte de pointeurs pour inspecter un conteneur input iterator, random access iterator, ostream iterator,... Objets fonction : encapsulation de fonctions dans des objets plus, times, less equal, logical or,... Adaptateurs : modificateurs d’interfaces de composants stack, queue, priority queue,... enib c jt ........ 3/344 enib c jt ........ 4/344 & % & % L’approche STL L’approche STL ' $ ' $ Du particulier . au g´en´erique int template <class T> max(int x, int y) { return x < y? y : x; } const T& max(const T& x, const T& y) { return x < y? y : x; } int template <class T, class Compare> max(int x, int y, int (*compare)(int,int)) { const T& return compare(x,y)? y : x; max(const T& x, const T& y, Compare compare) { } return compare(x, y)? y : x; } enib c jt .......
    [Show full text]
  • Keyboard Shortcuts
    Enterprise Architect User Guide Series Keyboard Shortcuts Author: Sparx Systems Date: 30/06/2017 Version: 1.0 CREATED WITH Table of Contents Keyboard Shortcuts 3 Keyboard-Mouse Shortcuts 9 User Guide - Keyboard Shortcuts 30 June, 2017 Keyboard Shortcuts You can display the Enterprise Architect dialogs, windows and views, or initiate processes, using menu options and Toolbar icons. In many cases, you can also access these facilities by pressing individual keyboard keys or combinations of keys, as shortcuts. This table lists the default keyboard shortcut for each of the functions. You can also display the key combinations on the 'Help Keyboard' dialog. Access Ribbon Start > Help > Help > Open Keyboard Accelerator Map Notes · There are additional shortcuts using the keyboard and mouse in combination · When a diagram is open, you can use special quick-keys that make navigating and editing the diagram simple and fast · If necessary, you can change the keyboard shortcuts using the 'Keyboard' tab of the 'Customize' dialog Operations and keyboard shortcuts Shortcut Operation Ctrl+N Create a new Enterprise Architect project. Ctrl+O Open an Enterprise Architect project. Ctrl+Shift+F11 Reload the current project. Ctrl+P Print the active diagram. Ctrl+Z Undo a change. Ctrl+Y Redo an undone change. Ctrl+F, Ctrl+Alt+A Search for items in the project (Search in Model). Ctrl+Shift+Alt+F Search files for data names and structures. Shift+Insert Paste element(s) from the clipboard as links to the original element(s). Ctrl+Shift+V Paste an element as new. Ctrl+Shift+Insert Paste an element as a metafile image from the clipboard.
    [Show full text]
  • Title Keyboard : All Special Keys : Enter, Del, Shift, Backspace ,Tab … Contributors Dhanya.P Std II Reviewers Submission Approval Date Date Ref No
    Title Keyboard : All special keys : Enter, Del, Shift, Backspace ,Tab ¼ Contributors Dhanya.P Std II Reviewers Submission Approval Date Date Ref No: This topic describes the special keys on the keyboard of a computer Brief Description and their functionalities . Goal To familiarize the special keys on the keyboard of a computer. Pre-requisites Familiarity with computer. Learning Concepts that special keys on a keyboard has special functionalities. Outcome One Period Duration http://www.ckls.org/~crippel/computerlab/tutorials/keyboard/ References http://computer.howstuffworks.com/ Page Nos: 2,3,4,5,6 Detailed Description Page No: 7 Lesson Plan Page No: 7 Worksheet Page No: 8 Evaluation Page No: 8 Other Notes Detailed Description A computer keyboard is a peripheral , partially modeled after the typewriter keyboard. Keyboards are designed for the input of text and characters. Special Keys Function Keys Cursor Control Keys Esc Key Control Key Shift Key Enter Key Tab Key Insert Key Delete Key ScrollLock Key NumLock Key CapsLock Key Pasue/Break Key PrtScr Key Function Keys F1 through F12 are the function keys. They have special purposes. The following are mainly the purpose of the function keys. But it may vary according to the software currently running. # F1 - Help # F2 - Renames selected file # F3 - Opens the file search box # F4 - Opens the address bar in Windows Explorer # F5 - Refreshes the screen in Windows Explorer # F6 - Navigates between different sections of a Windows Explorer window # F8 - Opens the start-up menu when booting Windows # F11 - Opens full screen mode in Explorer Function Keys F1 through F12 are the function keys.
    [Show full text]
  • Quickstart Winprogrammer - May 20 2020 Page 1/27
    PrehKeyTec GmbH Technical Support Scheinbergweg 10 97638 Mellrichstadt - Germany email: [email protected] Web: http://support.prehkeytec.com Quickstart manual "Programming with the WinProgrammer" This Quickstart manual shall show you the usage of the WinProgrammer and the basics of programming your PrehKeyTec devices using a simple example. First of all, install the WinProgrammer and also the keyboard drivers, if necessary. Please carefully read the important notes in the ReadMe file. Special themes about "advanced" programming you can find in the annex of this manual and also in the WinProgrammer's online help. If you have further problems when creating your keytable, our support team will certainly be able to help you. The best is to describe your problem in an email – and please send your keytable (MWF file) along with this email. Let' start... Figure 1 In the dialogue Keyboard Type you configure some basic keyboard settings: 1. Select keyboard group: The keyboard layouts are grouped on the register tabs Alpha, Numeric, Modules and OEM 2. Select your keyboard type: In our example we use a MCI 128, other layouts as appropriate. 3. Keyboard language and CapsLock behaviour: This setting must match the operating system's configuration on the target computer. Continue by pressing OK. Additional Information: For each type you will see an example picture. Additionally the selected keytable template will be displayed on the Desktop as a preview. For other countries, please see Language translation settings – MultiLanguage mode on page 12. Activate option OPOS / JavaPOS, if you intend to use our API or OPOS / JavaPOS services. This causes the modules MSR and keylock to be configured correctly.
    [Show full text]
  • Blender Hotkeys In-Depth Reference Relevant to Blender 2.36 - Compiled from Blender Online Guides fileformat Is As Indicated in the Displaybuttons
    Blender HotKeys In-depth Reference Relevant to Blender 2.36 - Compiled from Blender Online Guides fileformat is as indicated in the DisplayButtons. The window Window HotKeys becomes a File Select Window. Certain window managers also use the following hotkeys. CTRL-F3 (ALT-CTRL-F3 on MacOSX). Saves a screendump So ALT-CTRL can be substituted for CTRL to perform the of the active window. The fileformat is as indicated in the functions described below if a conflict arises. DisplayButtons. The window becomes a FileWindow. CTRL-LEFTARROW. Go to the previous Screen. SHIFT-CTRL-F3. Saves a screendump of the whole Blender screen. The fileformat is as indicated in the DisplayButtons. The CTRL-RIGHTARROW. Go to the next Screen. window becomes a FileWindow. CTRL-UPARROW or CTRL-DOWNARROW. Maximise the F4. Displays the Logic Context (if a ButtonsWindow is window or return to the previous window display size. available). SHIFT-F4. Change the window to a Data View F5. Displays the Shading Context (if a Buttons Window is available), Light, Material or World Sub-contextes depends on SHIFT-F5. Change the window to a 3D Window active object. SHIFT-F6. Change the window to an IPO Window F6. Displays the Shading Context and Texture Sub-context (if a SHIFT-F7. Change the window to a Buttons Window ButtonsWindow is available). SHIFT-F8. Change the window to a Sequence Window F7. Displays the Object Context (if a ButtonsWindow is available). SHIFT-F9. Change the window to an Outliner Window F8. Displays the Shading Context and World Sub-context (if a SHIFT-F10.
    [Show full text]