CS 15-122: Principles of Imperative Computation
(Spring 2018)

Course Information  [  Logistics  |  Calendar of Classes  |  Coursework Calendar  |  Office Hours  ]



(Your comments will be sent anonymously to the instructors)

Logistics

Labs: M,  between 9:30am and 5:20pm  (varies by section)
Lectures: TR,  09:00-10:20am (DH 2315)
or  TR,  10:30-11:50am  (DH 2315)
Recitations: F,  between 9:30am and 5:20pm  (varies by section)
Class web page: http://cs.cmu.edu/~15122
Course syllabus

Calendar of Classes

Click on a class day to go to that particular lecture or recitation. Due dates for homeworks are set in bold. The due date of the next homework blinks.

January 2018
UMTWRFS
 123456
78910111213
14151617181920
21222324252627
28293031   
       
February 2018
UMTWRFS
    123
45678910
11121314151617
18192021222324
25262728   
       
March 2018
UMTWRFS
    123
45678910
11121314151617
18192021222324
25262728293031
       
April 2018
UMTWRFS
1234567
891011121314
15161718192021
22232425262728
2930     
       
May 2018
UMTWRFS
  12345
6789101112
13141516171819
20212223242526
2728293031  
       

Coursework Calendar

Test
Percentage
learn. obj
Wr1
1.2%
1-3,11
Pg1
2.5%
1,12
Wr2
1.2%
1-3
Pg2
2.5%
12,15,16
Wr3
1.2%
1,2,4,12
Pg3
2.5%
1,12-16
Wr4
1.2%
1-4,21,27
Pg4
2.5%
1,18,17
Wr5
0.9%
6-10,15-17
Midterm1
12.5%
1-8
Wr6
1.2%
6-8,12,17
Pg5
2.5%
5,12,27
Wr7
1.2%
9,17,24,27
Pg6
2.5%
10
Posted15 Jan18 Jan22 Jan25 Jan29 Jan1 Feb5 Feb8 Feb12 FebThu
22 Feb
19 Feb22 Feb26 Feb1 Mar
Due
(9pm)
Mon
22 Jan
Thu
25 Jan
Mon
29 Jan
Thu
1 Feb
Mon
5 Feb
Thu
8 Feb
Mon
12 Feb
Thu
15 Feb
Mon
19 Feb
Mon
26 Feb
Thu
1 Mar
Mon
5 Mar
Thu
8 Mar
Corrected23 Jan27 Jan30 Jan3 Feb6 Feb10 Feb13 Feb17 Feb20 Feb26 Feb27 Feb3 Mar6 Mar10 Mar
Test
Percentage
learn. obj
Wr8
1.2%
12,24,27
Pg7
2.5%
1,12-18
Wr9
1.2%
9,10,25-27
Pg8
2.5%
8,10-18
Wr10
0.9%
2,13,25,27
Midterm2
12.5%
1-8
Pg9
2.5%
9,12-18
Wr11
1.2%
18-20
Pg10
2.5%
10,15-20
Wr12
1.2%
19,20
Pg11
2.5%
5,15-20
Wr13
1.2%
5,20,27
Pg12
2.5%
5,15-20
Final
25%
1-27
Posted12 Mar8 Mar19 Mar22 Mar26 MarThu
5 Apr
2 Apr5 Apr9 Apr12 Apr17 Apr23 Apr17 AprThu
10 May
(5:30-8:30)
Due
(9pm)
Mon
19 Mar
Thu
22 Mar
Mon
26 Mar
Thu
29 Mar
Mon
2 Apr
Mon
9 Apr
Thu
12 Apr
Mon
16 Apr
Mon
23 Apr
Thu
26 Apr
Mon
30 Apr
Thu
3 May
Corrected20 Mar24 Mar27 Mar31 Mar3 Apr7 Apr11 Apr13 Apr18 Apr24 Apr28 Apr1 May5 May12 May

Note the submission deadlines for written and programming assignments are inverted between midterm 2 and Carnival.

Office Hours

SundayMondayTuesdayWednesdayThursdayFridaySaturday
12:00pmGHC 6 commons30
Lunch OH
GHC 6 commons30
Lunch OH
GHC 6 commons30
Lunch OH
GHC 6 commons30
Lunch OH
GHC 711360
GHC 6 commons30
Lunch OH
1:00pmGHC 711360
2:00pmGHC 430760GHC 600760GHC 600760
Conceptual OH
GHC 430760
3:00pmGHC 430760GHC 430760
4:00pmGHC 430760GHC 430760
5:00pmGHC 430760GHC 430760
6:00pmGHC 421560GHC 421160GHC 421560GHC 410260
Conceptual OH
GHC 421160
7:00pmGHC 421560GHC 421160GHC 421560GHC 410260
Conceptual OH
GHC 421160
8:00pmGHC 421160GHC 421560
9:00pmGHC 421160GHC 421560

Office hour rules:

About this course  [  Description  |  How to Do Well  |  Readings  |  Software  |  Grading  |  Policies  |  Help  |  Learning Objectives  ]

Description[–]

This course teaches imperative programming in a C-like language and methods for ensuring the correctness of imperative programs. It is intended for students who are familiar with elementary programming concepts such as variables, expressions, loops, arrays, and functions. Given these building blocks, students will learn the process and techniques needed to go from high-level descriptions of algorithms to correct imperative implementations, with specific applications to basic data structures and algorithms. Much of the course will be conducted in a subset of C amenable to verification, with a transition to full C near the end. This will be accomplished along three dimensions: After completing 15-122, you will be able to take 15-213 (Introduction to Computer Systems), 15-210 (Parallel and Sequential Data Structures and Algorithms) and 15-214 (Principles of Software System Construction). Other prerequisites or restrictions may apply.

Prerequisites

You must have gotten a 5 on the AP Computer Science A exam or passed 15-112 (Fundamentals of Programming) or equivalent. You may also get permission from an advisor if you performed very high on the CS Assessment on Blackboard.
It is strongly advised that you either have taken or take at the same time either 21-127 (Concepts of Mathematics) or 15-151 (Mathematical Foundations of Computer Science): historically, students who did not ended up with a course grade one letter grade lower than their peers who did, on average.

Past Offerings

F'17 N'17 S'17 F'16 N'16 S'16 F'15 M'15 S'15 F'14 M'14 S'14 F'13 M'13 S'13 F'12 M'12 S'12 F'11 M'11 S'11 F'10

How to do Well in this Course[–]

Our goals are for you to succeed in this course and to teach you skills and concepts that will contribute to your success in life. To this end, we are providing you with lots of resources and the knowledge that comes from years of experience. Talking to some of the thousands of students who took this course before you, here's some advice that they found particularly useful:

Feedback

It is our goal to make this course successful, stimulating and enjoyable. If at any time you feel that the course is not meeting your expectations or you want to provide feedback on how the course is progressing for you, please contact us. If we are not aware about a problem, we won't know to fix it. If you would like to provide anonymous comments, please use the feedback form on the course home page or slide a note under our doors. Comments of general interest will be answered on the course discussion board.

Readings[–]

There is no textbook for this course. Lecture notes and other resources are provided through the Schedule tab of this page. We do not require students to read lecture notes before lecture, but those who are interested in reading ahead can certainly do so.

Software[–]

The C0 Language

In the first nine weeks, the course uses C0, a safe subset of C augmented with a layer to express contracts. This language has been specifically designed to support the student learning objectives in this course. It provides garbage collection (freeing students from dealing with low-level details of explicit memory management), fixed range modular integer arithmetic (avoiding complexities of floating point arithmetic and multiple data sizes), an unambiguous language definition (guarding against relying on undefined behavior), and contracts (making code expectations explicit and localizing reasoning).

The C Language

In the last six weeks, the course transitions to C in preparation for subsequent systems courses. Emphasis is on transferring positive habits developed in the use of C0, and on practical advice for avoiding the pitfalls and understanding the idiosyncrasies of C. We use the valgrind tool to test proper memory management.

Programming Environments

You are welcome to use any programming environment that suits you to write your programming assignments. However, all programming homework will be graded by running them on a Unix system using Autolab — you may want to make sure they work on Andrew Unix. Popular environment choices include emacs, vim and sublime, but you should use what works for you: an environment that allows you to write code quickly and efficiently. Here are some useful links:
UnixEmacs

Grading[–]

This is a 10 unit course.

Tasks and Percentages

We are aiming to have homework and exams graded within two days of submission.

Accessing and Monitoring your Grades

Posted grades are accessible by clicking on the Grades tab of this page. After authenticating, you will be able to see your current grades and a projection of where you are headed given your past performance in the class. Use this application to take action if the trajectory does not leade to the grade you are hoping for.

Evaluation Criteria

Your assignments and exams are evaluated on the basis of:

Late Policy

This is a fast-paced course. The late policy has the purpose to help students from falling behind. Aside from this, there will be no extensions on assignments in general. If you think you really really need an extension on a particular assignment, contact the instructors as soon as possible and before the deadline. Please be aware that extensions are entirely discretionary and will be granted only in exceptional circumstances outside of your control (e.g., due to severe illness or major personal/family emergencies, but not for competitions, club-related events or interviews). The instructors will require confirmation from University Health Services or your academic advisor, as appropriate.

Nearly all situations that make you run late on an assignment homework can be avoided with proper planning — often just starting early. Here are some examples:

Grade Appeals

We make mistakes too!
After each exam and homework assignment is graded, you will be able to access your score by clicking on the Grades tab of this page. We will make the utmost effort to be fair and consistent in our grading. Any TA is permitted to fix simple arithmetic errors (and, at their discretion, other blindingly obvious grading errors) in office hours. For any other grading issues, you must request a regrade as follows:

Final Grades

This class is not curved.

What follows is a rough guide to how course grades will be established, not a precise formula — we will fine-tune cutoffs and other details as we see fit after the end of the course. This is meant to help you set expectations and take action if your trajectory in the class does not take you to the grade you are hoping for (see also the Grades tab on this page). So, here's a rough, very rough heuristics about the correlation between final grades and total scores: This heuristic assumes that the makeup of a student’s grade is not wildly anomalous: exceptionally low overall scores on exams, programming assignments, or written assignments will be treated on a case-by-case basis. In particular, no student will get an A with an exam average below 80% (no matter how high his/her total score). Furthermore, students who are unable to demonstrate a basic proficiency with the C language in the last few programming assignments will receive a D in the class (this is because 15-122 is a prerequisite to 15-213, a very C-intensive course). For reference, almost a quarter of the students who received a B in Fall 2014 had a 90-100% average on programming assignments, an 80-90% average on written homeworks, and a 70-80% average on exams.
Precise grade cutoffs will not be discussed at any point during or after the semester. For students very close to grade boundaries, instructors may, at their discretion, consider participation in lecture and recitation, exam performance and overall grade trends when assigning the final grade.

Academic Integrity

You are expected to comply with the University Policy on Academic Integrity and Plagiarism (see also The Word and Understanding Academic Integrity).

The university policies and procedures on academic integrity will be applied rigorously. All students are required to fill out a form as part of their first assignment indicating that they understand and accept this policy.

The value of your degree depends on the academic integrity of yourself and your peers in each of your classes. It is expected that, unless otherwise instructed, the work you submit as your own is your own work and not someone else’s work or a collaboration between yourself and other(s).

You are allowed to discuss homework assignments with other students. However, in order to ensure that the work you submit is still your own, we insist that you adhere to a whiteboard policy regarding these discussions: you are not allowed to take any notes, files, pictures or other records away from the discussion, nor shall you memorize answers. Writing code on a whiteboard is never permitted. For example, you may work on a homework at the whiteboard with another student, but then you must erase the whiteboard, go home, wait some time (4 hours is a safe heuristic) and write up your solution individually. We take your ability to recreate the solution independently as proof that you understand the work that you submit.

This policy is our attempt to balance the tension between the benefits of group work and the benefits of individual work. We ask that you obey the spirit of the policy, as well as the letter: ensure that all work you submit is your own and that you fully understand the solution. This is in your best interest: the exams constitute a significant part of your final grade, they will be timed, and they will draw heavily on the terminology, concepts, and techniques that are exercised in homework. It is unlikely that you will be able to do well on the exams if you do not take full advantage of the learning opportunity afforded by the homework assignments. Moreover, we will aggressively pursue violations.

Please read the University Policy on Academic Integrity carefully to understand the penalties associated with academic dishonesty at Carnegie Mellon. In this class, cheating/copying/plagiarism means copying all or part of a program or homework solution from another student or unauthorized source such as the Internet, having someone else do a homework or take an exam for you, knowingly giving such information to another student, reusing answers or solutions from previous editions of the course, or giving or receiving unauthorized information during an examination. In general, each solution you submit (quiz, written assignment, programming assignment, midterm or final exam) must be your own work. In the event that you use information written by another person in your solution, you must cite the source of this information (and receive prior permission if unsure whether this is permitted). It is considered cheating to compare complete or partial answers, copy or adapt others' solutions, or sit near another person who is taking (or has taken) the same course and complete the assignment together. Working on code together, showing code to another student and looking at another student's code are considered cheating. It is also considered cheating for a repeating student to reuse one's solutions from a previous semester, or any instructor-provided sample solution. It is a violation of this policy to hand in work for other students.

Your course instructor reserves the right to determine an appropriate penalty based on the violation of academic dishonesty that occurs. Penalties are severe: a typical violation of the university policy results in the student failing this course, but may go all the way to expulsion from Carnegie Mellon University. If you have any questions about this policy and any work you are doing in the course, please feel free to contact the instructors for help.

We will be using the Moss system to detect software plagiarism. Whenever a programming assignment is similar to a homework from a previous course edition, we will running MOSS on all submissions of that edition as well.

It is not considered cheating to clarify vague points in assignments, lectures, lecture notes, or to give help or receive help in using the computer systems, compilers, debuggers, profilers, or other facilities, but you must refrain from looking at other students' code while you are getting or receiving help for these tools. It is not cheating to review graded assignments or exams with students in the same class as you, but it is considered unauthorized assistance to share these materials between different iterations of the course. Do not post code from this course publicly (e.g., to Bitbucket or GitHub).

Repeat Students
If you took this course in full or in part in a past semester, we ask that you archive your previous work and do not look at it. In particular, copying one's own solutions from an earlier semester is a violation of the academic integrity policy and will be persecuted as such. Doing so may save time close to a deadline but it will not have the effect of learning the material, which will be a serious handicap in exams.

Other Policies[–]

Class presence and participation

Active participation by you and other students will ensure that everyone has the best learning experience in this class. We may take participation in lecture and recitation into account when setting final grades. Fire safety rules require that we never exceed the state capacity of a classroom or cluster. For this reason, we require that you attend the lecture, lab, and recitation you are registered for.

Laptops and mobile devices

As research on learning shows, unexpected noises and movement automatically divert and capture people’s attention, which means you are affecting everyone's learning experience if your cell phone, pager, laptop, etc, makes noise or is visually distracting during class. Therefore, please silence all mobile devices during class. You may use laptops for note-taking only, but please do so from the back of the classroom. Do not work on assignments for this or any other class while attending lecture or recitation.

Students with disabilities

If you wish to request an accommodation due to a documented disability, please inform your instructor and contact Disability Resources as soon as possible (access@andrew.cmu.edu). Special accommodation for exams will be coordinated by the instructors, and must be requested for each exam separately a week in advance.

Getting Help[–]

Personal Health

Take care of yourself.

Do your best to maintain a healthy lifestyle this semester by eating well, exercising, avoiding drugs and alcohol, getting enough sleep and taking some time to relax. This will help you achieve your goals and cope with stress.

All of us benefit from support during times of struggle. You are not alone. There are many helpful resources available on campus and an important part of the college experience is learning how to ask for help. Asking for support sooner rather than later is often helpful.

If you or anyone you know experiences any academic stress, difficult life events, or feelings like anxiety or depression, we strongly encourage you to seek support. Counseling and Psychological Services (CaPS) is here to help: call 412-268-2922 and visit their website. Consider reaching out to a friend, faculty or family member you trust for help getting connected to the support that can help.

If you or someone you know is feeling suicidal or in danger of self-harm, call someone immediately, day or night:
CaPS: 412-268-2922
Re:solve Crisis Network: 888-796-8226
If the situation is life threatening, call the police:
  • On campus (CMU Police): 412-268-2323
  • Off campus: 911
If you have questions about this or your coursework, please let me know.

Communication

For assistance with the written or oral communication assignments in this class, visit the Global Communication Center (GCC). GCC tutors can provide instruction on a range of communication topics and can help you improve your papers and presentations. The GCC is a free service, open to all students, and located in Hunt library. You can make tutoring appointments directly on the GCC website. You may also visit the GCC website to find out about communication workshops offered throughout the academic year.

Learning Objectives[–]

Computational Thinking

Students should leave this course able to explain abstraction and other key computer science concepts, apply these fundamental concepts as problem-solving tools, and wield contracts as a tool for reasoning about the safety and correctness of programs. In particular, we expect students to be able to:
  1. develop contracts (preconditions, postconditions, assertions, and loop invariants) that establish the safety and correctness of imperative programs.
  2. develop and evaluate proofs of the safety and correctness of code with contracts.
  3. develop and evaluate informal termination arguments for programs with loops and recursion.
  4. evaluate claims of both asymptotic complexity and practical efficiency of programs by running tests on different problem sizes.
  5. define the concept of programs as data, and write programs that use the concept.
  6. defend the use of abstractions and interfaces in the presentation of algorithms and data structures.
  7. identify the difference between specification and implementation.
  8. compare different implementations of a given specification and different specifications that can be applied to a single implementation.
  9. explain data structure manipulations using data structure invariants.
  10. identify and evaluate the use of fundamental concepts in computer science as problem-solving tools:
    1. order (sorted or indexed data),
    2. asymptotic worst case, average case, and amortized analysis,
    3. randomness and (pseudo-)random number generation, and
    4. divide-and-conquer strategies.

Programming Skills

Students should leave this course able to read and write code for imperative algorithms and data structures. In particular, we expect students to be able to:
  1. trace the operational behavior of small imperative programs.
  2. identify, describe, and effectively use basic features of C0 and C:
    1. integers as signed modular arithmetic,
    2. integers as fixed-length bit vectors,
    3. characters and strings,
    4. Boolean operations with short-circuiting evaluation,
    5. arrays,
    6. loops (while and for),
    7. pointers,
    8. structs,
    9. recursive and mutually recursive functions,
    10. void pointers and casts between pointer types,
    11. contracts (in C0), and
    12. casts between different numeric types (in C).
  3. translate between high-level algorithms and correct imperative code.
  4. translate between high-level loop invariants and data structure invariants and correct contracts.
  5. write code using external libraries when given a library interface.
  6. develop, test, rewrite, and refine code that meets a given specification or interface.
  7. develop and refine small interfaces.
  8. document code with comments and contracts.
  9. identify undefined and implementation-defined behaviors in C.
  10. write, compile, and test C programs in a Unix-based environment using make, gcc, and valgrind.

Algorithms and Data Structures

Students should leave this course able to describe the implementation of a number of basic algorithms and data structures, effectively employ those algorithms and data structures, and explain and interpret worst-case asymptotic complexity arguments. In particular, we expect students to be able to:
  1. define and describe big-O notation, both formally and informally.
  2. compare common complexity classes like O(1), O(n), O(n log(n)), O(n2), and O(2n).
  3. explain the structure of basic amortized analysis proofs that use potential functions.
  4. apply principles of asymptotic analysis and amortized analysis to new algorithms and data structures.
  5. recognize properties of simple self-adjusting data structures.
  6. recognize algorithms and data structures using divide-and-conquer.
  7. describe and employ a number of basic algorithms and data structures:
    1. integer algorithms,
    2. linear search,
    3. binary search,
    4. sub-quadratic complexity sorting (mergesort and quicksort),
    5. stacks and queues,
    6. pseudo-random number generators,
    7. hash tables,
    8. priority queues,
    9. balanced binary search trees,
    10. disjoint-set data structures (union/find), and
    11. simple graph algorithms.

Course Staff

Instructors

photo of Iliano CervesatoIliano Cervesato
Office hours:
M 2:00-3:00pm (GHC 6007)
R 2:00-3:00pm (GHC 6007)
Conceptual OH
M-F 12:10-12:40 (GHC 6 commons)
Lunch OH
photo of Jean YangJean Yang
Office hours:
R 12:00-1:00pm (GHC 7113)
R 1:00-2:00pm (GHC 7113)

Course Administrative Assistant

photo of Marcie BakerMarcie Baker
GHC 6006

Teaching Assistants

photo of Anubhav BawejaAnubhav Baweja
Office hours:
W 8:00-9:00pm (GHC 4215)
W 9:00-10:00pm (GHC 4215)
photo of Aaron MeyersAaron Meyers
Office hours:
S 2:00-3:00pm (GHC 4307)
S 3:00-4:00pm (GHC 4307)
photo of Adrian BiagioliAdrian Biagioli
Office hours:
M 6:00-7:00pm (GHC 4215)
M 7:00-8:00pm (GHC 4215)
photo of Alex StanescuAlex Stanescu
Office hours:
F 6:00-7:00pm (GHC 4211)
F 7:00-8:00pm (GHC 4211)
photo of Anand BolluAnand Bollu
Office hours:
M 6:00-7:00pm (GHC 4215)
M 7:00-8:00pm (GHC 4215)
photo of Anne KohlbrennerAnne Kohlbrenner
Office hours:
W 8:00-9:00pm (GHC 4215)
W 9:00-10:00pm (GHC 4215)
photo of Ashley HongAshley Hong
Office hours:
S 2:00-3:00pm (GHC 4307)
S 3:00-4:00pm (GHC 4307)
photo of Ashley WattAshley Watt
Office hours:
S 4:00-5:00pm (GHC 4307)
S 5:00-6:00pm (GHC 4307)
photo of Brenda ThayillamBrenda Thayillam
Office hours:
W 6:00-7:00pm (GHC 4215)
W 7:00-8:00pm (GHC 4215)
photo of Cal LavickaCal Lavicka
Office hours:
U 4:00-5:00pm (GHC 4307)
U 5:00-6:00pm (GHC 4307)
photo of Charlotte DeissCharlotte Deiss
Office hours:
U 4:00-5:00pm (GHC 4307)
U 5:00-6:00pm (GHC 4307)
photo of Claire WangClaire Wang
Office hours:
T 8:00-9:00pm (GHC 4211)
T 9:00-10:00pm (GHC 4211)
photo of Chiara MroseChiara Mrose
Office hours:
F 6:00-7:00pm (GHC 4211)
F 7:00-8:00pm (GHC 4211)
photo of David SimonDavid Simon
Office hours:
R 6:00-7:00pm (GHC 4102)
Conceptual OH
R 7:00-8:00pm (GHC 4102)
Conceptual OH
photo of DeeDee HanDeeDee Han
Office hours:
W 6:00-7:00pm (GHC 4215)
W 7:00-8:00pm (GHC 4215)
photo of Emily LoEmily Lo
Office hours:
S 4:00-5:00pm (GHC 4307)
S 5:00-6:00pm (GHC 4307)
photo of Felipe ArchondoFelipe Archondo
Office hours:
F 6:00-7:00pm (GHC 4211)
F 7:00-8:00pm (GHC 4211)
photo of Harry XuHarry Xu
Office hours:
U 2:00-3:00pm (GHC 4307)
U 3:00-4:00pm (GHC 4307)
photo of Jonathan BurnsJonathan Burns
Office hours:
W 6:00-7:00pm (GHC 4215)
W 7:00-8:00pm (GHC 4215)
photo of Judy KongJudy Kong
Office hours:
W 6:00-7:00pm (GHC 4215)
W 7:00-8:00pm (GHC 4215)
photo of Komal DhullKomal Dhull
Office hours:
U 2:00-3:00pm (GHC 4307)
U 3:00-4:00pm (GHC 4307)
photo of Kai LungKai Lung
Office hours:
T 8:00-9:00pm (GHC 4211)
T 9:00-10:00pm (GHC 4211)
photo of Minji KimMinji Kim
Office hours:
W 6:00-7:00pm (GHC 4215)
W 7:00-8:00pm (GHC 4215)
photo of Misha IvkovMisha Ivkov
Office hours:
T 8:00-9:00pm (GHC 4211)
T 9:00-10:00pm (GHC 4211)
photo of Maryia OreshkoMaryia Oreshko
Office hours:
W 8:00-9:00pm (GHC 4215)
W 9:00-10:00pm (GHC 4215)
photo of Nancy XiaoNancy Xiao
Office hours:
W 6:00-7:00pm (GHC 4215)
W 7:00-8:00pm (GHC 4215)
photo of Naveen SetlurNaveen Setlur
Office hours:
R 6:00-7:00pm (GHC 4102)
Conceptual OH
R 7:00-8:00pm (GHC 4102)
Conceptual OH
photo of Pranav KumarPranav Kumar
Office hours:
W 8:00-9:00pm (GHC 4215)
W 9:00-10:00pm (GHC 4215)
photo of Stephanie YouStephanie You
Office hours:
M 6:00-7:00pm (GHC 4215)
M 7:00-8:00pm (GHC 4215)
photo of Tanuj NayakTanuj Nayak
Office hours:
U 4:00-5:00pm (GHC 4307)
U 5:00-6:00pm (GHC 4307)
photo of Winston GrenierWinston Grenier
Office hours:
T 8:00-9:00pm (GHC 4211)
T 9:00-10:00pm (GHC 4211)
photo of Xiong-Fei DuXiong-Fei Du
Office hours:
T 8:00-9:00pm (GHC 4211)
T 9:00-10:00pm (GHC 4211)
photo of Yifei LuoYifei Luo
Office hours:
W 8:00-9:00pm (GHC 4215)
W 9:00-10:00pm (GHC 4215)

Schedule of Classes

At a glance ...

Outline[+]


Mon 15 Jan
No class (Martin Luther King Day)
Tue 16 Jan
Lecture 1
Welcome and Course Introduction
We outline the course, its goals, and talk about various administrative issues.

A mysterious function ...
We examine a program we know nothing about, making hypotheses about what it is supposed to do. We notice that this function has no meaningful output for some inputs, which leads us to restricting its valid inputs using preconditions. We use a similar mechanism, postconditions, to describe the value it returns. Along the way, we get acquainted to C0 and its support for checking pre- and post-conditions. We then notice that this function doesn't return the expected outputs even for some valid inputs ...
Concepts:
  • Pre- and post-conditions
  • Testing
  • Contract support in C0
Readings:
Thu 18 Jan
Lecture 2
Contracts
Contracts are program annotations that spell out what the code is supposed to do. They are the key to connecting algorithmic ideas to their implementation as a program. In this lecture, we illustrate the use of contracts by means of a simple C0 program. As we do so, we learn to verify loop invariants — an important type of contract, we see how contracts can help us write correct code, and we get acquainted with C0's automated support to validating contracts.
Concepts:
  • Loop invariants
  • Assertions
  • Using contracts to write correct programs
  • Contract support in C0
Fri 19 Jan
Recitation 1
C0 Basics
This recitation reviews elementary C0 constructs and practices reasoning about code.
Sat 20 Jan
Lab 1
Setup
This lab practices using Linux and running the C0 interpreter and compiler.
Tue 23 Jan
Lecture 3
Ints
In this lecture, we explore how number representation interplays with the the ability to write effective contracts. We focus on integers and see how the binary representation called two's complement supports the laws of modular arithmetic, which C0 embraces. We also examine operations that allow exploiting the bit pattern of a binary number to achieve compact representations of other entities of interest, and to manipulate them.
  • Representation of integers
  • Two's complement
  • Modular arithmetic
  • Bit-level operations
Thu 25 Jan
Lecture 4
Arrays
In this lecture, we examine arrays as our first composite data structure, i.e., a data construction designed to hold multiple values, together with operations to access them. Accessing an array element outside of its range is undefined — it is a safety violation — and we see how to use contracts, in particular loop invariants, to ensure the safety of array accesses in a program. Arrays are stored in memory, which means that they are manipulated through an address. This raises the possibility of aliasing, a notorious source of bugs in carelessly written programs.
  • Arrays
  • Memory allocation
  • Safe access
  • Loop invariants for arrays
  • Aliasing
Fri 26 Jan
Recitation 2
A Bit about Bytes
This recitation practices base conversion and writing code that manipulates bits.
Mon 29 Jan
Lab 2
A Reversal of Fortune
This lab practices working with bitwise operations on integers and with arrays.
Tue 30 Jan
Lecture 5
Searching Arrays
We practice reasoning about arrays by implementing a function that searches whether an array contains a given value — this is the gateway to a whole class of useful operations. We notice that this function returns its result more quickly when the array is sorted. We write a specialized variant that assumes that the array is sorted, and show that it works correctly by reasoning about array bounds. The first (simpler but less efficient) version acts as a specification for the the second (slightly more complex but often faster). Using the specification in the contract for the implementation is a standard technique to help writing correct code.
  • Linear search
  • Reasoning about arrays
  • Sorted arrays
  • Performance as number of operations executed
  • Specification vs. implementation
Thu 1 Feb
Lecture 6
Sorting Arrays
We examine big-O notation as a mathematical tool to describe the running time of algorithms, especially for the purpose of comparing two algorithms that solve the same problem. As a case study, we use the problem of sorting an array, and for now a single sorting algorithm, selection sort. As we implement selection sort, we see that starting with contracts gives us high confidence that the resulting code will work correctly. Along the way, we develop a useful library of functions about sorted arrays to be used in contracts.
  • Big-O notation
  • Selection sort
  • Deliberate programming
  • Asymptotic complexity analysis
Fri 2 Feb
Recitation 3
Function Family Reunion
This recitation practices understanding and using big-O notation.
Mon 5 Feb
Lab 3
Loopty-Loopty Loop
This lab practices testing and timing running code to estimate its complexity.
Tue 6 Feb
Lecture 7
Binary search
When searching for a value in a sorted array, examining the middle element allows us to discard half of the array in the worst case. The resulting algorithm, binary search, has logarithmic complexity which is much better than linear search (which is linear). Achieving a correct imperative implementation can be tricky however, and we use once more contracts as a mechanism to reach this goal.
  • Binary search
  • Divide-and-conquer
  • Deliberate implementation
  • Checking complex loop invariants
Thu 8 Feb
Lecture 8
Quicksort
We use the key idea underlying binary search to implement two sorting algorithms with better complexity than selection sort. We examine one of them, quicksort, in detail, again using contracts to achieve a correct implementation, this time a recursive implementation. We observe that the asymptotic complexity of quicksort depends on the the value of a quantity the algorithm use (the pivot) and discuss ways to reduce the chances of making a bad choice for it. We conclude by examining another sorting algorithm, mergesort, which is immune from this issue.
  • Quicksort
  • Deliberate programming
  • Recursion
  • Best, average, and worst case complexity
  • Randomness
  • Choosing an algorithm for a problem
Fri 9 Feb
Recitation 4
A Strange Sort of Proof
This recitation reviews proving the correctness of functions.
Mon 12 Feb
Lab 4
TA Training
This lab practices working with algorithms with radically different complexity for the same problem.
Tue 13 Feb
Lecture 9
Data structures
Arrays are homogeneous collections, where all components have the same type. structs enable building heterogeneous collections, that allow combining components of different types. They are key to building pervasively used data structures. In C0, a struct resides in allocated memory and is accessed through an address, which brings up a new form of safety violation: the NULL pointer violation. We extend the language of contracts to reason about pointers.
Now that we have a two ways to build complex collections, we start exploring the idea of segregating the definition of a data structure and the operations that manipulate it into a library. Code that uses this data structure only needs to be aware of the type, operations and invariants of the data structure, not the way they are implemented. This is the basis of a form of modular programming called abstract data types, in which client code uses a data structure exclusively through an interface without being aware of the underlying implementation.
  • struct
  • Pointers
  • Abstract data types
  • Interfaces, client code and library code
  • Data structure invariants
  • Testing
Thu 15 Feb
Lecture 10
waiting on id lecture10...
Fri 16 Feb
Recitation 5
waiting on id recitation5...
Mon 19 Feb
Lab 5
waiting on id lab5...
Tue 20 Feb
Lecture 11
waiting on id lecture11...
Thu 22 Feb
Midterm 1
waiting on id e1...
Fri 23 Feb
Recitation 6
waiting on id recitation6...
Mon 26 Feb
Lab 6
waiting on id lab6...
Tue 27 Feb
Lecture 12
waiting on id lecture12...
Thu 1 Mar
Lecture 13
waiting on id lecture13...
Fri 2 Mar
Recitation 7
waiting on id recitation7...
Mon 5 Mar
Lab 7
waiting on id lab7...
Tue 6 Mar
Lecture 14
waiting on id lecture14...
Thu 8 Mar
Lecture 15
waiting on id lecture15...
Fri 9 Mar
waiting on id h2...
Mon 12 Mar
waiting on id break...
Tue 13 Mar
Thu 15 Mar
Fri 16 Mar
Mon 19 Mar
Lab 8
waiting on id lab8...
Tue 20 Mar
Lecture 16
waiting on id lecture16...
Thu 22 Mar
Lecture 17
waiting on id lecture17...
Fri 23 Mar
Recitation 8
waiting on id recitation8...
Mon 26 Mar
Lab 9
waiting on id lab9...
Tue 27 Mar
Lecture 18
waiting on id lecture18...
Thu 29 Mar
Lecture 19
waiting on id lecture19...
Fri 30 Mar
Recitation 9
waiting on id recitation9...
Mon 2 Apr
Lab 10
waiting on id lab10...
Tue 3 Apr
Lecture 20
waiting on id lecture20...
Thu 5 Apr
Midterm 2
waiting on id e2...
Fri 6 Apr
Recitation 10
waiting on id recitation10...
Mon 9 Apr
Lab 11
waiting on id lab11...
Tue 10 Apr
Lecture 21
waiting on id lecture21...
Thu 12 Apr
Lecture 22
waiting on id lecture22...
Fri 13 Apr
Recitation 11
waiting on id recitation11...
Mon 16 Apr
Lab 12
waiting on id lab12...
Tue 17 Apr
Lecture 23
waiting on id lecture23...
Thu 19 Apr
waiting on id h3...
Fri 20 Apr
waiting on id h4...
Mon 23 Apr
Lab 13
waiting on id lab13...
Tue 24 Apr
Lecture 24
waiting on id lecture24...
Thu 26 Apr
Lecture 25
waiting on id lecture25...
Fri 27 Apr
Recitation 12
waiting on id recitation12...
Mon 30 Apr
Lab 14
waiting on id lab14...
Tue 1 May
Lecture 26
waiting on id lecture26...
Thu 3 May
Lecture 27
waiting on id lecture27...
Fri 4 May
Recitation 13
waiting on id recitation13...
Thu 10 May
(5:30-8:30)
[null]
final
waiting on id FINAL...

2018 Iliano Cervesato iliano@cmu.edu