SlideShare a Scribd company logo
Flooding Algorithm and building a spanning
Tree
• The communication network does not have a spanning tree from
before.
• Root initiates a message broadcast.
• Root sends message to all its neighbors.
• And sets the seen flag to true.
p1
p0
p2
p3
p5
p6
p4
p7
p8
p1
p0
p2
p3
p5
p6
p4
p7
p8
p1
p0
p2
p3
p4
p5
p4
p6
p7
p1
p0
p2
p3
p5
p6
p4
p7
p8
p1
p0
p2
p3
p5
p6
p4
p7
p8
It is possible that P1 gets
message from P0 and P2 at
the same time. In this case
p1 will choose a parent
arbitrarily
Basic Flooding Algorithm
• Each process maintains a single bit of state: seen-message.
• At time 0, root sets seen-message to true and sends M to all
neighbors except pj.
• Upon receiving M:
• If seen-message = false,
• seen-message ← true
• send M to all neighbors
• Else do nothing
Message complexity of flooding
• m = total number of communication channels
• When a processor receives a message for the first time from some
neighboring processor pj it sends the message <M> to all its neighbors
except pj.
• A processor will not send <M> more than once on any communication
channel.
• This <M> is sent at most twice on each communication channel. [hint:See
the channel between P1 and P2 in slide 9 and 10 and between P5 and P6].
• Note there are executions in which the message <M> is sent twice on all
communication channels except those on which <M> is received for the
first time.
• Thus it is possible that 2m- (n-1) messages are sent . This can be as high as
(n(n - 1))/2
Home work and Discussion
Refer Distributed Computing book page 17,18 [Difficulty level : easy ]
Question: Write the following Lemmas in your homework sheet along with
their proof
• Lemma 2.1
• Lemma 2.2l
• Lemma 2.3
• Lemma 2.4
And bring to next class. I will choose one person from each group to go over
the proof. First 15-20 minutes of the class will be spent in discussion.
The answers have to be written paper sheets in ink/pencil. No copy pasting
in word document and bringing printouts.
Modified flooding algorithm
• Each process maintains a single pointer parent, initially ⊥.
• Neighbors of a Processor need not be children but children will be its
neighbor.
• Each process has two lists - children and other [neighbors which are
not children
• In the earlier algorithm a spanning tree is not explicitly constructed.
• Use <parent> and <already>messages.
//Initially parent = ⊥ children = nil, other = nil . Other U children = all the neighbors
//Wake up root to send <M>. At this point root has not sent message
Upon receiving no message:
If pi = pr and parent = ⊥ then
Send <M> to all neighbors
Parent = pi
//Pj has not received <M> before.
Upon receiving <m> from neighbor pj:
If parent == ⊥then
Parent = pj
Send <parent> to pj
Send <M> to all neighbors except pj
Else send <already> to pj
Modified Flooding algorithm to construct a spanning tree. Code for processor pi 0<= I <= n-1
Upon receiving <parent> from neighbor pj:
Add pj to children
If children U other contains all neighbors except parent then
Terminate
Upon receiving <already> from neighbor pj:
Add pj to other
If children U other contains all neighbors except parent then
Terminate
p1
P0
p2
p3
<M>
<parent>
<already>
p1
P0
p2
p3
<M>
<parent>
<already>
• It will continue and broadcast the message and eventually the
algorithm will build a spanning tree.
• Question: (Bonus Points )
Prove that this algorithm will build a spanning tree
[Hint : Lemma 2.6 ]
Depth First Spanning Tree
• The previous flooding algorithm created a BFS spanning tree because
it sent messages to all the neighbors.
• It was done level by level .
• In DFS Each processor has two sets associated with it
• A set of children
• A set of all neighbors which is called unexplored set
• Processors send <M> , <already> , and <parent> messages to each
other
• The set of children gets populated by the recipient when <parent>
message is sent
Depth search spanning tree algorithm for a
specified root. Code for processor pi,0<=i<= n-1
//Initially parent = ⊥ children = nil, unexplored= all neighbors of pi
//Wake up root to send <M>. At this point root has not sent message
Upon receiving no message:
If pi = pr and parent = ⊥ then
parent = pi
explore()
//Pj has not received <M> before.
Upon receiving <m> from neighbor pj:
If parent == ⊥then
Parent = pj
Remove pj from unexplored
explore()
else
send <already> to pj
Remove pj from unexplored
Upon receiving <already> from pj:
explore()
Upon receiving <parent> from pj:
add pj to children
explore()
Procedure explore():
if unexplored # nil then
let pk be a processor in unexplored
remove pk from unexplored
send <M> to pk
else
if parent #pi then //This is important because the only case
//when the parent of a processor is in the
// case of root
send <parent> to parent
p1
po
p2
p4
p5
p3
<M>
<parent>
<already>
p1
po
p2
p4
p5
p3
<M>
<parent>
<already>
p1
po
p2
p4
p5
p3
<M>
<parent>
<already>
p1
po
p2
p4
p5
p3
<M>
<parent>
<already>
p1
po
p2
p4
p5
p3
<M>
<parent>
<already>
p1
po
p2
p4
p5
p3
<M>
<parent>
<already>
p1
po
p2
p4
p5
p3
Unexplored = Nil
Unexplored = Nil
<M>
<parent>
<already>
p1
po
p2
p4
p5
p3
Unexplored = Nil
<M>
<parent>
<already>
p1
po
p2
p4
p5
p3
<M>
<parent>
<already>
p1
po
p2
p4
p5
p3
<M>
<parent>
<already>
p1
po
p2
p4
p5
p3
<M>
<parent>
<already>
p1
po
p2
p4
p5
p3
Unexplored = Nil
<M>
<parent>
<already>
p1
po
p2
p4
p5
p3
Parent == po
<M>
<parent>
<already>
What is the time complexity of the DFS
spanning tree?
Home Work
http://www.concretepage.com/java/example-observer-observable-java
https://examples.javacodegeeks.com/core-java/util/observer/java-util-
observer-example/
DFS Spanning tree without a specified root
• Three different types of messages are sent each message is tagged
with either of the following
• leader
• already
• parent
leader
already
leader
Spanning tree construction: code for
processor pi 0<= i <= n-1
Initially parent = ⊥ children = nil, unexplored= all neighbors of pi
//Wake up all nodes spontaneously
Upon receiving no message:
If parent = ⊥ then
leader = id
parent = pi
explore()
Spanning tree construction: code for
processor pi 0<= i <= n-1
//Switch to new tree
Upon receiving <leader, new-id> from pj:
If leader < new-id then
leader = new-id
parent = pj
children = nil
unexplored = all neighbors of pj except pj
explore()
else if leader == new-id then
send <already, leader> to pj //this processor is already in the same tree
//otherwise leader > new-id and the DFS for the new-id is stalled.
Spanning tree construction: code for
processor pi 0<= i <= n-1
//Switch to new tree
Upon receiving <already, new-id> from pj:
If new-id == leader then
explore()
Spanning tree construction: code for
processor pi 0<= i <= n-1
//Switch to new tree
Upon receiving <parent, new-id> from pj:
If new-id == leader then
Add pj to children
explore()
Spanning tree construction: code for
processor pi 0<= i <= n-1
//Switch to new tree
procedure explore() :
If unexplored != nil then
let pk be a processor in unexplored
remove pk from unexplored
send <leader, leader> to pk
else
If parent != pi then send <parent, leader> to parent
else
terminate as root of spanning tree
34
55
23 11
29
20 19
55
24
34
55
23 11
29
20 19
55
24
leader
already
leader
leader
leader
34
55
23
34 11
29
20 19
55
24
already
leader
Upon receiving <leader, new-id> from pj :
If leader < new-id then
leader = new-id
parent = pj
children = nil
unexplored = all neighbors of pi
except pj
explore()
else if leader == new-id then
send <already, leader> to pj
34
54
23
34 11
29
20 19
55
24
already
leader
procedure explore() :
If unexplored != nil then
let pk be a processor in
unexplored
remove pk from unexplored
send <leader, leader> to pk
else
If parent != pi then send
<parent, leader> to parent
else
terminate as root of
spanning tree
The node with leader 34
belongs to a DFS with id
smaller than the maximal
identifier seen so far.
Do nothing. Stall the DFS
creation for this DFS
34
54
23
34 11
29
20 19
55
24
already
leader
The node with leader 20
belongs to a DFS with id
smaller than the maximal
identifier seen so far.
Do nothing. Stall the DFS
creation for this DFS
34
54
23
34
11
29
29
20 19
55
24
29
already
leader
explore
34
54
23
34
11
29
29
20 19
55
24
29
already
leader
already
explore
34
54
23
34
11
29
29
20
29
19
29
55
24
29
leader
44
62
20
25
27
92
45
12
already
leader
62 12 20
45 92
12 20
92 25
45 44 25
62 20
62 27 44
45
44
62
20
25
27
92
45
12
already
leader
62 12 20
45 92
12 20
92 25
45 44 25
62 20
62 27 44
45
44
62
45
12
92
20
27
25
44
62
20
25
27
92
45
12
already
leader
12 20
92
20
25
44 25
20
27 44
45
44
62
45
12
92
20
27
25
44
62
20
25
27
92
45
12
already
leader
12 20
92
20
25
44 25
20
27 44
45
44
62
45
12
92
20
27
25
44
62
20
25
27
92
45
12
already
leader
12 20
92
20
25
44 25
20
27 44
4562
9292
62
44
62
20
25
27
92
45
12
20
20
25
44 25
20
27 44
4562
9292
62
44
62
20
25
27
92
45
12
20
20
25
44 25
20
27 44
4562
9292
62
44
62
20
25
27
92
45
12
20
20
25
44 25
20
27 44
4562
9292
62
44
62
20
25
27
92
45
12
12 20
92
20
25
44 25
20
27 44
4562
92
9292
92
44
62
20
25
27
92
45
12
12 20
25
44 25
20
27 44
4562
92
9292
92
44
62
20
25
27
92
45
12
12 20
92
20
25
44 25
20
27 44
4562
92
9292
92
92
44
62
20
25
27
92
45
12
12 20
92
20
25
44 25
20
27 44
4562
92
92
44
62
20
25
27
92
45
12
already
leader
62 12 20
45 92
12 20
92 25
45 44 25
62 20
62 27 44
45
References
• http://www.cs.yale.edu/homes/aspnes/pinewiki/Flooding.html
• https://www.youtube.com/watch?v=6EEgWmyl-IM
• GOOD
http://www.cs.yale.edu/homes/aspnes/pinewiki/Flooding.html

More Related Content

Recently uploaded

zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 

Recently uploaded (20)

zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
marketingartwork
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
Skeleton Technologies
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
SpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Lily Ray
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
Rajiv Jayarajah, MAppComm, ACC
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
Christy Abraham Joy
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
Vit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
MindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
GetSmarter
 

Featured (20)

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 

0 1-basic flooding algorithm