SlideShare a Scribd company logo
1 of 62
Flooding Algorithm and building a spanning
Tree
• The communication network does not have a spanning tree from
before.
• Root initiates a message broadcast.
• Root sends message to all its neighbors.
• And sets the seen flag to true.
p1
p0
p2
p3
p5
p6
p4
p7
p8
p1
p0
p2
p3
p5
p6
p4
p7
p8
p1
p0
p2
p3
p4
p5
p4
p6
p7
p1
p0
p2
p3
p5
p6
p4
p7
p8
p1
p0
p2
p3
p5
p6
p4
p7
p8
It is possible that P1 gets
message from P0 and P2 at
the same time. In this case
p1 will choose a parent
arbitrarily
Basic Flooding Algorithm
• Each process maintains a single bit of state: seen-message.
• At time 0, root sets seen-message to true and sends M to all
neighbors except pj.
• Upon receiving M:
• If seen-message = false,
• seen-message ← true
• send M to all neighbors
• Else do nothing
Message complexity of flooding
• m = total number of communication channels
• When a processor receives a message for the first time from some
neighboring processor pj it sends the message <M> to all its neighbors
except pj.
• A processor will not send <M> more than once on any communication
channel.
• This <M> is sent at most twice on each communication channel. [hint:See
the channel between P1 and P2 in slide 9 and 10 and between P5 and P6].
• Note there are executions in which the message <M> is sent twice on all
communication channels except those on which <M> is received for the
first time.
• Thus it is possible that 2m- (n-1) messages are sent . This can be as high as
(n(n - 1))/2
Home work and Discussion
Refer Distributed Computing book page 17,18 [Difficulty level : easy ]
Question: Write the following Lemmas in your homework sheet along with
their proof
• Lemma 2.1
• Lemma 2.2l
• Lemma 2.3
• Lemma 2.4
And bring to next class. I will choose one person from each group to go over
the proof. First 15-20 minutes of the class will be spent in discussion.
The answers have to be written paper sheets in ink/pencil. No copy pasting
in word document and bringing printouts.
Modified flooding algorithm
• Each process maintains a single pointer parent, initially ⊥.
• Neighbors of a Processor need not be children but children will be its
neighbor.
• Each process has two lists - children and other [neighbors which are
not children
• In the earlier algorithm a spanning tree is not explicitly constructed.
• Use <parent> and <already>messages.
//Initially parent = ⊥ children = nil, other = nil . Other U children = all the neighbors
//Wake up root to send <M>. At this point root has not sent message
Upon receiving no message:
If pi = pr and parent = ⊥ then
Send <M> to all neighbors
Parent = pi
//Pj has not received <M> before.
Upon receiving <m> from neighbor pj:
If parent == ⊥then
Parent = pj
Send <parent> to pj
Send <M> to all neighbors except pj
Else send <already> to pj
Modified Flooding algorithm to construct a spanning tree. Code for processor pi 0<= I <= n-1
Upon receiving <parent> from neighbor pj:
Add pj to children
If children U other contains all neighbors except parent then
Terminate
Upon receiving <already> from neighbor pj:
Add pj to other
If children U other contains all neighbors except parent then
Terminate
p1
P0
p2
p3
<M>
<parent>
<already>
p1
P0
p2
p3
<M>
<parent>
<already>
• It will continue and broadcast the message and eventually the
algorithm will build a spanning tree.
• Question: (Bonus Points )
Prove that this algorithm will build a spanning tree
[Hint : Lemma 2.6 ]
Depth First Spanning Tree
• The previous flooding algorithm created a BFS spanning tree because
it sent messages to all the neighbors.
• It was done level by level .
• In DFS Each processor has two sets associated with it
• A set of children
• A set of all neighbors which is called unexplored set
• Processors send <M> , <already> , and <parent> messages to each
other
• The set of children gets populated by the recipient when <parent>
message is sent
Depth search spanning tree algorithm for a
specified root. Code for processor pi,0<=i<= n-1
//Initially parent = ⊥ children = nil, unexplored= all neighbors of pi
//Wake up root to send <M>. At this point root has not sent message
Upon receiving no message:
If pi = pr and parent = ⊥ then
parent = pi
explore()
//Pj has not received <M> before.
Upon receiving <m> from neighbor pj:
If parent == ⊥then
Parent = pj
Remove pj from unexplored
explore()
else
send <already> to pj
Remove pj from unexplored
Upon receiving <already> from pj:
explore()
Upon receiving <parent> from pj:
add pj to children
explore()
Procedure explore():
if unexplored # nil then
let pk be a processor in unexplored
remove pk from unexplored
send <M> to pk
else
if parent #pi then //This is important because the only case
//when the parent of a processor is in the
// case of root
send <parent> to parent
p1
po
p2
p4
p5
p3
<M>
<parent>
<already>
p1
po
p2
p4
p5
p3
<M>
<parent>
<already>
p1
po
p2
p4
p5
p3
<M>
<parent>
<already>
p1
po
p2
p4
p5
p3
<M>
<parent>
<already>
p1
po
p2
p4
p5
p3
<M>
<parent>
<already>
p1
po
p2
p4
p5
p3
<M>
<parent>
<already>
p1
po
p2
p4
p5
p3
Unexplored = Nil
Unexplored = Nil
<M>
<parent>
<already>
p1
po
p2
p4
p5
p3
Unexplored = Nil
<M>
<parent>
<already>
p1
po
p2
p4
p5
p3
<M>
<parent>
<already>
p1
po
p2
p4
p5
p3
<M>
<parent>
<already>
p1
po
p2
p4
p5
p3
<M>
<parent>
<already>
p1
po
p2
p4
p5
p3
Unexplored = Nil
<M>
<parent>
<already>
p1
po
p2
p4
p5
p3
Parent == po
<M>
<parent>
<already>
What is the time complexity of the DFS
spanning tree?
Home Work
http://www.concretepage.com/java/example-observer-observable-java
https://examples.javacodegeeks.com/core-java/util/observer/java-util-
observer-example/
DFS Spanning tree without a specified root
• Three different types of messages are sent each message is tagged
with either of the following
• leader
• already
• parent
leader
already
leader
Spanning tree construction: code for
processor pi 0<= i <= n-1
Initially parent = ⊥ children = nil, unexplored= all neighbors of pi
//Wake up all nodes spontaneously
Upon receiving no message:
If parent = ⊥ then
leader = id
parent = pi
explore()
Spanning tree construction: code for
processor pi 0<= i <= n-1
//Switch to new tree
Upon receiving <leader, new-id> from pj:
If leader < new-id then
leader = new-id
parent = pj
children = nil
unexplored = all neighbors of pj except pj
explore()
else if leader == new-id then
send <already, leader> to pj //this processor is already in the same tree
//otherwise leader > new-id and the DFS for the new-id is stalled.
Spanning tree construction: code for
processor pi 0<= i <= n-1
//Switch to new tree
Upon receiving <already, new-id> from pj:
If new-id == leader then
explore()
Spanning tree construction: code for
processor pi 0<= i <= n-1
//Switch to new tree
Upon receiving <parent, new-id> from pj:
If new-id == leader then
Add pj to children
explore()
Spanning tree construction: code for
processor pi 0<= i <= n-1
//Switch to new tree
procedure explore() :
If unexplored != nil then
let pk be a processor in unexplored
remove pk from unexplored
send <leader, leader> to pk
else
If parent != pi then send <parent, leader> to parent
else
terminate as root of spanning tree
34
55
23 11
29
20 19
55
24
34
55
23 11
29
20 19
55
24
leader
already
leader
leader
leader
34
55
23
34 11
29
20 19
55
24
already
leader
Upon receiving <leader, new-id> from pj :
If leader < new-id then
leader = new-id
parent = pj
children = nil
unexplored = all neighbors of pi
except pj
explore()
else if leader == new-id then
send <already, leader> to pj
34
54
23
34 11
29
20 19
55
24
already
leader
procedure explore() :
If unexplored != nil then
let pk be a processor in
unexplored
remove pk from unexplored
send <leader, leader> to pk
else
If parent != pi then send
<parent, leader> to parent
else
terminate as root of
spanning tree
The node with leader 34
belongs to a DFS with id
smaller than the maximal
identifier seen so far.
Do nothing. Stall the DFS
creation for this DFS
34
54
23
34 11
29
20 19
55
24
already
leader
The node with leader 20
belongs to a DFS with id
smaller than the maximal
identifier seen so far.
Do nothing. Stall the DFS
creation for this DFS
34
54
23
34
11
29
29
20 19
55
24
29
already
leader
explore
34
54
23
34
11
29
29
20 19
55
24
29
already
leader
already
explore
34
54
23
34
11
29
29
20
29
19
29
55
24
29
leader
44
62
20
25
27
92
45
12
already
leader
62 12 20
45 92
12 20
92 25
45 44 25
62 20
62 27 44
45
44
62
20
25
27
92
45
12
already
leader
62 12 20
45 92
12 20
92 25
45 44 25
62 20
62 27 44
45
44
62
45
12
92
20
27
25
44
62
20
25
27
92
45
12
already
leader
12 20
92
20
25
44 25
20
27 44
45
44
62
45
12
92
20
27
25
44
62
20
25
27
92
45
12
already
leader
12 20
92
20
25
44 25
20
27 44
45
44
62
45
12
92
20
27
25
44
62
20
25
27
92
45
12
already
leader
12 20
92
20
25
44 25
20
27 44
4562
9292
62
44
62
20
25
27
92
45
12
20
20
25
44 25
20
27 44
4562
9292
62
44
62
20
25
27
92
45
12
20
20
25
44 25
20
27 44
4562
9292
62
44
62
20
25
27
92
45
12
20
20
25
44 25
20
27 44
4562
9292
62
44
62
20
25
27
92
45
12
12 20
92
20
25
44 25
20
27 44
4562
92
9292
92
44
62
20
25
27
92
45
12
12 20
25
44 25
20
27 44
4562
92
9292
92
44
62
20
25
27
92
45
12
12 20
92
20
25
44 25
20
27 44
4562
92
9292
92
92
44
62
20
25
27
92
45
12
12 20
92
20
25
44 25
20
27 44
4562
92
92
44
62
20
25
27
92
45
12
already
leader
62 12 20
45 92
12 20
92 25
45 44 25
62 20
62 27 44
45
References
• http://www.cs.yale.edu/homes/aspnes/pinewiki/Flooding.html
• https://www.youtube.com/watch?v=6EEgWmyl-IM
• GOOD
http://www.cs.yale.edu/homes/aspnes/pinewiki/Flooding.html

More Related Content

Recently uploaded

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 

Recently uploaded (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthThinkNow
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfmarketingartwork
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024Neil Kimberley
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)contently
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024Albert Qian
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsKurio // The Social Media Age(ncy)
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Search Engine Journal
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summarySpeakerHub
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next Tessa Mero
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentLily Ray
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best PracticesVit Horky
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project managementMindGenius
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...RachelPearson36
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Applitools
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at WorkGetSmarter
 

Featured (20)

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 

0 1-basic flooding algorithm