Port Protocols for Deadlock-Freedom of Component Systems

Size: px
Start display at page:

Download "Port Protocols for Deadlock-Freedom of Component Systems"

Transcription

1 Port Protocols for Dedlock-Freedom of Comonent Systems Christin Lmbertz Mil Mjster-Cederbum University of Mnnheim, Germny In comonent-bsed develoment, roches for roerty verifiction exist tht void building the globl system behvior of the comonent model. Tyiclly, these roches rely on the nlysis of the locl behvior of fixed sized subsystems of comonents. In our roch, we wnt to void not only the nlysis of the globl behvior but lso of the locl behviors of the comonents. Insted, we consider very smll rts of the locl behviors clled ort rotocols tht suffice to verify roerties. 1 Introduction Comonent-bsed develoment (CBD) hels to mster the design comlexity of softwre systems nd enhnces reusbility. In forml CBD models, ech comonent tyiclly offers set of orts for cooertion with other comonents. Thereby, restrictions on the rchitecture of the system nd the behvior of comonents llow to verify roerties such s dedlock-freedom without exhustively serching the globl stte sce. Here, we consider the CBD model of interction systems by Sifkis et. l. [7] in which dt nd I/O oertions re comletely bstrcted wy nd every single oertion is clled n ction. Ech comonent s behvior is modeled s lbeled trnsition system (LTS), where the set of lbels equls the set of ctions nd ech ction is understood s ort of the ssocited comonent. The ctions re then groued into sets clled interctions to model cooertion. Thereby, ny ction cn only be executed if ll other ctions contined in n rorite interction re lso executble. The globl behvior is then derived by executing the interctions nondeterministiclly ccording to their executbility. A drwbck of the originl model is tht ort is considered s single ction nd thus no dditionl behvior cn be secified for it. Here, we extend the model of interction systems to lso cture ort behvior. We grou severl ctions of one comonent nd cll this grou ort lhbet. Additionlly, every ort lhbet is equied with LTS which we cll ort rotocol. The ide behind this roch is tht in verifiction stes we use the ort rotocols of involved comonents insted of their LTSs. This is more efficient since the behvior of the comonent is tyiclly much lrger (if we comre the number of sttes nd trnsitions) thn its ort rotocols. The verifiction of roerties for the whole comonent then follows from the verifiction ste tht used only the ort rotocols. Furthermore, this suorts gry box view of the comonents tht is desired in CBD similr to the rincile of informtion hiding [4]. In Hennicker et. l. [9] nd Mot et. l. [11], we find similr ides. In [9], ech ort rovides rotocol which is correct w.r.t. its comonent, i.e., the behvior of the comonent restricted to the ctions in the ort lhbet (i.e., ny other ction becomes unobservble) is wek bisimilr to the ort rotocol. Then, notion clled neutrlity llows to ly reduction strtegy such tht roerties need only to be verified on the reduced rt of the system. Thereby, neutrlity of ort q for ort mens tht the comosition of the rotocols of nd q restricted to the lhbet of is wek bisimilr to the rotocol of, i.e., it is sufficient to consider only. In [11], similr ide is clled comtibility of two orts nd requires tht ll sequences of ctions of one ort re lso ossible in the other one. After introducing our definitions in Sec. 2, we consider in Sec. 3 n exmle where two orts re neither neutrl nor comtible, but our roch resented in Sec. 4 llows to verify its dedlock-freedom. Bliudze, Bruni, Grohmnn, Silv (Eds.): Third Interction nd Concurrency Exerience (ICE 2010) EPTCS 38, 2010,. 7 11, doi: /eptcs.38.3

2 8 Port Protocols for Dedlock-Freedom of Comonent-Bsed Systems Note tht severl roches for roving dedlock-freedom in interction systems exist, e.g., Mjster- Cederbum nd Mrtens [10] or Benslem et. l. [2] in the context of BIP [1] (for which interction systems re theoreticl model). Art from the lck of gry box view of the comonents, which is desired in CBD [4], these roches lso exloit the comositionl structure of the system. In Sec. 3, we demonstrte how the roch of [10] cn further benefit from the introduction of ort rotocols by mens of n exmle system. The roch of [2] is bsed on finding invrints for the comonents, which must be rovided for ech roerty, nd for the interctions, which re comuted utomticlly. Unfortuntely, ccording to Benslem et. l. [3], for this comuttion there is risk of exlosion, if exhustiveness of solutions is necessry in the nlysis rocess. Thus, this roch is not gurnteed to be olynomil in the number nd size of the comonents resectively the ort rotocols which is n imortnt roerty of our roch. However, the introduction of ort rotocols in BIP could be romising extension w.r.t. gry box view, if comonent invrints cn be estblished from the informtion only vilble from the ort rotocols. 2 Formliztion of Protocol Interction Systems A rotocol interction system is defined by tule Sys := (Com,{P i } i Com,{A i } i Com P i,int,beh). Here, Com is finite set of comonents, which re referred to s i Com. The vilble orts of comonent i re given by the finite set P i, nd the ming orts(i) := {i: P i } llows to refer to ort of i s i: orts(i). The ctions of ech ort i: re given by the set A i, lso denoted by ort lhbet A i:, nd re ssumed to be disjoint, i.e., i, j Com, P i,q P j : i j q = A i A q j = /0. All vilble ctions of comonent i re contined in the ction set A i := P i A i, nd the union of ll ction sets is clled the globl ction set Act := i Com A i. A nonemty finite set α Act of ctions is clled n interction, if it contins t most one ction of every comonent, i.e., α A i 1 for ll i Com. For ny interction α nd comonent i we ut i(α) := A i α. Similrly, for α nd ort i: of i we ut i:(α) := A i: α. The interction set Int contins ll vilble interctions nd covers ll ctions, i.e., we require tht α Int α = Act holds. The behvior model Beh of Sys contins for every comonent i LTS [[i]] := (S i,a i,{ i } Ai,I i ) describing the locl behvior of i where S i is the locl stte sce, ction set A i contins the lbels, { i } Ai is fmily of trnsition reltions with i S i S i, nd I i S i is the set of locl initil sttes. Whenever (s,s ) we write s s insted. For every ort i: of i, Beh contins LTS [[i:]] := (S i:,a i: {τ},{ i: } Ai: {τ},i i: ) describing the ort rotocol of i:. The secil symbol τ is used to model unobservble behvior, nd we require τ / Act, i.e., no comonent uses τ s n ction. However, the ort rotocols re llowed to contin τ-trnsitions. A ort i: of comonent i is sid to be conform to the comonent if [[i:]] b f i: ([[i]]) where b denotes brnching bisimilrity [6] nd f i: ( ) is relbeling function tht relces ll lbels resectively trnsitions not contined in the ort lhbet A i: with the lbel τ resectively with τ-trnsition. Thereby, we ssume tht the ort rotocols re minimized w.r.t. brnching bisimilrity. Note tht we use brnching bisimilrity insted of wek bisimilrity, which is used in the roch of Hennicker et l. [9], becuse brnching bisimilrity reserves more roerties of systems ( logicl chrcteriztion of b in CTL* X exists [5]), it is more efficient to clculte [8], nd, s remrked by vn Glbbeek nd Weijlnd [6], mny systems tht re wek bisimilr re lso brnching bisimilr. In the following, we fix rotocol interction system Sys. The globl behvior of Sys is LTS [[Sys]] := (S,Int,{ } α α Int,I) where the set of globl sttes S := i Com S i is given by the Crtesin

3 C. Lmbertz & M. Mjster-Cederbum 9 roduct of the locl stte sces, which we consider to be order indeendent. Globl sttes re denoted by tules s := (s 1,,s n ) with n = Com, nd the set of globl initil sttes is I := i Com I i. The fmily of globl trnsition reltions { } α α Int is defined cnoniclly where for ny α Int nd ny s,s S we hve s α s if i Com: if i(α) = { i } then s i i i s i nd if i(α) = /0 then s i = s i. Let C Com be set of comonents. The rtil behvior of Sys with resect to C is LTS [[C]] := (S C,Int C,{ α C } α IntC,I C ) where S C := i C S i, I C := i C I i, Int C := {α ( i C A i ) α Int} \ {/0}, nd { α C } α IntC is defined nlogously to the fmily of globl trnsition reltions. Let P i Com orts(i) be set of orts. The ort behvior of Sys with resect to P is LTS [[P]] := (S P,Int P {τ},{ α P } α IntP {τ},i P ) where S P := i: P S i:, I P := i: P I i:, nd Int P := {α ( i: P A i: ) α Int}\{/0}. For ny α Int P nd ny s,s S P we hve s α P s if i: P: if i:(α) = { i: } then s i: i: i: s i: nd if i:(α) = /0 then s i: = s i:. Additionlly, for s,s τ S P we hve s P s τ if i: P: s i: i: s i: nd j:q P \ {i:}: s j:q = s j:q. Finlly, define the rotocol communiction grh G := (V,E) of Sys where the vertices re given by V := Com ( i Com orts(i)) nd the edges by E := {{i,i:} i Com i: orts(i)} {{i:, j:q} i, j Com i: orts(i) j:q orts( j) α Int : i:(α) /0 j:q(α) /0}. Two orts re connected if they re relted by n edge in G. The ort connectivity of ort i: is defined s the number of orts to which i: is connected. If the ort connectivity of ort is less thn two, we sy tht the ort is uniquely connected. If G forms tree in the grh-theoreticl sense, we sy tht G is tree-like. We cll LTS dedlock-free if ll its sttes, which re rechble from n initil stte, hve t lest one outgoing trnsition. 3 Two Exmle Systems We resent two exmles: The first one shows tht the roches of Hennicker et. l. [9] nd Mot et. l. [11] re not lwys licble nd the second how dedlock nlysis in interction systems cn benefit from ort rotocols. The first exmle is the rotocol interction system Sys ex1 shown in Fig. 1 with Com = {i, j}, orts(i) = {i:}, nd orts( j) = { j:q}. The interction set is given by Int = { { i, j },{b i,b j },{c i,c j }, {d i,d j } }. Obviously, ll orts re conform to their corresonding comonent. The exmle shows tht the two connected orts re neither neutrl nor comtible, since they restrict ech other, i.e., in [[{i:, j:q}]] only the execution th { i, j } {c i,c j } is ossible which restricts either ort. i [[i]] = [[i:]]: [[ j]] = [[ j:q]]: d j b i i j b j q j c i d i c j () Prot. comm. grh (b) Behvior nd ort rotocol of i res. i: (c) Behvior nd ort rotocol of j res. j:q Figure 1: Protocol interction system Sys ex1 with Int = { { i, j },{b i,b j },{c i,c j },{d i,d j } } The second exmle is the rotocol interction system Sys ex2 shown in Fig. 2 with Com = {m,1,2,,n}, orts(m) = {m:i i Com \ {m}}, nd orts(i) = {i:} for i Com \ {m}. The interction set is given by Int = { { i m, i } i Com \ {m} }. Obviously, ll orts re conform to their corresonding comonent.

4 10 Port Protocols for Dedlock-Freedom of Comonent-Bsed Systems n 1 n n m [[m]]: 1 m 2 m n m n 1 m [[m:i]]: i m (c) Port rot. of ort m:i with 1 i n [[i]] = [[i:]]: i () Protocol communiction grh 3 m (b) Behvior of com. m (d) Behvior nd ort rot. of border com. i res. ort i: with 1 i n Figure 2: Protocol interction system Sys ex2 with Int = { { i m, i } 1 i n } As n exmle for dedlock nlysis, we consider the nlysis of Mjster-Cederbum nd Mrtens [10] for tree-like interction systems. The check for dedlock-freedom of Sys ex2 requires mong other things tht we nlyze the rtil behvior of ll irs of connected comonents, i.e., we hve to crry out this nlysis n times. Since the size of ny such rtil behvior is O(n) becuse in ech check the middle comonent is used the whole dedlock nlysis needs O(n 2 ). If we use the ort rotocols insted of the whole behvior in ech ste, ech rotocol behvior cn be trversed in constnt time. Thus, the totl mount of work is O(n). Note tht the exmle only motivtes the use of ort rotocols in tree-like systems nd tht the globl stte sce of the exmle cn be trversed in O(n). But, with more comlex behvior of the non-middle comonents the cost of this trversl increses such tht globl stte sce nlysis becomes unfesible. 4 Proving Dedlock-Freedom In order to exloit the comositionl informtion nd the informtion obtined by combining the ort rotocols, we need to ut restrictions on the rchitecture, e.g., on the form of the rotocol communiction grh, nd on the locl behviors, e.g., on the existence of unobservble behvior in the ort rotocols. The following theorem exloits such restrictions nd llows for efficient verifiction of dedlockfreedom in interction systems, which cn be erformed in time olynomil in the number nd size of the ort rotocols. Note tht the exmles of Sec. 3 cn be verified in this wy. Theorem: Let Sys be rotocol interction system nd G its rotocol communiction grh. Assume tht G is tree-like nd tht every ort is uniquely connected nd conform to its corresonding comonent nd its miniml ort rotocol w.r.t. brnching bisimilrity is τ-free. If for ll connected orts i: nd j:q of ll comonents i, j Com holds tht [[{i:, j:q}]] is dedlock-free then [[Sys]] is dedlock-free. The theorem exloits the ide tht n unobservble ste in ort rotocol is only resent if the comonent s future behvior cn be influenced by the cooertion with its environment. If no τ is resent, the comonent s behvior visible through the ort rotocol is inevitble. Becuse of the structure of the rotocol communiction grh, it is then sufficient to check irs of ort rotocols for dedlock-freedom, becuse due to their τ- nd dedlock-freedom, no cyclic witing reltion is ossible. Proof (Sketch): We successively consider rtil behviors of connected comonents of incresing size in n induction like mnner. Assume tht there is set C Com of comonents such tht [[C]] is dedlockfree. Now ick comonent j / C nd consider C := C { j}. Assume [[C ]] is not dedlock-free, lthough comonent i C nd ort i: orts(i) exist such tht i: is connected to ort j:q orts( j)

5 C. Lmbertz & M. Mjster-Cederbum 11 nd [[{i:, j:q}]] is τ- nd dedlock-free which follows from the ssumtions. Due to the dedlock, there is rechble stte s C S C tht hs no outgoing trnsition. Since the corresonding stte s C S C in the system without j is dedlock-free, there must be n ction i A i nd sttes s i,s i S i with s i being i s locl rt in s C nd s i i i s i. But, the corresonding interction α with i(α) = i:(α) = { i} is not vilble in s C nymore due to the dedlock, i.e., there must be n j A j with j(α) = j:q(α) = { j } tht is not enbled in the locl rt s j of s C. Consider the rtil behvior [[{i, j}]] nd the stte (s i,s j ) S {i, j}, which is rechble from n initil stte in [[{i, j}]] since the dedlocked stte s C is rechble in [[C ]]. Now, n equivlent stte (s i:,s j:q ) S {i:, j:q} with s i b s i: nd s j b s j:q is lso rechble in the rotocol behvior [[{i:, j:q}]] becuse of the rotocol conformnce. But then, [[C ]] cnnot be dedlocked since t lest one α Int {i:, j:q} nd thus α Int is enbled in (s i:,s j:q ) becuse of the rotocol behvior s dedlock-freedom, nd this α cn neither be blocked by i becuse i s cooertion with the other comonents in C is dedlock-free nor by j becuse the only cooertion rtner of j is i in [[C ]] becuse otherwise the rotocol behvior [[{i:, j:q}]] would contin τ-trnsition. Currently, we re investigting weker versions of the theorem, e.g., we conjecture tht it is sufficient tht the rotocol behvior of combined ort rotocols is τ-free insted of requiring the τ-freedom of ll ort rotocols, nd we try to ly the ort rotocol roch to the verifiction of other generic roerties such s rogress nd secific roerties of given system secified in CTL* X. Additionlly, the roof of the theorem shows n liction for correctness-by-construction roch. References [1] Annd Bsu, Mrius Bozg & Joseh Sifkis (2006): Modeling Heterogeneous Rel-time Comonents in BIP. Softwre Engineering nd Forml Methods, Interntionl Conference on, [2] Sddek Benslem, Mrius Bozg, Thnh-Hung Nguyen & Joseh Sifkis (2009): D-Finder: A Tool for Comositionl Dedlock Detection nd Verifiction. Comuter Aided Verifiction, [3] Sddek Benslem, Mrius Bozg, Joseh Sifkis & Thnh-Hung Nguyen (2008): Comositionl Verifiction for Comonent-Bsed Systems nd Aliction. In: ATVA 08: Proceedings of the 6th Interntionl Symosium on Automted Technology for Verifiction nd Anlysis, Sringer-Verlg, [4] Hns de Bruin (2000): A Grey-Box Aroch to Comonent Comosition. Genertive nd Comonent-Bsed Softwre Engineering, [5] Rocco De Nicol & Frits Vndrger (1995): Three logics for brnching bisimultion. J. ACM 42(2), [6] Rob J. vn Glbbeek & W. Peter Weijlnd (1996): Brnching time nd bstrction in bisimultion semntics. J. ACM 43(3), [7] Gregor Gössler & Joseh Sifkis (2003): Comosition for Comonent-Bsed Modeling. In: FMCO 02: First Interntionl Symosium on Forml Methods for Comonents nd Objects, [8] Jn Groote & Frits Vndrger (1990): An efficient lgorithm for brnching bisimultion nd stuttering equivlence. Automt, Lnguges nd Progrmming, [9] Rolf Hennicker, Stehn Jnisch & Alexnder Kn (2008): On the Observble Behviour of Comosite Comonents. In: Interntionl Worksho on Forml Asects of Comonent Softwre (FACS 08), Electronic Notes in Theoreticl Comuter Science (ENTCS), [10] Mil Mjster-Cederbum & Moritz Mrtens (2008): Comositionl nlysis of dedlock-freedom for treelike comonent rchitectures. In: EMSOFT 08: Proceedings of the 7th ACM interntionl conference on Embedded softwre, ACM, New York, NY, USA, [11] Rodrigo Rmos, Augusto Smio & Alexndre Mot (2009): Systemtic Develoment of Trustworthy Comonent Systems. In: FM 2009: Forml Methods, Sringer-Verlg,

Strong Bisimulation. Overview. References. Actions Labeled transition system Transition semantics Simulation Bisimulation

Strong Bisimulation. Overview. References. Actions Labeled transition system Transition semantics Simulation Bisimulation Strong Bisimultion Overview Actions Lbeled trnsition system Trnsition semntics Simultion Bisimultion References Robin Milner, Communiction nd Concurrency Robin Milner, Communicting nd Mobil Systems 32

More information

Finite state automata

Finite state automata Finite stte utomt Lecture 2 Model-Checking Finite-Stte Systems (untimed systems) Finite grhs with lels on edges/nodes set of nodes (sttes) set of edges (trnsitions) set of lels (lhet) Finite Automt, CTL,

More information

Watson-Crick local languages and Watson-Crick two dimensional local languages

Watson-Crick local languages and Watson-Crick two dimensional local languages Interntionl Journl of Mthemtics nd Soft Comuting Vol.5 No.. (5) 65-7. ISSN Print : 49 338 ISSN Online: 39 55 Wtson-Crick locl lnguges nd Wtson-Crick two dimensionl locl lnguges Mry Jemim Smuel nd V.R.

More information

Summer School Verification Technology, Systems & Applications

Summer School Verification Technology, Systems & Applications VTSA 2011 Summer School Verifiction Technology, Systems & Applictions 4th edition since 2008: Liège (Belgium), Sep. 19 23, 2011 free prticiption, limited number of prticipnts ppliction dedline: July 22,

More information

Bisimulation. R.J. van Glabbeek

Bisimulation. R.J. van Glabbeek Bisimultion R.J. vn Glbbeek NICTA, Sydney, Austrli. School of Computer Science nd Engineering, The University of New South Wles, Sydney, Austrli. Computer Science Deprtment, Stnford University, CA 94305-9045,

More information

Refined interfaces for compositional verification

Refined interfaces for compositional verification Refined interfces for compositionl verifiction Frédéric Lng INRI Rhône-lpes http://www.inrilpes.fr/vsy Motivtion Enumertive verifiction of concurrent systems Prllel composition of synchronous processes

More information

Supplement 4 Permutations, Legendre symbol and quadratic reciprocity

Supplement 4 Permutations, Legendre symbol and quadratic reciprocity Sulement 4 Permuttions, Legendre symbol nd qudrtic recirocity 1. Permuttions. If S is nite set contining n elements then ermuttion of S is one to one ming of S onto S. Usully S is the set f1; ; :::; ng

More information

Notes on specifying systems in EST

Notes on specifying systems in EST Robert Meolic, Ttjn Kpus: Notes on specifying systems in EST 1 Notes on specifying systems in EST Robert Meolic, Ttjn Kpus Fculty of EE & CS University of Mribor Robert Meolic, Ttjn Kpus: Notes on specifying

More information

USA Mathematical Talent Search Round 1 Solutions Year 25 Academic Year

USA Mathematical Talent Search Round 1 Solutions Year 25 Academic Year 1/1/5. Alex is trying to oen lock whose code is sequence tht is three letters long, with ech of the letters being one of A, B or C, ossibly reeted. The lock hs three buttons, lbeled A, B nd C. When the

More information

Global Session Types for Dynamic Checking of Protocol Conformance of Multi-Agent Systems

Global Session Types for Dynamic Checking of Protocol Conformance of Multi-Agent Systems Globl Session Types for Dynmic Checking of Protocol Conformnce of Multi-Agent Systems (Extended Abstrct) Dvide Ancon, Mtteo Brbieri, nd Vivin Mscrdi DIBRIS, University of Genov, Itly emil: dvide@disi.unige.it,

More information

Tries and suffixes trees

Tries and suffixes trees Trie: A dt-structure for set of words Tries nd suffixes trees Alon Efrt Comuter Science Dertment University of Arizon All words over the lhet Σ={,,..z}. In the slides, let sy tht the lhet is only {,,c,d}

More information

Global Types for Dynamic Checking of Protocol Conformance of Multi-Agent Systems

Global Types for Dynamic Checking of Protocol Conformance of Multi-Agent Systems Globl Types for Dynmic Checking of Protocol Conformnce of Multi-Agent Systems (Extended Abstrct) Dvide Ancon, Mtteo Brbieri, nd Vivin Mscrdi DIBRIS, University of Genov, Itly emil: dvide@disi.unige.it,

More information

Math Lecture 23

Math Lecture 23 Mth 8 - Lecture 3 Dyln Zwick Fll 3 In our lst lecture we delt with solutions to the system: x = Ax where A is n n n mtrix with n distinct eigenvlues. As promised, tody we will del with the question of

More information

Hadamard-Type Inequalities for s Convex Functions I

Hadamard-Type Inequalities for s Convex Functions I Punjb University Journl of Mthemtics ISSN 6-56) Vol. ). 5-6 Hdmrd-Tye Ineulities for s Convex Functions I S. Hussin Dertment of Mthemtics Institute Of Sce Technology, Ner Rwt Toll Plz Islmbd Highwy, Islmbd

More information

Computation Tree Logic with Deadlock Detection

Computation Tree Logic with Deadlock Detection Comuttion Tree Logic with Dedlock Detection Rob vn Glbbeek 1,2, Bs Luttik 3,4 & Nikol Trčk 3 1 Ntionl ICT Austrli, Sydney, Austrli 2 School of Comuter Science nd Engineering, Univ. of New South Wles, Sydney

More information

Concepts of Concurrent Computation Spring 2015 Lecture 9: Petri Nets

Concepts of Concurrent Computation Spring 2015 Lecture 9: Petri Nets Concepts of Concurrent Computtion Spring 205 Lecture 9: Petri Nets Sebstin Nnz Chris Poskitt Chir of Softwre Engineering Petri nets Petri nets re mthemticl models for describing systems with concurrency

More information

LECTURE 10: JACOBI SYMBOL

LECTURE 10: JACOBI SYMBOL LECTURE 0: JACOBI SYMBOL The Jcobi symbol We wish to generlise the Legendre symbol to ccomodte comosite moduli Definition Let be n odd ositive integer, nd suose tht s, where the i re rime numbers not necessrily

More information

Families of Solutions to Bernoulli ODEs

Families of Solutions to Bernoulli ODEs In the fmily of solutions to the differentil eqution y ry dx + = it is shown tht vrition of the initil condition y( 0 = cuses horizontl shift in the solution curve y = f ( x, rther thn the verticl shift

More information

Finite Automata Theory and Formal Languages TMV027/DIT321 LP4 2018

Finite Automata Theory and Formal Languages TMV027/DIT321 LP4 2018 Finite Automt Theory nd Forml Lnguges TMV027/DIT321 LP4 2018 Lecture 10 An Bove April 23rd 2018 Recp: Regulr Lnguges We cn convert between FA nd RE; Hence both FA nd RE ccept/generte regulr lnguges; More

More information

Semantic reachability for simple process algebras. Richard Mayr. Abstract

Semantic reachability for simple process algebras. Richard Mayr. Abstract Semntic rechbility for simple process lgebrs Richrd Myr Abstrct This pper is n pproch to combine the rechbility problem with semntic notions like bisimultion equivlence. It dels with questions of the following

More information

Finite Automata. Informatics 2A: Lecture 3. John Longley. 22 September School of Informatics University of Edinburgh

Finite Automata. Informatics 2A: Lecture 3. John Longley. 22 September School of Informatics University of Edinburgh Lnguges nd Automt Finite Automt Informtics 2A: Lecture 3 John Longley School of Informtics University of Edinburgh jrl@inf.ed.c.uk 22 September 2017 1 / 30 Lnguges nd Automt 1 Lnguges nd Automt Wht is

More information

Formal Languages and Automata

Formal Languages and Automata Moile Computing nd Softwre Engineering p. 1/5 Forml Lnguges nd Automt Chpter 2 Finite Automt Chun-Ming Liu cmliu@csie.ntut.edu.tw Deprtment of Computer Science nd Informtion Engineering Ntionl Tipei University

More information

Exercises with (Some) Solutions

Exercises with (Some) Solutions Exercises with (Some) Solutions Techer: Luc Tesei Mster of Science in Computer Science - University of Cmerino Contents 1 Strong Bisimultion nd HML 2 2 Wek Bisimultion 31 3 Complete Lttices nd Fix Points

More information

Chapter 2 Finite Automata

Chapter 2 Finite Automata Chpter 2 Finite Automt 28 2.1 Introduction Finite utomt: first model of the notion of effective procedure. (They lso hve mny other pplictions). The concept of finite utomton cn e derived y exmining wht

More information

Handout: Natural deduction for first order logic

Handout: Natural deduction for first order logic MATH 457 Introduction to Mthemticl Logic Spring 2016 Dr Json Rute Hndout: Nturl deduction for first order logic We will extend our nturl deduction rules for sententil logic to first order logic These notes

More information

Review of Calculus, cont d

Review of Calculus, cont d Jim Lmbers MAT 460 Fll Semester 2009-10 Lecture 3 Notes These notes correspond to Section 1.1 in the text. Review of Clculus, cont d Riemnn Sums nd the Definite Integrl There re mny cses in which some

More information

Maximum Likelihood Estimation for Allele Frequencies. Biostatistics 666

Maximum Likelihood Estimation for Allele Frequencies. Biostatistics 666 Mximum Likelihood Estimtion for Allele Frequencies Biosttistics 666 Previous Series of Lectures: Introduction to Colescent Models Comuttionlly efficient frmework Alterntive to forwrd simultions Amenble

More information

Lumpability and Absorbing Markov Chains

Lumpability and Absorbing Markov Chains umbility nd Absorbing rov Chins By Ahmed A.El-Sheih Dertment of Alied Sttistics & Econometrics Institute of Sttisticl Studies & Reserch (I.S.S.R Ciro University Abstrct We consider n bsorbing rov Chin

More information

1.4 Nonregular Languages

1.4 Nonregular Languages 74 1.4 Nonregulr Lnguges The number of forml lnguges over ny lphbet (= decision/recognition problems) is uncountble On the other hnd, the number of regulr expressions (= strings) is countble Hence, ll

More information

More on automata. Michael George. March 24 April 7, 2014

More on automata. Michael George. March 24 April 7, 2014 More on utomt Michel George Mrch 24 April 7, 2014 1 Automt constructions Now tht we hve forml model of mchine, it is useful to mke some generl constructions. 1.1 DFA Union / Product construction Suppose

More information

PRIMES AND QUADRATIC RECIPROCITY

PRIMES AND QUADRATIC RECIPROCITY PRIMES AND QUADRATIC RECIPROCITY ANGELICA WONG Abstrct We discuss number theory with the ultimte gol of understnding udrtic recirocity We begin by discussing Fermt s Little Theorem, the Chinese Reminder

More information

Minimal DFA. minimal DFA for L starting from any other

Minimal DFA. minimal DFA for L starting from any other Miniml DFA Among the mny DFAs ccepting the sme regulr lnguge L, there is exctly one (up to renming of sttes) which hs the smllest possile numer of sttes. Moreover, it is possile to otin tht miniml DFA

More information

Properties of Lorenz Curves for Transformed Income Distributions

Properties of Lorenz Curves for Transformed Income Distributions Theoreticl Economics etters 22 2 487-493 htt://ddoiorg/4236/tel22259 Published Online December 22 (htt://wwwscirporg/journl/tel) Proerties of orenz Curves for Trnsformed Income Distributions John Fellmn

More information

Advanced Calculus: MATH 410 Notes on Integrals and Integrability Professor David Levermore 17 October 2004

Advanced Calculus: MATH 410 Notes on Integrals and Integrability Professor David Levermore 17 October 2004 Advnced Clculus: MATH 410 Notes on Integrls nd Integrbility Professor Dvid Levermore 17 October 2004 1. Definite Integrls In this section we revisit the definite integrl tht you were introduced to when

More information

Semantic Reachability. Richard Mayr. Institut fur Informatik. Technische Universitat Munchen. Arcisstr. 21, D Munchen, Germany E. N. T. C. S.

Semantic Reachability. Richard Mayr. Institut fur Informatik. Technische Universitat Munchen. Arcisstr. 21, D Munchen, Germany E. N. T. C. S. URL: http://www.elsevier.nl/locte/entcs/volume6.html?? pges Semntic Rechbility Richrd Myr Institut fur Informtik Technische Universitt Munchen Arcisstr. 21, D-80290 Munchen, Germny e-mil: myrri@informtik.tu-muenchen.de

More information

CS 275 Automata and Formal Language Theory

CS 275 Automata and Formal Language Theory CS 275 utomt nd Forml Lnguge Theory Course Notes Prt II: The Recognition Prolem (II) Chpter II.5.: Properties of Context Free Grmmrs (14) nton Setzer (Bsed on ook drft y J. V. Tucker nd K. Stephenson)

More information

C. C^mpenu, K. Slom, S. Yu upper boun of mn. So our result is tight only for incomplete DF's. For restricte vlues of m n n we present exmples of DF's

C. C^mpenu, K. Slom, S. Yu upper boun of mn. So our result is tight only for incomplete DF's. For restricte vlues of m n n we present exmples of DF's Journl of utomt, Lnguges n Combintorics u (v) w, x{y c OttovonGuerickeUniversitt Mgeburg Tight lower boun for the stte complexity of shue of regulr lnguges Cezr C^mpenu, Ki Slom Computing n Informtion

More information

Designing finite automata II

Designing finite automata II Designing finite utomt II Prolem: Design DFA A such tht L(A) consists of ll strings of nd which re of length 3n, for n = 0, 1, 2, (1) Determine wht to rememer out the input string Assign stte to ech of

More information

1. For each of the following theorems, give a two or three sentence sketch of how the proof goes or why it is not true.

1. For each of the following theorems, give a two or three sentence sketch of how the proof goes or why it is not true. York University CSE 2 Unit 3. DFA Clsses Converting etween DFA, NFA, Regulr Expressions, nd Extended Regulr Expressions Instructor: Jeff Edmonds Don t chet y looking t these nswers premturely.. For ech

More information

Hennessy-Milner Logic 1.

Hennessy-Milner Logic 1. Hennessy-Milner Logic 1. Colloquium in honor of Robin Milner. Crlos Olrte. Pontifici Universidd Jverin 28 April 2010. 1 Bsed on the tlks: [1,2,3] Prof. Robin Milner (R.I.P). LIX, Ecole Polytechnique. Motivtion

More information

Theory of Computation Regular Languages. (NTU EE) Regular Languages Fall / 38

Theory of Computation Regular Languages. (NTU EE) Regular Languages Fall / 38 Theory of Computtion Regulr Lnguges (NTU EE) Regulr Lnguges Fll 2017 1 / 38 Schemtic of Finite Automt control 0 0 1 0 1 1 1 0 Figure: Schemtic of Finite Automt A finite utomton hs finite set of control

More information

1 Online Learning and Regret Minimization

1 Online Learning and Regret Minimization 2.997 Decision-Mking in Lrge-Scle Systems My 10 MIT, Spring 2004 Hndout #29 Lecture Note 24 1 Online Lerning nd Regret Minimiztion In this lecture, we consider the problem of sequentil decision mking in

More information

The Multiperiod Network Design Problem: Lagrangian-based Solution Approaches 2

The Multiperiod Network Design Problem: Lagrangian-based Solution Approaches 2 Konrd-Zuse-Zentrum für Informtionstechnik Berlin Tkustrße 7 D-14195 Berlin-Dhlem Germny ANASTASIOS GIOVANIDIS 1 JONAD PULAJ 1 The ultieriod Network Design Problem: Lgrngin-bsed Solution Aroches 2 1 Zuse

More information

Global and Local Deadlock Freedom in BIP

Global and Local Deadlock Freedom in BIP 1 Globl nd Locl Dedlock Freedom in BIP PAUL C ATTIE, Americn University of Beirut, Lebnon SADDEK BENSALEM, UJF-Grenoble 1 / CNRS VERIMAG, Frnce MARIUS BOZGA, UJF-Grenoble 1 / CNRS VERIMAG, Frnce MOHAMAD

More information

New data structures to reduce data size and search time

New data structures to reduce data size and search time New dt structures to reduce dt size nd serch time Tsuneo Kuwbr Deprtment of Informtion Sciences, Fculty of Science, Kngw University, Hirtsuk-shi, Jpn FIT2018 1D-1, No2, pp1-4 Copyright (c)2018 by The Institute

More information

Non Deterministic Automata. Linz: Nondeterministic Finite Accepters, page 51

Non Deterministic Automata. Linz: Nondeterministic Finite Accepters, page 51 Non Deterministic Automt Linz: Nondeterministic Finite Accepters, pge 51 1 Nondeterministic Finite Accepter (NFA) Alphbet ={} q 1 q2 q 0 q 3 2 Nondeterministic Finite Accepter (NFA) Alphbet ={} Two choices

More information

New Expansion and Infinite Series

New Expansion and Infinite Series Interntionl Mthemticl Forum, Vol. 9, 204, no. 22, 06-073 HIKARI Ltd, www.m-hikri.com http://dx.doi.org/0.2988/imf.204.4502 New Expnsion nd Infinite Series Diyun Zhng College of Computer Nnjing University

More information

Supervisory Control (4CM30)

Supervisory Control (4CM30) Supervisory Control (4CM30) Verifiction in mcrl2 Michel Reniers M.A.Reniers@tue.nl 2016-2017 Verifiction in mcrl2 M CIF = φ CIF iff M mcrl2 = φ mcrl2 1. Adpt CIF model 2. Formulte property in modl µ-clculus

More information

Lecture 09: Myhill-Nerode Theorem

Lecture 09: Myhill-Nerode Theorem CS 373: Theory of Computtion Mdhusudn Prthsrthy Lecture 09: Myhill-Nerode Theorem 16 Ferury 2010 In this lecture, we will see tht every lnguge hs unique miniml DFA We will see this fct from two perspectives

More information

Coalgebra, Lecture 15: Equations for Deterministic Automata

Coalgebra, Lecture 15: Equations for Deterministic Automata Colger, Lecture 15: Equtions for Deterministic Automt Julin Slmnc (nd Jurrin Rot) Decemer 19, 2016 In this lecture, we will study the concept of equtions for deterministic utomt. The notes re self contined

More information

Theory of Computation Regular Languages

Theory of Computation Regular Languages Theory of Computtion Regulr Lnguges Bow-Yw Wng Acdemi Sinic Spring 2012 Bow-Yw Wng (Acdemi Sinic) Regulr Lnguges Spring 2012 1 / 38 Schemtic of Finite Automt control 0 0 1 0 1 1 1 0 Figure: Schemtic of

More information

Intermediate Math Circles Wednesday, November 14, 2018 Finite Automata II. Nickolas Rollick a b b. a b 4

Intermediate Math Circles Wednesday, November 14, 2018 Finite Automata II. Nickolas Rollick a b b. a b 4 Intermedite Mth Circles Wednesdy, Novemer 14, 2018 Finite Automt II Nickols Rollick nrollick@uwterloo.c Regulr Lnguges Lst time, we were introduced to the ide of DFA (deterministic finite utomton), one

More information

I. Theory of Automata II. Theory of Formal Languages III. Theory of Turing Machines

I. Theory of Automata II. Theory of Formal Languages III. Theory of Turing Machines CI 3104 /Winter 2011: Introduction to Forml Lnguges Chter 13: Grmmticl Formt Chter 13: Grmmticl Formt I. Theory of Automt II. Theory of Forml Lnguges III. Theory of Turing Mchines Dr. Neji Zgui CI3104-W11

More information

STRUCTURE OF CONCURRENCY Ryszard Janicki. Department of Computing and Software McMaster University Hamilton, ON, L8S 4K1 Canada

STRUCTURE OF CONCURRENCY Ryszard Janicki. Department of Computing and Software McMaster University Hamilton, ON, L8S 4K1 Canada STRUCTURE OF CONCURRENCY Ryszrd Jnicki Deprtment of Computing nd Softwre McMster University Hmilton, ON, L8S 4K1 Cnd jnicki@mcmster.c 1 Introduction Wht is concurrency? How it cn e modelled? Wht re the

More information

NFAs and Regular Expressions. NFA-ε, continued. Recall. Last class: Today: Fun:

NFAs and Regular Expressions. NFA-ε, continued. Recall. Last class: Today: Fun: CMPU 240 Lnguge Theory nd Computtion Spring 2019 NFAs nd Regulr Expressions Lst clss: Introduced nondeterministic finite utomt with -trnsitions Tody: Prove n NFA- is no more powerful thn n NFA Introduce

More information

Process Algebra CSP A Technique to Model Concurrent Programs

Process Algebra CSP A Technique to Model Concurrent Programs Process Algebr CSP A Technique to Model Concurrent Progrms Jnury 15, 2002 Hui Shi 1 Contents CSP-Processes Opertionl Semntics Trnsition systems nd stte mchines Bisimultion Firing rules for CSP Model-Checker

More information

CS 267: Automated Verification. Lecture 8: Automata Theoretic Model Checking. Instructor: Tevfik Bultan

CS 267: Automated Verification. Lecture 8: Automata Theoretic Model Checking. Instructor: Tevfik Bultan CS 267: Automted Verifiction Lecture 8: Automt Theoretic Model Checking Instructor: Tevfik Bultn LTL Properties Büchi utomt [Vrdi nd Wolper LICS 86] Büchi utomt: Finite stte utomt tht ccept infinite strings

More information

Quadratic reciprocity

Quadratic reciprocity Qudrtic recirocity Frncisc Bozgn Los Angeles Mth Circle Octoer 8, 01 1 Qudrtic Recirocity nd Legendre Symol In the eginning of this lecture, we recll some sic knowledge out modulr rithmetic: Definition

More information

CS 275 Automata and Formal Language Theory

CS 275 Automata and Formal Language Theory CS 275 Automt nd Forml Lnguge Theory Course Notes Prt II: The Recognition Problem (II) Chpter II.5.: Properties of Context Free Grmmrs (14) Anton Setzer (Bsed on book drft by J. V. Tucker nd K. Stephenson)

More information

Lecture 08: Feb. 08, 2019

Lecture 08: Feb. 08, 2019 4CS4-6:Theory of Computtion(Closure on Reg. Lngs., regex to NDFA, DFA to regex) Prof. K.R. Chowdhry Lecture 08: Fe. 08, 2019 : Professor of CS Disclimer: These notes hve not een sujected to the usul scrutiny

More information

Lecture 1. Functional series. Pointwise and uniform convergence.

Lecture 1. Functional series. Pointwise and uniform convergence. 1 Introduction. Lecture 1. Functionl series. Pointwise nd uniform convergence. In this course we study mongst other things Fourier series. The Fourier series for periodic function f(x) with period 2π is

More information

Lecture 3: Dealing with Non-Compliance

Lecture 3: Dealing with Non-Compliance Comlince Roustness Power References Socil Lws for Multi-Agent Systems: Logic nd Gmes Lecture 3: Deling with Non-Comlince Thoms Ågotnes 1 1 Dertment of Informtion Science nd Medi Studies University of Bergen,

More information

Finite Automata. Informatics 2A: Lecture 3. Mary Cryan. 21 September School of Informatics University of Edinburgh

Finite Automata. Informatics 2A: Lecture 3. Mary Cryan. 21 September School of Informatics University of Edinburgh Finite Automt Informtics 2A: Lecture 3 Mry Cryn School of Informtics University of Edinburgh mcryn@inf.ed.c.uk 21 September 2018 1 / 30 Lnguges nd Automt Wht is lnguge? Finite utomt: recp Some forml definitions

More information

Recitation 3: More Applications of the Derivative

Recitation 3: More Applications of the Derivative Mth 1c TA: Pdric Brtlett Recittion 3: More Applictions of the Derivtive Week 3 Cltech 2012 1 Rndom Question Question 1 A grph consists of the following: A set V of vertices. A set E of edges where ech

More information

Harvard University Computer Science 121 Midterm October 23, 2012

Harvard University Computer Science 121 Midterm October 23, 2012 Hrvrd University Computer Science 121 Midterm Octoer 23, 2012 This is closed-ook exmintion. You my use ny result from lecture, Sipser, prolem sets, or section, s long s you quote it clerly. The lphet is

More information

k and v = v 1 j + u 3 i + v 2

k and v = v 1 j + u 3 i + v 2 ORTHOGONAL FUNCTIONS AND FOURIER SERIES Orthogonl functions A function cn e considered to e generliztion of vector. Thus the vector concets like the inner roduct nd orthogonlity of vectors cn e extended

More information

Learning Moore Machines from Input-Output Traces

Learning Moore Machines from Input-Output Traces Lerning Moore Mchines from Input-Output Trces Georgios Gintmidis 1 nd Stvros Tripkis 1,2 1 Alto University, Finlnd 2 UC Berkeley, USA Motivtion: lerning models from blck boxes Inputs? Lerner Forml Model

More information

CMPSCI 250: Introduction to Computation. Lecture #31: What DFA s Can and Can t Do David Mix Barrington 9 April 2014

CMPSCI 250: Introduction to Computation. Lecture #31: What DFA s Can and Can t Do David Mix Barrington 9 April 2014 CMPSCI 250: Introduction to Computtion Lecture #31: Wht DFA s Cn nd Cn t Do Dvid Mix Brrington 9 April 2014 Wht DFA s Cn nd Cn t Do Deterministic Finite Automt Forml Definition of DFA s Exmples of DFA

More information

Quadratic Forms. Quadratic Forms

Quadratic Forms. Quadratic Forms Qudrtic Forms Recll the Simon & Blume excerpt from n erlier lecture which sid tht the min tsk of clculus is to pproximte nonliner functions with liner functions. It s ctully more ccurte to sy tht we pproximte

More information

THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS.

THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS. THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS RADON ROSBOROUGH https://intuitiveexplntionscom/picrd-lindelof-theorem/ This document is proof of the existence-uniqueness theorem

More information

The Regulated and Riemann Integrals

The Regulated and Riemann Integrals Chpter 1 The Regulted nd Riemnn Integrls 1.1 Introduction We will consider severl different pproches to defining the definite integrl f(x) dx of function f(x). These definitions will ll ssign the sme vlue

More information

1.3 Regular Expressions

1.3 Regular Expressions 56 1.3 Regulr xpressions These hve n importnt role in describing ptterns in serching for strings in mny pplictions (e.g. wk, grep, Perl,...) All regulr expressions of lphbet re 1.Ønd re regulr expressions,

More information

Guaranteed characterization of exact non-asymptotic confidence regions in nonlinear parameter estimation

Guaranteed characterization of exact non-asymptotic confidence regions in nonlinear parameter estimation 9th IFAC Symosium on Nonliner Control Systems Toulouse, Frnce, Setember 4-6, 23 WeA2.3 Gurnteed chrcteriztion of exct non-symtotic confidence regions in nonliner rmeter estimtion Michel Kieffer,,, Eric

More information

Kleene Theorems for Free Choice Nets Labelled with Distributed Alphabets

Kleene Theorems for Free Choice Nets Labelled with Distributed Alphabets Kleene Theorems for Free Choice Nets Lbelled with Distributed Alphbets Rmchndr Phwde Indin Institute of Technology Dhrwd, Dhrwd 580011, Indi Emil: prb@iitdh.c.in Abstrct. We provided [15] expressions for

More information

CS:4330 Theory of Computation Spring Regular Languages. Equivalences between Finite automata and REs. Haniel Barbosa

CS:4330 Theory of Computation Spring Regular Languages. Equivalences between Finite automata and REs. Haniel Barbosa CS:4330 Theory of Computtion Spring 208 Regulr Lnguges Equivlences between Finite utomt nd REs Hniel Brbos Redings for this lecture Chpter of [Sipser 996], 3rd edition. Section.3. Finite utomt nd regulr

More information

Quadratic Residues. Chapter Quadratic residues

Quadratic Residues. Chapter Quadratic residues Chter 8 Qudrtic Residues 8. Qudrtic residues Let n>be given ositive integer, nd gcd, n. We sy tht Z n is qudrtic residue mod n if the congruence x mod n is solvble. Otherwise, is clled qudrtic nonresidue

More information

On Hermite-Hadamard type integral inequalities for functions whose second derivative are nonconvex

On Hermite-Hadamard type integral inequalities for functions whose second derivative are nonconvex Mly J Mt 34 93 3 On Hermite-Hdmrd tye integrl ineulities for functions whose second derivtive re nonconvex Mehmet Zeki SARIKAYA, Hkn Bozkurt nd Mehmet Eyü KİRİŞ b Dertment of Mthemtics, Fculty of Science

More information

Is the system correct? Introduction to Formal Verification. Measuring SW Complexity. Design Complexity. Aniello Murano. Source Lines of Code (SLOC)

Is the system correct? Introduction to Formal Verification. Measuring SW Complexity. Design Complexity. Aniello Murano. Source Lines of Code (SLOC) Introduction to Forml Verifiction Is the system correct? Aniello Murno Università degli studi di Noli Federico II Dirtimento di Scienze Fisiche Sezione di Informtic 22 Mggio, 2006 1 2 Design Comlexity

More information

Properties of Integrals, Indefinite Integrals. Goals: Definition of the Definite Integral Integral Calculations using Antiderivatives

Properties of Integrals, Indefinite Integrals. Goals: Definition of the Definite Integral Integral Calculations using Antiderivatives Block #6: Properties of Integrls, Indefinite Integrls Gols: Definition of the Definite Integrl Integrl Clcultions using Antiderivtives Properties of Integrls The Indefinite Integrl 1 Riemnn Sums - 1 Riemnn

More information

19 Optimal behavior: Game theory

19 Optimal behavior: Game theory Intro. to Artificil Intelligence: Dle Schuurmns, Relu Ptrscu 1 19 Optiml behvior: Gme theory Adversril stte dynmics hve to ccount for worst cse Compute policy π : S A tht mximizes minimum rewrd Let S (,

More information

QUADRATIC RESIDUES MATH 372. FALL INSTRUCTOR: PROFESSOR AITKEN

QUADRATIC RESIDUES MATH 372. FALL INSTRUCTOR: PROFESSOR AITKEN QUADRATIC RESIDUES MATH 37 FALL 005 INSTRUCTOR: PROFESSOR AITKEN When is n integer sure modulo? When does udrtic eution hve roots modulo? These re the uestions tht will concern us in this hndout 1 The

More information

Assignment 1 Automata, Languages, and Computability. 1 Finite State Automata and Regular Languages

Assignment 1 Automata, Languages, and Computability. 1 Finite State Automata and Regular Languages Deprtment of Computer Science, Austrlin Ntionl University COMP2600 Forml Methods for Softwre Engineering Semester 2, 206 Assignment Automt, Lnguges, nd Computility Smple Solutions Finite Stte Automt nd

More information

Verification of Prognosability for Labeled Petri Nets

Verification of Prognosability for Labeled Petri Nets This rticle hs been cceted for ubliction in future issue of this journl, but hs not been fully edited. Content my chnge rior to finl ubliction. Cittion informtion: DOI.9/TAC.7.75696, IEEE Trnsctions on

More information

5. (±±) Λ = fw j w is string of even lengthg [ 00 = f11,00g 7. (11 [ 00)± Λ = fw j w egins with either 11 or 00g 8. (0 [ ffl)1 Λ = 01 Λ [ 1 Λ 9.

5. (±±) Λ = fw j w is string of even lengthg [ 00 = f11,00g 7. (11 [ 00)± Λ = fw j w egins with either 11 or 00g 8. (0 [ ffl)1 Λ = 01 Λ [ 1 Λ 9. Regulr Expressions, Pumping Lemm, Right Liner Grmmrs Ling 106 Mrch 25, 2002 1 Regulr Expressions A regulr expression descries or genertes lnguge: it is kind of shorthnd for listing the memers of lnguge.

More information

Anatomy of a Deterministic Finite Automaton. Deterministic Finite Automata. A machine so simple that you can understand it in less than one minute

Anatomy of a Deterministic Finite Automaton. Deterministic Finite Automata. A machine so simple that you can understand it in less than one minute Victor Admchik Dnny Sletor Gret Theoreticl Ides In Computer Science CS 5-25 Spring 2 Lecture 2 Mr 3, 2 Crnegie Mellon University Deterministic Finite Automt Finite Automt A mchine so simple tht you cn

More information

3 Regular expressions

3 Regular expressions 3 Regulr expressions Given n lphet Σ lnguge is set of words L Σ. So fr we were le to descrie lnguges either y using set theory (i.e. enumertion or comprehension) or y n utomton. In this section we shll

More information

Reinforcement Learning

Reinforcement Learning Reinforcement Lerning Tom Mitchell, Mchine Lerning, chpter 13 Outline Introduction Comprison with inductive lerning Mrkov Decision Processes: the model Optiml policy: The tsk Q Lerning: Q function Algorithm

More information

CS103B Handout 18 Winter 2007 February 28, 2007 Finite Automata

CS103B Handout 18 Winter 2007 February 28, 2007 Finite Automata CS103B ndout 18 Winter 2007 Ferury 28, 2007 Finite Automt Initil text y Mggie Johnson. Introduction Severl childrens gmes fit the following description: Pieces re set up on plying ord; dice re thrown or

More information

Student Activity 3: Single Factor ANOVA

Student Activity 3: Single Factor ANOVA MATH 40 Student Activity 3: Single Fctor ANOVA Some Bsic Concepts In designed experiment, two or more tretments, or combintions of tretments, is pplied to experimentl units The number of tretments, whether

More information

Chapter 6 Notes, Larson/Hostetler 3e

Chapter 6 Notes, Larson/Hostetler 3e Contents 6. Antiderivtives nd the Rules of Integrtion.......................... 6. Are nd the Definite Integrl.................................. 6.. Are............................................ 6. Reimnn

More information

A recursive construction of efficiently decodable list-disjunct matrices

A recursive construction of efficiently decodable list-disjunct matrices CSE 709: Compressed Sensing nd Group Testing. Prt I Lecturers: Hung Q. Ngo nd Atri Rudr SUNY t Bufflo, Fll 2011 Lst updte: October 13, 2011 A recursive construction of efficiently decodble list-disjunct

More information

(9) P (x)u + Q(x)u + R(x)u =0

(9) P (x)u + Q(x)u + R(x)u =0 STURM-LIOUVILLE THEORY 7 2. Second order liner ordinry differentil equtions 2.1. Recll some sic results. A second order liner ordinry differentil eqution (ODE) hs the form (9) P (x)u + Q(x)u + R(x)u =0

More information

Continuous Random Variables

Continuous Random Variables STAT/MATH 395 A - PROBABILITY II UW Winter Qurter 217 Néhémy Lim Continuous Rndom Vribles Nottion. The indictor function of set S is rel-vlued function defined by : { 1 if x S 1 S (x) if x S Suppose tht

More information

On some inequalities for s-convex functions and applications

On some inequalities for s-convex functions and applications Özdemir et l Journl of Ineulities nd Alictions 3, 3:333 htt://wwwjournlofineulitiesndlictionscom/content/3//333 R E S E A R C H Oen Access On some ineulities for s-convex functions nd lictions Muhmet Emin

More information

Non-Deterministic Finite Automata. Fall 2018 Costas Busch - RPI 1

Non-Deterministic Finite Automata. Fall 2018 Costas Busch - RPI 1 Non-Deterministic Finite Automt Fll 2018 Costs Busch - RPI 1 Nondeterministic Finite Automton (NFA) Alphbet ={} q q2 1 q 0 q 3 Fll 2018 Costs Busch - RPI 2 Nondeterministic Finite Automton (NFA) Alphbet

More information

The size of subsequence automaton

The size of subsequence automaton Theoreticl Computer Science 4 (005) 79 84 www.elsevier.com/locte/tcs Note The size of susequence utomton Zdeněk Troníček,, Ayumi Shinohr,c Deprtment of Computer Science nd Engineering, FEE CTU in Prgue,

More information

Name of the Student:

Name of the Student: SUBJECT NAME : Discrete Mthemtics SUBJECT CODE : MA 2265 MATERIAL NAME : Formul Mteril MATERIAL CODE : JM08ADM009 Nme of the Student: Brnch: Unit I (Logic nd Proofs) 1) Truth Tble: Conjunction Disjunction

More information

CMSC 330: Organization of Programming Languages. DFAs, and NFAs, and Regexps (Oh my!)

CMSC 330: Organization of Programming Languages. DFAs, and NFAs, and Regexps (Oh my!) CMSC 330: Orgniztion of Progrmming Lnguges DFAs, nd NFAs, nd Regexps (Oh my!) CMSC330 Spring 2018 Types of Finite Automt Deterministic Finite Automt (DFA) Exctly one sequence of steps for ech string All

More information

11.1 Finite Automata. CS125 Lecture 11 Fall Motivation: TMs without a tape: maybe we can at least fully understand such a simple model?

11.1 Finite Automata. CS125 Lecture 11 Fall Motivation: TMs without a tape: maybe we can at least fully understand such a simple model? CS125 Lecture 11 Fll 2016 11.1 Finite Automt Motivtion: TMs without tpe: mybe we cn t lest fully understnd such simple model? Algorithms (e.g. string mtching) Computing with very limited memory Forml verifiction

More information

Duality # Second iteration for HW problem. Recall our LP example problem we have been working on, in equality form, is given below.

Duality # Second iteration for HW problem. Recall our LP example problem we have been working on, in equality form, is given below. Dulity #. Second itertion for HW problem Recll our LP emple problem we hve been working on, in equlity form, is given below.,,,, 8 m F which, when written in slightly different form, is 8 F Recll tht we

More information