Port Protocols for Deadlock-Freedom of Component Systems
|
|
- Molly Lindsey
- 5 years ago
- Views:
Transcription
1 Port Protocols for Dedlock-Freedom of Comonent Systems Christin Lmbertz Mil Mjster-Cederbum University of Mnnheim, Germny In comonent-bsed develoment, roches for roerty verifiction exist tht void building the globl system behvior of the comonent model. Tyiclly, these roches rely on the nlysis of the locl behvior of fixed sized subsystems of comonents. In our roch, we wnt to void not only the nlysis of the globl behvior but lso of the locl behviors of the comonents. Insted, we consider very smll rts of the locl behviors clled ort rotocols tht suffice to verify roerties. 1 Introduction Comonent-bsed develoment (CBD) hels to mster the design comlexity of softwre systems nd enhnces reusbility. In forml CBD models, ech comonent tyiclly offers set of orts for cooertion with other comonents. Thereby, restrictions on the rchitecture of the system nd the behvior of comonents llow to verify roerties such s dedlock-freedom without exhustively serching the globl stte sce. Here, we consider the CBD model of interction systems by Sifkis et. l. [7] in which dt nd I/O oertions re comletely bstrcted wy nd every single oertion is clled n ction. Ech comonent s behvior is modeled s lbeled trnsition system (LTS), where the set of lbels equls the set of ctions nd ech ction is understood s ort of the ssocited comonent. The ctions re then groued into sets clled interctions to model cooertion. Thereby, ny ction cn only be executed if ll other ctions contined in n rorite interction re lso executble. The globl behvior is then derived by executing the interctions nondeterministiclly ccording to their executbility. A drwbck of the originl model is tht ort is considered s single ction nd thus no dditionl behvior cn be secified for it. Here, we extend the model of interction systems to lso cture ort behvior. We grou severl ctions of one comonent nd cll this grou ort lhbet. Additionlly, every ort lhbet is equied with LTS which we cll ort rotocol. The ide behind this roch is tht in verifiction stes we use the ort rotocols of involved comonents insted of their LTSs. This is more efficient since the behvior of the comonent is tyiclly much lrger (if we comre the number of sttes nd trnsitions) thn its ort rotocols. The verifiction of roerties for the whole comonent then follows from the verifiction ste tht used only the ort rotocols. Furthermore, this suorts gry box view of the comonents tht is desired in CBD similr to the rincile of informtion hiding [4]. In Hennicker et. l. [9] nd Mot et. l. [11], we find similr ides. In [9], ech ort rovides rotocol which is correct w.r.t. its comonent, i.e., the behvior of the comonent restricted to the ctions in the ort lhbet (i.e., ny other ction becomes unobservble) is wek bisimilr to the ort rotocol. Then, notion clled neutrlity llows to ly reduction strtegy such tht roerties need only to be verified on the reduced rt of the system. Thereby, neutrlity of ort q for ort mens tht the comosition of the rotocols of nd q restricted to the lhbet of is wek bisimilr to the rotocol of, i.e., it is sufficient to consider only. In [11], similr ide is clled comtibility of two orts nd requires tht ll sequences of ctions of one ort re lso ossible in the other one. After introducing our definitions in Sec. 2, we consider in Sec. 3 n exmle where two orts re neither neutrl nor comtible, but our roch resented in Sec. 4 llows to verify its dedlock-freedom. Bliudze, Bruni, Grohmnn, Silv (Eds.): Third Interction nd Concurrency Exerience (ICE 2010) EPTCS 38, 2010,. 7 11, doi: /eptcs.38.3
2 8 Port Protocols for Dedlock-Freedom of Comonent-Bsed Systems Note tht severl roches for roving dedlock-freedom in interction systems exist, e.g., Mjster- Cederbum nd Mrtens [10] or Benslem et. l. [2] in the context of BIP [1] (for which interction systems re theoreticl model). Art from the lck of gry box view of the comonents, which is desired in CBD [4], these roches lso exloit the comositionl structure of the system. In Sec. 3, we demonstrte how the roch of [10] cn further benefit from the introduction of ort rotocols by mens of n exmle system. The roch of [2] is bsed on finding invrints for the comonents, which must be rovided for ech roerty, nd for the interctions, which re comuted utomticlly. Unfortuntely, ccording to Benslem et. l. [3], for this comuttion there is risk of exlosion, if exhustiveness of solutions is necessry in the nlysis rocess. Thus, this roch is not gurnteed to be olynomil in the number nd size of the comonents resectively the ort rotocols which is n imortnt roerty of our roch. However, the introduction of ort rotocols in BIP could be romising extension w.r.t. gry box view, if comonent invrints cn be estblished from the informtion only vilble from the ort rotocols. 2 Formliztion of Protocol Interction Systems A rotocol interction system is defined by tule Sys := (Com,{P i } i Com,{A i } i Com P i,int,beh). Here, Com is finite set of comonents, which re referred to s i Com. The vilble orts of comonent i re given by the finite set P i, nd the ming orts(i) := {i: P i } llows to refer to ort of i s i: orts(i). The ctions of ech ort i: re given by the set A i, lso denoted by ort lhbet A i:, nd re ssumed to be disjoint, i.e., i, j Com, P i,q P j : i j q = A i A q j = /0. All vilble ctions of comonent i re contined in the ction set A i := P i A i, nd the union of ll ction sets is clled the globl ction set Act := i Com A i. A nonemty finite set α Act of ctions is clled n interction, if it contins t most one ction of every comonent, i.e., α A i 1 for ll i Com. For ny interction α nd comonent i we ut i(α) := A i α. Similrly, for α nd ort i: of i we ut i:(α) := A i: α. The interction set Int contins ll vilble interctions nd covers ll ctions, i.e., we require tht α Int α = Act holds. The behvior model Beh of Sys contins for every comonent i LTS [[i]] := (S i,a i,{ i } Ai,I i ) describing the locl behvior of i where S i is the locl stte sce, ction set A i contins the lbels, { i } Ai is fmily of trnsition reltions with i S i S i, nd I i S i is the set of locl initil sttes. Whenever (s,s ) we write s s insted. For every ort i: of i, Beh contins LTS [[i:]] := (S i:,a i: {τ},{ i: } Ai: {τ},i i: ) describing the ort rotocol of i:. The secil symbol τ is used to model unobservble behvior, nd we require τ / Act, i.e., no comonent uses τ s n ction. However, the ort rotocols re llowed to contin τ-trnsitions. A ort i: of comonent i is sid to be conform to the comonent if [[i:]] b f i: ([[i]]) where b denotes brnching bisimilrity [6] nd f i: ( ) is relbeling function tht relces ll lbels resectively trnsitions not contined in the ort lhbet A i: with the lbel τ resectively with τ-trnsition. Thereby, we ssume tht the ort rotocols re minimized w.r.t. brnching bisimilrity. Note tht we use brnching bisimilrity insted of wek bisimilrity, which is used in the roch of Hennicker et l. [9], becuse brnching bisimilrity reserves more roerties of systems ( logicl chrcteriztion of b in CTL* X exists [5]), it is more efficient to clculte [8], nd, s remrked by vn Glbbeek nd Weijlnd [6], mny systems tht re wek bisimilr re lso brnching bisimilr. In the following, we fix rotocol interction system Sys. The globl behvior of Sys is LTS [[Sys]] := (S,Int,{ } α α Int,I) where the set of globl sttes S := i Com S i is given by the Crtesin
3 C. Lmbertz & M. Mjster-Cederbum 9 roduct of the locl stte sces, which we consider to be order indeendent. Globl sttes re denoted by tules s := (s 1,,s n ) with n = Com, nd the set of globl initil sttes is I := i Com I i. The fmily of globl trnsition reltions { } α α Int is defined cnoniclly where for ny α Int nd ny s,s S we hve s α s if i Com: if i(α) = { i } then s i i i s i nd if i(α) = /0 then s i = s i. Let C Com be set of comonents. The rtil behvior of Sys with resect to C is LTS [[C]] := (S C,Int C,{ α C } α IntC,I C ) where S C := i C S i, I C := i C I i, Int C := {α ( i C A i ) α Int} \ {/0}, nd { α C } α IntC is defined nlogously to the fmily of globl trnsition reltions. Let P i Com orts(i) be set of orts. The ort behvior of Sys with resect to P is LTS [[P]] := (S P,Int P {τ},{ α P } α IntP {τ},i P ) where S P := i: P S i:, I P := i: P I i:, nd Int P := {α ( i: P A i: ) α Int}\{/0}. For ny α Int P nd ny s,s S P we hve s α P s if i: P: if i:(α) = { i: } then s i: i: i: s i: nd if i:(α) = /0 then s i: = s i:. Additionlly, for s,s τ S P we hve s P s τ if i: P: s i: i: s i: nd j:q P \ {i:}: s j:q = s j:q. Finlly, define the rotocol communiction grh G := (V,E) of Sys where the vertices re given by V := Com ( i Com orts(i)) nd the edges by E := {{i,i:} i Com i: orts(i)} {{i:, j:q} i, j Com i: orts(i) j:q orts( j) α Int : i:(α) /0 j:q(α) /0}. Two orts re connected if they re relted by n edge in G. The ort connectivity of ort i: is defined s the number of orts to which i: is connected. If the ort connectivity of ort is less thn two, we sy tht the ort is uniquely connected. If G forms tree in the grh-theoreticl sense, we sy tht G is tree-like. We cll LTS dedlock-free if ll its sttes, which re rechble from n initil stte, hve t lest one outgoing trnsition. 3 Two Exmle Systems We resent two exmles: The first one shows tht the roches of Hennicker et. l. [9] nd Mot et. l. [11] re not lwys licble nd the second how dedlock nlysis in interction systems cn benefit from ort rotocols. The first exmle is the rotocol interction system Sys ex1 shown in Fig. 1 with Com = {i, j}, orts(i) = {i:}, nd orts( j) = { j:q}. The interction set is given by Int = { { i, j },{b i,b j },{c i,c j }, {d i,d j } }. Obviously, ll orts re conform to their corresonding comonent. The exmle shows tht the two connected orts re neither neutrl nor comtible, since they restrict ech other, i.e., in [[{i:, j:q}]] only the execution th { i, j } {c i,c j } is ossible which restricts either ort. i [[i]] = [[i:]]: [[ j]] = [[ j:q]]: d j b i i j b j q j c i d i c j () Prot. comm. grh (b) Behvior nd ort rotocol of i res. i: (c) Behvior nd ort rotocol of j res. j:q Figure 1: Protocol interction system Sys ex1 with Int = { { i, j },{b i,b j },{c i,c j },{d i,d j } } The second exmle is the rotocol interction system Sys ex2 shown in Fig. 2 with Com = {m,1,2,,n}, orts(m) = {m:i i Com \ {m}}, nd orts(i) = {i:} for i Com \ {m}. The interction set is given by Int = { { i m, i } i Com \ {m} }. Obviously, ll orts re conform to their corresonding comonent.
4 10 Port Protocols for Dedlock-Freedom of Comonent-Bsed Systems n 1 n n m [[m]]: 1 m 2 m n m n 1 m [[m:i]]: i m (c) Port rot. of ort m:i with 1 i n [[i]] = [[i:]]: i () Protocol communiction grh 3 m (b) Behvior of com. m (d) Behvior nd ort rot. of border com. i res. ort i: with 1 i n Figure 2: Protocol interction system Sys ex2 with Int = { { i m, i } 1 i n } As n exmle for dedlock nlysis, we consider the nlysis of Mjster-Cederbum nd Mrtens [10] for tree-like interction systems. The check for dedlock-freedom of Sys ex2 requires mong other things tht we nlyze the rtil behvior of ll irs of connected comonents, i.e., we hve to crry out this nlysis n times. Since the size of ny such rtil behvior is O(n) becuse in ech check the middle comonent is used the whole dedlock nlysis needs O(n 2 ). If we use the ort rotocols insted of the whole behvior in ech ste, ech rotocol behvior cn be trversed in constnt time. Thus, the totl mount of work is O(n). Note tht the exmle only motivtes the use of ort rotocols in tree-like systems nd tht the globl stte sce of the exmle cn be trversed in O(n). But, with more comlex behvior of the non-middle comonents the cost of this trversl increses such tht globl stte sce nlysis becomes unfesible. 4 Proving Dedlock-Freedom In order to exloit the comositionl informtion nd the informtion obtined by combining the ort rotocols, we need to ut restrictions on the rchitecture, e.g., on the form of the rotocol communiction grh, nd on the locl behviors, e.g., on the existence of unobservble behvior in the ort rotocols. The following theorem exloits such restrictions nd llows for efficient verifiction of dedlockfreedom in interction systems, which cn be erformed in time olynomil in the number nd size of the ort rotocols. Note tht the exmles of Sec. 3 cn be verified in this wy. Theorem: Let Sys be rotocol interction system nd G its rotocol communiction grh. Assume tht G is tree-like nd tht every ort is uniquely connected nd conform to its corresonding comonent nd its miniml ort rotocol w.r.t. brnching bisimilrity is τ-free. If for ll connected orts i: nd j:q of ll comonents i, j Com holds tht [[{i:, j:q}]] is dedlock-free then [[Sys]] is dedlock-free. The theorem exloits the ide tht n unobservble ste in ort rotocol is only resent if the comonent s future behvior cn be influenced by the cooertion with its environment. If no τ is resent, the comonent s behvior visible through the ort rotocol is inevitble. Becuse of the structure of the rotocol communiction grh, it is then sufficient to check irs of ort rotocols for dedlock-freedom, becuse due to their τ- nd dedlock-freedom, no cyclic witing reltion is ossible. Proof (Sketch): We successively consider rtil behviors of connected comonents of incresing size in n induction like mnner. Assume tht there is set C Com of comonents such tht [[C]] is dedlockfree. Now ick comonent j / C nd consider C := C { j}. Assume [[C ]] is not dedlock-free, lthough comonent i C nd ort i: orts(i) exist such tht i: is connected to ort j:q orts( j)
5 C. Lmbertz & M. Mjster-Cederbum 11 nd [[{i:, j:q}]] is τ- nd dedlock-free which follows from the ssumtions. Due to the dedlock, there is rechble stte s C S C tht hs no outgoing trnsition. Since the corresonding stte s C S C in the system without j is dedlock-free, there must be n ction i A i nd sttes s i,s i S i with s i being i s locl rt in s C nd s i i i s i. But, the corresonding interction α with i(α) = i:(α) = { i} is not vilble in s C nymore due to the dedlock, i.e., there must be n j A j with j(α) = j:q(α) = { j } tht is not enbled in the locl rt s j of s C. Consider the rtil behvior [[{i, j}]] nd the stte (s i,s j ) S {i, j}, which is rechble from n initil stte in [[{i, j}]] since the dedlocked stte s C is rechble in [[C ]]. Now, n equivlent stte (s i:,s j:q ) S {i:, j:q} with s i b s i: nd s j b s j:q is lso rechble in the rotocol behvior [[{i:, j:q}]] becuse of the rotocol conformnce. But then, [[C ]] cnnot be dedlocked since t lest one α Int {i:, j:q} nd thus α Int is enbled in (s i:,s j:q ) becuse of the rotocol behvior s dedlock-freedom, nd this α cn neither be blocked by i becuse i s cooertion with the other comonents in C is dedlock-free nor by j becuse the only cooertion rtner of j is i in [[C ]] becuse otherwise the rotocol behvior [[{i:, j:q}]] would contin τ-trnsition. Currently, we re investigting weker versions of the theorem, e.g., we conjecture tht it is sufficient tht the rotocol behvior of combined ort rotocols is τ-free insted of requiring the τ-freedom of ll ort rotocols, nd we try to ly the ort rotocol roch to the verifiction of other generic roerties such s rogress nd secific roerties of given system secified in CTL* X. Additionlly, the roof of the theorem shows n liction for correctness-by-construction roch. References [1] Annd Bsu, Mrius Bozg & Joseh Sifkis (2006): Modeling Heterogeneous Rel-time Comonents in BIP. Softwre Engineering nd Forml Methods, Interntionl Conference on, [2] Sddek Benslem, Mrius Bozg, Thnh-Hung Nguyen & Joseh Sifkis (2009): D-Finder: A Tool for Comositionl Dedlock Detection nd Verifiction. Comuter Aided Verifiction, [3] Sddek Benslem, Mrius Bozg, Joseh Sifkis & Thnh-Hung Nguyen (2008): Comositionl Verifiction for Comonent-Bsed Systems nd Aliction. In: ATVA 08: Proceedings of the 6th Interntionl Symosium on Automted Technology for Verifiction nd Anlysis, Sringer-Verlg, [4] Hns de Bruin (2000): A Grey-Box Aroch to Comonent Comosition. Genertive nd Comonent-Bsed Softwre Engineering, [5] Rocco De Nicol & Frits Vndrger (1995): Three logics for brnching bisimultion. J. ACM 42(2), [6] Rob J. vn Glbbeek & W. Peter Weijlnd (1996): Brnching time nd bstrction in bisimultion semntics. J. ACM 43(3), [7] Gregor Gössler & Joseh Sifkis (2003): Comosition for Comonent-Bsed Modeling. In: FMCO 02: First Interntionl Symosium on Forml Methods for Comonents nd Objects, [8] Jn Groote & Frits Vndrger (1990): An efficient lgorithm for brnching bisimultion nd stuttering equivlence. Automt, Lnguges nd Progrmming, [9] Rolf Hennicker, Stehn Jnisch & Alexnder Kn (2008): On the Observble Behviour of Comosite Comonents. In: Interntionl Worksho on Forml Asects of Comonent Softwre (FACS 08), Electronic Notes in Theoreticl Comuter Science (ENTCS), [10] Mil Mjster-Cederbum & Moritz Mrtens (2008): Comositionl nlysis of dedlock-freedom for treelike comonent rchitectures. In: EMSOFT 08: Proceedings of the 7th ACM interntionl conference on Embedded softwre, ACM, New York, NY, USA, [11] Rodrigo Rmos, Augusto Smio & Alexndre Mot (2009): Systemtic Develoment of Trustworthy Comonent Systems. In: FM 2009: Forml Methods, Sringer-Verlg,
Strong Bisimulation. Overview. References. Actions Labeled transition system Transition semantics Simulation Bisimulation
Strong Bisimultion Overview Actions Lbeled trnsition system Trnsition semntics Simultion Bisimultion References Robin Milner, Communiction nd Concurrency Robin Milner, Communicting nd Mobil Systems 32
More informationFinite state automata
Finite stte utomt Lecture 2 Model-Checking Finite-Stte Systems (untimed systems) Finite grhs with lels on edges/nodes set of nodes (sttes) set of edges (trnsitions) set of lels (lhet) Finite Automt, CTL,
More informationWatson-Crick local languages and Watson-Crick two dimensional local languages
Interntionl Journl of Mthemtics nd Soft Comuting Vol.5 No.. (5) 65-7. ISSN Print : 49 338 ISSN Online: 39 55 Wtson-Crick locl lnguges nd Wtson-Crick two dimensionl locl lnguges Mry Jemim Smuel nd V.R.
More informationSummer School Verification Technology, Systems & Applications
VTSA 2011 Summer School Verifiction Technology, Systems & Applictions 4th edition since 2008: Liège (Belgium), Sep. 19 23, 2011 free prticiption, limited number of prticipnts ppliction dedline: July 22,
More informationBisimulation. R.J. van Glabbeek
Bisimultion R.J. vn Glbbeek NICTA, Sydney, Austrli. School of Computer Science nd Engineering, The University of New South Wles, Sydney, Austrli. Computer Science Deprtment, Stnford University, CA 94305-9045,
More informationRefined interfaces for compositional verification
Refined interfces for compositionl verifiction Frédéric Lng INRI Rhône-lpes http://www.inrilpes.fr/vsy Motivtion Enumertive verifiction of concurrent systems Prllel composition of synchronous processes
More informationSupplement 4 Permutations, Legendre symbol and quadratic reciprocity
Sulement 4 Permuttions, Legendre symbol nd qudrtic recirocity 1. Permuttions. If S is nite set contining n elements then ermuttion of S is one to one ming of S onto S. Usully S is the set f1; ; :::; ng
More informationNotes on specifying systems in EST
Robert Meolic, Ttjn Kpus: Notes on specifying systems in EST 1 Notes on specifying systems in EST Robert Meolic, Ttjn Kpus Fculty of EE & CS University of Mribor Robert Meolic, Ttjn Kpus: Notes on specifying
More informationUSA Mathematical Talent Search Round 1 Solutions Year 25 Academic Year
1/1/5. Alex is trying to oen lock whose code is sequence tht is three letters long, with ech of the letters being one of A, B or C, ossibly reeted. The lock hs three buttons, lbeled A, B nd C. When the
More informationGlobal Session Types for Dynamic Checking of Protocol Conformance of Multi-Agent Systems
Globl Session Types for Dynmic Checking of Protocol Conformnce of Multi-Agent Systems (Extended Abstrct) Dvide Ancon, Mtteo Brbieri, nd Vivin Mscrdi DIBRIS, University of Genov, Itly emil: dvide@disi.unige.it,
More informationTries and suffixes trees
Trie: A dt-structure for set of words Tries nd suffixes trees Alon Efrt Comuter Science Dertment University of Arizon All words over the lhet Σ={,,..z}. In the slides, let sy tht the lhet is only {,,c,d}
More informationGlobal Types for Dynamic Checking of Protocol Conformance of Multi-Agent Systems
Globl Types for Dynmic Checking of Protocol Conformnce of Multi-Agent Systems (Extended Abstrct) Dvide Ancon, Mtteo Brbieri, nd Vivin Mscrdi DIBRIS, University of Genov, Itly emil: dvide@disi.unige.it,
More informationMath Lecture 23
Mth 8 - Lecture 3 Dyln Zwick Fll 3 In our lst lecture we delt with solutions to the system: x = Ax where A is n n n mtrix with n distinct eigenvlues. As promised, tody we will del with the question of
More informationHadamard-Type Inequalities for s Convex Functions I
Punjb University Journl of Mthemtics ISSN 6-56) Vol. ). 5-6 Hdmrd-Tye Ineulities for s Convex Functions I S. Hussin Dertment of Mthemtics Institute Of Sce Technology, Ner Rwt Toll Plz Islmbd Highwy, Islmbd
More informationComputation Tree Logic with Deadlock Detection
Comuttion Tree Logic with Dedlock Detection Rob vn Glbbeek 1,2, Bs Luttik 3,4 & Nikol Trčk 3 1 Ntionl ICT Austrli, Sydney, Austrli 2 School of Comuter Science nd Engineering, Univ. of New South Wles, Sydney
More informationConcepts of Concurrent Computation Spring 2015 Lecture 9: Petri Nets
Concepts of Concurrent Computtion Spring 205 Lecture 9: Petri Nets Sebstin Nnz Chris Poskitt Chir of Softwre Engineering Petri nets Petri nets re mthemticl models for describing systems with concurrency
More informationLECTURE 10: JACOBI SYMBOL
LECTURE 0: JACOBI SYMBOL The Jcobi symbol We wish to generlise the Legendre symbol to ccomodte comosite moduli Definition Let be n odd ositive integer, nd suose tht s, where the i re rime numbers not necessrily
More informationFamilies of Solutions to Bernoulli ODEs
In the fmily of solutions to the differentil eqution y ry dx + = it is shown tht vrition of the initil condition y( 0 = cuses horizontl shift in the solution curve y = f ( x, rther thn the verticl shift
More informationFinite Automata Theory and Formal Languages TMV027/DIT321 LP4 2018
Finite Automt Theory nd Forml Lnguges TMV027/DIT321 LP4 2018 Lecture 10 An Bove April 23rd 2018 Recp: Regulr Lnguges We cn convert between FA nd RE; Hence both FA nd RE ccept/generte regulr lnguges; More
More informationSemantic reachability for simple process algebras. Richard Mayr. Abstract
Semntic rechbility for simple process lgebrs Richrd Myr Abstrct This pper is n pproch to combine the rechbility problem with semntic notions like bisimultion equivlence. It dels with questions of the following
More informationFinite Automata. Informatics 2A: Lecture 3. John Longley. 22 September School of Informatics University of Edinburgh
Lnguges nd Automt Finite Automt Informtics 2A: Lecture 3 John Longley School of Informtics University of Edinburgh jrl@inf.ed.c.uk 22 September 2017 1 / 30 Lnguges nd Automt 1 Lnguges nd Automt Wht is
More informationFormal Languages and Automata
Moile Computing nd Softwre Engineering p. 1/5 Forml Lnguges nd Automt Chpter 2 Finite Automt Chun-Ming Liu cmliu@csie.ntut.edu.tw Deprtment of Computer Science nd Informtion Engineering Ntionl Tipei University
More informationExercises with (Some) Solutions
Exercises with (Some) Solutions Techer: Luc Tesei Mster of Science in Computer Science - University of Cmerino Contents 1 Strong Bisimultion nd HML 2 2 Wek Bisimultion 31 3 Complete Lttices nd Fix Points
More informationChapter 2 Finite Automata
Chpter 2 Finite Automt 28 2.1 Introduction Finite utomt: first model of the notion of effective procedure. (They lso hve mny other pplictions). The concept of finite utomton cn e derived y exmining wht
More informationHandout: Natural deduction for first order logic
MATH 457 Introduction to Mthemticl Logic Spring 2016 Dr Json Rute Hndout: Nturl deduction for first order logic We will extend our nturl deduction rules for sententil logic to first order logic These notes
More informationReview of Calculus, cont d
Jim Lmbers MAT 460 Fll Semester 2009-10 Lecture 3 Notes These notes correspond to Section 1.1 in the text. Review of Clculus, cont d Riemnn Sums nd the Definite Integrl There re mny cses in which some
More informationMaximum Likelihood Estimation for Allele Frequencies. Biostatistics 666
Mximum Likelihood Estimtion for Allele Frequencies Biosttistics 666 Previous Series of Lectures: Introduction to Colescent Models Comuttionlly efficient frmework Alterntive to forwrd simultions Amenble
More informationLumpability and Absorbing Markov Chains
umbility nd Absorbing rov Chins By Ahmed A.El-Sheih Dertment of Alied Sttistics & Econometrics Institute of Sttisticl Studies & Reserch (I.S.S.R Ciro University Abstrct We consider n bsorbing rov Chin
More information1.4 Nonregular Languages
74 1.4 Nonregulr Lnguges The number of forml lnguges over ny lphbet (= decision/recognition problems) is uncountble On the other hnd, the number of regulr expressions (= strings) is countble Hence, ll
More informationMore on automata. Michael George. March 24 April 7, 2014
More on utomt Michel George Mrch 24 April 7, 2014 1 Automt constructions Now tht we hve forml model of mchine, it is useful to mke some generl constructions. 1.1 DFA Union / Product construction Suppose
More informationPRIMES AND QUADRATIC RECIPROCITY
PRIMES AND QUADRATIC RECIPROCITY ANGELICA WONG Abstrct We discuss number theory with the ultimte gol of understnding udrtic recirocity We begin by discussing Fermt s Little Theorem, the Chinese Reminder
More informationMinimal DFA. minimal DFA for L starting from any other
Miniml DFA Among the mny DFAs ccepting the sme regulr lnguge L, there is exctly one (up to renming of sttes) which hs the smllest possile numer of sttes. Moreover, it is possile to otin tht miniml DFA
More informationProperties of Lorenz Curves for Transformed Income Distributions
Theoreticl Economics etters 22 2 487-493 htt://ddoiorg/4236/tel22259 Published Online December 22 (htt://wwwscirporg/journl/tel) Proerties of orenz Curves for Trnsformed Income Distributions John Fellmn
More informationAdvanced Calculus: MATH 410 Notes on Integrals and Integrability Professor David Levermore 17 October 2004
Advnced Clculus: MATH 410 Notes on Integrls nd Integrbility Professor Dvid Levermore 17 October 2004 1. Definite Integrls In this section we revisit the definite integrl tht you were introduced to when
More informationSemantic Reachability. Richard Mayr. Institut fur Informatik. Technische Universitat Munchen. Arcisstr. 21, D Munchen, Germany E. N. T. C. S.
URL: http://www.elsevier.nl/locte/entcs/volume6.html?? pges Semntic Rechbility Richrd Myr Institut fur Informtik Technische Universitt Munchen Arcisstr. 21, D-80290 Munchen, Germny e-mil: myrri@informtik.tu-muenchen.de
More informationCS 275 Automata and Formal Language Theory
CS 275 utomt nd Forml Lnguge Theory Course Notes Prt II: The Recognition Prolem (II) Chpter II.5.: Properties of Context Free Grmmrs (14) nton Setzer (Bsed on ook drft y J. V. Tucker nd K. Stephenson)
More informationC. C^mpenu, K. Slom, S. Yu upper boun of mn. So our result is tight only for incomplete DF's. For restricte vlues of m n n we present exmples of DF's
Journl of utomt, Lnguges n Combintorics u (v) w, x{y c OttovonGuerickeUniversitt Mgeburg Tight lower boun for the stte complexity of shue of regulr lnguges Cezr C^mpenu, Ki Slom Computing n Informtion
More informationDesigning finite automata II
Designing finite utomt II Prolem: Design DFA A such tht L(A) consists of ll strings of nd which re of length 3n, for n = 0, 1, 2, (1) Determine wht to rememer out the input string Assign stte to ech of
More information1. For each of the following theorems, give a two or three sentence sketch of how the proof goes or why it is not true.
York University CSE 2 Unit 3. DFA Clsses Converting etween DFA, NFA, Regulr Expressions, nd Extended Regulr Expressions Instructor: Jeff Edmonds Don t chet y looking t these nswers premturely.. For ech
More informationHennessy-Milner Logic 1.
Hennessy-Milner Logic 1. Colloquium in honor of Robin Milner. Crlos Olrte. Pontifici Universidd Jverin 28 April 2010. 1 Bsed on the tlks: [1,2,3] Prof. Robin Milner (R.I.P). LIX, Ecole Polytechnique. Motivtion
More informationTheory of Computation Regular Languages. (NTU EE) Regular Languages Fall / 38
Theory of Computtion Regulr Lnguges (NTU EE) Regulr Lnguges Fll 2017 1 / 38 Schemtic of Finite Automt control 0 0 1 0 1 1 1 0 Figure: Schemtic of Finite Automt A finite utomton hs finite set of control
More information1 Online Learning and Regret Minimization
2.997 Decision-Mking in Lrge-Scle Systems My 10 MIT, Spring 2004 Hndout #29 Lecture Note 24 1 Online Lerning nd Regret Minimiztion In this lecture, we consider the problem of sequentil decision mking in
More informationThe Multiperiod Network Design Problem: Lagrangian-based Solution Approaches 2
Konrd-Zuse-Zentrum für Informtionstechnik Berlin Tkustrße 7 D-14195 Berlin-Dhlem Germny ANASTASIOS GIOVANIDIS 1 JONAD PULAJ 1 The ultieriod Network Design Problem: Lgrngin-bsed Solution Aroches 2 1 Zuse
More informationGlobal and Local Deadlock Freedom in BIP
1 Globl nd Locl Dedlock Freedom in BIP PAUL C ATTIE, Americn University of Beirut, Lebnon SADDEK BENSALEM, UJF-Grenoble 1 / CNRS VERIMAG, Frnce MARIUS BOZGA, UJF-Grenoble 1 / CNRS VERIMAG, Frnce MOHAMAD
More informationNew data structures to reduce data size and search time
New dt structures to reduce dt size nd serch time Tsuneo Kuwbr Deprtment of Informtion Sciences, Fculty of Science, Kngw University, Hirtsuk-shi, Jpn FIT2018 1D-1, No2, pp1-4 Copyright (c)2018 by The Institute
More informationNon Deterministic Automata. Linz: Nondeterministic Finite Accepters, page 51
Non Deterministic Automt Linz: Nondeterministic Finite Accepters, pge 51 1 Nondeterministic Finite Accepter (NFA) Alphbet ={} q 1 q2 q 0 q 3 2 Nondeterministic Finite Accepter (NFA) Alphbet ={} Two choices
More informationNew Expansion and Infinite Series
Interntionl Mthemticl Forum, Vol. 9, 204, no. 22, 06-073 HIKARI Ltd, www.m-hikri.com http://dx.doi.org/0.2988/imf.204.4502 New Expnsion nd Infinite Series Diyun Zhng College of Computer Nnjing University
More informationSupervisory Control (4CM30)
Supervisory Control (4CM30) Verifiction in mcrl2 Michel Reniers M.A.Reniers@tue.nl 2016-2017 Verifiction in mcrl2 M CIF = φ CIF iff M mcrl2 = φ mcrl2 1. Adpt CIF model 2. Formulte property in modl µ-clculus
More informationLecture 09: Myhill-Nerode Theorem
CS 373: Theory of Computtion Mdhusudn Prthsrthy Lecture 09: Myhill-Nerode Theorem 16 Ferury 2010 In this lecture, we will see tht every lnguge hs unique miniml DFA We will see this fct from two perspectives
More informationCoalgebra, Lecture 15: Equations for Deterministic Automata
Colger, Lecture 15: Equtions for Deterministic Automt Julin Slmnc (nd Jurrin Rot) Decemer 19, 2016 In this lecture, we will study the concept of equtions for deterministic utomt. The notes re self contined
More informationTheory of Computation Regular Languages
Theory of Computtion Regulr Lnguges Bow-Yw Wng Acdemi Sinic Spring 2012 Bow-Yw Wng (Acdemi Sinic) Regulr Lnguges Spring 2012 1 / 38 Schemtic of Finite Automt control 0 0 1 0 1 1 1 0 Figure: Schemtic of
More informationIntermediate Math Circles Wednesday, November 14, 2018 Finite Automata II. Nickolas Rollick a b b. a b 4
Intermedite Mth Circles Wednesdy, Novemer 14, 2018 Finite Automt II Nickols Rollick nrollick@uwterloo.c Regulr Lnguges Lst time, we were introduced to the ide of DFA (deterministic finite utomton), one
More informationI. Theory of Automata II. Theory of Formal Languages III. Theory of Turing Machines
CI 3104 /Winter 2011: Introduction to Forml Lnguges Chter 13: Grmmticl Formt Chter 13: Grmmticl Formt I. Theory of Automt II. Theory of Forml Lnguges III. Theory of Turing Mchines Dr. Neji Zgui CI3104-W11
More informationSTRUCTURE OF CONCURRENCY Ryszard Janicki. Department of Computing and Software McMaster University Hamilton, ON, L8S 4K1 Canada
STRUCTURE OF CONCURRENCY Ryszrd Jnicki Deprtment of Computing nd Softwre McMster University Hmilton, ON, L8S 4K1 Cnd jnicki@mcmster.c 1 Introduction Wht is concurrency? How it cn e modelled? Wht re the
More informationNFAs and Regular Expressions. NFA-ε, continued. Recall. Last class: Today: Fun:
CMPU 240 Lnguge Theory nd Computtion Spring 2019 NFAs nd Regulr Expressions Lst clss: Introduced nondeterministic finite utomt with -trnsitions Tody: Prove n NFA- is no more powerful thn n NFA Introduce
More informationProcess Algebra CSP A Technique to Model Concurrent Programs
Process Algebr CSP A Technique to Model Concurrent Progrms Jnury 15, 2002 Hui Shi 1 Contents CSP-Processes Opertionl Semntics Trnsition systems nd stte mchines Bisimultion Firing rules for CSP Model-Checker
More informationCS 267: Automated Verification. Lecture 8: Automata Theoretic Model Checking. Instructor: Tevfik Bultan
CS 267: Automted Verifiction Lecture 8: Automt Theoretic Model Checking Instructor: Tevfik Bultn LTL Properties Büchi utomt [Vrdi nd Wolper LICS 86] Büchi utomt: Finite stte utomt tht ccept infinite strings
More informationQuadratic reciprocity
Qudrtic recirocity Frncisc Bozgn Los Angeles Mth Circle Octoer 8, 01 1 Qudrtic Recirocity nd Legendre Symol In the eginning of this lecture, we recll some sic knowledge out modulr rithmetic: Definition
More informationCS 275 Automata and Formal Language Theory
CS 275 Automt nd Forml Lnguge Theory Course Notes Prt II: The Recognition Problem (II) Chpter II.5.: Properties of Context Free Grmmrs (14) Anton Setzer (Bsed on book drft by J. V. Tucker nd K. Stephenson)
More informationLecture 08: Feb. 08, 2019
4CS4-6:Theory of Computtion(Closure on Reg. Lngs., regex to NDFA, DFA to regex) Prof. K.R. Chowdhry Lecture 08: Fe. 08, 2019 : Professor of CS Disclimer: These notes hve not een sujected to the usul scrutiny
More informationLecture 1. Functional series. Pointwise and uniform convergence.
1 Introduction. Lecture 1. Functionl series. Pointwise nd uniform convergence. In this course we study mongst other things Fourier series. The Fourier series for periodic function f(x) with period 2π is
More informationLecture 3: Dealing with Non-Compliance
Comlince Roustness Power References Socil Lws for Multi-Agent Systems: Logic nd Gmes Lecture 3: Deling with Non-Comlince Thoms Ågotnes 1 1 Dertment of Informtion Science nd Medi Studies University of Bergen,
More informationFinite Automata. Informatics 2A: Lecture 3. Mary Cryan. 21 September School of Informatics University of Edinburgh
Finite Automt Informtics 2A: Lecture 3 Mry Cryn School of Informtics University of Edinburgh mcryn@inf.ed.c.uk 21 September 2018 1 / 30 Lnguges nd Automt Wht is lnguge? Finite utomt: recp Some forml definitions
More informationRecitation 3: More Applications of the Derivative
Mth 1c TA: Pdric Brtlett Recittion 3: More Applictions of the Derivtive Week 3 Cltech 2012 1 Rndom Question Question 1 A grph consists of the following: A set V of vertices. A set E of edges where ech
More informationHarvard University Computer Science 121 Midterm October 23, 2012
Hrvrd University Computer Science 121 Midterm Octoer 23, 2012 This is closed-ook exmintion. You my use ny result from lecture, Sipser, prolem sets, or section, s long s you quote it clerly. The lphet is
More informationk and v = v 1 j + u 3 i + v 2
ORTHOGONAL FUNCTIONS AND FOURIER SERIES Orthogonl functions A function cn e considered to e generliztion of vector. Thus the vector concets like the inner roduct nd orthogonlity of vectors cn e extended
More informationLearning Moore Machines from Input-Output Traces
Lerning Moore Mchines from Input-Output Trces Georgios Gintmidis 1 nd Stvros Tripkis 1,2 1 Alto University, Finlnd 2 UC Berkeley, USA Motivtion: lerning models from blck boxes Inputs? Lerner Forml Model
More informationCMPSCI 250: Introduction to Computation. Lecture #31: What DFA s Can and Can t Do David Mix Barrington 9 April 2014
CMPSCI 250: Introduction to Computtion Lecture #31: Wht DFA s Cn nd Cn t Do Dvid Mix Brrington 9 April 2014 Wht DFA s Cn nd Cn t Do Deterministic Finite Automt Forml Definition of DFA s Exmples of DFA
More informationQuadratic Forms. Quadratic Forms
Qudrtic Forms Recll the Simon & Blume excerpt from n erlier lecture which sid tht the min tsk of clculus is to pproximte nonliner functions with liner functions. It s ctully more ccurte to sy tht we pproximte
More informationTHE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS.
THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS RADON ROSBOROUGH https://intuitiveexplntionscom/picrd-lindelof-theorem/ This document is proof of the existence-uniqueness theorem
More informationThe Regulated and Riemann Integrals
Chpter 1 The Regulted nd Riemnn Integrls 1.1 Introduction We will consider severl different pproches to defining the definite integrl f(x) dx of function f(x). These definitions will ll ssign the sme vlue
More information1.3 Regular Expressions
56 1.3 Regulr xpressions These hve n importnt role in describing ptterns in serching for strings in mny pplictions (e.g. wk, grep, Perl,...) All regulr expressions of lphbet re 1.Ønd re regulr expressions,
More informationGuaranteed characterization of exact non-asymptotic confidence regions in nonlinear parameter estimation
9th IFAC Symosium on Nonliner Control Systems Toulouse, Frnce, Setember 4-6, 23 WeA2.3 Gurnteed chrcteriztion of exct non-symtotic confidence regions in nonliner rmeter estimtion Michel Kieffer,,, Eric
More informationKleene Theorems for Free Choice Nets Labelled with Distributed Alphabets
Kleene Theorems for Free Choice Nets Lbelled with Distributed Alphbets Rmchndr Phwde Indin Institute of Technology Dhrwd, Dhrwd 580011, Indi Emil: prb@iitdh.c.in Abstrct. We provided [15] expressions for
More informationCS:4330 Theory of Computation Spring Regular Languages. Equivalences between Finite automata and REs. Haniel Barbosa
CS:4330 Theory of Computtion Spring 208 Regulr Lnguges Equivlences between Finite utomt nd REs Hniel Brbos Redings for this lecture Chpter of [Sipser 996], 3rd edition. Section.3. Finite utomt nd regulr
More informationQuadratic Residues. Chapter Quadratic residues
Chter 8 Qudrtic Residues 8. Qudrtic residues Let n>be given ositive integer, nd gcd, n. We sy tht Z n is qudrtic residue mod n if the congruence x mod n is solvble. Otherwise, is clled qudrtic nonresidue
More informationOn Hermite-Hadamard type integral inequalities for functions whose second derivative are nonconvex
Mly J Mt 34 93 3 On Hermite-Hdmrd tye integrl ineulities for functions whose second derivtive re nonconvex Mehmet Zeki SARIKAYA, Hkn Bozkurt nd Mehmet Eyü KİRİŞ b Dertment of Mthemtics, Fculty of Science
More informationIs the system correct? Introduction to Formal Verification. Measuring SW Complexity. Design Complexity. Aniello Murano. Source Lines of Code (SLOC)
Introduction to Forml Verifiction Is the system correct? Aniello Murno Università degli studi di Noli Federico II Dirtimento di Scienze Fisiche Sezione di Informtic 22 Mggio, 2006 1 2 Design Comlexity
More informationProperties of Integrals, Indefinite Integrals. Goals: Definition of the Definite Integral Integral Calculations using Antiderivatives
Block #6: Properties of Integrls, Indefinite Integrls Gols: Definition of the Definite Integrl Integrl Clcultions using Antiderivtives Properties of Integrls The Indefinite Integrl 1 Riemnn Sums - 1 Riemnn
More information19 Optimal behavior: Game theory
Intro. to Artificil Intelligence: Dle Schuurmns, Relu Ptrscu 1 19 Optiml behvior: Gme theory Adversril stte dynmics hve to ccount for worst cse Compute policy π : S A tht mximizes minimum rewrd Let S (,
More informationQUADRATIC RESIDUES MATH 372. FALL INSTRUCTOR: PROFESSOR AITKEN
QUADRATIC RESIDUES MATH 37 FALL 005 INSTRUCTOR: PROFESSOR AITKEN When is n integer sure modulo? When does udrtic eution hve roots modulo? These re the uestions tht will concern us in this hndout 1 The
More informationAssignment 1 Automata, Languages, and Computability. 1 Finite State Automata and Regular Languages
Deprtment of Computer Science, Austrlin Ntionl University COMP2600 Forml Methods for Softwre Engineering Semester 2, 206 Assignment Automt, Lnguges, nd Computility Smple Solutions Finite Stte Automt nd
More informationVerification of Prognosability for Labeled Petri Nets
This rticle hs been cceted for ubliction in future issue of this journl, but hs not been fully edited. Content my chnge rior to finl ubliction. Cittion informtion: DOI.9/TAC.7.75696, IEEE Trnsctions on
More information5. (±±) Λ = fw j w is string of even lengthg [ 00 = f11,00g 7. (11 [ 00)± Λ = fw j w egins with either 11 or 00g 8. (0 [ ffl)1 Λ = 01 Λ [ 1 Λ 9.
Regulr Expressions, Pumping Lemm, Right Liner Grmmrs Ling 106 Mrch 25, 2002 1 Regulr Expressions A regulr expression descries or genertes lnguge: it is kind of shorthnd for listing the memers of lnguge.
More informationAnatomy of a Deterministic Finite Automaton. Deterministic Finite Automata. A machine so simple that you can understand it in less than one minute
Victor Admchik Dnny Sletor Gret Theoreticl Ides In Computer Science CS 5-25 Spring 2 Lecture 2 Mr 3, 2 Crnegie Mellon University Deterministic Finite Automt Finite Automt A mchine so simple tht you cn
More information3 Regular expressions
3 Regulr expressions Given n lphet Σ lnguge is set of words L Σ. So fr we were le to descrie lnguges either y using set theory (i.e. enumertion or comprehension) or y n utomton. In this section we shll
More informationReinforcement Learning
Reinforcement Lerning Tom Mitchell, Mchine Lerning, chpter 13 Outline Introduction Comprison with inductive lerning Mrkov Decision Processes: the model Optiml policy: The tsk Q Lerning: Q function Algorithm
More informationCS103B Handout 18 Winter 2007 February 28, 2007 Finite Automata
CS103B ndout 18 Winter 2007 Ferury 28, 2007 Finite Automt Initil text y Mggie Johnson. Introduction Severl childrens gmes fit the following description: Pieces re set up on plying ord; dice re thrown or
More informationStudent Activity 3: Single Factor ANOVA
MATH 40 Student Activity 3: Single Fctor ANOVA Some Bsic Concepts In designed experiment, two or more tretments, or combintions of tretments, is pplied to experimentl units The number of tretments, whether
More informationChapter 6 Notes, Larson/Hostetler 3e
Contents 6. Antiderivtives nd the Rules of Integrtion.......................... 6. Are nd the Definite Integrl.................................. 6.. Are............................................ 6. Reimnn
More informationA recursive construction of efficiently decodable list-disjunct matrices
CSE 709: Compressed Sensing nd Group Testing. Prt I Lecturers: Hung Q. Ngo nd Atri Rudr SUNY t Bufflo, Fll 2011 Lst updte: October 13, 2011 A recursive construction of efficiently decodble list-disjunct
More information(9) P (x)u + Q(x)u + R(x)u =0
STURM-LIOUVILLE THEORY 7 2. Second order liner ordinry differentil equtions 2.1. Recll some sic results. A second order liner ordinry differentil eqution (ODE) hs the form (9) P (x)u + Q(x)u + R(x)u =0
More informationContinuous Random Variables
STAT/MATH 395 A - PROBABILITY II UW Winter Qurter 217 Néhémy Lim Continuous Rndom Vribles Nottion. The indictor function of set S is rel-vlued function defined by : { 1 if x S 1 S (x) if x S Suppose tht
More informationOn some inequalities for s-convex functions and applications
Özdemir et l Journl of Ineulities nd Alictions 3, 3:333 htt://wwwjournlofineulitiesndlictionscom/content/3//333 R E S E A R C H Oen Access On some ineulities for s-convex functions nd lictions Muhmet Emin
More informationNon-Deterministic Finite Automata. Fall 2018 Costas Busch - RPI 1
Non-Deterministic Finite Automt Fll 2018 Costs Busch - RPI 1 Nondeterministic Finite Automton (NFA) Alphbet ={} q q2 1 q 0 q 3 Fll 2018 Costs Busch - RPI 2 Nondeterministic Finite Automton (NFA) Alphbet
More informationThe size of subsequence automaton
Theoreticl Computer Science 4 (005) 79 84 www.elsevier.com/locte/tcs Note The size of susequence utomton Zdeněk Troníček,, Ayumi Shinohr,c Deprtment of Computer Science nd Engineering, FEE CTU in Prgue,
More informationName of the Student:
SUBJECT NAME : Discrete Mthemtics SUBJECT CODE : MA 2265 MATERIAL NAME : Formul Mteril MATERIAL CODE : JM08ADM009 Nme of the Student: Brnch: Unit I (Logic nd Proofs) 1) Truth Tble: Conjunction Disjunction
More informationCMSC 330: Organization of Programming Languages. DFAs, and NFAs, and Regexps (Oh my!)
CMSC 330: Orgniztion of Progrmming Lnguges DFAs, nd NFAs, nd Regexps (Oh my!) CMSC330 Spring 2018 Types of Finite Automt Deterministic Finite Automt (DFA) Exctly one sequence of steps for ech string All
More information11.1 Finite Automata. CS125 Lecture 11 Fall Motivation: TMs without a tape: maybe we can at least fully understand such a simple model?
CS125 Lecture 11 Fll 2016 11.1 Finite Automt Motivtion: TMs without tpe: mybe we cn t lest fully understnd such simple model? Algorithms (e.g. string mtching) Computing with very limited memory Forml verifiction
More informationDuality # Second iteration for HW problem. Recall our LP example problem we have been working on, in equality form, is given below.
Dulity #. Second itertion for HW problem Recll our LP emple problem we hve been working on, in equlity form, is given below.,,,, 8 m F which, when written in slightly different form, is 8 F Recll tht we
More information