COMPUTATIONAL PROCESSES IN LIVING CELLS

Size: px
Start display at page:

Download "COMPUTATIONAL PROCESSES IN LIVING CELLS"

Transcription

1 COMPUTATIONAL PROCESSES IN LIVING CELLS Lecture 7: Formal Systems for Gene Assembly in Ciliates: the String Pointer Reduction System March 31, 2010

2 MDS-descriptors MDS descriptors: strings over the following alphabet: Γ κ = { (b, e), (e, b) } { (i, j), (j, i) 2 i < j κ } { (b, i), (i, b), (i, e), (e, i) 2 i κ }. The realistic MDS descriptor associated to actin I gene in O.nova (3, 4)(4, 5)(6, 7)(5, 6)(7, 8)(9, e)(3, 2)(b, 2)(8, 9) A realistic MDS descriptor: (2, 3)(5, 4)(b, 2)(5, e)(3, 4) A non-realistic MDS descriptor: (b, 2)(e, b)(2, 3) 1

3 LD, HI, DLAD on realistic MDS descriptors For each p Π κ, the ld-rule for p is defined as follows: ld p (δ 1 (q, p)(p, r)δ 2 ) = δ 1 (q, r)δ 2, ld p ((p, m 1 )(m 2, p)) = (m 2, m 1 ), where q, r Π ex,κ, m 1, m 2 are markers and δ 1, δ 2 (Γ κ ). The first case is a simple application of ld: the two occurrences of p are separated by one IES only The second case is a boundary application of ld: all the other MDSs are between the two occurrences of p. We can always assume that the boundary ld is the last step of the assembly: (p, m 1 )(m 2, p), with m 1, m 2 markers. 2

4 LD, HI, DLAD on realistic MDS descriptors For each p Π κ, the hi-rule for p is defined as follows: hi p (δ 1 (p, q)δ 2 (p, r)δ 3 ) = δ 1 δ 2 (q, r)δ 3, hi p (δ 1 (q, p)δ 2 (r, p)δ 3 ) = δ 1 (q, r)δ 2 δ 3, where q, r Π ex,κ and δ i (Γ κ ) for each i = 1, 2, 3. Note that here the pointer p must be positive in the MDS descriptor to which hi p is applicable. 3

5 LD, HI, DLAD on realistic MDS descriptors dlad p,q (δ 1 (p, r 1 )δ 2 (q, r 2 )δ 3 (r 3, p)δ 4 (r 4, q)δ 5 ) = δ 1 δ 4 (r 4, r 2 )δ 3 (r 3, r 1 )δ 2 δ 5, dlad p,q (δ 1 (p, r 1 )δ 2 (r 2, q)δ 3 (r 3, p)δ 4 (q, r 4 )δ 5 ) = δ 1 δ 4 δ 3 (r 3, r 1 )δ 2 (r 2, r 4 )δ 5, dlad p,q (δ 1 (r 1, p)δ 2 (q, r 2 )δ 3 (p, r 3 )δ 4 (r 4, q)δ 5 ) = δ 1 (r 1, r 3 )δ 4 (r 4, r 2 )δ 3 δ 2 δ 5, dlad p,q (δ 1 (r 1, p)δ 2 (r 2, q)δ 3 (p, r 3 )δ 4 (q, r 4 )δ 5 ) = δ 1 (r 1, r 3 )δ 4 δ 3 δ 2 (r 2, r 4 )δ 5, dlad p,q (δ 1 (p, r 1 )δ 2 (q, p)δ 4 (r 4, q)δ 5 ) = δ 1 δ 4 (r 4, r 1 )δ 2 δ 5, dlad p,q (δ 1 (p, q)δ 3 (r 3, p)δ 4 (q, r 4 )δ 5 ) = δ 1 δ 4 δ 3 (r 3, r 4 )δ 5, dlad p,q (δ 1 (r 1, p)δ 2 (q, r 2 )δ 3 (p, q)δ 5 ) = δ 1 (r 1, r 2 )δ 3 δ 2 δ 5, where r i Π ex,κ and δ i (Γ κ ) for each i. The pointers p and q overlap and they both must be negative. 4

6 Next level of abstraction: strings MDS descriptors: faithful representation of the genomic structure in ciliates (only the IESs are dropped from the representation) Difficult to work on this level because of the involved definitions (too many details preserved) Idea: Make further simplifications in the representation 5

7 Simplifying the representation Gene assembly in ciliates A process of MDS ordering and assembling: reduce the number of MDSs with each step of the assembly A process of reducing pointers: a number of pointers in the beginning; 2 or 4 pointers are eliminated with each step of the process Question: Could it be possible to represent the genomic structure using pointers only, without essential loss of information? Remarkable simplification: at this level, the gene would only be represented by a linear sequence of symbols 6

8 Plan Simplify the structure by keeping only the sequence of pointers New framework: signed double occurrence strings Define the operations: The String Pointer Reduction System Prove formally that no essential information is lost, as far as the gene assembly is concerned 7

9 Some definitions Let δ = (x 1, x 2 )(x 3, x 4 )... (x 2n 1, x 2n ) be a realistic MDS descriptor. If r is a pointer and x i, x j {r, r}, then the set {x i, x i+1,..., x j } is the r-interval of r If both r and r occur in δ, then r is positive in δ If r has two occurrences in δ, then r is negative in δ Left occurrence: p in (p, q) Right occurrence: q in (p, q) 8

10 Some definitions Let δ = (p, q) Γ κ. If p, q κ, then p is an incoming pointer and q is an outgoing pointer in δ. If p, q κ, then p is an outgoing pointer and q is an incoming pointer in δ. Example: (2, 3)(5, 4)(b, 2)(5, e)(3, 4) 2 is incoming and 3 is outgoing; 5 is outgoing and 4 is incoming 9

11 On MDS descriptors Let δ Γ κ be a realistic MDS descriptor. Then: For any marker m Ψ, δ has exactly one occurrence from {m, m}. Each pointer p Π κ of δ has exactly two occurrences in δ. If p is negative, then one occurrence is left and one is right. If p is positive, then both occurrences are left or both are right. 10

12 If δ = δ 1 (x, y)δ 2, where (x, y) = (b, e) or (x, y) = (e, b) and δ 1, δ 2 Γ κ, then δ 1 = δ 2 = Λ. Similarly, if δ = δ 1 (p, m 1 )(m 2, p)δ 2, with m 1, m 2 markers, then δ 1 = δ 2 = Λ.

13 Second level of abstraction: strings Idea: model the MDS structure of the gene by its sequence of pointers only: signed double occurrence strings Compared with the MDS descriptors, we get rid of the parenthesis and the markers Note: the loss of information appears to be huge; e.g., there are different MDS descriptors having the same sequence of pointers Example: (b, 2)(3, 4)(e, 4)(3, 2) (2, 3)(4, e)(4, 3)(2, b)

14 Second level of abstraction: strings Idea: model the MDS structure of the gene by its sequence of pointers only: signed double occurrence strings Compared with the MDS descriptors, we get rid of the parenthesis and the markers Note: the loss of information appears to be huge; e.g., there are different MDS descriptors having the same sequence of pointers Nevertheless, as far as the gene assembly process is concerned, no essential information is lost; on the other hand, we simplify the model by removing the unnecessary details 12

15 The framework: legal and realistic strings A string v Σ over an (unsigned) alphabet Σ is a double occurrence string, if every letter a dom(v) occurs exactly twice in v. A signing of a nonempty double occurrence string is called a legal string. Notation: Σ = (Σ Σ) is the set of signed strings over Σ Let a Σ Σ and let u Σ be a legal string. If u contains both a and a, then a is positive in u; otherwise, a is negative in u. 13

16 Example u = u is legal. Pointers 2 and 5 are positive in u, while 3 and 4 are negative in u. w = w is not legal:??? 14

17 Example u = u is legal. Pointers 2 and 5 are positive in u, while 3 and 4 are negative in u. w = w is not legal: ξ(w) = is not a double occurrence string. (Recall that ξ removes the bars from the strings.) 15

18 Intervals and overlaps u = a 1 a 2... a n a legal string over Σ, where a i Σ Σ for each i. For each letter a occurring in u, there are 1 i < j n such that ξ(a i ) = a = ξ(a j ). Then is the a-interval of u. u (a) = a i a i+1... a j a, b Σ are overlapping in u if the a-interval and the b-interval of u overlap: if u (a) = a i1... a j1 and u (b) = a i2... a j2, then either i 1 < i 2 < j 1 < j 2 or i 2 < i 1 < j 2 < j 1. 16

19 Intervals and overlaps Denote: O u (a) = {b Σ b overlaps with a in u} {a}. Similarly, denote by O u + (a) (Ou (a), resp.) the set of all positive letters (negative letters, resp.) in O u (a). Note: it is convenient to let a O u (a). If a is positive in u, then a O u + (a), and if a is negative in u, then a Ou (a). 17

20 From MDS descriptors to legal strings Idea: drop the parenthesis and the markers, retaining only the sequence of pointers. The result is a signed double occurrence string - legal string More formally, rem κ: Γ κ κ is the morphism that removes the parentheses and the markers from each MDS descriptor, defined as rem κ (x, y) = for all (x, y) Γ κ. Λ if x, y Ψ, x if x κ κ, y Ψ, y if x Ψ, y κ κ, xy if x, y κ κ 18

21 Example The realistic MDS descriptor associated to actin I gene in O.nova (3, 4)(4, 5)(6, 7)(5, 6)(7, 8)(9, e)(3, 2)(b, 2)(8, 9) Its corresponding legal string is 19

22 Example The realistic MDS descriptor associated to actin I gene in O.nova (3, 4)(4, 5)(6, 7)(5, 6)(7, 8)(9, e)(3, 2)(b, 2)(8, 9) Its corresponding legal string is

23 Realistic strings A legal string u is realistic if there exists a realistic MDS descriptor δ such that u = rem κ (δ) for some κ Previous example: is realistic Question: Are there strings that are not realistic? Yes! Example: u = is legal, but it is not realistic Proof: 21

24 Realistic strings A legal string u is realistic if there exists a realistic MDS descriptor δ such that u = rem κ (δ) for some κ Previous example: is realistic Question: Are there strings that are not realistic? Yes! Example: u = is legal, but it is not realistic Proof: An easy analysis shows that it is impossible to construct a corresponding MDS descriptor 22

25 Analyzing the loss of information Some structural information about the gene does get lost in the model simplification: there are different MDS descriptors with the same associated realistic string. Characterization of those MDS descriptors: consider M 1 M 2... M κ Let and (k 1, k 2 ) = (κ, κ 1), if κ is odd, (κ 1, κ), if κ is even. α o = M 1 M 3... M k1 and α e = M 2 M 4... M k2. 23

26 The loss of information: ambiguous MDS descriptors Let α 1 and α 2 be two different micronuclear sequences of size κ. Then α 1 and α 2 have the same associated legal string if and only if one of the following four conditions holds: α 1 = α o α e and α 2 = α e α o, (i) α 1 = α o α e and α 2 = α e α o, (ii) α 1 = α o α e and α 2 = α e α o, (iii) α 1 = α o α e and α 2 = α e α o. (iv) 24

27 The loss of information: ambiguous MDS descriptors Let α 1 and α 2 be two different micronuclear sequences of size κ. Then α 1 and α 2 have the same associated legal string if and only if one of the following four conditions holds: α 1 = α o α e and α 2 = α e α o, (i) κ κ α 1 = α o α e and α 2 = α e α o, (ii) α 1 = α o α e and α 2 = α e α o, (iii) α 1 = α o α e and α 2 = α e α o. (iv) 25

28 The loss of information: ambiguous MDS descriptors Let α 1 and α 2 be two different micronuclear sequences of size κ. Then α 1 and α 2 have the same associated legal string if and only if one of the following four conditions holds: α 1 = α o α e and α 2 = α e α o, (i) α 1 = α o α e and α 2 = α e α o, (ii) κ κ α 1 = α o α e and α 2 = α e α o, (iii) α 1 = α o α e and α 2 = α e α o. (iv) 26

29 The loss of information: ambiguous MDS descriptors Let α 1 and α 2 be two different micronuclear sequences of size κ. Then α 1 and α 2 have the same associated legal string if and only if one of the following four conditions holds: α 1 = α o α e and α 2 = α e α o, (i) α 1 = α o α e and α 2 = α e α o, (ii) α 1 = α o α e and α 2 = α e α o, (iii) κ κ α 1 = α o α e and α 2 = α e α o. (iv) 27

30 The loss of information: ambiguous MDS descriptors Let α 1 and α 2 be two different micronuclear sequences of size κ. Then α 1 and α 2 have the same associated legal string if and only if one of the following four conditions holds: α 1 = α o α e and α 2 = α e α o, (i) α 1 = α o α e and α 2 = α e α o, (ii) α 1 = α o α e and α 2 = α e α o, (iii) α 1 = α o α e and α 2 = α e α o. (iv) κ κ

31 The only ambiguous realistic strings are the following: κ κ (i) κ κ (ii) κ κ (iii) κ κ (iv)

32 String Pointer Reduction System Second level of abstraction: legal words and string pointer reduction systems Translate the MDS descriptor rules to legal strings Result: the string pointer reduction system modelling the transformation of pointers during gene assembly. This system consists of three operations, the equivalent for legal strings of ld, hi, dlad Prove the equivalence with the MDS descriptor rewriting system 29

33 String Pointer Reduction System The equivalents for strings of the three molecular operations ld, hi, dlad are snr, spr, sdr We use sometimes also the notation ld, hi, dlad to denote the operations on strings, if there is no risk of confusion Each of the string operations below maps legal strings to legal strings. 30

34 String Pointer Reduction System The string negative rule snr p for a pointer p Π is applicable to a legal string of the form u = u 1 ppu 2, where u 1, u 2. The result of this operation is snr p (u 1 p p u 2 ) = u 1 u 2. The string positive rule spr p for a pointer p Π is applicable to a legal string of the form u = u 1 pu 2 pu 3, where u 1, u 2, u 3. The result of this operation is spr p (u 1 p u 2 p u 3 ) = u 1 u 2 u 3. 31

35 The string double rule sdr p,q for pointers p, q Π with p q is applicable to a legal string of the form u = u 1 pu 2 qu 3 pu 4 qu 5, where u i for each i. The result of this operation is sdr p,q (u 1 p u 2 q u 3 p u 4 q u 5 ) = u 1 u 4 u 3 u 2 u 5.

36 String Pointer Reduction System Only three types of rules MDS descriptors: 11 cases of rules (2 for ld, 2 for hi, and 7 for dlad) Therefore, the string pointer reduction system is considerably simpler than the MDS pointer reduction system 32

37 String Pointer Reduction System A composition ϕ = ϕ n... ϕ 1 of operations from {snr p, spr p, sdr p,q p, q Π} is applicable to a legal string u, if ϕ 1 is applicable to u, and ϕ i is applicable to ϕ i 1... ϕ 1 (u) for all 1 < i n. ϕ is a string reduction of u, if ϕ is applicable to u. ϕ is successful for u, if ϕ(u) = Λ, the empty string. Looking for a gene assembly strategy means now to look for a successful reduction of the corresponding realistic string. 33

38 Example The realistic string corresponding to the actin I gene in O.nova: A successful reduction:

39 Example: assembling gene actin I in S.Nova Step 1: LD 38

40 Example: assembling the actini gene in S.nova Step 2: DLAD 39

41 Example: assembling the actini gene in S.nova Step 3: LD 40

42 Example: assembling the actini gene in S.nova Step 4: DLAD 41

43 Example: assembling the actini gene in S.nova Step 5: HI 42

44 Example: assembling the actini gene in S.nova Step 6: HI 43

45 Example The realistic string corresponding to the actin I gene in O.nova: A successful reduction: snr sdr 5, snr sdr 8, spr spr 3 Λ 41

46 Correctness of the reduction from MDS descriptors to legal strings Question: is the string pointer reduction system equivalent to the MDS pointer reduction system? In other words: For a realistic MDS descriptor δ, can we translate a successful assembly of δ into a successful reduction of its corresponding realistic string? Also the other way around: for a realistic string u, can we translate a successful reduction of u into a successful assembly of its corresponding realistic MDS descriptors? 42

47 BONUS TOPIC Recovering the gene structure from the pointer sequence Problem: We get the sequence of pointers from the lab, but we do not know which is the first pointer, which is the second, etc. Deduce this information. Note: In general the problem is in fact more complicated because one does not know which of the reported sequences are inversions of ciliate pointers. For simplicity, assume here that we do have the information on the orientation of the pointers. 43

48 Recovering the gene structure from the pointer sequence The problem in formal terms A legal string u over Σ is said to be realizable if u is isomorphic to a realistic legal string, i.e., if there exists an injective morphism τ : Σ such that τ(σ) and τ(u) is realistic. Decide if a legal string is realizable and if it is, construct a corresponding MDS descriptor 44

49 Example u = is legal. u is not realistic: can never be a substring of a realistic legal string. u is realizable: define τ(2) = 2, τ(3) = 5, τ(4) = 4, and τ(5) = 3: is realistic. τ(u) =

50 Solution: graphs and alternating hamiltonian paths We associate to a legal string w = a 1 a 2... a 2κ a graph A w, with labels both on vertices and edges Vertices: V = {1, 2,..., 2κ} with labels l(i) = a i. Edges: E = E 0 E 1, where with the labels E 0 = { (i, j) a i = a j, 1 i < j 2κ }, E 1 = { (i, j) j i = 1, 1 i < 2κ }, h(e) = 0 if e E 0, 1 if e E 1. 46

51 Example Let w = be a legal string. Its associated graph is drawn below: a solid line represents the color 1 and a dashed line the color 0. The labels of the vertices are written beneath them

52 Alternating hamiltonian path A path e 1 e 2...e k in the graph A w is alternating if h(e 2i+1 )=0and h(e 2(i+1) )=1for each i. An alternating path is called alternating hamiltonian if it visits every vertex of the graph exactly once. 38

53 Example The previous example visited. The graph presented in the previous example has an alternating hamiltonian path, drawn in the second picture below

54 Relabelling a realizable string to get a realistic one Based on the alternating Hamiltonian path, one can easily define a relabelling transforming the string into a realistic one, see bellow an example (the previous example continued)

55 Relabelling a realizable string to get a realistic one For a legal string and a pointer x occurring, one can define a unique alternating path starting at x in the following way: Start with the edge x 1 0 x2, where x 1 = x and l(x 2 )=l(x 1 ). Iterate then the next step: Suppose the alternating path x 1 0 x xi 1 0 xi has been constructed so that the color of the edge {x i 1,x i } is 0. If x i is labelled with a signed letter in w, then the next edges are {x i,x i 1} (of color 1) and {x i 1,x i+1 } (of color 0), where l(x i+1 )=l(x i ). 41

56 Relabelling a realizable string to get a realistic one Result: Let v be a legal string. Then v is realizable if and only if there exists a vertex x of A v such that the induced alternating path alt(v) is an alternating hamiltonian path of A v. 42

Computational processes

Computational processes Spring 2010 Computational processes in living cells Lecture 6: Gene assembly as a pointer reduction in MDS descriptors Vladimir Rogojin Department of IT, Abo Akademi http://www.abo.fi/~ipetre/compproc/

More information

COMPUTATIONAL PROCESSES IN LIVING CELLS

COMPUTATIONAL PROCESSES IN LIVING CELLS COMPUTATIONAL PROCESSES IN LIVING CELLS Lecture 9: Equivalence between the three Pointer Reduction Systems: MDS descriptor, String, and Graph April 15, 2010 Gene assembly in ciliates: the LD operation

More information

Patterns of Simple Gene Assembly in Ciliates

Patterns of Simple Gene Assembly in Ciliates Patterns of Simple Gene Assembly in Ciliates Tero Harju Department of Mathematics, University of Turku Turku 20014 Finland harju@utu.fi Ion Petre Academy of Finland and Department of Information Technologies

More information

Computational nature of gene assembly in ciliates

Computational nature of gene assembly in ciliates Computational nature of gene assembly in ciliates Robert Brijder 1, Mark Daley 2, Tero Harju 3, Natasha Jonoska 4, Ion Petre 5, and Grzegorz Rozenberg 1,6 1 Leiden Institute of Advanced Computer Science,

More information

Complexity Measures for Gene Assembly

Complexity Measures for Gene Assembly Tero Harju Chang Li Ion Petre Grzegorz Rozenberg Complexity Measures for Gene Assembly TUCS Technical Report No 781, September 2006 Complexity Measures for Gene Assembly Tero Harju Department of Mathematics,

More information

Context-free grammars and languages

Context-free grammars and languages Context-free grammars and languages The next class of languages we will study in the course is the class of context-free languages. They are defined by the notion of a context-free grammar, or a CFG for

More information

Diagram groups and directed 2-complexes: homotopy and homology

Diagram groups and directed 2-complexes: homotopy and homology Diagram groups and directed 2-complexes: homotopy and homology V. S. Guba, M. V. Sapir Abstract We show that diagram groups can be viewed as fundamental groups of spaces of positive paths on directed 2-complexes

More information

Contents. basic algebra. Learning outcomes. Time allocation. 1. Mathematical notation and symbols. 2. Indices. 3. Simplification and factorisation

Contents. basic algebra. Learning outcomes. Time allocation. 1. Mathematical notation and symbols. 2. Indices. 3. Simplification and factorisation basic algebra Contents. Mathematical notation and symbols 2. Indices 3. Simplification and factorisation 4. Arithmetic of algebraic fractions 5. Formulae and transposition Learning outcomes In this workbook

More information

Law of Trichotomy and Boundary Equations

Law of Trichotomy and Boundary Equations Law of Trichotomy and Boundary Equations Law of Trichotomy: For any two real numbers a and b, exactly one of the following is true. i. a < b ii. a = b iii. a > b The Law of Trichotomy is a formal statement

More information

Theoretical Computer Science. Rewriting rule chains modeling DNA rearrangement pathways

Theoretical Computer Science. Rewriting rule chains modeling DNA rearrangement pathways Theoretical Computer Science 454 (2012) 5 22 Contents lists available at SciVerse ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs Rewriting rule chains modeling

More information

Approximating Shortest Superstring Problem Using de Bruijn Graphs

Approximating Shortest Superstring Problem Using de Bruijn Graphs Approximating Shortest Superstring Problem Using de Bruijn Advanced s Course Presentation Farshad Barahimi Department of Computer Science University of Lethbridge November 19, 2013 This presentation is

More information

Two models for gene assembly in ciliates

Two models for gene assembly in ciliates Two models for gene assembly in ciliates Tero Harju 1,3, Ion Petre 2,3, and Grzegorz Rozenberg 4 1 Deartment of Mathematics, University of Turku Turku 20014 Finland harju@utu.fi 2 Deartment of Comuter

More information

Automata & languages. A primer on the Theory of Computation. Laurent Vanbever. ETH Zürich (D-ITET) September,

Automata & languages. A primer on the Theory of Computation. Laurent Vanbever.  ETH Zürich (D-ITET) September, Automata & languages A primer on the Theory of Computation Laurent Vanbever www.vanbever.eu ETH Zürich (D-ITET) September, 24 2015 Last week was all about Deterministic Finite Automaton We saw three main

More information

Discrete Applied Mathematics. Maximal pivots on graphs with an application to gene assembly

Discrete Applied Mathematics. Maximal pivots on graphs with an application to gene assembly Discrete Applied Mathematics 158 (2010) 1977 1985 Contents lists available at ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam Maximal pivots on graphs with an application

More information

3130CIT Theory of Computation

3130CIT Theory of Computation GRIFFITH UNIVERSITY School of Computing and Information Technology 3130CIT Theory of Computation Final Examination, Semester 2, 2006 Details Total marks: 120 (40% of the total marks for this subject) Perusal:

More information

chapter 12 MORE MATRIX ALGEBRA 12.1 Systems of Linear Equations GOALS

chapter 12 MORE MATRIX ALGEBRA 12.1 Systems of Linear Equations GOALS chapter MORE MATRIX ALGEBRA GOALS In Chapter we studied matrix operations and the algebra of sets and logic. We also made note of the strong resemblance of matrix algebra to elementary algebra. The reader

More information

Foundations of

Foundations of 91.304 Foundations of (Theoretical) Computer Science Chapter 1 Lecture Notes (Section 1.3: Regular Expressions) David Martin dm@cs.uml.edu d with some modifications by Prof. Karen Daniels, Spring 2012

More information

Systems of Nonlinear Equations and Inequalities: Two Variables

Systems of Nonlinear Equations and Inequalities: Two Variables Systems of Nonlinear Equations and Inequalities: Two Variables By: OpenStaxCollege Halley s Comet ([link]) orbits the sun about once every 75 years. Its path can be considered to be a very elongated ellipse.

More information

Models of Natural Computation: Gene Assembly and Membrane Systems. Robert Brijder

Models of Natural Computation: Gene Assembly and Membrane Systems. Robert Brijder Models of Natural Computation: Gene Assembly and Membrane Systems Robert Brijder The work in this thesis has been carried out under the auspices of the research school IPA (Institute for Programming research

More information

Part I. Gene Assembly in Ciliates

Part I. Gene Assembly in Ciliates Part I Gene Assembly in Ciliates Chater 2 Reducibility of Gene Patterns in Ciliates using the Breakoint Grah Abstract Gene assembly in ciliates is one of the most involved DNA rocessings going on in any

More information

CS:4330 Theory of Computation Spring Regular Languages. Finite Automata and Regular Expressions. Haniel Barbosa

CS:4330 Theory of Computation Spring Regular Languages. Finite Automata and Regular Expressions. Haniel Barbosa CS:4330 Theory of Computation Spring 2018 Regular Languages Finite Automata and Regular Expressions Haniel Barbosa Readings for this lecture Chapter 1 of [Sipser 1996], 3rd edition. Sections 1.1 and 1.3.

More information

Introduction to Theory of Computing

Introduction to Theory of Computing CSCI 2670, Fall 2012 Introduction to Theory of Computing Department of Computer Science University of Georgia Athens, GA 30602 Instructor: Liming Cai www.cs.uga.edu/ cai 0 Lecture Note 3 Context-Free Languages

More information

Lecture 23 : Nondeterministic Finite Automata DRAFT Connection between Regular Expressions and Finite Automata

Lecture 23 : Nondeterministic Finite Automata DRAFT Connection between Regular Expressions and Finite Automata CS/Math 24: Introduction to Discrete Mathematics 4/2/2 Lecture 23 : Nondeterministic Finite Automata Instructor: Dieter van Melkebeek Scribe: Dalibor Zelený DRAFT Last time we designed finite state automata

More information

Chapter 1. ANALYZE AND SOLVE LINEAR EQUATIONS (3 weeks)

Chapter 1. ANALYZE AND SOLVE LINEAR EQUATIONS (3 weeks) Chapter 1. ANALYZE AND SOLVE LINEAR EQUATIONS (3 weeks) Solve linear equations in one variable. 8EE7ab In this Chapter we review and complete the 7th grade study of elementary equations and their solution

More information

Nondeterministic Finite Automata

Nondeterministic Finite Automata Nondeterministic Finite Automata Mahesh Viswanathan Introducing Nondeterminism Consider the machine shown in Figure. Like a DFA it has finitely many states and transitions labeled by symbols from an input

More information

Author: Vivek Kulkarni ( )

Author: Vivek Kulkarni ( ) Author: Vivek Kulkarni ( vivek_kulkarni@yahoo.com ) Chapter-2: Finite State Machines Solutions for Review Questions @ Oxford University Press 2013. All rights reserved. 1 Q.1 Construct Mealy and Moore

More information

Finite Automata Theory and Formal Languages TMV027/DIT321 LP4 2018

Finite Automata Theory and Formal Languages TMV027/DIT321 LP4 2018 Finite Automata Theory and Formal Languages TMV027/DIT321 LP4 2018 Lecture 14 Ana Bove May 14th 2018 Recap: Context-free Grammars Simplification of grammars: Elimination of ǫ-productions; Elimination of

More information

Automata & languages. A primer on the Theory of Computation. Laurent Vanbever. ETH Zürich (D-ITET) September,

Automata & languages. A primer on the Theory of Computation. Laurent Vanbever.  ETH Zürich (D-ITET) September, Automata & languages A primer on the Theory of Computation Laurent Vanbever www.vanbever.eu ETH Zürich (D-ITET) September, 28 2017 Part 2 out of 5 Last week was all about Deterministic Finite Automaton

More information

Dr. Relja Vulanovic Professor of Mathematics Kent State University at Stark c 2008

Dr. Relja Vulanovic Professor of Mathematics Kent State University at Stark c 2008 MATH-LITERACY MANUAL Dr. Relja Vulanovic Professor of Mathematics Kent State University at Stark c 2008 2 Algebraic Epressions 2.1 Terms and Factors 29 2.2 Types of Algebraic Epressions 32 2.3 Transforming

More information

3515ICT: Theory of Computation. Regular languages

3515ICT: Theory of Computation. Regular languages 3515ICT: Theory of Computation Regular languages Notation and concepts concerning alphabets, strings and languages, and identification of languages with problems (H, 1.5). Regular expressions (H, 3.1,

More information

Modal Logic. UIT2206: The Importance of Being Formal. Martin Henz. March 19, 2014

Modal Logic. UIT2206: The Importance of Being Formal. Martin Henz. March 19, 2014 Modal Logic UIT2206: The Importance of Being Formal Martin Henz March 19, 2014 1 Motivation The source of meaning of formulas in the previous chapters were models. Once a particular model is chosen, say

More information

Theory of Computation

Theory of Computation Thomas Zeugmann Hokkaido University Laboratory for Algorithmics http://www-alg.ist.hokudai.ac.jp/ thomas/toc/ Lecture 12: Turing Machines Turing Machines I After having dealt with partial recursive functions,

More information

Lecture 18: Inapproximability of MAX-3-SAT

Lecture 18: Inapproximability of MAX-3-SAT CS 880: Advanced Complexity Theory 3/7/2008 Lecture 18: Inapproximability of MAX-3-SAT Instructor: Dieter van Melkebeek Scribe: Jeff Kinne In this lecture we prove a tight inapproximability result for

More information

Chapter 4: Computation tree logic

Chapter 4: Computation tree logic INFOF412 Formal verification of computer systems Chapter 4: Computation tree logic Mickael Randour Formal Methods and Verification group Computer Science Department, ULB March 2017 1 CTL: a specification

More information

3. Only sequences that were formed by using finitely many applications of rules 1 and 2, are propositional formulas.

3. Only sequences that were formed by using finitely many applications of rules 1 and 2, are propositional formulas. 1 Chapter 1 Propositional Logic Mathematical logic studies correct thinking, correct deductions of statements from other statements. Let us make it more precise. A fundamental property of a statement is

More information

Compilers. Lexical analysis. Yannis Smaragdakis, U. Athens (original slides by Sam

Compilers. Lexical analysis. Yannis Smaragdakis, U. Athens (original slides by Sam Compilers Lecture 3 Lexical analysis Yannis Smaragdakis, U. Athens (original slides by Sam Guyer@Tufts) Big picture Source code Front End IR Back End Machine code Errors Front end responsibilities Check

More information

Theoretical Computer Science

Theoretical Computer Science Theoretical Computer Science 411 (2010) 919 925 Contents lists available at ScienceDirect Theoretical Computer Science journal homepage: www.elsevier.com/locate/tcs Algorithmic properties of ciliate sequence

More information

Chapter 6: NFA Applications

Chapter 6: NFA Applications Chapter 6: NFA Applications Implementing NFAs The problem with implementing NFAs is that, being nondeterministic, they define a more complex computational procedure for testing language membership. To

More information

Undecidable Problems. Z. Sawa (TU Ostrava) Introd. to Theoretical Computer Science May 12, / 65

Undecidable Problems. Z. Sawa (TU Ostrava) Introd. to Theoretical Computer Science May 12, / 65 Undecidable Problems Z. Sawa (TU Ostrava) Introd. to Theoretical Computer Science May 12, 2018 1/ 65 Algorithmically Solvable Problems Let us assume we have a problem P. If there is an algorithm solving

More information

Mining Infrequent Patterns of Two Frequent Substrings from a Single Set of Biological Sequences

Mining Infrequent Patterns of Two Frequent Substrings from a Single Set of Biological Sequences Mining Infrequent Patterns of Two Frequent Substrings from a Single Set of Biological Sequences Daisuke Ikeda Department of Informatics, Kyushu University 744 Moto-oka, Fukuoka 819-0395, Japan. daisuke@inf.kyushu-u.ac.jp

More information

Lecture Notes on Inductive Definitions

Lecture Notes on Inductive Definitions Lecture Notes on Inductive Definitions 15-312: Foundations of Programming Languages Frank Pfenning Lecture 2 September 2, 2004 These supplementary notes review the notion of an inductive definition and

More information

CS 581: Introduction to the Theory of Computation! Lecture 1!

CS 581: Introduction to the Theory of Computation! Lecture 1! CS 581: Introduction to the Theory of Computation! Lecture 1! James Hook! Portland State University! hook@cs.pdx.edu! http://www.cs.pdx.edu/~hook/cs581f10/! Welcome!! Contact Information! Jim Hook! Office:

More information

An algebraic view of topological -machines

An algebraic view of topological -machines An algebraic view of topological -machines Luke Grecki Graduate Group in Applied Mathematics lgrecki@math.ucdavis.edu June 8, 2010 1 Contents 1 Semigroups 3 2 Semigroups of automata 4 3 -machine words

More information

Time to learn about NP-completeness!

Time to learn about NP-completeness! Time to learn about NP-completeness! Harvey Mudd College March 19, 2007 Languages A language is a set of strings Examples The language of strings of all zeros with odd length The language of strings with

More information

Finite Automata Part One

Finite Automata Part One Finite Automata Part One Computability Theory What problems can we solve with a computer? What kind of computer? Computers are Messy http://en.wikipedia.org/wiki/file:eniac.jpg Computers are Messy That

More information

Chapter 2 Linear Equations and Inequalities in One Variable

Chapter 2 Linear Equations and Inequalities in One Variable Chapter 2 Linear Equations and Inequalities in One Variable Section 2.1: Linear Equations in One Variable Section 2.3: Solving Formulas Section 2.5: Linear Inequalities in One Variable Section 2.6: Compound

More information

Practical Algebra. A Step-by-step Approach. Brought to you by Softmath, producers of Algebrator Software

Practical Algebra. A Step-by-step Approach. Brought to you by Softmath, producers of Algebrator Software Practical Algebra A Step-by-step Approach Brought to you by Softmath, producers of Algebrator Software 2 Algebra e-book Table of Contents Chapter 1 Algebraic expressions 5 1 Collecting... like terms 5

More information

COMP/MATH 300 Topics for Spring 2017 June 5, Review and Regular Languages

COMP/MATH 300 Topics for Spring 2017 June 5, Review and Regular Languages COMP/MATH 300 Topics for Spring 2017 June 5, 2017 Review and Regular Languages Exam I I. Introductory and review information from Chapter 0 II. Problems and Languages A. Computable problems can be expressed

More information

Finite Automata and Formal Languages

Finite Automata and Formal Languages Finite Automata and Formal Languages TMV26/DIT32 LP4 2 Lecture 6 April 5th 2 Regular expressions (RE) are an algebraic way to denote languages. Given a RE R, it defines the language L(R). Actually, they

More information

Closure Properties of Regular Languages. Union, Intersection, Difference, Concatenation, Kleene Closure, Reversal, Homomorphism, Inverse Homomorphism

Closure Properties of Regular Languages. Union, Intersection, Difference, Concatenation, Kleene Closure, Reversal, Homomorphism, Inverse Homomorphism Closure Properties of Regular Languages Union, Intersection, Difference, Concatenation, Kleene Closure, Reversal, Homomorphism, Inverse Homomorphism Closure Properties Recall a closure property is a statement

More information

Introduction to Arithmetic Geometry Fall 2013 Lecture #23 11/26/2013

Introduction to Arithmetic Geometry Fall 2013 Lecture #23 11/26/2013 18.782 Introduction to Arithmetic Geometry Fall 2013 Lecture #23 11/26/2013 As usual, a curve is a smooth projective (geometrically irreducible) variety of dimension one and k is a perfect field. 23.1

More information

Deterministic Finite Automata (DFAs)

Deterministic Finite Automata (DFAs) CS/ECE 374: Algorithms & Models of Computation, Fall 28 Deterministic Finite Automata (DFAs) Lecture 3 September 4, 28 Chandra Chekuri (UIUC) CS/ECE 374 Fall 28 / 33 Part I DFA Introduction Chandra Chekuri

More information

No Solution Equations Let s look at the following equation: 2 +3=2 +7

No Solution Equations Let s look at the following equation: 2 +3=2 +7 5.4 Solving Equations with Infinite or No Solutions So far we have looked at equations where there is exactly one solution. It is possible to have more than solution in other types of equations that are

More information

Nondeterministic Streaming String Transducers

Nondeterministic Streaming String Transducers Nondeterministic Streaming String Transducers Rajeev Alur and Jyotirmoy V. Deshmukh Dept. of Computer and Information Science, University of Pennsylvania. {alur,djy}@cis.upenn.edu Abstract. We introduce

More information

CSCI3390-Lecture 16: NP-completeness

CSCI3390-Lecture 16: NP-completeness CSCI3390-Lecture 16: NP-completeness 1 Summary We recall the notion of polynomial-time reducibility. This is just like the reducibility we studied earlier, except that we require that the function mapping

More information

Nondeterministic Finite Automata

Nondeterministic Finite Automata Nondeterministic Finite Automata Not A DFA Does not have exactly one transition from every state on every symbol: Two transitions from q 0 on a No transition from q 1 (on either a or b) Though not a DFA,

More information

1.3 Vertex Degrees. Vertex Degree for Undirected Graphs: Let G be an undirected. Vertex Degree for Digraphs: Let D be a digraph and y V (D).

1.3 Vertex Degrees. Vertex Degree for Undirected Graphs: Let G be an undirected. Vertex Degree for Digraphs: Let D be a digraph and y V (D). 1.3. VERTEX DEGREES 11 1.3 Vertex Degrees Vertex Degree for Undirected Graphs: Let G be an undirected graph and x V (G). The degree d G (x) of x in G: the number of edges incident with x, each loop counting

More information

Lecture Notes on Inductive Definitions

Lecture Notes on Inductive Definitions Lecture Notes on Inductive Definitions 15-312: Foundations of Programming Languages Frank Pfenning Lecture 2 August 28, 2003 These supplementary notes review the notion of an inductive definition and give

More information

A Polynomial Time Algorithm for Parsing with the Bounded Order Lambek Calculus

A Polynomial Time Algorithm for Parsing with the Bounded Order Lambek Calculus A Polynomial Time Algorithm for Parsing with the Bounded Order Lambek Calculus Timothy A. D. Fowler Department of Computer Science University of Toronto 10 King s College Rd., Toronto, ON, M5S 3G4, Canada

More information

Lecture #14: NP-Completeness (Chapter 34 Old Edition Chapter 36) Discussion here is from the old edition.

Lecture #14: NP-Completeness (Chapter 34 Old Edition Chapter 36) Discussion here is from the old edition. Lecture #14: 0.0.1 NP-Completeness (Chapter 34 Old Edition Chapter 36) Discussion here is from the old edition. 0.0.2 Preliminaries: Definition 1 n abstract problem Q is a binary relations on a set I of

More information

Turing Machines Part III

Turing Machines Part III Turing Machines Part III Announcements Problem Set 6 due now. Problem Set 7 out, due Monday, March 4. Play around with Turing machines, their powers, and their limits. Some problems require Wednesday's

More information

Deterministic Finite Automata (DFAs)

Deterministic Finite Automata (DFAs) Algorithms & Models of Computation CS/ECE 374, Fall 27 Deterministic Finite Automata (DFAs) Lecture 3 Tuesday, September 5, 27 Sariel Har-Peled (UIUC) CS374 Fall 27 / 36 Part I DFA Introduction Sariel

More information

Mini Lecture 5.1 Solving Systems of Linear Equations by Graphing

Mini Lecture 5.1 Solving Systems of Linear Equations by Graphing Mini Lecture 5.1 Solving Systems of Linear Equations by Graphing 1. Decide whether an ordered pair is a solution of a linear system. 2. Solve systems of linear equations by graphing. 3. Use graphing to

More information

P P P NP-Hard: L is NP-hard if for all L NP, L L. Thus, if we could solve L in polynomial. Cook's Theorem and Reductions

P P P NP-Hard: L is NP-hard if for all L NP, L L. Thus, if we could solve L in polynomial. Cook's Theorem and Reductions Summary of the previous lecture Recall that we mentioned the following topics: P: is the set of decision problems (or languages) that are solvable in polynomial time. NP: is the set of decision problems

More information

Discrete Basic Structure: Sets

Discrete Basic Structure: Sets KS091201 MATEMATIKA DISKRIT (DISCRETE MATHEMATICS ) Discrete Basic Structure: Sets Discrete Math Team 2 -- KS091201 MD W-07 Outline What is a set? Set properties Specifying a set Often used sets The universal

More information

f(x) x

f(x) x 2 Function 2.1 Function notation The equation f(x) = x 2 + 3 defines a function f from the set R of real numbers to itself (written f : R R). This function accepts an input value x and returns an output

More information

Weekly Activities Ma 110

Weekly Activities Ma 110 Weekly Activities Ma 110 Fall 2008 As of October 27, 2008 We give detailed suggestions of what to learn during each week. This includes a reading assignment as well as a brief description of the main points

More information

CSE355 SUMMER 2018 LECTURES TURING MACHINES AND (UN)DECIDABILITY

CSE355 SUMMER 2018 LECTURES TURING MACHINES AND (UN)DECIDABILITY CSE355 SUMMER 2018 LECTURES TURING MACHINES AND (UN)DECIDABILITY RYAN DOUGHERTY If we want to talk about a program running on a real computer, consider the following: when a program reads an instruction,

More information

Chapter Five: Nondeterministic Finite Automata

Chapter Five: Nondeterministic Finite Automata Chapter Five: Nondeterministic Finite Automata From DFA to NFA A DFA has exactly one transition from every state on every symbol in the alphabet. By relaxing this requirement we get a related but more

More information

Chapter 5 Simplifying Formulas and Solving Equations

Chapter 5 Simplifying Formulas and Solving Equations Chapter 5 Simplifying Formulas and Solving Equations Look at the geometry formula for Perimeter of a rectangle P = L W L W. Can this formula be written in a simpler way? If it is true, that we can simplify

More information

How do regular expressions work? CMSC 330: Organization of Programming Languages

How do regular expressions work? CMSC 330: Organization of Programming Languages How do regular expressions work? CMSC 330: Organization of Programming Languages Regular Expressions and Finite Automata What we ve learned What regular expressions are What they can express, and cannot

More information

Hierarchy among Automata on Linear Orderings

Hierarchy among Automata on Linear Orderings Hierarchy among Automata on Linear Orderings Véronique Bruyère Institut d Informatique Université de Mons-Hainaut Olivier Carton LIAFA Université Paris 7 Abstract In a preceding paper, automata and rational

More information

cse303 ELEMENTS OF THE THEORY OF COMPUTATION Professor Anita Wasilewska

cse303 ELEMENTS OF THE THEORY OF COMPUTATION Professor Anita Wasilewska cse303 ELEMENTS OF THE THEORY OF COMPUTATION Professor Anita Wasilewska LECTURE 5 CHAPTER 2 FINITE AUTOMATA 1. Deterministic Finite Automata DFA 2. Nondeterministic Finite Automata NDFA 3. Finite Automata

More information

NP, polynomial-time mapping reductions, and NP-completeness

NP, polynomial-time mapping reductions, and NP-completeness NP, polynomial-time mapping reductions, and NP-completeness In the previous lecture we discussed deterministic time complexity, along with the time-hierarchy theorem, and introduced two complexity classes:

More information

CMSC Discrete Mathematics SOLUTIONS TO FIRST MIDTERM EXAM October 18, 2005 posted Nov 2, 2005

CMSC Discrete Mathematics SOLUTIONS TO FIRST MIDTERM EXAM October 18, 2005 posted Nov 2, 2005 CMSC-37110 Discrete Mathematics SOLUTIONS TO FIRST MIDTERM EXAM October 18, 2005 posted Nov 2, 2005 Instructor: László Babai Ryerson 164 e-mail: laci@cs This exam contributes 20% to your course grade.

More information

X-MA2C01-1: Partial Worked Solutions

X-MA2C01-1: Partial Worked Solutions X-MAC01-1: Partial Worked Solutions David R. Wilkins May 013 1. (a) Let A, B and C be sets. Prove that (A \ (B C)) (B \ C) = (A B) \ C. [Venn Diagrams, by themselves without an accompanying logical argument,

More information

Computational Models - Lecture 4

Computational Models - Lecture 4 Computational Models - Lecture 4 Regular languages: The Myhill-Nerode Theorem Context-free Grammars Chomsky Normal Form Pumping Lemma for context free languages Non context-free languages: Examples Push

More information

NOTES ON AUTOMATA. Date: April 29,

NOTES ON AUTOMATA. Date: April 29, NOTES ON AUTOMATA 1. Monoids acting on sets We say that a monoid S with identity element ɛ acts on a set Q if q(st) = (qs)t and qɛ = q. As with groups, if we set s = t whenever qs = qt for all q Q, then

More information

Topics in Complexity

Topics in Complexity Topics in Complexity Please evaluate this course on Axess! Your feedback really does make a difference. Applied Complexity Theory Complexity theory has enormous practical relevance across various domains

More information

CS311 Computational Structures. NP-completeness. Lecture 18. Andrew P. Black Andrew Tolmach. Thursday, 2 December 2010

CS311 Computational Structures. NP-completeness. Lecture 18. Andrew P. Black Andrew Tolmach. Thursday, 2 December 2010 CS311 Computational Structures NP-completeness Lecture 18 Andrew P. Black Andrew Tolmach 1 Some complexity classes P = Decidable in polynomial time on deterministic TM ( tractable ) NP = Decidable in polynomial

More information

SF2972 Game Theory Exam with Solutions March 15, 2013

SF2972 Game Theory Exam with Solutions March 15, 2013 SF2972 Game Theory Exam with s March 5, 203 Part A Classical Game Theory Jörgen Weibull and Mark Voorneveld. (a) What are N, S and u in the definition of a finite normal-form (or, equivalently, strategic-form)

More information

Lecture #5. Dependencies along the genome

Lecture #5. Dependencies along the genome Markov Chains Lecture #5 Background Readings: Durbin et. al. Section 3., Polanski&Kimmel Section 2.8. Prepared by Shlomo Moran, based on Danny Geiger s and Nir Friedman s. Dependencies along the genome

More information

Matrices, Row Reduction of Matrices

Matrices, Row Reduction of Matrices Matrices, Row Reduction of Matrices October 9, 014 1 Row Reduction and Echelon Forms In the previous section, we saw a procedure for solving systems of equations It is simple in that it consists of only

More information

CISC4090: Theory of Computation

CISC4090: Theory of Computation CISC4090: Theory of Computation Chapter 2 Context-Free Languages Courtesy of Prof. Arthur G. Werschulz Fordham University Department of Computer and Information Sciences Spring, 2014 Overview In Chapter

More information

Predicate Logic - Introduction

Predicate Logic - Introduction Outline Motivation Predicate Logic - Introduction Predicates & Functions Quantifiers, Coming to Terms with Formulas Quantifier Scope & Bound Variables Free Variables & Sentences c 2001 M. Lawford 1 Motivation:

More information

Elementary realization of BRST symmetry and gauge fixing

Elementary realization of BRST symmetry and gauge fixing Elementary realization of BRST symmetry and gauge fixing Martin Rocek, notes by Marcelo Disconzi Abstract This are notes from a talk given at Stony Brook University by Professor PhD Martin Rocek. I tried

More information

Source Coding. Master Universitario en Ingeniería de Telecomunicación. I. Santamaría Universidad de Cantabria

Source Coding. Master Universitario en Ingeniería de Telecomunicación. I. Santamaría Universidad de Cantabria Source Coding Master Universitario en Ingeniería de Telecomunicación I. Santamaría Universidad de Cantabria Contents Introduction Asymptotic Equipartition Property Optimal Codes (Huffman Coding) Universal

More information

Simplify each numerical expression. Show all work! Only use a calculator to check. 1) x ) 25 ( x 2 3) 3) 4)

Simplify each numerical expression. Show all work! Only use a calculator to check. 1) x ) 25 ( x 2 3) 3) 4) NAME HONORS ALGEBRA II REVIEW PACKET To maintain a high quality program, students entering Honors Algebra II are expected to remember the basics of the mathematics taught in their Algebra I course. In

More information

Deterministic Finite Automata (DFAs)

Deterministic Finite Automata (DFAs) Algorithms & Models of Computation CS/ECE 374, Spring 29 Deterministic Finite Automata (DFAs) Lecture 3 Tuesday, January 22, 29 L A TEXed: December 27, 28 8:25 Chan, Har-Peled, Hassanieh (UIUC) CS374 Spring

More information

CSCI 2200 Foundations of Computer Science Spring 2018 Quiz 3 (May 2, 2018) SOLUTIONS

CSCI 2200 Foundations of Computer Science Spring 2018 Quiz 3 (May 2, 2018) SOLUTIONS CSCI 2200 Foundations of Computer Science Spring 2018 Quiz 3 (May 2, 2018) SOLUTIONS 1. [6 POINTS] For language L 1 = {0 n 1 m n, m 1, m n}, which string is in L 1? ANSWER: 0001111 is in L 1 (with n =

More information

CYK Algorithm for Parsing General Context-Free Grammars

CYK Algorithm for Parsing General Context-Free Grammars CYK Algorithm for Parsing General Context-Free Grammars Why Parse General Grammars Can be difficult or impossible to make grammar unambiguous thus LL(k) and LR(k) methods cannot work, for such ambiguous

More information

Finite Automata and Formal Languages TMV026/DIT321 LP4 2012

Finite Automata and Formal Languages TMV026/DIT321 LP4 2012 Finite Automata and Formal Languages TMV26/DIT32 LP4 22 Lecture 7 Ana Bove March 27th 22 Overview of today s lecture: Regular Expressions From FA to RE Regular Expressions Regular expressions (RE) are

More information

Introduction to Automata

Introduction to Automata Introduction to Automata Seungjin Choi Department of Computer Science and Engineering Pohang University of Science and Technology 77 Cheongam-ro, Nam-gu, Pohang 37673, Korea seungjin@postech.ac.kr 1 /

More information

Announcements. Problem Set Four due Thursday at 7:00PM (right before the midterm).

Announcements. Problem Set Four due Thursday at 7:00PM (right before the midterm). Finite Automata Announcements Problem Set Four due Thursday at 7:PM (right before the midterm). Stop by OH with questions! Email cs3@cs.stanford.edu with questions! Review session tonight, 7PM until whenever

More information

UNIT-I. Strings, Alphabets, Language and Operations

UNIT-I. Strings, Alphabets, Language and Operations UNIT-I Strings, Alphabets, Language and Operations Strings of characters are fundamental building blocks in computer science. Alphabet is defined as a non empty finite set or nonempty set of symbols. The

More information

Harvard CS 121 and CSCI E-121 Lecture 14: Turing Machines and the Church Turing Thesis

Harvard CS 121 and CSCI E-121 Lecture 14: Turing Machines and the Church Turing Thesis Harvard CS 121 and CSCI E-121 Lecture 14: Turing Machines and the Church Turing Thesis Harry Lewis October 22, 2013 Reading: Sipser, 3.2, 3.3. The Basic Turing Machine The Basic Turing Machine a a b a

More information

Equivalence of Regular Expressions and FSMs

Equivalence of Regular Expressions and FSMs Equivalence of Regular Expressions and FSMs Greg Plaxton Theory in Programming Practice, Spring 2005 Department of Computer Science University of Texas at Austin Regular Language Recall that a language

More information

Notes on Finite Automata

Notes on Finite Automata Notes on Finite Automata Turing machines are widely considered to be the abstract proptotype of digital computers; workers in the field, however, have felt more and more that the notion of a Turing machine

More information

Combinatorial models for DNA rearrangements in ciliates

Combinatorial models for DNA rearrangements in ciliates University of South Florida Scholar Commons Graduate Theses and Dissertations Graduate School 2009 Combinatorial models for DNA rearrangements in ciliates Angela Angeleska University of South Florida Follow

More information

1 Computational Problems

1 Computational Problems Stanford University CS254: Computational Complexity Handout 2 Luca Trevisan March 31, 2010 Last revised 4/29/2010 In this lecture we define NP, we state the P versus NP problem, we prove that its formulation

More information