Substitution and Flip BDDs
|
|
- Vanessa Rodgers
- 5 years ago
- Views:
Transcription
1 Substitution and Flip BDDs Rune M. Jensen and Henrik R. Andersen IT Universit Technical Report Series TR ISSN December 2003
2 Copright c 2003, Rune M. Jensen and Henrik R. Andersen IT Universit of Copenhagen All rights reserved. Reproduction of all or part of this work is permitted for educational or research use on condition that this copright notice is included in an cop. ISSN ISBN Copies ma be obtained b contacting: IT Universit of Copenhagen Glentevej 67 DK-2400 Copenhagen NV Denmark Telephone: Telefa: Web
3 Substitution and Flip BDDs Rune M. Jensen and Henrik R. Andersen Abstract This report introduces two novel approaches for representing transition functions of finite transition sstems encoded as Binar Decision Diagrams (BDDs). The first approach is substition BDDs where each transition is represented b a corresponding substitution on state variables. The second is flip BDDs where each transition is defined b the set of state variables with flipped value. We show that substitution BDDs can be used to find and propagate write conflicts in snchronous and asnchronous compositions. Furthermore, our eperimental evaluation suggest that the compleit of image computations based on flip BDDs ma compare positivel to the usual relational product computation. Introduction Binar Decision Diagrams (BDDs,[2]) have been successfull applied to implicitl search large transition sstems in a wide range of fields including formal verification, planning, control, and game theor (e.g., [3, 4,, 9, ]). Two major approaches for representing the transition function have been developed. The first represents the transition function as a vector of Boolean functions where each function defines the value in the net state of a single state variable (e.g.,[8]). The approach, however, is limited to deterministic transition functions. The second approach is probabl the most popular. It represents the transition function as the characteristic function of the transition relation [7]. It can represent deterministic as well as nondeterministic transition functions. In this report, we introduce two novel transition function representations. Both can represent deterministic as well as nondeterministic transition functions. The first is called substitution BDDs and is based on representing each transition b a substitution on state variables. Since this representation is redundant, it allows write conflicts on state variables to be detected and propagated. The second approach is called flip BDDs. The idea is to represent each transition b the set of state variables it changes. This set is uniquel defined. Thus, flip BDDs are non-redundant. Our preliminar eperimental evaluation indicates that image computations based on flip BDDs ma have lower compleit than the relational product operation used to compute the image when the transition function is represented b the characteristic function of the transition relation. The remainder of the report is organized as follows. In Section 2, we introduce a guarded command language and substitution BDDs for representing its semantics. We also define specialized BDD operators for making snchronous and asnchronous compositions of guarded commands and computing the image of a set of states given a transition sstem represented as a substitution BDD. In Section 3, we introduce flip BDDs. We show how to build a flip BDD from a transition sstem definition. In addition, we define the image operation for a transition sstems represented b a flip BDD and present preliminar eperimental results comparing the performance of fied point computations based on flip BDDs and fied point computations based on the usual relational product. Finall, we draw conclusions and discuss directions for future work in Section 4. 2 Substitution BDDs Substitution BDDs represent snchronous and asnchronous compositions of guarded commands. The abstract snta of the guarded command language is given b COM "#$&'
4 < The operators & and " denote snchronous and asnchronous composition. The variables and are Boolean epressions on a nonempt set of Boolean state variables, ' given b " " where #" An atomic command is eecutable in a state that satisfies the epression on the current state variables. If it eecutes, the $ state variables in & (') +* #')-, */. change value to one of the assignments of 0 ') +* ')-, *. satisfing such that (') * ') +* ')-, * ')-, * in the resulting state. We regard the set of possible assignments of the $ state variables in as substitutions. Eample shows four atomic commands. Eample Four atomic commands are shown below ( ( ( # : ' 2. ; # 2. 2 In an asnchronous composition "#=2 of two guarded commands and =2 at most one transition (or substitution) takes place in each time step. Thus, the substitutions of each state in the resulting command is equal to the union of substitutions for that state of and =2. Snchronous composition & =2 is more complicated, since a substitution in both and 2 happens simultaneousl. For a given state this means that an combination of substitutions of and 2 can happen. In addition, substitutions ma conflict b writing to the same state variable. We assume that a conflict occur even when the two substitutions agree on the new value of the variable. Obviousl other models of snchronous composition could be used. In order to define the semantics of a guarded command formall, we first define a substitution as a partial mapping from variables to truth values or the error substitution, >?@ACB+D E GFIH.4J > A command denotes a domain K LL 6MM D, where D is a mapping from states to sets of substitutions D H9NOP/QN SRUT=VWXZY H SR T=VWXZY The semantic function K9LL 6MM is defined b structural induction on the abstract snta K LL MM\[ L ] ^ #, ] ^, M `_ LL 8MM\[Ga_ LL MMbc[ ^. K LL ed 2 MM\[ K LL fmm\[ J K LL 3MMZ[ K LL & 2 MM\[ g 9hig 2 jg " K LL 3MM\[ g 2 " K LL 2 MM\[U lk`mn n g hogc2 qqp r sqq > ut8vwlg.:z t{vw g2.} ~ > ug > > ug 2 > g( J g 2 D mn k` B n The function K LL ƒ MM defines the usual semantics of a Boolean epression ƒ. Eample 2 shows various compositions of the four atomic commands introduced in Eample. Eample 2 The semantics of the four atomic substitutions presented in Eample and a few compositions are illustrated below 2
5 H ƒ 2 7 > ) H H R H > < L ] M L 2 ] M L : ] # 2 ] =M L 2 ] M L ] M 0 L ] # 2 ] M 0 L L ] M ] #(2] =M 0 2. &87 & 2. Domain Embedding In order to use BDDs to represent the substitution domain of a guarded command, we embed D in a pair of Boolean functions D H NO P3QN SR TVWXZY H SR OP3Q H SR OP/Q D H H H9NO P3QN H * H H NOP3QN H9NOP/QN The first function encodes all the non-conflicting substitutions, while second encodes all the error substitutions. To define these functions, we introduce some auiliar notation For a pair E #., let. " and #$. ", For a Boolean function ƒ '&., let the variable names and domain of ƒ be simultaneousl defined b (*) +-,-,-, + (./ H, For a Boolean function ƒ ( ) + (*0) +-,-,-, + (. + (*0. H and an assignment of the arguments ^ '3^ 3^ & 6^ &. " 2&, let 2 '. ^ ', 2 '. ^ ', 43 ( ^ 6^ &., and 43 ( 0 ^ 6^ &.. A domain embedding is defined b the function D H O'687 H. H OP/Q H. where :9<; # # ' " U. Given a domain ta" D, a substitution transition ^ 6^ 6^ 3^ 6^ 3^., and a state [ ^ 3^f., we have = t.+. >g > CED*F G H g. CED g. =#8$ t.+. [ > "#t([. k`mn n CED*F G H g. K " g.. g9. CED= g. K ". " g. 3
6 2 Thus, =#8$ t./. and t./. encode a state with the variables. In addition, = t.+. encodes the value of a substitution with the variables (see CED*F G H ) and the set of variables in the substitution with the variables (see CED= ). 2.2 The BDD Representation of the Embedding and assume without loss of generalit that the variables are ordered ascend- Let the set of BDD variables equal 9 ; ingl The BDD representation of a command is given b the function. a H O 687 H. H OP3Q H. defined b. :..,,. d #$.+. #8$ 2./.+. & 2.. & 2. where :. and `. are BDD representations of and using to encode the state and to encode the substitution values. The & operation is defined b structural induction on the BDD representation. To simplif the definition, we assume that the BDD is non-reduced such that all nodes are present in the decision tree. Let U. and 2.. Base Case ( Inductive Case Let " H ) &.. =. #$. =#8$. =. #$. #$. L = a b c d e f, g h and R = A B C D E F, G H We then have L * R = aa bb cc dd, ee ff gg hh 4
7 $ where where aa #. &. bb ^. &. cc '#. &. dd = t. &. ee. &. ff. &. gg #$ #. &. #8$ #. &. #8$ #. &. hh #$ ^. &. #$ ^. &. #$ ^. &. >.. &. c^. &.. &. c^. &. #8$ '. &. #8$ #. &. '.. #.. '.. #.. #$ t. &. #$. &. t.... t.... #8$. >. #8$. The definition of snchronous composition is comple due to the induction on a pair of BDDs instead of just a single BDD. The first BDD in the pair is easiest to understand. There are two smmetricall distinct cases aa #. &. cc '#. &. = #. &. The BDD aa represents the continuation of non-conflicting substitutions where no value is substituted for, and is false in the current state. This BDD is the first element of the snchronous composition of the subsstems represented b. and. of and since the substitutions represented b these sstems are the onl continuations of substitutions not containing, when is false. Similarl, cc represents the continuation of non-conflicting substitutions where is assigned false. This can happen in two was: does not substitute on and assigns it to false, or assigns to false and does not substitute on it. The second BDD represents the error states. There is one smmetricall distinct case gg =#8$. &. #$ '. &. #$ #. &. #$. &. '.. #.. #$. &. '.. #.. The five epressions on the form #$ &/. are the conflicts happening in the previous or remaining levels, while the four epressions on the form are conflicts happening at the current level: assigns to true and assigns to true, assigns to true and assigns to false, assigns to false and assigns to true, and assigns to false and assigns to false. Due to the snchronous composition, is the intersection of all the possible states reachable b and (notice that this includes error states). The correctness of the BDD implementation is proven in Appendi A. Theorem (Correctness) For an command, ", K LL 6MM... Proof: See Appendi A. 2.3 Image Computation The operation computes the image of a domain represented b the embedding D of a set of states represented in the usual wa b a BDD. The image operation is undefined if has a conflict substitution (> ) for some state in. The operation is defined b structural induction on and. Base Case ( " 2 H " H ) #"$ t&')( t*.,+ =. -/. {02 3 can also be defined inductivel in the same wa as 4.
8 Inductive Case Let D = a b c d e f, g h and R = G H We then have gg hh where gg t hh ^ The preimage computation can be defined in a similar wa. 3 Flip BDDs Flip BDDs are related to substitution BDDs ecept that there is a one-to-one correspondence between a flip BDD and the transition sstem it represents. The flip BDD representation has been developed to investigate the computational efficienc of the image computation based on this representation compared to the usual image computation based on the characteristic function of the transition relation. As usual let U : #(( define a nonempt set of Boolean state variables. A possibl nondeterministic transition sstem on is defined b the pair where H is the finite state space spanned b and SR is a transition function. A flip BDD is a BDD on the ordered set of variables defined b #. >[ " #. K " [8.e} [{.+. Thus, an assignment to ' # uniquel defines a transition where the primed variables encode the set of variables that have their truth value flipped b the transition. 6
9 3. Image calculation The operation computes the image of a set of states. The set of states is represented b a BDD in the usual wa, while the transition sstem is given as a flip BDD. The ordering of the variables in ordering of the pairs in. is the same as the Base Case ( E"l ) Inductive Case = 3.2 Eperimental Results The following eperiments are based on an implementation of in the Budd package [6]. The first eperiment compares the CPU time of 0 fied point calculations using flip BDDs and the relational product operator 2. The Budd package was initialized with 0000 BDD nodes and an operator cache varing from 0 to 00 percent of the number of BDD nodes. The transition sstem and the set of initial states are randoml generated using 0 state variables and 000 transitions. The results are shown in table. As depicted in the table, the flip BDD image computations seem to Cache size () (sec) (sec) Table : CPU time of 0 fied point calculations as a function of operator cache size for flip BDD image computations ( ) and image computations based on relational products ( ). be less cache dependent than image computations based on the relational product. This is an encouraging result since cache efficienc is essential for keeping the compleit of BDD operations low. Moreover, these results were obtained with a naive eperimental implementation of that actuall unfolds the BDDs on the fl to perform the computation. It is, however, surprising that the relational product operation has highest performance at 80 rather than As most other BDD packages, Budd emplos a highl optimized version of the relational product operation. 7
10 The second eperiment compares the CPU time of 000 fied point calculations using flip BDDs and the relational product operator. The Budd package was initialized to BDD nodes and the cache to 0000 BDD nodes. The transition sstem and the set of initial states are randoml generated using 0 state variables and 000 to 0000 transitions. The results are shown in table 2. These results show some, but not an overwhelming, advantage of the flip Transitions (sec) (sec) Table 2: CPU time of 000 fied point calculations as a function of number of transitions for flip BDD image computations ( ) and image computations based on relational products ( ). BDD approach. For 000 randoml generated eperiments, it is surprising that the problems with 6000 transitions are so much harder than the ones with 000 transitions. Also, information about the cache miss rates for both approach would be valuable. It seems necessar to conduct further eperiments to get a deeper insight in the performance differences between the two approaches. It is also a problem that the eperiments are based solel on randoml generated transition sstems. It is well known that there often is a significant difference between the performance on random and real-world problems for a particular approach. 4 Conclusion In this report, we have introduced two novel BDD representations of transition sstems called substitution and flip BDDs. The first representation is suitable for tracing variable assignment conflicts in snchronous and asnchronous sstem compositions. The second provides a promising alternative to the relational product operation for state space eploration. Future work includes developing efficient algorithms for manipulating these representations without unfolding the BDDs on the fl. In addition, more eperiments are necessar comparing the efficienc of image computations based on flip BDDs and the relational product. These eperiments should include both real-world and random problems. Acknowledgments Most of the work presented in this rapport was carried out in the summer 2000 and 200 while the first author was visiting the IT Universit of Copenhagen. This work was supported in part b the Danish Research Agenc. References [] E. Asarin, O. Maler, and A. Pnueli. Smbolic controller snthesis for discrete and timed sstems. In Hbrid Sstems, pages 20, 994. [2] R. E. Brant. Graph-based algorithms for boolean function manipulation. IEEE Transactions on Computers, 8:677 69, 986. [3] J. R. Burch, E. Clarke, D. L. Long, K. L McMillan, and D. L. Dill. Smbolic model checking for sequential circuit verification. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Sstems, 3(4):40 424,
11 [4] A. Cimatti, M. Roveri, and P. Traverso. Automatic OBDD-based generation of universal plans in non-deterministic domains. In Proceedings of the th National Conference on Artificial Intelligence (AAAI 98), pages AAAI Press, 998. [] L. De Alfaro, Henzinger T. A., and O. Kupferman. Concurrent reachabilit games. In IEEE Smposium on Foundations of Computer Science, pages 64 7, 998. [6] J. Lind-Nielsen. BuDD - A Binar Decision Diagram Package. Technical Report IT-TR: , Institute of Information Technolog, Technical Universit of Denmark, [7] K. L. McMillan. Smbolic Model Checking. Kluwer Academic Publ., 993. [8] C. Meinel and T. Theobald. Algorithms and Data Structures in VLSI Design. Springer, 998. [9] A. Vahidi, B. Lennartson, D. Arkerd, and M. Fabian. Efficient application of smbolic tools for resource booking problems. In Proceedings of the American Control Conference,
12 A Proof of Correctness First we introduce some auiliar definitions and lemmas. Lemma ( ) K LL MM. K LL MM. [ K LL MM[ ~` } K LL MM\[ } ~ Proof: K LL MM. K LL MM. [ > K LL 3MM.+. [ > K LL =2fMM.+. [ due to def. of K LL 3MM\[ } ~` K LL 6MM\[ } ~ due to def. of #8$ K LL 3MM.+. [ #8$ K LL =2fMM.+. [ Definition (. ). ) ( 0 0 * + ) ( 0 * + ) (=* (*0 0 + (*02+ ( " H VAR.+. J G ( ([ " H Var #8$.+. c[ J 9[82.. Definition 2 ( K LL 6MM. ) K LL 6MM. ) ( 0 0 * + ) ( 0 * + ) (=* (*0 0 + (*0 + ( " H VAR K9LL 6MM.+. J 2./. 4./ ( ([ " H Var #$ K9LL 6MM.+. c[ J c[{.. Definition 3 (aa) K9LL ) ( (* MM ([ " H Var ( = gg " K LL 6MM [ J 9[82.. "] dom g. Lemma 2 (aa) Proof: K LL 6MM. ( ( K LL ) ( (=* MM. K9LL 6MM. ( (. " H VAR.+. J due to def. K LL fmm. >gl" K9LL 3 b) (=* /A > K #" g.. g9./. K #". #" g. 2. (*0 02+ (*02+ ( 0
13 due to def. of >gl" K9LL 3 b) (=* /A > K #" g.. g9./. K #" A (. #" l] " g. g. >gl" g K9LL 3 b) (=* ] " g. A > K #" g.. g9./. K #" A (. #" g. K9LL ) ( (* MM.+. due to def. aa #$ K LL 6MM. ( (. [ " H Var #$ K LL 6MM.+. [ J 9[82.. due to def. K LL fmm. > " g gl" K9LL 6MMbc[ J 9[{.. due to def. of > " g gl" K9LL 6MMbc[ J 9[{.. l] " g. #$ K LL ) ( (=* MM./. due to def. aa ( Definition 4 (cc) K9LL ) MM ([ " H Var ( ggl" K LL fmm [ J 9[82.. l L C] M " g g >. Lemma 3 (cc) Proof: K LL 6MM. ( ( 0 + ( K LL ) ( ( 0 + (=* MM. K LL 6MM. ( ( 0 + (. " H VAR K LL 6MM.+. J due to def. K LL 6MM. >gl" K LL 3 b) (=* A > K#" g.. g9./. K#" U. #" g.. 2. due to def. of >gl" K LL 3 b) (=* A > K#" g.ba (. g9./. ( (*02+ (
14 K#" U A (. #" " g. g92. g. >gl" g K LL 3 b) (=* L C] M " g A > K#" g.ba (. g9./. K#" U A (. #" g. >gl" g K LL 3 b) (=* l L ] M " g g >. A > K#" g.ba (. g9./. K#" U A (. #" g. K LL ) ( ( 0 + (=* MM.+. due to def. cc #$ K LL fmm. ( ( 0 + (. [ " H Var #$ K LL fmm.+. [ J 9[82.. due to def. K LL 6MM. > " g gl" K LL 6MM [ J 9[82.. due to def. of > " g gl" K LL 6MM [ J 9[82.. L C] M " g g >. #$ K LL ) ( ( 0 + (=* MM./. due to def. cc ( Definition (ee) K LL )2 6. MM [ " H Var ( = ggl" K9LL 6MMbc[ J 9[{.. l L C] M " g g >. Lemma 4 (ee) K LL 6MM. ( ( 0 + ( K LL ) ( ( 0 + (=* MM. Proof: Smmetric to the proof of lemma cc We are now read to prove the main theorem Theorem (Correctness) For an command, ", K LL 6MM... Proof: We prove b structural induction on. Basis In the base case, is an atomic command 2
15 We have K LLUMM.+. >g " L ]' #, ], M j_ LL 3. MM _ LL MMc K #" g.. g9.+. K ". " g. due to def. of and K :. G.,,../. due to def. of and #$ K9LL {MM./. [ > " K LL {MMZ[. [ #$.+. [ due to def. of due to def. of Thus, K LL {MM... Inductive Cases ( 2 and & 2 ) The structural induction hpothesis (IH I) is. K9LL 3MM. =2. K9LL =2fMM. I. Assume 2. We have K LL 2 MM./. >g " K LL J K LL 2 3 A > K #" g.. g9.+. K ". " g. due to def. of and K >g " K LL A > K #" g.. g9.+. 3
16 K ". " g. >g " K LL 3 A > K #" g.. g9.+. K ". " g../. 2./. due to IH I 2.+. due to def. of and #$ K LL " 2 MM.+. [ > " K LL 3MM\[ J K LL 2 MM\[ due to def. of and K > " K LL MM\[ > " K LL =2=MM #$./. [ #$ 2./. [ due to IH I #$ 2.+. [ due to def. of Thus, K LL 2 MM. 2.. II. Assume & 2. Consider the BDD,, representing the command, Without loss of generalit we assume that Since is assumed to be non-reduced, we have Consider the propert We want to prove that. is a non-reduced BDD. Let equal the number of #. levels. $. with the definition $. & 2. K LL & 2 MM. for & 2. $ $. holds for all $. We do this b induction on $.. Basis ($ ) Assume &=2. and U. First we prove & 2.+. K LL & 2 MM./. 4
17 Case. &= & =2.+.. due to def. of K LL MM. & K LL =2MM./.. due to IH I K LL 6MM.+.. K LL 2 MM./.. due to base case def. of & >gl" K LL 6MMb.BA > #i] " g.+. >gl" K LL 2 MM.A > "] g./. due to def. of >gl" g( hog 2 g( " K LL 6MMb. 3g 2 " K LL 2 MM. A > i] " g. due to def. of h >gl" K LL 3 A > K #" g.. g9.+. K #". #" g. for. K LL & 2 MM.+.. due to def. of Case.. and. Smmetric to case. Case. & K9LL 6MM. & K LL 2 MM.+.. using the same steps as in case E. K9LL 6MM.+.. K LL 2 MM./. +=. K9LL 6MM.+.?+. K LL 2 MM./.. due to base case def. of & >g " K LL MMb.BA > L ] M:" g. l >gl" K9LL =2fMM. A > "] g.+. >g " K LL MMb.BA > #i] " g.+. l >g " K9LL =2fMM.BA > L :] M" g. due to def. of >g "l g hig2 g " K LL MMb. /gc2 " K LL 2fMM. A > L :] M" g due to def. of h >g " K LL & 2 A > K #" g.. g9./. K " U. #" g. for. K9LL &=2=MM./.. due to def. of Case.. and. Smmetric to case.
18 We then prove Case [. #$ &=2./. #8$ K LL &=2=MM.+. #$ & 2./.. #$ K LL 6MM. & K9LL 2 MM.+.. using the same steps as in case. K9LL MM.+.. =#8$ K LL =2fMM.+.. #$ K LL MM./.. K LL =2=MM.+.. #$ K LL MM./.. #$ K LL =2=MM./.. K9LL MM.+.. #$ K LL =2=MM./.. #$ K LL 6MM./.. K LL 2 MM.+.. #$ K LL 6MM./.. #$ K LL 2 MM./.. K9LL 3MM.+.. #$ K LL 2 MM./.. #$ K LL 6MM./.. K LL 2 MM.+.. #$ K LL 6MM./.. #$ K LL 2 MM./.. K9LL 3MM.+.. =#8$ K LL 2 MM.+.. #$ K LL 6MM./.. K LL 2 MM.+.. #$ K LL MM./.. #$ K LL =2=MM./.. K9LL MM.+.. =#8$ K LL =2fMM.+.. #$ K LL MM./.. K LL =2=MM.+.. #$ K LL MM./.. #$ K LL =2=MM./.. > K9LL 3MM #$ K LL 3MM.+.. > K9LL 2 MM #$ K LL 2 MM.+.. > K9LL MM #$ K LL MM.+.. > K9LL 2 MM #$ K LL 2 MM.+.. > K9LL MM #$ K LL MM.+.. > K9LL 2 MM #$ K LL 2 MM.+.. > K9LL MM #$ K LL MM.+.. > K9LL 2 MM #$ K LL 2 MM.+.. due to base case def. of & >g " K LL fmmb. A > #i] " g.+. > " K9LL 2 MM. > " K LL 3MM. l >gl" K LL 2 MM. A > #i] " g.+. > " K LL 3MM. > " K LL 2 MM. >g " K LL fmmb. A > L ] M:"#g. > " K LL 2 MM. > " K LL MM. l >gl" K LL 2fMM. A > #i] " g.+. > " K LL MM. > " K LL =2fMM. >g " K LL MMb. A > L ] =M:"#g. > " K LL =2=MM. > " K LL MM. l >gl" K LL 2fMM. A > #i] " g.+. > " K LL 3MM. > " K LL 2 MM. >g " K LL fmmb. A > #i] " g.+. > " K9LL 2 MM. 6
19 Case [. Smmetric to case [. > " K LL 3MM. l >gl" K LL 2 MM. A > L ] M:" g. > " K LL 3MM. > " K LL 2 MM. >g " K LL MMb. A > #i] " g.+. > " K9LL =2fMM. > " K LL MM. l >gl" K LL 2fMM. A > L ] =M:" g. > " K LL MM. > " K LL =2fMM. >gl" K LL MM. L ] M "#g. > " K LL MMb. >gl" K LL 2 MM. L ] M "#g. > " K LL 2 MMb. >gl" K LL MM. L ] =M "#g. > " K LL MMb. >gl" K LL 2 MM. L ] M "#g. > " K LL 2 MMb. >gl" K LL MM. L ] M "#g. > " K LL MMb. >gl" K LL 2 MM. L ] =M "#g. > " K LL 2 MMb. >gl" K LL fmm. L ] =M "#g. > " K LL 3MMb. >gl" K LL =2MM. L ] =M "#g. > " K LL 2fMMb. due to def. of >g " K9LL 6MM. /g 2 " K9LL 2 MM. /g > g 2 > t{vw. g(. z t8vw. g 2. } ~ > " g( hog 2 g " K9LL 3MM. /g 2 " K9LL 2 MM. due to def. of h #$ K LL & 2 MM.+.. due to def. of Thus & 2. K LL & 2 MM. for & 2.. Inductive Step ($ ) The induction hpothesis (IH II) is that. holds. That is $ & 2. K9LL & 2 MM. for & 2. $ First we prove We have & 2.+. =. & 2.+. due to def. of &=2./. K LL &=2fMM.+. fst * a b c d e f, g h A B C D E F, G H 7
20 aa bb cc dd ee ff where aa #. &. bb ^. &. cc '#. &. dd = t. &. ee = #. &. ff. &. qqqqqqp r " H VAR sqqqqqq due to the semantics of BDDs Case aa. &. = c^. &.. &. = c^. &. aa A bb A Z.. cc A dd A ee A ff A We want to prove where " H VAR ( (*0 + (. We have aa K LL &=2=MM./. J aa. ( ( &. ( (. K LL MM. ( ( & K LL =2fMM. ( (. due to IH I K LL ) ( (* MM. & K LL 2 ) ( (=* MM./. due to lem. aa ) ( (=*. & 2 ) ( (=*.+. due t0 IH I ) ( (=* & 2 ) ( (=*.+. due to def. of K LL ) ( (* & 2 ) ( (* MM.+. due to IH II >g " g hogc2 g " K LL ) ( (=* 3 3gC2 " K LL 2 ) ( (=* 3 A > K#" g.. g9.+. K#" U A (. #" g. due to def. of and & >g " g hogc2 g " K LL 3 b) (=* l] " g. g2 " K9LL 3 b) (=* l] " g2. A > K#" g.. g9.+. 8
21 K#" U A (. #" due to lem. aa g. >g " g hogc2 g " K LL 3 b) (=* g2 " K9LL 3 b) (=* A > K#" g.. g9.+. K#" U A (. #" g. ] " g. due to def. of h >g " g hogc2 g " K LL 3 g2 " K9LL 3 U A > K#" g. b. g9./. K#" U. #" g. k`mcn n J 3 ( >g " K LL &=2fMM. A > K#" g. b. g9./. K#" U. #" g. due to def. of & K LL & 2 MM.+. J due to def. of Case bb smmetric to case aa Case cc We want to prove where " H VAR ( ( 0 + (. We have cc K LL & 2 MM.+. J cc K LL ) ( ( 0 + (=* & 2 ) ( (=* MM./. K LL ) ( (* & 2 ) ( ( 0 + (=* MM./. using the same steps as in the proof of case aa gl" g( 4hig 2 g( " K LL ) ( ( 0 + (=* 3 3g 2 " K LL 2 ) ( (* A > K#" g.. g9./. K#" U A (. #" g. gl" g( 4hig 2 g( " K LL ) ( (* /g 2 " K LL 2 ) ( ( 0 + (* A > K#" g.. g9./. K#" U A (. #" g. due to def. of and & gl" g( 4hig 2 9
22 @ g " K9LL ) ( ( 0 + (=* g 2 " K9LL 2 ) ( (=* MM?3 g " K9LL ) ( (=* 3 g 2 " K LL 2 ) ( ( 0 + (=* MM?3 A > K#" g.. g9./. K#" U A (. #" g. gl" g( 4hig 2 g " K9LL 6MM 3 b) (=* /* l L ] M "#g g >. g 2 " K9LL 2 MM 3 b) (=* /* l] " g 2. g " K9LL MM 3 b) (=* /* l] " gc2. g2 " K9LL =2=MM 3 b) (=* /* l L ] M "#g g >. A > K#" g.. g9./. K#" U A (. #" g. due to lem. cc >gl" g hig 2 g( e" K LL 3 b) (=* g2 " K9LL 3 b) (* A > K#" g.. g9./. K#" U A (. #" g. " g. g92. due to def. of h >gl" g hig2 g " K LL 3 g2 " K9LL 3 A > K#" g. b. g9.+. K#" U c. #" g. k`mn n J. 6 3 ( >gl" K LL &2fMM. A > K#" g.. g9.+. K#" U. #" g. due to def. of & K LL & 2 MM./. J due to def. Case dd,ee and ff smmetric to case cc Thus & 2./. K LL & 2 MM.+.. We then prove #$ &=2./. #8$ K LL &=2=MM.+. We have 20
23 #$ & 2./. =#8$. & 2.+. due to def. of snd * a b c d e f, g h A B C D E F, G H gg hh where gg =#8$. &. #$ '#. &. #$. &. #$. &. '#.... #$. &. '#.... hh #$ c^. &. #$ t. &. =#8$. &. #8$ c^. &. t.... #8$ c^. &. t.... [ " H Var gg [ A [8.. 9[82. [ A [8.. [82. hh due to the semantics of BDDs Case gg We want to prove where " H Var we get (. gg #$ K LL &=2fMM.+. J 2.. gg #$ K LL ) ( (=* & 2 ) ( (=* MM.+. [ #$ K LL ) ( ( 0 + (=* & 2 ) ( (=* MM./. [ #$ K LL ) ( ( 0 + (=* & 2 ) ( (=* MM./. [ #$ K LL ) ( (=* & 2 ) ( ( 0 + (=* MM./. [ #$ K LL ) ( (=* & 2 ) ( ( 0 + (=* MM./. [ K LL ) ( ( 0 + (=* MMZ[ ~` } K LL 2 ) ( ( 0 + (=* MMZ[ ~ } K LL ) ( ( 0 + (=* MM\[ } ~` K LL 2 ) ( ( 0 + (=* MM[ } ~ K LL ) ( ( 0 + (=* MMZ[ ~` } K LL 2 ) ( ( 0 + (=* MM[ } ~ K LL ) ( ( 0 + (=* MM\[ } ~` K LL 2 ) ( ( 0 + (=* MM\[ } ~ using the same steps as in the proof of case aa and lemma > " g hog 2 g( " K LL 6MMbc[ J 9[8.. l] " g. gc2 " K LL =2=MMbc[ J 9[8.. l2 ] " gc2. L C] M " gc2 L ] =M " gc2 g2 >. gc2 " K LL =2=MMbc[ J 9[8.. l] " g2. 2
24 g( " K LL 6MMbc[ J 9[8.. l2 ] " g(. L C] M " g( L ] =M " g( g >. g g " K LL MMbc[ J 9[{.. l L C] M " g L ] M " g g >. ~` } g g " K LL 2fMMbc[ J 9[{.. l L C] M " g L ] M " g g >. ~ } and def. of > " g hog 2 g( " K LL 6MMbc[ J 9[8.. l] " g. g 2 " K LL 2 MMbc[ J 9[8.. l2 ] " g 2. L C] M " g 2 L ] =M " g 2 g 2 >. g 2 " K LL 2 MMbc[ J 9[8.. l] " g 2. g( " K LL 6MMbc[ J 9[8.. l2 ] " g(. L C] M " g L ] =M " g g >. > " g hogc2 g " K LL MMbc[ J 9[8.. l L C] M " g gc2 " K LL =2=MMbc[ J 9[8.. l L C] M " g2 L C] M "#g. L C] M "#gc2. > " g hog 2 g( e" K LL 3MM[ /g 2 " K9LL 2 MM D B/@ACB+D D/@D. > " g hog 2 g( e" K LL 3MM[ /g 2 " K9LL 2 MM\[ D B/@ACB+D D/@D. k`mn n [ [ J 9[82. due to def. of h > " g hogc2 g " K LL MM[ /g2 " K9LL =2fMM\[ #$ K LL &=2.+. [ J 9[82.. due to def. of and & Case hh Smmetric to case gg Thus &=2. K LL &=2=MM. for &=2. $. 22
The Maze Generation Problem is NP-complete
The Mae Generation Problem is NP-complete Mario Alviano Department of Mathematics, Universit of Calabria, 87030 Rende (CS), Ital alviano@mat.unical.it Abstract. The Mae Generation problem has been presented
More information8. BOOLEAN ALGEBRAS x x
8. BOOLEAN ALGEBRAS 8.1. Definition of a Boolean Algebra There are man sstems of interest to computing scientists that have a common underling structure. It makes sense to describe such a mathematical
More informationBasing Decisions on Sentences in Decision Diagrams
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence Basing Decisions on Sentences in Decision Diagrams Yexiang Xue Department of Computer Science Cornell University yexiang@cs.cornell.edu
More informationCpE358/CS381. Switching Theory and Logical Design. Class 2
CpE358/CS38 Switching Theor and Logical Design Class 2 CpE358/CS38 Switching Theor and Logical Design Summer- 24 Copright 24 Stevens Institute of Technolog -45 Toda s Material Fundamental concepts of digital
More informationBinary Decision Diagrams
Binar Decision Diagrams Ma 3, 2004 1 Overview Boolean functions Possible representations Binar decision trees Binar decision diagrams Ordered binar decision diagrams Reduced ordered binar decision diagrams
More informationASYNCHRONOUS SEQUENTIAL CIRCUITS
ASYNCHRONOUS SEQUENTIAL CIRCUITS Sequential circuits that are not snchronized b a clock Asnchronous circuits Analsis of Asnchronous circuits Snthesis of Asnchronous circuits Hazards that cause incorrect
More informationAn analytic proof of the theorems of Pappus and Desargues
Note di Matematica 22, n. 1, 2003, 99 106. An analtic proof of the theorems of Pappus and Desargues Erwin Kleinfeld and Tuong Ton-That Department of Mathematics, The Universit of Iowa, Iowa Cit, IA 52242,
More information}w!"#$%&'()+,-./012345<ya FI MU. On Clock-Aware LTL Properties of Timed Automata. Faculty of Informatics Masaryk University Brno
}w!"#$%&'()+,-./01245
More informationSymbolic Real Time Model Checking. Kim G Larsen
Smbolic Real Time Model Checking Kim G Larsen Overview Timed Automata Decidabilit Results The UPPAAL Verification Engine Datastructures for zones Liveness Checking Algorithm Abstraction and Compositionalit
More informationRepresentations of All Solutions of Boolean Programming Problems
Representations of All Solutions of Boolean Programming Problems Utz-Uwe Haus and Carla Michini Institute for Operations Research Department of Mathematics ETH Zurich Rämistr. 101, 8092 Zürich, Switzerland
More informationFinding Limits Graphically and Numerically. An Introduction to Limits
8 CHAPTER Limits and Their Properties Section Finding Limits Graphicall and Numericall Estimate a it using a numerical or graphical approach Learn different was that a it can fail to eist Stud and use
More informationCHAPTER 9: SEQUENTIAL CIRCUITS
CHAPTER 9: ASYNCHRONOUS SEUENTIAL CIRCUITS Chapter Objectives 2 Sequential circuits that are not snchronized b a clock Asnchronous circuits Analsis of Asnchronous circuits Snthesis of Asnchronous circuits
More informationHigher order method for non linear equations resolution: application to mobile robot control
Higher order method for non linear equations resolution: application to mobile robot control Aldo Balestrino and Lucia Pallottino Abstract In this paper a novel higher order method for the resolution of
More informationSection 3.1. ; X = (0, 1]. (i) f : R R R, f (x, y) = x y
Paul J. Bruillard MATH 0.970 Problem Set 6 An Introduction to Abstract Mathematics R. Bond and W. Keane Section 3.1: 3b,c,e,i, 4bd, 6, 9, 15, 16, 18c,e, 19a, 0, 1b Section 3.: 1f,i, e, 6, 1e,f,h, 13e,
More informationBinary Decision Diagrams and Symbolic Model Checking
Binary Decision Diagrams and Symbolic Model Checking Randy Bryant Ed Clarke Ken McMillan Allen Emerson CMU CMU Cadence U Texas http://www.cs.cmu.edu/~bryant Binary Decision Diagrams Restricted Form of
More informationSAT based BDD solver for Quantified Boolean Formulas
SAT based BDD solver for Quantified Boolean Formulas Gilles Audemard and Lakhdar Saïs CRIL CNRS Université d Artois rue Jean Souvraz SP-8 F-62307 Lens Cede France {audemard,sais}@cril.univ-artois.fr Abstract
More informationElectronic Design Automation for Digital Circuits
Electronic Design Automation for Digital Circuits Tutorial Notes Lecturer: U. Schlichtmann Teaching Assistant: M. Barke Room 296, T +49 89 289-23644 barke@tum.de Address: Arcisstr. 2 8333 Munich German
More informationBinary Decision Graphs
Binary Decision Graphs Laurent Mauborgne LIENS DMI, École Normale Supérieure, 45 rue d Ulm, 75 23 Paris cede 5, France Tel: (+33) 44 32 2 66; Email: Laurent.Mauborgne@ens.fr WWW home page: http://www.dmi.ens.fr/~mauborgn/
More information14.1 Systems of Linear Equations in Two Variables
86 Chapter 1 Sstems of Equations and Matrices 1.1 Sstems of Linear Equations in Two Variables Use the method of substitution to solve sstems of equations in two variables. Use the method of elimination
More informationProvable intractability. NP-completeness. Decision problems. P problems. Algorithms. Two causes of intractability:
Provable intractabilit -completeness Selected from Computer and Intractabilit b MR Gare and DS Johnson (979) Two causes of intractabilit: The problem is so difficult that an exponential amount of time
More informationMathematical Statistics. Gregg Waterman Oregon Institute of Technology
Mathematical Statistics Gregg Waterman Oregon Institute of Technolog c Gregg Waterman This work is licensed under the Creative Commons Attribution. International license. The essence of the license is
More information1 Quantum Computing Simulation using the Auxiliary Field Decomposition
1 Quantum Computing Simulation using the Auiliar Field Decomposition Kurt Fischer, ans-georg Matuttis 1, Satoshi Yukawa, and Nobuasu Ito 1 Universit of Electro-Communications, Department of Mechanical
More informationReview of Essential Skills and Knowledge
Review of Essential Skills and Knowledge R Eponent Laws...50 R Epanding and Simplifing Polnomial Epressions...5 R 3 Factoring Polnomial Epressions...5 R Working with Rational Epressions...55 R 5 Slope
More informationMathematics 309 Conic sections and their applicationsn. Chapter 2. Quadric figures. ai,j x i x j + b i x i + c =0. 1. Coordinate changes
Mathematics 309 Conic sections and their applicationsn Chapter 2. Quadric figures In this chapter want to outline quickl how to decide what figure associated in 2D and 3D to quadratic equations look like.
More informationSystems of Linear Equations: Solving by Graphing
8.1 Sstems of Linear Equations: Solving b Graphing 8.1 OBJECTIVE 1. Find the solution(s) for a set of linear equations b graphing NOTE There is no other ordered pair that satisfies both equations. From
More informationA formal semantics of synchronous interworkings
A formal semantics of snchronous interorkings S. Mau a, M. van Wijk b and T. Winter c a Dept. of Mathematics and Computing Science, Eindhoven Universit of Technolog, P.O. Bo 513, 5600 MB Eindhoven, The
More informationFACULTY OF MATHEMATICAL STUDIES MATHEMATICS FOR PART I ENGINEERING. Lectures AB = BA = I,
FACULTY OF MATHEMATICAL STUDIES MATHEMATICS FOR PART I ENGINEERING Lectures MODULE 7 MATRICES II Inverse of a matri Sstems of linear equations Solution of sets of linear equations elimination methods 4
More information8.1 Exponents and Roots
Section 8. Eponents and Roots 75 8. Eponents and Roots Before defining the net famil of functions, the eponential functions, we will need to discuss eponent notation in detail. As we shall see, eponents
More informationVerifying Randomized Distributed Algorithms with PRISM
Verifying Randomized Distributed Algorithms with PRISM Marta Kwiatkowska, Gethin Norman, and David Parker University of Birmingham, Birmingham B15 2TT, United Kingdom {M.Z.Kwiatkowska,G.Norman,D.A.Parker}@cs.bham.ac.uk
More informationInternational Examinations. Advanced Level Mathematics Pure Mathematics 1 Hugh Neill and Douglas Quadling
International Eaminations Advanced Level Mathematics Pure Mathematics Hugh Neill and Douglas Quadling PUBLISHED BY THE PRESS SYNDICATE OF THE UNIVERSITY OF CAMBRIDGE The Pitt Building, Trumpington Street,
More information10.5. Polar Coordinates. 714 Chapter 10: Conic Sections and Polar Coordinates. Definition of Polar Coordinates
71 Chapter 1: Conic Sections and Polar Coordinates 1.5 Polar Coordinates rigin (pole) r P(r, ) Initial ra FIGURE 1.5 To define polar coordinates for the plane, we start with an origin, called the pole,
More informationState-Space Exploration. Stavros Tripakis University of California, Berkeley
EE 144/244: Fundamental Algorithms for System Modeling, Analysis, and Optimization Fall 2014 State-Space Exploration Stavros Tripakis University of California, Berkeley Stavros Tripakis (UC Berkeley) EE
More informationTemporal Formula Specifications of Asynchronous Control Module in Model Checking
Proceedings of the 6th WSEAS International Conference on Applied Computer Science, Tenerife, Canary Islands, Spain, December 16-18, 2006 214 Temporal Formula Specifications of Asynchronous Control Module
More informationFinding Limits Graphically and Numerically. An Introduction to Limits
60_00.qd //0 :05 PM Page 8 8 CHAPTER Limits and Their Properties Section. Finding Limits Graphicall and Numericall Estimate a it using a numerical or graphical approach. Learn different was that a it can
More informationMAT 127: Calculus C, Fall 2010 Solutions to Midterm I
MAT 7: Calculus C, Fall 00 Solutions to Midterm I Problem (0pts) Consider the four differential equations for = (): (a) = ( + ) (b) = ( + ) (c) = e + (d) = e. Each of the four diagrams below shows a solution
More informationCubic and quartic functions
3 Cubic and quartic functions 3A Epanding 3B Long division of polnomials 3C Polnomial values 3D The remainder and factor theorems 3E Factorising polnomials 3F Sum and difference of two cubes 3G Solving
More informationSBMC : Symmetric Bounded Model Checking
SBMC : Symmetric Bounded Model Checing Brahim NASRAOUI LIP2 and Faculty of Sciences of Tunis Campus Universitaire 2092 - El Manar Tunis Tunisia brahim.nasraoui@gmail.com Syrine AYADI LIP2 and Faculty of
More informationReachability Analysis Using Octagons
Reachabilit Analsis Using Octagons Andrew N. Fisher and Chris J. Mers Department of Electrical and Computer Engineering Universit of Utah FAC 0 Jul 9, 0 Digitall Intensive Analog Circuits Digitall intensive
More information1.5. Analyzing Graphs of Functions. The Graph of a Function. What you should learn. Why you should learn it. 54 Chapter 1 Functions and Their Graphs
0_005.qd /7/05 8: AM Page 5 5 Chapter Functions and Their Graphs.5 Analzing Graphs of Functions What ou should learn Use the Vertical Line Test for functions. Find the zeros of functions. Determine intervals
More informationDecision tables and decision spaces
Abstract Decision tables and decision spaces Z. Pawlak 1 Abstract. In this paper an Euclidean space, called a decision space is associated with ever decision table. This can be viewed as a generalization
More informationKeira Godwin. Time Allotment: 13 days. Unit Objectives: Upon completion of this unit, students will be able to:
Keira Godwin Time Allotment: 3 das Unit Objectives: Upon completion of this unit, students will be able to: o Simplif comple rational fractions. o Solve comple rational fractional equations. o Solve quadratic
More informationLesson 15: Piecewise Functions
Classwork Opening Eercise For each real number aa, the absolute value of aa is the distance between 0 and aa on the number line and is denoted aa. 1. Solve each one variable equation. a. = 6 b. = 4 c.
More informationSymbolic Model Checking with ROBDDs
Symbolic Model Checking with ROBDDs Lecture #13 of Advanced Model Checking Joost-Pieter Katoen Lehrstuhl 2: Software Modeling & Verification E-mail: katoen@cs.rwth-aachen.de December 14, 2016 c JPK Symbolic
More information1.2 Relations. 20 Relations and Functions
0 Relations and Functions. Relations From one point of view, all of Precalculus can be thought of as studing sets of points in the plane. With the Cartesian Plane now fresh in our memor we can discuss
More informationSAT Modulo ODE: A Direct SAT Approach to Hybrid Systems
Welcome ATVA 2008 SAT Modulo ODE: A Direct SAT Approach to Hbrid Sstems Andreas Eggers, Martin Fränzle, and Christian Herde DFG Transregional Collaborative Research Center AVACS Outline Motivation Bounded
More informationCrash course Verification of Finite Automata Binary Decision Diagrams
Crash course Verification of Finite Automata Binary Decision Diagrams Exercise session 10 Xiaoxi He 1 Equivalence of representations E Sets A B A B Set algebra,, ψψ EE = 1 ψψ AA = ff ψψ BB = gg ψψ AA BB
More information2.5 CONTINUITY. a x. Notice that Definition l implicitly requires three things if f is continuous at a:
SECTION.5 CONTINUITY 9.5 CONTINUITY We noticed in Section.3 that the it of a function as approaches a can often be found simpl b calculating the value of the function at a. Functions with this propert
More informationTracking Differentiable Trajectories across Polyhedra Boundaries
Tracking Differentiable Trajectories across Polhedra Boundaries Massimo Benerecetti Elect. Eng. and Information Technologies Università di Napoli Federico II, Ital massimo.benerecetti@unina.it Marco Faella
More informationand y f ( x ). given the graph of y f ( x ).
FUNCTIONS AND RELATIONS CHAPTER OBJECTIVES:. Concept of function f : f ( ) : domain, range; image (value). Odd and even functions Composite functions f g; Identit function. One-to-one and man-to-one functions.
More informationReduced Ordered Binary Decision Diagrams
Reduced Ordered Binary Decision Diagrams Lecture #13 of Advanced Model Checking Joost-Pieter Katoen Lehrstuhl 2: Software Modeling & Verification E-mail: katoen@cs.rwth-aachen.de June 5, 2012 c JPK Switching
More informationToda s Theorem: PH P #P
CS254: Computational Compleit Theor Prof. Luca Trevisan Final Project Ananth Raghunathan 1 Introduction Toda s Theorem: PH P #P The class NP captures the difficult of finding certificates. However, in
More informationMA 15800, Summer 2016 Lesson 25 Notes Solving a System of Equations by substitution (or elimination) Matrices. 2 A System of Equations
MA 800, Summer 06 Lesson Notes Solving a Sstem of Equations b substitution (or elimination) Matrices Consider the graphs of the two equations below. A Sstem of Equations From our mathematics eperience,
More informationDecision Procedures for Satisfiability and Validity in Propositional Logic
Decision Procedures for Satisfiability and Validity in Propositional Logic Meghdad Ghari Institute for Research in Fundamental Sciences (IPM) School of Mathematics-Isfahan Branch Logic Group http://math.ipm.ac.ir/isfahan/logic-group.htm
More informationCOMPRESSED STATE SPACE REPRESENTATIONS - BINARY DECISION DIAGRAMS
QUALITATIVE ANALYIS METHODS, OVERVIEW NET REDUCTION STRUCTURAL PROPERTIES COMPRESSED STATE SPACE REPRESENTATIONS - BINARY DECISION DIAGRAMS LINEAR PROGRAMMING place / transition invariants state equation
More informationAutomata, Logic and Games: Theory and Application
Automata, Logic and Games: Theory and Application 1. Büchi Automata and S1S Luke Ong University of Oxford TACL Summer School University of Salerno, 14-19 June 2015 Luke Ong Büchi Automata & S1S 14-19 June
More informationMéthode logique multivaluée de René Thomas et logique temporelle
Méthode logique multivaluée de René Thomas et logique temporelle Gilles Bernot Universit of Nice sophia antipolis, I3S laborator, France Menu 1. Models and formal logic 2. Thomas models for gene networks
More informationChapter 4 Analytic Trigonometry
Analtic Trigonometr Chapter Analtic Trigonometr Inverse Trigonometric Functions The trigonometric functions act as an operator on the variable (angle, resulting in an output value Suppose this process
More informationBounded LTL Model Checking with Stable Models
Bounded LTL Model Checking with Stable Models Keijo Heljanko and Ilkka Niemelä Helsinki University of Technology Dept. of Computer Science and Engineering Laboratory for Theoretical Computer Science P.O.
More informationThis article describes a task leading to work on curve sketching, simultaneous equations and
Closed but provocative questions: Curves enclosing unit area Colin Foster, School of Education, Universit of Nottingham colin.foster@nottingham.ac.uk Abstract This article describes a task leading to work
More informationMAT 127: Calculus C, Spring 2017 Solutions to Problem Set 2
MAT 7: Calculus C, Spring 07 Solutions to Problem Set Section 7., Problems -6 (webassign, pts) Match the differential equation with its direction field (labeled I-IV on p06 in the book). Give reasons for
More informationINTRODUCTION GOOD LUCK!
INTRODUCTION The Summer Skills Assignment for has been developed to provide all learners of our St. Mar s Count Public Schools communit an opportunit to shore up their prerequisite mathematical skills
More information1 Algebraic Methods. 1.1 Gröbner Bases Applied to SAT
1 Algebraic Methods In an algebraic system Boolean constraints are expressed as a system of algebraic equations or inequalities which has a solution if and only if the constraints are satisfiable. Equations
More information3.3 Logarithmic Functions and Their Graphs
274 CHAPTER 3 Eponential, Logistic, and Logarithmic Functions What ou ll learn about Inverses of Eponential Functions Common Logarithms Base 0 Natural Logarithms Base e Graphs of Logarithmic Functions
More informationCIRCUIT COMPLEXITY AND PROBLEM STRUCTURE IN HAMMING SPACE
CIRCUIT COMPLEXITY AND PROBLEM STRUCTURE IN HAMMING SPACE KOJI KOBAYASHI Abstract. This paper describes about relation between circuit compleit and accept inputs structure in Hamming space b using almost
More informationSymmetry Arguments and the Role They Play in Using Gauss Law
Smmetr Arguments and the Role The la in Using Gauss Law K. M. Westerberg (9/2005) Smmetr plas a ver important role in science in general, and phsics in particular. Arguments based on smmetr can often simplif
More informationFormal Methods Lecture VII Symbolic Model Checking
Formal Methods Lecture VII Symbolic Model Checking Faculty of Computer Science Free University of Bozen-Bolzano artale@inf.unibz.it http://www.inf.unibz.it/ artale/ Academic Year: 2006/07 Some material
More informationModel Inverse Variation. p Write and graph inverse variation equations. VOCABULARY. Inverse variation. Constant of variation. Branches of a hyperbola
12.1 Model Inverse Variation Goal p Write and graph inverse variation equations. Your Notes VOCABULARY Inverse variation Constant of variation Hperbola Branches of a hperbola Asmptotes of a hperbola Eample
More informationPredicate Abstraction in Protocol Verification
Predicate Abstraction in Protocol Verification Edgar Pek, Nikola Bogunović Faculty of Electrical Engineering and Computing Zagreb, Croatia E-mail: {edgar.pek, nikola.bogunovic}@fer.hr Abstract This paper
More informationLecture 5. Equations of Lines and Planes. Dan Nichols MATH 233, Spring 2018 University of Massachusetts.
Lecture 5 Equations of Lines and Planes Dan Nichols nichols@math.umass.edu MATH 233, Spring 2018 Universit of Massachusetts Februar 6, 2018 (2) Upcoming midterm eam First midterm: Wednesda Feb. 21, 7:00-9:00
More information3.2 LOGARITHMIC FUNCTIONS AND THEIR GRAPHS
Section. Logarithmic Functions and Their Graphs 7. LOGARITHMIC FUNCTIONS AND THEIR GRAPHS Ariel Skelle/Corbis What ou should learn Recognize and evaluate logarithmic functions with base a. Graph logarithmic
More informationTable of Contents. At a Glance. Power Standards. DA Blueprint. Assessed Curriculum. STAAR/EOC Blueprint. Release STAAR/EOC Questions
Table of Contents At a Glance Pacing guide with start/ stop dates, Supporting STAAR Achievement lessons, and recommended power standards for data teams Power Standards List of Power Standards b reporting
More informationConsistency as Projection
Consistency as Projection John Hooker Carnegie Mellon University INFORMS 2015, Philadelphia USA Consistency as Projection Reconceive consistency in constraint programming as a form of projection. For eample,
More informationFinite Automata. Mahesh Viswanathan
Finite Automata Mahesh Viswanathan In this lecture, we will consider different models of finite state machines and study their relative power. These notes assume that the reader is familiar with DFAs,
More informationPSPACE-completeness of LTL/CTL model checking
PSPACE-completeness of LTL/CTL model checking Peter Lohmann April 10, 2007 Abstract This paper will give a proof for the PSPACE-completeness of LTLsatisfiability and for the PSPACE-completeness of the
More information2-6. _ k x and y = _ k. The Graph of. Vocabulary. Lesson
Chapter 2 Lesson 2-6 BIG IDEA The Graph of = _ k and = _ k 2 The graph of the set of points (, ) satisfing = k_, with k constant, is a hperbola with the - and -aes as asmptotes; the graph of the set of
More informationStochastic Decision Diagrams
Stochastic Decision Diagrams John Hooker CORS/INFORMS Montréal June 2015 Objective Relaxed decision diagrams provide an generalpurpose method for discrete optimization. When the problem has a dynamic programming
More informationApplications of Gauss-Radau and Gauss-Lobatto Numerical Integrations Over a Four Node Quadrilateral Finite Element
Avaiable online at www.banglaol.info angladesh J. Sci. Ind. Res. (), 77-86, 008 ANGLADESH JOURNAL OF SCIENTIFIC AND INDUSTRIAL RESEARCH CSIR E-mail: bsir07gmail.com Abstract Applications of Gauss-Radau
More informationP is the class of problems for which there are algorithms that solve the problem in time O(n k ) for some constant k.
Complexity Theory Problems are divided into complexity classes. Informally: So far in this course, almost all algorithms had polynomial running time, i.e., on inputs of size n, worst-case running time
More informationDynamics of multiple pendula without gravity
Chaotic Modeling and Simulation (CMSIM) 1: 57 67, 014 Dnamics of multiple pendula without gravit Wojciech Szumiński Institute of Phsics, Universit of Zielona Góra, Poland (E-mail: uz88szuminski@gmail.com)
More informationHamiltonicity and Fault Tolerance
Hamiltonicit and Fault Tolerance in the k-ar n-cube B Clifford R. Haithcock Portland State Universit Department of Mathematics and Statistics 006 In partial fulfillment of the requirements of the degree
More informationSecond-Order Linear Differential Equations C 2
C8 APPENDIX C Additional Topics in Differential Equations APPENDIX C. Second-Order Homogeneous Linear Equations Second-Order Linear Differential Equations Higher-Order Linear Differential Equations Application
More informationChapter 6* The PPSZ Algorithm
Chapter 6* The PPSZ Algorithm In this chapter we present an improvement of the pp algorithm. As pp is called after its inventors, Paturi, Pudlak, and Zane [PPZ99], the improved version, pps, is called
More informationModel checking the basic modalities of CTL with Description Logic
Model checking the basic modalities of CTL with Description Logic Shoham Ben-David Richard Trefler Grant Weddell David R. Cheriton School of Computer Science University of Waterloo Abstract. Model checking
More information2.2. Calculating Limits Using the Limit Laws. 84 Chapter 2: Limits and Continuity. The Limit Laws. THEOREM 1 Limit Laws
84 Chapter : Limits and Continuit. HISTORICAL ESSAY* Limits Calculating Limits Using the Limit Laws In Section. we used graphs and calculators to guess the values of its. This section presents theorems
More informationCCSSM Algebra: Equations
CCSSM Algebra: Equations. Reasoning with Equations and Inequalities (A-REI) Eplain each step in solving a simple equation as following from the equalit of numbers asserted at the previous step, starting
More informationKleene Algebras and Algebraic Path Problems
Kleene Algebras and Algebraic Path Problems Davis Foote May 8, 015 1 Regular Languages 1.1 Deterministic Finite Automata A deterministic finite automaton (DFA) is a model of computation that can simulate
More informationExact SAT-based Toffoli Network Synthesis
Eact SAT-based Toffoli Network Synthesis ABSTRACT Daniel Große Institute of Computer Science University of Bremen 28359 Bremen, Germany grosse@informatik.unibremen.de Gerhard W. Dueck Faculty of Computer
More informationSAT Solvers: Theory and Practice
Summer School on Verification Technology, Systems & Applications, September 17, 2008 p. 1/98 SAT Solvers: Theory and Practice Clark Barrett barrett@cs.nyu.edu New York University Summer School on Verification
More informationComplete Solutions Manual. Technical Calculus with Analytic Geometry FIFTH EDITION. Peter Kuhfittig Milwaukee School of Engineering.
Complete Solutions Manual Technical Calculus with Analtic Geometr FIFTH EDITION Peter Kuhfittig Milwaukee School of Engineering Australia Brazil Meico Singapore United Kingdom United States 213 Cengage
More informationRational Equations. You can use a rational function to model the intensity of sound.
UNIT Rational Equations You can use a rational function to model the intensit of sound. Copright 009, K Inc. All rights reserved. This material ma not be reproduced in whole or in part, including illustrations,
More informationLESSON #42 - INVERSES OF FUNCTIONS AND FUNCTION NOTATION PART 2 COMMON CORE ALGEBRA II
LESSON #4 - INVERSES OF FUNCTIONS AND FUNCTION NOTATION PART COMMON CORE ALGEBRA II You will recall from unit 1 that in order to find the inverse of a function, ou must switch and and solve for. Also,
More informationA Logically Complete Reasoning Maintenance System Based on a Logical Constraint Solver
A Logically Complete Reasoning Maintenance System Based on a Logical Constraint Solver J.C. Madre and O. Coudert Bull Corporate Research Center Rue Jean Jaurès 78340 Les Clayes-sous-bois FRANCE Abstract
More informationLecture Notes On THEORY OF COMPUTATION MODULE -1 UNIT - 2
BIJU PATNAIK UNIVERSITY OF TECHNOLOGY, ODISHA Lecture Notes On THEORY OF COMPUTATION MODULE -1 UNIT - 2 Prepared by, Dr. Subhendu Kumar Rath, BPUT, Odisha. UNIT 2 Structure NON-DETERMINISTIC FINITE AUTOMATA
More informationLinear Equations and Arithmetic Sequences
CONDENSED LESSON.1 Linear Equations and Arithmetic Sequences In this lesson, ou Write eplicit formulas for arithmetic sequences Write linear equations in intercept form You learned about recursive formulas
More informationRising HONORS Algebra 2 TRIG student Summer Packet for 2016 (school year )
Rising HONORS Algebra TRIG student Summer Packet for 016 (school ear 016-17) Welcome to Algebra TRIG! To be successful in Algebra Trig, ou must be proficient at solving and simplifing each tpe of problem
More informationf(x) = 2x 2 + 2x - 4
4-1 Graphing Quadratic Functions What You ll Learn Scan the tet under the Now heading. List two things ou will learn about in the lesson. 1. Active Vocabular 2. New Vocabular Label each bo with the terms
More information7.5 Solve Special Types of
75 Solve Special Tpes of Linear Sstems Goal p Identif the number of of a linear sstem Your Notes VOCABULARY Inconsistent sstem Consistent dependent sstem Eample A linear sstem with no Show that the linear
More informationGeneral Vector Spaces
CHAPTER 4 General Vector Spaces CHAPTER CONTENTS 4. Real Vector Spaces 83 4. Subspaces 9 4.3 Linear Independence 4.4 Coordinates and Basis 4.5 Dimension 4.6 Change of Basis 9 4.7 Row Space, Column Space,
More informationNew Complexity Results for Some Linear Counting Problems Using Minimal Solutions to Linear Diophantine Equations
New Complexity Results for Some Linear Counting Problems Using Minimal Solutions to Linear Diophantine Equations (Extended Abstract) Gaoyan Xie, Cheng Li and Zhe Dang School of Electrical Engineering and
More informationChapter 1 Coordinates, points and lines
Cambridge Universit Press 978--36-6000-7 Cambridge International AS and A Level Mathematics: Pure Mathematics Coursebook Hugh Neill, Douglas Quadling, Julian Gilbe Ecerpt Chapter Coordinates, points and
More information