Substitution and Flip BDDs

Size: px
Start display at page:

Download "Substitution and Flip BDDs"

Transcription

1 Substitution and Flip BDDs Rune M. Jensen and Henrik R. Andersen IT Universit Technical Report Series TR ISSN December 2003

2 Copright c 2003, Rune M. Jensen and Henrik R. Andersen IT Universit of Copenhagen All rights reserved. Reproduction of all or part of this work is permitted for educational or research use on condition that this copright notice is included in an cop. ISSN ISBN Copies ma be obtained b contacting: IT Universit of Copenhagen Glentevej 67 DK-2400 Copenhagen NV Denmark Telephone: Telefa: Web

3 Substitution and Flip BDDs Rune M. Jensen and Henrik R. Andersen Abstract This report introduces two novel approaches for representing transition functions of finite transition sstems encoded as Binar Decision Diagrams (BDDs). The first approach is substition BDDs where each transition is represented b a corresponding substitution on state variables. The second is flip BDDs where each transition is defined b the set of state variables with flipped value. We show that substitution BDDs can be used to find and propagate write conflicts in snchronous and asnchronous compositions. Furthermore, our eperimental evaluation suggest that the compleit of image computations based on flip BDDs ma compare positivel to the usual relational product computation. Introduction Binar Decision Diagrams (BDDs,[2]) have been successfull applied to implicitl search large transition sstems in a wide range of fields including formal verification, planning, control, and game theor (e.g., [3, 4,, 9, ]). Two major approaches for representing the transition function have been developed. The first represents the transition function as a vector of Boolean functions where each function defines the value in the net state of a single state variable (e.g.,[8]). The approach, however, is limited to deterministic transition functions. The second approach is probabl the most popular. It represents the transition function as the characteristic function of the transition relation [7]. It can represent deterministic as well as nondeterministic transition functions. In this report, we introduce two novel transition function representations. Both can represent deterministic as well as nondeterministic transition functions. The first is called substitution BDDs and is based on representing each transition b a substitution on state variables. Since this representation is redundant, it allows write conflicts on state variables to be detected and propagated. The second approach is called flip BDDs. The idea is to represent each transition b the set of state variables it changes. This set is uniquel defined. Thus, flip BDDs are non-redundant. Our preliminar eperimental evaluation indicates that image computations based on flip BDDs ma have lower compleit than the relational product operation used to compute the image when the transition function is represented b the characteristic function of the transition relation. The remainder of the report is organized as follows. In Section 2, we introduce a guarded command language and substitution BDDs for representing its semantics. We also define specialized BDD operators for making snchronous and asnchronous compositions of guarded commands and computing the image of a set of states given a transition sstem represented as a substitution BDD. In Section 3, we introduce flip BDDs. We show how to build a flip BDD from a transition sstem definition. In addition, we define the image operation for a transition sstems represented b a flip BDD and present preliminar eperimental results comparing the performance of fied point computations based on flip BDDs and fied point computations based on the usual relational product. Finall, we draw conclusions and discuss directions for future work in Section 4. 2 Substitution BDDs Substitution BDDs represent snchronous and asnchronous compositions of guarded commands. The abstract snta of the guarded command language is given b COM "#$&'

4 < The operators & and " denote snchronous and asnchronous composition. The variables and are Boolean epressions on a nonempt set of Boolean state variables, ' given b " " where #" An atomic command is eecutable in a state that satisfies the epression on the current state variables. If it eecutes, the $ state variables in & (') +* #')-, */. change value to one of the assignments of 0 ') +* ')-, *. satisfing such that (') * ') +* ')-, * ')-, * in the resulting state. We regard the set of possible assignments of the $ state variables in as substitutions. Eample shows four atomic commands. Eample Four atomic commands are shown below ( ( ( # : ' 2. ; # 2. 2 In an asnchronous composition "#=2 of two guarded commands and =2 at most one transition (or substitution) takes place in each time step. Thus, the substitutions of each state in the resulting command is equal to the union of substitutions for that state of and =2. Snchronous composition & =2 is more complicated, since a substitution in both and 2 happens simultaneousl. For a given state this means that an combination of substitutions of and 2 can happen. In addition, substitutions ma conflict b writing to the same state variable. We assume that a conflict occur even when the two substitutions agree on the new value of the variable. Obviousl other models of snchronous composition could be used. In order to define the semantics of a guarded command formall, we first define a substitution as a partial mapping from variables to truth values or the error substitution, >?@ACB+D E GFIH.4J > A command denotes a domain K LL 6MM D, where D is a mapping from states to sets of substitutions D H9NOP/QN SRUT=VWXZY H SR T=VWXZY The semantic function K9LL 6MM is defined b structural induction on the abstract snta K LL MM\[ L ] ^ #, ] ^, M `_ LL 8MM\[Ga_ LL MMbc[ ^. K LL ed 2 MM\[ K LL fmm\[ J K LL 3MMZ[ K LL & 2 MM\[ g 9hig 2 jg " K LL 3MM\[ g 2 " K LL 2 MM\[U lk`mn n g hogc2 qqp r sqq > ut8vwlg.:z t{vw g2.} ~ > ug > > ug 2 > g( J g 2 D mn k` B n The function K LL ƒ MM defines the usual semantics of a Boolean epression ƒ. Eample 2 shows various compositions of the four atomic commands introduced in Eample. Eample 2 The semantics of the four atomic substitutions presented in Eample and a few compositions are illustrated below 2

5 H ƒ 2 7 > ) H H R H > < L ] M L 2 ] M L : ] # 2 ] =M L 2 ] M L ] M 0 L ] # 2 ] M 0 L L ] M ] #(2] =M 0 2. &87 & 2. Domain Embedding In order to use BDDs to represent the substitution domain of a guarded command, we embed D in a pair of Boolean functions D H NO P3QN SR TVWXZY H SR OP3Q H SR OP/Q D H H H9NO P3QN H * H H NOP3QN H9NOP/QN The first function encodes all the non-conflicting substitutions, while second encodes all the error substitutions. To define these functions, we introduce some auiliar notation For a pair E #., let. " and #$. ", For a Boolean function ƒ '&., let the variable names and domain of ƒ be simultaneousl defined b (*) +-,-,-, + (./ H, For a Boolean function ƒ ( ) + (*0) +-,-,-, + (. + (*0. H and an assignment of the arguments ^ '3^ 3^ & 6^ &. " 2&, let 2 '. ^ ', 2 '. ^ ', 43 ( ^ 6^ &., and 43 ( 0 ^ 6^ &.. A domain embedding is defined b the function D H O'687 H. H OP/Q H. where :9<; # # ' " U. Given a domain ta" D, a substitution transition ^ 6^ 6^ 3^ 6^ 3^., and a state [ ^ 3^f., we have = t.+. >g > CED*F G H g. CED g. =#8$ t.+. [ > "#t([. k`mn n CED*F G H g. K " g.. g9. CED= g. K ". " g. 3

6 2 Thus, =#8$ t./. and t./. encode a state with the variables. In addition, = t.+. encodes the value of a substitution with the variables (see CED*F G H ) and the set of variables in the substitution with the variables (see CED= ). 2.2 The BDD Representation of the Embedding and assume without loss of generalit that the variables are ordered ascend- Let the set of BDD variables equal 9 ; ingl The BDD representation of a command is given b the function. a H O 687 H. H OP3Q H. defined b. :..,,. d #$.+. #8$ 2./.+. & 2.. & 2. where :. and `. are BDD representations of and using to encode the state and to encode the substitution values. The & operation is defined b structural induction on the BDD representation. To simplif the definition, we assume that the BDD is non-reduced such that all nodes are present in the decision tree. Let U. and 2.. Base Case ( Inductive Case Let " H ) &.. =. #$. =#8$. =. #$. #$. L = a b c d e f, g h and R = A B C D E F, G H We then have L * R = aa bb cc dd, ee ff gg hh 4

7 $ where where aa #. &. bb ^. &. cc '#. &. dd = t. &. ee. &. ff. &. gg #$ #. &. #8$ #. &. #8$ #. &. hh #$ ^. &. #$ ^. &. #$ ^. &. >.. &. c^. &.. &. c^. &. #8$ '. &. #8$ #. &. '.. #.. '.. #.. #$ t. &. #$. &. t.... t.... #8$. >. #8$. The definition of snchronous composition is comple due to the induction on a pair of BDDs instead of just a single BDD. The first BDD in the pair is easiest to understand. There are two smmetricall distinct cases aa #. &. cc '#. &. = #. &. The BDD aa represents the continuation of non-conflicting substitutions where no value is substituted for, and is false in the current state. This BDD is the first element of the snchronous composition of the subsstems represented b. and. of and since the substitutions represented b these sstems are the onl continuations of substitutions not containing, when is false. Similarl, cc represents the continuation of non-conflicting substitutions where is assigned false. This can happen in two was: does not substitute on and assigns it to false, or assigns to false and does not substitute on it. The second BDD represents the error states. There is one smmetricall distinct case gg =#8$. &. #$ '. &. #$ #. &. #$. &. '.. #.. #$. &. '.. #.. The five epressions on the form #$ &/. are the conflicts happening in the previous or remaining levels, while the four epressions on the form are conflicts happening at the current level: assigns to true and assigns to true, assigns to true and assigns to false, assigns to false and assigns to true, and assigns to false and assigns to false. Due to the snchronous composition, is the intersection of all the possible states reachable b and (notice that this includes error states). The correctness of the BDD implementation is proven in Appendi A. Theorem (Correctness) For an command, ", K LL 6MM... Proof: See Appendi A. 2.3 Image Computation The operation computes the image of a domain represented b the embedding D of a set of states represented in the usual wa b a BDD. The image operation is undefined if has a conflict substitution (> ) for some state in. The operation is defined b structural induction on and. Base Case ( " 2 H " H ) #"$ t&')( t*.,+ =. -/. {02 3 can also be defined inductivel in the same wa as 4.

8 Inductive Case Let D = a b c d e f, g h and R = G H We then have gg hh where gg t hh ^ The preimage computation can be defined in a similar wa. 3 Flip BDDs Flip BDDs are related to substitution BDDs ecept that there is a one-to-one correspondence between a flip BDD and the transition sstem it represents. The flip BDD representation has been developed to investigate the computational efficienc of the image computation based on this representation compared to the usual image computation based on the characteristic function of the transition relation. As usual let U : #(( define a nonempt set of Boolean state variables. A possibl nondeterministic transition sstem on is defined b the pair where H is the finite state space spanned b and SR is a transition function. A flip BDD is a BDD on the ordered set of variables defined b #. >[ " #. K " [8.e} [{.+. Thus, an assignment to ' # uniquel defines a transition where the primed variables encode the set of variables that have their truth value flipped b the transition. 6

9 3. Image calculation The operation computes the image of a set of states. The set of states is represented b a BDD in the usual wa, while the transition sstem is given as a flip BDD. The ordering of the variables in ordering of the pairs in. is the same as the Base Case ( E"l ) Inductive Case = 3.2 Eperimental Results The following eperiments are based on an implementation of in the Budd package [6]. The first eperiment compares the CPU time of 0 fied point calculations using flip BDDs and the relational product operator 2. The Budd package was initialized with 0000 BDD nodes and an operator cache varing from 0 to 00 percent of the number of BDD nodes. The transition sstem and the set of initial states are randoml generated using 0 state variables and 000 transitions. The results are shown in table. As depicted in the table, the flip BDD image computations seem to Cache size () (sec) (sec) Table : CPU time of 0 fied point calculations as a function of operator cache size for flip BDD image computations ( ) and image computations based on relational products ( ). be less cache dependent than image computations based on the relational product. This is an encouraging result since cache efficienc is essential for keeping the compleit of BDD operations low. Moreover, these results were obtained with a naive eperimental implementation of that actuall unfolds the BDDs on the fl to perform the computation. It is, however, surprising that the relational product operation has highest performance at 80 rather than As most other BDD packages, Budd emplos a highl optimized version of the relational product operation. 7

10 The second eperiment compares the CPU time of 000 fied point calculations using flip BDDs and the relational product operator. The Budd package was initialized to BDD nodes and the cache to 0000 BDD nodes. The transition sstem and the set of initial states are randoml generated using 0 state variables and 000 to 0000 transitions. The results are shown in table 2. These results show some, but not an overwhelming, advantage of the flip Transitions (sec) (sec) Table 2: CPU time of 000 fied point calculations as a function of number of transitions for flip BDD image computations ( ) and image computations based on relational products ( ). BDD approach. For 000 randoml generated eperiments, it is surprising that the problems with 6000 transitions are so much harder than the ones with 000 transitions. Also, information about the cache miss rates for both approach would be valuable. It seems necessar to conduct further eperiments to get a deeper insight in the performance differences between the two approaches. It is also a problem that the eperiments are based solel on randoml generated transition sstems. It is well known that there often is a significant difference between the performance on random and real-world problems for a particular approach. 4 Conclusion In this report, we have introduced two novel BDD representations of transition sstems called substitution and flip BDDs. The first representation is suitable for tracing variable assignment conflicts in snchronous and asnchronous sstem compositions. The second provides a promising alternative to the relational product operation for state space eploration. Future work includes developing efficient algorithms for manipulating these representations without unfolding the BDDs on the fl. In addition, more eperiments are necessar comparing the efficienc of image computations based on flip BDDs and the relational product. These eperiments should include both real-world and random problems. Acknowledgments Most of the work presented in this rapport was carried out in the summer 2000 and 200 while the first author was visiting the IT Universit of Copenhagen. This work was supported in part b the Danish Research Agenc. References [] E. Asarin, O. Maler, and A. Pnueli. Smbolic controller snthesis for discrete and timed sstems. In Hbrid Sstems, pages 20, 994. [2] R. E. Brant. Graph-based algorithms for boolean function manipulation. IEEE Transactions on Computers, 8:677 69, 986. [3] J. R. Burch, E. Clarke, D. L. Long, K. L McMillan, and D. L. Dill. Smbolic model checking for sequential circuit verification. IEEE Transactions on Computer-Aided Design of Integrated Circuits and Sstems, 3(4):40 424,

11 [4] A. Cimatti, M. Roveri, and P. Traverso. Automatic OBDD-based generation of universal plans in non-deterministic domains. In Proceedings of the th National Conference on Artificial Intelligence (AAAI 98), pages AAAI Press, 998. [] L. De Alfaro, Henzinger T. A., and O. Kupferman. Concurrent reachabilit games. In IEEE Smposium on Foundations of Computer Science, pages 64 7, 998. [6] J. Lind-Nielsen. BuDD - A Binar Decision Diagram Package. Technical Report IT-TR: , Institute of Information Technolog, Technical Universit of Denmark, [7] K. L. McMillan. Smbolic Model Checking. Kluwer Academic Publ., 993. [8] C. Meinel and T. Theobald. Algorithms and Data Structures in VLSI Design. Springer, 998. [9] A. Vahidi, B. Lennartson, D. Arkerd, and M. Fabian. Efficient application of smbolic tools for resource booking problems. In Proceedings of the American Control Conference,

12 A Proof of Correctness First we introduce some auiliar definitions and lemmas. Lemma ( ) K LL MM. K LL MM. [ K LL MM[ ~` } K LL MM\[ } ~ Proof: K LL MM. K LL MM. [ > K LL 3MM.+. [ > K LL =2fMM.+. [ due to def. of K LL 3MM\[ } ~` K LL 6MM\[ } ~ due to def. of #8$ K LL 3MM.+. [ #8$ K LL =2fMM.+. [ Definition (. ). ) ( 0 0 * + ) ( 0 * + ) (=* (*0 0 + (*02+ ( " H VAR.+. J G ( ([ " H Var #8$.+. c[ J 9[82.. Definition 2 ( K LL 6MM. ) K LL 6MM. ) ( 0 0 * + ) ( 0 * + ) (=* (*0 0 + (*0 + ( " H VAR K9LL 6MM.+. J 2./. 4./ ( ([ " H Var #$ K9LL 6MM.+. c[ J c[{.. Definition 3 (aa) K9LL ) ( (* MM ([ " H Var ( = gg " K LL 6MM [ J 9[82.. "] dom g. Lemma 2 (aa) Proof: K LL 6MM. ( ( K LL ) ( (=* MM. K9LL 6MM. ( (. " H VAR.+. J due to def. K LL fmm. >gl" K9LL 3 b) (=* /A > K #" g.. g9./. K #". #" g. 2. (*0 02+ (*02+ ( 0

13 due to def. of >gl" K9LL 3 b) (=* /A > K #" g.. g9./. K #" A (. #" l] " g. g. >gl" g K9LL 3 b) (=* ] " g. A > K #" g.. g9./. K #" A (. #" g. K9LL ) ( (* MM.+. due to def. aa #$ K LL 6MM. ( (. [ " H Var #$ K LL 6MM.+. [ J 9[82.. due to def. K LL fmm. > " g gl" K9LL 6MMbc[ J 9[{.. due to def. of > " g gl" K9LL 6MMbc[ J 9[{.. l] " g. #$ K LL ) ( (=* MM./. due to def. aa ( Definition 4 (cc) K9LL ) MM ([ " H Var ( ggl" K LL fmm [ J 9[82.. l L C] M " g g >. Lemma 3 (cc) Proof: K LL 6MM. ( ( 0 + ( K LL ) ( ( 0 + (=* MM. K LL 6MM. ( ( 0 + (. " H VAR K LL 6MM.+. J due to def. K LL 6MM. >gl" K LL 3 b) (=* A > K#" g.. g9./. K#" U. #" g.. 2. due to def. of >gl" K LL 3 b) (=* A > K#" g.ba (. g9./. ( (*02+ (

14 K#" U A (. #" " g. g92. g. >gl" g K LL 3 b) (=* L C] M " g A > K#" g.ba (. g9./. K#" U A (. #" g. >gl" g K LL 3 b) (=* l L ] M " g g >. A > K#" g.ba (. g9./. K#" U A (. #" g. K LL ) ( ( 0 + (=* MM.+. due to def. cc #$ K LL fmm. ( ( 0 + (. [ " H Var #$ K LL fmm.+. [ J 9[82.. due to def. K LL 6MM. > " g gl" K LL 6MM [ J 9[82.. due to def. of > " g gl" K LL 6MM [ J 9[82.. L C] M " g g >. #$ K LL ) ( ( 0 + (=* MM./. due to def. cc ( Definition (ee) K LL )2 6. MM [ " H Var ( = ggl" K9LL 6MMbc[ J 9[{.. l L C] M " g g >. Lemma 4 (ee) K LL 6MM. ( ( 0 + ( K LL ) ( ( 0 + (=* MM. Proof: Smmetric to the proof of lemma cc We are now read to prove the main theorem Theorem (Correctness) For an command, ", K LL 6MM... Proof: We prove b structural induction on. Basis In the base case, is an atomic command 2

15 We have K LLUMM.+. >g " L ]' #, ], M j_ LL 3. MM _ LL MMc K #" g.. g9.+. K ". " g. due to def. of and K :. G.,,../. due to def. of and #$ K9LL {MM./. [ > " K LL {MMZ[. [ #$.+. [ due to def. of due to def. of Thus, K LL {MM... Inductive Cases ( 2 and & 2 ) The structural induction hpothesis (IH I) is. K9LL 3MM. =2. K9LL =2fMM. I. Assume 2. We have K LL 2 MM./. >g " K LL J K LL 2 3 A > K #" g.. g9.+. K ". " g. due to def. of and K >g " K LL A > K #" g.. g9.+. 3

16 K ". " g. >g " K LL 3 A > K #" g.. g9.+. K ". " g../. 2./. due to IH I 2.+. due to def. of and #$ K LL " 2 MM.+. [ > " K LL 3MM\[ J K LL 2 MM\[ due to def. of and K > " K LL MM\[ > " K LL =2=MM #$./. [ #$ 2./. [ due to IH I #$ 2.+. [ due to def. of Thus, K LL 2 MM. 2.. II. Assume & 2. Consider the BDD,, representing the command, Without loss of generalit we assume that Since is assumed to be non-reduced, we have Consider the propert We want to prove that. is a non-reduced BDD. Let equal the number of #. levels. $. with the definition $. & 2. K LL & 2 MM. for & 2. $ $. holds for all $. We do this b induction on $.. Basis ($ ) Assume &=2. and U. First we prove & 2.+. K LL & 2 MM./. 4

17 Case. &= & =2.+.. due to def. of K LL MM. & K LL =2MM./.. due to IH I K LL 6MM.+.. K LL 2 MM./.. due to base case def. of & >gl" K LL 6MMb.BA > #i] " g.+. >gl" K LL 2 MM.A > "] g./. due to def. of >gl" g( hog 2 g( " K LL 6MMb. 3g 2 " K LL 2 MM. A > i] " g. due to def. of h >gl" K LL 3 A > K #" g.. g9.+. K #". #" g. for. K LL & 2 MM.+.. due to def. of Case.. and. Smmetric to case. Case. & K9LL 6MM. & K LL 2 MM.+.. using the same steps as in case E. K9LL 6MM.+.. K LL 2 MM./. +=. K9LL 6MM.+.?+. K LL 2 MM./.. due to base case def. of & >g " K LL MMb.BA > L ] M:" g. l >gl" K9LL =2fMM. A > "] g.+. >g " K LL MMb.BA > #i] " g.+. l >g " K9LL =2fMM.BA > L :] M" g. due to def. of >g "l g hig2 g " K LL MMb. /gc2 " K LL 2fMM. A > L :] M" g due to def. of h >g " K LL & 2 A > K #" g.. g9./. K " U. #" g. for. K9LL &=2=MM./.. due to def. of Case.. and. Smmetric to case.

18 We then prove Case [. #$ &=2./. #8$ K LL &=2=MM.+. #$ & 2./.. #$ K LL 6MM. & K9LL 2 MM.+.. using the same steps as in case. K9LL MM.+.. =#8$ K LL =2fMM.+.. #$ K LL MM./.. K LL =2=MM.+.. #$ K LL MM./.. #$ K LL =2=MM./.. K9LL MM.+.. #$ K LL =2=MM./.. #$ K LL 6MM./.. K LL 2 MM.+.. #$ K LL 6MM./.. #$ K LL 2 MM./.. K9LL 3MM.+.. #$ K LL 2 MM./.. #$ K LL 6MM./.. K LL 2 MM.+.. #$ K LL 6MM./.. #$ K LL 2 MM./.. K9LL 3MM.+.. =#8$ K LL 2 MM.+.. #$ K LL 6MM./.. K LL 2 MM.+.. #$ K LL MM./.. #$ K LL =2=MM./.. K9LL MM.+.. =#8$ K LL =2fMM.+.. #$ K LL MM./.. K LL =2=MM.+.. #$ K LL MM./.. #$ K LL =2=MM./.. > K9LL 3MM #$ K LL 3MM.+.. > K9LL 2 MM #$ K LL 2 MM.+.. > K9LL MM #$ K LL MM.+.. > K9LL 2 MM #$ K LL 2 MM.+.. > K9LL MM #$ K LL MM.+.. > K9LL 2 MM #$ K LL 2 MM.+.. > K9LL MM #$ K LL MM.+.. > K9LL 2 MM #$ K LL 2 MM.+.. due to base case def. of & >g " K LL fmmb. A > #i] " g.+. > " K9LL 2 MM. > " K LL 3MM. l >gl" K LL 2 MM. A > #i] " g.+. > " K LL 3MM. > " K LL 2 MM. >g " K LL fmmb. A > L ] M:"#g. > " K LL 2 MM. > " K LL MM. l >gl" K LL 2fMM. A > #i] " g.+. > " K LL MM. > " K LL =2fMM. >g " K LL MMb. A > L ] =M:"#g. > " K LL =2=MM. > " K LL MM. l >gl" K LL 2fMM. A > #i] " g.+. > " K LL 3MM. > " K LL 2 MM. >g " K LL fmmb. A > #i] " g.+. > " K9LL 2 MM. 6

19 Case [. Smmetric to case [. > " K LL 3MM. l >gl" K LL 2 MM. A > L ] M:" g. > " K LL 3MM. > " K LL 2 MM. >g " K LL MMb. A > #i] " g.+. > " K9LL =2fMM. > " K LL MM. l >gl" K LL 2fMM. A > L ] =M:" g. > " K LL MM. > " K LL =2fMM. >gl" K LL MM. L ] M "#g. > " K LL MMb. >gl" K LL 2 MM. L ] M "#g. > " K LL 2 MMb. >gl" K LL MM. L ] =M "#g. > " K LL MMb. >gl" K LL 2 MM. L ] M "#g. > " K LL 2 MMb. >gl" K LL MM. L ] M "#g. > " K LL MMb. >gl" K LL 2 MM. L ] =M "#g. > " K LL 2 MMb. >gl" K LL fmm. L ] =M "#g. > " K LL 3MMb. >gl" K LL =2MM. L ] =M "#g. > " K LL 2fMMb. due to def. of >g " K9LL 6MM. /g 2 " K9LL 2 MM. /g > g 2 > t{vw. g(. z t8vw. g 2. } ~ > " g( hog 2 g " K9LL 3MM. /g 2 " K9LL 2 MM. due to def. of h #$ K LL & 2 MM.+.. due to def. of Thus & 2. K LL & 2 MM. for & 2.. Inductive Step ($ ) The induction hpothesis (IH II) is that. holds. That is $ & 2. K9LL & 2 MM. for & 2. $ First we prove We have & 2.+. =. & 2.+. due to def. of &=2./. K LL &=2fMM.+. fst * a b c d e f, g h A B C D E F, G H 7

20 aa bb cc dd ee ff where aa #. &. bb ^. &. cc '#. &. dd = t. &. ee = #. &. ff. &. qqqqqqp r " H VAR sqqqqqq due to the semantics of BDDs Case aa. &. = c^. &.. &. = c^. &. aa A bb A Z.. cc A dd A ee A ff A We want to prove where " H VAR ( (*0 + (. We have aa K LL &=2=MM./. J aa. ( ( &. ( (. K LL MM. ( ( & K LL =2fMM. ( (. due to IH I K LL ) ( (* MM. & K LL 2 ) ( (=* MM./. due to lem. aa ) ( (=*. & 2 ) ( (=*.+. due t0 IH I ) ( (=* & 2 ) ( (=*.+. due to def. of K LL ) ( (* & 2 ) ( (* MM.+. due to IH II >g " g hogc2 g " K LL ) ( (=* 3 3gC2 " K LL 2 ) ( (=* 3 A > K#" g.. g9.+. K#" U A (. #" g. due to def. of and & >g " g hogc2 g " K LL 3 b) (=* l] " g. g2 " K9LL 3 b) (=* l] " g2. A > K#" g.. g9.+. 8

21 K#" U A (. #" due to lem. aa g. >g " g hogc2 g " K LL 3 b) (=* g2 " K9LL 3 b) (=* A > K#" g.. g9.+. K#" U A (. #" g. ] " g. due to def. of h >g " g hogc2 g " K LL 3 g2 " K9LL 3 U A > K#" g. b. g9./. K#" U. #" g. k`mcn n J 3 ( >g " K LL &=2fMM. A > K#" g. b. g9./. K#" U. #" g. due to def. of & K LL & 2 MM.+. J due to def. of Case bb smmetric to case aa Case cc We want to prove where " H VAR ( ( 0 + (. We have cc K LL & 2 MM.+. J cc K LL ) ( ( 0 + (=* & 2 ) ( (=* MM./. K LL ) ( (* & 2 ) ( ( 0 + (=* MM./. using the same steps as in the proof of case aa gl" g( 4hig 2 g( " K LL ) ( ( 0 + (=* 3 3g 2 " K LL 2 ) ( (* A > K#" g.. g9./. K#" U A (. #" g. gl" g( 4hig 2 g( " K LL ) ( (* /g 2 " K LL 2 ) ( ( 0 + (* A > K#" g.. g9./. K#" U A (. #" g. due to def. of and & gl" g( 4hig 2 9

22 @ g " K9LL ) ( ( 0 + (=* g 2 " K9LL 2 ) ( (=* MM?3 g " K9LL ) ( (=* 3 g 2 " K LL 2 ) ( ( 0 + (=* MM?3 A > K#" g.. g9./. K#" U A (. #" g. gl" g( 4hig 2 g " K9LL 6MM 3 b) (=* /* l L ] M "#g g >. g 2 " K9LL 2 MM 3 b) (=* /* l] " g 2. g " K9LL MM 3 b) (=* /* l] " gc2. g2 " K9LL =2=MM 3 b) (=* /* l L ] M "#g g >. A > K#" g.. g9./. K#" U A (. #" g. due to lem. cc >gl" g hig 2 g( e" K LL 3 b) (=* g2 " K9LL 3 b) (* A > K#" g.. g9./. K#" U A (. #" g. " g. g92. due to def. of h >gl" g hig2 g " K LL 3 g2 " K9LL 3 A > K#" g. b. g9.+. K#" U c. #" g. k`mn n J. 6 3 ( >gl" K LL &2fMM. A > K#" g.. g9.+. K#" U. #" g. due to def. of & K LL & 2 MM./. J due to def. Case dd,ee and ff smmetric to case cc Thus & 2./. K LL & 2 MM.+.. We then prove #$ &=2./. #8$ K LL &=2=MM.+. We have 20

23 #$ & 2./. =#8$. & 2.+. due to def. of snd * a b c d e f, g h A B C D E F, G H gg hh where gg =#8$. &. #$ '#. &. #$. &. #$. &. '#.... #$. &. '#.... hh #$ c^. &. #$ t. &. =#8$. &. #8$ c^. &. t.... #8$ c^. &. t.... [ " H Var gg [ A [8.. 9[82. [ A [8.. [82. hh due to the semantics of BDDs Case gg We want to prove where " H Var we get (. gg #$ K LL &=2fMM.+. J 2.. gg #$ K LL ) ( (=* & 2 ) ( (=* MM.+. [ #$ K LL ) ( ( 0 + (=* & 2 ) ( (=* MM./. [ #$ K LL ) ( ( 0 + (=* & 2 ) ( (=* MM./. [ #$ K LL ) ( (=* & 2 ) ( ( 0 + (=* MM./. [ #$ K LL ) ( (=* & 2 ) ( ( 0 + (=* MM./. [ K LL ) ( ( 0 + (=* MMZ[ ~` } K LL 2 ) ( ( 0 + (=* MMZ[ ~ } K LL ) ( ( 0 + (=* MM\[ } ~` K LL 2 ) ( ( 0 + (=* MM[ } ~ K LL ) ( ( 0 + (=* MMZ[ ~` } K LL 2 ) ( ( 0 + (=* MM[ } ~ K LL ) ( ( 0 + (=* MM\[ } ~` K LL 2 ) ( ( 0 + (=* MM\[ } ~ using the same steps as in the proof of case aa and lemma > " g hog 2 g( " K LL 6MMbc[ J 9[8.. l] " g. gc2 " K LL =2=MMbc[ J 9[8.. l2 ] " gc2. L C] M " gc2 L ] =M " gc2 g2 >. gc2 " K LL =2=MMbc[ J 9[8.. l] " g2. 2

24 g( " K LL 6MMbc[ J 9[8.. l2 ] " g(. L C] M " g( L ] =M " g( g >. g g " K LL MMbc[ J 9[{.. l L C] M " g L ] M " g g >. ~` } g g " K LL 2fMMbc[ J 9[{.. l L C] M " g L ] M " g g >. ~ } and def. of > " g hog 2 g( " K LL 6MMbc[ J 9[8.. l] " g. g 2 " K LL 2 MMbc[ J 9[8.. l2 ] " g 2. L C] M " g 2 L ] =M " g 2 g 2 >. g 2 " K LL 2 MMbc[ J 9[8.. l] " g 2. g( " K LL 6MMbc[ J 9[8.. l2 ] " g(. L C] M " g L ] =M " g g >. > " g hogc2 g " K LL MMbc[ J 9[8.. l L C] M " g gc2 " K LL =2=MMbc[ J 9[8.. l L C] M " g2 L C] M "#g. L C] M "#gc2. > " g hog 2 g( e" K LL 3MM[ /g 2 " K9LL 2 MM D B/@ACB+D D/@D. > " g hog 2 g( e" K LL 3MM[ /g 2 " K9LL 2 MM\[ D B/@ACB+D D/@D. k`mn n [ [ J 9[82. due to def. of h > " g hogc2 g " K LL MM[ /g2 " K9LL =2fMM\[ #$ K LL &=2.+. [ J 9[82.. due to def. of and & Case hh Smmetric to case gg Thus &=2. K LL &=2=MM. for &=2. $. 22

The Maze Generation Problem is NP-complete

The Maze Generation Problem is NP-complete The Mae Generation Problem is NP-complete Mario Alviano Department of Mathematics, Universit of Calabria, 87030 Rende (CS), Ital alviano@mat.unical.it Abstract. The Mae Generation problem has been presented

More information

8. BOOLEAN ALGEBRAS x x

8. BOOLEAN ALGEBRAS x x 8. BOOLEAN ALGEBRAS 8.1. Definition of a Boolean Algebra There are man sstems of interest to computing scientists that have a common underling structure. It makes sense to describe such a mathematical

More information

Basing Decisions on Sentences in Decision Diagrams

Basing Decisions on Sentences in Decision Diagrams Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence Basing Decisions on Sentences in Decision Diagrams Yexiang Xue Department of Computer Science Cornell University yexiang@cs.cornell.edu

More information

CpE358/CS381. Switching Theory and Logical Design. Class 2

CpE358/CS381. Switching Theory and Logical Design. Class 2 CpE358/CS38 Switching Theor and Logical Design Class 2 CpE358/CS38 Switching Theor and Logical Design Summer- 24 Copright 24 Stevens Institute of Technolog -45 Toda s Material Fundamental concepts of digital

More information

Binary Decision Diagrams

Binary Decision Diagrams Binar Decision Diagrams Ma 3, 2004 1 Overview Boolean functions Possible representations Binar decision trees Binar decision diagrams Ordered binar decision diagrams Reduced ordered binar decision diagrams

More information

ASYNCHRONOUS SEQUENTIAL CIRCUITS

ASYNCHRONOUS SEQUENTIAL CIRCUITS ASYNCHRONOUS SEQUENTIAL CIRCUITS Sequential circuits that are not snchronized b a clock Asnchronous circuits Analsis of Asnchronous circuits Snthesis of Asnchronous circuits Hazards that cause incorrect

More information

An analytic proof of the theorems of Pappus and Desargues

An analytic proof of the theorems of Pappus and Desargues Note di Matematica 22, n. 1, 2003, 99 106. An analtic proof of the theorems of Pappus and Desargues Erwin Kleinfeld and Tuong Ton-That Department of Mathematics, The Universit of Iowa, Iowa Cit, IA 52242,

More information

Symbolic Real Time Model Checking. Kim G Larsen

Symbolic Real Time Model Checking. Kim G Larsen Smbolic Real Time Model Checking Kim G Larsen Overview Timed Automata Decidabilit Results The UPPAAL Verification Engine Datastructures for zones Liveness Checking Algorithm Abstraction and Compositionalit

More information

Representations of All Solutions of Boolean Programming Problems

Representations of All Solutions of Boolean Programming Problems Representations of All Solutions of Boolean Programming Problems Utz-Uwe Haus and Carla Michini Institute for Operations Research Department of Mathematics ETH Zurich Rämistr. 101, 8092 Zürich, Switzerland

More information

Finding Limits Graphically and Numerically. An Introduction to Limits

Finding Limits Graphically and Numerically. An Introduction to Limits 8 CHAPTER Limits and Their Properties Section Finding Limits Graphicall and Numericall Estimate a it using a numerical or graphical approach Learn different was that a it can fail to eist Stud and use

More information

CHAPTER 9: SEQUENTIAL CIRCUITS

CHAPTER 9: SEQUENTIAL CIRCUITS CHAPTER 9: ASYNCHRONOUS SEUENTIAL CIRCUITS Chapter Objectives 2 Sequential circuits that are not snchronized b a clock Asnchronous circuits Analsis of Asnchronous circuits Snthesis of Asnchronous circuits

More information

Higher order method for non linear equations resolution: application to mobile robot control

Higher order method for non linear equations resolution: application to mobile robot control Higher order method for non linear equations resolution: application to mobile robot control Aldo Balestrino and Lucia Pallottino Abstract In this paper a novel higher order method for the resolution of

More information

Section 3.1. ; X = (0, 1]. (i) f : R R R, f (x, y) = x y

Section 3.1. ; X = (0, 1]. (i) f : R R R, f (x, y) = x y Paul J. Bruillard MATH 0.970 Problem Set 6 An Introduction to Abstract Mathematics R. Bond and W. Keane Section 3.1: 3b,c,e,i, 4bd, 6, 9, 15, 16, 18c,e, 19a, 0, 1b Section 3.: 1f,i, e, 6, 1e,f,h, 13e,

More information

Binary Decision Diagrams and Symbolic Model Checking

Binary Decision Diagrams and Symbolic Model Checking Binary Decision Diagrams and Symbolic Model Checking Randy Bryant Ed Clarke Ken McMillan Allen Emerson CMU CMU Cadence U Texas http://www.cs.cmu.edu/~bryant Binary Decision Diagrams Restricted Form of

More information

SAT based BDD solver for Quantified Boolean Formulas

SAT based BDD solver for Quantified Boolean Formulas SAT based BDD solver for Quantified Boolean Formulas Gilles Audemard and Lakhdar Saïs CRIL CNRS Université d Artois rue Jean Souvraz SP-8 F-62307 Lens Cede France {audemard,sais}@cril.univ-artois.fr Abstract

More information

Electronic Design Automation for Digital Circuits

Electronic Design Automation for Digital Circuits Electronic Design Automation for Digital Circuits Tutorial Notes Lecturer: U. Schlichtmann Teaching Assistant: M. Barke Room 296, T +49 89 289-23644 barke@tum.de Address: Arcisstr. 2 8333 Munich German

More information

Binary Decision Graphs

Binary Decision Graphs Binary Decision Graphs Laurent Mauborgne LIENS DMI, École Normale Supérieure, 45 rue d Ulm, 75 23 Paris cede 5, France Tel: (+33) 44 32 2 66; Email: Laurent.Mauborgne@ens.fr WWW home page: http://www.dmi.ens.fr/~mauborgn/

More information

14.1 Systems of Linear Equations in Two Variables

14.1 Systems of Linear Equations in Two Variables 86 Chapter 1 Sstems of Equations and Matrices 1.1 Sstems of Linear Equations in Two Variables Use the method of substitution to solve sstems of equations in two variables. Use the method of elimination

More information

Provable intractability. NP-completeness. Decision problems. P problems. Algorithms. Two causes of intractability:

Provable intractability. NP-completeness. Decision problems. P problems. Algorithms. Two causes of intractability: Provable intractabilit -completeness Selected from Computer and Intractabilit b MR Gare and DS Johnson (979) Two causes of intractabilit: The problem is so difficult that an exponential amount of time

More information

Mathematical Statistics. Gregg Waterman Oregon Institute of Technology

Mathematical Statistics. Gregg Waterman Oregon Institute of Technology Mathematical Statistics Gregg Waterman Oregon Institute of Technolog c Gregg Waterman This work is licensed under the Creative Commons Attribution. International license. The essence of the license is

More information

1 Quantum Computing Simulation using the Auxiliary Field Decomposition

1 Quantum Computing Simulation using the Auxiliary Field Decomposition 1 Quantum Computing Simulation using the Auiliar Field Decomposition Kurt Fischer, ans-georg Matuttis 1, Satoshi Yukawa, and Nobuasu Ito 1 Universit of Electro-Communications, Department of Mechanical

More information

Review of Essential Skills and Knowledge

Review of Essential Skills and Knowledge Review of Essential Skills and Knowledge R Eponent Laws...50 R Epanding and Simplifing Polnomial Epressions...5 R 3 Factoring Polnomial Epressions...5 R Working with Rational Epressions...55 R 5 Slope

More information

Mathematics 309 Conic sections and their applicationsn. Chapter 2. Quadric figures. ai,j x i x j + b i x i + c =0. 1. Coordinate changes

Mathematics 309 Conic sections and their applicationsn. Chapter 2. Quadric figures. ai,j x i x j + b i x i + c =0. 1. Coordinate changes Mathematics 309 Conic sections and their applicationsn Chapter 2. Quadric figures In this chapter want to outline quickl how to decide what figure associated in 2D and 3D to quadratic equations look like.

More information

Systems of Linear Equations: Solving by Graphing

Systems of Linear Equations: Solving by Graphing 8.1 Sstems of Linear Equations: Solving b Graphing 8.1 OBJECTIVE 1. Find the solution(s) for a set of linear equations b graphing NOTE There is no other ordered pair that satisfies both equations. From

More information

A formal semantics of synchronous interworkings

A formal semantics of synchronous interworkings A formal semantics of snchronous interorkings S. Mau a, M. van Wijk b and T. Winter c a Dept. of Mathematics and Computing Science, Eindhoven Universit of Technolog, P.O. Bo 513, 5600 MB Eindhoven, The

More information

FACULTY OF MATHEMATICAL STUDIES MATHEMATICS FOR PART I ENGINEERING. Lectures AB = BA = I,

FACULTY OF MATHEMATICAL STUDIES MATHEMATICS FOR PART I ENGINEERING. Lectures AB = BA = I, FACULTY OF MATHEMATICAL STUDIES MATHEMATICS FOR PART I ENGINEERING Lectures MODULE 7 MATRICES II Inverse of a matri Sstems of linear equations Solution of sets of linear equations elimination methods 4

More information

8.1 Exponents and Roots

8.1 Exponents and Roots Section 8. Eponents and Roots 75 8. Eponents and Roots Before defining the net famil of functions, the eponential functions, we will need to discuss eponent notation in detail. As we shall see, eponents

More information

Verifying Randomized Distributed Algorithms with PRISM

Verifying Randomized Distributed Algorithms with PRISM Verifying Randomized Distributed Algorithms with PRISM Marta Kwiatkowska, Gethin Norman, and David Parker University of Birmingham, Birmingham B15 2TT, United Kingdom {M.Z.Kwiatkowska,G.Norman,D.A.Parker}@cs.bham.ac.uk

More information

International Examinations. Advanced Level Mathematics Pure Mathematics 1 Hugh Neill and Douglas Quadling

International Examinations. Advanced Level Mathematics Pure Mathematics 1 Hugh Neill and Douglas Quadling International Eaminations Advanced Level Mathematics Pure Mathematics Hugh Neill and Douglas Quadling PUBLISHED BY THE PRESS SYNDICATE OF THE UNIVERSITY OF CAMBRIDGE The Pitt Building, Trumpington Street,

More information

10.5. Polar Coordinates. 714 Chapter 10: Conic Sections and Polar Coordinates. Definition of Polar Coordinates

10.5. Polar Coordinates. 714 Chapter 10: Conic Sections and Polar Coordinates. Definition of Polar Coordinates 71 Chapter 1: Conic Sections and Polar Coordinates 1.5 Polar Coordinates rigin (pole) r P(r, ) Initial ra FIGURE 1.5 To define polar coordinates for the plane, we start with an origin, called the pole,

More information

State-Space Exploration. Stavros Tripakis University of California, Berkeley

State-Space Exploration. Stavros Tripakis University of California, Berkeley EE 144/244: Fundamental Algorithms for System Modeling, Analysis, and Optimization Fall 2014 State-Space Exploration Stavros Tripakis University of California, Berkeley Stavros Tripakis (UC Berkeley) EE

More information

Temporal Formula Specifications of Asynchronous Control Module in Model Checking

Temporal Formula Specifications of Asynchronous Control Module in Model Checking Proceedings of the 6th WSEAS International Conference on Applied Computer Science, Tenerife, Canary Islands, Spain, December 16-18, 2006 214 Temporal Formula Specifications of Asynchronous Control Module

More information

Finding Limits Graphically and Numerically. An Introduction to Limits

Finding Limits Graphically and Numerically. An Introduction to Limits 60_00.qd //0 :05 PM Page 8 8 CHAPTER Limits and Their Properties Section. Finding Limits Graphicall and Numericall Estimate a it using a numerical or graphical approach. Learn different was that a it can

More information

MAT 127: Calculus C, Fall 2010 Solutions to Midterm I

MAT 127: Calculus C, Fall 2010 Solutions to Midterm I MAT 7: Calculus C, Fall 00 Solutions to Midterm I Problem (0pts) Consider the four differential equations for = (): (a) = ( + ) (b) = ( + ) (c) = e + (d) = e. Each of the four diagrams below shows a solution

More information

Cubic and quartic functions

Cubic and quartic functions 3 Cubic and quartic functions 3A Epanding 3B Long division of polnomials 3C Polnomial values 3D The remainder and factor theorems 3E Factorising polnomials 3F Sum and difference of two cubes 3G Solving

More information

SBMC : Symmetric Bounded Model Checking

SBMC : Symmetric Bounded Model Checking SBMC : Symmetric Bounded Model Checing Brahim NASRAOUI LIP2 and Faculty of Sciences of Tunis Campus Universitaire 2092 - El Manar Tunis Tunisia brahim.nasraoui@gmail.com Syrine AYADI LIP2 and Faculty of

More information

Reachability Analysis Using Octagons

Reachability Analysis Using Octagons Reachabilit Analsis Using Octagons Andrew N. Fisher and Chris J. Mers Department of Electrical and Computer Engineering Universit of Utah FAC 0 Jul 9, 0 Digitall Intensive Analog Circuits Digitall intensive

More information

1.5. Analyzing Graphs of Functions. The Graph of a Function. What you should learn. Why you should learn it. 54 Chapter 1 Functions and Their Graphs

1.5. Analyzing Graphs of Functions. The Graph of a Function. What you should learn. Why you should learn it. 54 Chapter 1 Functions and Their Graphs 0_005.qd /7/05 8: AM Page 5 5 Chapter Functions and Their Graphs.5 Analzing Graphs of Functions What ou should learn Use the Vertical Line Test for functions. Find the zeros of functions. Determine intervals

More information

Decision tables and decision spaces

Decision tables and decision spaces Abstract Decision tables and decision spaces Z. Pawlak 1 Abstract. In this paper an Euclidean space, called a decision space is associated with ever decision table. This can be viewed as a generalization

More information

Keira Godwin. Time Allotment: 13 days. Unit Objectives: Upon completion of this unit, students will be able to:

Keira Godwin. Time Allotment: 13 days. Unit Objectives: Upon completion of this unit, students will be able to: Keira Godwin Time Allotment: 3 das Unit Objectives: Upon completion of this unit, students will be able to: o Simplif comple rational fractions. o Solve comple rational fractional equations. o Solve quadratic

More information

Lesson 15: Piecewise Functions

Lesson 15: Piecewise Functions Classwork Opening Eercise For each real number aa, the absolute value of aa is the distance between 0 and aa on the number line and is denoted aa. 1. Solve each one variable equation. a. = 6 b. = 4 c.

More information

Symbolic Model Checking with ROBDDs

Symbolic Model Checking with ROBDDs Symbolic Model Checking with ROBDDs Lecture #13 of Advanced Model Checking Joost-Pieter Katoen Lehrstuhl 2: Software Modeling & Verification E-mail: katoen@cs.rwth-aachen.de December 14, 2016 c JPK Symbolic

More information

1.2 Relations. 20 Relations and Functions

1.2 Relations. 20 Relations and Functions 0 Relations and Functions. Relations From one point of view, all of Precalculus can be thought of as studing sets of points in the plane. With the Cartesian Plane now fresh in our memor we can discuss

More information

SAT Modulo ODE: A Direct SAT Approach to Hybrid Systems

SAT Modulo ODE: A Direct SAT Approach to Hybrid Systems Welcome ATVA 2008 SAT Modulo ODE: A Direct SAT Approach to Hbrid Sstems Andreas Eggers, Martin Fränzle, and Christian Herde DFG Transregional Collaborative Research Center AVACS Outline Motivation Bounded

More information

Crash course Verification of Finite Automata Binary Decision Diagrams

Crash course Verification of Finite Automata Binary Decision Diagrams Crash course Verification of Finite Automata Binary Decision Diagrams Exercise session 10 Xiaoxi He 1 Equivalence of representations E Sets A B A B Set algebra,, ψψ EE = 1 ψψ AA = ff ψψ BB = gg ψψ AA BB

More information

2.5 CONTINUITY. a x. Notice that Definition l implicitly requires three things if f is continuous at a:

2.5 CONTINUITY. a x. Notice that Definition l implicitly requires three things if f is continuous at a: SECTION.5 CONTINUITY 9.5 CONTINUITY We noticed in Section.3 that the it of a function as approaches a can often be found simpl b calculating the value of the function at a. Functions with this propert

More information

Tracking Differentiable Trajectories across Polyhedra Boundaries

Tracking Differentiable Trajectories across Polyhedra Boundaries Tracking Differentiable Trajectories across Polhedra Boundaries Massimo Benerecetti Elect. Eng. and Information Technologies Università di Napoli Federico II, Ital massimo.benerecetti@unina.it Marco Faella

More information

and y f ( x ). given the graph of y f ( x ).

and y f ( x ). given the graph of y f ( x ). FUNCTIONS AND RELATIONS CHAPTER OBJECTIVES:. Concept of function f : f ( ) : domain, range; image (value). Odd and even functions Composite functions f g; Identit function. One-to-one and man-to-one functions.

More information

Reduced Ordered Binary Decision Diagrams

Reduced Ordered Binary Decision Diagrams Reduced Ordered Binary Decision Diagrams Lecture #13 of Advanced Model Checking Joost-Pieter Katoen Lehrstuhl 2: Software Modeling & Verification E-mail: katoen@cs.rwth-aachen.de June 5, 2012 c JPK Switching

More information

Toda s Theorem: PH P #P

Toda s Theorem: PH P #P CS254: Computational Compleit Theor Prof. Luca Trevisan Final Project Ananth Raghunathan 1 Introduction Toda s Theorem: PH P #P The class NP captures the difficult of finding certificates. However, in

More information

MA 15800, Summer 2016 Lesson 25 Notes Solving a System of Equations by substitution (or elimination) Matrices. 2 A System of Equations

MA 15800, Summer 2016 Lesson 25 Notes Solving a System of Equations by substitution (or elimination) Matrices. 2 A System of Equations MA 800, Summer 06 Lesson Notes Solving a Sstem of Equations b substitution (or elimination) Matrices Consider the graphs of the two equations below. A Sstem of Equations From our mathematics eperience,

More information

Decision Procedures for Satisfiability and Validity in Propositional Logic

Decision Procedures for Satisfiability and Validity in Propositional Logic Decision Procedures for Satisfiability and Validity in Propositional Logic Meghdad Ghari Institute for Research in Fundamental Sciences (IPM) School of Mathematics-Isfahan Branch Logic Group http://math.ipm.ac.ir/isfahan/logic-group.htm

More information

COMPRESSED STATE SPACE REPRESENTATIONS - BINARY DECISION DIAGRAMS

COMPRESSED STATE SPACE REPRESENTATIONS - BINARY DECISION DIAGRAMS QUALITATIVE ANALYIS METHODS, OVERVIEW NET REDUCTION STRUCTURAL PROPERTIES COMPRESSED STATE SPACE REPRESENTATIONS - BINARY DECISION DIAGRAMS LINEAR PROGRAMMING place / transition invariants state equation

More information

Automata, Logic and Games: Theory and Application

Automata, Logic and Games: Theory and Application Automata, Logic and Games: Theory and Application 1. Büchi Automata and S1S Luke Ong University of Oxford TACL Summer School University of Salerno, 14-19 June 2015 Luke Ong Büchi Automata & S1S 14-19 June

More information

Méthode logique multivaluée de René Thomas et logique temporelle

Méthode logique multivaluée de René Thomas et logique temporelle Méthode logique multivaluée de René Thomas et logique temporelle Gilles Bernot Universit of Nice sophia antipolis, I3S laborator, France Menu 1. Models and formal logic 2. Thomas models for gene networks

More information

Chapter 4 Analytic Trigonometry

Chapter 4 Analytic Trigonometry Analtic Trigonometr Chapter Analtic Trigonometr Inverse Trigonometric Functions The trigonometric functions act as an operator on the variable (angle, resulting in an output value Suppose this process

More information

Bounded LTL Model Checking with Stable Models

Bounded LTL Model Checking with Stable Models Bounded LTL Model Checking with Stable Models Keijo Heljanko and Ilkka Niemelä Helsinki University of Technology Dept. of Computer Science and Engineering Laboratory for Theoretical Computer Science P.O.

More information

This article describes a task leading to work on curve sketching, simultaneous equations and

This article describes a task leading to work on curve sketching, simultaneous equations and Closed but provocative questions: Curves enclosing unit area Colin Foster, School of Education, Universit of Nottingham colin.foster@nottingham.ac.uk Abstract This article describes a task leading to work

More information

MAT 127: Calculus C, Spring 2017 Solutions to Problem Set 2

MAT 127: Calculus C, Spring 2017 Solutions to Problem Set 2 MAT 7: Calculus C, Spring 07 Solutions to Problem Set Section 7., Problems -6 (webassign, pts) Match the differential equation with its direction field (labeled I-IV on p06 in the book). Give reasons for

More information

INTRODUCTION GOOD LUCK!

INTRODUCTION GOOD LUCK! INTRODUCTION The Summer Skills Assignment for has been developed to provide all learners of our St. Mar s Count Public Schools communit an opportunit to shore up their prerequisite mathematical skills

More information

1 Algebraic Methods. 1.1 Gröbner Bases Applied to SAT

1 Algebraic Methods. 1.1 Gröbner Bases Applied to SAT 1 Algebraic Methods In an algebraic system Boolean constraints are expressed as a system of algebraic equations or inequalities which has a solution if and only if the constraints are satisfiable. Equations

More information

3.3 Logarithmic Functions and Their Graphs

3.3 Logarithmic Functions and Their Graphs 274 CHAPTER 3 Eponential, Logistic, and Logarithmic Functions What ou ll learn about Inverses of Eponential Functions Common Logarithms Base 0 Natural Logarithms Base e Graphs of Logarithmic Functions

More information

CIRCUIT COMPLEXITY AND PROBLEM STRUCTURE IN HAMMING SPACE

CIRCUIT COMPLEXITY AND PROBLEM STRUCTURE IN HAMMING SPACE CIRCUIT COMPLEXITY AND PROBLEM STRUCTURE IN HAMMING SPACE KOJI KOBAYASHI Abstract. This paper describes about relation between circuit compleit and accept inputs structure in Hamming space b using almost

More information

Symmetry Arguments and the Role They Play in Using Gauss Law

Symmetry Arguments and the Role They Play in Using Gauss Law Smmetr Arguments and the Role The la in Using Gauss Law K. M. Westerberg (9/2005) Smmetr plas a ver important role in science in general, and phsics in particular. Arguments based on smmetr can often simplif

More information

Formal Methods Lecture VII Symbolic Model Checking

Formal Methods Lecture VII Symbolic Model Checking Formal Methods Lecture VII Symbolic Model Checking Faculty of Computer Science Free University of Bozen-Bolzano artale@inf.unibz.it http://www.inf.unibz.it/ artale/ Academic Year: 2006/07 Some material

More information

Model Inverse Variation. p Write and graph inverse variation equations. VOCABULARY. Inverse variation. Constant of variation. Branches of a hyperbola

Model Inverse Variation. p Write and graph inverse variation equations. VOCABULARY. Inverse variation. Constant of variation. Branches of a hyperbola 12.1 Model Inverse Variation Goal p Write and graph inverse variation equations. Your Notes VOCABULARY Inverse variation Constant of variation Hperbola Branches of a hperbola Asmptotes of a hperbola Eample

More information

Predicate Abstraction in Protocol Verification

Predicate Abstraction in Protocol Verification Predicate Abstraction in Protocol Verification Edgar Pek, Nikola Bogunović Faculty of Electrical Engineering and Computing Zagreb, Croatia E-mail: {edgar.pek, nikola.bogunovic}@fer.hr Abstract This paper

More information

Lecture 5. Equations of Lines and Planes. Dan Nichols MATH 233, Spring 2018 University of Massachusetts.

Lecture 5. Equations of Lines and Planes. Dan Nichols MATH 233, Spring 2018 University of Massachusetts. Lecture 5 Equations of Lines and Planes Dan Nichols nichols@math.umass.edu MATH 233, Spring 2018 Universit of Massachusetts Februar 6, 2018 (2) Upcoming midterm eam First midterm: Wednesda Feb. 21, 7:00-9:00

More information

3.2 LOGARITHMIC FUNCTIONS AND THEIR GRAPHS

3.2 LOGARITHMIC FUNCTIONS AND THEIR GRAPHS Section. Logarithmic Functions and Their Graphs 7. LOGARITHMIC FUNCTIONS AND THEIR GRAPHS Ariel Skelle/Corbis What ou should learn Recognize and evaluate logarithmic functions with base a. Graph logarithmic

More information

Table of Contents. At a Glance. Power Standards. DA Blueprint. Assessed Curriculum. STAAR/EOC Blueprint. Release STAAR/EOC Questions

Table of Contents. At a Glance. Power Standards. DA Blueprint. Assessed Curriculum. STAAR/EOC Blueprint. Release STAAR/EOC Questions Table of Contents At a Glance Pacing guide with start/ stop dates, Supporting STAAR Achievement lessons, and recommended power standards for data teams Power Standards List of Power Standards b reporting

More information

Consistency as Projection

Consistency as Projection Consistency as Projection John Hooker Carnegie Mellon University INFORMS 2015, Philadelphia USA Consistency as Projection Reconceive consistency in constraint programming as a form of projection. For eample,

More information

Finite Automata. Mahesh Viswanathan

Finite Automata. Mahesh Viswanathan Finite Automata Mahesh Viswanathan In this lecture, we will consider different models of finite state machines and study their relative power. These notes assume that the reader is familiar with DFAs,

More information

PSPACE-completeness of LTL/CTL model checking

PSPACE-completeness of LTL/CTL model checking PSPACE-completeness of LTL/CTL model checking Peter Lohmann April 10, 2007 Abstract This paper will give a proof for the PSPACE-completeness of LTLsatisfiability and for the PSPACE-completeness of the

More information

2-6. _ k x and y = _ k. The Graph of. Vocabulary. Lesson

2-6. _ k x and y = _ k. The Graph of. Vocabulary. Lesson Chapter 2 Lesson 2-6 BIG IDEA The Graph of = _ k and = _ k 2 The graph of the set of points (, ) satisfing = k_, with k constant, is a hperbola with the - and -aes as asmptotes; the graph of the set of

More information

Stochastic Decision Diagrams

Stochastic Decision Diagrams Stochastic Decision Diagrams John Hooker CORS/INFORMS Montréal June 2015 Objective Relaxed decision diagrams provide an generalpurpose method for discrete optimization. When the problem has a dynamic programming

More information

Applications of Gauss-Radau and Gauss-Lobatto Numerical Integrations Over a Four Node Quadrilateral Finite Element

Applications of Gauss-Radau and Gauss-Lobatto Numerical Integrations Over a Four Node Quadrilateral Finite Element Avaiable online at www.banglaol.info angladesh J. Sci. Ind. Res. (), 77-86, 008 ANGLADESH JOURNAL OF SCIENTIFIC AND INDUSTRIAL RESEARCH CSIR E-mail: bsir07gmail.com Abstract Applications of Gauss-Radau

More information

P is the class of problems for which there are algorithms that solve the problem in time O(n k ) for some constant k.

P is the class of problems for which there are algorithms that solve the problem in time O(n k ) for some constant k. Complexity Theory Problems are divided into complexity classes. Informally: So far in this course, almost all algorithms had polynomial running time, i.e., on inputs of size n, worst-case running time

More information

Dynamics of multiple pendula without gravity

Dynamics of multiple pendula without gravity Chaotic Modeling and Simulation (CMSIM) 1: 57 67, 014 Dnamics of multiple pendula without gravit Wojciech Szumiński Institute of Phsics, Universit of Zielona Góra, Poland (E-mail: uz88szuminski@gmail.com)

More information

Hamiltonicity and Fault Tolerance

Hamiltonicity and Fault Tolerance Hamiltonicit and Fault Tolerance in the k-ar n-cube B Clifford R. Haithcock Portland State Universit Department of Mathematics and Statistics 006 In partial fulfillment of the requirements of the degree

More information

Second-Order Linear Differential Equations C 2

Second-Order Linear Differential Equations C 2 C8 APPENDIX C Additional Topics in Differential Equations APPENDIX C. Second-Order Homogeneous Linear Equations Second-Order Linear Differential Equations Higher-Order Linear Differential Equations Application

More information

Chapter 6* The PPSZ Algorithm

Chapter 6* The PPSZ Algorithm Chapter 6* The PPSZ Algorithm In this chapter we present an improvement of the pp algorithm. As pp is called after its inventors, Paturi, Pudlak, and Zane [PPZ99], the improved version, pps, is called

More information

Model checking the basic modalities of CTL with Description Logic

Model checking the basic modalities of CTL with Description Logic Model checking the basic modalities of CTL with Description Logic Shoham Ben-David Richard Trefler Grant Weddell David R. Cheriton School of Computer Science University of Waterloo Abstract. Model checking

More information

2.2. Calculating Limits Using the Limit Laws. 84 Chapter 2: Limits and Continuity. The Limit Laws. THEOREM 1 Limit Laws

2.2. Calculating Limits Using the Limit Laws. 84 Chapter 2: Limits and Continuity. The Limit Laws. THEOREM 1 Limit Laws 84 Chapter : Limits and Continuit. HISTORICAL ESSAY* Limits Calculating Limits Using the Limit Laws In Section. we used graphs and calculators to guess the values of its. This section presents theorems

More information

CCSSM Algebra: Equations

CCSSM Algebra: Equations CCSSM Algebra: Equations. Reasoning with Equations and Inequalities (A-REI) Eplain each step in solving a simple equation as following from the equalit of numbers asserted at the previous step, starting

More information

Kleene Algebras and Algebraic Path Problems

Kleene Algebras and Algebraic Path Problems Kleene Algebras and Algebraic Path Problems Davis Foote May 8, 015 1 Regular Languages 1.1 Deterministic Finite Automata A deterministic finite automaton (DFA) is a model of computation that can simulate

More information

Exact SAT-based Toffoli Network Synthesis

Exact SAT-based Toffoli Network Synthesis Eact SAT-based Toffoli Network Synthesis ABSTRACT Daniel Große Institute of Computer Science University of Bremen 28359 Bremen, Germany grosse@informatik.unibremen.de Gerhard W. Dueck Faculty of Computer

More information

SAT Solvers: Theory and Practice

SAT Solvers: Theory and Practice Summer School on Verification Technology, Systems & Applications, September 17, 2008 p. 1/98 SAT Solvers: Theory and Practice Clark Barrett barrett@cs.nyu.edu New York University Summer School on Verification

More information

Complete Solutions Manual. Technical Calculus with Analytic Geometry FIFTH EDITION. Peter Kuhfittig Milwaukee School of Engineering.

Complete Solutions Manual. Technical Calculus with Analytic Geometry FIFTH EDITION. Peter Kuhfittig Milwaukee School of Engineering. Complete Solutions Manual Technical Calculus with Analtic Geometr FIFTH EDITION Peter Kuhfittig Milwaukee School of Engineering Australia Brazil Meico Singapore United Kingdom United States 213 Cengage

More information

Rational Equations. You can use a rational function to model the intensity of sound.

Rational Equations. You can use a rational function to model the intensity of sound. UNIT Rational Equations You can use a rational function to model the intensit of sound. Copright 009, K Inc. All rights reserved. This material ma not be reproduced in whole or in part, including illustrations,

More information

LESSON #42 - INVERSES OF FUNCTIONS AND FUNCTION NOTATION PART 2 COMMON CORE ALGEBRA II

LESSON #42 - INVERSES OF FUNCTIONS AND FUNCTION NOTATION PART 2 COMMON CORE ALGEBRA II LESSON #4 - INVERSES OF FUNCTIONS AND FUNCTION NOTATION PART COMMON CORE ALGEBRA II You will recall from unit 1 that in order to find the inverse of a function, ou must switch and and solve for. Also,

More information

A Logically Complete Reasoning Maintenance System Based on a Logical Constraint Solver

A Logically Complete Reasoning Maintenance System Based on a Logical Constraint Solver A Logically Complete Reasoning Maintenance System Based on a Logical Constraint Solver J.C. Madre and O. Coudert Bull Corporate Research Center Rue Jean Jaurès 78340 Les Clayes-sous-bois FRANCE Abstract

More information

Lecture Notes On THEORY OF COMPUTATION MODULE -1 UNIT - 2

Lecture Notes On THEORY OF COMPUTATION MODULE -1 UNIT - 2 BIJU PATNAIK UNIVERSITY OF TECHNOLOGY, ODISHA Lecture Notes On THEORY OF COMPUTATION MODULE -1 UNIT - 2 Prepared by, Dr. Subhendu Kumar Rath, BPUT, Odisha. UNIT 2 Structure NON-DETERMINISTIC FINITE AUTOMATA

More information

Linear Equations and Arithmetic Sequences

Linear Equations and Arithmetic Sequences CONDENSED LESSON.1 Linear Equations and Arithmetic Sequences In this lesson, ou Write eplicit formulas for arithmetic sequences Write linear equations in intercept form You learned about recursive formulas

More information

Rising HONORS Algebra 2 TRIG student Summer Packet for 2016 (school year )

Rising HONORS Algebra 2 TRIG student Summer Packet for 2016 (school year ) Rising HONORS Algebra TRIG student Summer Packet for 016 (school ear 016-17) Welcome to Algebra TRIG! To be successful in Algebra Trig, ou must be proficient at solving and simplifing each tpe of problem

More information

f(x) = 2x 2 + 2x - 4

f(x) = 2x 2 + 2x - 4 4-1 Graphing Quadratic Functions What You ll Learn Scan the tet under the Now heading. List two things ou will learn about in the lesson. 1. Active Vocabular 2. New Vocabular Label each bo with the terms

More information

7.5 Solve Special Types of

7.5 Solve Special Types of 75 Solve Special Tpes of Linear Sstems Goal p Identif the number of of a linear sstem Your Notes VOCABULARY Inconsistent sstem Consistent dependent sstem Eample A linear sstem with no Show that the linear

More information

General Vector Spaces

General Vector Spaces CHAPTER 4 General Vector Spaces CHAPTER CONTENTS 4. Real Vector Spaces 83 4. Subspaces 9 4.3 Linear Independence 4.4 Coordinates and Basis 4.5 Dimension 4.6 Change of Basis 9 4.7 Row Space, Column Space,

More information

New Complexity Results for Some Linear Counting Problems Using Minimal Solutions to Linear Diophantine Equations

New Complexity Results for Some Linear Counting Problems Using Minimal Solutions to Linear Diophantine Equations New Complexity Results for Some Linear Counting Problems Using Minimal Solutions to Linear Diophantine Equations (Extended Abstract) Gaoyan Xie, Cheng Li and Zhe Dang School of Electrical Engineering and

More information

Chapter 1 Coordinates, points and lines

Chapter 1 Coordinates, points and lines Cambridge Universit Press 978--36-6000-7 Cambridge International AS and A Level Mathematics: Pure Mathematics Coursebook Hugh Neill, Douglas Quadling, Julian Gilbe Ecerpt Chapter Coordinates, points and

More information