On the Complexity of Partial Order Trace Model Checking
|
|
- Angelica Fox
- 5 years ago
- Views:
Transcription
1 On the Complexty of Partal Order Trace Model Checkng Therry Massart Cédrc Meuter Laurent Van Begn Unversté Lbre de Bruxelles (U.L.B.), Boulevard du Tromphe, CP-212, 1050 Bruxelles, Belgum Keywords: computatonal complexty, dstrbuted systems, formal methods 1 Introducton The desgn of a dstrbuted system s known to be a dffcult task whch can be eased by varous technques ncludng valdaton and debuggng. The model-based desgn abstracts the actons the system can do nto events whch change ts global state. Dependng on the varous assumptons the desgner can make, the model can be ether centralzed, provdng a global observaton and control on the entre system or dstrbuted where each event s local to some process and asynchronous communcatons allow the concurrent processes to communcate. The model valdaton checks that t has the requred propertes, usually expressed by temporal logc formulae, e.g. n Ctl, Ctl or Ltl [2]. In practce, ths abstracton s generally not suffcent to avod the state-exploson problem whch prevents the desgner from exhaustvely verfyng the whole system, even wth effcent exploraton technques such as partal order reducton or symbolc model checkng [2]. The desgner may therefore want to analyse or valdate smpler models whch descrbe only some facets of the system. As such, t may be mportant, durng the early desgn phases, to check scenaros expressed for nstance by Message Sequence Charts [5]. Durng the testng and deployment phases, executons must be valdated; runtme verfcaton technques [4] are typcally desgned for that purpose. The practcal valdty of these methods depend on the number of test-cases, to gve a reasonable confdence that the system s correct. Therefore, theoretcal and practcal effcency Supported by the Belgan Scence Polcy IAP-Phase VI: MoVES and Centre Fédéré en Vérfcaton (FNRS- FRFC n ) Research fellow supported by the Belgan Natonal Scence Foundaton (FNRS). 1
2 of the algorthms able to solve the problem are crucal. In the centralzed case, an executon of the system s a sequence of events. The complexty of determnng f such an executon satsfes a property has been studed n [7] where t s shown that the problem can be solved effcently. In the dstrbuted case, the exact order n whch two concurrent events occur n the executon s, n general, not always known or guaranteed. By takng nto account the communcatons between processes, however, a partal order on the events of the executon can stll be obtaned. Hence n ths case, an executon can be vewed as a partally ordered set of events called partal order trace. The global propertes satsfacton on these partal order traces has been wdely studed snce the 90 s. Chase and Garg have shown n [1], that the global predcate detecton problem,.e. the reachablty of a system s state whch satsfes some global predcate, s NP-complete for an arbtrary predcate, even when there s no nter-process communcaton. However, varous classes of propertes can be checked effcently n polynomal tme (see e.g. [3, 6] whch relates these methods). Sen and Garg extended the study to temporal operators and defned the RCtl logc [9], a restrcted form of Ctl whose model checkng s polynomal on partal order traces. In prevous works, we developed symbolc Ltl [3] and Ctl [6] model checkng of partal order traces and showed ther effcency n practce. We study here the theoretcal complexty of Ctl, Ctl and Ltl model checkng over fnte partal order traces. We show that over such partal order traces, Ctl and Ctl model checkng are PSPACE-complete and that the Ltl model checkng s conp-complete. 2 Basc defntons In ths secton, we recall the satsfablty problems for propostonal and quantfed propostonal formulae. In the rest of the paper, we assume an nfnte and countable set P of propostons and B denotes the set of Boolean values,.e. B = {tt, ff} where tt stands for true and ff for false. Propostonal Boolean Formulae A Propostonal Boolean Formula (PBF) φ s defned usng the followng grammar: φ ::= p φ φ φ, where denotes the true formula, and p P. Moreover, let denotes the formula (the false formula). Other standard Boolean operators (,, ) are derved as usual. The (fnte) set of propostons appearng n a PBF formula φ s denoted by P(φ). A PBF φ s nterpreted usng a valuaton of P(φ),.e. a functon v : P(φ) B. The satsfacton of a PBF φ by a valuaton v, noted v = φ, s defned as usual. The PBF φ s satsfable f there exsts a valuaton v such that v = φ. The sze of the PBF φ, noted φ, s defned nductvely as follows: () f φ = or φ = p then φ = 1, () f φ = φ 1 then φ = φ and () f φ = φ 1 φ 2 then φ = φ 1 + φ Fnally, gven a PBF φ, the PBF-SAT problem conssts n determnng f φ s satsfable. Ths problem s known to be NP-complete [8]. 2
3 Quantfed Boolean Formulae A Quantfed Boolean Formula (QBF) ψ s a formula of the form Q 1 p 1 Q 2 p 2... Q r p r φ where () φ s a PBF over P and () Q {, } and p P(φ) for [1, r]. Note that a PBF s a QBF wthout quantfers (r = 0). In the followng, we assume that each proposton s quantfed at most once. A fully QBF s a QBF where all propostons are quantfed. QBF are also nterpreted over valuatons. As n the PBF case, P(ψ) denotes the set of propostons appearng n the QBF ψ. A valuaton v : P(ψ) B satsfes a QBF ψ s noted v = ψ. The satsfacton s derved from the propostonal case as follows. If ψ = p ψ, then v = ψ ff v[p tt] = ψ and v[p ff] = ψ and, f ψ = p ψ, then v = ψ ff v[p tt] = ψ or v[p ff] = ψ. Note that the truth value of a QBF formula ψ depends only on the valuaton of ts free propostons,.e. those used n ψ and not lnked by a quantfer. In partcular, f ψ s a fully QBF, ts truth value does not depend on v. Smlarly to PBF, a QBF ψ s satsfable f there exsts a valuaton v such that v = ψ. The sze of a QBF ψ = Q 1 p 1 Q 2 p 2... Q r p r φ where φ s a PBF, noted ψ, s equal to φ. Note that the number of quantfers n ψ s bounded by φ. Gven a (fully) QBF ψ, the QBF-SAT problem conssts n decdng f ψ s satsfable. Ths problem s known to be PSPACE-complete, even for fully QBF [8]. 3 Ctl, Ctl and Ltl over partal order traces Partal Order Traces A partal order trace (po-trace) s a tuple T = E, P 0, α, β, where () E s a fnte set of events; () P 0 P s the fnte set of propostons ntally true; () α : E 2 P (resp. β : E 2 P ) s a functon gvng for each event e the fnte set of propostons set to tt (resp. ff) such that e E : α(e) β(e) = ; and () E E s a partal order relaton on E such that e, e E: ((α(e) β(e)) (α(e ) β(e )) ) (e e ) (e e),.e. f the truth value of at least one proposton s modfed by two events, then those events must be ordered. Gven an event e E, we defne e = {e E e e}, the past of e (ncludng e tself). The fnte ( ) set of propostons used by T s denoted by P(T ),.e P(T ) = P 0 e E α(e) β(e). A cut s a subset C E such that e C : e C. The set of cuts s denoted by cuts(t ). Gven a cut C cuts(t ), we defne enabled(c) = {e E \ C ( e \ {e}) C} the set of events enabled n C, and C /p = {e C p α(e) β(e)} the set of events of C that modfes the truth value of p. Note that for every proposton p, the set C /p s totally ordered. The set of propostons true n a cut C, noted P C s then defned as {p P(T ) (C /p = p P 0 ) (C /p p α(max(c /p ))}. If an event e s enabled n the cut C, then t can be fred from C leadng to C = C {e}, noted C C. A path σ s a sequence σ = C 0... C k cuts(t ) such that k 0 and [0, k) : C C +1. The sze σ of the sequence σ s the number of frngs from C 0 n σ (.e. k here) 1 ; and we note σ the suffx C, C +1,... C k. σ s left undefned f > σ. A run from a cut C s a path σ = C 0... C k 1 Note that σ could also have been defned as ts number of states (.e. k + 1 here) 3
4 wth () C 0 = C and () C k = E. The set of runs startng n a cut C cuts(t ) s denoted by runs(c). The sze of the po-trace T = E, P 0, α, β,, noted T, s equal to E + + P(T ). Ctl Formulae n the temporal logc Ctl are defned usng the followng grammar: Ψ ::= p Ψ Ψ Ψ Φ Φ Φ ::= Ψ Φ Φ Φ ΦUΦ Φ where Ψ s a state formula, Φ s a path formula, p P, U s the untl operator and s the next operator. Other Boolean constructs (,,, ) are defned as n the PBF case. In our case, Ctl state (resp. path) formulae are nterpreted over cuts C (paths σ) of a po-trace T. The satsfacton relaton, noted = C (resp. = σ ) for state (resp. path) formulae, s the smallest relaton that satsfes the followng: T, C = C T, C = C p p P C T, C = C Ψ ff T, C = C Ψ T, C = C Ψ 1 Ψ 2 ff T, C = C Ψ 1 T, C = C Ψ 2 T, C = C Φ ff σ runs(c) : T, σ = σ Φ T, C = C Φ ff σ runs(c) : T, σ = σ Φ T, σ = σ Ψ ff T, C 0 = C Ψ T, σ = σ Φ ff T, σ = σ Φ T, σ = σ Φ 1 Φ 2 ff T, σ = σ Φ 1 T, σ = σ Φ 2 T, σ = σ Φ ff σ > 0 T, σ 1 = σ Φ T, σ = σ Φ 1 UΦ 2 ff [0, σ ] : (( T, σ = σ Φ 2 ) ( j [0, ) : T, σ j = σ Φ 1 )) where σ = C 0... C k, Φ, Φ 1, Φ 2 are path formulae and Ψ, Ψ 1, Ψ 2 are state formulae. A po-trace T satsfes a Ctl state formula Ψ, noted T = Ψ, ff T, = C Ψ. The sze of a Ctl formula Ψ, noted Ψ, s defned nductvely as follows: () f Ψ = or Ψ = p then Ψ = 1; () f Ψ = Ψ 1, Ψ = Ψ 1, Ψ = Ψ 1 or Ψ = Ψ 1 then Ψ = Ψ 1 + 1; f Ψ = Ψ 1 Ψ 2 or Ψ = Ψ 1 UΨ 2 then Ψ = Ψ 1 + Ψ Ctl has n partcular two useful fragments : Computaton Tree Logc (Ctl) s a fragment of Ctl n whch each and U operators must be mmedately preceded by a path quantfer. Formally, a Ctl formula Ψ s defned usng the grammar : Ψ ::= p Ψ Ψ Ψ Ψ Ψ [ΨUΨ] [ΨUΨ] Lnear Tme Logc (Ltl) s another fragment of Ctl n whch each formula has the form Φ and the only state sub-formulae permtted are and atomc propostons p P. Formally, a Ltl formula Ψ s defned usng the grammar : Ψ ::= Φ Φ ::= p Φ Φ Φ Φ ΦUΦ Gven a po-trace T and a formula Ψ, the model checkng problem conssts n determnng f T = Ψ. In the remander of the paper, we nvestgate the complexty of the model checkng problem for Ctl, Ctl and Ltl formulae. 4
5 4 Ctl and Ctl Model Checkng We start wth the model checkng problem for Ctl and Ctl. Frst, we wll show that for Ctl, the problem s PSPACE-hard. Snce Ctl s a fragment of Ctl, t mples that the problem for Ctl s also PSPACE-hard. Then, we show that, for Ctl, the problem s PSPACE-easy. Agan, snce Ctl s a fragment Ctl, t follows that the problem for Ctl s also PSPACE-easy. Those results allow us to conclude that for Ctl and Ctl, the model checkng problem s PSPACE-complete. In order to prove that for Ctl, the model checkng problem s PSPACE-hard, we exhbt a polynomal reducton of (fully) QBF-SAT. that works as follows. Let ψ be a fully QBF wth P(ψ) = {p 1,..., p r }. We buld a po-trace T P(ψ) and a Ctl formula Ψ ψ and prove that ψ s satsfable ff T P(ψ) = Ψ ψ. The po-trace T P(ψ) = E, P 0, α, β, s bult over set of propostons [1,r] {q, q } as follows: () E = [1,r] {e, e }; () P 0 = ; () [1, r] : α(e ) = {q } β(e ) = α(e ) = {q } β(e ) = and fnally (v) =. The Ctl formula Ψ ψ s defned nductvely as follows: ψ[p 1 eval tt 1,..., p r eval tt r ] Ψ ψ = f ψ s a PBF ((eval tt eval ff ) Ψ ψ1 ) f ψ = p ψ 1 ((eval tt eval ff ) Ψ ψ1 ) f ψ = p ψ 1 where eval tt = (q q ), evalff = ( q q ), and where ψ[p 1 φ 1,..., p r φ r ] denotes the formula ψ where every occurrence of proposton p s replaced by the formula φ for [1, r]. As a frst remark, t s clear that the szes of Ψ ψ and T P(ψ) are polynomal n the sze of ψ. Indeed, each proposton n ψ s replaced by a sub-formula of (constant) sze 4 and each quantfcaton s replaced by a construct of (constant) sze 12. In the followng, for any [1, r], we note C tt = {e }, resp. C ff = {e }, the mnmal cut satsfyng evaltt, resp. eval ff. Formally, T P(ψ), C tt = C eval tt and T P(ψ), C ff = C eval ff snce P C tt = {q } and P C ff = {q }. Lemma 1 Gven a fully QBF ψ, T P(ψ) = Ψ ψ ff ψ s satsfable. Proof. We prove by nducton on P(ψ) that ψ s satsfable ff T P(ψ), = C Ψ ψ. Base cases. If P(ψ) = 0, then P(ψ) = and ψ s a Boolean combnaton of. If ψ, by defnton of Ψ ψ we have Ψ ψ = ψ[p 1 eval tt 1,..., p r eval tt r ] = ψ. In ths case, we have that T P(ψ), = C Ψ ψ. If ψ, Ψ ψ, hence T P(ψ), = C Ψ ψ. We conclude that T P(ψ), = C Ψ ψ ff ψ s satsfable. Inducton cases. We have to consder two cases: The frst case s when ψ = p ψ 1. In ths case, ψ s satsfable ff ψ 1 [p ] or ψ 1 [p ] s satsfable. By nducton, ths s 5
6 equvalent to T P(ψ)\{p}, = C Ψ ψ1[p ] or T P(ψ)\{p}, = C Ψ ψ1[p ]. By defnton of Ψ ψ1, ths holds ff T P(ψ)\{p}, = C Ψ ψ1 [q, q ] or T P(ψ)\{p }, = C Ψ ψ1 [q, q ], and by defnton of C tt and C ff, ff T P(ψ), C tt = C Ψ ψ1 or T P(ψ), C ff = C Ψ ψ1. Now snce C tt (resp. C ff ) contans the only event that can satsfy evaltt (resp. eval ff ), we deduce that T P(ψ), C b = C Ψ ψ1 ff T P(ψ), = C (eval b Ψ ψ1 ) for any b B. We can therefore conclude that ψ s satsfable ff T P(ψ), = C (eval tt Ψ ψ1 ) or T P(ψ), = C (eval ff Ψ ψ1 ), or equvalently f T P(ψ), = C ( (eval tt s equvalent to ((eval tt eval ff ) Ψ ψ1 ) = Ψ ψ. Ψ ψ1 )) ( (eval ff Ψ ψ1 )). Fnally, ths last formula The second case s when ψ = p ψ 1. In ths case, ψ s satsfable ff ψ 1 [p ] and ψ 1 [p ] are satsfable. Smlarly to the frst case, by nducton, defnton of Ψ ψ1, C tt and C ff, ths holds ff T P(ψ), C tt = C Ψ ψ1 and T P(ψ), C ff = C Ψ ψ1. Note that for any cuts C such that C ether C = C b wth b B and C = evalb, or C = eval tt eval ff. We deduce that T P(ψ), C b = C Ψ ψ1 ff T P(ψ), = C (eval b Ψ ψ1 ) for any b B. We can therefore conclude that ψ s satsfable ff T P(ψ), = C (eval tt Ψ ψ1 ) and T P(ψ), = C (eval ff Ψ ψ1 ), or equvalently f T P(ψ), = C ( (eval tt Ψ ψ1 )) ( (eval ff Ψ ψ1 )). Fnally, the last formula s equvalent to ((eval ff eval tt ) Ψ ψ1 ) = Ψ ψ. From Lem. 1, we get the PSPACE-hardness for Ctl. Proposton 1 The model checkng problem over po-traces s PSPACE-hard for Ctl. Proof. Snce QBF-SAT s PSPACE-complete, Ψ ψ and T P(ψ) have sze polynomal w.r.t. the sze of a fully QBF ψ, we conclude by Lem. 1 that the proposton holds. Now, we show PSPACE-easness of the model checkng problem for Ctl by exhbtng a polynomal space algorthm that solves the problem. Proposton 2 The model checkng problem over po-traces s PSPACE-easy for Ctl Proof. Frst, we exhbt a recursve algorthm that takes a partal order trace T = E, P 0, α, β,, a Ctl state formula Ψ wth a cut C (resp. a Ctl trace formula Ψ wth a run σ = C 0 C 1... C k wth C = C 0 ), and returns true f and only f T, C = C Ψ (resp. T, σ = σ Ψ). The recurson follows the structure of the nference whch shows T, C = C Ψ or T, σ = σ Ψ. Then, we show nductvely on the depth of the recurson, that ths algorthm s polynomal space w.r.t. the sze of the formula Ψ and the sze of the po-trace T. Base cases. When Ψ = or Ψ = p. In the frst case, the algorthm always returns true. In the second case, f Ψ s a state formula then t bulds P C and returns true ff p P C. Inducton cases If σ contans sub-formulae, then the algorthm works as follows: Frst, f Ψ s evaluated on a trace σ = C 0... C k but t s not of the form Ψ 1 Ψ 2, Ψ 1, Ψ 1 or Ψ 1 UΨ 2, then Ψ s also a state formula and the algorthm returns true ff T, C 0 = C Ψ. 6
7 If Ψ = Ψ 1, Ψ = Ψ 1 Ψ 2, then Ψ 1 and Ψ 2 are frst evaluated and then the algorthm evaluates Ψ accordng to the usual semantcs of boolean connectors. If Ψ = QΨ 1 wth Q {, }, then Ψ s a state formula. In ths case, the algorthm enumerates all the runs σ runs(c) and then checks f T, σ = σ Ψ 1 holds. In the case where Q = (resp. Q = ), the algorthm returns true ff at least one run σ runs(c) (resp. all the runs σ runs(c)), s such that T, σ = σ Ψ 1. f Ψ = Ψ 1 then the algorthm returns true ff T, C 1... C k = σ Ψ 1 holds. f Ψ = Ψ 1 U Ψ 2, then Ψ s a path formula. For each 0 k, the algorthm frst consders the sub-formula Ψ 2 and checks f T, C... C k = σ Ψ 2 holds. If t s the case, the algorthm consders Ψ 1 and checks f T, C j... C k = σ Ψ 1 holds for all 0 j <. In the case of a postve answer for all 0 j <, the algorthm returns true. Fnally, f the algorthm does not conclude for any 0 k then t returns false. Let us now show that the algorthm uses only a polynomal space w.r.t. the sze of the formula Ψ and the sze of the partal order trace T. To smplfy the presentaton, we do not care about the memory used to store one cut, P C,.... However, t s mmedate that the memory used can be bounded by a polynomal n the sze of T by usng, for nstance, bt vectors to represent sets. More precsely, we show that the number of cuts that are computed and stored at the same tme nto memory by the algorthm s bounded by T Ψ. The proof s by nducton on the depth of the recurson of the algorthm used. Base cases If Ψ =, then the algorthm returns true n constant tme wthout buldng cuts, hence the result. If Ψ = p then Ψ s evaluated on the cut C and the algorthm bulds P C. Ths can be acheved n polynomal tme wthout buldng new cuts by frst computng for each p P(T ) the set C /p. Ths can be done by enumeratng the events e C and checks f p α(e) β(e) (ths can also be done by enumeratng α and β). If C /p s empty then p s n P C ff p P 0 (ths can be checked by enumeratng the elements of P 0 ). Otherwse, we fnd the maxmal element e max w.r.t n C /p by enumeratng the elements n C /p and. Fnally, p s n P C ff p α(e max ). Snce 0 T Ψ, we conclude. Inducton cases If Ψ = Ψ 1 or Ψ = Ψ 1 Ψ 2 then by nducton hypothess we know that the algorthm evaluates Ψ 1 and Ψ 2 (on runs or cuts) storng at most T ( Ψ 1) cuts (snce Ψ < Ψ for {1, 2}), hence t evaluates Ψ by storng at most T ( Ψ 1) T Ψ cuts. If Ψ = QΨ 1 wth Q {, }, then the algorthm enumerates all the runs σ runs(c). Ths can be done as follows: From C ntally equal to C, we enumerate the events e E and then test f e enabled(c ) and f there s no (e, e) such that e C by enumeratng the elements of and C. If t s the case, we terate from the cut C {e} untl we buld E. At each step, the algorthm only keeps n memory the cuts of the current nvestgated run. Snce the sze of 7
8 the runs are bounded by E, hence bounded by T, the number of cuts stored n memory when enumeratng all the runs σ runs(c) s bounded by T. Then, by nducton hypothess, the algorthm uses memory bounded by T Ψ 1 to check f T, σ = σ Ψ 1 holds. Snce Ψ = Ψ, we conclude that the algorthm mantans at most T Ψ cuts n memory when evaluatng Ψ. If Ψ = Ψ 1, the algorthm evaluates Ψ 1 on a trace. By nducton hypothess, ths s acheved by storng at most Ψ 1 T cuts. Furthermore, the trace over whch Ψ 1 s evaluated has sze bounded by T. Snce Ψ = Ψ 1 + 1, we conclude that the algorthm stores at most Ψ T cuts. If Ψ = Ψ 1 U Ψ 2, then assume that Ψ s evaluated on the run σ. By nducton hypothess, the number of cuts stored n memory when evaluatng Ψ 1, resp. Ψ 2, on sub-sequences of σ s bounded by T Ψ 1, resp. T Ψ 2. Furthermore, Ψ 1 and Ψ 2 are evaluated on traces wth sze bounded by T. Snce Ψ 1 < Ψ and Ψ 2 < Ψ, we conclude that the number of cuts stored n memory by the algorthm when checkng Ψ s bounded by Ψ T. Fnally, n the case where the algorthm has to evaluate a formula Ψ on the trace C 0... C k that s not of the form Ψ 1, Ψ 1 Ψ 2, Ψ 1 or Ψ 1 UΨ 2, then the algorthm evaluates Ψ on C 0 as explaned above and we drectly conclude from the prevous cases. From Propostons 1 and 2, and snce Ctl s a subset of Ctl, we conclude that the followng theorem holds. Theorem 1 The model checkng problem over po-trace s PSPACE-complete for Ctl and Ctl. 5 Ltl Model Checkng We now prove that the model checkng problem for the lnear-tme temporal logc Ltl s conpcomplete on po-traces. For that purpose, we examne the dual problem of model checkng LTL formulae,.e. formulae of the form Φ where Φ s a restrcted path formula, as defned n the grammar of LTL. We frst show that ths problem s NP-easy. Proposton 3 The model checkng over po-traces s NP-easy for LTL Proof. We exhbt a non-determnstc polynomal tme algorthm. The algorthm works as follows: t frst guesses a run σ of the po-trace T, and then checks that the formula holds on that run. The algorthm starts from C =, and for each cut of the run t guesses an event e, checks that e enabled(c ) and then bulds the next cut C {e}. The test e enabled(c ) can be acheved n polynomal tme by enumeratng the events of C to ensure that e C and then enumerate the elements of (together wth those of C ) to ensure that e e mples that e C. Fnally, note that the sze of a run n runs( ) has sze E. Fnally, Ltl model-checkng on a run can solved n polynomal tme [7, Proposton 3.3]. 8
9 Next, we show that the model checkng problem s NP-hard for LTL. For that, we reduce the global predcate detecton whch s known NP-complete [1]. In our framework, ths problem can be stated as follows. Gven a po-trace T and a PBF φ over P(T ), the global predcate detecton conssts n determnng f C cuts(t ) : T, C = C φ. Proposton 4 The model checkng problem over po-traces s NP-hard for LTL. Proof. Gven a po-trace T, and a PBF φ, t s mmedate that C cuts(t ) : T, C = C φ f and only f T = ( Uφ). We can therefore conclude that the model checkng problem s NP-complete for LTL and therefore conp-complete for Ltl, as stated n the followng theorem. Theorem 2 The model checkng problem over po-traces s conp-complete for Ltl. Hence theorem 1 and 2 show that contrarly to complete systems (Krpke structures) [2], over po-traces, Ltl has a lower complexty that Ctl and Ctl. References [1] C. M. Chase, V. K. Garg, Detecton of global predcates: Technques and ther lmtatons., Dstrbuted Computng 11 (4) (1998) [2] E. Clarke, O. Grumberg, D. Peled, Model Checkng, The MIT Press, [3] A. Genon, T. Massart, C. Meuter, Montorng dstrbuted controllers: When an effcent ltl algorthm on sequences s needed to model-check traces., n: J. Msra, T. Npkow, E. Sekernsk (eds.), FM, vol of LNCS, Sprnger, [4] K. Havelund, Usng runtme analyss to gude model checkng of java programs., n: K. Havelund, J. Penx, W. Vsser (eds.), SPIN, vol of LNCS, Sprnger, [5] ITU-TS, ITU-TS Recommendaton Z.120: Message Sequence Chart (MSC), Geneva (1999). [6] G. Kalyon, T. Massart, C. Meuter, L. V. Begn, Testng dstrbuted systems through symbolc model checkng., n: J. Derrck, J. Van (eds.), FORTE, vol of Lecture Notes n Computer Scence, Sprnger, [7] N. Markey, P. Schnoebelen, Model checkng a path., n: R. M. Amado, D. Lugez (eds.), CONCUR, vol of LNCS, Sprnger, [8] C. H. Papadmtrou, Computatonal Complexty, Addson Wesley Longman, [9] A. Sen, V. K. Garg, Detectng temporal logc predcates n dstrbuted programs usng computaton slcng., n: M. Papatrantaflou, P. Hunel (eds.), OPODIS, vol of LNCS, Sprnger,
NP-Completeness : Proofs
NP-Completeness : Proofs Proof Methods A method to show a decson problem Π NP-complete s as follows. (1) Show Π NP. (2) Choose an NP-complete problem Π. (3) Show Π Π. A method to show an optmzaton problem
More informationThe Order Relation and Trace Inequalities for. Hermitian Operators
Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence
More information2.3 Nilpotent endomorphisms
s a block dagonal matrx, wth A Mat dm U (C) In fact, we can assume that B = B 1 B k, wth B an ordered bass of U, and that A = [f U ] B, where f U : U U s the restrcton of f to U 40 23 Nlpotent endomorphsms
More informationAPPENDIX A Some Linear Algebra
APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,
More informationProblem Set 9 Solutions
Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem
More informationAffine transformations and convexity
Affne transformatons and convexty The purpose of ths document s to prove some basc propertes of affne transformatons nvolvng convex sets. Here are a few onlne references for background nformaton: http://math.ucr.edu/
More informationThe Complexity of Propositional Linear Temporal Logics in Simple Cases 1
Informaton and Computaton 174, 84 103 (2002) do:10.1006/nco.2001.3094, avalable onlne at http://www.dealbrary.com on The Complexty of Propostonal Lnear Temporal Logcs n Smple Cases 1 Stéphane Demr and
More informationCalculation of time complexity (3%)
Problem 1. (30%) Calculaton of tme complexty (3%) Gven n ctes, usng exhaust search to see every result takes O(n!). Calculaton of tme needed to solve the problem (2%) 40 ctes:40! dfferent tours 40 add
More informationa b a In case b 0, a being divisible by b is the same as to say that
Secton 6.2 Dvsblty among the ntegers An nteger a ε s dvsble by b ε f there s an nteger c ε such that a = bc. Note that s dvsble by any nteger b, snce = b. On the other hand, a s dvsble by only f a = :
More informationRemarks on the Properties of a Quasi-Fibonacci-like Polynomial Sequence
Remarks on the Propertes of a Quas-Fbonacc-lke Polynomal Sequence Brce Merwne LIU Brooklyn Ilan Wenschelbaum Wesleyan Unversty Abstract Consder the Quas-Fbonacc-lke Polynomal Sequence gven by F 0 = 1,
More informationprinceton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg
prnceton unv. F 17 cos 521: Advanced Algorthm Desgn Lecture 7: LP Dualty Lecturer: Matt Wenberg Scrbe: LP Dualty s an extremely useful tool for analyzng structural propertes of lnear programs. Whle there
More informationModule 9. Lecture 6. Duality in Assignment Problems
Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept
More informationAssortment Optimization under MNL
Assortment Optmzaton under MNL Haotan Song Aprl 30, 2017 1 Introducton The assortment optmzaton problem ams to fnd the revenue-maxmzng assortment of products to offer when the prces of products are fxed.
More informationCollege of Computer & Information Science Fall 2009 Northeastern University 20 October 2009
College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:
More informationFor now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results.
Neural Networks : Dervaton compled by Alvn Wan from Professor Jtendra Malk s lecture Ths type of computaton s called deep learnng and s the most popular method for many problems, such as computer vson
More informationPerfect Competition and the Nash Bargaining Solution
Perfect Competton and the Nash Barganng Soluton Renhard John Department of Economcs Unversty of Bonn Adenauerallee 24-42 53113 Bonn, Germany emal: rohn@un-bonn.de May 2005 Abstract For a lnear exchange
More informationEdge Isoperimetric Inequalities
November 7, 2005 Ross M. Rchardson Edge Isopermetrc Inequaltes 1 Four Questons Recall that n the last lecture we looked at the problem of sopermetrc nequaltes n the hypercube, Q n. Our noton of boundary
More informationMore metrics on cartesian products
More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of
More informationCHAPTER 17 Amortized Analysis
CHAPTER 7 Amortzed Analyss In an amortzed analyss, the tme requred to perform a sequence of data structure operatons s averaged over all the operatons performed. It can be used to show that the average
More informationWeek 2. This week, we covered operations on sets and cardinality.
Week 2 Ths week, we covered operatons on sets and cardnalty. Defnton 0.1 (Correspondence). A correspondence between two sets A and B s a set S contaned n A B = {(a, b) a A, b B}. A correspondence from
More informationDifference Equations
Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1
More informationFoundations of Arithmetic
Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an
More informationn α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0
MODULE 2 Topcs: Lnear ndependence, bass and dmenson We have seen that f n a set of vectors one vector s a lnear combnaton of the remanng vectors n the set then the span of the set s unchanged f that vector
More informationON A DETERMINATION OF THE INITIAL FUNCTIONS FROM THE OBSERVED VALUES OF THE BOUNDARY FUNCTIONS FOR THE SECOND-ORDER HYPERBOLIC EQUATION
Advanced Mathematcal Models & Applcatons Vol.3, No.3, 2018, pp.215-222 ON A DETERMINATION OF THE INITIAL FUNCTIONS FROM THE OBSERVED VALUES OF THE BOUNDARY FUNCTIONS FOR THE SECOND-ORDER HYPERBOLIC EUATION
More informationMin Cut, Fast Cut, Polynomial Identities
Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.
More informationNOTES ON SIMPLIFICATION OF MATRICES
NOTES ON SIMPLIFICATION OF MATRICES JONATHAN LUK These notes dscuss how to smplfy an (n n) matrx In partcular, we expand on some of the materal from the textbook (wth some repetton) Part of the exposton
More informationLecture 3 January 31, 2017
CS 224: Advanced Algorthms Sprng 207 Prof. Jelan Nelson Lecture 3 January 3, 207 Scrbe: Saketh Rama Overvew In the last lecture we covered Y-fast tres and Fuson Trees. In ths lecture we start our dscusson
More informationFeature Selection: Part 1
CSE 546: Machne Learnng Lecture 5 Feature Selecton: Part 1 Instructor: Sham Kakade 1 Regresson n the hgh dmensonal settng How do we learn when the number of features d s greater than the sample sze n?
More informationSymbolic Model Checking without BDDs
Symbolc Model Checng wthout BDDs Armn Bere 1 Alessandro Cmatt 2 Edmund Clare 1 Yunshan Zhu 1 January 4, 1999 CMU-CS-99-101 School of Computer Scence Carnege Mellon Unversty Pttsburgh, PA 15213 Submtted
More informationOn the Repeating Group Finding Problem
The 9th Workshop on Combnatoral Mathematcs and Computaton Theory On the Repeatng Group Fndng Problem Bo-Ren Kung, Wen-Hsen Chen, R.C.T Lee Graduate Insttute of Informaton Technology and Management Takmng
More informationPlans. Memoryless plans Definition. Memoryless plans Example. Images Formal definition. Images. Preimages. Preimages. Definition
Noetermnstc plannng (May 25, 2005) Plans AND-OR search Dynamc programmng (Albert-Ludwgs-Unverstät Freburg) 1 / 56 Plans Plans 1. map a state/an observaton to an operator. We use ths defnton of plans for
More informationGames of Threats. Elon Kohlberg Abraham Neyman. Working Paper
Games of Threats Elon Kohlberg Abraham Neyman Workng Paper 18-023 Games of Threats Elon Kohlberg Harvard Busness School Abraham Neyman The Hebrew Unversty of Jerusalem Workng Paper 18-023 Copyrght 2017
More informationA CLASS OF RECURSIVE SETS. Florentin Smarandache University of New Mexico 200 College Road Gallup, NM 87301, USA
A CLASS OF RECURSIVE SETS Florentn Smarandache Unversty of New Mexco 200 College Road Gallup, NM 87301, USA E-mal: smarand@unmedu In ths artcle one bulds a class of recursve sets, one establshes propertes
More informationThe Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction
ECONOMICS 5* -- NOTE (Summary) ECON 5* -- NOTE The Multple Classcal Lnear Regresson Model (CLRM): Specfcaton and Assumptons. Introducton CLRM stands for the Classcal Lnear Regresson Model. The CLRM s also
More informationThe Minimum Universal Cost Flow in an Infeasible Flow Network
Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran
More informationStanford University CS254: Computational Complexity Notes 7 Luca Trevisan January 29, Notes for Lecture 7
Stanford Unversty CS54: Computatonal Complexty Notes 7 Luca Trevsan January 9, 014 Notes for Lecture 7 1 Approxmate Countng wt an N oracle We complete te proof of te followng result: Teorem 1 For every
More informationOn the set of natural numbers
On the set of natural numbers by Jalton C. Ferrera Copyrght 2001 Jalton da Costa Ferrera Introducton The natural numbers have been understood as fnte numbers, ths wor tres to show that the natural numbers
More information3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X
Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number
More informationMath Review. CptS 223 Advanced Data Structures. Larry Holder School of Electrical Engineering and Computer Science Washington State University
Math Revew CptS 223 dvanced Data Structures Larry Holder School of Electrcal Engneerng and Computer Scence Washngton State Unversty 1 Why do we need math n a data structures course? nalyzng data structures
More informationNotes on Frequency Estimation in Data Streams
Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to
More informationMAT 578 Functional Analysis
MAT 578 Functonal Analyss John Qugg Fall 2008 Locally convex spaces revsed September 6, 2008 Ths secton establshes the fundamental propertes of locally convex spaces. Acknowledgment: although I wrote these
More informationLectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix
Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could
More informationInner Product. Euclidean Space. Orthonormal Basis. Orthogonal
Inner Product Defnton 1 () A Eucldean space s a fnte-dmensonal vector space over the reals R, wth an nner product,. Defnton 2 (Inner Product) An nner product, on a real vector space X s a symmetrc, blnear,
More information9 Characteristic classes
THEODORE VORONOV DIFFERENTIAL GEOMETRY. Sprng 2009 [under constructon] 9 Characterstc classes 9.1 The frst Chern class of a lne bundle Consder a complex vector bundle E B of rank p. We shall construct
More informationBallot Paths Avoiding Depth Zero Patterns
Ballot Paths Avodng Depth Zero Patterns Henrch Nederhausen and Shaun Sullvan Florda Atlantc Unversty, Boca Raton, Florda nederha@fauedu, ssull21@fauedu 1 Introducton In a paper by Sapounaks, Tasoulas,
More informationFINITELY-GENERATED MODULES OVER A PRINCIPAL IDEAL DOMAIN
FINITELY-GENERTED MODULES OVER PRINCIPL IDEL DOMIN EMMNUEL KOWLSKI Throughout ths note, s a prncpal deal doman. We recall the classfcaton theorem: Theorem 1. Let M be a fntely-generated -module. (1) There
More informationLecture Space-Bounded Derandomization
Notes on Complexty Theory Last updated: October, 2008 Jonathan Katz Lecture Space-Bounded Derandomzaton 1 Space-Bounded Derandomzaton We now dscuss derandomzaton of space-bounded algorthms. Here non-trval
More informationVariants of Quantified Linear Programming and Quantified Linear Implication
Varants of Quantfed Lnear Programmng and Quantfed Lnear Implcaton Potr Wojcechowsk LDCSEE West Vrgna Unversty Morgantown, WV pwojcec@mx.wvu.edu Pavlos Ernaks DMST Athens Unversty of Economcs and Busness
More informationPolynomials. 1 More properties of polynomials
Polynomals 1 More propertes of polynomals Recall that, for R a commutatve rng wth unty (as wth all rngs n ths course unless otherwse noted), we defne R[x] to be the set of expressons n =0 a x, where a
More informationBézier curves. Michael S. Floater. September 10, These notes provide an introduction to Bézier curves. i=0
Bézer curves Mchael S. Floater September 1, 215 These notes provde an ntroducton to Bézer curves. 1 Bernsten polynomals Recall that a real polynomal of a real varable x R, wth degree n, s a functon of
More informationLecture 10: May 6, 2013
TTIC/CMSC 31150 Mathematcal Toolkt Sprng 013 Madhur Tulsan Lecture 10: May 6, 013 Scrbe: Wenje Luo In today s lecture, we manly talked about random walk on graphs and ntroduce the concept of graph expander,
More informationDifferential Polynomials
JASS 07 - Polynomals: Ther Power and How to Use Them Dfferental Polynomals Stephan Rtscher March 18, 2007 Abstract Ths artcle gves an bref ntroducton nto dfferental polynomals, deals and manfolds and ther
More informationU.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016
U.C. Berkeley CS94: Spectral Methods and Expanders Handout 8 Luca Trevsan February 7, 06 Lecture 8: Spectral Algorthms Wrap-up In whch we talk about even more generalzatons of Cheeger s nequaltes, and
More informationThe internal structure of natural numbers and one method for the definition of large prime numbers
The nternal structure of natural numbers and one method for the defnton of large prme numbers Emmanul Manousos APM Insttute for the Advancement of Physcs and Mathematcs 3 Poulou str. 53 Athens Greece Abstract
More informationThe Complexity of Early-Deciding in Unreliable Synchronous Networks Fabrice Le Fessant 1
The Complexty of Early-Decdng n Unrelable Synchronous Networks Fabrce Le Fessant 1 fabrce@lefessant.net Mcrosoft Research Lab., Cambrdge, CB3 0FB, UK Aprl 1, 2003 Techncal Report MSR-TR-2003-23 Mcrosoft
More informationBezier curves. Michael S. Floater. August 25, These notes provide an introduction to Bezier curves. i=0
Bezer curves Mchael S. Floater August 25, 211 These notes provde an ntroducton to Bezer curves. 1 Bernsten polynomals Recall that a real polynomal of a real varable x R, wth degree n, s a functon of the
More informationDIFFERENTIAL FORMS BRIAN OSSERMAN
DIFFERENTIAL FORMS BRIAN OSSERMAN Dfferentals are an mportant topc n algebrac geometry, allowng the use of some classcal geometrc arguments n the context of varetes over any feld. We wll use them to defne
More informationAn efficient algorithm for multivariate Maclaurin Newton transformation
Annales UMCS Informatca AI VIII, 2 2008) 5 14 DOI: 10.2478/v10065-008-0020-6 An effcent algorthm for multvarate Maclaurn Newton transformaton Joanna Kapusta Insttute of Mathematcs and Computer Scence,
More informationBOUNDEDNESS OF THE RIESZ TRANSFORM WITH MATRIX A 2 WEIGHTS
BOUNDEDNESS OF THE IESZ TANSFOM WITH MATIX A WEIGHTS Introducton Let L = L ( n, be the functon space wth norm (ˆ f L = f(x C dx d < For a d d matrx valued functon W : wth W (x postve sem-defnte for all
More informationAwareness and forgetting of facts and agents
Awareness and forgettng of facts and agents Hans van Dtmarsch Unversty of Sevlla, Span & Unversty of Otago, New Zealand Emal: hans@cs.otago.ac.nz Tm French Unversty of Western Australa, Perth, Australa
More informationPerron Vectors of an Irreducible Nonnegative Interval Matrix
Perron Vectors of an Irreducble Nonnegatve Interval Matrx Jr Rohn August 4 2005 Abstract As s well known an rreducble nonnegatve matrx possesses a unquely determned Perron vector. As the man result of
More informationSingular Value Decomposition: Theory and Applications
Sngular Value Decomposton: Theory and Applcatons Danel Khashab Sprng 2015 Last Update: March 2, 2015 1 Introducton A = UDV where columns of U and V are orthonormal and matrx D s dagonal wth postve real
More informationNumerical Heat and Mass Transfer
Master degree n Mechancal Engneerng Numercal Heat and Mass Transfer 06-Fnte-Dfference Method (One-dmensonal, steady state heat conducton) Fausto Arpno f.arpno@uncas.t Introducton Why we use models and
More informationGenericity of Critical Types
Genercty of Crtcal Types Y-Chun Chen Alfredo D Tllo Eduardo Fangold Syang Xong September 2008 Abstract Ely and Pesk 2008 offers an nsghtful characterzaton of crtcal types: a type s crtcal f and only f
More informationBayesian epistemology II: Arguments for Probabilism
Bayesan epstemology II: Arguments for Probablsm Rchard Pettgrew May 9, 2012 1 The model Represent an agent s credal state at a gven tme t by a credence functon c t : F [0, 1]. where F s the algebra of
More informationModule 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:
More informationOn the Operation A in Analysis Situs. by Kazimierz Kuratowski
v1.3 10/17 On the Operaton A n Analyss Stus by Kazmerz Kuratowsk Author s note. Ths paper s the frst part slghtly modfed of my thess presented May 12, 1920 at the Unversty of Warsaw for the degree of Doctor
More informationHyper-Sums of Powers of Integers and the Akiyama-Tanigawa Matrix
6 Journal of Integer Sequences, Vol 8 (00), Artcle 0 Hyper-Sums of Powers of Integers and the Ayama-Tangawa Matrx Yoshnar Inaba Toba Senor Hgh School Nshujo, Mnam-u Kyoto 60-89 Japan nava@yoto-benejp Abstract
More information5 The Rational Canonical Form
5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces
More information6. Stochastic processes (2)
Contents Markov processes Brth-death processes Lect6.ppt S-38.45 - Introducton to Teletraffc Theory Sprng 5 Markov process Consder a contnuous-tme and dscrete-state stochastc process X(t) wth state space
More informationfind (x): given element x, return the canonical element of the set containing x;
COS 43 Sprng, 009 Dsjont Set Unon Problem: Mantan a collecton of dsjont sets. Two operatons: fnd the set contanng a gven element; unte two sets nto one (destructvely). Approach: Canoncal element method:
More informationExample: (13320, 22140) =? Solution #1: The divisors of are 1, 2, 3, 4, 5, 6, 9, 10, 12, 15, 18, 20, 27, 30, 36, 41,
The greatest common dvsor of two ntegers a and b (not both zero) s the largest nteger whch s a common factor of both a and b. We denote ths number by gcd(a, b), or smply (a, b) when there s no confuson
More informationREGULAR POSITIVE TERNARY QUADRATIC FORMS. 1. Introduction
REGULAR POSITIVE TERNARY QUADRATIC FORMS BYEONG-KWEON OH Abstract. A postve defnte quadratc form f s sad to be regular f t globally represents all ntegers that are represented by the genus of f. In 997
More informationA PROOF OF THE STANDARD REDUCTION THEOREM IN THE LAMBDA CALCULUS
A PROOF OF THE STANDARD REDUCTION THEOREM IN THE LAMBDA CALCULUS WILLIAM RICHTER ABSTRACT. Fellesen s Standard Reducton Theorem for the λ v Calculus yelds an algorthm that models the Scheme nterpreter.
More information6. Stochastic processes (2)
6. Stochastc processes () Lect6.ppt S-38.45 - Introducton to Teletraffc Theory Sprng 5 6. Stochastc processes () Contents Markov processes Brth-death processes 6. Stochastc processes () Markov process
More informationTHE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens
THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of
More informationSubset Topological Spaces and Kakutani s Theorem
MOD Natural Neutrosophc Subset Topologcal Spaces and Kakutan s Theorem W. B. Vasantha Kandasamy lanthenral K Florentn Smarandache 1 Copyrght 1 by EuropaNova ASBL and the Authors Ths book can be ordered
More informationFinding Primitive Roots Pseudo-Deterministically
Electronc Colloquum on Computatonal Complexty, Report No 207 (205) Fndng Prmtve Roots Pseudo-Determnstcally Ofer Grossman December 22, 205 Abstract Pseudo-determnstc algorthms are randomzed search algorthms
More informationApproximate Smallest Enclosing Balls
Chapter 5 Approxmate Smallest Enclosng Balls 5. Boundng Volumes A boundng volume for a set S R d s a superset of S wth a smple shape, for example a box, a ball, or an ellpsod. Fgure 5.: Boundng boxes Q(P
More informationand problem sheet 2
-8 and 5-5 problem sheet Solutons to the followng seven exercses and optonal bonus problem are to be submtted through gradescope by :0PM on Wednesday th September 08. There are also some practce problems,
More informationLinear, affine, and convex sets and hulls In the sequel, unless otherwise specified, X will denote a real vector space.
Lnear, affne, and convex sets and hulls In the sequel, unless otherwse specfed, X wll denote a real vector space. Lnes and segments. Gven two ponts x, y X, we defne xy = {x + t(y x) : t R} = {(1 t)x +
More informationMath 261 Exercise sheet 2
Math 261 Exercse sheet 2 http://staff.aub.edu.lb/~nm116/teachng/2017/math261/ndex.html Verson: September 25, 2017 Answers are due for Monday 25 September, 11AM. The use of calculators s allowed. Exercse
More informationCommon loop optimizations. Example to improve locality. Why Dependence Analysis. Data Dependence in Loops. Goal is to find best schedule:
15-745 Lecture 6 Data Dependence n Loops Copyrght Seth Goldsten, 2008 Based on sldes from Allen&Kennedy Lecture 6 15-745 2005-8 1 Common loop optmzatons Hostng of loop-nvarant computatons pre-compute before
More informationSL n (F ) Equals its Own Derived Group
Internatonal Journal of Algebra, Vol. 2, 2008, no. 12, 585-594 SL n (F ) Equals ts Own Derved Group Jorge Macel BMCC-The Cty Unversty of New York, CUNY 199 Chambers street, New York, NY 10007, USA macel@cms.nyu.edu
More informationA new construction of 3-separable matrices via an improved decoding of Macula s construction
Dscrete Optmzaton 5 008 700 704 Contents lsts avalable at ScenceDrect Dscrete Optmzaton journal homepage: wwwelsevercom/locate/dsopt A new constructon of 3-separable matrces va an mproved decodng of Macula
More informationLearning Theory: Lecture Notes
Learnng Theory: Lecture Notes Lecturer: Kamalka Chaudhur Scrbe: Qush Wang October 27, 2012 1 The Agnostc PAC Model Recall that one of the constrants of the PAC model s that the data dstrbuton has to be
More informationFormulas for the Determinant
page 224 224 CHAPTER 3 Determnants e t te t e 2t 38 A = e t 2te t e 2t e t te t 2e 2t 39 If 123 A = 345, 456 compute the matrx product A adj(a) What can you conclude about det(a)? For Problems 40 43, use
More informationVolume 18 Figure 1. Notation 1. Notation 2. Observation 1. Remark 1. Remark 2. Remark 3. Remark 4. Remark 5. Remark 6. Theorem A [2]. Theorem B [2].
Bulletn of Mathematcal Scences and Applcatons Submtted: 016-04-07 ISSN: 78-9634, Vol. 18, pp 1-10 Revsed: 016-09-08 do:10.1805/www.scpress.com/bmsa.18.1 Accepted: 016-10-13 017 ScPress Ltd., Swtzerland
More informationBernoulli Numbers and Polynomials
Bernoull Numbers and Polynomals T. Muthukumar tmk@tk.ac.n 17 Jun 2014 The sum of frst n natural numbers 1, 2, 3,..., n s n n(n + 1 S 1 (n := m = = n2 2 2 + n 2. Ths formula can be derved by notng that
More informationDISCRIMINANTS AND RAMIFIED PRIMES. 1. Introduction A prime number p is said to be ramified in a number field K if the prime ideal factorization
DISCRIMINANTS AND RAMIFIED PRIMES KEITH CONRAD 1. Introducton A prme number p s sad to be ramfed n a number feld K f the prme deal factorzaton (1.1) (p) = po K = p e 1 1 peg g has some e greater than 1.
More informationREVERSE MATHEMATICS AND PROPERTIES OF FINITE CHARACTER
REVERSE MATHEMATICS AND PROPERTIES OF FINITE CHARACTER DAMIR D. DZHAFAROV AND CARL MUMMERT Abstract. We study the reverse mathematcs of the prncple statng that, for every property of fnte character, every
More informationLecture 11. minimize. c j x j. j=1. 1 x j 0 j. +, b R m + and c R n +
Topcs n Theoretcal Computer Scence May 4, 2015 Lecturer: Ola Svensson Lecture 11 Scrbes: Vncent Eggerlng, Smon Rodrguez 1 Introducton In the last lecture we covered the ellpsod method and ts applcaton
More informationHMMT February 2016 February 20, 2016
HMMT February 016 February 0, 016 Combnatorcs 1. For postve ntegers n, let S n be the set of ntegers x such that n dstnct lnes, no three concurrent, can dvde a plane nto x regons (for example, S = {3,
More informationRandom DFAs over a non-unary alphabet
Random DFAs over a non-unary alphabet Jean-Marc Champarnaud and Thomas Paranthoën Unversty of Rouen, LIFAR, F-76821 Mont-Sant-Agnan Cedex, France {Jean-Marc.Champarnaud, Thomas.Paranthoen} @unv-rouen.fr
More informationErrors for Linear Systems
Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch
More informationComputing Correlated Equilibria in Multi-Player Games
Computng Correlated Equlbra n Mult-Player Games Chrstos H. Papadmtrou Presented by Zhanxang Huang December 7th, 2005 1 The Author Dr. Chrstos H. Papadmtrou CS professor at UC Berkley (taught at Harvard,
More information20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The first idea is connectedness.
20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The frst dea s connectedness. Essentally, we want to say that a space cannot be decomposed
More informationStructure and Drive Paul A. Jensen Copyright July 20, 2003
Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.
More informationk(k 1)(k 2)(p 2) 6(p d.
BLOCK-TRANSITIVE 3-DESIGNS WITH AFFINE AUTOMORPHISM GROUP Greg Gamble Let X = (Z p d where p s an odd prme and d N, and let B X, B = k. Then t was shown by Praeger that the set B = {B g g AGL d (p} s the
More informationFinding Dense Subgraphs in G(n, 1/2)
Fndng Dense Subgraphs n Gn, 1/ Atsh Das Sarma 1, Amt Deshpande, and Rav Kannan 1 Georga Insttute of Technology,atsh@cc.gatech.edu Mcrosoft Research-Bangalore,amtdesh,annan@mcrosoft.com Abstract. Fndng
More information