On the Complexity of Partial Order Trace Model Checking

Size: px
Start display at page:

Download "On the Complexity of Partial Order Trace Model Checking"

Transcription

1 On the Complexty of Partal Order Trace Model Checkng Therry Massart Cédrc Meuter Laurent Van Begn Unversté Lbre de Bruxelles (U.L.B.), Boulevard du Tromphe, CP-212, 1050 Bruxelles, Belgum Keywords: computatonal complexty, dstrbuted systems, formal methods 1 Introducton The desgn of a dstrbuted system s known to be a dffcult task whch can be eased by varous technques ncludng valdaton and debuggng. The model-based desgn abstracts the actons the system can do nto events whch change ts global state. Dependng on the varous assumptons the desgner can make, the model can be ether centralzed, provdng a global observaton and control on the entre system or dstrbuted where each event s local to some process and asynchronous communcatons allow the concurrent processes to communcate. The model valdaton checks that t has the requred propertes, usually expressed by temporal logc formulae, e.g. n Ctl, Ctl or Ltl [2]. In practce, ths abstracton s generally not suffcent to avod the state-exploson problem whch prevents the desgner from exhaustvely verfyng the whole system, even wth effcent exploraton technques such as partal order reducton or symbolc model checkng [2]. The desgner may therefore want to analyse or valdate smpler models whch descrbe only some facets of the system. As such, t may be mportant, durng the early desgn phases, to check scenaros expressed for nstance by Message Sequence Charts [5]. Durng the testng and deployment phases, executons must be valdated; runtme verfcaton technques [4] are typcally desgned for that purpose. The practcal valdty of these methods depend on the number of test-cases, to gve a reasonable confdence that the system s correct. Therefore, theoretcal and practcal effcency Supported by the Belgan Scence Polcy IAP-Phase VI: MoVES and Centre Fédéré en Vérfcaton (FNRS- FRFC n ) Research fellow supported by the Belgan Natonal Scence Foundaton (FNRS). 1

2 of the algorthms able to solve the problem are crucal. In the centralzed case, an executon of the system s a sequence of events. The complexty of determnng f such an executon satsfes a property has been studed n [7] where t s shown that the problem can be solved effcently. In the dstrbuted case, the exact order n whch two concurrent events occur n the executon s, n general, not always known or guaranteed. By takng nto account the communcatons between processes, however, a partal order on the events of the executon can stll be obtaned. Hence n ths case, an executon can be vewed as a partally ordered set of events called partal order trace. The global propertes satsfacton on these partal order traces has been wdely studed snce the 90 s. Chase and Garg have shown n [1], that the global predcate detecton problem,.e. the reachablty of a system s state whch satsfes some global predcate, s NP-complete for an arbtrary predcate, even when there s no nter-process communcaton. However, varous classes of propertes can be checked effcently n polynomal tme (see e.g. [3, 6] whch relates these methods). Sen and Garg extended the study to temporal operators and defned the RCtl logc [9], a restrcted form of Ctl whose model checkng s polynomal on partal order traces. In prevous works, we developed symbolc Ltl [3] and Ctl [6] model checkng of partal order traces and showed ther effcency n practce. We study here the theoretcal complexty of Ctl, Ctl and Ltl model checkng over fnte partal order traces. We show that over such partal order traces, Ctl and Ctl model checkng are PSPACE-complete and that the Ltl model checkng s conp-complete. 2 Basc defntons In ths secton, we recall the satsfablty problems for propostonal and quantfed propostonal formulae. In the rest of the paper, we assume an nfnte and countable set P of propostons and B denotes the set of Boolean values,.e. B = {tt, ff} where tt stands for true and ff for false. Propostonal Boolean Formulae A Propostonal Boolean Formula (PBF) φ s defned usng the followng grammar: φ ::= p φ φ φ, where denotes the true formula, and p P. Moreover, let denotes the formula (the false formula). Other standard Boolean operators (,, ) are derved as usual. The (fnte) set of propostons appearng n a PBF formula φ s denoted by P(φ). A PBF φ s nterpreted usng a valuaton of P(φ),.e. a functon v : P(φ) B. The satsfacton of a PBF φ by a valuaton v, noted v = φ, s defned as usual. The PBF φ s satsfable f there exsts a valuaton v such that v = φ. The sze of the PBF φ, noted φ, s defned nductvely as follows: () f φ = or φ = p then φ = 1, () f φ = φ 1 then φ = φ and () f φ = φ 1 φ 2 then φ = φ 1 + φ Fnally, gven a PBF φ, the PBF-SAT problem conssts n determnng f φ s satsfable. Ths problem s known to be NP-complete [8]. 2

3 Quantfed Boolean Formulae A Quantfed Boolean Formula (QBF) ψ s a formula of the form Q 1 p 1 Q 2 p 2... Q r p r φ where () φ s a PBF over P and () Q {, } and p P(φ) for [1, r]. Note that a PBF s a QBF wthout quantfers (r = 0). In the followng, we assume that each proposton s quantfed at most once. A fully QBF s a QBF where all propostons are quantfed. QBF are also nterpreted over valuatons. As n the PBF case, P(ψ) denotes the set of propostons appearng n the QBF ψ. A valuaton v : P(ψ) B satsfes a QBF ψ s noted v = ψ. The satsfacton s derved from the propostonal case as follows. If ψ = p ψ, then v = ψ ff v[p tt] = ψ and v[p ff] = ψ and, f ψ = p ψ, then v = ψ ff v[p tt] = ψ or v[p ff] = ψ. Note that the truth value of a QBF formula ψ depends only on the valuaton of ts free propostons,.e. those used n ψ and not lnked by a quantfer. In partcular, f ψ s a fully QBF, ts truth value does not depend on v. Smlarly to PBF, a QBF ψ s satsfable f there exsts a valuaton v such that v = ψ. The sze of a QBF ψ = Q 1 p 1 Q 2 p 2... Q r p r φ where φ s a PBF, noted ψ, s equal to φ. Note that the number of quantfers n ψ s bounded by φ. Gven a (fully) QBF ψ, the QBF-SAT problem conssts n decdng f ψ s satsfable. Ths problem s known to be PSPACE-complete, even for fully QBF [8]. 3 Ctl, Ctl and Ltl over partal order traces Partal Order Traces A partal order trace (po-trace) s a tuple T = E, P 0, α, β, where () E s a fnte set of events; () P 0 P s the fnte set of propostons ntally true; () α : E 2 P (resp. β : E 2 P ) s a functon gvng for each event e the fnte set of propostons set to tt (resp. ff) such that e E : α(e) β(e) = ; and () E E s a partal order relaton on E such that e, e E: ((α(e) β(e)) (α(e ) β(e )) ) (e e ) (e e),.e. f the truth value of at least one proposton s modfed by two events, then those events must be ordered. Gven an event e E, we defne e = {e E e e}, the past of e (ncludng e tself). The fnte ( ) set of propostons used by T s denoted by P(T ),.e P(T ) = P 0 e E α(e) β(e). A cut s a subset C E such that e C : e C. The set of cuts s denoted by cuts(t ). Gven a cut C cuts(t ), we defne enabled(c) = {e E \ C ( e \ {e}) C} the set of events enabled n C, and C /p = {e C p α(e) β(e)} the set of events of C that modfes the truth value of p. Note that for every proposton p, the set C /p s totally ordered. The set of propostons true n a cut C, noted P C s then defned as {p P(T ) (C /p = p P 0 ) (C /p p α(max(c /p ))}. If an event e s enabled n the cut C, then t can be fred from C leadng to C = C {e}, noted C C. A path σ s a sequence σ = C 0... C k cuts(t ) such that k 0 and [0, k) : C C +1. The sze σ of the sequence σ s the number of frngs from C 0 n σ (.e. k here) 1 ; and we note σ the suffx C, C +1,... C k. σ s left undefned f > σ. A run from a cut C s a path σ = C 0... C k 1 Note that σ could also have been defned as ts number of states (.e. k + 1 here) 3

4 wth () C 0 = C and () C k = E. The set of runs startng n a cut C cuts(t ) s denoted by runs(c). The sze of the po-trace T = E, P 0, α, β,, noted T, s equal to E + + P(T ). Ctl Formulae n the temporal logc Ctl are defned usng the followng grammar: Ψ ::= p Ψ Ψ Ψ Φ Φ Φ ::= Ψ Φ Φ Φ ΦUΦ Φ where Ψ s a state formula, Φ s a path formula, p P, U s the untl operator and s the next operator. Other Boolean constructs (,,, ) are defned as n the PBF case. In our case, Ctl state (resp. path) formulae are nterpreted over cuts C (paths σ) of a po-trace T. The satsfacton relaton, noted = C (resp. = σ ) for state (resp. path) formulae, s the smallest relaton that satsfes the followng: T, C = C T, C = C p p P C T, C = C Ψ ff T, C = C Ψ T, C = C Ψ 1 Ψ 2 ff T, C = C Ψ 1 T, C = C Ψ 2 T, C = C Φ ff σ runs(c) : T, σ = σ Φ T, C = C Φ ff σ runs(c) : T, σ = σ Φ T, σ = σ Ψ ff T, C 0 = C Ψ T, σ = σ Φ ff T, σ = σ Φ T, σ = σ Φ 1 Φ 2 ff T, σ = σ Φ 1 T, σ = σ Φ 2 T, σ = σ Φ ff σ > 0 T, σ 1 = σ Φ T, σ = σ Φ 1 UΦ 2 ff [0, σ ] : (( T, σ = σ Φ 2 ) ( j [0, ) : T, σ j = σ Φ 1 )) where σ = C 0... C k, Φ, Φ 1, Φ 2 are path formulae and Ψ, Ψ 1, Ψ 2 are state formulae. A po-trace T satsfes a Ctl state formula Ψ, noted T = Ψ, ff T, = C Ψ. The sze of a Ctl formula Ψ, noted Ψ, s defned nductvely as follows: () f Ψ = or Ψ = p then Ψ = 1; () f Ψ = Ψ 1, Ψ = Ψ 1, Ψ = Ψ 1 or Ψ = Ψ 1 then Ψ = Ψ 1 + 1; f Ψ = Ψ 1 Ψ 2 or Ψ = Ψ 1 UΨ 2 then Ψ = Ψ 1 + Ψ Ctl has n partcular two useful fragments : Computaton Tree Logc (Ctl) s a fragment of Ctl n whch each and U operators must be mmedately preceded by a path quantfer. Formally, a Ctl formula Ψ s defned usng the grammar : Ψ ::= p Ψ Ψ Ψ Ψ Ψ [ΨUΨ] [ΨUΨ] Lnear Tme Logc (Ltl) s another fragment of Ctl n whch each formula has the form Φ and the only state sub-formulae permtted are and atomc propostons p P. Formally, a Ltl formula Ψ s defned usng the grammar : Ψ ::= Φ Φ ::= p Φ Φ Φ Φ ΦUΦ Gven a po-trace T and a formula Ψ, the model checkng problem conssts n determnng f T = Ψ. In the remander of the paper, we nvestgate the complexty of the model checkng problem for Ctl, Ctl and Ltl formulae. 4

5 4 Ctl and Ctl Model Checkng We start wth the model checkng problem for Ctl and Ctl. Frst, we wll show that for Ctl, the problem s PSPACE-hard. Snce Ctl s a fragment of Ctl, t mples that the problem for Ctl s also PSPACE-hard. Then, we show that, for Ctl, the problem s PSPACE-easy. Agan, snce Ctl s a fragment Ctl, t follows that the problem for Ctl s also PSPACE-easy. Those results allow us to conclude that for Ctl and Ctl, the model checkng problem s PSPACE-complete. In order to prove that for Ctl, the model checkng problem s PSPACE-hard, we exhbt a polynomal reducton of (fully) QBF-SAT. that works as follows. Let ψ be a fully QBF wth P(ψ) = {p 1,..., p r }. We buld a po-trace T P(ψ) and a Ctl formula Ψ ψ and prove that ψ s satsfable ff T P(ψ) = Ψ ψ. The po-trace T P(ψ) = E, P 0, α, β, s bult over set of propostons [1,r] {q, q } as follows: () E = [1,r] {e, e }; () P 0 = ; () [1, r] : α(e ) = {q } β(e ) = α(e ) = {q } β(e ) = and fnally (v) =. The Ctl formula Ψ ψ s defned nductvely as follows: ψ[p 1 eval tt 1,..., p r eval tt r ] Ψ ψ = f ψ s a PBF ((eval tt eval ff ) Ψ ψ1 ) f ψ = p ψ 1 ((eval tt eval ff ) Ψ ψ1 ) f ψ = p ψ 1 where eval tt = (q q ), evalff = ( q q ), and where ψ[p 1 φ 1,..., p r φ r ] denotes the formula ψ where every occurrence of proposton p s replaced by the formula φ for [1, r]. As a frst remark, t s clear that the szes of Ψ ψ and T P(ψ) are polynomal n the sze of ψ. Indeed, each proposton n ψ s replaced by a sub-formula of (constant) sze 4 and each quantfcaton s replaced by a construct of (constant) sze 12. In the followng, for any [1, r], we note C tt = {e }, resp. C ff = {e }, the mnmal cut satsfyng evaltt, resp. eval ff. Formally, T P(ψ), C tt = C eval tt and T P(ψ), C ff = C eval ff snce P C tt = {q } and P C ff = {q }. Lemma 1 Gven a fully QBF ψ, T P(ψ) = Ψ ψ ff ψ s satsfable. Proof. We prove by nducton on P(ψ) that ψ s satsfable ff T P(ψ), = C Ψ ψ. Base cases. If P(ψ) = 0, then P(ψ) = and ψ s a Boolean combnaton of. If ψ, by defnton of Ψ ψ we have Ψ ψ = ψ[p 1 eval tt 1,..., p r eval tt r ] = ψ. In ths case, we have that T P(ψ), = C Ψ ψ. If ψ, Ψ ψ, hence T P(ψ), = C Ψ ψ. We conclude that T P(ψ), = C Ψ ψ ff ψ s satsfable. Inducton cases. We have to consder two cases: The frst case s when ψ = p ψ 1. In ths case, ψ s satsfable ff ψ 1 [p ] or ψ 1 [p ] s satsfable. By nducton, ths s 5

6 equvalent to T P(ψ)\{p}, = C Ψ ψ1[p ] or T P(ψ)\{p}, = C Ψ ψ1[p ]. By defnton of Ψ ψ1, ths holds ff T P(ψ)\{p}, = C Ψ ψ1 [q, q ] or T P(ψ)\{p }, = C Ψ ψ1 [q, q ], and by defnton of C tt and C ff, ff T P(ψ), C tt = C Ψ ψ1 or T P(ψ), C ff = C Ψ ψ1. Now snce C tt (resp. C ff ) contans the only event that can satsfy evaltt (resp. eval ff ), we deduce that T P(ψ), C b = C Ψ ψ1 ff T P(ψ), = C (eval b Ψ ψ1 ) for any b B. We can therefore conclude that ψ s satsfable ff T P(ψ), = C (eval tt Ψ ψ1 ) or T P(ψ), = C (eval ff Ψ ψ1 ), or equvalently f T P(ψ), = C ( (eval tt s equvalent to ((eval tt eval ff ) Ψ ψ1 ) = Ψ ψ. Ψ ψ1 )) ( (eval ff Ψ ψ1 )). Fnally, ths last formula The second case s when ψ = p ψ 1. In ths case, ψ s satsfable ff ψ 1 [p ] and ψ 1 [p ] are satsfable. Smlarly to the frst case, by nducton, defnton of Ψ ψ1, C tt and C ff, ths holds ff T P(ψ), C tt = C Ψ ψ1 and T P(ψ), C ff = C Ψ ψ1. Note that for any cuts C such that C ether C = C b wth b B and C = evalb, or C = eval tt eval ff. We deduce that T P(ψ), C b = C Ψ ψ1 ff T P(ψ), = C (eval b Ψ ψ1 ) for any b B. We can therefore conclude that ψ s satsfable ff T P(ψ), = C (eval tt Ψ ψ1 ) and T P(ψ), = C (eval ff Ψ ψ1 ), or equvalently f T P(ψ), = C ( (eval tt Ψ ψ1 )) ( (eval ff Ψ ψ1 )). Fnally, the last formula s equvalent to ((eval ff eval tt ) Ψ ψ1 ) = Ψ ψ. From Lem. 1, we get the PSPACE-hardness for Ctl. Proposton 1 The model checkng problem over po-traces s PSPACE-hard for Ctl. Proof. Snce QBF-SAT s PSPACE-complete, Ψ ψ and T P(ψ) have sze polynomal w.r.t. the sze of a fully QBF ψ, we conclude by Lem. 1 that the proposton holds. Now, we show PSPACE-easness of the model checkng problem for Ctl by exhbtng a polynomal space algorthm that solves the problem. Proposton 2 The model checkng problem over po-traces s PSPACE-easy for Ctl Proof. Frst, we exhbt a recursve algorthm that takes a partal order trace T = E, P 0, α, β,, a Ctl state formula Ψ wth a cut C (resp. a Ctl trace formula Ψ wth a run σ = C 0 C 1... C k wth C = C 0 ), and returns true f and only f T, C = C Ψ (resp. T, σ = σ Ψ). The recurson follows the structure of the nference whch shows T, C = C Ψ or T, σ = σ Ψ. Then, we show nductvely on the depth of the recurson, that ths algorthm s polynomal space w.r.t. the sze of the formula Ψ and the sze of the po-trace T. Base cases. When Ψ = or Ψ = p. In the frst case, the algorthm always returns true. In the second case, f Ψ s a state formula then t bulds P C and returns true ff p P C. Inducton cases If σ contans sub-formulae, then the algorthm works as follows: Frst, f Ψ s evaluated on a trace σ = C 0... C k but t s not of the form Ψ 1 Ψ 2, Ψ 1, Ψ 1 or Ψ 1 UΨ 2, then Ψ s also a state formula and the algorthm returns true ff T, C 0 = C Ψ. 6

7 If Ψ = Ψ 1, Ψ = Ψ 1 Ψ 2, then Ψ 1 and Ψ 2 are frst evaluated and then the algorthm evaluates Ψ accordng to the usual semantcs of boolean connectors. If Ψ = QΨ 1 wth Q {, }, then Ψ s a state formula. In ths case, the algorthm enumerates all the runs σ runs(c) and then checks f T, σ = σ Ψ 1 holds. In the case where Q = (resp. Q = ), the algorthm returns true ff at least one run σ runs(c) (resp. all the runs σ runs(c)), s such that T, σ = σ Ψ 1. f Ψ = Ψ 1 then the algorthm returns true ff T, C 1... C k = σ Ψ 1 holds. f Ψ = Ψ 1 U Ψ 2, then Ψ s a path formula. For each 0 k, the algorthm frst consders the sub-formula Ψ 2 and checks f T, C... C k = σ Ψ 2 holds. If t s the case, the algorthm consders Ψ 1 and checks f T, C j... C k = σ Ψ 1 holds for all 0 j <. In the case of a postve answer for all 0 j <, the algorthm returns true. Fnally, f the algorthm does not conclude for any 0 k then t returns false. Let us now show that the algorthm uses only a polynomal space w.r.t. the sze of the formula Ψ and the sze of the partal order trace T. To smplfy the presentaton, we do not care about the memory used to store one cut, P C,.... However, t s mmedate that the memory used can be bounded by a polynomal n the sze of T by usng, for nstance, bt vectors to represent sets. More precsely, we show that the number of cuts that are computed and stored at the same tme nto memory by the algorthm s bounded by T Ψ. The proof s by nducton on the depth of the recurson of the algorthm used. Base cases If Ψ =, then the algorthm returns true n constant tme wthout buldng cuts, hence the result. If Ψ = p then Ψ s evaluated on the cut C and the algorthm bulds P C. Ths can be acheved n polynomal tme wthout buldng new cuts by frst computng for each p P(T ) the set C /p. Ths can be done by enumeratng the events e C and checks f p α(e) β(e) (ths can also be done by enumeratng α and β). If C /p s empty then p s n P C ff p P 0 (ths can be checked by enumeratng the elements of P 0 ). Otherwse, we fnd the maxmal element e max w.r.t n C /p by enumeratng the elements n C /p and. Fnally, p s n P C ff p α(e max ). Snce 0 T Ψ, we conclude. Inducton cases If Ψ = Ψ 1 or Ψ = Ψ 1 Ψ 2 then by nducton hypothess we know that the algorthm evaluates Ψ 1 and Ψ 2 (on runs or cuts) storng at most T ( Ψ 1) cuts (snce Ψ < Ψ for {1, 2}), hence t evaluates Ψ by storng at most T ( Ψ 1) T Ψ cuts. If Ψ = QΨ 1 wth Q {, }, then the algorthm enumerates all the runs σ runs(c). Ths can be done as follows: From C ntally equal to C, we enumerate the events e E and then test f e enabled(c ) and f there s no (e, e) such that e C by enumeratng the elements of and C. If t s the case, we terate from the cut C {e} untl we buld E. At each step, the algorthm only keeps n memory the cuts of the current nvestgated run. Snce the sze of 7

8 the runs are bounded by E, hence bounded by T, the number of cuts stored n memory when enumeratng all the runs σ runs(c) s bounded by T. Then, by nducton hypothess, the algorthm uses memory bounded by T Ψ 1 to check f T, σ = σ Ψ 1 holds. Snce Ψ = Ψ, we conclude that the algorthm mantans at most T Ψ cuts n memory when evaluatng Ψ. If Ψ = Ψ 1, the algorthm evaluates Ψ 1 on a trace. By nducton hypothess, ths s acheved by storng at most Ψ 1 T cuts. Furthermore, the trace over whch Ψ 1 s evaluated has sze bounded by T. Snce Ψ = Ψ 1 + 1, we conclude that the algorthm stores at most Ψ T cuts. If Ψ = Ψ 1 U Ψ 2, then assume that Ψ s evaluated on the run σ. By nducton hypothess, the number of cuts stored n memory when evaluatng Ψ 1, resp. Ψ 2, on sub-sequences of σ s bounded by T Ψ 1, resp. T Ψ 2. Furthermore, Ψ 1 and Ψ 2 are evaluated on traces wth sze bounded by T. Snce Ψ 1 < Ψ and Ψ 2 < Ψ, we conclude that the number of cuts stored n memory by the algorthm when checkng Ψ s bounded by Ψ T. Fnally, n the case where the algorthm has to evaluate a formula Ψ on the trace C 0... C k that s not of the form Ψ 1, Ψ 1 Ψ 2, Ψ 1 or Ψ 1 UΨ 2, then the algorthm evaluates Ψ on C 0 as explaned above and we drectly conclude from the prevous cases. From Propostons 1 and 2, and snce Ctl s a subset of Ctl, we conclude that the followng theorem holds. Theorem 1 The model checkng problem over po-trace s PSPACE-complete for Ctl and Ctl. 5 Ltl Model Checkng We now prove that the model checkng problem for the lnear-tme temporal logc Ltl s conpcomplete on po-traces. For that purpose, we examne the dual problem of model checkng LTL formulae,.e. formulae of the form Φ where Φ s a restrcted path formula, as defned n the grammar of LTL. We frst show that ths problem s NP-easy. Proposton 3 The model checkng over po-traces s NP-easy for LTL Proof. We exhbt a non-determnstc polynomal tme algorthm. The algorthm works as follows: t frst guesses a run σ of the po-trace T, and then checks that the formula holds on that run. The algorthm starts from C =, and for each cut of the run t guesses an event e, checks that e enabled(c ) and then bulds the next cut C {e}. The test e enabled(c ) can be acheved n polynomal tme by enumeratng the events of C to ensure that e C and then enumerate the elements of (together wth those of C ) to ensure that e e mples that e C. Fnally, note that the sze of a run n runs( ) has sze E. Fnally, Ltl model-checkng on a run can solved n polynomal tme [7, Proposton 3.3]. 8

9 Next, we show that the model checkng problem s NP-hard for LTL. For that, we reduce the global predcate detecton whch s known NP-complete [1]. In our framework, ths problem can be stated as follows. Gven a po-trace T and a PBF φ over P(T ), the global predcate detecton conssts n determnng f C cuts(t ) : T, C = C φ. Proposton 4 The model checkng problem over po-traces s NP-hard for LTL. Proof. Gven a po-trace T, and a PBF φ, t s mmedate that C cuts(t ) : T, C = C φ f and only f T = ( Uφ). We can therefore conclude that the model checkng problem s NP-complete for LTL and therefore conp-complete for Ltl, as stated n the followng theorem. Theorem 2 The model checkng problem over po-traces s conp-complete for Ltl. Hence theorem 1 and 2 show that contrarly to complete systems (Krpke structures) [2], over po-traces, Ltl has a lower complexty that Ctl and Ctl. References [1] C. M. Chase, V. K. Garg, Detecton of global predcates: Technques and ther lmtatons., Dstrbuted Computng 11 (4) (1998) [2] E. Clarke, O. Grumberg, D. Peled, Model Checkng, The MIT Press, [3] A. Genon, T. Massart, C. Meuter, Montorng dstrbuted controllers: When an effcent ltl algorthm on sequences s needed to model-check traces., n: J. Msra, T. Npkow, E. Sekernsk (eds.), FM, vol of LNCS, Sprnger, [4] K. Havelund, Usng runtme analyss to gude model checkng of java programs., n: K. Havelund, J. Penx, W. Vsser (eds.), SPIN, vol of LNCS, Sprnger, [5] ITU-TS, ITU-TS Recommendaton Z.120: Message Sequence Chart (MSC), Geneva (1999). [6] G. Kalyon, T. Massart, C. Meuter, L. V. Begn, Testng dstrbuted systems through symbolc model checkng., n: J. Derrck, J. Van (eds.), FORTE, vol of Lecture Notes n Computer Scence, Sprnger, [7] N. Markey, P. Schnoebelen, Model checkng a path., n: R. M. Amado, D. Lugez (eds.), CONCUR, vol of LNCS, Sprnger, [8] C. H. Papadmtrou, Computatonal Complexty, Addson Wesley Longman, [9] A. Sen, V. K. Garg, Detectng temporal logc predcates n dstrbuted programs usng computaton slcng., n: M. Papatrantaflou, P. Hunel (eds.), OPODIS, vol of LNCS, Sprnger,

NP-Completeness : Proofs

NP-Completeness : Proofs NP-Completeness : Proofs Proof Methods A method to show a decson problem Π NP-complete s as follows. (1) Show Π NP. (2) Choose an NP-complete problem Π. (3) Show Π Π. A method to show an optmzaton problem

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

2.3 Nilpotent endomorphisms

2.3 Nilpotent endomorphisms s a block dagonal matrx, wth A Mat dm U (C) In fact, we can assume that B = B 1 B k, wth B an ordered bass of U, and that A = [f U ] B, where f U : U U s the restrcton of f to U 40 23 Nlpotent endomorphsms

More information

APPENDIX A Some Linear Algebra

APPENDIX A Some Linear Algebra APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

Affine transformations and convexity

Affine transformations and convexity Affne transformatons and convexty The purpose of ths document s to prove some basc propertes of affne transformatons nvolvng convex sets. Here are a few onlne references for background nformaton: http://math.ucr.edu/

More information

The Complexity of Propositional Linear Temporal Logics in Simple Cases 1

The Complexity of Propositional Linear Temporal Logics in Simple Cases 1 Informaton and Computaton 174, 84 103 (2002) do:10.1006/nco.2001.3094, avalable onlne at http://www.dealbrary.com on The Complexty of Propostonal Lnear Temporal Logcs n Smple Cases 1 Stéphane Demr and

More information

Calculation of time complexity (3%)

Calculation of time complexity (3%) Problem 1. (30%) Calculaton of tme complexty (3%) Gven n ctes, usng exhaust search to see every result takes O(n!). Calculaton of tme needed to solve the problem (2%) 40 ctes:40! dfferent tours 40 add

More information

a b a In case b 0, a being divisible by b is the same as to say that

a b a In case b 0, a being divisible by b is the same as to say that Secton 6.2 Dvsblty among the ntegers An nteger a ε s dvsble by b ε f there s an nteger c ε such that a = bc. Note that s dvsble by any nteger b, snce = b. On the other hand, a s dvsble by only f a = :

More information

Remarks on the Properties of a Quasi-Fibonacci-like Polynomial Sequence

Remarks on the Properties of a Quasi-Fibonacci-like Polynomial Sequence Remarks on the Propertes of a Quas-Fbonacc-lke Polynomal Sequence Brce Merwne LIU Brooklyn Ilan Wenschelbaum Wesleyan Unversty Abstract Consder the Quas-Fbonacc-lke Polynomal Sequence gven by F 0 = 1,

More information

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg prnceton unv. F 17 cos 521: Advanced Algorthm Desgn Lecture 7: LP Dualty Lecturer: Matt Wenberg Scrbe: LP Dualty s an extremely useful tool for analyzng structural propertes of lnear programs. Whle there

More information

Module 9. Lecture 6. Duality in Assignment Problems

Module 9. Lecture 6. Duality in Assignment Problems Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept

More information

Assortment Optimization under MNL

Assortment Optimization under MNL Assortment Optmzaton under MNL Haotan Song Aprl 30, 2017 1 Introducton The assortment optmzaton problem ams to fnd the revenue-maxmzng assortment of products to offer when the prces of products are fxed.

More information

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009 College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:

More information

For now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results.

For now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results. Neural Networks : Dervaton compled by Alvn Wan from Professor Jtendra Malk s lecture Ths type of computaton s called deep learnng and s the most popular method for many problems, such as computer vson

More information

Perfect Competition and the Nash Bargaining Solution

Perfect Competition and the Nash Bargaining Solution Perfect Competton and the Nash Barganng Soluton Renhard John Department of Economcs Unversty of Bonn Adenauerallee 24-42 53113 Bonn, Germany emal: rohn@un-bonn.de May 2005 Abstract For a lnear exchange

More information

Edge Isoperimetric Inequalities

Edge Isoperimetric Inequalities November 7, 2005 Ross M. Rchardson Edge Isopermetrc Inequaltes 1 Four Questons Recall that n the last lecture we looked at the problem of sopermetrc nequaltes n the hypercube, Q n. Our noton of boundary

More information

More metrics on cartesian products

More metrics on cartesian products More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of

More information

CHAPTER 17 Amortized Analysis

CHAPTER 17 Amortized Analysis CHAPTER 7 Amortzed Analyss In an amortzed analyss, the tme requred to perform a sequence of data structure operatons s averaged over all the operatons performed. It can be used to show that the average

More information

Week 2. This week, we covered operations on sets and cardinality.

Week 2. This week, we covered operations on sets and cardinality. Week 2 Ths week, we covered operatons on sets and cardnalty. Defnton 0.1 (Correspondence). A correspondence between two sets A and B s a set S contaned n A B = {(a, b) a A, b B}. A correspondence from

More information

Difference Equations

Difference Equations Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1

More information

Foundations of Arithmetic

Foundations of Arithmetic Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an

More information

n α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0

n α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0 MODULE 2 Topcs: Lnear ndependence, bass and dmenson We have seen that f n a set of vectors one vector s a lnear combnaton of the remanng vectors n the set then the span of the set s unchanged f that vector

More information

ON A DETERMINATION OF THE INITIAL FUNCTIONS FROM THE OBSERVED VALUES OF THE BOUNDARY FUNCTIONS FOR THE SECOND-ORDER HYPERBOLIC EQUATION

ON A DETERMINATION OF THE INITIAL FUNCTIONS FROM THE OBSERVED VALUES OF THE BOUNDARY FUNCTIONS FOR THE SECOND-ORDER HYPERBOLIC EQUATION Advanced Mathematcal Models & Applcatons Vol.3, No.3, 2018, pp.215-222 ON A DETERMINATION OF THE INITIAL FUNCTIONS FROM THE OBSERVED VALUES OF THE BOUNDARY FUNCTIONS FOR THE SECOND-ORDER HYPERBOLIC EUATION

More information

Min Cut, Fast Cut, Polynomial Identities

Min Cut, Fast Cut, Polynomial Identities Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.

More information

NOTES ON SIMPLIFICATION OF MATRICES

NOTES ON SIMPLIFICATION OF MATRICES NOTES ON SIMPLIFICATION OF MATRICES JONATHAN LUK These notes dscuss how to smplfy an (n n) matrx In partcular, we expand on some of the materal from the textbook (wth some repetton) Part of the exposton

More information

Lecture 3 January 31, 2017

Lecture 3 January 31, 2017 CS 224: Advanced Algorthms Sprng 207 Prof. Jelan Nelson Lecture 3 January 3, 207 Scrbe: Saketh Rama Overvew In the last lecture we covered Y-fast tres and Fuson Trees. In ths lecture we start our dscusson

More information

Feature Selection: Part 1

Feature Selection: Part 1 CSE 546: Machne Learnng Lecture 5 Feature Selecton: Part 1 Instructor: Sham Kakade 1 Regresson n the hgh dmensonal settng How do we learn when the number of features d s greater than the sample sze n?

More information

Symbolic Model Checking without BDDs

Symbolic Model Checking without BDDs Symbolc Model Checng wthout BDDs Armn Bere 1 Alessandro Cmatt 2 Edmund Clare 1 Yunshan Zhu 1 January 4, 1999 CMU-CS-99-101 School of Computer Scence Carnege Mellon Unversty Pttsburgh, PA 15213 Submtted

More information

On the Repeating Group Finding Problem

On the Repeating Group Finding Problem The 9th Workshop on Combnatoral Mathematcs and Computaton Theory On the Repeatng Group Fndng Problem Bo-Ren Kung, Wen-Hsen Chen, R.C.T Lee Graduate Insttute of Informaton Technology and Management Takmng

More information

Plans. Memoryless plans Definition. Memoryless plans Example. Images Formal definition. Images. Preimages. Preimages. Definition

Plans. Memoryless plans Definition. Memoryless plans Example. Images Formal definition. Images. Preimages. Preimages. Definition Noetermnstc plannng (May 25, 2005) Plans AND-OR search Dynamc programmng (Albert-Ludwgs-Unverstät Freburg) 1 / 56 Plans Plans 1. map a state/an observaton to an operator. We use ths defnton of plans for

More information

Games of Threats. Elon Kohlberg Abraham Neyman. Working Paper

Games of Threats. Elon Kohlberg Abraham Neyman. Working Paper Games of Threats Elon Kohlberg Abraham Neyman Workng Paper 18-023 Games of Threats Elon Kohlberg Harvard Busness School Abraham Neyman The Hebrew Unversty of Jerusalem Workng Paper 18-023 Copyrght 2017

More information

A CLASS OF RECURSIVE SETS. Florentin Smarandache University of New Mexico 200 College Road Gallup, NM 87301, USA

A CLASS OF RECURSIVE SETS. Florentin Smarandache University of New Mexico 200 College Road Gallup, NM 87301, USA A CLASS OF RECURSIVE SETS Florentn Smarandache Unversty of New Mexco 200 College Road Gallup, NM 87301, USA E-mal: smarand@unmedu In ths artcle one bulds a class of recursve sets, one establshes propertes

More information

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction ECONOMICS 5* -- NOTE (Summary) ECON 5* -- NOTE The Multple Classcal Lnear Regresson Model (CLRM): Specfcaton and Assumptons. Introducton CLRM stands for the Classcal Lnear Regresson Model. The CLRM s also

More information

The Minimum Universal Cost Flow in an Infeasible Flow Network

The Minimum Universal Cost Flow in an Infeasible Flow Network Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran

More information

Stanford University CS254: Computational Complexity Notes 7 Luca Trevisan January 29, Notes for Lecture 7

Stanford University CS254: Computational Complexity Notes 7 Luca Trevisan January 29, Notes for Lecture 7 Stanford Unversty CS54: Computatonal Complexty Notes 7 Luca Trevsan January 9, 014 Notes for Lecture 7 1 Approxmate Countng wt an N oracle We complete te proof of te followng result: Teorem 1 For every

More information

On the set of natural numbers

On the set of natural numbers On the set of natural numbers by Jalton C. Ferrera Copyrght 2001 Jalton da Costa Ferrera Introducton The natural numbers have been understood as fnte numbers, ths wor tres to show that the natural numbers

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

Math Review. CptS 223 Advanced Data Structures. Larry Holder School of Electrical Engineering and Computer Science Washington State University

Math Review. CptS 223 Advanced Data Structures. Larry Holder School of Electrical Engineering and Computer Science Washington State University Math Revew CptS 223 dvanced Data Structures Larry Holder School of Electrcal Engneerng and Computer Scence Washngton State Unversty 1 Why do we need math n a data structures course? nalyzng data structures

More information

Notes on Frequency Estimation in Data Streams

Notes on Frequency Estimation in Data Streams Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to

More information

MAT 578 Functional Analysis

MAT 578 Functional Analysis MAT 578 Functonal Analyss John Qugg Fall 2008 Locally convex spaces revsed September 6, 2008 Ths secton establshes the fundamental propertes of locally convex spaces. Acknowledgment: although I wrote these

More information

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could

More information

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal Inner Product Defnton 1 () A Eucldean space s a fnte-dmensonal vector space over the reals R, wth an nner product,. Defnton 2 (Inner Product) An nner product, on a real vector space X s a symmetrc, blnear,

More information

9 Characteristic classes

9 Characteristic classes THEODORE VORONOV DIFFERENTIAL GEOMETRY. Sprng 2009 [under constructon] 9 Characterstc classes 9.1 The frst Chern class of a lne bundle Consder a complex vector bundle E B of rank p. We shall construct

More information

Ballot Paths Avoiding Depth Zero Patterns

Ballot Paths Avoiding Depth Zero Patterns Ballot Paths Avodng Depth Zero Patterns Henrch Nederhausen and Shaun Sullvan Florda Atlantc Unversty, Boca Raton, Florda nederha@fauedu, ssull21@fauedu 1 Introducton In a paper by Sapounaks, Tasoulas,

More information

FINITELY-GENERATED MODULES OVER A PRINCIPAL IDEAL DOMAIN

FINITELY-GENERATED MODULES OVER A PRINCIPAL IDEAL DOMAIN FINITELY-GENERTED MODULES OVER PRINCIPL IDEL DOMIN EMMNUEL KOWLSKI Throughout ths note, s a prncpal deal doman. We recall the classfcaton theorem: Theorem 1. Let M be a fntely-generated -module. (1) There

More information

Lecture Space-Bounded Derandomization

Lecture Space-Bounded Derandomization Notes on Complexty Theory Last updated: October, 2008 Jonathan Katz Lecture Space-Bounded Derandomzaton 1 Space-Bounded Derandomzaton We now dscuss derandomzaton of space-bounded algorthms. Here non-trval

More information

Variants of Quantified Linear Programming and Quantified Linear Implication

Variants of Quantified Linear Programming and Quantified Linear Implication Varants of Quantfed Lnear Programmng and Quantfed Lnear Implcaton Potr Wojcechowsk LDCSEE West Vrgna Unversty Morgantown, WV pwojcec@mx.wvu.edu Pavlos Ernaks DMST Athens Unversty of Economcs and Busness

More information

Polynomials. 1 More properties of polynomials

Polynomials. 1 More properties of polynomials Polynomals 1 More propertes of polynomals Recall that, for R a commutatve rng wth unty (as wth all rngs n ths course unless otherwse noted), we defne R[x] to be the set of expressons n =0 a x, where a

More information

Bézier curves. Michael S. Floater. September 10, These notes provide an introduction to Bézier curves. i=0

Bézier curves. Michael S. Floater. September 10, These notes provide an introduction to Bézier curves. i=0 Bézer curves Mchael S. Floater September 1, 215 These notes provde an ntroducton to Bézer curves. 1 Bernsten polynomals Recall that a real polynomal of a real varable x R, wth degree n, s a functon of

More information

Lecture 10: May 6, 2013

Lecture 10: May 6, 2013 TTIC/CMSC 31150 Mathematcal Toolkt Sprng 013 Madhur Tulsan Lecture 10: May 6, 013 Scrbe: Wenje Luo In today s lecture, we manly talked about random walk on graphs and ntroduce the concept of graph expander,

More information

Differential Polynomials

Differential Polynomials JASS 07 - Polynomals: Ther Power and How to Use Them Dfferental Polynomals Stephan Rtscher March 18, 2007 Abstract Ths artcle gves an bref ntroducton nto dfferental polynomals, deals and manfolds and ther

More information

U.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016

U.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016 U.C. Berkeley CS94: Spectral Methods and Expanders Handout 8 Luca Trevsan February 7, 06 Lecture 8: Spectral Algorthms Wrap-up In whch we talk about even more generalzatons of Cheeger s nequaltes, and

More information

The internal structure of natural numbers and one method for the definition of large prime numbers

The internal structure of natural numbers and one method for the definition of large prime numbers The nternal structure of natural numbers and one method for the defnton of large prme numbers Emmanul Manousos APM Insttute for the Advancement of Physcs and Mathematcs 3 Poulou str. 53 Athens Greece Abstract

More information

The Complexity of Early-Deciding in Unreliable Synchronous Networks Fabrice Le Fessant 1

The Complexity of Early-Deciding in Unreliable Synchronous Networks Fabrice Le Fessant 1 The Complexty of Early-Decdng n Unrelable Synchronous Networks Fabrce Le Fessant 1 fabrce@lefessant.net Mcrosoft Research Lab., Cambrdge, CB3 0FB, UK Aprl 1, 2003 Techncal Report MSR-TR-2003-23 Mcrosoft

More information

Bezier curves. Michael S. Floater. August 25, These notes provide an introduction to Bezier curves. i=0

Bezier curves. Michael S. Floater. August 25, These notes provide an introduction to Bezier curves. i=0 Bezer curves Mchael S. Floater August 25, 211 These notes provde an ntroducton to Bezer curves. 1 Bernsten polynomals Recall that a real polynomal of a real varable x R, wth degree n, s a functon of the

More information

DIFFERENTIAL FORMS BRIAN OSSERMAN

DIFFERENTIAL FORMS BRIAN OSSERMAN DIFFERENTIAL FORMS BRIAN OSSERMAN Dfferentals are an mportant topc n algebrac geometry, allowng the use of some classcal geometrc arguments n the context of varetes over any feld. We wll use them to defne

More information

An efficient algorithm for multivariate Maclaurin Newton transformation

An efficient algorithm for multivariate Maclaurin Newton transformation Annales UMCS Informatca AI VIII, 2 2008) 5 14 DOI: 10.2478/v10065-008-0020-6 An effcent algorthm for multvarate Maclaurn Newton transformaton Joanna Kapusta Insttute of Mathematcs and Computer Scence,

More information

BOUNDEDNESS OF THE RIESZ TRANSFORM WITH MATRIX A 2 WEIGHTS

BOUNDEDNESS OF THE RIESZ TRANSFORM WITH MATRIX A 2 WEIGHTS BOUNDEDNESS OF THE IESZ TANSFOM WITH MATIX A WEIGHTS Introducton Let L = L ( n, be the functon space wth norm (ˆ f L = f(x C dx d < For a d d matrx valued functon W : wth W (x postve sem-defnte for all

More information

Awareness and forgetting of facts and agents

Awareness and forgetting of facts and agents Awareness and forgettng of facts and agents Hans van Dtmarsch Unversty of Sevlla, Span & Unversty of Otago, New Zealand Emal: hans@cs.otago.ac.nz Tm French Unversty of Western Australa, Perth, Australa

More information

Perron Vectors of an Irreducible Nonnegative Interval Matrix

Perron Vectors of an Irreducible Nonnegative Interval Matrix Perron Vectors of an Irreducble Nonnegatve Interval Matrx Jr Rohn August 4 2005 Abstract As s well known an rreducble nonnegatve matrx possesses a unquely determned Perron vector. As the man result of

More information

Singular Value Decomposition: Theory and Applications

Singular Value Decomposition: Theory and Applications Sngular Value Decomposton: Theory and Applcatons Danel Khashab Sprng 2015 Last Update: March 2, 2015 1 Introducton A = UDV where columns of U and V are orthonormal and matrx D s dagonal wth postve real

More information

Numerical Heat and Mass Transfer

Numerical Heat and Mass Transfer Master degree n Mechancal Engneerng Numercal Heat and Mass Transfer 06-Fnte-Dfference Method (One-dmensonal, steady state heat conducton) Fausto Arpno f.arpno@uncas.t Introducton Why we use models and

More information

Genericity of Critical Types

Genericity of Critical Types Genercty of Crtcal Types Y-Chun Chen Alfredo D Tllo Eduardo Fangold Syang Xong September 2008 Abstract Ely and Pesk 2008 offers an nsghtful characterzaton of crtcal types: a type s crtcal f and only f

More information

Bayesian epistemology II: Arguments for Probabilism

Bayesian epistemology II: Arguments for Probabilism Bayesan epstemology II: Arguments for Probablsm Rchard Pettgrew May 9, 2012 1 The model Represent an agent s credal state at a gven tme t by a credence functon c t : F [0, 1]. where F s the algebra of

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

On the Operation A in Analysis Situs. by Kazimierz Kuratowski

On the Operation A in Analysis Situs. by Kazimierz Kuratowski v1.3 10/17 On the Operaton A n Analyss Stus by Kazmerz Kuratowsk Author s note. Ths paper s the frst part slghtly modfed of my thess presented May 12, 1920 at the Unversty of Warsaw for the degree of Doctor

More information

Hyper-Sums of Powers of Integers and the Akiyama-Tanigawa Matrix

Hyper-Sums of Powers of Integers and the Akiyama-Tanigawa Matrix 6 Journal of Integer Sequences, Vol 8 (00), Artcle 0 Hyper-Sums of Powers of Integers and the Ayama-Tangawa Matrx Yoshnar Inaba Toba Senor Hgh School Nshujo, Mnam-u Kyoto 60-89 Japan nava@yoto-benejp Abstract

More information

5 The Rational Canonical Form

5 The Rational Canonical Form 5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces

More information

6. Stochastic processes (2)

6. Stochastic processes (2) Contents Markov processes Brth-death processes Lect6.ppt S-38.45 - Introducton to Teletraffc Theory Sprng 5 Markov process Consder a contnuous-tme and dscrete-state stochastc process X(t) wth state space

More information

find (x): given element x, return the canonical element of the set containing x;

find (x): given element x, return the canonical element of the set containing x; COS 43 Sprng, 009 Dsjont Set Unon Problem: Mantan a collecton of dsjont sets. Two operatons: fnd the set contanng a gven element; unte two sets nto one (destructvely). Approach: Canoncal element method:

More information

Example: (13320, 22140) =? Solution #1: The divisors of are 1, 2, 3, 4, 5, 6, 9, 10, 12, 15, 18, 20, 27, 30, 36, 41,

Example: (13320, 22140) =? Solution #1: The divisors of are 1, 2, 3, 4, 5, 6, 9, 10, 12, 15, 18, 20, 27, 30, 36, 41, The greatest common dvsor of two ntegers a and b (not both zero) s the largest nteger whch s a common factor of both a and b. We denote ths number by gcd(a, b), or smply (a, b) when there s no confuson

More information

REGULAR POSITIVE TERNARY QUADRATIC FORMS. 1. Introduction

REGULAR POSITIVE TERNARY QUADRATIC FORMS. 1. Introduction REGULAR POSITIVE TERNARY QUADRATIC FORMS BYEONG-KWEON OH Abstract. A postve defnte quadratc form f s sad to be regular f t globally represents all ntegers that are represented by the genus of f. In 997

More information

A PROOF OF THE STANDARD REDUCTION THEOREM IN THE LAMBDA CALCULUS

A PROOF OF THE STANDARD REDUCTION THEOREM IN THE LAMBDA CALCULUS A PROOF OF THE STANDARD REDUCTION THEOREM IN THE LAMBDA CALCULUS WILLIAM RICHTER ABSTRACT. Fellesen s Standard Reducton Theorem for the λ v Calculus yelds an algorthm that models the Scheme nterpreter.

More information

6. Stochastic processes (2)

6. Stochastic processes (2) 6. Stochastc processes () Lect6.ppt S-38.45 - Introducton to Teletraffc Theory Sprng 5 6. Stochastc processes () Contents Markov processes Brth-death processes 6. Stochastc processes () Markov process

More information

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of

More information

Subset Topological Spaces and Kakutani s Theorem

Subset Topological Spaces and Kakutani s Theorem MOD Natural Neutrosophc Subset Topologcal Spaces and Kakutan s Theorem W. B. Vasantha Kandasamy lanthenral K Florentn Smarandache 1 Copyrght 1 by EuropaNova ASBL and the Authors Ths book can be ordered

More information

Finding Primitive Roots Pseudo-Deterministically

Finding Primitive Roots Pseudo-Deterministically Electronc Colloquum on Computatonal Complexty, Report No 207 (205) Fndng Prmtve Roots Pseudo-Determnstcally Ofer Grossman December 22, 205 Abstract Pseudo-determnstc algorthms are randomzed search algorthms

More information

Approximate Smallest Enclosing Balls

Approximate Smallest Enclosing Balls Chapter 5 Approxmate Smallest Enclosng Balls 5. Boundng Volumes A boundng volume for a set S R d s a superset of S wth a smple shape, for example a box, a ball, or an ellpsod. Fgure 5.: Boundng boxes Q(P

More information

and problem sheet 2

and problem sheet 2 -8 and 5-5 problem sheet Solutons to the followng seven exercses and optonal bonus problem are to be submtted through gradescope by :0PM on Wednesday th September 08. There are also some practce problems,

More information

Linear, affine, and convex sets and hulls In the sequel, unless otherwise specified, X will denote a real vector space.

Linear, affine, and convex sets and hulls In the sequel, unless otherwise specified, X will denote a real vector space. Lnear, affne, and convex sets and hulls In the sequel, unless otherwse specfed, X wll denote a real vector space. Lnes and segments. Gven two ponts x, y X, we defne xy = {x + t(y x) : t R} = {(1 t)x +

More information

Math 261 Exercise sheet 2

Math 261 Exercise sheet 2 Math 261 Exercse sheet 2 http://staff.aub.edu.lb/~nm116/teachng/2017/math261/ndex.html Verson: September 25, 2017 Answers are due for Monday 25 September, 11AM. The use of calculators s allowed. Exercse

More information

Common loop optimizations. Example to improve locality. Why Dependence Analysis. Data Dependence in Loops. Goal is to find best schedule:

Common loop optimizations. Example to improve locality. Why Dependence Analysis. Data Dependence in Loops. Goal is to find best schedule: 15-745 Lecture 6 Data Dependence n Loops Copyrght Seth Goldsten, 2008 Based on sldes from Allen&Kennedy Lecture 6 15-745 2005-8 1 Common loop optmzatons Hostng of loop-nvarant computatons pre-compute before

More information

SL n (F ) Equals its Own Derived Group

SL n (F ) Equals its Own Derived Group Internatonal Journal of Algebra, Vol. 2, 2008, no. 12, 585-594 SL n (F ) Equals ts Own Derved Group Jorge Macel BMCC-The Cty Unversty of New York, CUNY 199 Chambers street, New York, NY 10007, USA macel@cms.nyu.edu

More information

A new construction of 3-separable matrices via an improved decoding of Macula s construction

A new construction of 3-separable matrices via an improved decoding of Macula s construction Dscrete Optmzaton 5 008 700 704 Contents lsts avalable at ScenceDrect Dscrete Optmzaton journal homepage: wwwelsevercom/locate/dsopt A new constructon of 3-separable matrces va an mproved decodng of Macula

More information

Learning Theory: Lecture Notes

Learning Theory: Lecture Notes Learnng Theory: Lecture Notes Lecturer: Kamalka Chaudhur Scrbe: Qush Wang October 27, 2012 1 The Agnostc PAC Model Recall that one of the constrants of the PAC model s that the data dstrbuton has to be

More information

Formulas for the Determinant

Formulas for the Determinant page 224 224 CHAPTER 3 Determnants e t te t e 2t 38 A = e t 2te t e 2t e t te t 2e 2t 39 If 123 A = 345, 456 compute the matrx product A adj(a) What can you conclude about det(a)? For Problems 40 43, use

More information

Volume 18 Figure 1. Notation 1. Notation 2. Observation 1. Remark 1. Remark 2. Remark 3. Remark 4. Remark 5. Remark 6. Theorem A [2]. Theorem B [2].

Volume 18 Figure 1. Notation 1. Notation 2. Observation 1. Remark 1. Remark 2. Remark 3. Remark 4. Remark 5. Remark 6. Theorem A [2]. Theorem B [2]. Bulletn of Mathematcal Scences and Applcatons Submtted: 016-04-07 ISSN: 78-9634, Vol. 18, pp 1-10 Revsed: 016-09-08 do:10.1805/www.scpress.com/bmsa.18.1 Accepted: 016-10-13 017 ScPress Ltd., Swtzerland

More information

Bernoulli Numbers and Polynomials

Bernoulli Numbers and Polynomials Bernoull Numbers and Polynomals T. Muthukumar tmk@tk.ac.n 17 Jun 2014 The sum of frst n natural numbers 1, 2, 3,..., n s n n(n + 1 S 1 (n := m = = n2 2 2 + n 2. Ths formula can be derved by notng that

More information

DISCRIMINANTS AND RAMIFIED PRIMES. 1. Introduction A prime number p is said to be ramified in a number field K if the prime ideal factorization

DISCRIMINANTS AND RAMIFIED PRIMES. 1. Introduction A prime number p is said to be ramified in a number field K if the prime ideal factorization DISCRIMINANTS AND RAMIFIED PRIMES KEITH CONRAD 1. Introducton A prme number p s sad to be ramfed n a number feld K f the prme deal factorzaton (1.1) (p) = po K = p e 1 1 peg g has some e greater than 1.

More information

REVERSE MATHEMATICS AND PROPERTIES OF FINITE CHARACTER

REVERSE MATHEMATICS AND PROPERTIES OF FINITE CHARACTER REVERSE MATHEMATICS AND PROPERTIES OF FINITE CHARACTER DAMIR D. DZHAFAROV AND CARL MUMMERT Abstract. We study the reverse mathematcs of the prncple statng that, for every property of fnte character, every

More information

Lecture 11. minimize. c j x j. j=1. 1 x j 0 j. +, b R m + and c R n +

Lecture 11. minimize. c j x j. j=1. 1 x j 0 j. +, b R m + and c R n + Topcs n Theoretcal Computer Scence May 4, 2015 Lecturer: Ola Svensson Lecture 11 Scrbes: Vncent Eggerlng, Smon Rodrguez 1 Introducton In the last lecture we covered the ellpsod method and ts applcaton

More information

HMMT February 2016 February 20, 2016

HMMT February 2016 February 20, 2016 HMMT February 016 February 0, 016 Combnatorcs 1. For postve ntegers n, let S n be the set of ntegers x such that n dstnct lnes, no three concurrent, can dvde a plane nto x regons (for example, S = {3,

More information

Random DFAs over a non-unary alphabet

Random DFAs over a non-unary alphabet Random DFAs over a non-unary alphabet Jean-Marc Champarnaud and Thomas Paranthoën Unversty of Rouen, LIFAR, F-76821 Mont-Sant-Agnan Cedex, France {Jean-Marc.Champarnaud, Thomas.Paranthoen} @unv-rouen.fr

More information

Errors for Linear Systems

Errors for Linear Systems Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch

More information

Computing Correlated Equilibria in Multi-Player Games

Computing Correlated Equilibria in Multi-Player Games Computng Correlated Equlbra n Mult-Player Games Chrstos H. Papadmtrou Presented by Zhanxang Huang December 7th, 2005 1 The Author Dr. Chrstos H. Papadmtrou CS professor at UC Berkley (taught at Harvard,

More information

20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The first idea is connectedness.

20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The first idea is connectedness. 20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The frst dea s connectedness. Essentally, we want to say that a space cannot be decomposed

More information

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Structure and Drive Paul A. Jensen Copyright July 20, 2003 Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.

More information

k(k 1)(k 2)(p 2) 6(p d.

k(k 1)(k 2)(p 2) 6(p d. BLOCK-TRANSITIVE 3-DESIGNS WITH AFFINE AUTOMORPHISM GROUP Greg Gamble Let X = (Z p d where p s an odd prme and d N, and let B X, B = k. Then t was shown by Praeger that the set B = {B g g AGL d (p} s the

More information

Finding Dense Subgraphs in G(n, 1/2)

Finding Dense Subgraphs in G(n, 1/2) Fndng Dense Subgraphs n Gn, 1/ Atsh Das Sarma 1, Amt Deshpande, and Rav Kannan 1 Georga Insttute of Technology,atsh@cc.gatech.edu Mcrosoft Research-Bangalore,amtdesh,annan@mcrosoft.com Abstract. Fndng

More information