A General Approach for Expressing Infeasibility in Implicit Path Enumeration Technique

Size: px
Start display at page:

Download "A General Approach for Expressing Infeasibility in Implicit Path Enumeration Technique"

Transcription

1 A Generl Approch for Expressing Infesibility in Implicit Pth Enumertion Technique Pscl Rymond Univ. Grenoble Alpes, VERIMAG, F Grenoble, Frnce CNRS, VERIMAG, F Grenoble, Frnce ABSTRACT Sttic timing nlysis ims t computing gurnteed upper bound to the Worst-Cse Execution Time (WCET) of progrm. It requires both n ccurte modeling of the hrdwre, nd precise nlysis of the progrm in order to reject infesible executions (in prticulr, ll infinite ones). For the ctul computtion of the worst-cse execution, most of the existing tools nd methods re bsed on the Implicit Pth Enumertion Technique (IPET), which consist in encoding this serch into numericl optimiztion problem (Integer Liner Progrmming, ILP). An interest of this pproch is tht it nturlly integrtes the loop bounds. It lso llows to implicitly prune infesible pths, s fr s they cn be expressed using liner constrints. Severl works on the subject re using this bility in order to enhnce the WCET estimtion: they identify specific property ptterns (e.g., implictions, exclusions) nd propose d hoc trnsltion into numericl constrints. The gol of this pper is to go further thn d hoc resoning by proposing generl method for trnslting infesibility in terms of numericl constrints. It does not ddress the problem of finding infesible pths, only the one of chrcterizing them s precisely s possible. Moreover the pper ims t exploring the limits of the method, nd thus, it does not try to enhnce the result using dditionl methods (e.g., grph trnsformtion). Ctegories nd Subject Descriptors D.2.8 [Softwre Engineering]: Metrics complexity mesures, performnce mesures Generl Terms WCET, infesible pth, Integer Liner Progrmming This work is supported by the french reserch fundtion (ANR) s prt of the W-SEPT project (ANR-12-INSE- 0001). Permission to mke digitl or hrd copies of ll or prt of this work for personl or clssroom use is grnted without fee provided tht copies re not mde or distributed for profit or commercil dvntge nd tht copies ber this notice nd the full cittion on the first pge. Copyrights for components of this work owned by others thn ACM must be honored. Abstrcting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission nd/or fee. Request permissions from Permissions@cm.org. ESWEEK 14, October , New Delhi, Indi. Copyright 2014 ACM /14/10...$ INTRODUCTION Sttic timing nlysis ims t computing, given binry code nd the description of the rchitecture, proven upper bound to the Worst-Cse Execution Time (WCET) of the code (see [8] for n overview of methods nd tools). Existing methods nd tools re minly orgnized in 3 steps. (1) Dt-flow Anlysis considers the semntics of the code (often requiring the vilbility of the source code, e.g., C) in order to identify the pths in the CFG tht re ctully fesible; this phse must t lest find ccurte loop bounds, in order to retin only finite executions. (2) Micro-rchitecture Anlysis builds the Control Flow Grph (CFG) of the code, mde of Bsic Blocks (BB) of sequentil instructions connected by edges representing the possible control pths. It then computes, for ech BB nd/or edges, locl WCET estimtion (k locl weight), tking into ccount s precisely s possible hrdwre fetures like memory cche, pipeline, brnch predictor. (3) Worst-Cse Pth Serch comes t lst, to identify /the worst-cse execution pth ccording to the weights ssigned to ech BB nd/or edges. For this purpose, the mostly used methods re bsed on Implicit Pth Enumertion Technique (IPET), introduced in [6]. The key ide of this method is to encode the problem of finding worst-cse pth into numericl optimiztion problem, more precisely, n Integer Liner Progrmming problem (ILP). An integer vrible is ssocited to ech BB nd/or edge, representing the number of time the block/edge is trversed during n execution. The structure of the grph cn then be expressed s set of liner constrints, ccording to the well-know principle tht incoming flow equls outgoing flow, nd tht the entry point of the progrm is executed once. Other constrints, coming from the dtflow nlysis, re dded to the numericl system, comprising t lest the ones tht re necessry to bound ll loops in the grph. The objective function is then to mximize the weighted sum of ll these counters, nd it cn be solved by stte-of-rt Integer Liner Progrmming solver. A min interest of the IPET method, pointed out since its first proposl [6], is its bility to implicitly prune lots of infesible pths by stting simple liner constrints. The study of this bility is the subject of this pper. To complete this introduction, we present now some relted works nd

2 some exmples tht illustrte the problem nd motivte this work. 1.1 Stte of the rt To our knowledge, there is no previous work specificlly dedicted to the expression of infesible pths by mens of ILP constrints. More precisely, lmost ll works bsed on the IPET method re considering this problem, but minly s complement to the one of finding the properties tht mke the pths infesible. Ppers on this subject re numerous, nd generl chrcteristic is tht they serch for prticulr property ptterns leding to infesible pth, tht re trnslted into prticulr constrint ptterns. These ptterns re minly bsed on the notion of conflicting edges: edges tht cnnot be ll trversed during the sme execution. Ppers re considering pirwise conflicts (conflictpir), or more generlly n-ry conflicts (conflict-list). For instnce, [1, 4] re hndling conflicting lists of edges, tht cn be expressed s bounded sums; it is similr to the notion of conflict we develop in this pper, but only in the cse of progrms without loops. Ppers like [2, 3, 4] go further by considering properties holding in loop scopes, in the cse of pirwise reltions between edges (conflict pirs, exclusions, equlities etc.). Moreover, lmost ll works notice (often implicitly) tht purely conjunctive liner progrmming is unble to express ll kind of conflicting properties. The generl solution is to define mix of cse-by-cse nlysis nd pure ILP. This kind of methods cn be referred to s splitting-bsed methods, in the sense tht they consists in splitting the problem to mke pths more nd more explicit. Techniclly, they cn be bsed on control-flow grph trnsformtion, ddition of extr vribles nd/or disjunctive liner systems (in order to express non convex domins [5, 6, 7]). The work presented in this pper is somehow trnsversl to these relted works. In prticulr it does not consider t ll the problem of finding properties, but only focusses on the expression of these properties s ILP constrints. We im t considering in homogeneous mnner progrms with or without loops, nd reltions between two or more edges (conflicting pirs or lists). Moreover, we try to explore the limits of pure ILP constrints, nd thus we do not consider splitting-bsed methods. 1.2 Exmples Progrm 1 shows n exmple of code written in pseudo- C (left). The ctul CFG, hndled by the timing nlyzing tool, is shown in the middle. For resoning bout pth fesibility, we use the simplified grph on the right: sequentil blocks re bstrcted to outline the brnching possibilities. Ech trnsition is identified by letter (,b,c, etc.) tht helps to relte it with the source C code. In the clssicl IPET pproch, n integer vrible is ssocited to ech edge. This vrible is counter, whose vlue is the number of time the edge is trversed during one prticulr execution. We note these counters with the sme letter thn the corresponding edge. Let E = {, b, c,... this set of vribles. The weights (locl WCET) computed during the micro-rchitecture nlysis re denoted w, w b, etc. The IPET gol is to mximize, under set of liner constrints, the objective function: w x x x E The CFG of Progrm 1 cn be literlly trnslted into set of structurl constrints: { 1 = + d + d = g g + k = h + l S = h = b + e b + e = c + f c + f = k With these structurl constrints only, there is trivilly no bound to the objective function: the estimted WCET is infinite. This is why the control-flow nlysis must t lest produce bound for ech loop in the progrm. We suppose tht such constnt bound n is given (e.g. 100), nd new constrint is dded to obtin the bsic set of constrints : B = S {h n If we only consider the constrints set B (structurl nd loop bounds), the interest of the ILP encoding is not obvious. The WCET cn be computed without the help of numericl solver by pplying simple mx/plus inductive lgorithm: 1. The WCET of sequence is the sum. 2. The WCET of choice is the mx. 3. The WCET of loop bounded by n is n times the WCET of one itertion. The ILP method becomes interesting if there exist dditionl informtion bout edges tht re not structurl but rther semnticl. Such n informtion is for instnce tht two (distnt) edges re incomptible (or conflicting), in the sense tht they cnnot be both tken during the sme execution. The purpose of this work is not t ll to find these properties: we just mke the sttement tht they exist, nd our gol is to express them s precisely s possible in the IPET frmework. Let us now precise this notion of incomptibility on the exmple. Conflict within loop. On the exmple progrm, one cn observe tht executing the brnch e sets the vrible cond to true, nd, s consequence, mkes it impossible to tke immeditely fter the brnch f. This kind of property is very esy to express s n ILP constrint if the progrm hs no loop: since ech edge is executed t most once, the constrint e + f 1 precisely express tht t most one edge cn be executed. Here the problem is slightly more complex becuse the edges belong to loop. A simple d hoc resoning shows tht the conflict holds t ech itertion of the for sttement, nd tht the number of itertions is precisely cptured by the vlue of the edge counter h. The conflict cn be expressed by: e + f h Since we know tht h is bounded by the constnt n, we my lso directly write: e + f n Most of the exmples found in the literture re very similr to this cse: uthors serch for prticulr property ptterns tht led to prticulr constrint ptterns, typiclly sum bounded by constnt.

3 i f ( i n i t ) { / / else { / d / for ( i =0; i <n ; i ++){ i f (Y[ i ] ) { cond = not i n i t nd Z [ i ] ; / b / else { cond = t r u e ; / e / /... / i f ( cond ){ / c / else { / f / k d e f g h l b c Progrm 1: simplified C code, ctul binry CFG nd simplified CFG k e f d g h l b c l e b Figure 1: Unfolding the CFG of Progrm 1 to distinguish executions where is tken or not. Conflict cross loop. A less obvious semntic reltion exists between the initil if sttement nd the two sttements inside the loop: if the vrible init is true, then in ech loop, if Y[i] is true then cond is set to flse nd brnch c becomes unrechble. This is yet nother exmple of conflict, but involving three edges insted of two:, b nd c. Moreover, these edges do not belong to the sme loop scope, mking impossible to simply bound their sum. A usul solution to tret this kind of property consists in splitting the problem ccording to severl cses. This split cn be mde explicitly by unfolding the CFG s shown in Figure 1. We obtin new grph, nd thus new ILP system which is equivlent with respect to the WCET computtion. Note tht the conflict previously discovered between e nd f, simply pplies to the new versions of the edges; from now on we use the more visul nme of vtrs to identify the severl versions of n edge: e + f n nd e + f n. Moreover, we cn now precisely express the new conflict, tht holds only for the prime vtrs of b nd f g h c k c (i.e., fter the execution of only): b + c n CFG trnsformtion (unfolding, loops unrolling) is generl solution for expressing ny kind of infesibility: the more detiled is the grph, the more explicit re the pths. However it contrdicts the spirit of the IPET method, nd it is techniclly limited by the combintoril growing of the grphs. A clever solution consists in keeping the splitting implicit, by introducing s few extr vribles s possible. For instnce, we cn strt with the originl ILP system of Progrm 1 nd introduce only the vtrs of b nd c. The following set of extr constrints, clled A, is sufficient to express the property: A = b + c n b n d c n d b + b = b c + c = c In this system, behves like Boolen orcle whose vlue chooses between two different systems. If = 0, then, becuse of the structurl constrints, we hve d = 1 = 1 nd the set A cn be reduced to b n nd c n, which is redundnt with the structurl constrints. If = 1, A cn be reduced to the expected conflicting constrint : b+c n. The solution of introducing extr vribles is still not relly in the spirit of the IPET, since extr vribles re just wy to mke pths more explicit. In fct, for this prticulr cse, d hoc resoning shows tht the property cn be expressed exctly without the help of splitting method. The following constrint, involving only originl vribles, precisely cptures the expected conflict: n + b + c 2n Conflict between itertions. Progrm 2 hs the sme control flow grph s Progrm 1, but the order of the if stte-

4 i f ( i n i t ) { / / else { / d / cond =... ; for ( i =0; i <n ; i ++){ i f ( cond ){ / b / else { / e / /... / i f (Y[ i ] ) { cond = not i n i t nd Z [ i ] ; / c / else { cond = t r u e ; / f / Progrm 2: Sme CFG s Progrm 1, if sttements re reversed ments in the loop is reversed. As consequence, whenever is tken, the conflict between b nd c does not occur during the sme itertion, but between two consecutive itertions: if c is tken, cond is set to flse, nd in the next itertion (if it exists) b cnnot be tken. Even if it is not so different from the previous exmple, this kind of inter-itertion property is hrdly hndled in existing work. Here gin the problem cn be solved by unfolding the grph or introducing extr vribles. However, here gin, it is not necessry to do so. Let n be the loop bound, the following constrint precisely cptures the conflict: (n 1) + b + c 2n Here is n informl proof sketch: if n = 0, then b = c = 0 nd the constrint becomes tutology: 1 0; if n = 1 or = 0, the constrint becomes redundnt: b + c 2n; if n 2 nd = 1 the constrint becomes b + c 2n (n 1) = n + 1. By doing (virtul) unfolding of the n itertions, on cn exhibit n vtrs of b nd c, denoted b 1, b n, c 1,, c n. Both b 1 nd c n re unconstrined, nd then, their sum is bounded by 2. All others pirs (c k, b k+1 ) re conflicting nd thus c k + b k+1 1. Since there re n 1 such pirs, the sum of ll the vtrs is bounded by 2 + (n 1) = n + 1, which is the bound given by the formul. Limits of numericl constrints. Unfortuntely, it is not possible to exctly reflect ny conflict using only the existing vribles. Progrm 3 is very similr to Progrm 1, except tht the tests within the loop re not depending on the current itertion. For this progrm, if init is true, then depending on the vlue of Y, either b = n nd c = 0 or b = 0 nd c = n. This property cnnot be expressed in clssicl (conjunctive) liner progrmming since it requires to express disjunction: (b = n c = 0) (b = 0 c = n). Here gin, splitting oriented methods (grph unfolding, extr vrible, i f ( i n i t ) { / / else { / d / for ( i =0; i <n ; i ++){ i f (Y) { cond = not i n i t nd Z ; / b / else { / e / cond = t r u e ; /... / i f ( cond ){ / c / else { / f / Progrm 3: Sme CFG s Progrm 1, conditions do not depend on the current itertion disjunctive systems) cn solve precisely the problem, but they re not considered in this pper. Nevertheless, for this progrm, the simple liner constrint n + b + c 2n still holds nd, while not perfect, my prune some infesible pths. 1.3 Motivtion nd pper orgniztion The gol of this work to go further thn d hoc resoning by proposing generl method to produce liner constrints such s the ones presented in the exmples (e + f n, n + b + c 2n, etc.). The method should hndle in homogeneous mnner progrms with or without loops, intr or inter loop properties. For this purpose, first requirement is to precise the nture of n infesibility property. Moreover, we wnt to explore the limits of the ILP expressiveness without the help of ny split-oriented method: no grph trnsformtion, no extr vribles, no disjunction. To summrize, first definition of the gol is: given CFG nd informtion on the incomptibility between edges, find one or more liner constrint(s) tht cut, s precisely s possible, the corresponding infesible pth. The pper is orgnized s follow: section 2 gives the necessry forml definitions. We show tht the notion of conflicting sets is tomic with respect to pth pruning in the sense tht ny set of infesible pths cn be described s union of conflicting sets. Section 3.1 gives first generl solution for trnsforming conflicting sets into liner constrints. This solution requires very few informtion bout the incomptibilities, but the counterprt is tht the result my be rther imprecise. Section 3.2 presents solution for cpturing more precisely the incomptibilities.

5 2. DEFINITIONS AND NOTATIONS 2.1 Progrms nd unfoldings A CFG (or simply progrm) is direct grph, possibly cyclic, mde of finite set of vertices (V ), finite set of edges (E V V ), prticulr entry vertex (), nd one or more exit vertex (X ): d1 1 g 1 l 1 h 1 l 4 k 3 c 3 f 3 e 1 b 1 P = (V, E V V, V, X V ) In the sequel we use lowercse letters to identify edges (e.g.,, b, c, etc., s in the CFG of Progrm 1). f 1 c 1 k 1 l 2 l 3 b 2 c 2 h 2 e 2 f2 b 3 k 2 h 3 e 3 A trce of progrm P is sequence of subsequent edges strting in nd ending in x X. The set of trces of progrm P is denoted T (P ). In the WCET frmework, we re only interested in progrms tht terminte in bounded time. It implies tht we lwys suppose the existence of finite set of ctully fesible executions, which is, in generl, strict subset of the progrm trces. We do not clim tht this finite set is precisely known, just tht it exists. We cll it the set of ctul executions nd note it E T (P ). We introduce now the notion of unfolding in order to formlize the notion of more precise progrm grph. Definition 1. An unfolding of progrm P = (V P, E P, P, X P ), with respect to set of executions E T (P ) is pir (U, δ) such tht: U = (V U, E U, U, X U ) is CFG, δ is mpping from U edges to P edges (i.e., decoding ): δ : E U E P the induced trce mpping is denoted: δ : T (U) T (P ) nd the set of decoded trces is denoted: such tht: T δ (U) = {δ (t), t T (U) E T δ (U) T (P ) For instnce, Figure 1 shows n unfolding of Progrm 1, where the mpping consists in ignoring the prime symbols; in this cse the unfolding is not more precise since T δ (U) = T (P ). Note tht the definition of unfolding cn be generlized by considering neutrl edges in U: in this cse the mpping is function δ : E U E P {τ where τ E P is simply ignored when extending δ to sequences (i.e., δ (τ) = ε). Among the unfoldings of P we re prticulrly interested in those tht re cyclic (i.e., DAGs): they structurlly reject the infinite trces of the originl P. In prticulr, n Figure 2: Acyclic unfolding ofprogrm 1 (for n = 3). cyclic unfolding is exctly wht we get (implicitly) in clssicl WCET techniques when bound is ssigned to ech loop of the progrm. Figure 2 shows n cyclic unfolding of Progrm 1, in the cse tht the number of itertions is bounded by n = 3. Note tht it trivilly exists, within the cyclic unfoldings of P, cnonicl progrm tht exctly cptures the ctul executions E (more precisely, clss of miniml grphs, equivlent modulo edge renming). In the sequel, we consider tht we hve n cyclic unfolding of the progrm P : we do not require tht it must be precisely built or known, only tht it virtully exists. 2.2 Avtrs nd implicit pths Let P be progrm, E the set of ctul executions nd (U, δ) n cyclic unfolding. From now on we cll P the concrete progrm (nd its edges the concrete edges). The edges in the reverse imge of the concrete edge re clled the vtrs of. We note m the number of vtrs of (m = δ 1 () ), nd, by convention, we note the vtrs with subscript indices, like in Figure 2 1 : δ 1 () = { 1, 2,, m Let us now come bck to the IPET frmework. In IPET, sets of trces re chrcterized implicitly by giving the number of occurrences of the edges. We cll these numbers the edge counters, nd note, for instnce, t the number of occurrences of the edge in the trce t. In order to simplify the nottions, nd whenever the context clerly concerns trce t, we will simply note for t. The bsic reltion between the counters of n unfolded trce t nd the corresponding concrete trce t = δ (t) is trivilly: m i = Another trivil property of the unfolded counters is tht they re either 0 or 1: 0 i 1 1 This does not men tht we consider nturl ordering of the vtrs, just think bout them s fmily of symbols.

6 2.3 Conflicting sets Let P be progrm, E the set of ctul executions nd (U, δ) n cyclic unfolding. U structurlly rejects ny infinite infesible pths, however there is still precision gp represented by G = T δ (U) \ E which is the set of infesible finite pths not rejected by U. Definition 2. Let C E U be set of edges, we note T δ U (C) T δ (U) the set of trces of U tht pss by ll the edges in C: C is conflicting set if TU δ (C) E = nd TU δ (C), i.e., it contins only infesible pths, mong them t lest one not rejected by U; C is miniml conflicting set iff ny C C is not conflicting set; A set C = {C 1,, C k is conflict covering iff: T δ (U) E T δ U (C i) 1 i k i.e., the conflicting sets of C re sufficient to reject ny infesible pth from U; C is miniml conflict covering iff it contins only miniml conflicting sets, nd ny C C is not conflict covering. Theorem 1. For ll (P, (U, δ), E), there exist miniml conflict covering. Here is sketch of constructive proof, which is indeed relted to the notion of prime implicnt in Boolen lgebr: there exist (t lest) one conflict covering: the one obtined form G = T δ (U)) \ E by interpreting the pths s (unordered) sets of edges, if conflicting set C in covering is not miniml, replce it by some other conflicting set C C, if covering is not miniml, replce it by some covering C C. This theorem is reltively trivil, but nevertheless importnt since it justifies the fct tht the notion of conflicting sets is (implicitly) considered equivlent to the one pruning properties in the literture. In n unfolding, the incomptibility due to conflicting set cn be expressed exctly in terms of ILP constrints. Consider multiset of n concrete edges (we use superscript indexes to void confusion with vtr nottion): x for x = 1 n. Consider set of n vtrs, one per ech concrete edge x : C = { x i x x = 1 n. Note tht we consider multisets of concrete edges for the ske of generlity: it is possible tht different vtrs of sme concrete edge re conflicting; it rises for instnce when edge in loop cnnot be tken in two consecutive itertions. If C is conflicting set, then, for ny execution: n x i x n 1 x=1 For the sme multiset of concrete edges, it is likely tht mny others sets of vtrs re lso conflicting. This leds to the notion of conflicting from time to time : multiset of (concrete) edges {{ x is conflicting s times (i.e., is s- conflicting) if there exists s sets of their vtrs tht re conflicting. 3. COMPLETION OF S-CONFLICTING 3.1 Rough completion Cse of 3 edges In order to mke the presenttion more cler, nd to keep the nottions redble, we consider here the cse of 3 concrete edges, denoted, b nd c. Note tht nothing in the following resoning requires the these edges should be ll different:, b, c must be understood s multi-set contining 3 edge references (e.g. nd b my refer to the sme concrete edge). The resoning cn be esily extended to the generl cse of ny number of edge references. Even if the resoning is bsed on the existence of n cyclic unfolding, we try to keep the informtion bout it s bstrcted s possible; we suppose given: the number of vtrs of ech edge, denoted m, m b nd m c; the number of conflicting sets of vtrs, denoted s. In order to void confusion, we use different index symbols for the vtrs. Avtrs re denoted i for i = 1 m, b j for j = 1 m b, nd c k for k = 1 m c. The corresponding counters properties, holding for ny execution re: m m b m c = i, b = b j, c = j=1 k=1 We know tht {{, b, c is s-conflicting. Thus, there exists set S of s triples (i, j, k) such tht ech { i, b j, c k is conflicting set. The sum of the corresponding liner constrints gives: (i,j,k) S i + b j + c k 2s The ide is now to complete this constrint in order to get rid of the vtr detils nd come up with reltion between the full counters only. Without ny other informtion thn the number s, we cn hrdly do better thn complete the reltion with ll the triples tht do not belong to S. For these triples, such tht (i, j, k) / S, the following trivil reltion holds: i + b j + c k 3 Moreover, there re m m b m c s such triples. By summing ll these trivil constrints with the conflicting ones, we obtin, in the left hnd side, m b m c times the sum of ll vtrs, tht is, the complete counter. Similrly, the full b ppers m m c times, nd the full c m m b times. Finlly, we obtin reltion free of ny vtr detils: m b m c + m m cb + m m b c 2s + 3(m m b m c s) or equivlently: c k

7 Formul 1. m m + m m b b + m m c c 3m s where m = m m b m c Generl cse The 3-edges formul cn be esily generlized to the incomptibility between ny number of (possibly redundnt) edges: let X be multiset of X concrete edges. Ech edge occurrence x X is chrcterized by its number of vtrs m x, nd the incomptibility is chrcterized globlly by the number of conflicting sets of vtrs s: Formul 2. x X m m x x X m s where m = x X m x Inefficiency of rough completion Let us consider the left hnd prt of Formul 2: ech edge counter x is, by definition, bounded by m x, thus the whole left hnd sum is intrinsiclly bounded by m X. The gin in precision of the Formul is then only s. Except for very specil cses (big s, smll number of edges nd/or smll number of vtrs), the formul is unlikely to give useful informtion. One of the rre cse where the Formul gives n exct informtion is when m = m b = m c = s, (i.e. cycle-free progrm with 3 incomptible tests): the Formul + b + c 2 precisely cuts the infesible pths. As soon s the m s re greter, the formul cuts very few infesible pths, nd thus gives very imprecise results. Consider 3 edges within the sme loop (executed n times), conflicting t ech itertion. The prmeters re m = m b = m c = s = n nd the formul gives: + b + c (3n 2 1)/n which is equivlent (since, b, nd c re integers) to: + b + c 3n 1 The inefficiency is clerly drwbck of the completion, nd not of the ILP pproch, since we know tht there exist, for this prticulr exmple, constrint tht precisely cuts the infesible pths: + b + c 2n. The gol of the next section is to propose method for finding, when it exists, precise ILP formultion of the conflict. 3.2 Precise completion Multiplicity nd lck The problem of the rough completion is tht it introduces huge mount of useless informtion of the type i 1. We will try here to introduce the miniml number of useless informtion. Consider the incomptibility reltion: i + b j + c k 2s (i,j,k) s nd focus for instnce on the term involving the i vtrs. This term is of the form: m α i i with m α i = s The mximum of the α i is clled the multiplicity of nd denoted p = MAX m (α i). For ech α i, we define α i, its complement to p : α i+α i = p. Intuitively, the α i describe the vtrs of tht re missing in the conflict constrint: m m α i i + α i i = p Moreover, the detils of the α i hve no importnce, only their sum is importnt: m α i = p m s We cll it the lck of in the conflict, nd note l = p m s. Consider for instnce Progrm 1 in the cse n = 3, nd the corresponding cyclic unfolding in Figure 2. The numbers of vtrs re m = 1 nd m b = m c = 3. There re s = n = 3 conflicting sets { 1, b 1, c 1, { 1, b 2, c 2 nd { 1, b 3, c 3. The multiplicity of is 3 ( 1 ppers 3 times in the conflicts), while the multiplicity of b nd c is 1 (ech vtr ppers exctly once in the conflicts). It follows tht the lck of is l = = 0, nd the lck of b nd c is l b = l c = = 0. As consequence, there is no lck t ll in the constrints: no vtr is missing in the conflicts sets. Consider now the exmple Progrm 2, with n = 3, for which the CFG in Figure 2 is lso n cyclic unfolding. We still hve m = 1 nd m b = m c = 3, but there re now only s = 2 conflicting sets: { 1, b 2, c 1 nd { 1, b 3, c 2. The multiplicity of is 2, nd thus the lck is l = = 0. The multiplicity of both b nd c is 1, nd thus the lck is l b = l c = = 1. Intuitively, there is lck in the conflict sets: one vtr of b nd one vtr of c re missing. Note tht we do not cre bout wht prticulr vtr is missing or not: only their numbers mtter Lck completion For ech missing vtr, we cn dd trivil constrint stting tht is it less thn 1, nd by summing ll these trivil constrints, we obtin: m m α i i α i = l The sme resoning holds for the terms in b nd c, nd finlly we cn build globl sum of the conflict constrints nd the three lck constrints tht erses the vtr detils:

8 m m α i i + m b j=1 β jb j + mc γ k c k 2s k=1 α i i l m b j=1 β jb j l b m c k=1 γ kc k l c p + p b b + p cc 2s + l + l b + l c Precise completion (3 edges) To summrize, in order to obtin precise trnsltion in ILP of the incomptibility, we need: the numbers of vtrs m, m b nd m c, the number of times the incomptibility holds s (i.e., the number of vtr conflicting sets mong the m m b m c possible ones), for ech edge, its multiplicity in the conflict, tht is, the mximum occurrence of prticulr vtr i in the set of conflicting sets: p, p b nd p c, from these informtion, we compute the reltive lcks of ech edge, e.g., l = p m s, nd then we cn stte tht the (ternry) s-conflicting formul holds: Formul 3. p + p b b + p cc 2s + l + l b + l c Precise completion (generl cse) This result cn be esily generlized to the incomptibility between ny number of (possibly redundnt) edges. Let X be multiset of X concrete edges. Ech edge occurrence x X is chrcterized by its number of vtrs m x. The incomptibility is chrcterized globlly by the number of conflicting sets of vtrs s, nd, for ech edge occurrence x, its multiplicity p x, nd the corresponding lck l x = p xm x s. The generlized n-ry s-conflicting formul is: Formul Exmples x X p xx ( X 1)s + x X Across-loop conflict. In Progrm 1, the conflict between, b nd c holds for ech of the n itertions, thus: s = m b = m c = n nd m = 1, p = n nd thus l = p m s = 0, p b = p c = 1 nd thus l b = l c = p b m b s = 0, nd finlly: n + b + c 2n which is the precise trnsltion of the incomptibility, s it ws obtined by d hoc resoning in the introduction. l x for ( i =0; i <n1 ; i ++){ red ( x ) ; i f ( x ) { / / for ( j =0; j<n2 ; j ++){ red ( y ) ; i f ( not x or y ) { / b / for ( k=1;k<n3 ; k++){ red ( z ) ; i f ( not ( x nd y ) nd z ) { / c / Progrm 4: loops. Exmple of ternry conflict in nested An even simpler exmple is when the 3 edges belong to the sme loop, nd the incomptibility holds for ech of the n itertions: n = s = m = m b = m c, p = p b = p c = 1 nd thus l = l b = l c = 0, nd finlly: + b + c 2n Note tht the sme resoning works for edges tht re in distnt loops: only the number of conflict mtters, not the precise structure of the grph. Nested-loops conflict. Progrm 4 is nother exmple of ternry conflict, but where the conflict propgtes within nested loops. The edges, b nd c re ppering (respectively) in nested loops executed loclly n 1, n 2 nd n 3 times, thus: m = n 1, m b = n 1n 2, m c = n 1n 2n 3, The conflict propgtes to the whole nested loop, i.e.: the first is incomptible with the n 2 first b nd the n 2n 3 first c, nd so on. For this exmple, the vtrs re numbered form 0 to m 1 in order to simplify the nottions. The incomptibility holds for ll the triples: (i, n 2i + j, n 3(n 2i + j) + k) with 0 i < n 1, 0 j < n 2, 0 k < n 3. It follows tht: s = n 1n 2n 3, p = n 2n 3, p b = n 3, p c = 1 nd l = l b = l c = 0 nd finlly: n 2n 3 + n 3b + c 2n 1n 2n 3 b c

9 cond = red ( ) ; for ( i =0; i <n ; i ++){ i f ( cond ){ / / cond = 0 ; else { cond = red ( ) ; Progrm 5: Edge is uto-conflicting between two consecutive itertions. Conflict between different itertions. Consider the Progrm 2, where the conflict holds from one itertion to the following (i.e., if b is tken t loop i, then c cnnot be tken t loop i + 1). In this cse: n = m b = m c nd m = 1, s = n 1, since ll { 1, b i, c i+1 is conflicting, p = n 1, nd thus l = p m s = 0, p b = p c = 1 nd thus l b = l c = p b m b s = 1; the globl lck is then 2s + l + l b + l c = 2(n 1) + 2 = 2n nd finlly: (n 1) + b + c 2n Auto-conflict. This exmple illustrtes the fct tht conflicting concrete edges do not hve to be different. Consider Progrm 5: (1) the loop is bounded by the constnt n, (2) whenever is executed, it becomes unrechble for the next itertion. This is n exmple of pirwise conflict, covered by the generl formul: p + p b b s + l + l b where, indeed, one hs to keep in mind tht = b. The prmeters re m = n, s = n 1, p = 1 nd thus l = 1, nd finlly: + n n CONCLUSION This pper presents generl method for trnslting infesibility properties into Integer Liner Progrmming (ILP) constrints, suitble for the use in IPET method. The trnsltion of infesibility in terms of ILP constrints is fr from new, nd numerous exmples cn be found in the literture. But the gol of this work is not compete on precision or ccurcy with existing pproches. It is theoreticl study tht proposes generl formultion tht in some sense en- compss the existing ones nd outlines the fundmentl limits of the method. In prticulr, it does not consider the problem of finding pruning properties, but only the one of reflecting them s precisely s possible, without the help of ny complementry method (e.g., grph trnsformtion). The resoning is bsed on the existence of n cyclic unfolding of the progrm. However this unfolding is kept minly bstrct: rough solution only requires to identify (1) the number of times ech prticulr edge is unfolded, (2) the number of conflicting sets of edges in the unfolding. In order to provide finer solution, more precise informtion is necessry, tht intuitively gives the number of time prticulr edge is involved in the infesibility property. Even with this finer solution, the formultion is sometimes not perfect, in the sense tht it does not reject ll the infesible pths. This is not drwbck of the proposed method, but generl limittion of ILP, tht rises whenever the exct formultion requires to express disjunction. In this cse, the generl solution is to combine ILP with by-cse resoning, but this somehow orthogonl problem is not considered here since the ide ws to explore the limits of the strict conjunctive ILP formultion. 5. REFERENCES [1] B. Blckhm, M. Liffiton, nd G. Heiser. Trickle: utomted infesible pth detection using ll miniml unstisfible subsets. In Rel Time nd Embedded Technology Applictions Symposium, Berlin, Germny, April [2] J. Engblom nd A. Ermedhl. Modeling complex flows for worst-cse execution time nlysis. In RTSS, pges , [3] J. Gustfsson, A. Ermedhl, C. Sndberg, nd B. Lisper. Automtic derivtion of loop bounds nd infesible pths for WCET nlysis using bstrct execution. In RTSS, [4] C. Hely nd D. Whlley. Automtic detection nd exploittion of brnch constrints for timing nlysis. IEEE Trns. on Softwre Engineering, 28(8), August [5] T. H. Kim, H. Bng, nd S. D. Ch. A systemtic representtion of pth constrints for implicit pth enumertion technique. Softw. Test., Verif. Relib., 20(1):39 61, [6] Y.-T. S. Li nd S. Mlik. Performnce nlysis of embedded softwre using implicit pth enumertion. IEEE Trns. on Computer-Aided Design of Integrted Circuits nd Systems, 16(12), [7] Y.-T. S. Li, S. Mlik, nd A. Wolfe. Efficient microrchitecture modeling nd pth nlysis for rel-time softwre. In Proceedings of the 16th IEEE Rel-Time Systems Symposium, RTSS 95, pges 298, Wshington, DC, USA, IEEE Computer Society. [8] R. Wilhelm, J. Engblom, A. Ermedhl, N. Holsti, S. Thesing, D. Whlley, G. Bernt, C. Ferdinnd, R. Heckmnn, T. Mitr, F. Mueller, I. Puut, P. Puschner, J. Stschult, nd P. Stenström. The worst-cse execution-time problem - overview of methods nd survey of tools. ACM Trns. Embedded Comput. Syst. (TECS), 7(3), 2008.

Review of Calculus, cont d

Review of Calculus, cont d Jim Lmbers MAT 460 Fll Semester 2009-10 Lecture 3 Notes These notes correspond to Section 1.1 in the text. Review of Clculus, cont d Riemnn Sums nd the Definite Integrl There re mny cses in which some

More information

Properties of Integrals, Indefinite Integrals. Goals: Definition of the Definite Integral Integral Calculations using Antiderivatives

Properties of Integrals, Indefinite Integrals. Goals: Definition of the Definite Integral Integral Calculations using Antiderivatives Block #6: Properties of Integrls, Indefinite Integrls Gols: Definition of the Definite Integrl Integrl Clcultions using Antiderivtives Properties of Integrls The Indefinite Integrl 1 Riemnn Sums - 1 Riemnn

More information

Bernoulli Numbers Jeff Morton

Bernoulli Numbers Jeff Morton Bernoulli Numbers Jeff Morton. We re interested in the opertor e t k d k t k, which is to sy k tk. Applying this to some function f E to get e t f d k k tk d k f f + d k k tk dk f, we note tht since f

More information

Handout: Natural deduction for first order logic

Handout: Natural deduction for first order logic MATH 457 Introduction to Mthemticl Logic Spring 2016 Dr Json Rute Hndout: Nturl deduction for first order logic We will extend our nturl deduction rules for sententil logic to first order logic These notes

More information

The Regulated and Riemann Integrals

The Regulated and Riemann Integrals Chpter 1 The Regulted nd Riemnn Integrls 1.1 Introduction We will consider severl different pproches to defining the definite integrl f(x) dx of function f(x). These definitions will ll ssign the sme vlue

More information

CS 275 Automata and Formal Language Theory

CS 275 Automata and Formal Language Theory CS 275 Automt nd Forml Lnguge Theory Course Notes Prt II: The Recognition Problem (II) Chpter II.5.: Properties of Context Free Grmmrs (14) Anton Setzer (Bsed on book drft by J. V. Tucker nd K. Stephenson)

More information

Unit #9 : Definite Integral Properties; Fundamental Theorem of Calculus

Unit #9 : Definite Integral Properties; Fundamental Theorem of Calculus Unit #9 : Definite Integrl Properties; Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl

More information

Recitation 3: More Applications of the Derivative

Recitation 3: More Applications of the Derivative Mth 1c TA: Pdric Brtlett Recittion 3: More Applictions of the Derivtive Week 3 Cltech 2012 1 Rndom Question Question 1 A grph consists of the following: A set V of vertices. A set E of edges where ech

More information

Duality # Second iteration for HW problem. Recall our LP example problem we have been working on, in equality form, is given below.

Duality # Second iteration for HW problem. Recall our LP example problem we have been working on, in equality form, is given below. Dulity #. Second itertion for HW problem Recll our LP emple problem we hve been working on, in equlity form, is given below.,,,, 8 m F which, when written in slightly different form, is 8 F Recll tht we

More information

Goals: Determine how to calculate the area described by a function. Define the definite integral. Explore the relationship between the definite

Goals: Determine how to calculate the area described by a function. Define the definite integral. Explore the relationship between the definite Unit #8 : The Integrl Gols: Determine how to clculte the re described by function. Define the definite integrl. Eplore the reltionship between the definite integrl nd re. Eplore wys to estimte the definite

More information

Math 1B, lecture 4: Error bounds for numerical methods

Math 1B, lecture 4: Error bounds for numerical methods Mth B, lecture 4: Error bounds for numericl methods Nthn Pflueger 4 September 0 Introduction The five numericl methods descried in the previous lecture ll operte by the sme principle: they pproximte the

More information

CMDA 4604: Intermediate Topics in Mathematical Modeling Lecture 19: Interpolation and Quadrature

CMDA 4604: Intermediate Topics in Mathematical Modeling Lecture 19: Interpolation and Quadrature CMDA 4604: Intermedite Topics in Mthemticl Modeling Lecture 19: Interpoltion nd Qudrture In this lecture we mke brief diversion into the res of interpoltion nd qudrture. Given function f C[, b], we sy

More information

1.9 C 2 inner variations

1.9 C 2 inner variations 46 CHAPTER 1. INDIRECT METHODS 1.9 C 2 inner vritions So fr, we hve restricted ttention to liner vritions. These re vritions of the form vx; ǫ = ux + ǫφx where φ is in some liner perturbtion clss P, for

More information

NUMERICAL INTEGRATION. The inverse process to differentiation in calculus is integration. Mathematically, integration is represented by.

NUMERICAL INTEGRATION. The inverse process to differentiation in calculus is integration. Mathematically, integration is represented by. NUMERICAL INTEGRATION 1 Introduction The inverse process to differentition in clculus is integrtion. Mthemticlly, integrtion is represented by f(x) dx which stnds for the integrl of the function f(x) with

More information

Improper Integrals, and Differential Equations

Improper Integrals, and Differential Equations Improper Integrls, nd Differentil Equtions October 22, 204 5.3 Improper Integrls Previously, we discussed how integrls correspond to res. More specificlly, we sid tht for function f(x), the region creted

More information

Parse trees, ambiguity, and Chomsky normal form

Parse trees, ambiguity, and Chomsky normal form Prse trees, miguity, nd Chomsky norml form In this lecture we will discuss few importnt notions connected with contextfree grmmrs, including prse trees, miguity, nd specil form for context-free grmmrs

More information

7.2 The Definite Integral

7.2 The Definite Integral 7.2 The Definite Integrl the definite integrl In the previous section, it ws found tht if function f is continuous nd nonnegtive, then the re under the grph of f on [, b] is given by F (b) F (), where

More information

p-adic Egyptian Fractions

p-adic Egyptian Fractions p-adic Egyptin Frctions Contents 1 Introduction 1 2 Trditionl Egyptin Frctions nd Greedy Algorithm 2 3 Set-up 3 4 p-greedy Algorithm 5 5 p-egyptin Trditionl 10 6 Conclusion 1 Introduction An Egyptin frction

More information

N 0 completions on partial matrices

N 0 completions on partial matrices N 0 completions on prtil mtrices C. Jordán C. Mendes Arújo Jun R. Torregros Instituto de Mtemátic Multidisciplinr / Centro de Mtemátic Universidd Politécnic de Vlenci / Universidde do Minho Cmino de Ver

More information

UNIFORM CONVERGENCE. Contents 1. Uniform Convergence 1 2. Properties of uniform convergence 3

UNIFORM CONVERGENCE. Contents 1. Uniform Convergence 1 2. Properties of uniform convergence 3 UNIFORM CONVERGENCE Contents 1. Uniform Convergence 1 2. Properties of uniform convergence 3 Suppose f n : Ω R or f n : Ω C is sequence of rel or complex functions, nd f n f s n in some sense. Furthermore,

More information

Minimal DFA. minimal DFA for L starting from any other

Minimal DFA. minimal DFA for L starting from any other Miniml DFA Among the mny DFAs ccepting the sme regulr lnguge L, there is exctly one (up to renming of sttes) which hs the smllest possile numer of sttes. Moreover, it is possile to otin tht miniml DFA

More information

THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS.

THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS. THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS RADON ROSBOROUGH https://intuitiveexplntionscom/picrd-lindelof-theorem/ This document is proof of the existence-uniqueness theorem

More information

W. We shall do so one by one, starting with I 1, and we shall do it greedily, trying

W. We shall do so one by one, starting with I 1, and we shall do it greedily, trying Vitli covers 1 Definition. A Vitli cover of set E R is set V of closed intervls with positive length so tht, for every δ > 0 nd every x E, there is some I V with λ(i ) < δ nd x I. 2 Lemm (Vitli covering)

More information

Advanced Calculus: MATH 410 Notes on Integrals and Integrability Professor David Levermore 17 October 2004

Advanced Calculus: MATH 410 Notes on Integrals and Integrability Professor David Levermore 17 October 2004 Advnced Clculus: MATH 410 Notes on Integrls nd Integrbility Professor Dvid Levermore 17 October 2004 1. Definite Integrls In this section we revisit the definite integrl tht you were introduced to when

More information

Coalgebra, Lecture 15: Equations for Deterministic Automata

Coalgebra, Lecture 15: Equations for Deterministic Automata Colger, Lecture 15: Equtions for Deterministic Automt Julin Slmnc (nd Jurrin Rot) Decemer 19, 2016 In this lecture, we will study the concept of equtions for deterministic utomt. The notes re self contined

More information

Riemann Sums and Riemann Integrals

Riemann Sums and Riemann Integrals Riemnn Sums nd Riemnn Integrls Jmes K. Peterson Deprtment of Biologicl Sciences nd Deprtment of Mthemticl Sciences Clemson University August 26, 203 Outline Riemnn Sums Riemnn Integrls Properties Abstrct

More information

SYDE 112, LECTURES 3 & 4: The Fundamental Theorem of Calculus

SYDE 112, LECTURES 3 & 4: The Fundamental Theorem of Calculus SYDE 112, LECTURES & 4: The Fundmentl Theorem of Clculus So fr we hve introduced two new concepts in this course: ntidifferentition nd Riemnn sums. It turns out tht these quntities re relted, but it is

More information

Riemann Sums and Riemann Integrals

Riemann Sums and Riemann Integrals Riemnn Sums nd Riemnn Integrls Jmes K. Peterson Deprtment of Biologicl Sciences nd Deprtment of Mthemticl Sciences Clemson University August 26, 2013 Outline 1 Riemnn Sums 2 Riemnn Integrls 3 Properties

More information

Riemann is the Mann! (But Lebesgue may besgue to differ.)

Riemann is the Mann! (But Lebesgue may besgue to differ.) Riemnn is the Mnn! (But Lebesgue my besgue to differ.) Leo Livshits My 2, 2008 1 For finite intervls in R We hve seen in clss tht every continuous function f : [, b] R hs the property tht for every ɛ >

More information

1 Online Learning and Regret Minimization

1 Online Learning and Regret Minimization 2.997 Decision-Mking in Lrge-Scle Systems My 10 MIT, Spring 2004 Hndout #29 Lecture Note 24 1 Online Lerning nd Regret Minimiztion In this lecture, we consider the problem of sequentil decision mking in

More information

Intermediate Math Circles Wednesday, November 14, 2018 Finite Automata II. Nickolas Rollick a b b. a b 4

Intermediate Math Circles Wednesday, November 14, 2018 Finite Automata II. Nickolas Rollick a b b. a b 4 Intermedite Mth Circles Wednesdy, Novemer 14, 2018 Finite Automt II Nickols Rollick nrollick@uwterloo.c Regulr Lnguges Lst time, we were introduced to the ide of DFA (deterministic finite utomton), one

More information

Frobenius numbers of generalized Fibonacci semigroups

Frobenius numbers of generalized Fibonacci semigroups Frobenius numbers of generlized Fiboncci semigroups Gretchen L. Mtthews 1 Deprtment of Mthemticl Sciences, Clemson University, Clemson, SC 29634-0975, USA gmtthe@clemson.edu Received:, Accepted:, Published:

More information

Review of basic calculus

Review of basic calculus Review of bsic clculus This brief review reclls some of the most importnt concepts, definitions, nd theorems from bsic clculus. It is not intended to tech bsic clculus from scrtch. If ny of the items below

More information

Convert the NFA into DFA

Convert the NFA into DFA Convert the NF into F For ech NF we cn find F ccepting the sme lnguge. The numer of sttes of the F could e exponentil in the numer of sttes of the NF, ut in prctice this worst cse occurs rrely. lgorithm:

More information

Chapter 4 Contravariance, Covariance, and Spacetime Diagrams

Chapter 4 Contravariance, Covariance, and Spacetime Diagrams Chpter 4 Contrvrince, Covrince, nd Spcetime Digrms 4. The Components of Vector in Skewed Coordintes We hve seen in Chpter 3; figure 3.9, tht in order to show inertil motion tht is consistent with the Lorentz

More information

More on automata. Michael George. March 24 April 7, 2014

More on automata. Michael George. March 24 April 7, 2014 More on utomt Michel George Mrch 24 April 7, 2014 1 Automt constructions Now tht we hve forml model of mchine, it is useful to mke some generl constructions. 1.1 DFA Union / Product construction Suppose

More information

New Expansion and Infinite Series

New Expansion and Infinite Series Interntionl Mthemticl Forum, Vol. 9, 204, no. 22, 06-073 HIKARI Ltd, www.m-hikri.com http://dx.doi.org/0.2988/imf.204.4502 New Expnsion nd Infinite Series Diyun Zhng College of Computer Nnjing University

More information

Designing finite automata II

Designing finite automata II Designing finite utomt II Prolem: Design DFA A such tht L(A) consists of ll strings of nd which re of length 3n, for n = 0, 1, 2, (1) Determine wht to rememer out the input string Assign stte to ech of

More information

arxiv:math/ v2 [math.ho] 16 Dec 2003

arxiv:math/ v2 [math.ho] 16 Dec 2003 rxiv:mth/0312293v2 [mth.ho] 16 Dec 2003 Clssicl Lebesgue Integrtion Theorems for the Riemnn Integrl Josh Isrlowitz 244 Ridge Rd. Rutherford, NJ 07070 jbi2@njit.edu Februry 1, 2008 Abstrct In this pper,

More information

Math& 152 Section Integration by Parts

Math& 152 Section Integration by Parts Mth& 5 Section 7. - Integrtion by Prts Integrtion by prts is rule tht trnsforms the integrl of the product of two functions into other (idelly simpler) integrls. Recll from Clculus I tht given two differentible

More information

The First Fundamental Theorem of Calculus. If f(x) is continuous on [a, b] and F (x) is any antiderivative. f(x) dx = F (b) F (a).

The First Fundamental Theorem of Calculus. If f(x) is continuous on [a, b] and F (x) is any antiderivative. f(x) dx = F (b) F (a). The Fundmentl Theorems of Clculus Mth 4, Section 0, Spring 009 We now know enough bout definite integrls to give precise formultions of the Fundmentl Theorems of Clculus. We will lso look t some bsic emples

More information

Finite Automata Theory and Formal Languages TMV027/DIT321 LP4 2018

Finite Automata Theory and Formal Languages TMV027/DIT321 LP4 2018 Finite Automt Theory nd Forml Lnguges TMV027/DIT321 LP4 2018 Lecture 10 An Bove April 23rd 2018 Recp: Regulr Lnguges We cn convert between FA nd RE; Hence both FA nd RE ccept/generte regulr lnguges; More

More information

Infinite Geometric Series

Infinite Geometric Series Infinite Geometric Series Finite Geometric Series ( finite SUM) Let 0 < r < 1, nd let n be positive integer. Consider the finite sum It turns out there is simple lgebric expression tht is equivlent to

More information

Taylor Polynomial Inequalities

Taylor Polynomial Inequalities Tylor Polynomil Inequlities Ben Glin September 17, 24 Abstrct There re instnces where we my wish to pproximte the vlue of complicted function round given point by constructing simpler function such s polynomil

More information

Week 10: Line Integrals

Week 10: Line Integrals Week 10: Line Integrls Introduction In this finl week we return to prmetrised curves nd consider integrtion long such curves. We lredy sw this in Week 2 when we integrted long curve to find its length.

More information

RELATIONAL MODEL.

RELATIONAL MODEL. RELATIONAL MODEL Structure of Reltionl Dtbses Reltionl Algebr Tuple Reltionl Clculus Domin Reltionl Clculus Extended Reltionl-Algebr- Opertions Modifiction of the Dtbse Views EXAMPLE OF A RELATION BASIC

More information

CS415 Compilers. Lexical Analysis and. These slides are based on slides copyrighted by Keith Cooper, Ken Kennedy & Linda Torczon at Rice University

CS415 Compilers. Lexical Analysis and. These slides are based on slides copyrighted by Keith Cooper, Ken Kennedy & Linda Torczon at Rice University CS415 Compilers Lexicl Anlysis nd These slides re sed on slides copyrighted y Keith Cooper, Ken Kennedy & Lind Torczon t Rice University First Progrmming Project Instruction Scheduling Project hs een posted

More information

Bases for Vector Spaces

Bases for Vector Spaces Bses for Vector Spces 2-26-25 A set is independent if, roughly speking, there is no redundncy in the set: You cn t uild ny vector in the set s liner comintion of the others A set spns if you cn uild everything

More information

Exam 2, Mathematics 4701, Section ETY6 6:05 pm 7:40 pm, March 31, 2016, IH-1105 Instructor: Attila Máté 1

Exam 2, Mathematics 4701, Section ETY6 6:05 pm 7:40 pm, March 31, 2016, IH-1105 Instructor: Attila Máté 1 Exm, Mthemtics 471, Section ETY6 6:5 pm 7:4 pm, Mrch 1, 16, IH-115 Instructor: Attil Máté 1 17 copies 1. ) Stte the usul sufficient condition for the fixed-point itertion to converge when solving the eqution

More information

Jim Lambers MAT 169 Fall Semester Lecture 4 Notes

Jim Lambers MAT 169 Fall Semester Lecture 4 Notes Jim Lmbers MAT 169 Fll Semester 2009-10 Lecture 4 Notes These notes correspond to Section 8.2 in the text. Series Wht is Series? An infinte series, usully referred to simply s series, is n sum of ll of

More information

Chapter 0. What is the Lebesgue integral about?

Chapter 0. What is the Lebesgue integral about? Chpter 0. Wht is the Lebesgue integrl bout? The pln is to hve tutoril sheet ech week, most often on Fridy, (to be done during the clss) where you will try to get used to the ides introduced in the previous

More information

We will see what is meant by standard form very shortly

We will see what is meant by standard form very shortly THEOREM: For fesible liner progrm in its stndrd form, the optimum vlue of the objective over its nonempty fesible region is () either unbounded or (b) is chievble t lest t one extreme point of the fesible

More information

Review of Gaussian Quadrature method

Review of Gaussian Quadrature method Review of Gussin Qudrture method Nsser M. Asi Spring 006 compiled on Sundy Decemer 1, 017 t 09:1 PM 1 The prolem To find numericl vlue for the integrl of rel vlued function of rel vrile over specific rnge

More information

Lecture Note 9: Orthogonal Reduction

Lecture Note 9: Orthogonal Reduction MATH : Computtionl Methods of Liner Algebr 1 The Row Echelon Form Lecture Note 9: Orthogonl Reduction Our trget is to solve the norml eution: Xinyi Zeng Deprtment of Mthemticl Sciences, UTEP A t Ax = A

More information

Lecture 1. Functional series. Pointwise and uniform convergence.

Lecture 1. Functional series. Pointwise and uniform convergence. 1 Introduction. Lecture 1. Functionl series. Pointwise nd uniform convergence. In this course we study mongst other things Fourier series. The Fourier series for periodic function f(x) with period 2π is

More information

and that at t = 0 the object is at position 5. Find the position of the object at t = 2.

and that at t = 0 the object is at position 5. Find the position of the object at t = 2. 7.2 The Fundmentl Theorem of Clculus 49 re mny, mny problems tht pper much different on the surfce but tht turn out to be the sme s these problems, in the sense tht when we try to pproimte solutions we

More information

Integral points on the rational curve

Integral points on the rational curve Integrl points on the rtionl curve y x bx c x ;, b, c integers. Konstntine Zeltor Mthemtics University of Wisconsin - Mrinette 750 W. Byshore Street Mrinette, WI 5443-453 Also: Konstntine Zeltor P.O. Box

More information

Finite Automata. Informatics 2A: Lecture 3. John Longley. 22 September School of Informatics University of Edinburgh

Finite Automata. Informatics 2A: Lecture 3. John Longley. 22 September School of Informatics University of Edinburgh Lnguges nd Automt Finite Automt Informtics 2A: Lecture 3 John Longley School of Informtics University of Edinburgh jrl@inf.ed.c.uk 22 September 2017 1 / 30 Lnguges nd Automt 1 Lnguges nd Automt Wht is

More information

How to simulate Turing machines by invertible one-dimensional cellular automata

How to simulate Turing machines by invertible one-dimensional cellular automata How to simulte Turing mchines by invertible one-dimensionl cellulr utomt Jen-Christophe Dubcq Déprtement de Mthémtiques et d Informtique, École Normle Supérieure de Lyon, 46, llée d Itlie, 69364 Lyon Cedex

More information

State space systems analysis (continued) Stability. A. Definitions A system is said to be Asymptotically Stable (AS) when it satisfies

State space systems analysis (continued) Stability. A. Definitions A system is said to be Asymptotically Stable (AS) when it satisfies Stte spce systems nlysis (continued) Stbility A. Definitions A system is sid to be Asymptoticlly Stble (AS) when it stisfies ut () = 0, t > 0 lim xt () 0. t A system is AS if nd only if the impulse response

More information

Learning Moore Machines from Input-Output Traces

Learning Moore Machines from Input-Output Traces Lerning Moore Mchines from Input-Output Trces Georgios Gintmidis 1 nd Stvros Tripkis 1,2 1 Alto University, Finlnd 2 UC Berkeley, USA Motivtion: lerning models from blck boxes Inputs? Lerner Forml Model

More information

CM10196 Topic 4: Functions and Relations

CM10196 Topic 4: Functions and Relations CM096 Topic 4: Functions nd Reltions Guy McCusker W. Functions nd reltions Perhps the most widely used notion in ll of mthemtics is tht of function. Informlly, function is n opertion which tkes n input

More information

Reinforcement Learning

Reinforcement Learning Reinforcement Lerning Tom Mitchell, Mchine Lerning, chpter 13 Outline Introduction Comprison with inductive lerning Mrkov Decision Processes: the model Optiml policy: The tsk Q Lerning: Q function Algorithm

More information

Natural examples of rings are the ring of integers, a ring of polynomials in one variable, the ring

Natural examples of rings are the ring of integers, a ring of polynomials in one variable, the ring More generlly, we define ring to be non-empty set R hving two binry opertions (we ll think of these s ddition nd multipliction) which is n Abelin group under + (we ll denote the dditive identity by 0),

More information

MAA 4212 Improper Integrals

MAA 4212 Improper Integrals Notes by Dvid Groisser, Copyright c 1995; revised 2002, 2009, 2014 MAA 4212 Improper Integrls The Riemnn integrl, while perfectly well-defined, is too restrictive for mny purposes; there re functions which

More information

19 Optimal behavior: Game theory

19 Optimal behavior: Game theory Intro. to Artificil Intelligence: Dle Schuurmns, Relu Ptrscu 1 19 Optiml behvior: Gme theory Adversril stte dynmics hve to ccount for worst cse Compute policy π : S A tht mximizes minimum rewrd Let S (,

More information

We partition C into n small arcs by forming a partition of [a, b] by picking s i as follows: a = s 0 < s 1 < < s n = b.

We partition C into n small arcs by forming a partition of [a, b] by picking s i as follows: a = s 0 < s 1 < < s n = b. Mth 255 - Vector lculus II Notes 4.2 Pth nd Line Integrls We begin with discussion of pth integrls (the book clls them sclr line integrls). We will do this for function of two vribles, but these ides cn

More information

Student Activity 3: Single Factor ANOVA

Student Activity 3: Single Factor ANOVA MATH 40 Student Activity 3: Single Fctor ANOVA Some Bsic Concepts In designed experiment, two or more tretments, or combintions of tretments, is pplied to experimentl units The number of tretments, whether

More information

1.4 Nonregular Languages

1.4 Nonregular Languages 74 1.4 Nonregulr Lnguges The number of forml lnguges over ny lphbet (= decision/recognition problems) is uncountble On the other hnd, the number of regulr expressions (= strings) is countble Hence, ll

More information

Refined interfaces for compositional verification

Refined interfaces for compositional verification Refined interfces for compositionl verifiction Frédéric Lng INRI Rhône-lpes http://www.inrilpes.fr/vsy Motivtion Enumertive verifiction of concurrent systems Prllel composition of synchronous processes

More information

g i fφdx dx = x i i=1 is a Hilbert space. We shall, henceforth, abuse notation and write g i f(x) = f

g i fφdx dx = x i i=1 is a Hilbert space. We shall, henceforth, abuse notation and write g i f(x) = f 1. Appliction of functionl nlysis to PEs 1.1. Introduction. In this section we give little introduction to prtil differentil equtions. In prticulr we consider the problem u(x) = f(x) x, u(x) = x (1) where

More information

1.3 Regular Expressions

1.3 Regular Expressions 56 1.3 Regulr xpressions These hve n importnt role in describing ptterns in serching for strings in mny pplictions (e.g. wk, grep, Perl,...) All regulr expressions of lphbet re 1.Ønd re regulr expressions,

More information

Best Approximation. Chapter The General Case

Best Approximation. Chapter The General Case Chpter 4 Best Approximtion 4.1 The Generl Cse In the previous chpter, we hve seen how n interpolting polynomil cn be used s n pproximtion to given function. We now wnt to find the best pproximtion to given

More information

Math 8 Winter 2015 Applications of Integration

Math 8 Winter 2015 Applications of Integration Mth 8 Winter 205 Applictions of Integrtion Here re few importnt pplictions of integrtion. The pplictions you my see on n exm in this course include only the Net Chnge Theorem (which is relly just the Fundmentl

More information

Line and Surface Integrals: An Intuitive Understanding

Line and Surface Integrals: An Intuitive Understanding Line nd Surfce Integrls: An Intuitive Understnding Joseph Breen Introduction Multivrible clculus is ll bout bstrcting the ides of differentition nd integrtion from the fmilir single vrible cse to tht of

More information

Lecture 3: Equivalence Relations

Lecture 3: Equivalence Relations Mthcmp Crsh Course Instructor: Pdric Brtlett Lecture 3: Equivlence Reltions Week 1 Mthcmp 2014 In our lst three tlks of this clss, we shift the focus of our tlks from proof techniques to proof concepts

More information

Here we study square linear systems and properties of their coefficient matrices as they relate to the solution set of the linear system.

Here we study square linear systems and properties of their coefficient matrices as they relate to the solution set of the linear system. Section 24 Nonsingulr Liner Systems Here we study squre liner systems nd properties of their coefficient mtrices s they relte to the solution set of the liner system Let A be n n Then we know from previous

More information

ACCESS TO SCIENCE, ENGINEERING AND AGRICULTURE: MATHEMATICS 1 MATH00030 SEMESTER /2019

ACCESS TO SCIENCE, ENGINEERING AND AGRICULTURE: MATHEMATICS 1 MATH00030 SEMESTER /2019 ACCESS TO SCIENCE, ENGINEERING AND AGRICULTURE: MATHEMATICS MATH00030 SEMESTER 208/209 DR. ANTHONY BROWN 7.. Introduction to Integrtion. 7. Integrl Clculus As ws the cse with the chpter on differentil

More information

Lecture 09: Myhill-Nerode Theorem

Lecture 09: Myhill-Nerode Theorem CS 373: Theory of Computtion Mdhusudn Prthsrthy Lecture 09: Myhill-Nerode Theorem 16 Ferury 2010 In this lecture, we will see tht every lnguge hs unique miniml DFA We will see this fct from two perspectives

More information

Numerical Integration

Numerical Integration Chpter 1 Numericl Integrtion Numericl differentition methods compute pproximtions to the derivtive of function from known vlues of the function. Numericl integrtion uses the sme informtion to compute numericl

More information

Theoretical foundations of Gaussian quadrature

Theoretical foundations of Gaussian quadrature Theoreticl foundtions of Gussin qudrture 1 Inner product vector spce Definition 1. A vector spce (or liner spce) is set V = {u, v, w,...} in which the following two opertions re defined: (A) Addition of

More information

Lecture 1: Introduction to integration theory and bounded variation

Lecture 1: Introduction to integration theory and bounded variation Lecture 1: Introduction to integrtion theory nd bounded vrition Wht is this course bout? Integrtion theory. The first question you might hve is why there is nything you need to lern bout integrtion. You

More information

Euler, Ioachimescu and the trapezium rule. G.J.O. Jameson (Math. Gazette 96 (2012), )

Euler, Ioachimescu and the trapezium rule. G.J.O. Jameson (Math. Gazette 96 (2012), ) Euler, Iochimescu nd the trpezium rule G.J.O. Jmeson (Mth. Gzette 96 (0), 36 4) The following results were estblished in recent Gzette rticle [, Theorems, 3, 4]. Given > 0 nd 0 < s

More information

CMPSCI 250: Introduction to Computation. Lecture #31: What DFA s Can and Can t Do David Mix Barrington 9 April 2014

CMPSCI 250: Introduction to Computation. Lecture #31: What DFA s Can and Can t Do David Mix Barrington 9 April 2014 CMPSCI 250: Introduction to Computtion Lecture #31: Wht DFA s Cn nd Cn t Do Dvid Mix Brrington 9 April 2014 Wht DFA s Cn nd Cn t Do Deterministic Finite Automt Forml Definition of DFA s Exmples of DFA

More information

Quadratic Forms. Quadratic Forms

Quadratic Forms. Quadratic Forms Qudrtic Forms Recll the Simon & Blume excerpt from n erlier lecture which sid tht the min tsk of clculus is to pproximte nonliner functions with liner functions. It s ctully more ccurte to sy tht we pproximte

More information

Polynomial Approximations for the Natural Logarithm and Arctangent Functions. Math 230

Polynomial Approximations for the Natural Logarithm and Arctangent Functions. Math 230 Polynomil Approimtions for the Nturl Logrithm nd Arctngent Functions Mth 23 You recll from first semester clculus how one cn use the derivtive to find n eqution for the tngent line to function t given

More information

Physics 116C Solution of inhomogeneous ordinary differential equations using Green s functions

Physics 116C Solution of inhomogeneous ordinary differential equations using Green s functions Physics 6C Solution of inhomogeneous ordinry differentil equtions using Green s functions Peter Young November 5, 29 Homogeneous Equtions We hve studied, especilly in long HW problem, second order liner

More information

Chapters 4 & 5 Integrals & Applications

Chapters 4 & 5 Integrals & Applications Contents Chpters 4 & 5 Integrls & Applictions Motivtion to Chpters 4 & 5 2 Chpter 4 3 Ares nd Distnces 3. VIDEO - Ares Under Functions............................................ 3.2 VIDEO - Applictions

More information

Review of Riemann Integral

Review of Riemann Integral 1 Review of Riemnn Integrl In this chpter we review the definition of Riemnn integrl of bounded function f : [, b] R, nd point out its limittions so s to be convinced of the necessity of more generl integrl.

More information

1 The Lagrange interpolation formula

1 The Lagrange interpolation formula Notes on Qudrture 1 The Lgrnge interpoltion formul We briefly recll the Lgrnge interpoltion formul. The strting point is collection of N + 1 rel points (x 0, y 0 ), (x 1, y 1 ),..., (x N, y N ), with x

More information

f(x) dx, If one of these two conditions is not met, we call the integral improper. Our usual definition for the value for the definite integral

f(x) dx, If one of these two conditions is not met, we call the integral improper. Our usual definition for the value for the definite integral Improper Integrls Every time tht we hve evluted definite integrl such s f(x) dx, we hve mde two implicit ssumptions bout the integrl:. The intervl [, b] is finite, nd. f(x) is continuous on [, b]. If one

More information

SUMMER KNOWHOW STUDY AND LEARNING CENTRE

SUMMER KNOWHOW STUDY AND LEARNING CENTRE SUMMER KNOWHOW STUDY AND LEARNING CENTRE Indices & Logrithms 2 Contents Indices.2 Frctionl Indices.4 Logrithms 6 Exponentil equtions. Simplifying Surds 13 Opertions on Surds..16 Scientific Nottion..18

More information

AUTOMATA AND LANGUAGES. Definition 1.5: Finite Automaton

AUTOMATA AND LANGUAGES. Definition 1.5: Finite Automaton 25. Finite Automt AUTOMATA AND LANGUAGES A system of computtion tht only hs finite numer of possile sttes cn e modeled using finite utomton A finite utomton is often illustrted s stte digrm d d d. d q

More information

Recitation 3: Applications of the Derivative. 1 Higher-Order Derivatives and their Applications

Recitation 3: Applications of the Derivative. 1 Higher-Order Derivatives and their Applications Mth 1c TA: Pdric Brtlett Recittion 3: Applictions of the Derivtive Week 3 Cltech 013 1 Higher-Order Derivtives nd their Applictions Another thing we could wnt to do with the derivtive, motivted by wht

More information

Chapter 2 Finite Automata

Chapter 2 Finite Automata Chpter 2 Finite Automt 28 2.1 Introduction Finite utomt: first model of the notion of effective procedure. (They lso hve mny other pplictions). The concept of finite utomton cn e derived y exmining wht

More information

Global Types for Dynamic Checking of Protocol Conformance of Multi-Agent Systems

Global Types for Dynamic Checking of Protocol Conformance of Multi-Agent Systems Globl Types for Dynmic Checking of Protocol Conformnce of Multi-Agent Systems (Extended Abstrct) Dvide Ancon, Mtteo Brbieri, nd Vivin Mscrdi DIBRIS, University of Genov, Itly emil: dvide@disi.unige.it,

More information

MATH 144: Business Calculus Final Review

MATH 144: Business Calculus Final Review MATH 144: Business Clculus Finl Review 1 Skills 1. Clculte severl limits. 2. Find verticl nd horizontl symptotes for given rtionl function. 3. Clculte derivtive by definition. 4. Clculte severl derivtives

More information

Local orthogonality: a multipartite principle for (quantum) correlations

Local orthogonality: a multipartite principle for (quantum) correlations Locl orthogonlity: multiprtite principle for (quntum) correltions Antonio Acín ICREA Professor t ICFO-Institut de Ciencies Fotoniques, Brcelon Cusl Structure in Quntum Theory, Bensque, Spin, June 2013

More information

THE QUADRATIC RECIPROCITY LAW OF DUKE-HOPKINS. Circa 1870, G. Zolotarev observed that the Legendre symbol ( a p

THE QUADRATIC RECIPROCITY LAW OF DUKE-HOPKINS. Circa 1870, G. Zolotarev observed that the Legendre symbol ( a p THE QUADRATIC RECIPROCITY LAW OF DUKE-HOPKINS PETE L CLARK Circ 1870, Zolotrev observed tht the Legendre symbol ( p ) cn be interpreted s the sign of multipliction by viewed s permuttion of the set Z/pZ

More information

1 Nondeterministic Finite Automata

1 Nondeterministic Finite Automata 1 Nondeterministic Finite Automt Suppose in life, whenever you hd choice, you could try oth possiilities nd live your life. At the end, you would go ck nd choose the one tht worked out the est. Then you

More information