Formal verification for numerical methods
|
|
- Alfred Horn
- 5 years ago
- Views:
Transcription
1 Formal verification for numerical methods Ioana Paşca PhD thesis at INRIA Sophia Antipolis, Marelle Team Advisor: Yves Bertot 1 7 1
2 Robots 2 7
3 Robots efficiency 2 7
4 Robots efficiency safety 2 7
5 Inside the robot lots of wires 3 7
6 Inside the robot lots of wires code computations numerical methods 3 7
7 Ensure correctness of the code tests 7
8 Ensure correctness of the code tests proofs proof assistants formal verification 7
9 Proof assistants define data define functions prove properties trust proofs 5 7
10 Proof assistants COQ and SSREFLECT define data define functions prove properties trust proofs 5 7
11 Example tasks and methods compute a valid position for the robot by solving a system of equations use Newton s method and its properties use interval analysis based methods 6 7 6
12 Newton s method Definition: x n+1 = x n f (xn) f (x n) Properties: convergence to the root of function f speed of convergence local unicity of the root local stability 7 7
13 Kantorovitch s theorem in one dimension Consider an equation f (x) = 0, where f :]a, b[ R, a, b R, f C (1) (]a, b[). Let x 0 ]a, b[ such that U ε (x 0 ) = {x : x x 0 ε} ]a, b[. If: 1. f (x 0 ) 0 and 1 f (x 0 ) A 0; 2. f (x 0 ) f (x 0 ) B 0 ε 2 ; 3. x, y ]a, b[, f (x) f (y) C x y. µ 0 = 2A 0 B 0 C 1. then, the Newton process x n+1 = x n f (xn) f (x n), n = 0, 1, 2,... converges and lim x n = x is a solution of the initial equation, so that n x x 0 2B 0 ε
14 Idea of the proof for every element of the Newton s sequence show that hypotheses 1 - are verified, with different constants; infer that Newton s sequence is a Cauchy sequence and, by the completeness of R, a convergent sequence; prove that the limit of the sequence is a root of the given function
15 Working with real numbers use the COQ standard library on real numbers axiomatic definition: archimedean, total order field, satisfying the least upper bound principle classical real analysis proofs close to pen and paper mathematics other approaches constructive definition intuitionistic logic non-standard analysis
16 Formal proof in one dimension axiomatic reals inequalities absolute value sequences topology derivation Kantorovitch 11 7
17 Some COQ code: Theorem k a n t o _ e x i s t : xs : R, Un_cv Xn xs c_ disc X0 (2 B0 ) xs f xs =
18 Kantorovitch s theorem in several dimensions Let f (x) = 0 be a system with p equations and p variables, with f C (2) (ω) and U ε (x 0 ) = { x x 0 ε} ω. If: 1. the Jacobian matrix W (x) = [ f i x j ] for x = x 0 has an inverse Γ 0 = W 1 with Γ 0 A 0 ; 2. Γ 0 f (x 0 ) B 0 ε 2 ; 3. p k=1 2 f i (x) x j x k C for i, j = 1, 2,..., p and x U ε (x 0 );. 2pA 0 B 0 C 1. Then, Newton s process: x n+1 = x n W 1 (x n )f (x n ) converges to x = lim x n. n 1 7 1
19 Kantorovitch s theorem in several dimensions Let f (x) = 0 be a system with p equations and p variables, with f C (2) (ω) and U ε (x 0 ) = { x x 0 ε} ω. If: 1. the Jacobian matrix W (x) = [ f i x j ] for x = x 0 has an inverse Γ 0 = W 1 with Γ 0 A 0 ; 2. Γ 0 f (x 0 ) B 0 ε 2 ; 3. p k=1 2 f i (x) x j x k C for i, j = 1, 2,..., p and x U ε (x 0 );. 2pA 0 B 0 C 1. Then, Newton s process: x n+1 = x n W 1 (x n )f (x n ) converges to x = lim x n. n 1 7
20 Kantorovitch s theorem in several dimensions Let f (x) = 0 be a system with p equations and p variables, with f C (2) (ω) and U ε (x 0 ) = { x x 0 ε} ω. If: 1. the Jacobian matrix W (x) = [ f i x j ] for x = x 0 has an inverse Γ 0 = W 1 with Γ 0 A 0 ; 2. Γ 0 f (x 0 ) B 0 ε 2 ; 3. p k=1 2 f i (x) x j x k C for i, j = 1, 2,..., p and x U ε (x 0 );. 2pA 0 B 0 C 1. Then, Newton s process: x n+1 = x n W 1 (x n )f (x n ) converges to x = lim x n. n real vectors real matrices sequences of vectors functions of several variables partial derivatives 1 7
21 Kantorovitch s theorem in several dimensions Let f (x) = 0 be a system with p equations and p variables, with f C (2) (ω) and U ε (x 0 ) = { x x 0 ε} ω. If: 1. the Jacobian matrix W (x) = [ f i x j ] for x = x 0 has an inverse Γ 0 = W 1 with Γ 0 A 0 ; 2. Γ 0 f (x 0 ) B 0 ε 2 ; 3. p k=1 2 f i (x) x j x k C for i, j = 1, 2,..., p and x U ε (x 0 );. 2pA 0 B 0 C 1. Then, Newton s process: x n+1 = x n W 1 (x n )f (x n ) converges to x = lim x n. n real vectors real matrices sequences of vectors functions of several variables partial derivatives 1 7 1
22 Setting up the formalization We need to talk about real numbers matrices We use COQ standard library Reals SSREFLECT library matrix Mix SSREFLECT and standard COQ!
23 Mix SSREFLECT and COQ in SSREFLECT hierarchy of algebraic structures abstract matrices, but operations when elements are from a ring in COQ s Reals library real numbers defined by axioms ring structure
24 Dealing with real matrices use existing results for SSREFLECT library define new concepts: e.g. the norm of a real matrix, matrix sequences and series prove properties A < 1 S, A n = S n=1 A < 1 det(i p A) 0 instantiate to a given norm: e.g. the maximum norm D e f i n i t i o n norm_m (A : M_(m, n ) ) : R := \ big [Rmax R0 ] _ i \ sum_j ( Rabs (A i j ) )
25 Formal proof in several dimensions axiomatic reals finite types, indexed operations matrix vectors: operations, norm matrix norm sequences functions derivation Taylor s formula Kantorovitch
26 Some COQ code: Theorem kantororp_ exist : xs : vec R p, conv Xn xs norm ( d i f _ v xs X0 ) 2 b0 f xs = vect
27 22 7 2
28 What about computations?
29 What about computations? in COQ axiomatic real numbers are appropriate for proofs, but not for computations use libraries for exact real arithmetic
30 Exact real arithmetic with co-inductive streams Representation compute a real number in [ 1, 1] with arbitrary precision real numbers represented as streams of signed digits in base β e.g. 1 3 = = 3::3:: = :: 7:::: d i s β = d 1 ::d 2 ::d 3 ::... β = β i ; β < d i < β notice d 1 ::s β = d 1+s β β i=1 25 7
31 Exact real arithmetic with co-inductive streams Representation compute a real number in [ 1, 1] with arbitrary precision real numbers represented as streams of signed digits in base β e.g. 1 3 = = 3::3:: = :: 7:::: d i s β = d 1 ::d 2 ::d 3 ::... β = β i ; β < d i < β notice d 1 ::s β = d 1+s β β redundant representation useful for designing algorithms i=1 e.g. 0::3:: ::6:: =? 0::3::3:: ::6::5:: = 1:: 1:: ::3::3:: ::6::7:: = 1::0::
32 Exact real arithmetic with co-inductive streams Implementation s β = d 1 ::d 2 ::d 3 ::... β = d 1 ::s β ; β < d i < β in COQ: co-inductive definitions and co-recursive functions CoInductive Stream (A : Type ) : Type : = Cons : A Stream A Stream A. Notation " x : : s " := Cons x s. CoFixpoint Sopp ( s : Stream d i g i t ) : Stream d i g i t := match s with d 1 : : s ( d 1 ) : : Sopp s end
33 Exact real arithmetic with co-inductive streams Certification d 1 ::s β = d 1 + s β β link the exact reals with axiomatic reals Variable β : N. CoInductive represents : Stream d i g i t R Prop : = rep : s r k, β < k < β 1 r 1 represents s r represents (k :: s) k+r β. Notation " s r " : = represents s r. certify implementations via this relation Theorem Sopp_correct : s r, s r ( Sopp s ) ( r )
34 Implementation of Newton s method x n+1 = x n f (xn) f (x n) Newton on streams Sx 0 := s 0 Sx n+1 := Sx n g(sx n ) Newton on axiomatic reals Rx 0 := r 0 Rx n+1 := Rx n f (Rxn) f (Rx n) Theorem Snewt_correct : (... ) s 0 r 0 g ( x ) f (x)f (x) ( Sxn g s 0 n ) ( Rxn f f r 0 n ). we can express properties on elements of Newton s sequence
35 Implementation of Newton s method x n+1 = x n f (xn) f (x n) Newton on streams Sx 0 := s 0 Sx n+1 := Sx n g(sx n ) Newton on axiomatic reals Rx 0 := r 0 Rx n+1 := Rx n f (Rxn) f (Rx n) Theorem Snewt_correct : (... ) s 0 r 0 g ( x ) f (x)f (x) ( Sxn g s 0 n ) ( Rxn f f r 0 n ). we can express properties on elements of Newton s sequence but, we cannot reason about the root of the function we want to compute the root in arbitrary precision
36 Newton for streams Goal define a co-recursive algorithm to compute the root x of the function f produce the first digit use a guarded co-recursive call
37 Newton for streams Goal define a co-recursive algorithm to compute the root x of the function f Idea produce the first digit use a guarded co-recursive call start with f and x 0 speed of convergence n s.t. x n = d 1+x n β x = d 1+x β
38 Newton for streams Goal define a co-recursive algorithm to compute the root x of the function f Idea produce the first digit use a guarded co-recursive call start with f and x 0 speed of convergence n s.t. x n = d 1+x n β f (x ) = 0 f ( d 1+x β ) = 0 define f 1 (x) := f ( d 1+x β ) f 1(x ) = 0 x = d 1+x β repeat process to get the first digit of x ; start with f 1 and x n
39 Newton for streams Goal define a co-recursive algorithm to compute the root x of the function f Idea produce the first digit use a guarded co-recursive call start with f and x 0 speed of convergence n s.t. x n = d 1+x n β f (x ) = 0 f ( d 1+x β ) = 0 define f 1 (x) := f ( d 1+x β ) f 1(x ) = 0 x = d 1+x β repeat process to get the first digit of x ; start with f 1 and x n g = f f g 1 (x) := f 1(x) f 1 (x) = f ( d 1 +x β ) 1 β f ( d 1 +x β ) β ) = β g( d 1+x
40 Newton for streams Idea to produce a first digit of x determine x n = d 1+x n β s.t. x = d 1+x β do a co-recursive call with function g 1 (x) = β g( d 1+x β ) and x n Algorithm CoFixpoint exact_newton g s 0 n := match ( make_digit ( Sxn g s 0 n ) ) with d 1 : : s n d 1 : : exact_newton (fun s (β g(d 1 :: s))) s n n end
41 Newton for streams Idea to produce a first digit of x determine x n = d 1+x n β s.t. x = d 1+x β do a co-recursive call with function g 1 (x) = β g( d 1+x β ) and x n Algorithm CoFixpoint exact_newton g s 0 n := match ( make_digit ( Sxn g s 0 n ) ) with d 1 : : s n d 1 : : exact_newton (fun s (β g(d 1 :: s))) s n n end. Theorem exact_ newton_ correct : (... ) ( exact_newton g s 0 n ) x. ensure the same hypotheses for x n and g 1 as for x 0 and g 3 7 3
42 35 7 3
43 Computation with rounding computations on machines are inexact modify Newton s method the method to include rounding x 0 x n+1 = x n f (x n) f (x n ) ( t 0 = x 0 t n+1 = rnd n+1 t n f (t ) n) f (t n )
44 Certified rounding prove that t n x use local stability: x 0 U x 0, x n (x 0 ) x x n (x 0 ): x 0, x 1, x 2, x 3,... x x n (x 1 ): x n ( x 1 ): x n ( x 2 ): x n ( x 2 ): x 1, x 2, x 3... x x 1, x 2, x 3... x x 2, x 3... x x 2, x 3... x
45 Certified rounding prove that t n x use local stability: x 0 U x 0, x n (x 0 ) x x n (x 0 ): x 0, x 1, x 2, x 3,... x x 0 = t 0 x n (x 1 ): x 1, x 2, x 3... x x n ( x 1 ): x 1, x 2, x 3... x x 1 = t 1 x n ( x 2 ): x 2, x 3... x x n ( x 2 ): x 2, x 3... x x 2 = t
46 Newton with rounding Let f :]a, b[ R and x 0 satisfying the conditions in Kantorovitch s theorem and let rnd : N R R. If 1. n x, x ]a, b[ rnd n (x) ]a, b[ µ 0 < 1 3. [x 0 3B 0, x 0 + 3B 0 ] ]a, b[. n x, x rnd n (x) 1 3 n R 0, where R 0 = 1 µ2 0 8µ 0 B 0 then, for the perturbed Newton s sequence t 0 = x 0 and t n+1 = rnd n+1 (t n f (t n )f (t n )) a. the sequence {t n } n N converges and lim n t n = x where x is the root of the function f given by Kantorovitch s theorem b. n, x t n 1 2 n 1 B
47 39 7 3
48 Formalization of a numerical method 1. formalize the necessary mathematical theories 2. prove the theorems 3. handle computations. handle optimizations 0 7
49 Another formal study Interval arithmetic tool used to handle inaccuracies in computations. π =.27 [ 3.15, 3.1] [1.1, 1.2] = [.73,.27] 1 7
50 Another formal study Interval arithmetic tool used to handle inaccuracies in computations. π =.27 [ 3.15, 3.1] [1.1, 1.2] = [.73,.27] solve systems of linear interval equations { [1, 2]x 1 + [2, ]x 2 = [ 1, 1] [2, ]x 1 + [1, 2]x 2 = [1, 2] 1 7
51 Solving systems of linear interval equations Two steps: 1. checking regularity of the associated interval matrix 2. computing bounds of the solution set exact solution bounds for the solution set 2 7
52 Solving systems of linear interval equations Two steps: 1. checking regularity of the associated interval matrix 2. computing bounds of the solution set exact solution bounds for the solution set 2 7
53 Regular interval matrices A = ( [2, ] [ 1, 1] [ 1, 1] [2, ] ) A is regular iff à A, det à 0 ( Ã11 à à = 12 à 21 à 22 det à 0 ), à 11 [2, ], à 12 [ 1, 1] à 21 [ 1, 1], à 22 [2, ] 3 7
54 Criteria for regularity of interval matrices Criterion A is regular if and only if x R n, 0 A x x = 0. Criterion A is regular if and only if x R n, A c x A x x = 0. Criterion (using positive definiteness) If the matrix (A T c A c T A A I) is positive definite for some consistent matrix norm, then A is regular. Criterion (using the midpoint inverse) If the following inequality holds ρ( I RA c + R A ) < 1 for an arbitrary matrix R, then A is regular. Criterion (using eigenvalues) If the inequality λ max ( T A A) < λ min (A T c A c ) holds, then A is regular. 7
55 Organization of the formal proof axiomatic reals finite types, indexed operations matrix real intervals real matrix: norm, eigenvalues interval matrices criteria of regularity for interval matrices 5 7
56 Work for eigenvalues spectral radius: ρ(a) = max{ λ(a) } Theorem (Perron Frobenius) If A R n n is nonnegative then the spectral radius ρ(a) is an eigenvalue of A, and there is a real, nonnegative vector x 0 with Ax = ρ(a)x. 6 7
57 Conclusion Contributions: formalization of mathematical concepts two formal studies: Newton s method regularity of interval matrices Perspectives: for interval analysis: study computation study for floating point numbers 7 7
Perron Frobenius Theory
Perron Frobenius Theory Oskar Perron Georg Frobenius (1880 1975) (1849 1917) Stefan Güttel Perron Frobenius Theory 1 / 10 Positive and Nonnegative Matrices Let A, B R m n. A B if a ij b ij i, j, A > B
More informationLecture 5. Ch. 5, Norms for vectors and matrices. Norms for vectors and matrices Why?
KTH ROYAL INSTITUTE OF TECHNOLOGY Norms for vectors and matrices Why? Lecture 5 Ch. 5, Norms for vectors and matrices Emil Björnson/Magnus Jansson/Mats Bengtsson April 27, 2016 Problem: Measure size of
More informationLet x be an approximate solution for Ax = b, e.g., obtained by Gaussian elimination. Let x denote the exact solution. Call. r := b A x.
ESTIMATION OF ERROR Let x be an approximate solution for Ax = b, e.g., obtained by Gaussian elimination. Let x denote the exact solution. Call the residual for x. Then r := b A x r = b A x = Ax A x = A
More informationOPTIMAL SCALING FOR P -NORMS AND COMPONENTWISE DISTANCE TO SINGULARITY
published in IMA Journal of Numerical Analysis (IMAJNA), Vol. 23, 1-9, 23. OPTIMAL SCALING FOR P -NORMS AND COMPONENTWISE DISTANCE TO SINGULARITY SIEGFRIED M. RUMP Abstract. In this note we give lower
More informationFIXED POINT ITERATIONS
FIXED POINT ITERATIONS MARKUS GRASMAIR 1. Fixed Point Iteration for Non-linear Equations Our goal is the solution of an equation (1) F (x) = 0, where F : R n R n is a continuous vector valued mapping in
More informationNumerical Algorithms. IE 496 Lecture 20
Numerical Algorithms IE 496 Lecture 20 Reading for This Lecture Primary Miller and Boxer, Pages 124-128 Forsythe and Mohler, Sections 1 and 2 Numerical Algorithms Numerical Analysis So far, we have looked
More informationSection 3.9. Matrix Norm
3.9. Matrix Norm 1 Section 3.9. Matrix Norm Note. We define several matrix norms, some similar to vector norms and some reflecting how multiplication by a matrix affects the norm of a vector. We use matrix
More informationInner products and Norms. Inner product of 2 vectors. Inner product of 2 vectors x and y in R n : x 1 y 1 + x 2 y x n y n in R n
Inner products and Norms Inner product of 2 vectors Inner product of 2 vectors x and y in R n : x 1 y 1 + x 2 y 2 + + x n y n in R n Notation: (x, y) or y T x For complex vectors (x, y) = x 1 ȳ 1 + x 2
More informationNotes on Linear Algebra and Matrix Theory
Massimo Franceschet featuring Enrico Bozzo Scalar product The scalar product (a.k.a. dot product or inner product) of two real vectors x = (x 1,..., x n ) and y = (y 1,..., y n ) is not a vector but a
More informationIs the Hénon map chaotic
Is the Hénon map chaotic Zbigniew Galias Department of Electrical Engineering AGH University of Science and Technology, Poland, galias@agh.edu.pl International Workshop on Complex Networks and Applications
More informationAlexander Ostrowski
Ostrowski p. 1/3 Alexander Ostrowski 1893 1986 Walter Gautschi wxg@cs.purdue.edu Purdue University Ostrowski p. 2/3 Collected Mathematical Papers Volume 1 Determinants Linear Algebra Algebraic Equations
More informationNumerical Methods for Differential Equations Mathematical and Computational Tools
Numerical Methods for Differential Equations Mathematical and Computational Tools Gustaf Söderlind Numerical Analysis, Lund University Contents V4.16 Part 1. Vector norms, matrix norms and logarithmic
More informationMATH36001 Perron Frobenius Theory 2015
MATH361 Perron Frobenius Theory 215 In addition to saying something useful, the Perron Frobenius theory is elegant. It is a testament to the fact that beautiful mathematics eventually tends to be useful,
More informationCertified Roundoff Error Bounds using Semidefinite Programming
Certified Roundoff Error Bounds using Semidefinite Programming Victor Magron, CNRS VERIMAG joint work with G. Constantinides and A. Donaldson INRIA Mescal Team Seminar 19 November 2015 Victor Magron Certified
More informationLeast-Squares Fitting of Model Parameters to Experimental Data
Least-Squares Fitting of Model Parameters to Experimental Data Div. of Mathematical Sciences, Dept of Engineering Sciences and Mathematics, LTU, room E193 Outline of talk What about Science and Scientific
More informationAN ELEMENTARY PROOF OF THE SPECTRAL RADIUS FORMULA FOR MATRICES
AN ELEMENTARY PROOF OF THE SPECTRAL RADIUS FORMULA FOR MATRICES JOEL A. TROPP Abstract. We present an elementary proof that the spectral radius of a matrix A may be obtained using the formula ρ(a) lim
More informationCylindrical Algebraic Decomposition in Coq
Cylindrical Algebraic Decomposition in Coq MAP 2010 - Logroño 13-16 November 2010 Assia Mahboubi INRIA Microsoft Research Joint Centre (France) INRIA Saclay Île-de-France École Polytechnique, Palaiseau
More informationConstructive Algebra in Type Theory
Constructive Algebra in Type Theory Anders Mörtberg mortberg@chalmers.se September 4, 2012 ( 0 2 1 0 ) T ( x1 x 2 ) = ( 2 0 ) ( 0 2 1 0 ) T ( x1 x 2 ) = ( 2 0 ) ( x1 x 2 ) = ( 0 2 ) Matlab 2009b A=[ 0
More informationComponentwise perturbation analysis for matrix inversion or the solution of linear systems leads to the Bauer-Skeel condition number ([2], [13])
SIAM Review 4():02 2, 999 ILL-CONDITIONED MATRICES ARE COMPONENTWISE NEAR TO SINGULARITY SIEGFRIED M. RUMP Abstract. For a square matrix normed to, the normwise distance to singularity is well known to
More informationMathematics for Engineers. Numerical mathematics
Mathematics for Engineers Numerical mathematics Integers Determine the largest representable integer with the intmax command. intmax ans = int32 2147483647 2147483647+1 ans = 2.1475e+09 Remark The set
More informationInvertibility and stability. Irreducibly diagonally dominant. Invertibility and stability, stronger result. Reducible matrices
Geršgorin circles Lecture 8: Outline Chapter 6 + Appendix D: Location and perturbation of eigenvalues Some other results on perturbed eigenvalue problems Chapter 8: Nonnegative matrices Geršgorin s Thm:
More informationLecture: Local Spectral Methods (1 of 4)
Stat260/CS294: Spectral Graph Methods Lecture 18-03/31/2015 Lecture: Local Spectral Methods (1 of 4) Lecturer: Michael Mahoney Scribe: Michael Mahoney Warning: these notes are still very rough. They provide
More informationComputational Logic for Computer Science
Motivation: formalization - proofs & deduction Computational proofs - logic & deduction Formal proofs Pr Computational Logic for Computer Science Mauricio Ayala-Rinco n & Fla vio L.C. de Moura Grupo de
More informationCylindrical Algebraic Decomposition in Coq
Cylindrical Algebraic Decomposition in Coq MAP 2010 - Logroño 13-16 November 2010 Assia Mahboubi INRIA Microsoft Research Joint Centre (France) INRIA Saclay Île-de-France École Polytechnique, Palaiseau
More informationDuke University, Department of Electrical and Computer Engineering Optimization for Scientists and Engineers c Alex Bronstein, 2014
Duke University, Department of Electrical and Computer Engineering Optimization for Scientists and Engineers c Alex Bronstein, 2014 Linear Algebra A Brief Reminder Purpose. The purpose of this document
More informationVérification formelle pour les méthodes numériques
UNIVERSITÉ DE NICE - SOPHIA ANTIPOLIS ÉCOLE DOCTORALE STIC SCIENCES ET TECHNOLOGIES DE L INFORMATION ET DE LA COMMUNICATION T H È S E pour obtenir le titre de Docteur en Sciences de l Université de Nice
More informationLinear Algebra Massoud Malek
CSUEB Linear Algebra Massoud Malek Inner Product and Normed Space In all that follows, the n n identity matrix is denoted by I n, the n n zero matrix by Z n, and the zero vector by θ n An inner product
More informationMATH3283W LECTURE NOTES: WEEK 6 = 5 13, = 2 5, 1 13
MATH383W LECTURE NOTES: WEEK 6 //00 Recursive sequences (cont.) Examples: () a =, a n+ = 3 a n. The first few terms are,,, 5 = 5, 3 5 = 5 3, Since 5
More informationNonlinear equations. Norms for R n. Convergence orders for iterative methods
Nonlinear equations Norms for R n Assume that X is a vector space. A norm is a mapping X R with x such that for all x, y X, α R x = = x = αx = α x x + y x + y We define the following norms on the vector
More informationNumerical Analysis: Solving Systems of Linear Equations
Numerical Analysis: Solving Systems of Linear Equations Mirko Navara http://cmpfelkcvutcz/ navara/ Center for Machine Perception, Department of Cybernetics, FEE, CTU Karlovo náměstí, building G, office
More informationTHE PERTURBATION BOUND FOR THE SPECTRAL RADIUS OF A NON-NEGATIVE TENSOR
THE PERTURBATION BOUND FOR THE SPECTRAL RADIUS OF A NON-NEGATIVE TENSOR WEN LI AND MICHAEL K. NG Abstract. In this paper, we study the perturbation bound for the spectral radius of an m th - order n-dimensional
More informationBeyond First-Order Logic
Beyond First-Order Logic Software Formal Verification Maria João Frade Departmento de Informática Universidade do Minho 2008/2009 Maria João Frade (DI-UM) Beyond First-Order Logic MFES 2008/09 1 / 37 FOL
More informationJim Lambers MAT 610 Summer Session Lecture 2 Notes
Jim Lambers MAT 610 Summer Session 2009-10 Lecture 2 Notes These notes correspond to Sections 2.2-2.4 in the text. Vector Norms Given vectors x and y of length one, which are simply scalars x and y, the
More informationDefinitions & Theorems
Definitions & Theorems Math 147, Fall 2009 December 19, 2010 Contents 1 Logic 2 1.1 Sets.................................................. 2 1.2 The Peano axioms..........................................
More informationSeunghee Ye Ma 8: Week 2 Oct 6
Week 2 Summary This week, we will learn about sequences and real numbers. We first define what we mean by a sequence and discuss several properties of sequences. Then, we will talk about what it means
More informationOutline. Math Numerical Analysis. Errors. Lecture Notes Linear Algebra: Part B. Joseph M. Mahaffy,
Math 54 - Numerical Analysis Lecture Notes Linear Algebra: Part B Outline Joseph M. Mahaffy, jmahaffy@mail.sdsu.edu Department of Mathematics and Statistics Dynamical Systems Group Computational Sciences
More informationAxiomatic Theories of Truth
Axiomatic Theories of Truth Graham Leigh University of Leeds LC 8, 8th July 28 Graham Leigh (University of Leeds) Axiomatic Theories of Truth LC 8, 8th July 28 1 / 15 Introduction Formalising Truth Formalising
More informationChapter 8. P-adic numbers. 8.1 Absolute values
Chapter 8 P-adic numbers Literature: N. Koblitz, p-adic Numbers, p-adic Analysis, and Zeta-Functions, 2nd edition, Graduate Texts in Mathematics 58, Springer Verlag 1984, corrected 2nd printing 1996, Chap.
More informationLECTURE NOTES ELEMENTARY NUMERICAL METHODS. Eusebius Doedel
LECTURE NOTES on ELEMENTARY NUMERICAL METHODS Eusebius Doedel TABLE OF CONTENTS Vector and Matrix Norms 1 Banach Lemma 20 The Numerical Solution of Linear Systems 25 Gauss Elimination 25 Operation Count
More informationFormalization of Mathematics: why Algebraic Topology?
Formalization of Mathematics: why Algebraic Topology? Julio Rubio Universidad de La Rioja Departamento de Matemáticas y Computación MAP Spring School 2012 Sophia Antipolis, March 12th-16th, 2012 Partially
More informationBOUNDS OF MODULUS OF EIGENVALUES BASED ON STEIN EQUATION
K Y BERNETIKA VOLUM E 46 ( 2010), NUMBER 4, P AGES 655 664 BOUNDS OF MODULUS OF EIGENVALUES BASED ON STEIN EQUATION Guang-Da Hu and Qiao Zhu This paper is concerned with bounds of eigenvalues of a complex
More informationMA257: INTRODUCTION TO NUMBER THEORY LECTURE NOTES
MA257: INTRODUCTION TO NUMBER THEORY LECTURE NOTES 2018 57 5. p-adic Numbers 5.1. Motivating examples. We all know that 2 is irrational, so that 2 is not a square in the rational field Q, but that we can
More informationFormalizing Elementary Divisor Rings in Coq
Formalizing Elementary Divisor Rings in Coq Cyril Cohen Anders Mörtberg University of Gothenburg May 27, 2014 Introduction Goal: Generalize the theory of linear algebra over fields (vector spaces) to rings
More information07 Practical Application of The Axiomatic Method
CAS 701 Fall 2002 07 Practical Application of The Axiomatic Method Instructor: W. M. Farmer Revised: 28 November 2002 1 What is the Axiomatic Method? 1. A mathematical model is expressed as a set of axioms
More informationFirst, we review some important facts on the location of eigenvalues of matrices.
BLOCK NORMAL MATRICES AND GERSHGORIN-TYPE DISCS JAKUB KIERZKOWSKI AND ALICJA SMOKTUNOWICZ Abstract The block analogues of the theorems on inclusion regions for the eigenvalues of normal matrices are given
More informationOn convergent power series
Peter Roquette 17. Juli 1996 On convergent power series We consider the following situation: K a field equipped with a non-archimedean absolute value which is assumed to be complete K[[T ]] the ring of
More informationON QUADRAPELL NUMBERS AND QUADRAPELL POLYNOMIALS
Hacettepe Journal of Mathematics and Statistics Volume 8() (009), 65 75 ON QUADRAPELL NUMBERS AND QUADRAPELL POLYNOMIALS Dursun Tascı Received 09:0 :009 : Accepted 04 :05 :009 Abstract In this paper we
More informationMA677 Assignment #3 Morgan Schreffler Due 09/19/12 Exercise 1 Using Hölder s inequality, prove Minkowski s inequality for f, g L p (R d ), p 1:
Exercise 1 Using Hölder s inequality, prove Minkowski s inequality for f, g L p (R d ), p 1: f + g p f p + g p. Proof. If f, g L p (R d ), then since f(x) + g(x) max {f(x), g(x)}, we have f(x) + g(x) p
More informationMath Introduction to Numerical Analysis - Class Notes. Fernando Guevara Vasquez. Version Date: January 17, 2012.
Math 5620 - Introduction to Numerical Analysis - Class Notes Fernando Guevara Vasquez Version 1990. Date: January 17, 2012. 3 Contents 1. Disclaimer 4 Chapter 1. Iterative methods for solving linear systems
More informationComputational Linear Algebra
Computational Linear Algebra PD Dr. rer. nat. habil. Ralf Peter Mundani Computation in Engineering / BGU Scientific Computing in Computer Science / INF Winter Term 2017/18 Part 3: Iterative Methods PD
More informationP -adic root separation for quadratic and cubic polynomials
P -adic root separation for quadratic and cubic polynomials Tomislav Pejković Abstract We study p-adic root separation for quadratic and cubic polynomials with integer coefficients. The quadratic and reducible
More informationNormalization by Evaluation
Normalization by Evaluation Andreas Abel Department of Computer Science and Engineering Chalmers and Gothenburg University PhD Seminar in Mathematical Engineering EAFIT University, Medellin, Colombia 9
More information(x, y) = d(x, y) = x y.
1 Euclidean geometry 1.1 Euclidean space Our story begins with a geometry which will be familiar to all readers, namely the geometry of Euclidean space. In this first chapter we study the Euclidean distance
More informationDense LU factorization and its error analysis
Dense LU factorization and its error analysis Laura Grigori INRIA and LJLL, UPMC February 2016 Plan Basis of floating point arithmetic and stability analysis Notation, results, proofs taken from [N.J.Higham,
More informationSet Theory and the Foundation of Mathematics. June 19, 2018
1 Set Theory and the Foundation of Mathematics June 19, 2018 Basics Numbers 2 We have: Relations (subsets on their domain) Ordered pairs: The ordered pair x, y is the set {{x, y}, {x}}. Cartesian products
More informationHomological Processing of Biomedical digital images: automation and certification 1
Homological Processing of Biomedical digital images: automation and certification 1 Jónathan Heras, Gadea Mata, María Poza and Julio Rubio Department of Mathematics and Computer Science University of La
More informationProofs of transcendance
Proofs of transcendance Sophie Bernard, Laurence Rideau, Pierre-Yves Strub Yves Bertot November 2015 1 / 19 Objectives Study the gap between practical mathematics and computer-verified reasoning Explore
More informationThe Miracles of Tropical Spectral Theory
The Miracles of Tropical Spectral Theory Emmanuel Tsukerman University of California, Berkeley e.tsukerman@berkeley.edu July 31, 2015 1 / 110 Motivation One of the most important results in max-algebra
More informationFinite-Horizon Statistics for Markov chains
Analyzing FSDT Markov chains Friday, September 30, 2011 2:03 PM Simulating FSDT Markov chains, as we have said is very straightforward, either by using probability transition matrix or stochastic update
More informationNunchaku: Flexible Model Finding for Higher-Order Logic
Nunchaku: Flexible Model Finding for Higher-Order Logic Simon Cruanes, Jasmin Blanchette, Andrew Reynolds Veridis, Inria Nancy https://cedeela.fr/~simon/ April 7th, 2016 1 / 21 Summary Introduction Nunchaku
More informationMathematical preliminaries and error analysis
Mathematical preliminaries and error analysis Tsung-Ming Huang Department of Mathematics National Taiwan Normal University, Taiwan September 12, 2015 Outline 1 Round-off errors and computer arithmetic
More informationLoos Symmetric Cones. Jimmie Lawson Louisiana State University. July, 2018
Louisiana State University July, 2018 Dedication I would like to dedicate this talk to Joachim Hilgert, whose 60th birthday we celebrate at this conference and with whom I researched and wrote a big blue
More informationLecture 7. Floating point arithmetic and stability
Lecture 7 Floating point arithmetic and stability 2.5 Machine representation of numbers Scientific notation: 23 }{{} }{{} } 3.14159265 {{} }{{} 10 sign mantissa base exponent (significand) s m β e A floating
More information8 Numerical methods for unconstrained problems
8 Numerical methods for unconstrained problems Optimization is one of the important fields in numerical computation, beside solving differential equations and linear systems. We can see that these fields
More informationTowards Mac Lane s Comparison Theorem for the (co)kleisli Construction in Coq
Towards Mac Lane s Comparison Theorem for the (co)kleisli Construction in Coq Burak Ekici University of Innsbruck Innsbruck, Austria burak.ekici@uibk.ac.at Abstract This short paper summarizes an ongoing
More informationInteractive Theorem Provers
Interactive Theorem Provers from the perspective of Isabelle/Isar Makarius Wenzel Univ. Paris-Sud, LRI July 2014 = Isabelle λ β Isar α 1 Introduction Notable ITP systems LISP based: ACL2 http://www.cs.utexas.edu/users/moore/acl2
More informationMarkov Chains, Random Walks on Graphs, and the Laplacian
Markov Chains, Random Walks on Graphs, and the Laplacian CMPSCI 791BB: Advanced ML Sridhar Mahadevan Random Walks! There is significant interest in the problem of random walks! Markov chain analysis! Computer
More informationA Machine Checked Model of Idempotent MGU Axioms For a List of Equational Constraints
A Machine Checked Model of Idempotent MGU Axioms For a List of Equational Constraints Sunil Kothari, James Caldwell Department of Computer Science, University of Wyoming, USA Machine checked proofs of
More informationExistence and Consistency in Bounded Arithmetic
Existence and Consistency in Bounded Arithmetic Yoriyuki Yamagata National Institute of Advanced Science and Technology (AIST) Kusatsu, August 30, 2011 Outline Self introduction Summary Theories of PV
More informationAutomating the Verification of Floating-point Algorithms
Introduction Interval+Error Advanced Gappa Conclusion Automating the Verification of Floating-point Algorithms Guillaume Melquiond Inria Saclay Île-de-France LRI, Université Paris Sud, CNRS 2014-07-18
More informationarxiv: v1 [math.fa] 19 Jul 2009
Spectral radius of Hadamard product versus conventional product for non-negative matrices arxiv:0907.3312v1 [math.fa] 19 Jul 2009 Abstract Koenraad M.R. Audenaert Dept. of Mathematics, Royal Holloway,
More informationAsymptotic Reasoning in Coq
Asymptotic Reasoning in Coq Reynald Affeldt 1 Cyril Cohen 2 Damien Rouhling 2 1 National Institute of Advanced Industrial Science and Technology, Japan 2 Université Côte d Azur, Inria, France September
More informationOn Fixed Point Equations over Commutative Semirings
On Fixed Point Equations over Commutative Semirings Javier Esparza, Stefan Kiefer, and Michael Luttenberger Universität Stuttgart Institute for Formal Methods in Computer Science Stuttgart, Germany {esparza,kiefersn,luttenml}@informatik.uni-stuttgart.de
More informationNonnegative and spectral matrix theory Lecture notes
Nonnegative and spectral matrix theory Lecture notes Dario Fasino, University of Udine (Italy) Lecture notes for the first part of the course Nonnegative and spectral matrix theory with applications to
More informationHands-on Matrix Algebra Using R
Preface vii 1. R Preliminaries 1 1.1 Matrix Defined, Deeper Understanding Using Software.. 1 1.2 Introduction, Why R?.................... 2 1.3 Obtaining R.......................... 4 1.4 Reference Manuals
More informationLecture 9: Krylov Subspace Methods. 2 Derivation of the Conjugate Gradient Algorithm
CS 622 Data-Sparse Matrix Computations September 19, 217 Lecture 9: Krylov Subspace Methods Lecturer: Anil Damle Scribes: David Eriksson, Marc Aurele Gilles, Ariah Klages-Mundt, Sophia Novitzky 1 Introduction
More informationMIDTERM REVIEW FOR MATH The limit
MIDTERM REVIEW FOR MATH 500 SHUANGLIN SHAO. The limit Define lim n a n = A: For any ε > 0, there exists N N such that for any n N, a n A < ε. The key in this definition is to realize that the choice of
More informationComputing closest stable non-negative matrices
Computing closest stable non-negative matrices Yu. Nesterov and V.Yu. Protasov August 22, 2017 Abstract Problem of finding the closest stable matrix for a dynamical system has many applications. It is
More informationAlgorithms for constrained local optimization
Algorithms for constrained local optimization Fabio Schoen 2008 http://gol.dsi.unifi.it/users/schoen Algorithms for constrained local optimization p. Feasible direction methods Algorithms for constrained
More information6-1 The Positivstellensatz P. Parrilo and S. Lall, ECC
6-1 The Positivstellensatz P. Parrilo and S. Lall, ECC 2003 2003.09.02.10 6. The Positivstellensatz Basic semialgebraic sets Semialgebraic sets Tarski-Seidenberg and quantifier elimination Feasibility
More informationConstruction of Real Algebraic Numbers in Coq
Construction of Real Algebraic Numbers in Coq INRIA Saclay Île-de-France LIX École Polytechnique INRIA Microsoft Research Joint Centre cohen@crans.org August 13, 2012 Why algebraic numbers? Field strictly
More information3 (Due ). Let A X consist of points (x, y) such that either x or y is a rational number. Is A measurable? What is its Lebesgue measure?
MA 645-4A (Real Analysis), Dr. Chernov Homework assignment 1 (Due ). Show that the open disk x 2 + y 2 < 1 is a countable union of planar elementary sets. Show that the closed disk x 2 + y 2 1 is a countable
More informationAnalysis and synthesis: a complexity perspective
Analysis and synthesis: a complexity perspective Pablo A. Parrilo ETH ZürichZ control.ee.ethz.ch/~parrilo Outline System analysis/design Formal and informal methods SOS/SDP techniques and applications
More information4. Algebra and Duality
4-1 Algebra and Duality P. Parrilo and S. Lall, CDC 2003 2003.12.07.01 4. Algebra and Duality Example: non-convex polynomial optimization Weak duality and duality gap The dual is not intrinsic The cone
More informationType Systems as a Foundation for Reliable Computing
Type Systems as a Foundation for Reliable Computing Robert Harper Carnegie Mellon University Summer School on Reliable Computing University of Oregon July, 2005 References These lectures are based on the
More informationCS3110 Fall 2013 Lecture 11: The Computable Real Numbers, R (10/3)
CS3110 Fall 2013 Lecture 11: The Computable Real Numbers, R (10/3) Robert Constable 1 Lecture Plan More about the rationals dependent types enumerating Q (Q is countable) Function inverses bijections one-one
More informationAM 205: lecture 6. Last time: finished the data fitting topic Today s lecture: numerical linear algebra, LU factorization
AM 205: lecture 6 Last time: finished the data fitting topic Today s lecture: numerical linear algebra, LU factorization Unit II: Numerical Linear Algebra Motivation Almost everything in Scientific Computing
More informationFunctional Analysis Review
Outline 9.520: Statistical Learning Theory and Applications February 8, 2010 Outline 1 2 3 4 Vector Space Outline A vector space is a set V with binary operations +: V V V and : R V V such that for all
More informationc 2007 Society for Industrial and Applied Mathematics
SIAM J. OPTIM. Vol. 18, No. 1, pp. 106 13 c 007 Society for Industrial and Applied Mathematics APPROXIMATE GAUSS NEWTON METHODS FOR NONLINEAR LEAST SQUARES PROBLEMS S. GRATTON, A. S. LAWLESS, AND N. K.
More informationNonmonotone Inductive Definitions
Nonmonotone Inductive Definitions Shane Steinert-Threlkeld March 15, 2012 Brief Review of Inductive Definitions Inductive Definitions as Sets of Clauses Definition A set B of clauses (of the form A b)
More informationComputer Proof Assistants and Univalent Foundations of Mathematics
Nov. 16, 2014, CMA2014, Kuwait. Computer Proof Assistants and Univalent Foundations of Mathematics by Vladimir Voevodsky from the Institute for Advanced Study in Princeton, NJ. Kepler s Conjecture. In
More informationEntropy Games and Matrix Multiplication Games. EQINOCS seminar
Entropy Games and Matrix Multiplication Games Eugene Asarin Julien Cervelle Aldric Degorre Cătălin Dima Florian Horn Victor Kozyakin IRIF, LACL, IITP EQINOCS seminar 2016-05-11 A game of freedom The story
More informationProof mining and positive-bounded logic
Institute of Mathematics of the Romanian Academy & University of Bucharest September 12, 2016 Colloquium Logicum Hamburg, Germany Proof mining Proof mining (introduced and developed by U. Kohlenbach) aims
More informationA Note on Bootstrapping Intuitionistic Bounded Arithmetic
A Note on Bootstrapping Intuitionistic Bounded Arithmetic SAMUEL R. BUSS Department of Mathematics University of California, San Diego Abstract This paper, firstly, discusses the relationship between Buss
More informationBounds on the radius of nonsingularity
Towards bounds on the radius of nonsingularity, Milan Hladík Department of Applied Mathematics, Charles University, Prague and Institute of Computer Science of the Academy of Czech Republic SCAN 2014,
More informationZEROES OF INTEGER LINEAR RECURRENCES. 1. Introduction. 4 ( )( 2 1) n
ZEROES OF INTEGER LINEAR RECURRENCES DANIEL LITT Consider the integer linear recurrence 1. Introduction x n = x n 1 + 2x n 2 + 3x n 3 with x 0 = x 1 = x 2 = 1. For which n is x n = 0? Answer: x n is never
More information6.1 Moment Generating and Characteristic Functions
Chapter 6 Limit Theorems The power statistics can mostly be seen when there is a large collection of data points and we are interested in understanding the macro state of the system, e.g., the average,
More informationNecessary and sufficient conditions for strong R-positivity
Necessary and sufficient conditions for strong R-positivity Wednesday, November 29th, 2017 The Perron-Frobenius theorem Let A = (A(x, y)) x,y S be a nonnegative matrix indexed by a countable set S. We
More informationToward a new formalization of real numbers
Toward a new formalization of real numbers Catherine Lelay Institute for Advanced Sciences September 24, 2015 1 / 9 Toward a new formalization of real numbers in Coq using Univalent Foundations Catherine
More informationCanonical Big Operators
Canonical Big Operators Yves Bertot, Georges Gonthier, Sidi Ould Biha, Ioana Pasca To cite this version: Yves Bertot, Georges Gonthier, Sidi Ould Biha, Ioana Pasca. Canonical Big Operators. Theorem Proving
More information