Formal verification for numerical methods

Size: px
Start display at page:

Download "Formal verification for numerical methods"

Transcription

1 Formal verification for numerical methods Ioana Paşca PhD thesis at INRIA Sophia Antipolis, Marelle Team Advisor: Yves Bertot 1 7 1

2 Robots 2 7

3 Robots efficiency 2 7

4 Robots efficiency safety 2 7

5 Inside the robot lots of wires 3 7

6 Inside the robot lots of wires code computations numerical methods 3 7

7 Ensure correctness of the code tests 7

8 Ensure correctness of the code tests proofs proof assistants formal verification 7

9 Proof assistants define data define functions prove properties trust proofs 5 7

10 Proof assistants COQ and SSREFLECT define data define functions prove properties trust proofs 5 7

11 Example tasks and methods compute a valid position for the robot by solving a system of equations use Newton s method and its properties use interval analysis based methods 6 7 6

12 Newton s method Definition: x n+1 = x n f (xn) f (x n) Properties: convergence to the root of function f speed of convergence local unicity of the root local stability 7 7

13 Kantorovitch s theorem in one dimension Consider an equation f (x) = 0, where f :]a, b[ R, a, b R, f C (1) (]a, b[). Let x 0 ]a, b[ such that U ε (x 0 ) = {x : x x 0 ε} ]a, b[. If: 1. f (x 0 ) 0 and 1 f (x 0 ) A 0; 2. f (x 0 ) f (x 0 ) B 0 ε 2 ; 3. x, y ]a, b[, f (x) f (y) C x y. µ 0 = 2A 0 B 0 C 1. then, the Newton process x n+1 = x n f (xn) f (x n), n = 0, 1, 2,... converges and lim x n = x is a solution of the initial equation, so that n x x 0 2B 0 ε

14 Idea of the proof for every element of the Newton s sequence show that hypotheses 1 - are verified, with different constants; infer that Newton s sequence is a Cauchy sequence and, by the completeness of R, a convergent sequence; prove that the limit of the sequence is a root of the given function

15 Working with real numbers use the COQ standard library on real numbers axiomatic definition: archimedean, total order field, satisfying the least upper bound principle classical real analysis proofs close to pen and paper mathematics other approaches constructive definition intuitionistic logic non-standard analysis

16 Formal proof in one dimension axiomatic reals inequalities absolute value sequences topology derivation Kantorovitch 11 7

17 Some COQ code: Theorem k a n t o _ e x i s t : xs : R, Un_cv Xn xs c_ disc X0 (2 B0 ) xs f xs =

18 Kantorovitch s theorem in several dimensions Let f (x) = 0 be a system with p equations and p variables, with f C (2) (ω) and U ε (x 0 ) = { x x 0 ε} ω. If: 1. the Jacobian matrix W (x) = [ f i x j ] for x = x 0 has an inverse Γ 0 = W 1 with Γ 0 A 0 ; 2. Γ 0 f (x 0 ) B 0 ε 2 ; 3. p k=1 2 f i (x) x j x k C for i, j = 1, 2,..., p and x U ε (x 0 );. 2pA 0 B 0 C 1. Then, Newton s process: x n+1 = x n W 1 (x n )f (x n ) converges to x = lim x n. n 1 7 1

19 Kantorovitch s theorem in several dimensions Let f (x) = 0 be a system with p equations and p variables, with f C (2) (ω) and U ε (x 0 ) = { x x 0 ε} ω. If: 1. the Jacobian matrix W (x) = [ f i x j ] for x = x 0 has an inverse Γ 0 = W 1 with Γ 0 A 0 ; 2. Γ 0 f (x 0 ) B 0 ε 2 ; 3. p k=1 2 f i (x) x j x k C for i, j = 1, 2,..., p and x U ε (x 0 );. 2pA 0 B 0 C 1. Then, Newton s process: x n+1 = x n W 1 (x n )f (x n ) converges to x = lim x n. n 1 7

20 Kantorovitch s theorem in several dimensions Let f (x) = 0 be a system with p equations and p variables, with f C (2) (ω) and U ε (x 0 ) = { x x 0 ε} ω. If: 1. the Jacobian matrix W (x) = [ f i x j ] for x = x 0 has an inverse Γ 0 = W 1 with Γ 0 A 0 ; 2. Γ 0 f (x 0 ) B 0 ε 2 ; 3. p k=1 2 f i (x) x j x k C for i, j = 1, 2,..., p and x U ε (x 0 );. 2pA 0 B 0 C 1. Then, Newton s process: x n+1 = x n W 1 (x n )f (x n ) converges to x = lim x n. n real vectors real matrices sequences of vectors functions of several variables partial derivatives 1 7

21 Kantorovitch s theorem in several dimensions Let f (x) = 0 be a system with p equations and p variables, with f C (2) (ω) and U ε (x 0 ) = { x x 0 ε} ω. If: 1. the Jacobian matrix W (x) = [ f i x j ] for x = x 0 has an inverse Γ 0 = W 1 with Γ 0 A 0 ; 2. Γ 0 f (x 0 ) B 0 ε 2 ; 3. p k=1 2 f i (x) x j x k C for i, j = 1, 2,..., p and x U ε (x 0 );. 2pA 0 B 0 C 1. Then, Newton s process: x n+1 = x n W 1 (x n )f (x n ) converges to x = lim x n. n real vectors real matrices sequences of vectors functions of several variables partial derivatives 1 7 1

22 Setting up the formalization We need to talk about real numbers matrices We use COQ standard library Reals SSREFLECT library matrix Mix SSREFLECT and standard COQ!

23 Mix SSREFLECT and COQ in SSREFLECT hierarchy of algebraic structures abstract matrices, but operations when elements are from a ring in COQ s Reals library real numbers defined by axioms ring structure

24 Dealing with real matrices use existing results for SSREFLECT library define new concepts: e.g. the norm of a real matrix, matrix sequences and series prove properties A < 1 S, A n = S n=1 A < 1 det(i p A) 0 instantiate to a given norm: e.g. the maximum norm D e f i n i t i o n norm_m (A : M_(m, n ) ) : R := \ big [Rmax R0 ] _ i \ sum_j ( Rabs (A i j ) )

25 Formal proof in several dimensions axiomatic reals finite types, indexed operations matrix vectors: operations, norm matrix norm sequences functions derivation Taylor s formula Kantorovitch

26 Some COQ code: Theorem kantororp_ exist : xs : vec R p, conv Xn xs norm ( d i f _ v xs X0 ) 2 b0 f xs = vect

27 22 7 2

28 What about computations?

29 What about computations? in COQ axiomatic real numbers are appropriate for proofs, but not for computations use libraries for exact real arithmetic

30 Exact real arithmetic with co-inductive streams Representation compute a real number in [ 1, 1] with arbitrary precision real numbers represented as streams of signed digits in base β e.g. 1 3 = = 3::3:: = :: 7:::: d i s β = d 1 ::d 2 ::d 3 ::... β = β i ; β < d i < β notice d 1 ::s β = d 1+s β β i=1 25 7

31 Exact real arithmetic with co-inductive streams Representation compute a real number in [ 1, 1] with arbitrary precision real numbers represented as streams of signed digits in base β e.g. 1 3 = = 3::3:: = :: 7:::: d i s β = d 1 ::d 2 ::d 3 ::... β = β i ; β < d i < β notice d 1 ::s β = d 1+s β β redundant representation useful for designing algorithms i=1 e.g. 0::3:: ::6:: =? 0::3::3:: ::6::5:: = 1:: 1:: ::3::3:: ::6::7:: = 1::0::

32 Exact real arithmetic with co-inductive streams Implementation s β = d 1 ::d 2 ::d 3 ::... β = d 1 ::s β ; β < d i < β in COQ: co-inductive definitions and co-recursive functions CoInductive Stream (A : Type ) : Type : = Cons : A Stream A Stream A. Notation " x : : s " := Cons x s. CoFixpoint Sopp ( s : Stream d i g i t ) : Stream d i g i t := match s with d 1 : : s ( d 1 ) : : Sopp s end

33 Exact real arithmetic with co-inductive streams Certification d 1 ::s β = d 1 + s β β link the exact reals with axiomatic reals Variable β : N. CoInductive represents : Stream d i g i t R Prop : = rep : s r k, β < k < β 1 r 1 represents s r represents (k :: s) k+r β. Notation " s r " : = represents s r. certify implementations via this relation Theorem Sopp_correct : s r, s r ( Sopp s ) ( r )

34 Implementation of Newton s method x n+1 = x n f (xn) f (x n) Newton on streams Sx 0 := s 0 Sx n+1 := Sx n g(sx n ) Newton on axiomatic reals Rx 0 := r 0 Rx n+1 := Rx n f (Rxn) f (Rx n) Theorem Snewt_correct : (... ) s 0 r 0 g ( x ) f (x)f (x) ( Sxn g s 0 n ) ( Rxn f f r 0 n ). we can express properties on elements of Newton s sequence

35 Implementation of Newton s method x n+1 = x n f (xn) f (x n) Newton on streams Sx 0 := s 0 Sx n+1 := Sx n g(sx n ) Newton on axiomatic reals Rx 0 := r 0 Rx n+1 := Rx n f (Rxn) f (Rx n) Theorem Snewt_correct : (... ) s 0 r 0 g ( x ) f (x)f (x) ( Sxn g s 0 n ) ( Rxn f f r 0 n ). we can express properties on elements of Newton s sequence but, we cannot reason about the root of the function we want to compute the root in arbitrary precision

36 Newton for streams Goal define a co-recursive algorithm to compute the root x of the function f produce the first digit use a guarded co-recursive call

37 Newton for streams Goal define a co-recursive algorithm to compute the root x of the function f Idea produce the first digit use a guarded co-recursive call start with f and x 0 speed of convergence n s.t. x n = d 1+x n β x = d 1+x β

38 Newton for streams Goal define a co-recursive algorithm to compute the root x of the function f Idea produce the first digit use a guarded co-recursive call start with f and x 0 speed of convergence n s.t. x n = d 1+x n β f (x ) = 0 f ( d 1+x β ) = 0 define f 1 (x) := f ( d 1+x β ) f 1(x ) = 0 x = d 1+x β repeat process to get the first digit of x ; start with f 1 and x n

39 Newton for streams Goal define a co-recursive algorithm to compute the root x of the function f Idea produce the first digit use a guarded co-recursive call start with f and x 0 speed of convergence n s.t. x n = d 1+x n β f (x ) = 0 f ( d 1+x β ) = 0 define f 1 (x) := f ( d 1+x β ) f 1(x ) = 0 x = d 1+x β repeat process to get the first digit of x ; start with f 1 and x n g = f f g 1 (x) := f 1(x) f 1 (x) = f ( d 1 +x β ) 1 β f ( d 1 +x β ) β ) = β g( d 1+x

40 Newton for streams Idea to produce a first digit of x determine x n = d 1+x n β s.t. x = d 1+x β do a co-recursive call with function g 1 (x) = β g( d 1+x β ) and x n Algorithm CoFixpoint exact_newton g s 0 n := match ( make_digit ( Sxn g s 0 n ) ) with d 1 : : s n d 1 : : exact_newton (fun s (β g(d 1 :: s))) s n n end

41 Newton for streams Idea to produce a first digit of x determine x n = d 1+x n β s.t. x = d 1+x β do a co-recursive call with function g 1 (x) = β g( d 1+x β ) and x n Algorithm CoFixpoint exact_newton g s 0 n := match ( make_digit ( Sxn g s 0 n ) ) with d 1 : : s n d 1 : : exact_newton (fun s (β g(d 1 :: s))) s n n end. Theorem exact_ newton_ correct : (... ) ( exact_newton g s 0 n ) x. ensure the same hypotheses for x n and g 1 as for x 0 and g 3 7 3

42 35 7 3

43 Computation with rounding computations on machines are inexact modify Newton s method the method to include rounding x 0 x n+1 = x n f (x n) f (x n ) ( t 0 = x 0 t n+1 = rnd n+1 t n f (t ) n) f (t n )

44 Certified rounding prove that t n x use local stability: x 0 U x 0, x n (x 0 ) x x n (x 0 ): x 0, x 1, x 2, x 3,... x x n (x 1 ): x n ( x 1 ): x n ( x 2 ): x n ( x 2 ): x 1, x 2, x 3... x x 1, x 2, x 3... x x 2, x 3... x x 2, x 3... x

45 Certified rounding prove that t n x use local stability: x 0 U x 0, x n (x 0 ) x x n (x 0 ): x 0, x 1, x 2, x 3,... x x 0 = t 0 x n (x 1 ): x 1, x 2, x 3... x x n ( x 1 ): x 1, x 2, x 3... x x 1 = t 1 x n ( x 2 ): x 2, x 3... x x n ( x 2 ): x 2, x 3... x x 2 = t

46 Newton with rounding Let f :]a, b[ R and x 0 satisfying the conditions in Kantorovitch s theorem and let rnd : N R R. If 1. n x, x ]a, b[ rnd n (x) ]a, b[ µ 0 < 1 3. [x 0 3B 0, x 0 + 3B 0 ] ]a, b[. n x, x rnd n (x) 1 3 n R 0, where R 0 = 1 µ2 0 8µ 0 B 0 then, for the perturbed Newton s sequence t 0 = x 0 and t n+1 = rnd n+1 (t n f (t n )f (t n )) a. the sequence {t n } n N converges and lim n t n = x where x is the root of the function f given by Kantorovitch s theorem b. n, x t n 1 2 n 1 B

47 39 7 3

48 Formalization of a numerical method 1. formalize the necessary mathematical theories 2. prove the theorems 3. handle computations. handle optimizations 0 7

49 Another formal study Interval arithmetic tool used to handle inaccuracies in computations. π =.27 [ 3.15, 3.1] [1.1, 1.2] = [.73,.27] 1 7

50 Another formal study Interval arithmetic tool used to handle inaccuracies in computations. π =.27 [ 3.15, 3.1] [1.1, 1.2] = [.73,.27] solve systems of linear interval equations { [1, 2]x 1 + [2, ]x 2 = [ 1, 1] [2, ]x 1 + [1, 2]x 2 = [1, 2] 1 7

51 Solving systems of linear interval equations Two steps: 1. checking regularity of the associated interval matrix 2. computing bounds of the solution set exact solution bounds for the solution set 2 7

52 Solving systems of linear interval equations Two steps: 1. checking regularity of the associated interval matrix 2. computing bounds of the solution set exact solution bounds for the solution set 2 7

53 Regular interval matrices A = ( [2, ] [ 1, 1] [ 1, 1] [2, ] ) A is regular iff à A, det à 0 ( Ã11 à à = 12 à 21 à 22 det à 0 ), à 11 [2, ], à 12 [ 1, 1] à 21 [ 1, 1], à 22 [2, ] 3 7

54 Criteria for regularity of interval matrices Criterion A is regular if and only if x R n, 0 A x x = 0. Criterion A is regular if and only if x R n, A c x A x x = 0. Criterion (using positive definiteness) If the matrix (A T c A c T A A I) is positive definite for some consistent matrix norm, then A is regular. Criterion (using the midpoint inverse) If the following inequality holds ρ( I RA c + R A ) < 1 for an arbitrary matrix R, then A is regular. Criterion (using eigenvalues) If the inequality λ max ( T A A) < λ min (A T c A c ) holds, then A is regular. 7

55 Organization of the formal proof axiomatic reals finite types, indexed operations matrix real intervals real matrix: norm, eigenvalues interval matrices criteria of regularity for interval matrices 5 7

56 Work for eigenvalues spectral radius: ρ(a) = max{ λ(a) } Theorem (Perron Frobenius) If A R n n is nonnegative then the spectral radius ρ(a) is an eigenvalue of A, and there is a real, nonnegative vector x 0 with Ax = ρ(a)x. 6 7

57 Conclusion Contributions: formalization of mathematical concepts two formal studies: Newton s method regularity of interval matrices Perspectives: for interval analysis: study computation study for floating point numbers 7 7

Perron Frobenius Theory

Perron Frobenius Theory Perron Frobenius Theory Oskar Perron Georg Frobenius (1880 1975) (1849 1917) Stefan Güttel Perron Frobenius Theory 1 / 10 Positive and Nonnegative Matrices Let A, B R m n. A B if a ij b ij i, j, A > B

More information

Lecture 5. Ch. 5, Norms for vectors and matrices. Norms for vectors and matrices Why?

Lecture 5. Ch. 5, Norms for vectors and matrices. Norms for vectors and matrices Why? KTH ROYAL INSTITUTE OF TECHNOLOGY Norms for vectors and matrices Why? Lecture 5 Ch. 5, Norms for vectors and matrices Emil Björnson/Magnus Jansson/Mats Bengtsson April 27, 2016 Problem: Measure size of

More information

Let x be an approximate solution for Ax = b, e.g., obtained by Gaussian elimination. Let x denote the exact solution. Call. r := b A x.

Let x be an approximate solution for Ax = b, e.g., obtained by Gaussian elimination. Let x denote the exact solution. Call. r := b A x. ESTIMATION OF ERROR Let x be an approximate solution for Ax = b, e.g., obtained by Gaussian elimination. Let x denote the exact solution. Call the residual for x. Then r := b A x r = b A x = Ax A x = A

More information

OPTIMAL SCALING FOR P -NORMS AND COMPONENTWISE DISTANCE TO SINGULARITY

OPTIMAL SCALING FOR P -NORMS AND COMPONENTWISE DISTANCE TO SINGULARITY published in IMA Journal of Numerical Analysis (IMAJNA), Vol. 23, 1-9, 23. OPTIMAL SCALING FOR P -NORMS AND COMPONENTWISE DISTANCE TO SINGULARITY SIEGFRIED M. RUMP Abstract. In this note we give lower

More information

FIXED POINT ITERATIONS

FIXED POINT ITERATIONS FIXED POINT ITERATIONS MARKUS GRASMAIR 1. Fixed Point Iteration for Non-linear Equations Our goal is the solution of an equation (1) F (x) = 0, where F : R n R n is a continuous vector valued mapping in

More information

Numerical Algorithms. IE 496 Lecture 20

Numerical Algorithms. IE 496 Lecture 20 Numerical Algorithms IE 496 Lecture 20 Reading for This Lecture Primary Miller and Boxer, Pages 124-128 Forsythe and Mohler, Sections 1 and 2 Numerical Algorithms Numerical Analysis So far, we have looked

More information

Section 3.9. Matrix Norm

Section 3.9. Matrix Norm 3.9. Matrix Norm 1 Section 3.9. Matrix Norm Note. We define several matrix norms, some similar to vector norms and some reflecting how multiplication by a matrix affects the norm of a vector. We use matrix

More information

Inner products and Norms. Inner product of 2 vectors. Inner product of 2 vectors x and y in R n : x 1 y 1 + x 2 y x n y n in R n

Inner products and Norms. Inner product of 2 vectors. Inner product of 2 vectors x and y in R n : x 1 y 1 + x 2 y x n y n in R n Inner products and Norms Inner product of 2 vectors Inner product of 2 vectors x and y in R n : x 1 y 1 + x 2 y 2 + + x n y n in R n Notation: (x, y) or y T x For complex vectors (x, y) = x 1 ȳ 1 + x 2

More information

Notes on Linear Algebra and Matrix Theory

Notes on Linear Algebra and Matrix Theory Massimo Franceschet featuring Enrico Bozzo Scalar product The scalar product (a.k.a. dot product or inner product) of two real vectors x = (x 1,..., x n ) and y = (y 1,..., y n ) is not a vector but a

More information

Is the Hénon map chaotic

Is the Hénon map chaotic Is the Hénon map chaotic Zbigniew Galias Department of Electrical Engineering AGH University of Science and Technology, Poland, galias@agh.edu.pl International Workshop on Complex Networks and Applications

More information

Alexander Ostrowski

Alexander Ostrowski Ostrowski p. 1/3 Alexander Ostrowski 1893 1986 Walter Gautschi wxg@cs.purdue.edu Purdue University Ostrowski p. 2/3 Collected Mathematical Papers Volume 1 Determinants Linear Algebra Algebraic Equations

More information

Numerical Methods for Differential Equations Mathematical and Computational Tools

Numerical Methods for Differential Equations Mathematical and Computational Tools Numerical Methods for Differential Equations Mathematical and Computational Tools Gustaf Söderlind Numerical Analysis, Lund University Contents V4.16 Part 1. Vector norms, matrix norms and logarithmic

More information

MATH36001 Perron Frobenius Theory 2015

MATH36001 Perron Frobenius Theory 2015 MATH361 Perron Frobenius Theory 215 In addition to saying something useful, the Perron Frobenius theory is elegant. It is a testament to the fact that beautiful mathematics eventually tends to be useful,

More information

Certified Roundoff Error Bounds using Semidefinite Programming

Certified Roundoff Error Bounds using Semidefinite Programming Certified Roundoff Error Bounds using Semidefinite Programming Victor Magron, CNRS VERIMAG joint work with G. Constantinides and A. Donaldson INRIA Mescal Team Seminar 19 November 2015 Victor Magron Certified

More information

Least-Squares Fitting of Model Parameters to Experimental Data

Least-Squares Fitting of Model Parameters to Experimental Data Least-Squares Fitting of Model Parameters to Experimental Data Div. of Mathematical Sciences, Dept of Engineering Sciences and Mathematics, LTU, room E193 Outline of talk What about Science and Scientific

More information

AN ELEMENTARY PROOF OF THE SPECTRAL RADIUS FORMULA FOR MATRICES

AN ELEMENTARY PROOF OF THE SPECTRAL RADIUS FORMULA FOR MATRICES AN ELEMENTARY PROOF OF THE SPECTRAL RADIUS FORMULA FOR MATRICES JOEL A. TROPP Abstract. We present an elementary proof that the spectral radius of a matrix A may be obtained using the formula ρ(a) lim

More information

Cylindrical Algebraic Decomposition in Coq

Cylindrical Algebraic Decomposition in Coq Cylindrical Algebraic Decomposition in Coq MAP 2010 - Logroño 13-16 November 2010 Assia Mahboubi INRIA Microsoft Research Joint Centre (France) INRIA Saclay Île-de-France École Polytechnique, Palaiseau

More information

Constructive Algebra in Type Theory

Constructive Algebra in Type Theory Constructive Algebra in Type Theory Anders Mörtberg mortberg@chalmers.se September 4, 2012 ( 0 2 1 0 ) T ( x1 x 2 ) = ( 2 0 ) ( 0 2 1 0 ) T ( x1 x 2 ) = ( 2 0 ) ( x1 x 2 ) = ( 0 2 ) Matlab 2009b A=[ 0

More information

Componentwise perturbation analysis for matrix inversion or the solution of linear systems leads to the Bauer-Skeel condition number ([2], [13])

Componentwise perturbation analysis for matrix inversion or the solution of linear systems leads to the Bauer-Skeel condition number ([2], [13]) SIAM Review 4():02 2, 999 ILL-CONDITIONED MATRICES ARE COMPONENTWISE NEAR TO SINGULARITY SIEGFRIED M. RUMP Abstract. For a square matrix normed to, the normwise distance to singularity is well known to

More information

Mathematics for Engineers. Numerical mathematics

Mathematics for Engineers. Numerical mathematics Mathematics for Engineers Numerical mathematics Integers Determine the largest representable integer with the intmax command. intmax ans = int32 2147483647 2147483647+1 ans = 2.1475e+09 Remark The set

More information

Invertibility and stability. Irreducibly diagonally dominant. Invertibility and stability, stronger result. Reducible matrices

Invertibility and stability. Irreducibly diagonally dominant. Invertibility and stability, stronger result. Reducible matrices Geršgorin circles Lecture 8: Outline Chapter 6 + Appendix D: Location and perturbation of eigenvalues Some other results on perturbed eigenvalue problems Chapter 8: Nonnegative matrices Geršgorin s Thm:

More information

Lecture: Local Spectral Methods (1 of 4)

Lecture: Local Spectral Methods (1 of 4) Stat260/CS294: Spectral Graph Methods Lecture 18-03/31/2015 Lecture: Local Spectral Methods (1 of 4) Lecturer: Michael Mahoney Scribe: Michael Mahoney Warning: these notes are still very rough. They provide

More information

Computational Logic for Computer Science

Computational Logic for Computer Science Motivation: formalization - proofs & deduction Computational proofs - logic & deduction Formal proofs Pr Computational Logic for Computer Science Mauricio Ayala-Rinco n & Fla vio L.C. de Moura Grupo de

More information

Cylindrical Algebraic Decomposition in Coq

Cylindrical Algebraic Decomposition in Coq Cylindrical Algebraic Decomposition in Coq MAP 2010 - Logroño 13-16 November 2010 Assia Mahboubi INRIA Microsoft Research Joint Centre (France) INRIA Saclay Île-de-France École Polytechnique, Palaiseau

More information

Duke University, Department of Electrical and Computer Engineering Optimization for Scientists and Engineers c Alex Bronstein, 2014

Duke University, Department of Electrical and Computer Engineering Optimization for Scientists and Engineers c Alex Bronstein, 2014 Duke University, Department of Electrical and Computer Engineering Optimization for Scientists and Engineers c Alex Bronstein, 2014 Linear Algebra A Brief Reminder Purpose. The purpose of this document

More information

Vérification formelle pour les méthodes numériques

Vérification formelle pour les méthodes numériques UNIVERSITÉ DE NICE - SOPHIA ANTIPOLIS ÉCOLE DOCTORALE STIC SCIENCES ET TECHNOLOGIES DE L INFORMATION ET DE LA COMMUNICATION T H È S E pour obtenir le titre de Docteur en Sciences de l Université de Nice

More information

Linear Algebra Massoud Malek

Linear Algebra Massoud Malek CSUEB Linear Algebra Massoud Malek Inner Product and Normed Space In all that follows, the n n identity matrix is denoted by I n, the n n zero matrix by Z n, and the zero vector by θ n An inner product

More information

MATH3283W LECTURE NOTES: WEEK 6 = 5 13, = 2 5, 1 13

MATH3283W LECTURE NOTES: WEEK 6 = 5 13, = 2 5, 1 13 MATH383W LECTURE NOTES: WEEK 6 //00 Recursive sequences (cont.) Examples: () a =, a n+ = 3 a n. The first few terms are,,, 5 = 5, 3 5 = 5 3, Since 5

More information

Nonlinear equations. Norms for R n. Convergence orders for iterative methods

Nonlinear equations. Norms for R n. Convergence orders for iterative methods Nonlinear equations Norms for R n Assume that X is a vector space. A norm is a mapping X R with x such that for all x, y X, α R x = = x = αx = α x x + y x + y We define the following norms on the vector

More information

Numerical Analysis: Solving Systems of Linear Equations

Numerical Analysis: Solving Systems of Linear Equations Numerical Analysis: Solving Systems of Linear Equations Mirko Navara http://cmpfelkcvutcz/ navara/ Center for Machine Perception, Department of Cybernetics, FEE, CTU Karlovo náměstí, building G, office

More information

THE PERTURBATION BOUND FOR THE SPECTRAL RADIUS OF A NON-NEGATIVE TENSOR

THE PERTURBATION BOUND FOR THE SPECTRAL RADIUS OF A NON-NEGATIVE TENSOR THE PERTURBATION BOUND FOR THE SPECTRAL RADIUS OF A NON-NEGATIVE TENSOR WEN LI AND MICHAEL K. NG Abstract. In this paper, we study the perturbation bound for the spectral radius of an m th - order n-dimensional

More information

Beyond First-Order Logic

Beyond First-Order Logic Beyond First-Order Logic Software Formal Verification Maria João Frade Departmento de Informática Universidade do Minho 2008/2009 Maria João Frade (DI-UM) Beyond First-Order Logic MFES 2008/09 1 / 37 FOL

More information

Jim Lambers MAT 610 Summer Session Lecture 2 Notes

Jim Lambers MAT 610 Summer Session Lecture 2 Notes Jim Lambers MAT 610 Summer Session 2009-10 Lecture 2 Notes These notes correspond to Sections 2.2-2.4 in the text. Vector Norms Given vectors x and y of length one, which are simply scalars x and y, the

More information

Definitions & Theorems

Definitions & Theorems Definitions & Theorems Math 147, Fall 2009 December 19, 2010 Contents 1 Logic 2 1.1 Sets.................................................. 2 1.2 The Peano axioms..........................................

More information

Seunghee Ye Ma 8: Week 2 Oct 6

Seunghee Ye Ma 8: Week 2 Oct 6 Week 2 Summary This week, we will learn about sequences and real numbers. We first define what we mean by a sequence and discuss several properties of sequences. Then, we will talk about what it means

More information

Outline. Math Numerical Analysis. Errors. Lecture Notes Linear Algebra: Part B. Joseph M. Mahaffy,

Outline. Math Numerical Analysis. Errors. Lecture Notes Linear Algebra: Part B. Joseph M. Mahaffy, Math 54 - Numerical Analysis Lecture Notes Linear Algebra: Part B Outline Joseph M. Mahaffy, jmahaffy@mail.sdsu.edu Department of Mathematics and Statistics Dynamical Systems Group Computational Sciences

More information

Axiomatic Theories of Truth

Axiomatic Theories of Truth Axiomatic Theories of Truth Graham Leigh University of Leeds LC 8, 8th July 28 Graham Leigh (University of Leeds) Axiomatic Theories of Truth LC 8, 8th July 28 1 / 15 Introduction Formalising Truth Formalising

More information

Chapter 8. P-adic numbers. 8.1 Absolute values

Chapter 8. P-adic numbers. 8.1 Absolute values Chapter 8 P-adic numbers Literature: N. Koblitz, p-adic Numbers, p-adic Analysis, and Zeta-Functions, 2nd edition, Graduate Texts in Mathematics 58, Springer Verlag 1984, corrected 2nd printing 1996, Chap.

More information

LECTURE NOTES ELEMENTARY NUMERICAL METHODS. Eusebius Doedel

LECTURE NOTES ELEMENTARY NUMERICAL METHODS. Eusebius Doedel LECTURE NOTES on ELEMENTARY NUMERICAL METHODS Eusebius Doedel TABLE OF CONTENTS Vector and Matrix Norms 1 Banach Lemma 20 The Numerical Solution of Linear Systems 25 Gauss Elimination 25 Operation Count

More information

Formalization of Mathematics: why Algebraic Topology?

Formalization of Mathematics: why Algebraic Topology? Formalization of Mathematics: why Algebraic Topology? Julio Rubio Universidad de La Rioja Departamento de Matemáticas y Computación MAP Spring School 2012 Sophia Antipolis, March 12th-16th, 2012 Partially

More information

BOUNDS OF MODULUS OF EIGENVALUES BASED ON STEIN EQUATION

BOUNDS OF MODULUS OF EIGENVALUES BASED ON STEIN EQUATION K Y BERNETIKA VOLUM E 46 ( 2010), NUMBER 4, P AGES 655 664 BOUNDS OF MODULUS OF EIGENVALUES BASED ON STEIN EQUATION Guang-Da Hu and Qiao Zhu This paper is concerned with bounds of eigenvalues of a complex

More information

MA257: INTRODUCTION TO NUMBER THEORY LECTURE NOTES

MA257: INTRODUCTION TO NUMBER THEORY LECTURE NOTES MA257: INTRODUCTION TO NUMBER THEORY LECTURE NOTES 2018 57 5. p-adic Numbers 5.1. Motivating examples. We all know that 2 is irrational, so that 2 is not a square in the rational field Q, but that we can

More information

Formalizing Elementary Divisor Rings in Coq

Formalizing Elementary Divisor Rings in Coq Formalizing Elementary Divisor Rings in Coq Cyril Cohen Anders Mörtberg University of Gothenburg May 27, 2014 Introduction Goal: Generalize the theory of linear algebra over fields (vector spaces) to rings

More information

07 Practical Application of The Axiomatic Method

07 Practical Application of The Axiomatic Method CAS 701 Fall 2002 07 Practical Application of The Axiomatic Method Instructor: W. M. Farmer Revised: 28 November 2002 1 What is the Axiomatic Method? 1. A mathematical model is expressed as a set of axioms

More information

First, we review some important facts on the location of eigenvalues of matrices.

First, we review some important facts on the location of eigenvalues of matrices. BLOCK NORMAL MATRICES AND GERSHGORIN-TYPE DISCS JAKUB KIERZKOWSKI AND ALICJA SMOKTUNOWICZ Abstract The block analogues of the theorems on inclusion regions for the eigenvalues of normal matrices are given

More information

On convergent power series

On convergent power series Peter Roquette 17. Juli 1996 On convergent power series We consider the following situation: K a field equipped with a non-archimedean absolute value which is assumed to be complete K[[T ]] the ring of

More information

ON QUADRAPELL NUMBERS AND QUADRAPELL POLYNOMIALS

ON QUADRAPELL NUMBERS AND QUADRAPELL POLYNOMIALS Hacettepe Journal of Mathematics and Statistics Volume 8() (009), 65 75 ON QUADRAPELL NUMBERS AND QUADRAPELL POLYNOMIALS Dursun Tascı Received 09:0 :009 : Accepted 04 :05 :009 Abstract In this paper we

More information

MA677 Assignment #3 Morgan Schreffler Due 09/19/12 Exercise 1 Using Hölder s inequality, prove Minkowski s inequality for f, g L p (R d ), p 1:

MA677 Assignment #3 Morgan Schreffler Due 09/19/12 Exercise 1 Using Hölder s inequality, prove Minkowski s inequality for f, g L p (R d ), p 1: Exercise 1 Using Hölder s inequality, prove Minkowski s inequality for f, g L p (R d ), p 1: f + g p f p + g p. Proof. If f, g L p (R d ), then since f(x) + g(x) max {f(x), g(x)}, we have f(x) + g(x) p

More information

Math Introduction to Numerical Analysis - Class Notes. Fernando Guevara Vasquez. Version Date: January 17, 2012.

Math Introduction to Numerical Analysis - Class Notes. Fernando Guevara Vasquez. Version Date: January 17, 2012. Math 5620 - Introduction to Numerical Analysis - Class Notes Fernando Guevara Vasquez Version 1990. Date: January 17, 2012. 3 Contents 1. Disclaimer 4 Chapter 1. Iterative methods for solving linear systems

More information

Computational Linear Algebra

Computational Linear Algebra Computational Linear Algebra PD Dr. rer. nat. habil. Ralf Peter Mundani Computation in Engineering / BGU Scientific Computing in Computer Science / INF Winter Term 2017/18 Part 3: Iterative Methods PD

More information

P -adic root separation for quadratic and cubic polynomials

P -adic root separation for quadratic and cubic polynomials P -adic root separation for quadratic and cubic polynomials Tomislav Pejković Abstract We study p-adic root separation for quadratic and cubic polynomials with integer coefficients. The quadratic and reducible

More information

Normalization by Evaluation

Normalization by Evaluation Normalization by Evaluation Andreas Abel Department of Computer Science and Engineering Chalmers and Gothenburg University PhD Seminar in Mathematical Engineering EAFIT University, Medellin, Colombia 9

More information

(x, y) = d(x, y) = x y.

(x, y) = d(x, y) = x y. 1 Euclidean geometry 1.1 Euclidean space Our story begins with a geometry which will be familiar to all readers, namely the geometry of Euclidean space. In this first chapter we study the Euclidean distance

More information

Dense LU factorization and its error analysis

Dense LU factorization and its error analysis Dense LU factorization and its error analysis Laura Grigori INRIA and LJLL, UPMC February 2016 Plan Basis of floating point arithmetic and stability analysis Notation, results, proofs taken from [N.J.Higham,

More information

Set Theory and the Foundation of Mathematics. June 19, 2018

Set Theory and the Foundation of Mathematics. June 19, 2018 1 Set Theory and the Foundation of Mathematics June 19, 2018 Basics Numbers 2 We have: Relations (subsets on their domain) Ordered pairs: The ordered pair x, y is the set {{x, y}, {x}}. Cartesian products

More information

Homological Processing of Biomedical digital images: automation and certification 1

Homological Processing of Biomedical digital images: automation and certification 1 Homological Processing of Biomedical digital images: automation and certification 1 Jónathan Heras, Gadea Mata, María Poza and Julio Rubio Department of Mathematics and Computer Science University of La

More information

Proofs of transcendance

Proofs of transcendance Proofs of transcendance Sophie Bernard, Laurence Rideau, Pierre-Yves Strub Yves Bertot November 2015 1 / 19 Objectives Study the gap between practical mathematics and computer-verified reasoning Explore

More information

The Miracles of Tropical Spectral Theory

The Miracles of Tropical Spectral Theory The Miracles of Tropical Spectral Theory Emmanuel Tsukerman University of California, Berkeley e.tsukerman@berkeley.edu July 31, 2015 1 / 110 Motivation One of the most important results in max-algebra

More information

Finite-Horizon Statistics for Markov chains

Finite-Horizon Statistics for Markov chains Analyzing FSDT Markov chains Friday, September 30, 2011 2:03 PM Simulating FSDT Markov chains, as we have said is very straightforward, either by using probability transition matrix or stochastic update

More information

Nunchaku: Flexible Model Finding for Higher-Order Logic

Nunchaku: Flexible Model Finding for Higher-Order Logic Nunchaku: Flexible Model Finding for Higher-Order Logic Simon Cruanes, Jasmin Blanchette, Andrew Reynolds Veridis, Inria Nancy https://cedeela.fr/~simon/ April 7th, 2016 1 / 21 Summary Introduction Nunchaku

More information

Mathematical preliminaries and error analysis

Mathematical preliminaries and error analysis Mathematical preliminaries and error analysis Tsung-Ming Huang Department of Mathematics National Taiwan Normal University, Taiwan September 12, 2015 Outline 1 Round-off errors and computer arithmetic

More information

Loos Symmetric Cones. Jimmie Lawson Louisiana State University. July, 2018

Loos Symmetric Cones. Jimmie Lawson Louisiana State University. July, 2018 Louisiana State University July, 2018 Dedication I would like to dedicate this talk to Joachim Hilgert, whose 60th birthday we celebrate at this conference and with whom I researched and wrote a big blue

More information

Lecture 7. Floating point arithmetic and stability

Lecture 7. Floating point arithmetic and stability Lecture 7 Floating point arithmetic and stability 2.5 Machine representation of numbers Scientific notation: 23 }{{} }{{} } 3.14159265 {{} }{{} 10 sign mantissa base exponent (significand) s m β e A floating

More information

8 Numerical methods for unconstrained problems

8 Numerical methods for unconstrained problems 8 Numerical methods for unconstrained problems Optimization is one of the important fields in numerical computation, beside solving differential equations and linear systems. We can see that these fields

More information

Towards Mac Lane s Comparison Theorem for the (co)kleisli Construction in Coq

Towards Mac Lane s Comparison Theorem for the (co)kleisli Construction in Coq Towards Mac Lane s Comparison Theorem for the (co)kleisli Construction in Coq Burak Ekici University of Innsbruck Innsbruck, Austria burak.ekici@uibk.ac.at Abstract This short paper summarizes an ongoing

More information

Interactive Theorem Provers

Interactive Theorem Provers Interactive Theorem Provers from the perspective of Isabelle/Isar Makarius Wenzel Univ. Paris-Sud, LRI July 2014 = Isabelle λ β Isar α 1 Introduction Notable ITP systems LISP based: ACL2 http://www.cs.utexas.edu/users/moore/acl2

More information

Markov Chains, Random Walks on Graphs, and the Laplacian

Markov Chains, Random Walks on Graphs, and the Laplacian Markov Chains, Random Walks on Graphs, and the Laplacian CMPSCI 791BB: Advanced ML Sridhar Mahadevan Random Walks! There is significant interest in the problem of random walks! Markov chain analysis! Computer

More information

A Machine Checked Model of Idempotent MGU Axioms For a List of Equational Constraints

A Machine Checked Model of Idempotent MGU Axioms For a List of Equational Constraints A Machine Checked Model of Idempotent MGU Axioms For a List of Equational Constraints Sunil Kothari, James Caldwell Department of Computer Science, University of Wyoming, USA Machine checked proofs of

More information

Existence and Consistency in Bounded Arithmetic

Existence and Consistency in Bounded Arithmetic Existence and Consistency in Bounded Arithmetic Yoriyuki Yamagata National Institute of Advanced Science and Technology (AIST) Kusatsu, August 30, 2011 Outline Self introduction Summary Theories of PV

More information

Automating the Verification of Floating-point Algorithms

Automating the Verification of Floating-point Algorithms Introduction Interval+Error Advanced Gappa Conclusion Automating the Verification of Floating-point Algorithms Guillaume Melquiond Inria Saclay Île-de-France LRI, Université Paris Sud, CNRS 2014-07-18

More information

arxiv: v1 [math.fa] 19 Jul 2009

arxiv: v1 [math.fa] 19 Jul 2009 Spectral radius of Hadamard product versus conventional product for non-negative matrices arxiv:0907.3312v1 [math.fa] 19 Jul 2009 Abstract Koenraad M.R. Audenaert Dept. of Mathematics, Royal Holloway,

More information

Asymptotic Reasoning in Coq

Asymptotic Reasoning in Coq Asymptotic Reasoning in Coq Reynald Affeldt 1 Cyril Cohen 2 Damien Rouhling 2 1 National Institute of Advanced Industrial Science and Technology, Japan 2 Université Côte d Azur, Inria, France September

More information

On Fixed Point Equations over Commutative Semirings

On Fixed Point Equations over Commutative Semirings On Fixed Point Equations over Commutative Semirings Javier Esparza, Stefan Kiefer, and Michael Luttenberger Universität Stuttgart Institute for Formal Methods in Computer Science Stuttgart, Germany {esparza,kiefersn,luttenml}@informatik.uni-stuttgart.de

More information

Nonnegative and spectral matrix theory Lecture notes

Nonnegative and spectral matrix theory Lecture notes Nonnegative and spectral matrix theory Lecture notes Dario Fasino, University of Udine (Italy) Lecture notes for the first part of the course Nonnegative and spectral matrix theory with applications to

More information

Hands-on Matrix Algebra Using R

Hands-on Matrix Algebra Using R Preface vii 1. R Preliminaries 1 1.1 Matrix Defined, Deeper Understanding Using Software.. 1 1.2 Introduction, Why R?.................... 2 1.3 Obtaining R.......................... 4 1.4 Reference Manuals

More information

Lecture 9: Krylov Subspace Methods. 2 Derivation of the Conjugate Gradient Algorithm

Lecture 9: Krylov Subspace Methods. 2 Derivation of the Conjugate Gradient Algorithm CS 622 Data-Sparse Matrix Computations September 19, 217 Lecture 9: Krylov Subspace Methods Lecturer: Anil Damle Scribes: David Eriksson, Marc Aurele Gilles, Ariah Klages-Mundt, Sophia Novitzky 1 Introduction

More information

MIDTERM REVIEW FOR MATH The limit

MIDTERM REVIEW FOR MATH The limit MIDTERM REVIEW FOR MATH 500 SHUANGLIN SHAO. The limit Define lim n a n = A: For any ε > 0, there exists N N such that for any n N, a n A < ε. The key in this definition is to realize that the choice of

More information

Computing closest stable non-negative matrices

Computing closest stable non-negative matrices Computing closest stable non-negative matrices Yu. Nesterov and V.Yu. Protasov August 22, 2017 Abstract Problem of finding the closest stable matrix for a dynamical system has many applications. It is

More information

Algorithms for constrained local optimization

Algorithms for constrained local optimization Algorithms for constrained local optimization Fabio Schoen 2008 http://gol.dsi.unifi.it/users/schoen Algorithms for constrained local optimization p. Feasible direction methods Algorithms for constrained

More information

6-1 The Positivstellensatz P. Parrilo and S. Lall, ECC

6-1 The Positivstellensatz P. Parrilo and S. Lall, ECC 6-1 The Positivstellensatz P. Parrilo and S. Lall, ECC 2003 2003.09.02.10 6. The Positivstellensatz Basic semialgebraic sets Semialgebraic sets Tarski-Seidenberg and quantifier elimination Feasibility

More information

Construction of Real Algebraic Numbers in Coq

Construction of Real Algebraic Numbers in Coq Construction of Real Algebraic Numbers in Coq INRIA Saclay Île-de-France LIX École Polytechnique INRIA Microsoft Research Joint Centre cohen@crans.org August 13, 2012 Why algebraic numbers? Field strictly

More information

3 (Due ). Let A X consist of points (x, y) such that either x or y is a rational number. Is A measurable? What is its Lebesgue measure?

3 (Due ). Let A X consist of points (x, y) such that either x or y is a rational number. Is A measurable? What is its Lebesgue measure? MA 645-4A (Real Analysis), Dr. Chernov Homework assignment 1 (Due ). Show that the open disk x 2 + y 2 < 1 is a countable union of planar elementary sets. Show that the closed disk x 2 + y 2 1 is a countable

More information

Analysis and synthesis: a complexity perspective

Analysis and synthesis: a complexity perspective Analysis and synthesis: a complexity perspective Pablo A. Parrilo ETH ZürichZ control.ee.ethz.ch/~parrilo Outline System analysis/design Formal and informal methods SOS/SDP techniques and applications

More information

4. Algebra and Duality

4. Algebra and Duality 4-1 Algebra and Duality P. Parrilo and S. Lall, CDC 2003 2003.12.07.01 4. Algebra and Duality Example: non-convex polynomial optimization Weak duality and duality gap The dual is not intrinsic The cone

More information

Type Systems as a Foundation for Reliable Computing

Type Systems as a Foundation for Reliable Computing Type Systems as a Foundation for Reliable Computing Robert Harper Carnegie Mellon University Summer School on Reliable Computing University of Oregon July, 2005 References These lectures are based on the

More information

CS3110 Fall 2013 Lecture 11: The Computable Real Numbers, R (10/3)

CS3110 Fall 2013 Lecture 11: The Computable Real Numbers, R (10/3) CS3110 Fall 2013 Lecture 11: The Computable Real Numbers, R (10/3) Robert Constable 1 Lecture Plan More about the rationals dependent types enumerating Q (Q is countable) Function inverses bijections one-one

More information

AM 205: lecture 6. Last time: finished the data fitting topic Today s lecture: numerical linear algebra, LU factorization

AM 205: lecture 6. Last time: finished the data fitting topic Today s lecture: numerical linear algebra, LU factorization AM 205: lecture 6 Last time: finished the data fitting topic Today s lecture: numerical linear algebra, LU factorization Unit II: Numerical Linear Algebra Motivation Almost everything in Scientific Computing

More information

Functional Analysis Review

Functional Analysis Review Outline 9.520: Statistical Learning Theory and Applications February 8, 2010 Outline 1 2 3 4 Vector Space Outline A vector space is a set V with binary operations +: V V V and : R V V such that for all

More information

c 2007 Society for Industrial and Applied Mathematics

c 2007 Society for Industrial and Applied Mathematics SIAM J. OPTIM. Vol. 18, No. 1, pp. 106 13 c 007 Society for Industrial and Applied Mathematics APPROXIMATE GAUSS NEWTON METHODS FOR NONLINEAR LEAST SQUARES PROBLEMS S. GRATTON, A. S. LAWLESS, AND N. K.

More information

Nonmonotone Inductive Definitions

Nonmonotone Inductive Definitions Nonmonotone Inductive Definitions Shane Steinert-Threlkeld March 15, 2012 Brief Review of Inductive Definitions Inductive Definitions as Sets of Clauses Definition A set B of clauses (of the form A b)

More information

Computer Proof Assistants and Univalent Foundations of Mathematics

Computer Proof Assistants and Univalent Foundations of Mathematics Nov. 16, 2014, CMA2014, Kuwait. Computer Proof Assistants and Univalent Foundations of Mathematics by Vladimir Voevodsky from the Institute for Advanced Study in Princeton, NJ. Kepler s Conjecture. In

More information

Entropy Games and Matrix Multiplication Games. EQINOCS seminar

Entropy Games and Matrix Multiplication Games. EQINOCS seminar Entropy Games and Matrix Multiplication Games Eugene Asarin Julien Cervelle Aldric Degorre Cătălin Dima Florian Horn Victor Kozyakin IRIF, LACL, IITP EQINOCS seminar 2016-05-11 A game of freedom The story

More information

Proof mining and positive-bounded logic

Proof mining and positive-bounded logic Institute of Mathematics of the Romanian Academy & University of Bucharest September 12, 2016 Colloquium Logicum Hamburg, Germany Proof mining Proof mining (introduced and developed by U. Kohlenbach) aims

More information

A Note on Bootstrapping Intuitionistic Bounded Arithmetic

A Note on Bootstrapping Intuitionistic Bounded Arithmetic A Note on Bootstrapping Intuitionistic Bounded Arithmetic SAMUEL R. BUSS Department of Mathematics University of California, San Diego Abstract This paper, firstly, discusses the relationship between Buss

More information

Bounds on the radius of nonsingularity

Bounds on the radius of nonsingularity Towards bounds on the radius of nonsingularity, Milan Hladík Department of Applied Mathematics, Charles University, Prague and Institute of Computer Science of the Academy of Czech Republic SCAN 2014,

More information

ZEROES OF INTEGER LINEAR RECURRENCES. 1. Introduction. 4 ( )( 2 1) n

ZEROES OF INTEGER LINEAR RECURRENCES. 1. Introduction. 4 ( )( 2 1) n ZEROES OF INTEGER LINEAR RECURRENCES DANIEL LITT Consider the integer linear recurrence 1. Introduction x n = x n 1 + 2x n 2 + 3x n 3 with x 0 = x 1 = x 2 = 1. For which n is x n = 0? Answer: x n is never

More information

6.1 Moment Generating and Characteristic Functions

6.1 Moment Generating and Characteristic Functions Chapter 6 Limit Theorems The power statistics can mostly be seen when there is a large collection of data points and we are interested in understanding the macro state of the system, e.g., the average,

More information

Necessary and sufficient conditions for strong R-positivity

Necessary and sufficient conditions for strong R-positivity Necessary and sufficient conditions for strong R-positivity Wednesday, November 29th, 2017 The Perron-Frobenius theorem Let A = (A(x, y)) x,y S be a nonnegative matrix indexed by a countable set S. We

More information

Toward a new formalization of real numbers

Toward a new formalization of real numbers Toward a new formalization of real numbers Catherine Lelay Institute for Advanced Sciences September 24, 2015 1 / 9 Toward a new formalization of real numbers in Coq using Univalent Foundations Catherine

More information

Canonical Big Operators

Canonical Big Operators Canonical Big Operators Yves Bertot, Georges Gonthier, Sidi Ould Biha, Ioana Pasca To cite this version: Yves Bertot, Georges Gonthier, Sidi Ould Biha, Ioana Pasca. Canonical Big Operators. Theorem Proving

More information