Testing Oz Facilities in Distributed Problem Solving. Werner Dilger, Rainer Staudte, Kay Anke. groups, teachers, and rooms. lessons.
|
|
- Ezra Dean
- 6 years ago
- Views:
Transcription
1 Testing Oz Facilities in Distributed Problem Solving Werner Dilger, Rainer Staudte, Kay Anke Abstract The Oz programming language incorporates several features that have become important for developing solutions for complex problems. Among these features are constraint programming, object orientation, and concurrent programming. This paper describes a special solution to a standard problem, the time table problem. The solution proceeds in two phases: the construction of a time table that generally is not optimal, and a subsequent improvement of that time table. The rst phase was realized using constraint programming, the second phase is being realized as a multi-agent system based on the idea of the contract net protocol. The implementation done so far is sketched. Keywords Multi-agent systems, contract net model, constraints, time table problem, Oz 1. Introduction For a few years the AI research group at Chemnitz University has been dealing with multi-agent systems. For this reason, the Oz language became interesting for us and we began to study this language. Our contribution aims to gain a deeper insight into basic Oz facilities. We selected the well-known time table problem as an example. The main purpose of this choice is not to develop a special solution for this problem, but to check several Oz features in a real situation. In section 2 the time table problem is introduced and illustrated with an example. Section 3 gives a formalization of the problem which is the basis of the implementation. The principles of the implementation are described in section 4. It consists of a constraint system and a multi-agent system. The latter simulates the behavior of teachers in those times when time table programs did not yet exist, but includes the student groups as agents too. Section 5 sketches the implementation done so far and section 6 summarizes the results. 2. The Problem The model of a time table introduced in this section differs somewhat from the problem in [1]. For given sets of subjects (that consist of several lessons, student groups, teachers, rooms, and times) assignments are to be found such that a well dened set of constraints holds and several quality criteria of the time table are obeyed as far as possible. Typical constraints are for instance: For each subject there is given a set of student groups, teachers, rooms, and times to chose from. Werner Dilger, Fakultat fur Informatik, TU Chemnitz-Zwickau. dilgerinformatik.tu-chemnitz.de Rainer Staudte, Fakultat fur Informatik, TU Chemnitz-Zwickau. staudteinformatik.tu-chemnitz.de Kay Anke, Fakultat fur Informatik, TU Chemnitz-Zwickau. k.ankeinformatik.tu-chemnitz.de There are times when subjects, student groups, teachers, and rooms are unavailable. Not more than one lesson at any time for student groups, teachers, and rooms. Rooms of sucient size have to be assigned to the lessons. Quality criteria for a time table can be: As few as possible time gaps for teachers and students between lessons. Minimal moves between rooms in remote parts of the building. The length of a working day for teachers and students should not exceed a given limit. The following example will be used in the next section to illustrate the denition of the time table problem. Example 1: A time table for ve days per week (Monday till Friday) and six time slots per day is to be found. The last slot on Wednesday and the last two slots on Friday are closed for planning. There are 12 subjects as follows: Trainer Sparwasser gives two swimming courses in the pool. The group 7901 has three exercises, the groups 7902 and 7903 have to train together four exercises. Dr Bitner gives a computer science lesson for all three groups once a week. Beside this he gives programming courses, twice a week for the group 7901, and three times for each of the other groups. Miss Hurtig gives Spanish courses ve times a week for each group separately. Prof Fuchs has an algebra seminar four times a week for each group separately. The swimming pool is open only on Monday and Wednesday. The last two times of each day are excluded for group Dr Bitner is accessable only on Wednesday and Thursday. The time table in this example should have the following features: All subjects should be planned as demanded. Groups and teachers should not have gaps in their time tables. The times should be distributed over the week as good as possible. The number of room changes for groups should be minimal.
2 3. A Time Table Model In the time table model of [2], a time table is viewed as a state in a search process. Such a time table may be complete or incomplete, i. e. not all possible assignments have been made yet. Denition 1: The quadruple T T P = (C; M; Q; S 0 ) is called a time table problem if the following holds: 1. C = (L; G; T; R; U) collects the sets of subjects L = fl 1 ; l 2 ; ; l n Lg, student groups G = fg 1 ; g 2 ; ; g n Gg, teachers T = ft 1 ; t 2 ; ; t n T g, rooms R = fr 1 ; r 2 ; ; r n Rg, and times U = fu 1 ; u 2 ; ; u n Ug. 2. M denotes a set of mappings fm G ; m T ; m R ; m U g, where m G : L! N G species the number of student groups to be selected and the set of student groups to select from, m T : L! N T species the number of teachers to be selected and the set of teachers to select from, m R : L! N R species the number of rooms to be selected and the set of rooms to select from, m U : L! N U species the number of times to be selected and the set of times to select from for each subject, respectively. 3. The set Q = fq 1 ; q 2 ; ; q n g includes several quality criteria q k of a time table usually formulated as functions q k : fs i ji = 0(1)pg! N from the set of all (complete or incomplete) time tables into the set of natural numbers N. The value 0 for a certain q k expresses the ideal (possibly utopic) value. Especially q 1 denotes the number of student groups, teachers, rooms, and times that are not yet assigned to any subjects. 4. S 0 is an initial time table, where the values q k (S 0 ) do not t certain objective or subjective demands. Example 2: Let's transform example 1 of the previous chapter: T T P = (C; M; Q; S 0 ) C = (L; G; T; R; U) L = fswimming 1 ; swimming 2 ; computer science; programming 1 ; programming 2 ; programming 3 ; spanish 1 ; spanish 2 ; spanish 3 ; algebra 1 ; algebra 2 ; algebra 3 g G = f7901; 7902; 7903g T = fbitner; F uchs; Hurtig; Sparwasserg m G : L! N G R = f216; 301; swimming poolg U = f1; ; 17; 19; ; 28g swimming 1! (2; f7902; 7903g) swimming 2! (1; f7901g) computer science! (3; f7901; 7902; 7903g) programming! (1; f7901g) m T : L! N T algebra! (1; f7903g) swimming 1! (1; fsparwasserg) swimming 2! (1; fsparwasserg) computer science! (1; fbitnerg) programming! (1; fbitnerg) m R : L! N R algebra! (1; ff uchsg) swimming 1! (1; fswimming poolg) swimming 2! (1; fswimming poolg) computer science! (1; f216; 301g) programming! (1; f216; 301g) m U : L! N U algebra! (1; f216; 301g) swimming 1! (4; f1 6; 13 17g) swimming 1! (3; f1 4; 13 16g) computer science! (1; f13 16; 19 22g) programming! (2; f13 16; 19 22g) algebra! (4; f1 17; 19 28g) q 1 : S i! N denotes the number of unassigned objects. q 2 : S i! N denotes the number of gaps in teacher plans. q 3 : S i! N denotes the number of gaps in group plans. As a rule, the numerous quality criteria of a time table cannot be satised simultaneously. Instead one has to nd a compromise between the criteria. There are dierent ways to cope with this problem. For instance modeling the problem by means of soft constraints has gained much attraction in the last few years. Unlike in this approach we model Q from the standpoint of multiple objective decision making. The special criterion q 1 (S ) = 0 must be satised, but for all other q k with k > 1 the complete time table should have values that are in the Pareto set or at least close to it.
3 q 1 q 3 6 S 3 (2) S 2 S 4 (2) (2) / S 5 BB (3) (3) (1) BN S 6 Q Qs S - S XXXXXXXXXz 0 (1) S 1 Fig. 1. Multiple objective decision making in the time table model On the basis of this model, the planning process divides into three parts which are illustrated in gure In the rst, the monotone phase (S 0! S 1! S 2 ) the value of q 1 (S i ) is to be decreased to zero. 2. In the second, the cooperative phase (S 2! S 3! S 4! S 5 ) at least one value q j (S i ) with j > 1 decreases in each step, while all other values q k (S i ) with j 6= k do not increase. 3. The third, the contradictory phase (S 5! S 6! S 7 S ) is a search in the Pareto set, i. e. decreasing one value q j (S i ) causes increasing of at least one other value q k (S i ), j > 1, k > 1, j 6= k, and still q 1 (S i ) = Solution Strategy We want to implement a time table problem solver (T T P S) in Oz, thereby testing dierent facilities of this language. For the rst, i. e. the monotone phase of the planning process, the use of constraints seems to be the adequate means of implementation. For the other two phases, the cooperative and the contradictory one, we prefer a multi-agent system designed according to the principles of Reid Smith's contract net model [3], [4]. The rst part of the T T P S, the constraint system, generates a plan for each object occuring in the time table domain (teachers, student groups, rooms) taking into account the hard constraints of the objects. There may also be soft constraints, but these are not regarded, therefore the plan produced by the constraint system is generally not optimal. When the plan generation has been nished, the second part of the T T P S, the multi-agent system starts to improve the plan. According to the contract net model, an agent can take on two roles in the problem solving process: As a manager it subdivides a task into subtasks and announces them to other agents. If there are agents that are ready to execute q 2 the subtasks (so-called "contractors") it supervises the execution of the subtasks. As a contractor it is responsible for the actual execution of a task, either by doing it itself or by playing the role of a manager with respect to that task. Obviously, an agent can take on both roles simultaneously. In the time table domain there are three kinds of objects: teachers, student groups, and rooms. The rooms are regarded as mere objects, the teachers and student groups are taken as agents. They are able to improve their respective time tables by negotiating with each other. We distinguish between the two groups of agents, the teachers and the student groups, as dierent agent groups. If during the planning process an agent of one group has some contacts with an agent of the other group, the latter is called the complementary agent. If A is an agent, each entry in its time table consists of a pair (K; R), with K a complementary agent of A and R a room. There are four basic operations that an agent can apply to improve its plan: 1. Moving the assignments of a certain time (agent, complementary agent, room) to time gap. 2. Replacing a time gap with the assignments to another time. 3. Exchanging two lessons. 4. Exchanging three or more lessons. For reasons of eciency, the rst three operations should be preferred. The negotiation process starts when one agent, say A, becomes active and proceeds in two phases: (1) Identication of potential partners, (2) Realization of the exchange. For the rst phase there are three possible alternatives. Identication of a partner A determines a time gap t 1 with a high valuation. 2. A determines all complementary agents K 1 ; ; K n and rooms R 1 ; ; R m which have a time gap at t 1. To reduce the amount of communication, only complementary agents are taken into regard that occur in A's plan. 3. For each K i A determines the times at which it occurs in its time table. These times are provided with priorities; times with low priorities are not taken into regard. 4. As soon as a time has been found that is suited for an exchange, A sends a lock command to all objects involved. If all receivers accept the command, A enters the time in a list, called active list. If at least one receiver rejects the command (because the time has already been locked), the time will be unlocked by all receivers and A enters it in the alternative list. Identication of a partner A determines a pair (K; R) that it wants to move to some other time slot.
4 2. A determines all free time slots that can be occupied according to the priority values, say t 1 ; ; t k. 3. A asks K, which of the t 1 ; ; t k are free for it. 4. For those times that are free for K A sends a lock command to K. If K accepts the command, A looks for non occupied rooms and enters the time in a list, called active list. If K rejects the command (because the time has already been locked), the time will be unlocked and A enters it in the alternative list. Identication of a partner A selects a time t 1 with respect to a valuation function q i which it wants to change and determines the entry (K; R) at t 1 in its time table. 2. A determines all times t 2 ; :::; t k that are suited for an exchange with respect to q i and for which the following condition holds: 9K 0 9R 0 : (K; R 0 ) is the entry at t i or (K 0 ; R 0 ) is the entry at t i and K 0 is free at t 1 and K is free at t i where K 6= K 0 and i = 2; ; k 3. As soon as a time has been found that is suited for an exchange, A sends a lock command to all objects involved. If all receivers accept the command, A enters the time in a list, called active list. If at least one receiver rejects the command (because the time has already been locked), the time will be unlocked by all receivers and A enters it in the alternative list. Realization of the exchange 1. If A's active list is not empty, it chooses the entry with the highest valuation, say (K; R), removes it from the list, and negotiates with K about a possible move of the entry. If the active list is empty, it continues with step If the negotiation is successful, A updates its plan and informs the other objects about the result such that they can update their respective plans. It also sends an unlock command to all objects involved in the identication process. The realization procedure stops with success. 3. If the negotiation does not succeed, A sends an unlock command to all objects involved in the identication process and continues with step If the alternative list is not empty, A selects the now unlocked entries in this list, puts them into the active list, and continues with step If the alternative list is empty, the realization procedure stops with failure. When A selects the entry with the highest valuation from its active list, it assumes that the complementary agent K is willing to negotiate, according to the identication procedure. The negotiation can proceed in four dierent forms: Negotiating!!!!!!!! (Reject) (Report) (Report) Request a aaaaaaa Commanding Oering (Reject) Fig. 2. The negotiating protocol Negotiating (Reject) 1. K rejects negotiation because time t 1 has been locked in the meantime. 2. K agrees with an exchange at time t 1 because this is advantageous for it, too. 3. K suggests an additional exchange with A at time t K tries to nd another partner, say B, for an exchange. In this case B is a complementary agent for K, i. e. it belongs to the same agent group as A. In case 3 the negotiation process becomes recursive. For reasons of eciency it should be avoided that too many agents are involved in the process, therefore the depth of the recursion is restricted. Instead of negotiating with too many partners, a sequence of negotiations between restricted numbers of partners will take place. Using the generic congurable cooperation protocols of [5] the negotiation process can be illustrated by gure 2. The change between the agent groups in the recursive negotiation is similar to the negotiation according to the contract net protocol, where each agent can take on the role of a manager or a contractor. However, our approach diers from the contract net protocol insofar as no bids are delivered, rather an agent selects a complementary agent according to its own valuation function. 5. Implementation The mappings m G ; m T ; m R ; m U as the most important input dates for a time table are almost all given explicitly. For the sake of simplicity several sets to select from can be collected in extra variables. For instance, in our example the rooms 216 and 301 are arbitrarily available for all subjects except for swimming, and it is more convenient to group together both rooms into one set. The time constraints of student groups, teachers and
5 rooms are used to calculate the availability of times for subjects. This is managed by means of the FD.get-constraint. Up to now only the time lists of such student groups, teachers, and rooms are included, where no alternatives are possible. The time constraints of the other objects are considered only at the moment of their actual selection. A second way can be an exact formulation of these times by means of FD.OR-connected constraints. The exclusive use of a time for subjects with common student groups, teachers or rooms can be enforced by the FD.allDierent-constraint. The question, whether this will be a good idea for large time tables is open. Obviously this constraint doesn't reduce the problem solving space considerably. For the implementation of the multi-agent approach we cannot yet make a statement about Oz properties, but the object oriented paradigm promises to be a solid basis. 6. Results The work introduced here is still under development. The constraint solver in Oz is well suited to implement the monotone phase of the time table problem in a smart way. It works well for small examples (cf. the example in this article). But up to now it is not clear whether the inexperienced users did use all Oz facilities eciently. A more realistic time table problem is very complex, and we have to gure out whether the Oz constraint facilities and our techniques are sucient to solve problems of the above formulated classes. The multi-agent approach combines the cooperative and the contradictory phases. At the moment the implementation is not yet completed. Therefore we can not give nal results about our experiences with Oz in this area. References [1] Martin Henz and Jorg Wurtz, Using Oz for College Time Tabling, Extended Abstract, DFKI [2] Klaus Philipp und Rainer Staudte, Das n-dimensionale Zuweisungsproblem bei mehrfacher Zielsetzung, Wissenschaftliche Zeitschrift der Technischen Hochschule Karl-Marx-Stadt, 24(1982), pp [3] Reid G. Smith, The Contract Net Protocol: High-Level Communication and Control in a Distributed Problem Solver, in: Alan H. Bond and Less Gasser (Eds.), Readings in Distributed Articial Intelligence Morgan Kaufmann, 1988, pp [4] Randall Davis and Reid G. Smith, Negotiation as a Metaphor for Distributed Problem Solving, Articial Intelligence, 20(1983), pp [5] B. Burmeister, A. Haddadi, K. Sundermeyer, Generic congurable cooperation protocols for multi-agent systems, Technical report, Research and Technology, Daimler-Benz AG, Berlin 1992
Computing the acceptability semantics. London SW7 2BZ, UK, Nicosia P.O. Box 537, Cyprus,
Computing the acceptability semantics Francesca Toni 1 and Antonios C. Kakas 2 1 Department of Computing, Imperial College, 180 Queen's Gate, London SW7 2BZ, UK, ft@doc.ic.ac.uk 2 Department of Computer
More informationBounding the End-to-End Response Times of Tasks in a Distributed. Real-Time System Using the Direct Synchronization Protocol.
Bounding the End-to-End Response imes of asks in a Distributed Real-ime System Using the Direct Synchronization Protocol Jun Sun Jane Liu Abstract In a distributed real-time system, a task may consist
More informationINSTITUT FÜR INFORMATIK
INSTITUT FÜR INFORMATIK DER LUDWIGMAXIMILIANSUNIVERSITÄT MÜNCHEN Bachelorarbeit Propagation of ESCL Cardinality Constraints with Respect to CEP Queries Thanh Son Dang Aufgabensteller: Prof. Dr. Francois
More informationVirtual Robust Implementation and Strategic Revealed Preference
and Strategic Revealed Preference Workshop of Mathematical Economics Celebrating the 60th birthday of Aloisio Araujo IMPA Rio de Janeiro December 2006 Denitions "implementation": requires ALL equilibria
More informationA Preference Semantics. for Ground Nonmonotonic Modal Logics. logics, a family of nonmonotonic modal logics obtained by means of a
A Preference Semantics for Ground Nonmonotonic Modal Logics Daniele Nardi and Riccardo Rosati Dipartimento di Informatica e Sistemistica, Universita di Roma \La Sapienza", Via Salaria 113, I-00198 Roma,
More informationDegradable Agreement in the Presence of. Byzantine Faults. Nitin H. Vaidya. Technical Report #
Degradable Agreement in the Presence of Byzantine Faults Nitin H. Vaidya Technical Report # 92-020 Abstract Consider a system consisting of a sender that wants to send a value to certain receivers. Byzantine
More informationOptimal Rejuvenation for. Tolerating Soft Failures. Andras Pfening, Sachin Garg, Antonio Puliato, Miklos Telek, Kishor S. Trivedi.
Optimal Rejuvenation for Tolerating Soft Failures Andras Pfening, Sachin Garg, Antonio Puliato, Miklos Telek, Kishor S. Trivedi Abstract In the paper we address the problem of determining the optimal time
More informationKirsten Lackner Solberg. Dept. of Math. and Computer Science. Odense University, Denmark
Inference Systems for Binding Time Analysis Kirsten Lackner Solberg Dept. of Math. and Computer Science Odense University, Denmark e-mail: kls@imada.ou.dk June 21, 1993 Contents 1 Introduction 4 2 Review
More informationMaximum Likelihood Estimation
Connexions module: m11446 1 Maximum Likelihood Estimation Clayton Scott Robert Nowak This work is produced by The Connexions Project and licensed under the Creative Commons Attribution License Abstract
More informationFeng Lin. Abstract. Inspired by thewell-known motto of Henry David Thoreau [1], that government
That Supervisor Is Best Which Supervises Least Feng Lin Department of Electrical and Computer Engineering Wayne State University, Detroit, MI 48202 Abstract Inspired by thewell-known motto of Henry David
More informationIntegrating External and Internal Clock Synchronization. Christof Fetzer and Flaviu Cristian. Department of Computer Science & Engineering
Integrating External and Internal Clock Synchronization Christof Fetzer and Flaviu Cristian Department of Computer Science & Engineering University of California, San Diego La Jolla, CA 9093?0114 e-mail:
More informationSpurious Chaotic Solutions of Dierential. Equations. Sigitas Keras. September Department of Applied Mathematics and Theoretical Physics
UNIVERSITY OF CAMBRIDGE Numerical Analysis Reports Spurious Chaotic Solutions of Dierential Equations Sigitas Keras DAMTP 994/NA6 September 994 Department of Applied Mathematics and Theoretical Physics
More informationSEQUENTIAL EQUILIBRIA IN BAYESIAN GAMES WITH COMMUNICATION. Dino Gerardi and Roger B. Myerson. December 2005
SEQUENTIAL EQUILIBRIA IN BAYESIAN GAMES WITH COMMUNICATION By Dino Gerardi and Roger B. Myerson December 2005 COWLES FOUNDATION DISCUSSION AER NO. 1542 COWLES FOUNDATION FOR RESEARCH IN ECONOMICS YALE
More informationTo make a grammar probabilistic, we need to assign a probability to each context-free rewrite
Notes on the Inside-Outside Algorithm To make a grammar probabilistic, we need to assign a probability to each context-free rewrite rule. But how should these probabilities be chosen? It is natural to
More informationand combine the results of the searches. We consider parallel search with subdivision, although most notions can be generalized to using dierent searc
On the representation of parallel search in theorem proving Maria Paola Bonacina Department of Computer Science { The University of Iowa Abstract This extended abstract summarizes two contributions from
More informationCTL Model Checking. Prof. P.H. Schmitt. Formal Systems II. Institut für Theoretische Informatik Fakultät für Informatik Universität Karlsruhe (TH)
CTL Model Checking Prof. P.H. Schmitt Institut für Theoretische Informatik Fakultät für Informatik Universität Karlsruhe (TH) Formal Systems II Prof. P.H. Schmitt CTLMC Summer 2009 1 / 26 Fixed Point Theory
More informationConvergence Complexity of Optimistic Rate Based Flow. Control Algorithms. Computer Science Department, Tel-Aviv University, Israel
Convergence Complexity of Optimistic Rate Based Flow Control Algorithms Yehuda Afek y Yishay Mansour z Zvi Ostfeld x Computer Science Department, Tel-Aviv University, Israel 69978. December 12, 1997 Abstract
More informationA Structural Model of Sponsored Search Advertising Auctions
A Structural Model of Sponsored Search Advertising Auctions S. Athey and D. Nekipelov presented by Marcelo A. Fernández February 26, 2014 Remarks The search engine does not sell specic positions on the
More informationAGREEMENT PROBLEMS (1) Agreement problems arise in many practical applications:
AGREEMENT PROBLEMS (1) AGREEMENT PROBLEMS Agreement problems arise in many practical applications: agreement on whether to commit or abort the results of a distributed atomic action (e.g. database transaction)
More informationDartmouth Computer Science Technical Report TR Constant-RMR Abortable Reader-Priority Reader-Writer. Algorithm
Dartmouth Computer Science Technical Report TR2011-685 Constant-RMR Abortable Reader-Priority Reader-Writer Algorithm Nan Zheng Thesis Advisor: Prasad Jayanti June 2, 2011 Abstract The concurrent reader-writer
More informationAijun An and Nick Cercone. Department of Computer Science, University of Waterloo. methods in a context of learning classication rules.
Discretization of Continuous Attributes for Learning Classication Rules Aijun An and Nick Cercone Department of Computer Science, University of Waterloo Waterloo, Ontario N2L 3G1 Canada Abstract. We present
More informationNovel determination of dierential-equation solutions: universal approximation method
Journal of Computational and Applied Mathematics 146 (2002) 443 457 www.elsevier.com/locate/cam Novel determination of dierential-equation solutions: universal approximation method Thananchai Leephakpreeda
More informationbelow, kernel PCA Eigenvectors, and linear combinations thereof. For the cases where the pre-image does exist, we can provide a means of constructing
Kernel PCA Pattern Reconstruction via Approximate Pre-Images Bernhard Scholkopf, Sebastian Mika, Alex Smola, Gunnar Ratsch, & Klaus-Robert Muller GMD FIRST, Rudower Chaussee 5, 12489 Berlin, Germany fbs,
More informationExtracted from a working draft of Goldreich s FOUNDATIONS OF CRYPTOGRAPHY. See copyright notice.
106 CHAPTER 3. PSEUDORANDOM GENERATORS Using the ideas presented in the proofs of Propositions 3.5.3 and 3.5.9, one can show that if the n 3 -bit to l(n 3 ) + 1-bit function used in Construction 3.5.2
More informationVolume 31, Issue 1. A solution concept for housing market problems with externalities. Alfredo Salgado-Torres Universidad Carlos III de Madrid
Volume 31, Issue 1 A solution concept for housing market problems with externalities Alfredo Salgado-Torres Universidad Carlos III de Madrid Abstract Since the core of a housing market with externalities
More informationPotential Cases, Methodologies, and Strategies of Synthesis of. Solutions in Distributed Expert Systems. Minjie Zhang
Potential Cases, Methodologies, and Strategies of Synthesis of Solutions in Distributed Expert Systems Minjie Zhang School of Computer, and Information Sciences Edith Cowan University, WA 6027, Australia
More informationProbabilistic Dialogue Models for Dynamic Ontology Mapping
Centre for Intelligent Systems and their Applications University of Edinburgh Uncertainty Reasoning for the Semantic Web Workshop 2006 Athens (GA), 5 th November 2006 Introduction Problem description Ontology
More informationFinite-Delay Strategies In Infinite Games
Finite-Delay Strategies In Infinite Games von Wenyun Quan Matrikelnummer: 25389 Diplomarbeit im Studiengang Informatik Betreuer: Prof. Dr. Dr.h.c. Wolfgang Thomas Lehrstuhl für Informatik 7 Logik und Theorie
More informationPost-Algebra II, Pre-Precalculus Summer Packet
Post-Algebra II, Pre-Precalculus Summer Packet (Concepts epected to be understood upon entering Precalculus course) Name Grade Level School Teacher In order to be successful in a Precalculus course at
More informationRate-Monotonic Scheduling with variable. execution time and period. October 31, Abstract
Rate-Monotonic Scheduling with variable execution time and period Oldeld Peter October 31, 1997 Abstract Abstract is something cannot be understood. 1 Rate Monotonic Model Let Ti be a task. Let Pi be the
More informationAn Implementation of the Contract Net Protocol Based on Marginal Cost Calculations
An Implementation of the Contract Net Protocol Based on Marginal Cost Calculations By Tuomas Sandholm 1993 Introduction Formalization of the idding and awarding decision process Formalization ased on marginal
More informationEnvironment (E) IBP IBP IBP 2 N 2 N. server. System (S) Adapter (A) ACV
The Adaptive Cross Validation Method - applied to polling schemes Anders Svensson and Johan M Karlsson Department of Communication Systems Lund Institute of Technology P. O. Box 118, 22100 Lund, Sweden
More informationAbstract. In this paper we present a query answering system for solving non-standard
Answering Non-Standard Queries in Distributed Knowledge-Based Systems Zbigniew W. Ras University of North Carolina Department of Comp. Science Charlotte, N.C. 28223, USA ras@uncc.edu Abstract In this paper
More informationIn Advances in Neural Information Processing Systems 6. J. D. Cowan, G. Tesauro and. Convergence of Indirect Adaptive. Andrew G.
In Advances in Neural Information Processing Systems 6. J. D. Cowan, G. Tesauro and J. Alspector, (Eds.). Morgan Kaufmann Publishers, San Fancisco, CA. 1994. Convergence of Indirect Adaptive Asynchronous
More informationDiscrete Probability and State Estimation
6.01, Spring Semester, 2008 Week 12 Course Notes 1 MASSACHVSETTS INSTITVTE OF TECHNOLOGY Department of Electrical Engineering and Computer Science 6.01 Introduction to EECS I Spring Semester, 2008 Week
More informationComputability and Complexity
Computability and Complexity Push-Down Automata CAS 705 Ryszard Janicki Department of Computing and Software McMaster University Hamilton, Ontario, Canada janicki@mcmaster.ca Ryszard Janicki Computability
More informationA Graph Based Parsing Algorithm for Context-free Languages
A Graph Based Parsing Algorithm for Context-free Languages Giinter Hot> Technical Report A 01/99 June 1999 e-mail: hotzocs.uni-sb.de VVVVVV: http://vwv-hotz.cs.uni-sb. de Abstract We present a simple algorithm
More informationSection 6.2: Measures of Variation
Section 6.2: Measures of Variation Measures of variation (or spread) refers to a set of numerical summaries that describe the degree to which the data are spread out. Why do we need them? Why is using
More informationReal Time Operating Systems
Real Time Operating ystems Luca Abeni luca.abeni@unitn.it Interacting Tasks Until now, only independent tasks... A job never blocks or suspends A task only blocks on job termination In real world, jobs
More informationAn Alternative To The Iteration Operator Of. Propositional Dynamic Logic. Marcos Alexandre Castilho 1. IRIT - Universite Paul Sabatier and
An Alternative To The Iteration Operator Of Propositional Dynamic Logic Marcos Alexandre Castilho 1 IRIT - Universite Paul abatier and UFPR - Universidade Federal do Parana (Brazil) Andreas Herzig IRIT
More informationRevenue Maximization in a Cloud Federation
Revenue Maximization in a Cloud Federation Makhlouf Hadji and Djamal Zeghlache September 14th, 2015 IRT SystemX/ Telecom SudParis Makhlouf Hadji Outline of the presentation 01 Introduction 02 03 04 05
More informationPHENOMENOLOGICAL LAWS AND THEIR APPLICATION TO SCIENTIFIC EPISTEMIC EXPLANATION PROBLEMS. Erik WEBER(*)
Logique & Analyse 129-130 (1990), 175-189 PHENOMENOLOGICAL LAWS AND THEIR APPLICATION TO SCIENTIFIC EPISTEMIC EXPLANATION PROBLEMS Erik WEBER(*) 1. Introduction Scientific knowledge has both a practical
More informationFlexible Top Trading Cycles and Chains Mechanism: Maintaining Diversity in Erasmus Student Exchange
1/52 Flexible Top Trading Cycles and Chains Mechanism: Maintaining Diversity in Erasmus Student Exchange Umut Dur Onur Kesten Utku Ünver Econometric Society World Congress'15 New Market-Old Mechanism 2/52
More informationDierence Quotients, Derivatives, and Data through Modeling with Slime 1 1 Introduction The importance of the connection between the dierence quotient
Dierence Quotients, Derivatives, and Data through Modeling with Slime Richard M. Single, Department of Mathematics, St. Olaf College, Northeld, Minnesota Contact Information: Richard M. Single 1600 East
More informationProjektpartner. Sonderforschungsbereich 386, Paper 163 (1999) Online unter:
Toutenburg, Shalabh: Estimation of Regression Coefficients Subject to Exact Linear Restrictions when some Observations are Missing and Balanced Loss Function is Used Sonderforschungsbereich 386, Paper
More informationA version of for which ZFC can not predict a single bit Robert M. Solovay May 16, Introduction In [2], Chaitin introd
CDMTCS Research Report Series A Version of for which ZFC can not Predict a Single Bit Robert M. Solovay University of California at Berkeley CDMTCS-104 May 1999 Centre for Discrete Mathematics and Theoretical
More informationName: Teacher: Per: Unit 1 Unit 2 Unit 3 Unit 4 Unit 5 Unit 6 Unit 7 Unit 8 Unit 9 Unit 10. Unit 4. [Writing Linear Equations]
Name: Teacher: Per: Unit 1 Unit 2 Unit 3 Unit 4 Unit 5 Unit 6 Unit 7 Unit 8 Unit 9 Unit 10 Unit 4 [Writing Linear Equations] Find the equation of a line that has slope m = 4 and passes through the point
More informationDynamic farsighted networks with endogenous opportunities of link formation
Dynamic farsighted networks with endogenous opportunities of link formation James Lake Southern Methodist University July 2014 Abstract I present a three player dynamic network theoretic model where players
More informationPart 1: You are given the following system of two equations: x + 2y = 16 3x 4y = 2
Solving Systems of Equations Algebraically Teacher Notes Comment: As students solve equations throughout this task, have them continue to explain each step using properties of operations or properties
More informationCC283 Intelligent Problem Solving 28/10/2013
Machine Learning What is the research agenda? How to measure success? How to learn? Machine Learning Overview Unsupervised Learning Supervised Learning Training Testing Unseen data Data Observed x 1 x
More information4-8 Quadratic Inequalities. Graph each inequality. ANSWER: ANSWER: ANSWER: CCSS SENSE-MAKING Solve each inequality by graphing.
1. Graph each inequality. 4. CCSS SENSE-MAKING Solve each inequality by graphing. {x x < 1 or x > 4} 5. {x 5 < x < 3} 2. 6. {x 3 x 2} 7. {x 0.29 x 1.71} 3. 8. SOCCER A midfielder kicks a ball toward the
More informationThe Proof of IP = P SP ACE
The Proof of IP = P SP ACE Larisse D. Voufo March 29th, 2007 For a long time, the question of how a verier can be convinced with high probability that a given theorem is provable without showing the whole
More informationA Global Constraint for Parallelizing the Execution of Task Sets in Non-Preemptive Scheduling
A Global Constraint for Parallelizing the Execution of Task Sets in Non-Preemptive Scheduling 1 Introduction Michael Marte 1 Institut für Informatik, Universität München Oettingenstr. 67, 80538 München,
More informationLesson 8: Why Stay with Whole Numbers?
Student Outcomes Students use function notation, evaluate functions for inputs in their domains, and interpret statements that use function notation in terms of a context. Students create functions that
More informationIt is well-known (cf. [2,4,5,9]) that the generating function P w() summed over all tableaux of shape = where the parts in row i are at most a i and a
Counting tableaux with row and column bounds C. Krattenthalery S. G. Mohantyz Abstract. It is well-known that the generating function for tableaux of a given skew shape with r rows where the parts in the
More informationLinear Regression and Its Applications
Linear Regression and Its Applications Predrag Radivojac October 13, 2014 Given a data set D = {(x i, y i )} n the objective is to learn the relationship between features and the target. We usually start
More information{},{a},{a,c} {},{c} {c,d}
Modular verication of Argos Programs Agathe Merceron 1 and G. Michele Pinna 2 1 Basser Department of Computer Science, University of Sydney Madsen Building F09, NSW 2006, Australia agathe@staff.cs.su.oz.au
More informationCalculus and linear algebra for biomedical engineering Week 3: Matrices, linear systems of equations, and the Gauss algorithm
Calculus and linear algebra for biomedical engineering Week 3: Matrices, linear systems of equations, and the Gauss algorithm Hartmut Führ fuehr@matha.rwth-aachen.de Lehrstuhl A für Mathematik, RWTH Aachen
More informationNew concepts: Span of a vector set, matrix column space (range) Linearly dependent set of vectors Matrix null space
Lesson 6: Linear independence, matrix column space and null space New concepts: Span of a vector set, matrix column space (range) Linearly dependent set of vectors Matrix null space Two linear systems:
More informationBounding in Multi-Stage. Stochastic Programming. Problems. Olga Fiedler a Andras Prekopa b
R utcor Research R eport Bounding in Multi-Stage Stochastic Programming Problems Olga Fiedler a Andras Prekopa b RRR 24-95, June 1995 RUTCOR Rutgers Center for Operations Research Rutgers University P.O.
More informationMassachusetts Institute of Technology
Massachusetts Institute of Technology 6.034 Articial Intelligence Solutions # Final96 6034 Item # 33 Problem 1 Rules Step Ready to fire Selected Rule Assertion Added 1 R1 R3 R7 R1 Fuzzy is a mammal 2 R5
More informationThe Inclusion Exclusion Principle and Its More General Version
The Inclusion Exclusion Principle and Its More General Version Stewart Weiss June 28, 2009 1 Introduction The Inclusion-Exclusion Principle is typically seen in the context of combinatorics or probability
More informationMoving Average Rules to Find. Confusion Matrix. CC283 Intelligent Problem Solving 05/11/2010. Edward Tsang (all rights reserved) 1
Machine Learning Overview Supervised Learning Training esting Te Unseen data Data Observed x 1 x 2... x n 1.6 7.1... 2.7 1.4 6.8... 3.1 2.1 5.4... 2.8... Machine Learning Patterns y = f(x) Target y Buy
More information2 RODNEY G. DOWNEY STEFFEN LEMPP Theorem. For any incomplete r.e. degree w, there is an incomplete r.e. degree a > w such that there is no r.e. degree
THERE IS NO PLUS-CAPPING DEGREE Rodney G. Downey Steffen Lempp Department of Mathematics, Victoria University of Wellington, Wellington, New Zealand downey@math.vuw.ac.nz Department of Mathematics, University
More informationTippecanoe County ARES Net Formats NET 1-4. Net Formats
1. Introduction Net Formats To provide a basis for carrying out the mission of the Tippecanoe County, Indiana, Amateur Radio Emergency Service (ARES ), guidelines must be in place to meet the communications
More informationSubstitution and change of variables Integration by parts
Substitution and change of variables Integration by parts Math 1A October 11, 216 Announcements I have been back since Friday night but will be leaving for another short trip on Thursday. James will preside
More informationApplied Cooperative Game Theory
Applied Cooperative Game Theory André Casajus and Martin Kohl University of Leipzig December 2013 1 / 20 : An example consider a gloves game with two left-glove holders and four right-glove holders N =
More informationEconomics 472. Lecture 10. where we will refer to y t as a m-vector of endogenous variables, x t as a q-vector of exogenous variables,
University of Illinois Fall 998 Department of Economics Roger Koenker Economics 472 Lecture Introduction to Dynamic Simultaneous Equation Models In this lecture we will introduce some simple dynamic simultaneous
More informationCPSC 320 Sample Solution, Reductions and Resident Matching: A Residentectomy
CPSC 320 Sample Solution, Reductions and Resident Matching: A Residentectomy August 25, 2017 A group of residents each needs a residency in some hospital. A group of hospitals each need some number (one
More informationExtremal problems in logic programming and stable model computation Pawe l Cholewinski and Miros law Truszczynski Computer Science Department Universi
Extremal problems in logic programming and stable model computation Pawe l Cholewinski and Miros law Truszczynski Computer Science Department University of Kentucky Lexington, KY 40506-0046 fpaweljmirekg@cs.engr.uky.edu
More informationMechanism Design for Resource Bounded Agents
Mechanism Design for Resource Bounded Agents International Conference on Multi-Agent Systems, ICMAS 2000 Noa E. Kfir-Dahav Dov Monderer Moshe Tennenholtz Faculty of Industrial Engineering and Management
More informationBaltzer Journals July 1,1996. Autonomous Agents. Sarit Kraus Department of Mathematics and Computer Science. Bar Ilan University
Baltzer Journals July 1,1996 Beliefs, Time and Incomplete Information in Multiple Encounter Negotiations Among Autonomous Agents Sarit Kraus 1 2 1 Department of Mathematics and Computer Science Bar Ilan
More informationResponse Time in Data Broadcast Systems: Mean, Variance and Trade-O. Shu Jiang Nitin H. Vaidya. Department of Computer Science
Response Time in Data Broadcast Systems: Mean, Variance and Trade-O Shu Jiang Nitin H. Vaidya Department of Computer Science Texas A&M University College Station, TX 7784-11, USA Email: fjiangs,vaidyag@cs.tamu.edu
More information1. CONFIGURATIONS We assume familiarity with [1]. The purpose of this manuscript is to provide more details about the proof of [1, theorem (3.2)]. As
REDUCIBILITY IN THE FOUR-COLOR THEOREM Neil Robertson 1 Department of Mathematics Ohio State University 231 W. 18th Ave. Columbus, Ohio 43210, USA Daniel P. Sanders 2 School of Mathematics Georgia Institute
More informationExample Bases and Basic Feasible Solutions 63 Let q = >: ; > and M = >: ;2 > and consider the LCP (q M). The class of ; ;2 complementary cones
Chapter 2 THE COMPLEMENTARY PIVOT ALGORITHM AND ITS EXTENSION TO FIXED POINT COMPUTING LCPs of order 2 can be solved by drawing all the complementary cones in the q q 2 - plane as discussed in Chapter.
More informationKnowledge Discovery. Zbigniew W. Ras. Polish Academy of Sciences, Dept. of Comp. Science, Warsaw, Poland
Handling Queries in Incomplete CKBS through Knowledge Discovery Zbigniew W. Ras University of orth Carolina, Dept. of Comp. Science, Charlotte,.C. 28223, USA Polish Academy of Sciences, Dept. of Comp.
More informationLab 3. Newton s Second Law
Lab 3. Newton s Second Law Goals To determine the acceleration of a mass when acted on by a net force using data acquired using a pulley and a photogate. Two cases are of interest: (a) the mass of the
More informationTime-Space Trade-Os. For Undirected ST -Connectivity. on a JAG
Time-Space Trade-Os For Undirected ST -Connectivity on a JAG Abstract Undirected st-connectivity is an important problem in computing. There are algorithms for this problem that use O (n) time and ones
More informationOnline Appendixes for \A Theory of Military Dictatorships"
May 2009 Online Appendixes for \A Theory of Military Dictatorships" By Daron Acemoglu, Davide Ticchi and Andrea Vindigni Appendix B: Key Notation for Section I 2 (0; 1): discount factor. j;t 2 f0; 1g:
More informationFair allocation of indivisible goods
Fair allocation of indivisible goods Gabriel Sebastian von Conta Technische Universitt Mnchen mrgabral@gmail.com November 17, 2015 Gabriel Sebastian von Conta (TUM) Chapter 12 November 17, 2015 1 / 44
More information2 Situation A (Two-valued Model) Describing the Situation Reaching the rst goal
A Probabilistic Stopping Criterion for the Evaluation of Benchmarks (Extended Version) Michael Greiner, Manfred Schramm z Keywords Evaluation of benchmarks, heuristic comparison of algorithms, general
More informationabout them. D3FIKITI0N THEORY AS BASIS FOR A CREATIVE PROBLEM SOLVER
D3FIKITI0N THEORY AS BASIS FOR A CREATIVE PROBLEM SOLVER H.Andreka, T.Gergely, I.Nemeti ftungarian Academy of sciences Budapest, ungary Abstract In this paper the application of some deep theorems of mathematical
More informationBehavioral Economics
Behavioral Economics 1 Behavioral Economics Midterm, 13th - Suggested Solutions 1 Question 1 (40 points) Consider the following (completely standard) decision maker: They have a utility function u on a
More informationImproving the trade-o between storage and communication in broadcast encryption schemes
Discrete Applied Mathematics 143 (2004) 213 220 www.elsevier.com/locate/dam Improving the trade-o between storage and communication in broadcast encryption schemes Carles Padro, Ignacio Gracia, Sebastia
More informationSemantic Importance Dual-Priority Server: Properties
Semantic Importance Dual-Priority Server: Properties David R. Donari Universidad Nacional del Sur - CONICET, Dpto. de Ing. Eléctrica y Computadoras, Bahía Blanca, Argentina, 8000 ddonari@uns.edu.ar Martin
More informationSynchronous Sequential Circuit Design
Synchronous Sequential Circuit Design 1 Sequential circuit design In sequential circuit design, we turn some description into a working circuit We first make a state table or diagram to express the computation
More informationExperiment 2 Random Error and Basic Statistics
PHY191 Experiment 2: Random Error and Basic Statistics 7/12/2011 Page 1 Experiment 2 Random Error and Basic Statistics Homework 2: turn in the second week of the experiment. This is a difficult homework
More informationExhaustive Classication of Finite Classical Probability Spaces with Regard to the Notion of Causal Up-to-n-closedness
Exhaustive Classication of Finite Classical Probability Spaces with Regard to the Notion of Causal Up-to-n-closedness Michaª Marczyk, Leszek Wro«ski Jagiellonian University, Kraków 16 June 2009 Abstract
More informationParking Slot Assignment Problem
Department of Economics Boston College October 11, 2016 Motivation Research Question Literature Review What is the concern? Cruising for parking is drivers behavior that circle around an area for a parking
More informationContingency Selection in Plan Generation
Contingency Selection in Plan Generation Nilufer Onder Department of Computer Science University of Pittsburgh Pittsburgh, PA 15260 nilufer@cs.pitt.edu Martha E. Pollack Department of Computer Science
More informationMicroeconomic Algorithms for Flow Control in Virtual Circuit Networks (Subset in Infocom 1989)
Microeconomic Algorithms for Flow Control in Virtual Circuit Networks (Subset in Infocom 1989) September 13th, 1995 Donald Ferguson*,** Christos Nikolaou* Yechiam Yemini** *IBM T.J. Watson Research Center
More informationNormal Probability Plot Probability Probability
Modelling multivariate returns Stefano Herzel Department ofeconomics, University of Perugia 1 Catalin Starica Department of Mathematical Statistics, Chalmers University of Technology Reha Tutuncu Department
More informationTuring Machines Part One
Turing Machines Part One What problems can we solve with a computer? Regular Languages CFLs Languages recognizable by any feasible computing machine All Languages That same drawing, to scale. All Languages
More informationActivity Graphs. The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters.
The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters. Citation Accessed Citable Link Terms of Use Karr, Michael. Activity Graphs.
More informationOne box per group ( star group of 6)
4 markers 2 erasers One box per group ( star group of 6) 1 pencil (just in case) Some small post-it notes 1 glue stick One person from each group collect all items and place them back into the box. Concept
More informationUsing ranking functions in multiobjective fuzzy linear programming 1
Fuzzy Sets and Systems 111 (2000) 47 53 www.elsevier.com/locate/fss Using ranking functions in multiobective fuzzy linear programming 1 J.M. Cadenas a;, J.L. Verdegay b a Departamento de Informatica, Inteligencia
More information2 C. A. Gunter ackground asic Domain Theory. A poset is a set D together with a binary relation v which is reexive, transitive and anti-symmetric. A s
1 THE LARGEST FIRST-ORDER-AXIOMATIZALE CARTESIAN CLOSED CATEGORY OF DOMAINS 1 June 1986 Carl A. Gunter Cambridge University Computer Laboratory, Cambridge C2 3QG, England Introduction The inspiration for
More informationElectional Astrology by Mary Fortier Shea, M.A. Counseling Psychology
INTRODUCTION TO ELECTIONAL ASTROLOGY An electional chart tells you the most propitious time to initiate your project with the greatest "finality". Finality is when you do the last possible thing to initiate
More informationIntroduction to Metalogic 1
Philosophy 135 Spring 2012 Tony Martin Introduction to Metalogic 1 1 The semantics of sentential logic. The language L of sentential logic. Symbols of L: (i) sentence letters p 0, p 1, p 2,... (ii) connectives,
More informationCONSTRUCTING ARM MEMORY OFFSPRING M MEMORY PARENT. Fig. 1: Von Neumann's self-reproducing automaton
Published in: Advances in Articial Life, Proc. 3rd European Conf. on Articial Life, Grenada, Spain, June 4-6, 995, Lecture Notes in Articial Intelligence 929, Springer, Berlin, 995. A New Self-Reproducing
More information