Vertical Implementation

Size: px
Start display at page:

Download "Vertical Implementation"

Transcription

1 Information and Computation 70, (00) doi:0.006/inco , availale online at on Vertical Implementation Arend Rensink Faculty of Informatics, University of Twente, Postus 7, NL-7500 AE Enschede, The Netherlands and Roerto Gorrieri Dipartimento di Scienze dell Informazione, University of Bologna, Mura Anteo Zamoni 7, I-407 Bologna, Italy Received May 8, 998; final manuscript received Octoer 0, 000 We investigate criteria to relate specifications and implementations elonging to conceptually different levels of astraction. For this purpose, we introduce the generic concept of a vertical implementation relation, which is a family of inary relations indexed y a refinement function that maps astract actions onto concrete processes and thus determines the asic connection etween the astraction levels. If the refinement function is the identity, the vertical implementation relation collapses to a standard (horizontal) implementation relation. As desiderata for vertical implementation relations we formulate a numer of congruence-like proof rules (notaly a structural rule for recursion) that offer a powerful, compositional proof technique for vertical implementation. As a candidate vertical implementation relation we propose vertical isimulation. Vertical isimulation is compatile with the standard interleaving semantics of process algera; in fact, the corresponding horizontal relation is rooted weak isimulation. We prove that vertical isimulation satisfies the proof rules for vertical implementation, thus estalishing the consistency of the rules. Moreover, we define a corresponding notion of astraction that strengthens the intuition ehind vertical isimulation and also provides a decision algorithm for finite-state systems. Finally, we give a numer of small examples to demonstrate the advantages of vertical implementation in general and vertical isimulation in particular. C 00 Academic Press Key Words: astraction level, action refinement, isimulation, compositionality, process algera, vertical implementation. Contents.. Introduction.. Basic Definitions. 3. Proof Rules for Vertical Implementation. 4. Vertical Bisimulation. 5. Astraction. 6. Open Terms. 7. Examples. 8. Evaluation and Future Extension.. INTRODUCTION There is a long tradition in defining process refinement theories (see, e.g., [8,, 9]), essentially ased on the idea that, given two processes S and I, I is an implementation of S if I is more deterministic (or equivalent) according to the chosen semantics. Still, oth S and I elong conceptually to the same astraction level, as the actions they perform elong to the same alphaet. For this reason, we call such implementation relations horizontal. In the development of software components, however, it is quite often required to compare systems that realize essentially the same functionality ut elong to conceptually different astraction levels, where the change of the level is usually accompanied y a change in the alphaets of actions they perform. For Partially supported y the European HCM network EXPRESS (Expressiveness of Languages for Concurrency), while the author was employed at the University of Hildesheim /0 $35.00 Copyright C 00 y Academic Press All rights of reproduction in any form reserved.

2 96 RENSINK AND GORRIERI such components, we would like to develop vertical implementation relations that, given an astract process S and a concrete process I, tell us if I is a possile implementation for the specification S. This prolem is rather unexplored, with the exception of the work on action refinement in process algera [,,, 7, 35, 4, 4], which however is not satisfactory in some respects (to e discussed later). The main contriution of this paper is to single out some sensile criteria that any vertical implementation relation should satisfy. Furthermore, we introduce one specific instance of such a vertical relation, which we call vertical isimulation. The concept of a vertical implementation relation r entails the following:. It is parametric with respect to a refinement function r that maps astract actions of the specification to concrete processes, thus fixing the implementation of the asic uilding locks of the astract system.. It is flexile enough (i) to offer several possile implementations for any given specification and (ii) not to require that the ordering of astract actions is tightly preserved at the level of their implementing processes. To e more explicit, consider the following example: if S = a; and r(a) = a ; a, then we would like to accept as legal implementations oth a ; a ; and a ;(a ), where in the latter an ordering at the astract level (etween a and ) has een partially forgotten at the concrete level (as a and are in parallel). 3. It is simple enough to e defined on the standard interleaving models of classic laeled transition systems. This has the advantage of making it possile to reuse most existing techniques developed for interleaving semantics. 4. It is a generalization of existing (horizontal) implementation relations; i.e., if the refinement function is the identity, then the vertical implementation relation, id, should collapse to some horizontal relation. This has two consequences: (i) the theory of horizontal and vertical implementation can e integrated uniformly, and (ii) the numer of possile vertical relations is not less than the numer of horizontal relations, at least in principle. 5. It is deadlock-freedom-preserving: Typically, if the specification is deadlock-free, we would expect that also the implementation is so. 6. It comes equipped with a set of sound congruence-like proof rules. This gives rise to a powerful, compositional proof technique to verify whether a certain process I is an implementation for some specification S. The work on action refinement in process algera satisfies few of these requirements. For instance, the existing theories say that the implementation of a specification S is given y r(s) (the syntactic sustitution of concrete processes r(a) for actions a in S) [,,, 3] or y [r ]( [S ]) (the semantic sustitution of the semantics of concrete processes r(a) for actions a in the semantics of S) [, 8,, 35]. Hence, the asic assumption of these theories is that there is only one possile implementation for a given specification; in other words, the action refinement function is used as a prescriptive tool to specify the only way astract actions are to e implemented. Consequences of this are the following: The refinement function can e used as an operator of the language, as it also defines a function on processes. Hence, it ecomes immediately relevant to investigate the so-called congruence prolem: find an equivalence relation such that, if two processes S and S are equivalent, then also r(s ) and r(s ) are equivalent. Dating ack to [9], it is clear that it is then necessary to move to noninterleaving semantics: the parallel execution of actions a and, denoted a, is equivalent in interleaving semantics to their sequential simulation a; +; a; however, if we refine a to the sequence a ; a, then we otain a ; a and a ; a ; +; a ; a, which are not equivalent at all, as only the former may offer the execution sequence a ; ; a. In [4, 3, 4, 43] it is shown that the coarsest congruence for the operator of action refinement contained in standard interleaving semantics is the ST semantics [9], a notion of equivalence that, roughly, considers actions as nonatomic activities split into two consecutive phases (see also [6]). Because of the strong relation to the (syntactical or semantical) structure of the specification S, the implementation r(s) is quite rigidly defined. One of the typical constraints is that the possile causal relation etween two astract actions is strictly preserved among all the actions of the two implementing processes. For instance, if S = a; and r(a) = a ; a as aove, then the only possile implementation

3 VERTICAL IMPLEMENTATION 97 is r(s) = a ; a ; and not the alternative a ;(a ) where the causal relation etween a and is partially forgotten. This can e a serious drawack in practice, as pointed out in [8]. Some work has een devoted to define less rigid forms of action refinement that do allow some overlapping [3, 7, 34, 39, 44]. Still, in all these approaches, given a specification and a refinement function there is always only one possile implementation. By allowing more than one implementation for a given specification, we get that in our approach the congruence prolem simply disappears: since one single specification may admit nonequivalent implementations, a fortiori two equivalent specifications need not to have equivalent implementations. Hence, there is no longer a need to move to noninterleaving semantics. The paper is organized as follows. In Section, our investigation starts y introducing the language we use (a mixture of CCS and CSP, containing all the well-known operators), equipped with operational and ehavioural semantics (the standard notion of rooted weak isimulation equivalence, see [9]). Then we present the class of refinement functions we use, which are restricted in that they map astract actions to nonempty (i.e., not immediately terminating) processes that cannot deadlock. Section 3 introduces the set of desired proof rules we would expect any vertical implementation r to satisfy. We use r as the formal symol in the proof rules for a vertical implementation relation parameterized y r, and (without parameter) for the corresponding standard (horizontal) implementation relation. The rules can e divided into three main groups. The first group states the interplay etween r and : when r is the identity function, id reduces to ; moreover, r and compose, meaning that if, e.g., S S and S r I and I I, then S r I. The second group defines a set of congruence-like properties; e.g., if S i r I i for i =,, then S + S r I + I. Some of the congruence rules have sideconditions on r, in particular on the nature of the alphaets of processes refining distinct astract actions. These side-conditions are necessary in order to otain an intuitively sound (e.g., deadlock-freedompreserving) proof system; we give some examples to illustrate this. The third group consists of a single rule that relaxes precisely the causality preservation constraint discussed aove, and thus is a typical example of a rule that surmounts the intrinsic limitations of the standard approach to action refinement. An interesting consequence of the proof system is that the (almost) standard notion of action refinement as syntactic sustitution is a sound implementation technique (ut y no means the only one) for any vertical relation that enjoys the proof rules. Section 4 introduces vertical isimulation, r, as the concrete notion of vertical implementation we propose in this paper. Its main features are the following: The underlying horizontal implementation relation is rooted weak isimulation equivalence. Vertical isimulation is formed of three components: a down-simulation (each astract move must e matched y a sequence in the implementation), an up-simulation (each move of the implementation should find a justification either as the initial action of a new refined action or as a continuation of a pending refinement), and a residual simulation, requiring that each move of the pending refinements must e present in the implementation. r enjoys all the proof rules: if S r I then S r I. In particular, r reduces to rooted weak isimulation equivalence when no action is refined. (The prolem of finding a complete set of proof rules for r is outside the scope of this paper.) The proof system makes it possile to prove nontrivial facts in a completely proof-theoretic way. Alternatively, one may show directly that r holds etween two given (finite-state) systems, y providing an actual vertical isimulation relation over their states. Furthermore, in Section 5 we also report another model-theoretic approach to check r over finite-state transition systems: we introduce the astraction theorem, according to which (under some constraints) a concrete transition system can e mapped algorithmically to a corresponding astract transition system. Checking vertical isimulation is then equivalent to first mapping the concrete-laeled transition system to its corresponding astract one, and then checking (classical) rooted weak isimulation etween the two astract transition systems. Section 6 extends the result presented so far to the case of open terms. In particular, we discuss the proof rule of recursion congruence, which makes it possile to deduce vertical implementations of recursive, possily infinite-state systems. Under the assumption of strict guardedness, recursion congruence is proved to hold for r.

4 98 RENSINK AND GORRIERI Section 7 shows several variations of vertical implementation on an example taken from [7], as well as an example of a finite-state specification admitting an infinite-state implementation. Especially the latter demonstrates the fact that the proof rules can e used to deduce nontrivial vertical implementations. Finally, in Section 8 we discuss further extensions of our work, concerning possile variations of the notion of vertical implementation relation. The proofs of this paper s most interesting theorems can e found in the Appendix; all proofs are given in the full report version [38]. A preliminary version of this paper appeared as [37].. BASIC DEFINITIONS.. The Language We assume a universe of action names U, ranged over y a,, c, an invisile action τ / U, and a termination lael / U {τ}. Susets of U are denoted A, C, A, C (where we sometimes use A, A for astract and C, C for concrete actions, respectively). We denote A τ = A {τ}, A = A { }, and A τ, = A {τ, } for any A U. U τ, is ranged over y, β, γ. Furthermore, we consider a universe of process variales, X, ranged over y x, y, z; susets of X are denoted X, Y. We define a family of languages L A, indexed y the set of actions A U that may e used within terms and ranged over y t, u,v, according to the grammar t ::= 0 t + t t; t t A t t[φ] t/a x µx. t, where A τ (hence is not allowed in the language), A A, φ: A A and x X. We drop the index A if it equals U. The operators have the following intuitive meaning: 0 is a process that immediately deadlocks. is a process that immediately terminates with a transition laeled. indicates the execution of the action. t + u indicates a choice etween the ehaviors descried y the suterms t and u. The choice is decided y the first action (even if it is a ) that occurs from either suterm, after which the other suterm is discarded. t; u is the sequential composition of t and u; i.e., t proceeds until it terminates, after which u takes over. t A u is the parallel composition of the ehaviors descried y t and u; A is a set of actions over which t and u synchronize. That is to say, actions from A can only e performed y oth suterms in concert, whereas all other actions can e done y either suterm in isolation. In addition, we use the following special case of parallel composition: t u = t u. t [φ] ehaves as t, except that actions are renamed according to the function φ, extended when necessary with the mappings τ τ and. t/a ehaves as t, except that the actions in A are hidden, i.e., turned into internal actions. x X is a process variale, presumaly ound y some encompassing recursive operator (see next item), or to e replaced y syntactic sustitution: t u/x denotes the replacement within the term t of every (free) occurrence of x y the term u (see elow for the formal definition). µx. t with x X is a recursive term. It can e understood through its unfolding, t µx. t/x. The variale x is considered to e ound in µx. t, meaning that it cannot e not affected y sustitution. Therefore, the identity of ound variales is considered irrelevant; in fact, we apply the standard technique of identifying all terms up to renaming of the ound variales, meaning that if y is a fresh variale not occurring in t, then µx. t and µy. t y/x are identified in all contexts. We only consider recursion over guarded terms; see Definition. elow.

5 VERTICAL IMPLEMENTATION 99 TABLE Free Variales and Syntactic Sustitution t fv(t) t f 0 0 t + t fv(t, t ) t f +t f t ;t fv(t, t ) t f ; t f t A t fv(t, t ) t f A t f t [φ] fv(t ) t f [φ] t /A fv(t ) t f /A { f (x) if x dom( f ) x {x} x otherwise µx. t fv(t )\{x} µy. (t y/x f ) where y / fv(t) dom( f ) fv( f ) To formalize the notion of syntactic sustitution, we first define the free variales of a term t, denoted fv(t), as those variales that do not occur in the scope of a recursion operator; see Tale. We write fv(t, u) = fv(t) fv(u). If fv(t) = for a given term t L, we call t closed; in contrast, we sometimes call a term open if it is not (known to e) closed. We will use L A to denote the set of closed terms. A sustitution function f is a partial function from X to L A ; its domain of definition will e denoted dom( f ). We use X L A to denote the space of sustitution functions; if f is a sustitution function with dom( f ) = X, we write f : X L A or f : X L A. Tale defines the application of a sustitution function f to a term t, denoted t f, as the simultaneous replacement, within t, of every free occurrence of every variale x dom( f ) y its image f (x). Note the (standard) definition of sustitution for recursive terms in Tale : the ound variale is renamed to a variale not occurring in the term to e sustituted, in order to avoid the capture of free variales. Notation for Sustitutions. If dom( f ) ={x,...,x n } and f maps each x i to a term t i, we also write f as an explicit list of sustitutions: f = (t /x,...,t n /x n )or(t i /x i ) i n. Correspondingly, we write t f =t t /x,...t n /x n or t t i /x i i n. The notion of free variales is extended to sustitution functions y defining fv( f ) = x dom( f ) fv( f (x)). As with terms, f is called closed if fv( f ) =. Guardedness. We can now also formalize the notion of guardedness, already mentioned aove. This is a syntactic property: in principle, a variale x X is said to e guarded in a term t L if every occurrence of x is within a suterm ; u of t. The precise definition is slightly more flexile than that: for instance, x (ut not y) is also considered to e guarded in (y; a); x. Furthermore, t is called well guarded if it contains only recursion over terms in which the recursion variale is guarded. Note that this does not imply that all variales are guarded in t; for instance, t = x is well guarded ut x is not guarded in t. DEFINITION.. First we define when an aritrary term (in L) is called a guard: 0 and are guards (for all A τ ); t + u is a guard if oth t and u are guards; t; u and t A u are guards if either t or u is a guard; t/a, t[φ], and µx. t are guards if t is a guard; and x are not guards (for all x X). Next we define when a variale is called guarded in a term: x is guarded in 0, and (for all A τ ); x is guarded in t + u and t A u if x is guarded in oth t and u; x is guarded in t; u if x is guarded in t and either t is a guard or x is guarded in u;

6 00 RENSINK AND GORRIERI x is guarded in t/a, t[φ], and µx. t if x is guarded in t; x is guarded in y ( X)ifx y. We call t L well guarded if in all suterms µx. u of t, x is guarded in u. The following proposition states that oth guardedness of a variale in a term and well-guardedness of a term are preserved y syntactic sustitution. PROPOSITION.. Let t, u L and x, y X.. If x is guarded in t and u, then x is guarded in t u/y.. If t and u are well guarded, then so is t u/y. The set of well-guarded terms will e denoted L wg A (and accordingly Lwg A for the closed fragment); however, where this does not give rise to confusion we will drop the superscript wg and simply assume all terms to e implicitly well guarded... Operational Semantics The operational semantics is given in terms of laeled transition systems (LTSs). An LTS is a triple, S, where is a set of laels, S is a set of states, and S Sis the so-called transition relation. As usual, we denote s s for (s,,s ), s for s. s s, and s for (s ). If, this plays the special role of modelling termination. Accordingly, in any LTS we impose as a requirement on termination transitions (i.e., -laeled ones) that they must lead to deadlocked states: s s. s. () The LTS for L A is otained as follows. The set of laels is A τ,. The set of states is given y the terms of L A. The transition relation is defined as the least relation satisfying the rules of Tale. Note that these rules apply to open as well as closed terms; for instance, a; x + y a x is a derivale transition. The termination lael is needed to give a satisfactory semantic treatment of sequential composition (see [4]). Note that a choice may terminate even if only one of the operands terminates (cf. [5]). Finally, cannot e hidden and must e synchronized upon. The following proposition shows the consequences of (well-)guardedness for the operational semantics: guarded variales are not used in initial transitions of a term, well-guardedness is preserved y transitions, and for well-guarded terms, the derivation rule for recursion can e replaced y another one in which the premise is structurally simpler than the conclusion (see also [3]). The latter fact has the consequence that more properties can e proved y induction on the term structure. t t t 0 t t; u t ; u / A t A u t A u t t / A t/a t /A TABLE Transition Rules t u u t t t + u t u u t + u u t u u t t t; u u t[φ] φ() t [φ ] / A t A u t A u t t A t/a τ t /A t t u u A t A u t A u t µx.t/x t µx.t t

7 PROPOSITION.. Let t, u L and x X.. If x is guarded in t and t u/x t, then t. If t is well guarded and t t, then t is well guarded. 3. If t is well guarded, then the set of derivale transitions t the last rule of Tale y VERTICAL IMPLEMENTATION 0 t t µx. t t µx. t/x. t for some t such that t = t u/x. t remains the same if we replace The following property expresses that the semantics satisfies the condition on -transitions imposed on an LTS. PROPOSITION.3. For all A U, A,τ, L wg A, is an LTS..3. Behavioral Semantics In an interleaving operational semantics such as the aove, a widely accepted τ-astracting equivalence relation is rooted (weak) isimilarity; see [9]. The definition is as follows. First, the asic, one-step transitions are extended to τ-astracting transitions in the usual fashion: if σ = n U τ, then t σ u : t τ τ τ n τ u. Furthermore, the definition relies on a function ˆ : U τ, U such that ˆτ = ε (the empty string, with ε t t for any t) and ˆ = for all U. Let T =, S, e a transition system. A weak simulation over T is a relation ρ S S such that for all s ρ s : if s s ˆ then s s such that s ρ s. DEFINITION.. ρ is a weak isimulation if ρ and ρ are weak simulations. A root of a relation ρ S S is a surelation ρ ρ such that for all s ρ s : τ if s s then s τ s such that s ρ s. ρ is a iroot of ρ if ρ is a root of ρ and ρ is a root of ρ. Weak isimilarity over T, denoted, is the largest weak isimulation over T, and rooted isimilarity, denoted, is the largest iroot of. Note that, ecause we will use the same rootedness condition several times, we have defined it in a generic fashion. The following few examples illustrate the role played y termination: The following result is well known (cf. [5, 9]): PROPOSITION.4. is a congruence over L. In particular, if t L and f, g: fv(t) L such that f (x) g(x) for all x fv(t), then t f t g. Restriction to Closed Terms. In the following sections, up to (ut not including) Section 6, we are only considering isimilarity of closed terms. We discuss the extension of isimilarity to open terms in Section Refinement Functions A refinement function maps astract actions to concrete processes, where the notions of astract and concrete are accompanied y a change of alphaet. For the purpose of this paper, in order to avoid

8 0 RENSINK AND GORRIERI unnecessary complications, we single out the L A -fragment R A of refinement terms that can e used as the refinement of astract actions. R A is generated y the following grammar t ::= a t + t t; t, where a A. Then, if A is the set of astract actions and C that of concrete actions (A and C not necessarily disjoint), a refinement function is of the form r: A R C, with dom(r) = A, with the property that r(a) a for only a finite numer of a (i.e., if A is infinite, then r is the identity almost everywhere). The restriction of refinement images to R (suscript omitted when clear from context) is largely technically motivated. At the same time, however, the terms of R satisfy a numer of intuitive sensiility criteria. Indeed, if a process t is to refine atomic action, then it is reasonale to require that t should e: nonempty, i.e., t. This comes down to the principle that a visile astract activity a (i.e., something the environment can synchronize on) cannot simply disappear during refinement. eventually terminating, i.e., after a finite numer of steps, t must terminate. This criterion essentially requires that the refinement of a given action cannot get stuck during execution. This seems quite reasonale in the light of the atomicity of the original (astract) action. Altogether, R is large enough to express sensile examples. Confusion in Refinement Functions. In some circumstances, it is important that the refinements of distinct astract actions themselves satisfy some distinctness criteria. The heart of the issue is confusion within the concrete system aout the origin of actions. EXAMPLE.. Consider a refinement function with a c; a and c;. On the astract level, the actions a and are distinct and cannot e confused. For instance, in t = (a + d) a, it is not possile that a and synchronize; hence t d; 0. On the concrete level, however, the proposed refinements of a and start with the same action; hence if a c occurs in the implementation, it is not a priori clear whether this reflects an astract a or an astract. This may e especially prolematic if parts of the concrete system synchronize over an occurrence of c, while one part intends the c to reflect an astract a-occurrence, whereas the other part intends it to reflect an astract -occurrence. As an example, consider u = (c; a + d) a,,c c; (this eing the direct, syntactic refinement of t aove). One possile run is u c a a,,c 0, resulting in a deadlocked state; this run does not have a counterpart in t. To avoid this and other types of confusion, we sometimes impose further restrictions on the refinement functions considered. To formulate these, first we define the alphaet of a refinement term t R, which equals the set of actions that may e executed y t during its lifetime; A(a) ={a} A(t+u)=A(t;u)=A(t) A(u). The intention of the alphaet is captured y the following (ovious) property: PROPOSITION.5. For all t R, A(t) ={a σ: t σa = }. Using the alphaet, we now define two properties of refinement functions that rule out confusion of the kind exemplified aove, to different degrees. DEFINITION.3. Let r: A R C and A A e given. r is said to preserve A if A(r(a)) A(r()) = for all a A and A\A; r is said to e distinct on A if the following conditions hold:. for all distinct a A and dom(r), A(r(a)) A(r()) = ;. for all a A and all suterms t + u and t; u of r(a), A(t) A(u) =. ris simply called distinct if it is distinct on A.

9 VERTICAL IMPLEMENTATION 03 In other words, a refinement function r preserves a certain set A dom(r) if there is no overlap etween the actions occurring in the refinements of (the elements of) A and of (the elements of) dom(r)\a. For instance, the function r in Example. does not preserve {a} or {}, ut it does preserve {a, } if a,, and c do not occur in r(d) for any d dom(r)\{a, }. On the other hand, r is distinct on A if also the refinements of different actions in A have disjoint alphaets, and the images of individual actions in A contain no more than a single instance of any action. Hence distinctness implies preservation, and r in Example. is not distinct on {a}, {} or {a, }. Active Domain and Active Range. In the following it will e useful to distinguish the active domain adom(r) of a refinement function r, as well as its active range arng(r), defined as arng(r) = A(r(a)) r(a) a adom(r) ={a r(a) a} (arng(r) dom(r)). Hence the active domain is a suset of the domain, consisting of two types of actions: those that are not mapped onto themselves, and those that are used in the image of any action different from themselves. Note that adom(r) is always finite, due to the fact that we required r to e the identity almost everywhere (see aove) and the fact that A(t) is a finite set for all t R. It is interesting to oserve that hence justifying the name of active range. arng(r) = A(r(adom(r))), EXAMPLE.. If A = C ={a,,c}and r: a a;,, c c then adom(r) ={a,}. Note that adom(r) is preserved y r. The preservation of the active domain is a general property, formulated in the following proposition; in fact, this property is the reason why we introduced the active domain. PROPOSITION.6. adom(r) is the smallest r-preserved set containing {a r(a) a}. Refinement Function Constants and Operations. We use id A : A R A to denote the identity refinement function on A (hence adom(id A ) = ), omitting the index A if it is clear from the context. In addition, we use the following construction on refinement functions: { a if a A r\a: a r(a) otherwise. Hence r\ A turns r into the identity over the actions in A. Note that r\adom(r) = id and if r preserves A then adom(r\a) = adom(r)\a. 3. PROOF RULES FOR VERTICAL IMPLEMENTATION We now introduce the central concept of this paper, namely the notion of vertical implementation. When we write t r u we mean that t is an astract system and u one of its possile implementations according to the (generic) vertical implementation relation r, where the correspondence etween actions of t and computations of u is set via the refinement function r. Similarly, when we write t t we mean that t and t are two systems at the same astraction level, related y the (generic) horizontal implementation relation (i.e., relating systems at the same astraction level), which could e one of those studied in, e.g., [5]. In this section we define a set of proof rules that any relation r should satisfy; in the proof rules, we use the syntactic symol r for r and for. The list of rules, expressing natural desiderata, is reported in Tale 3. Some of the proof rules have side conditions on their applicaility, concerning

10 04 RENSINK AND GORRIERI TABLE 3 Proof Rules for Vertical Implementation t id t R t id u t u R t t t r u u u t r R 3 u 0 r 0 R 4 r R 5 r r() R 6 t r u t r u t + t r u + u R 7 t r u t r u t r u φ adom(r) = id adom(r) t ; t r R 8 u ; u t[φ] r R 9 u[φ] t r u r preserves A t/a r\a u/a(r(a)) R 0 t r u t r u r is distinct on A t A t r u A (r(a)) u R r(a) = u ; u t r v a; t r R u ;(u v) distinctness and preservation on a set of actions y the refinement function r. To etter understand them, elow we present some examples showing that these side-conditions are really necessary. Note that the rules in Tale 3 range over closed terms only. The extension to open terms, including a structural rule for the congruence of the (second-order) recursion operator, is dealt with in the separate Section Motivation Before illustrating the need for the side conditions, we discuss the rules of Tale 3 in some detail. They can e divided in three groups. The first group of properties, consisting of rules R R 3, expresses our asic assumption of compatiility of horizontal and vertical implementation. Rule R simply states that every term implements itself as long as no proper refinement takes place, rule R says that id implies, while Rule R 3 explains the interplay etween horizontal and vertical implementation relations. Note that, as a consequence, we also have the derived rule t u t id u that, in conjunction with rule R, ensures that and id are indeed the same relation. Note also that Rules R and R imply that is reflexive, whereas Rules R R 3 together imply that is transitive; hence is a preorder, which indeed is the standard requirement for horizontal implementation relations. Later in this paper, we choose weak isimulation to e the horizontal implementation relation ; however, the interplay etween vertical implementation relations and horizontal implementation relations in no way should depend on this choice, and we feel that any of the τ-astracting relations studied in, e.g., [5] can, in principle, e used as a asis. The rules R 4 R essentially express congruence of vertical implementation with respect to the operators of our language. For instance, if the refinement functions in these rules are set to id, then the properties expressed y these rules collapse to the standard precongruence properties of for the operators of L. (In other words, the horizontal implementation relation needs to e a precongruence, at least.) Rules R 4 and R 5 simply express that deadlock and termination are independent of the astraction level. Rule R 6 is the core of the relationship etween the refinement function r and the vertical implementation relation. It expresses the asic expectation that r(a) should e an implementation for a. Rules R 7,R 8, and R are quite ovious, as they inductively go into the structure of the components. Note that in Rule R the synchronization set A of the specification is refined in the implementation. We will comment elow on its side condition.

11 VERTICAL IMPLEMENTATION 05 R 9 can e used for renaming terms when the renaming function φ is an identity on actions to e refined. Oserve that no proof rule for renaming is offered in case the renaming and refinement function interfere. There is some room for extension here; for instance, the following additional rule may e considered, t r u φ injective t[φ] ψ r φ u[ψ], where ψ r φ is a construction on the refinement function r with the ovious meaning. At this point, however, we have chosen not to e exhaustive ut rather to concentrate on the essential rules. Rule R 0 is a similar congruence-like rule for hiding, with the proviso that the refinement function has lost some of its active domain in correspondence to those actions that are hidden. We will comment later on its side condition. An interesting consequence of R 0 is given y the (derived) rule t r u t/adom(r) u/arng(r). (Note that in this case, the side condition can e dropped, since r always preserves adom(r).) Hence, y hiding all the actions that are refined, the vertical implementation is turned ack into a horizontal implementation relation. Rule R states that in certain circumstances, sequential composition in the specification need not e taken literally: there may e overlap etween the tail of (the refinement of) the first operand and (the implementation of) the second operand. In other words, this rule expresses a certain degree of weakening of the causal ordering during refinement in the sense discussed in the Introduction, reminiscent of the approaches of [8] and [44]. Note that, ecause of our choice of refinement language R, it is clear that u is not terminated in the premise r(a) = u ; u. This is indeed a necessary circumstance. To see why, note that we do also not expect the following generalization of R to hold: s r u ; u t r v s; t r u ;(u v). If a ; a (where = ), this more general rule which in fact also generalizes R 8 would allow one to derive a; id a and hence a; a ; this is not consistent with a deadlock-preserving horizontal implementation relation (a; cannot deadlock when synchronized with a; + a; 0 whereas a can). The use of Rule R is fairly limited; in the conclusion of this paper we discuss another, more general rule for the weakening of sequential composition. Nevertheless, there are nontrivial applications even of this limited version, as we show in Section 7. Two small illustrations of the rules are provided y the following examples, which were already discussed in the Introduction. The first one is ased on the assumption that we are working in an interleaving model, where a a; + ; a. EXAMPLE 3.. Using Tale 3, we can show that if a is split into r(a) = a ; a in the astract system S = a, this can e implemented either y treating (the implementation of) a and as independent, resulting in I = a ; a, R a r 6 a ; a r R 6 R S r, I or y imposing an ordering, as in I = a ; a ; + ; a ; a,.. S a; + ; a.. a; + ; a r I R 8, R 7 I id I R I I R S r I R 3. The second example concerns the weakening of the causality using R.

12 06 RENSINK AND GORRIERI EXAMPLE 3.. Consider again r: a a ; a,, and let S = a; and I = a ;(a ): r(a) = a ; a r R 6 R S r. I More interesting examples can e found in Section Side Conditions Although the side conditions on rules R and R 0 in Tale 3 seem ugly, it is not difficult to see that they are necessary, at least if one wants to meet the minimal requirement of choosing a horizontal implementation relation that preserves deadlock freedom (i.e., such that if t is deadlock-free and t u then u is deadlock-free). We show a few examples illustrating some of the most striking prolems. The first example concerns the side condition of Rule R 0 for hiding. EXAMPLE 3.3. Let r: A R C e a refinement function with active part a a; c and ; c (where c / A). Hence r preserves neither {a} nor {}. Then, if we use the proof rule ignoring the side conditions, we would get the derivation a, r a; c R 6 a/ r\ (a; c)/, c R 0 a r\ a; c R 6 R (a/) a a r\ ((a; c)/, c) a,c a; c ((a/) a a)/a (((a; c)/, c) a,c a; c)/a, c R 0, R. The left-hand term on the ottom line contains no deadlock (there is just one transition of synchronization, leading to the terminated state ((/) a )/a), whereas the right hand term has the transition (((a; c)/, c) a,c a; c)/a, c τ ((; c/, c) a,c ; c)/a, c to a deadlocked state. This contradicts the requirement that preserves deadlock freedom. The next few examples show prolems that derive from unintended effects of Rule R for parallel composition if we omit its side condition of distinctness. EXAMPLE 3.4. Let r e a refinement function with active part a c; + c; d. The rules of Tale 3 then allow the derivation a r c; + c; d R 6 a r c; + c; d R 6 a a a r (c; + c; d),c,d (c; + c; d) R (a a a)/a ((c; + c; d),c,d (c; + c; d))/, c, d R 0, R. The left-hand term on the ottom line contains no deadlock (there is just one transition of synchronization, leading to the terminated state ( a )/a), whereas the right-hand term has the transition ((c; + c; d),c,d (c; + c; d))/, c, d τ (;,c,d ; d)/, c, d to a deadlocked state. This contradicts the requirement that preserves deadlock freedom. It is clear that the prolem is related to the fact that r(a) isnondeterministic and that, in synchronization, local choices can show up inconsistent at a gloal level. The side condition of distinctness solves the prolem y invalidating the aove derivation, since r violates Condition of distinctness (Definition.3). Much the same prolem can also e generated if the refinements of two different astract actions start with the same concrete action (hence violating condition of Definition.3), as the following example shows.

13 VERTICAL IMPLEMENTATION 07 EXAMPLE 3.5. Let r e a refinement function with active part a c; a and c;. The rules of Tale 3 then allow the derivation a r c; a R 6 d r d R 6 R r c; R 6 d r d R 6 a + d r 7 R c; a + d + d r 7 c; + d R (a + d) a, ( + d) r (c; a + d) a,,c (c; + d) ((a + d) a, ( + d))/a, ((c; a + d) a,,c (c; + d))/a,, c R 0, R. The left-hand term on the ottom line contains no deadlock (all transition sequences lead to a terminated state), whereas the right-hand term has the transition ((c; a + d) a,,c (c; + d))/a,, c τ (; a a,,c ; )/a,, c to a deadlocked state. This contradicts the requirement that preserves deadlock freedom. To prevent this sort of things from occurring, it is necessary that distinct synchronizing astract actions are refined to terms having disjoint initial actions. Moreover, initial actions and later (i.e., noninitial) actions of a refinement image r(a) should also e kept distinct, as the following example shows. EXAMPLE 3.6. Given a refinement function r that is the identity everywhere except for a c; c,we have that (a; a ((a + ) (a + )))/a, is implemented y (c; c; c ((c; c + ) (c; c + )))/c,. However, while the former cannot deadlock, the latter can. Again, imposing the side condition of distinctness invalidates the derivation, since the refinement function r in this example violates Condition of Definition.3. The identification of suitale side conditions for rule R is related to the issue of syntactic versus semantic action refinement studied in [], where suitale conditions for syntactic sustitution to distriute over the parallel operator (with synchronization) have een singled out. Hence, different side conditions for different classes of refinale terms are possile, according to the results presented in that paper Syntactic Refinement Although the derivation rules in Tale 3 give no recipe for deriving implementations from specifications, one particular implementation can in many cases e otained through the syntactic sustitution of all astract actions y their refinements. For a given refinement function r: A R C, syntactic sustitution can e formalized as a partial function r : L A L C, defined in Tale 4. The partial definedness (originating in the rules for parallel composition, renaming and hiding) is necessary to ensure that syntactic refinement (if defined) always yields a valid r -implementation. We then have the following result: TABLE 4 Syntactic Refinement r (0):=0 r ():= r ():=r() r (t +u):=r (t)+r (u) r (t;u):=r (t); r (u) r (t A u):=r (t) A(r(A)) r (u) ifr is distinct on A r (t[φ]) := r (t)[φ] ifφ adom(r) = id adom(r) r (t/a):=r (t)/a(r(a)) if r preserves A r (x):=x r (µx.t):=µx.r (t)

14 08 RENSINK AND GORRIERI THEOREM 3.. For all recursion-free t L A and r: A R, if r is defined on t, then t r r (t). Proof. By induction on the structure of t, thanks to the rules in Tale 3. Note that this result is limited, not just to closed terms, ut to recursion-free terms, i.e., with finite ehavior. The reason is that our current proof system does not allow reasoning aout recursion. We will repair this omission in Section 6. One could turn the fact that syntactic refinement implies vertical implementation around and define a vertical implementation relation in terms of syntactic action refinement, taking care to interpret the specification and implementation up to some horizontal implementation relation or equivalence such as, for instance, isimulation. This gives rise to t r u : v:t v,r (v) u. r meets several of the requirements discussed in the Introduction; for instance, we have that a r a ; a as well as a r a ; a ; + ; a ; a if r: a a ; a (see also Example 3.), showing that a single specification can have incomparale vertical implementations. In fact, r satisfies all the proof rules of Tale 3, with the exception of R. A similar technique can e used to define a vertical implementation relation using semantic rather than syntactic refinement. This again gives rise to a relation that satisfies all proof rules ut R.It appears that R is typical of the flexiility one would like to have in implementing causality ut is excluded y the traditional approach to action refinement. 4. VERTICAL BISIMULATION We now define an actual vertical implementation relation that satisfies all the proof rules of Tale 3. This section starts y introducing the asic definition, uilt on rooted weak isimulation (see Definition.), chosen as the horizontal implementation relation. Then we present the main results of our vertical isimulation relation, namely soundness of the rules in Tale 3 (even if such a set of rules is not complete) and (as a consequence) soundness of syntactic refinement. 4.. The Relation As we have seen, rooted weak isimulation is defined using isimulation relations that connect states of the specification with states of the implementation and vice versa. In an analogous way, we define vertical isimulation as the comination of unidirectional simulations. However, in contrast to weak isimulation, the directions are no longer symmetric. To simulate the astract transitions of the specification y the implementation, we define the concept of down-simulation, according to which astract transitions are matched with complete runs of the corresponding refinements in the implementation. In the following definitions, T = U τ,, S, is a fixed transition system, and r: A R C a refinement function. DEFINITION 4.. s ρ s,ifs A down-simulation up to r over T is a inary relation ρ S S such that for all s then one of the following holds:. adom(r), and if r() = σ σ then s s such that s ρ s ;. ˆ / adom(r), and s s such that s ρ s It follows that down-simulation is a rather weak notion: w.r.t. the implementation, it regards only complete runs of the refined actions. The intermediate states of the implementation, traversed during such a complete run, are not investigated at all. This oservation is due to an anonymous referee.

15 VERTICAL IMPLEMENTATION 09 EXAMPLE 4.. Let r: a a ; a,, c c. There is a down-simulation etween S = a; and I = a ;(a ;+c), given y {(S, I ), (;, ; ), (, ), (0, 0)}; this does not investigate the intermediate state ;(a ;+c) that the implementation passes through while doing I = a a ;. To define the dual notion of up-simulation, we also must take into account that in any given state of the implementation, there may e associated refined actions whose execution has not yet terminated. These will e collected in a set of residual (or pending) refinements that will e used to parameterize the isimulation. To e precise, an r-residual set will e a multiset of nonterminated proper derivatives of r-images. Such a set is formally represented y a function R: L N. We will denote t R if R(t) > 0. To e precise, the collection of residual sets of r is defined as rsd(r) = { R: L N t R: a dom(r), σ U + : r(a) σ t }. (Note that we cannot require R: R N, even though r maps to R only, since the derivatives of terms in R may contain occurrences of.) We use the following constructions over residual sets: : u 0 { if u = t and t [t]: u 0 otherwise R R : u R (u) + R (u) R R : u max{r (u) R (u), 0}. The ehavior of a residual set corresponds to the synchronization-free parallel composition of its elements. Formally, R R : t R: t t :R =(R [t]) [t ]. Note the fact that terminated terms do not contriute to the residual set. The reason we can ignore terminated terms is that it is certain that such terms no longer display any operational ehavior. An up-simulation must maintain the multiset of residual refinements: either the implementation s move corresponds to the initial concrete action of a refined astract action, or it is an action of a residual refinement. The residual set forms an additional component to every pair of (specification and implementation) states; hence we have a ternary rather than a inary relation. 3 Notation for Ternary Relations. In the following, we will often work with ternary relations of the form ρ S S rsd(r) for some set of states S and refinement function r. We use the notation s ρ R s to areviate (s, s, R) ρ; in other words, ρ R is interpreted as the inary relation {(s, s ) (s, s, R) ρ}. DEFINITION 4.. An up-simulation up to r over T is a ternary relation ρ S S rsd(r) such that for all s ρ R γ s,ifs s then one of the following holds:. adom(r): s s and r() γ v such that s ρ R [v] s ; ε. s s and R γ R such that s ρ R s ; ˆγ 3. γ / arng(r) and s s such that s ρ R s. Note that when the implementation move is matched y the pending refinements in the residual set (item ), then the specification is allowed to move silently (i.e., with a τ-transition). See [38] for a discussion on variations on this definition, showing among other things that this is indeed necessary. To comine a (inary) down-simulation ρ and a (ternary) up-simulation ρ, we require that ρ equals the surelation ρ, i.e., where the residual set component is empty. (This is the natural choice, since in 3 Other ternary isimulation-ased relations are, for instance, history-preserving isimulation [6], and symolic isimulation [5].

16 0 RENSINK AND GORRIERI the definition of down-simulation we assumed to investigate only states of the implementation where all refinements had een simulated completely.) Unfortunately, such a comination does not yet give rise to a useful notion of vertical implementation, since there is no guarantee that refinements that were started (and hence are in the residual set) can e finished. EXAMPLE 4.. Letr: a a ; a and consider S = a and I = a ; 0 + a ; a. Down- and up-simulations etween S and I are given y ρ ={(S,I),(,),(0,0)} ρ ={(S,I, ),(,;0,[a ]), (, ; a, [a ]), (,, ), (0, 0, )}. Note that ρ = ρ. However, we certainly do not want I as an implementation of S, since I may e not ale to complete the sequence implementing a, and may deadlock instead. In particular, we have ρ [a] ; 0, which relates a terminated state with a deadlocked state. In fact, Rules R 0 and R would allow us to derive S/a I/a, a from S r I, which is false. Vertical isimulation, therefore, is determined y a relation that is oth a down-simulation, an upsimulation, and a residual simulation; the latter requires that any move of the pending refinement set must e matched y the implementation, without the specification moving at all. This implies that pending refinements can e worked off in any possile order, or indeed in parallel, y the implementation. This property can e construed as an operational formulation of atomicity: that which is started can always e finished. DEFINITION 4.3. Let r e a refinement function. A weak vertical isimulation up to r over T is a ternary relation ρ S S rsd(r) such that. ρ is a down-simulation;. ρ is an up-simulation; 3. {(R, s ) s ρ R s } is a weak simulation (called residual simulation) for all s S. Weak vertical isimilarity up to r over T, denoted r, is the largest weak vertical isimulation up to r over T, and rooted vertical isimilarity up to r over T, denoted r, is the largest iroot of r,. Figure shows an example of an actual vertical isimulation: given r: a a ; a, the figure shows vertical isimulations proving a; r a ; a ; and a; r a ;(a ). The dotted lines connect related states and their laeling is the residual set indexing the relation. 4.. Soundness Results Directly from Definition 4.3, the following consistency result follows: a ; a ; a; a ; (a ) [0] [0] a a a [0] a [a ] a [a ] [0] [0] [a ] [0] [0] [0] a FIG.. An example of vertical isimulation: with r: a a ; a.

Branching Bisimilarity with Explicit Divergence

Branching Bisimilarity with Explicit Divergence Branching Bisimilarity with Explicit Divergence Ro van Glaeek National ICT Australia, Sydney, Australia School of Computer Science and Engineering, University of New South Wales, Sydney, Australia Bas

More information

CONNECTOR ALGEBRAS FOR C/E AND P/T NETS INTERACTIONS

CONNECTOR ALGEBRAS FOR C/E AND P/T NETS INTERACTIONS Logical Methods in Computer Science Vol. 9(3:6)203, pp. 65 www.lmcs-online.org Sumitted Apr. 5, 202 Pulished Sep. 7, 203 CONNECTOR ALGEBRAS FOR C/E AND P/T NETS INTERACTIONS ROBERTO BRUNI a, HERNÁN MELGRATTI,

More information

2nd Exam. First Name: Second Name: Matriculation Number: Degree Programme (please mark): CS Bachelor CS Master CS Lehramt SSE Master Other:

2nd Exam. First Name: Second Name: Matriculation Number: Degree Programme (please mark): CS Bachelor CS Master CS Lehramt SSE Master Other: 2 Concurrency Theory WS 2013/2014 Chair for Software Modeling and Verification Rheinisch-Westfälische Technische Hochschule Aachen Prof. Dr. Ir. Joost-Pieter Katoen apl. Prof. Dr. Thomas Noll S. Chakraorty,

More information

Plan for Today and Beginning Next week (Lexical Analysis)

Plan for Today and Beginning Next week (Lexical Analysis) Plan for Today and Beginning Next week (Lexical Analysis) Regular Expressions Finite State Machines DFAs: Deterministic Finite Automata Complications NFAs: Non Deterministic Finite State Automata From

More information

Representation theory of SU(2), density operators, purification Michael Walter, University of Amsterdam

Representation theory of SU(2), density operators, purification Michael Walter, University of Amsterdam Symmetry and Quantum Information Feruary 6, 018 Representation theory of S(), density operators, purification Lecture 7 Michael Walter, niversity of Amsterdam Last week, we learned the asic concepts of

More information

SVETLANA KATOK AND ILIE UGARCOVICI (Communicated by Jens Marklof)

SVETLANA KATOK AND ILIE UGARCOVICI (Communicated by Jens Marklof) JOURNAL OF MODERN DYNAMICS VOLUME 4, NO. 4, 010, 637 691 doi: 10.3934/jmd.010.4.637 STRUCTURE OF ATTRACTORS FOR (a, )-CONTINUED FRACTION TRANSFORMATIONS SVETLANA KATOK AND ILIE UGARCOVICI (Communicated

More information

Upper Bounds for Stern s Diatomic Sequence and Related Sequences

Upper Bounds for Stern s Diatomic Sequence and Related Sequences Upper Bounds for Stern s Diatomic Sequence and Related Sequences Colin Defant Department of Mathematics University of Florida, U.S.A. cdefant@ufl.edu Sumitted: Jun 18, 01; Accepted: Oct, 016; Pulished:

More information

A Thread Algebra with Multi-level Strategic Interleaving

A Thread Algebra with Multi-level Strategic Interleaving Theory of Computing Systems manuscript No. (will be inserted by the editor) A Thread Algebra with Multi-level Strategic Interleaving J.A. Bergstra 1,2, C.A. Middelburg 3,1 1 Programming Research Group,

More information

Pseudo-automata for generalized regular expressions

Pseudo-automata for generalized regular expressions Pseudo-automata for generalized regular expressions B. F. Melnikov A. A. Melnikova Astract In this paper we introduce a new formalism which is intended for representing a special extensions of finite automata.

More information

#A50 INTEGERS 14 (2014) ON RATS SEQUENCES IN GENERAL BASES

#A50 INTEGERS 14 (2014) ON RATS SEQUENCES IN GENERAL BASES #A50 INTEGERS 14 (014) ON RATS SEQUENCES IN GENERAL BASES Johann Thiel Dept. of Mathematics, New York City College of Technology, Brooklyn, New York jthiel@citytech.cuny.edu Received: 6/11/13, Revised:

More information

FinQuiz Notes

FinQuiz Notes Reading 9 A time series is any series of data that varies over time e.g. the quarterly sales for a company during the past five years or daily returns of a security. When assumptions of the regression

More information

CHAPTER 5. Linear Operators, Span, Linear Independence, Basis Sets, and Dimension

CHAPTER 5. Linear Operators, Span, Linear Independence, Basis Sets, and Dimension A SERIES OF CLASS NOTES TO INTRODUCE LINEAR AND NONLINEAR PROBLEMS TO ENGINEERS, SCIENTISTS, AND APPLIED MATHEMATICIANS LINEAR CLASS NOTES: A COLLECTION OF HANDOUTS FOR REVIEW AND PREVIEW OF LINEAR THEORY

More information

The State Explosion Problem

The State Explosion Problem The State Explosion Problem Martin Kot August 16, 2003 1 Introduction One from main approaches to checking correctness of a concurrent system are state space methods. They are suitable for automatic analysis

More information

Tree sets. Reinhard Diestel

Tree sets. Reinhard Diestel 1 Tree sets Reinhard Diestel Abstract We study an abstract notion of tree structure which generalizes treedecompositions of graphs and matroids. Unlike tree-decompositions, which are too closely linked

More information

Depth versus Breadth in Convolutional Polar Codes

Depth versus Breadth in Convolutional Polar Codes Depth versus Breadth in Convolutional Polar Codes Maxime Tremlay, Benjamin Bourassa and David Poulin,2 Département de physique & Institut quantique, Université de Sherrooke, Sherrooke, Quéec, Canada JK

More information

Chaos and Dynamical Systems

Chaos and Dynamical Systems Chaos and Dynamical Systems y Megan Richards Astract: In this paper, we will discuss the notion of chaos. We will start y introducing certain mathematical concepts needed in the understanding of chaos,

More information

The WHILE Hierarchy of Program Schemes is Infinite

The WHILE Hierarchy of Program Schemes is Infinite The WHILE Hierarchy of Program Schemes is Infinite Can Adam Alayrak and Thomas Noll RWTH Aachen Ahornstr. 55, 52056 Aachen, Germany alayrak@informatik.rwth-aachen.de and noll@informatik.rwth-aachen.de

More information

On the Independence of the Formal System L *

On the Independence of the Formal System L * 6 International Journal of Fuzzy Systems, Vol. 4, No., June On the Independence of the Formal System L * Daowu Pei Astract The formal system L * of fuzzy propositional logic has een successfully applied

More information

Polynomial Degree and Finite Differences

Polynomial Degree and Finite Differences CONDENSED LESSON 7.1 Polynomial Degree and Finite Differences In this lesson, you Learn the terminology associated with polynomials Use the finite differences method to determine the degree of a polynomial

More information

This is a repository copy of Attributed Graph Transformation via Rule Schemata : Church-Rosser Theorem.

This is a repository copy of Attributed Graph Transformation via Rule Schemata : Church-Rosser Theorem. This is a repository copy of Attriuted Graph Transformation via Rule Schemata : Church-Rosser Theorem. White Rose Research Online URL for this paper: http://eprints.whiterose.ac.uk/9/ Version: Accepted

More information

Finite Automata and Regular Languages (part II)

Finite Automata and Regular Languages (part II) Finite Automata and Regular Languages (part II) Prof. Dan A. Simovici UMB 1 / 25 Outline 1 Nondeterministic Automata 2 / 25 Definition A nondeterministic finite automaton (ndfa) is a quintuple M = (A,

More information

Technical Report: SRI-CSL July Computer Science Laboratory, SRI International, Menlo Park. also. Technical Report: TR-98-09

Technical Report: SRI-CSL July Computer Science Laboratory, SRI International, Menlo Park. also. Technical Report: TR-98-09 Technical Report: SRI-CSL-98-06 July 1998 Computer Science Laoratory, SRI International, Menlo Park also Technical Report: TR-98-09 Dipartimento di Informatica, Universita di Pisa Process and Term Tile

More information

Denotational Semantics

Denotational Semantics 5 Denotational Semantics In the operational approach, we were interested in how a program is executed. This is contrary to the denotational approach, where we are merely interested in the effect of executing

More information

Solving Systems of Linear Equations Symbolically

Solving Systems of Linear Equations Symbolically " Solving Systems of Linear Equations Symolically Every day of the year, thousands of airline flights crisscross the United States to connect large and small cities. Each flight follows a plan filed with

More information

Program Analysis. Lecture 5. Rayna Dimitrova WS 2016/2017

Program Analysis. Lecture 5. Rayna Dimitrova WS 2016/2017 Program Analysis Lecture 5 Rayna Dimitrova WS 2016/2017 2/21 Recap: Constant propagation analysis Goal: For each program point, determine whether a variale has a constant value whenever an execution reaches

More information

CS 4120 Lecture 3 Automating lexical analysis 29 August 2011 Lecturer: Andrew Myers. 1 DFAs

CS 4120 Lecture 3 Automating lexical analysis 29 August 2011 Lecturer: Andrew Myers. 1 DFAs CS 42 Lecture 3 Automating lexical analysis 29 August 2 Lecturer: Andrew Myers A lexer generator converts a lexical specification consisting of a list of regular expressions and corresponding actions into

More information

Expansion formula using properties of dot product (analogous to FOIL in algebra): u v 2 u v u v u u 2u v v v u 2 2u v v 2

Expansion formula using properties of dot product (analogous to FOIL in algebra): u v 2 u v u v u u 2u v v v u 2 2u v v 2 Least squares: Mathematical theory Below we provide the "vector space" formulation, and solution, of the least squares prolem. While not strictly necessary until we ring in the machinery of matrix algera,

More information

1Number ONLINE PAGE PROOFS. systems: real and complex. 1.1 Kick off with CAS

1Number ONLINE PAGE PROOFS. systems: real and complex. 1.1 Kick off with CAS 1Numer systems: real and complex 1.1 Kick off with CAS 1. Review of set notation 1.3 Properties of surds 1. The set of complex numers 1.5 Multiplication and division of complex numers 1.6 Representing

More information

Luis Manuel Santana Gallego 100 Investigation and simulation of the clock skew in modern integrated circuits. Clock Skew Model

Luis Manuel Santana Gallego 100 Investigation and simulation of the clock skew in modern integrated circuits. Clock Skew Model Luis Manuel Santana Gallego 100 Appendix 3 Clock Skew Model Xiaohong Jiang and Susumu Horiguchi [JIA-01] 1. Introduction The evolution of VLSI chips toward larger die sizes and faster clock speeds makes

More information

The Mean Version One way to write the One True Regression Line is: Equation 1 - The One True Line

The Mean Version One way to write the One True Regression Line is: Equation 1 - The One True Line Chapter 27: Inferences for Regression And so, there is one more thing which might vary one more thing aout which we might want to make some inference: the slope of the least squares regression line. The

More information

CHAPTER THREE: RELATIONS AND FUNCTIONS

CHAPTER THREE: RELATIONS AND FUNCTIONS CHAPTER THREE: RELATIONS AND FUNCTIONS 1 Relations Intuitively, a relation is the sort of thing that either does or does not hold between certain things, e.g. the love relation holds between Kim and Sandy

More information

The Capacity Region of 2-Receiver Multiple-Input Broadcast Packet Erasure Channels with Channel Output Feedback

The Capacity Region of 2-Receiver Multiple-Input Broadcast Packet Erasure Channels with Channel Output Feedback IEEE TRANSACTIONS ON INFORMATION THEORY, ONLINE PREPRINT 2014 1 The Capacity Region of 2-Receiver Multiple-Input Broadcast Packet Erasure Channels with Channel Output Feedack Chih-Chun Wang, Memer, IEEE,

More information

A framework based on implementation relations for implementing LOTOS specifications

A framework based on implementation relations for implementing LOTOS specifications Published in: Computer Networks and ISDN Systems, 25 (1992), 23-41 A framework based on implementation relations for implementing LOTOS specifications Guy Leduc Research Associate of the National Fund

More information

arxiv: v2 [cs.fl] 21 Mar 2014

arxiv: v2 [cs.fl] 21 Mar 2014 arxiv:143.581v [cs.fl] 1 Mar 14 Enforcing Operational Properties including Blockfreeness for Deterministic Pushdown Automata S. Schneider and U. Nestmann Technische Universität Berlin Astract: We present

More information

CS 420, Spring 2018 Homework 4 Solutions. 1. Use the Pumping Lemma to show that the following languages are not regular: (a) {0 2n 10 n n 0};

CS 420, Spring 2018 Homework 4 Solutions. 1. Use the Pumping Lemma to show that the following languages are not regular: (a) {0 2n 10 n n 0}; CS 420, Spring 2018 Homework 4 Solutions 1. Use the Pumping Lemma to show that the following languages are not regular: (a) {0 2n 10 n n 0}; Solution: Given p 1, choose s = 0 2p 10 p. Then, s is in the

More information

Structuring Unreliable Radio Networks

Structuring Unreliable Radio Networks Structuring Unreliale Radio Networks Keren Censor-Hillel Seth Gilert Faian Kuhn Nancy Lynch Calvin Newport March 29, 2011 Astract In this paper we study the prolem of uilding a connected dominating set

More information

News on Temporal Conjunctive Queries

News on Temporal Conjunctive Queries News on Temporal Conjunctive Queries Veronika Thost Center for dvancing Electronics Dresden (cfaed), TU Dresden veronika.thost@tu-dresden.de stract. Temporal query languages are important for stream processing,

More information

Reversal of regular languages and state complexity

Reversal of regular languages and state complexity Reversal of regular languages and state complexity Juraj Šeej Institute of Computer Science, Faculty of Science, P. J. Šafárik University Jesenná 5, 04001 Košice, Slovakia juraj.seej@gmail.com Astract.

More information

Decentralized Control of Discrete Event Systems with Bounded or Unbounded Delay Communication

Decentralized Control of Discrete Event Systems with Bounded or Unbounded Delay Communication Decentralized Control of Discrete Event Systems with Bounded or Unbounded Delay Communication Stavros Tripakis Abstract We introduce problems of decentralized control with communication, where we explicitly

More information

Data Cleaning and Query Answering with Matching Dependencies and Matching Functions

Data Cleaning and Query Answering with Matching Dependencies and Matching Functions Data Cleaning and Query Answering with Matching Dependencies and Matching Functions Leopoldo Bertossi 1, Solmaz Kolahi 2, and Laks V. S. Lakshmanan 2 1 Carleton University, Ottawa, Canada. bertossi@scs.carleton.ca

More information

Determinants of generalized binary band matrices

Determinants of generalized binary band matrices Determinants of generalized inary and matrices Dmitry Efimov arxiv:17005655v1 [mathra] 18 Fe 017 Department of Mathematics, Komi Science Centre UrD RAS, Syktyvkar, Russia Astract Under inary matrices we

More information

Attributed Graph Transformation via Rule Schemata: Church-Rosser Theorem

Attributed Graph Transformation via Rule Schemata: Church-Rosser Theorem Attriuted Graph Transformation via Rule Schemata: Church-Rosser Theorem Ivaylo Hristakiev and Detlef Plump (B) University of York, York, UK detlef.plump@york.ac.uk Astract. We present an approach to attriuted

More information

KRIPKE S THEORY OF TRUTH 1. INTRODUCTION

KRIPKE S THEORY OF TRUTH 1. INTRODUCTION KRIPKE S THEORY OF TRUTH RICHARD G HECK, JR 1. INTRODUCTION The purpose of this note is to give a simple, easily accessible proof of the existence of the minimal fixed point, and of various maximal fixed

More information

Section 8.5. z(t) = be ix(t). (8.5.1) Figure A pendulum. ż = ibẋe ix (8.5.2) (8.5.3) = ( bẋ 2 cos(x) bẍ sin(x)) + i( bẋ 2 sin(x) + bẍ cos(x)).

Section 8.5. z(t) = be ix(t). (8.5.1) Figure A pendulum. ż = ibẋe ix (8.5.2) (8.5.3) = ( bẋ 2 cos(x) bẍ sin(x)) + i( bẋ 2 sin(x) + bẍ cos(x)). Difference Equations to Differential Equations Section 8.5 Applications: Pendulums Mass-Spring Systems In this section we will investigate two applications of our work in Section 8.4. First, we will consider

More information

Bisimulation for conditional modalities

Bisimulation for conditional modalities Bisimulation for conditional modalities Alexandru Baltag and Giovanni Ciná Institute for Logic, Language and Computation, University of Amsterdam March 21, 2016 Abstract We give a general definition of

More information

2. Prime and Maximal Ideals

2. Prime and Maximal Ideals 18 Andreas Gathmann 2. Prime and Maximal Ideals There are two special kinds of ideals that are of particular importance, both algebraically and geometrically: the so-called prime and maximal ideals. Let

More information

1 Systems of Differential Equations

1 Systems of Differential Equations March, 20 7- Systems of Differential Equations Let U e an open suset of R n, I e an open interval in R and : I R n R n e a function from I R n to R n The equation ẋ = ft, x is called a first order ordinary

More information

arxiv: v1 [cs.fl] 24 Nov 2017

arxiv: v1 [cs.fl] 24 Nov 2017 (Biased) Majority Rule Cellular Automata Bernd Gärtner and Ahad N. Zehmakan Department of Computer Science, ETH Zurich arxiv:1711.1090v1 [cs.fl] 4 Nov 017 Astract Consider a graph G = (V, E) and a random

More information

On the Structure and Complexity of Symbolic Proofs of Polynomial Identities

On the Structure and Complexity of Symbolic Proofs of Polynomial Identities On the Structure and Complexity of Symbolic Proofs of Polynomial Identities Iddo Tzameret Tel Aviv University, Tel Aviv 69978, Israel Abstract A symbolic proof for establishing that a given arithmetic

More information

SOME GENERAL RESULTS AND OPEN QUESTIONS ON PALINTIPLE NUMBERS

SOME GENERAL RESULTS AND OPEN QUESTIONS ON PALINTIPLE NUMBERS #A42 INTEGERS 14 (2014) SOME GENERAL RESULTS AND OPEN QUESTIONS ON PALINTIPLE NUMBERS Benjamin V. Holt Department of Mathematics, Humoldt State University, Arcata, California vh6@humoldt.edu Received:

More information

CSE Theory of Computing: Homework 3 Regexes and DFA/NFAs

CSE Theory of Computing: Homework 3 Regexes and DFA/NFAs CSE 34151 Theory of Computing: Homework 3 Regexes and DFA/NFAs Version 1: Fe. 6, 2018 Instructions Unless otherwise specified, all prolems from the ook are from Version 3. When a prolem in the International

More information

A Calculus for Team Automata

A Calculus for Team Automata Electronic Notes in Theoretical Computer Science 195 (2008) 41 55 www.elsevier.com/locate/entcs A Calculus for Team Automata Maurice H. ter Beek 1 Istituto di Scienza e Tecnologie dell Informazione, CNR

More information

Superluminal Hidden Communication as the Underlying Mechanism for Quantum Correlations: Constraining Models

Superluminal Hidden Communication as the Underlying Mechanism for Quantum Correlations: Constraining Models 38 Brazilian Journal of Physics, vol. 35, no. A, June, 005 Superluminal Hidden Communication as the Underlying Mechanism for Quantum Correlations: Constraining Models Valerio Scarani and Nicolas Gisin

More information

Sample Solutions from the Student Solution Manual

Sample Solutions from the Student Solution Manual 1 Sample Solutions from the Student Solution Manual 1213 If all the entries are, then the matrix is certainly not invertile; if you multiply the matrix y anything, you get the matrix, not the identity

More information

Approximation Metrics for Discrete and Continuous Systems

Approximation Metrics for Discrete and Continuous Systems University of Pennsylvania ScholarlyCommons Departmental Papers (CIS) Department of Computer & Information Science May 2007 Approximation Metrics for Discrete Continuous Systems Antoine Girard University

More information

A Toy Model of Consciousness and the Connectome, First Approximation, Second Part

A Toy Model of Consciousness and the Connectome, First Approximation, Second Part A Toy Model of Consciousness and the Connectome, First Approximation, Second Part Aility Potential of A Neural Network As A Prognostic Connective Indicator Stan Bumle, Ph. D. Astract: The paper vixra:1305.0128

More information

Non-Linear Regression Samuel L. Baker

Non-Linear Regression Samuel L. Baker NON-LINEAR REGRESSION 1 Non-Linear Regression 2006-2008 Samuel L. Baker The linear least squares method that you have een using fits a straight line or a flat plane to a unch of data points. Sometimes

More information

Stability Domain of a Linear Differential Equation with Two Delays

Stability Domain of a Linear Differential Equation with Two Delays ELSEVIER An International Journal Availale online at www.sciencedirect.com computers &.c,..c. ~--~c,..c.. mathematics with applications Computers and Mathematics with Applications 51 (2006) 153-159 www.elsevier.com/locate/camwa

More information

Prime Implicate Normal Form for ALC Concepts

Prime Implicate Normal Form for ALC Concepts Prime Implicate Normal Form for ALC Concepts Meghyn Bienvenu IRIT-UPS, 118 route de Narbonne, 31062 Toulouse Cedex, France IRIT Research Report IRIT/RR 2008-6 FR April 2008 Abstract In this paper, we present

More information

Foundations of Mathematics MATH 220 FALL 2017 Lecture Notes

Foundations of Mathematics MATH 220 FALL 2017 Lecture Notes Foundations of Mathematics MATH 220 FALL 2017 Lecture Notes These notes form a brief summary of what has been covered during the lectures. All the definitions must be memorized and understood. Statements

More information

On Universality of Blow-up Profile for L 2 critical nonlinear Schrödinger Equation

On Universality of Blow-up Profile for L 2 critical nonlinear Schrödinger Equation On Universality of Blow-up Profile for L critical nonlinear Schrödinger Equation Frank Merle,, Pierre Raphael Université de Cergy Pontoise Institut Universitaire de France Astract We consider finite time

More information

Function Secret Sharing: Improvements and Extensions

Function Secret Sharing: Improvements and Extensions Function Secret Sharing: Improvements and Extensions Elette Boyle Niv Giloa Yuval Ishai July 24, 2018 Astract Function Secret Sharing (FSS), introduced y Boyle et al. (Eurocrypt 2015), provides a way for

More information

Minimizing a convex separable exponential function subject to linear equality constraint and bounded variables

Minimizing a convex separable exponential function subject to linear equality constraint and bounded variables Minimizing a convex separale exponential function suect to linear equality constraint and ounded variales Stefan M. Stefanov Department of Mathematics Neofit Rilski South-Western University 2700 Blagoevgrad

More information

P = ρ{ g a } + µ 2 V II. FLUID STATICS

P = ρ{ g a } + µ 2 V II. FLUID STATICS II. FLUID STATICS From a force analysis on a triangular fluid element at rest, the following three concepts are easily developed: For a continuous, hydrostatic, shear free fluid: 1. Pressure is constant

More information

Characterization of Semantics for Argument Systems

Characterization of Semantics for Argument Systems Characterization of Semantics for Argument Systems Philippe Besnard and Sylvie Doutre IRIT Université Paul Sabatier 118, route de Narbonne 31062 Toulouse Cedex 4 France besnard, doutre}@irit.fr Abstract

More information

ON FLATNESS OF NONLINEAR IMPLICIT SYSTEMS

ON FLATNESS OF NONLINEAR IMPLICIT SYSTEMS ON FLATNESS OF NONLINEAR IMPLICIT SYSTEMS Paulo Sergio Pereira da Silva, Simone Batista Escola Politécnica da USP Av. Luciano Gualerto trav. 03, 158 05508-900 Cidade Universitária São Paulo SP BRAZIL Escola

More information

Alexandr Kazda 1 Department of Algebra, Charles University, Prague, Czech Republic

Alexandr Kazda 1 Department of Algebra, Charles University, Prague, Czech Republic #A3 INTEGERS 9 (009), 6-79 CONVERGENCE IN MÖBIUS NUMBER SYSTEMS Alexandr Kazda Department of Algera, Charles University, Prague, Czech Repulic alexak@atrey.karlin.mff.cuni.cz Received: 0/30/08, Accepted:

More information

Simple Examples. Let s look at a few simple examples of OI analysis.

Simple Examples. Let s look at a few simple examples of OI analysis. Simple Examples Let s look at a few simple examples of OI analysis. Example 1: Consider a scalar prolem. We have one oservation y which is located at the analysis point. We also have a ackground estimate

More information

Advanced Topics in LP and FP

Advanced Topics in LP and FP Lecture 1: Prolog and Summary of this lecture 1 Introduction to Prolog 2 3 Truth value evaluation 4 Prolog Logic programming language Introduction to Prolog Introduced in the 1970s Program = collection

More information

Beyond Loose LP-relaxations: Optimizing MRFs by Repairing Cycles

Beyond Loose LP-relaxations: Optimizing MRFs by Repairing Cycles Beyond Loose LP-relaxations: Optimizing MRFs y Repairing Cycles Nikos Komodakis 1 and Nikos Paragios 2 1 University of Crete, komod@csd.uoc.gr 2 Ecole Centrale de Paris, nikos.paragios@ecp.fr Astract.

More information

1. Define the following terms (1 point each): alternative hypothesis

1. Define the following terms (1 point each): alternative hypothesis 1 1. Define the following terms (1 point each): alternative hypothesis One of three hypotheses indicating that the parameter is not zero; one states the parameter is not equal to zero, one states the parameter

More information

Module 9: Further Numbers and Equations. Numbers and Indices. The aim of this lesson is to enable you to: work with rational and irrational numbers

Module 9: Further Numbers and Equations. Numbers and Indices. The aim of this lesson is to enable you to: work with rational and irrational numbers Module 9: Further Numers and Equations Lesson Aims The aim of this lesson is to enale you to: wor with rational and irrational numers wor with surds to rationalise the denominator when calculating interest,

More information

IN this paper, we consider the estimation of the frequency

IN this paper, we consider the estimation of the frequency Iterative Frequency Estimation y Interpolation on Fourier Coefficients Elias Aoutanios, MIEEE, Bernard Mulgrew, MIEEE Astract The estimation of the frequency of a complex exponential is a prolem that is

More information

Bilateral Proofs of Safety and Progress Properties of Concurrent Programs (Working Draft)

Bilateral Proofs of Safety and Progress Properties of Concurrent Programs (Working Draft) Bilateral Proofs of Safety and Progress Properties of Concurrent Programs (Working Draft) Jayadev Misra December 18, 2015 Contents 1 Introduction 3 2 Program and Execution Model 4 2.1 Program Structure..........................

More information

S4LP and Local Realizability

S4LP and Local Realizability S4LP and Local Realizability Melvin Fitting Lehman College CUNY 250 Bedford Park Boulevard West Bronx, NY 10548, USA melvin.fitting@lehman.cuny.edu Abstract. The logic S4LP combines the modal logic S4

More information

Distributed Timed Automata with Independently Evolving Clocks

Distributed Timed Automata with Independently Evolving Clocks Distriuted Timed Automata with Independently Evolving Clocks S. Akshay,3, Benedikt Bollig, Paul Gastin, Madhavan Mukund 2, and K. Narayan Kumar 2 LSV, ENS Cachan, CNRS, France {akshay,ollig,gastin}@lsv.ens-cachan.fr

More information

SUFFIX TREE. SYNONYMS Compact suffix trie

SUFFIX TREE. SYNONYMS Compact suffix trie SUFFIX TREE Maxime Crochemore King s College London and Université Paris-Est, http://www.dcs.kcl.ac.uk/staff/mac/ Thierry Lecroq Université de Rouen, http://monge.univ-mlv.fr/~lecroq SYNONYMS Compact suffix

More information

Restricted truth predicates in first-order logic

Restricted truth predicates in first-order logic Restricted truth predicates in first-order logic Thomas Bolander 1 Introduction It is well-known that there exist consistent first-order theories that become inconsistent when we add Tarski s schema T.

More information

Power Control for Discrete-Input Block-Fading Channels. K. D. Nguyen, A. Guillén i Fàbregas and L. K. Rasmussen

Power Control for Discrete-Input Block-Fading Channels. K. D. Nguyen, A. Guillén i Fàbregas and L. K. Rasmussen Power Control for Discrete-Input Block-Fading Channels K. D. Nguyen, A. Guillén i Fàregas and L. K. Rasmussen CUED / F-INFENG / TR 582 August 2007 Power Control for Discrete-Input Block-Fading Channels

More information

Homework 3 Solutions(Part 2) Due Friday Sept. 8

Homework 3 Solutions(Part 2) Due Friday Sept. 8 MATH 315 Differential Equations (Fall 017) Homework 3 Solutions(Part ) Due Frida Sept. 8 Part : These will e graded in detail. Be sure to start each of these prolems on a new sheet of paper, summarize

More information

Short notes on Axioms of set theory, Well orderings and Ordinal Numbers

Short notes on Axioms of set theory, Well orderings and Ordinal Numbers Short notes on Axioms of set theory, Well orderings and Ordinal Numbers August 29, 2013 1 Logic and Notation Any formula in Mathematics can be stated using the symbols and the variables,,,, =, (, ) v j

More information

Quivers. Virginia, Lonardo, Tiago and Eloy UNICAMP. 28 July 2006

Quivers. Virginia, Lonardo, Tiago and Eloy UNICAMP. 28 July 2006 Quivers Virginia, Lonardo, Tiago and Eloy UNICAMP 28 July 2006 1 Introduction This is our project Throughout this paper, k will indicate an algeraically closed field of characteristic 0 2 Quivers 21 asic

More information

Part V. 17 Introduction: What are measures and why measurable sets. Lebesgue Integration Theory

Part V. 17 Introduction: What are measures and why measurable sets. Lebesgue Integration Theory Part V 7 Introduction: What are measures and why measurable sets Lebesgue Integration Theory Definition 7. (Preliminary). A measure on a set is a function :2 [ ] such that. () = 2. If { } = is a finite

More information

Lecture 12: Grover s Algorithm

Lecture 12: Grover s Algorithm CPSC 519/619: Quantum Computation John Watrous, University of Calgary Lecture 12: Grover s Algorithm March 7, 2006 We have completed our study of Shor s factoring algorithm. The asic technique ehind Shor

More information

Π( ) Π( ) Π( ) A ε. b b. (d) (c) (a) (b)

Π( ) Π( ) Π( ) A ε. b b. (d) (c) (a) (b) Top-Down Parsing of Conjunctive Languages Alexander Okhotin (okhotin@aha.ru) Faculty of Computational Mathematics and Cyernetics, Moscow State University Astract. This paper generalizes the notion of a

More information

NOTES ON WELL ORDERING AND ORDINAL NUMBERS. 1. Logic and Notation Any formula in Mathematics can be stated using the symbols

NOTES ON WELL ORDERING AND ORDINAL NUMBERS. 1. Logic and Notation Any formula in Mathematics can be stated using the symbols NOTES ON WELL ORDERING AND ORDINAL NUMBERS TH. SCHLUMPRECHT 1. Logic and Notation Any formula in Mathematics can be stated using the symbols,,,, =, (, ) and the variables v j : where j is a natural number.

More information

Canonical Calculi: Invertibility, Axiom expansion and (Non)-determinism

Canonical Calculi: Invertibility, Axiom expansion and (Non)-determinism Canonical Calculi: Invertibility, Axiom expansion and (Non)-determinism A. Avron 1, A. Ciabattoni 2, and A. Zamansky 1 1 Tel-Aviv University 2 Vienna University of Technology Abstract. We apply the semantic

More information

Lecture 6 January 15, 2014

Lecture 6 January 15, 2014 Advanced Graph Algorithms Jan-Apr 2014 Lecture 6 January 15, 2014 Lecturer: Saket Sourah Scrie: Prafullkumar P Tale 1 Overview In the last lecture we defined simple tree decomposition and stated that for

More information

To this purpose, ordinary transition systems have een extended in the literature in several ways. From the operational point of view, certain commutin

To this purpose, ordinary transition systems have een extended in the literature in several ways. From the operational point of view, certain commutin Electronic Notes in Theoretical Computer Science 7 (1997) URL: http://www.elsevier.nl/locate/entcs/volume7.html 26 pages Tiles for Concurrent and Located Calculi? GianLuigi Ferrari Dipartimento di Informatica,

More information

Proof Theoretical Studies on Semilattice Relevant Logics

Proof Theoretical Studies on Semilattice Relevant Logics Proof Theoretical Studies on Semilattice Relevant Logics Ryo Kashima Department of Mathematical and Computing Sciences Tokyo Institute of Technology Ookayama, Meguro, Tokyo 152-8552, Japan. e-mail: kashima@is.titech.ac.jp

More information

The efficiency of identifying timed automata and the power of clocks

The efficiency of identifying timed automata and the power of clocks The efficiency of identifying timed automata and the power of clocks Sicco Verwer a,b,1,, Mathijs de Weerdt b, Cees Witteveen b a Eindhoven University of Technology, Department of Mathematics and Computer

More information

Making the unobservable, unobservable

Making the unobservable, unobservable ICE 2008 Making the unobservable, unobservable Julian Rathke ecs, University of Southampton awe l Sobociński 1 ecs, University of Southampton Abstract Behavioural equivalences of various calculi for modelling

More information

Robot Position from Wheel Odometry

Robot Position from Wheel Odometry Root Position from Wheel Odometry Christopher Marshall 26 Fe 2008 Astract This document develops equations of motion for root position as a function of the distance traveled y each wheel as a function

More information

Temporal logics and explicit-state model checking. Pierre Wolper Université de Liège

Temporal logics and explicit-state model checking. Pierre Wolper Université de Liège Temporal logics and explicit-state model checking Pierre Wolper Université de Liège 1 Topics to be covered Introducing explicit-state model checking Finite automata on infinite words Temporal Logics and

More information

Merging and splitting endowments in object assignment problems

Merging and splitting endowments in object assignment problems Merging and splitting endowments in oject assignment prolems Nanyang Bu, Siwei Chen, and William Thomson April 26, 2012 1 Introduction We consider a group of agents, each endowed with a set of indivisile

More information

Compositional Abstractions for Interacting Processes

Compositional Abstractions for Interacting Processes Proceedings of the International Multiconference on Computer Science and Information Technology pp. 745 754 ISSN 1896-7094 c 2007 PIPS Compositional Abstractions for Interacting Processes Maciej Koutny

More information

Online Supplementary Appendix B

Online Supplementary Appendix B Online Supplementary Appendix B Uniqueness of the Solution of Lemma and the Properties of λ ( K) We prove the uniqueness y the following steps: () (A8) uniquely determines q as a function of λ () (A) uniquely

More information

Automata Theory and Formal Grammars: Lecture 1

Automata Theory and Formal Grammars: Lecture 1 Automata Theory and Formal Grammars: Lecture 1 Sets, Languages, Logic Automata Theory and Formal Grammars: Lecture 1 p.1/72 Sets, Languages, Logic Today Course Overview Administrivia Sets Theory (Review?)

More information

A short proof that O 2 is an MCFL

A short proof that O 2 is an MCFL A short proof that O 2 is an MCFL Mark-Jan Nederhof School of Computer Science University of St Andrews, UK Astract We present a new proof that O 2 is a multiple context-free language. It contrasts with

More information

The complexity of unary tiling recognizable picture languages: nondeterministic and unambiguous cases

The complexity of unary tiling recognizable picture languages: nondeterministic and unambiguous cases Fundamenta Informaticae X (2) 1 20 1 IOS Press The complexity of unary tiling recognizale picture languages: nondeterministic and unamiguous cases Alerto Bertoni Massimiliano Goldwurm Violetta Lonati Dipartimento

More information