Mathematik / Informatik

Size: px
Start display at page:

Download "Mathematik / Informatik"

Transcription

1 .. UNIVERSITAT TRIER Mathematik / Informatik Forschungsbericht Nr Fast and Simple Nested Fixpoints Helmut Seidl FB IV { Informatik Universitat Trier D{54286 Trier, Germany seidl@psi.uni-trier.de Electronic copies of technical reports are available: Printed copies: Via FTP: Via WWW: Via URL ftp://ftp.informatik.uni-trier.de/pub/users-root/reports URL Send a mail to ftpmail@ftp.informatik.uni-trier.de, subject HELP, for detailed instructions Trierer Forschungsberichte Fachbereich IV - Mathematik / Informatik.. Universitat Trier D Trier ISSN

2 Fast and Simple Nested Fixpoints Helmut Seidl FB IV { Informatik Universitat Trier D{54286 Trier, Germany seidl@psi.uni-trier.de March 1, 1996 Abstract We give an alternative proof of the result of Long et al. in [11] that nested xpoint expressions e of alternation depth d > 0 can be evaluated over a complete lattice of height h in time O((h jej) d=2+2 ). The advantage of our proof is that it is both extremely short and extremely simple. 1 Introduction Since Kozen's seminal paper [10] on modal { calculus in 1983, this logic has been widely used for the specication of properties of concurrent processes (see, e.g., [12, 13]). Especially, the model checking problem, i.e., the question to determine whether or not a given system satises a formula, has attracted attention. In [7], Emerson and Lei presented an algorithm where the exponent in the worstcase complexity is given by d + 1 where d is the alternation depth of the formula to be veried. Their method has been rened by Cleaveland, Klein and Steen [6]. For formulas of alternation depth 0, even linear algorithms have been proposed (see, e.g., [2], [1] or [5]). For other important fragments of {calculus, Emerson, Jutla and Sistla exhibited polynomial algorithms [8]. A major improvement in the general case has been achieved by Long et al. [11]. They pointed out that the exponent in the worst case complexity can be lowered even to \about" d=2+1. Their paper explains the method for certain special kinds of formulas. Nevertheless, the argumentation is non{trivial and involved. Their result itself, however, is (at least to our opinion) so important that a simpler explanation is worthwhile. In fact, our argumentation turns out to be almost trivial. Our idea consists in removing one sort of xpoint iterations simply by syntactical iteration, i.e., unfolding. The whole art consists in doing so without overly increasing the size of the resulting system. 1 To make our idea precise, this short note is organized as follows. Section 2 introduces basic notions concerning (hierarchical) systems of equations. Section 3 deals with the case of alternation depth 0. Section 4 formalizes our idea of syntactical removal of xpoint iterations and derives the main result. Section 5 contains a brief discussion of our method and concludes. 2 A Fixpoint Calculus In essence, the model checking problem for { formulas boils down to the evaluation of a xpoint expression like x 1 :f 1 (x 2 :f 2 (h(x 1 ); x 2 ); y:g(h(x 1 ); y) over some nite complete lattice. Instead of dening such kinds of expressions (together with their semantics) formally, we prefer to introduce the slightly more exible concept of

3 hierarchical systems of equations. By a subsequent example, we hope to convince the reader that xpoint expressions very easily can be translated into our formalism. Assume we are given a nite complete lattice D of height h, i.e., the maximal number of elements in a strictly increasing sequence d d : : d h in D equals h + 1. Let denote a set of operator symbols where each f 2 denotes a monotonic function [f ] : D k! D for some k 1. As right hand sides of equations we allow expressions built up from formal variables from some set Y and constants by application of operators from. The set of all these expressions is denoted by E [D (Y). Every expression f 2 E [D (Y) denotes a function [f ] : (Y! D)! D. This function is monotonic since all operations in are monotonic. A hierarchical system of equations with free variables from F is a pair (S; H). S is the basic set of equations x = f x ; x 2 X, where for every x, f x is an expression in E [D (X [ F), and H is a hierarchy on X. A hierarchy consists of a sequence H = (hx k ; k i; : : : ; hx 1 ; 1 i) of mutually disjoint nonempty sets X j where X X 1 [ : : : [ X k together with qualications j 2 f; g. Intuitively, hierarchy H on S is introduced in order to reect the nesting of scopes of variables within which xpoint iteration is performed. The set X 0 = X n(x 1 [ : : : [ X k ) represents the \non{recursive" auxiliary variables. Therefore, we assume a partial ordering \" on x 2 X 0 such that y 2 X 0 occurs in right hand side f x ; x 2 X 0 only if y < x. Fixpoint iteration is (potentially) performed on the variables in X 1 [ : : : [ X k. These are therefore also called iteration variables. Example 1 Assume we are given a xpoint expression like x 1 :f 1 (x 2 :f 2 (h(x 1 ); x 2 ); y:g(h(x 1 ); y) A representation of this formula by a hierarchical system is obtained by introducing an extra 2 equation for each xpoint subexpression. For our example this gives set S consisting of: x 1 = f 1 (x 2 ; y) x 2 = f 2 (h(x 1 ); x 2 ) y = g(h(x 1 ); y) Hierarchy H now is obtained by dividing the set of xpoint variables of into \layers" within which only xpoints of the same kind occur. Thus for our example formula, H = (hx 2 ; i; hx 1 ; i) where X 1 = fyg and X 2 = fx 1 ; x 2 g. Auxiliary variables can be introduced for returning the result for the whole formula (in case it does not have a xpoint on top level) or to remove multiple occurrences of the same subexpression. In our example, we could introduce a fresh auxiliary variable z to receive the value for h(x 1 ). This results in the following set of equations: x 1 = f 1 (x 2 ; y) x 2 = f 2 (z; x 2 ) y = g(z; y) z = h(x 1 ) Usually, if H is understood, we write S for the hierarchical system. We also denote the fact that X j is qualied with j by X j : j. Fix some 0 j k, and let X 0 = X 0 [ : : :[X j. Then the j{th subsystem S j of S is given by the base set of equations x = f x ; x 2 X 0 ; together with hierarchy H j = (hx j ; j i; : : : ; hx 1 ; 1 i). Note that the free variables of S j are contained in F [ X j+1 [ : : : [ X k. An environment for S is a mapping : F! D. The solution of S relative to environment in D, denoted by [S ], is a mapping X! D. It is dened by induction on length k of hierarchy H. If k = 0, then no xpoint iteration is necessary. Values [S ] x; x 2 X 0 i, are simply obtained by successively evaluating right hand sides according to ordering \". For k > 0, let X 0 = X nx k and S k?1 denote the (k? 1){th subsystem of S. Dene 2

4 R : (F [X k! D)! X 0! D by R (+) x = [[S k?1 ]] ( + ) x whenever x 2 X 0. Note that we use the \+"{operator to combine two functions with disjoint domains into one. Consider monotonic function G : (X k! D)! X k! D given by G x = [f x ] ( + + R ( + )). In case X k is qualied as, let denote the least xpoint of G. Otherwise, let denote the greatest xpoint of G. Then [S ] is dened by [[S]] x = x if x 2 X k and [[S]] x = [[S k?1 ] ( + ) x if x 2 X 0. Fact 1 Assume k > 1 and S is system of equation with hierarchy H given by (hx k ; k i; hx k?1 ; k?1 i; : : : ; hx 1 ; 1 i). If k = k?1 then for every environment, S together with H has the same solution as S together with hierarchy (hx k [ X k?1 ; k i; hx k?2 ; k?2 i; : : : ; hx 1 ; 1 i). 2 Proposition 2 Given a system S of alternation depth 0 and environment for the free variables in S, the solution of S can be computed in time O(h jsj). 2 4 Syntactical Removal of Fixpoint Iterations The idea of our algorithm is based on the trivial observation that in a lattice of height h, the least xpoint is reached after at most h iterations. Dene the n{th iterate of g on d by g 0 d = d and for n > 0, g n d = g(g n?1 d). We have: Observation 3 If g : D! D is monotonic then the least xpoint (resp. greatest xpoint) of g is given by g h? (resp. g h >). 2 It follows that we can always remove successive occurrences of 's or 's in the hierarchy until we end up with a hierarchy (hx k ; k i; : : : ; hx 1 ; 1 i) where j 6= j?1 for all j > 1. Systems with this property are called normalized. If k is the length of the hierarchy of a normalized system then k?1 is also called its alternation depth. 3 Systems with Alternation Depth 0 For simplicity, let us assume that our algorithm is implemented on a Random Access Machine with uniform cost measure, i.e., storing and retrieving elements from D, comparing elements from D for equality and applying operators from are all counted for 1. Accordingly, P we dene the size of system S as jsj = x2x 1 + jf x j. In case the alternation depth of system S equals 0, computation of the solution reduces to the task of computing the least (resp. greatest) solution of an ordinary system of equations over complete lattice D. This can be done by an standard worklist algorithm. We conclude: The same observation holds true for monotonic mapping g : (Y! d)! (Y! d) if exponent h is replaced with exponent q = h #Y. So let S denote a normalized system of alternation depth k with hierarchy (hx k+1 ; k+1 i; : : : ; hx 1 ; 1 i). For every n 1 and : X k+1! D, we construct system S n () with alternation depth k?1. S n () is obtained from S by (syntactically) unroling the iteration on the variables in X k+1. 3 Dene X 00 = fhx; ji j x 2 X ; 0 j < ng, and X 0 = X [ X 00. S n () consists of the equations x = f 0 x ; x 2 X 0, together with hierarchy (hx 0 k; k i; : : : ; hx 0 1; 1 i) where for j = 1; : : : ; k, X 0 j = X j [ fhx; ii j x 2 X j ; 0 i < ng. The right hand sides f 0 x of the equations are dened as follows. If x 2 X k+1, then fx 0 is obtained from f x by replacing each occurrence of variable y 2 X through hy; n? 1i; f 0 = x, and hx;0i for j > 0, f 0 hx;ji is obtained from f x by replacing each occurrence of variables y through hy; j? 1i;

5 If x 2 X nx k+1, then f 0 x f x, and for all j, f 0 hx;ji is obtained from f x by replacing each occurrence of y 2 X with hy; ji. Intuitively, S n () is obtained by taking n extra copies of S. The variables hx; ji, x 2 X k+1, are meant to receive the j{th iteration for variable x. hx; 0i receives the start value x for the iteration whereas for j > 0, the value of hx; ji is computed relative to the values of hx i 0; j? 1i, i.e., the former approximations. Finally, variables x receive the values of the n{th approximation. Example 2 Consider the system of equations from our last example and assume we are going to compute its solution over lattice D = 1g with height 1. Removing least xpoint iteration on fx 1 ; x 2 g results in: x 1 = f 1 (hx 2 ; 1i; hy; 1i) x 2 = f 2 (hz; 1i; hx 2 ; 1i) hx 1 ; 1i = f 1 (hx; 0i; hy; 0i) hx 2 ; 1i = f 2 (hz; 0i; hx; 0i) hx 1 ; 0i =? hx 2 ; 0i =? y = g(z; y) hy; 1i = g(hz; 1i; hy; 1i) hy; 0i = g(hz; 0i; hy; 0i) z = h(x 1 ) hz; 1i = h(hx 1 ; 1i) hz; 0i = h(hx; 0i) with hierarchy H = (hx 1 ; i) where X 1 = fy; hy; 1i; hy; 0ig. Note that variables x i ; hx i ; ji now have become auxiliary js n ()j (n + 1) jsj. 2. S n () can be constructed from S in time O((n + 1) jsj). 3. If h #X k+1 n and X k+1 : then [S ] x = [S n (?)] x for all x 2 X where variable assignment? maps every x 2 X k+1 to?. In case X k+1 :, the same holds true if? is replaced with >, mapping every x 2 X k+1 to >. 2 We combine Fact 1 together with Prop. 4 to derive our main Theorem: Theorem 1 Assume S is a normalized hierarchical system of alternation depth d > 0 with n iteration variables. Then there exists a system S 0 of alternation depth 0 with identical set of free variables such that the following holds: 1. If d is odd, js 0 j ( hn d+1 + 1)(d+1)=2 jsj; If d is even, js 0 j ( hn d + 1)d=2+1 jsj; 2. js 0 j can be constructed in time proportional to its size; 3. [S ] x = [S 0 ] x for every environment and every variable x of S. Proof. Iteratedly applying Prop. 4 to the subsystems of S we either may remove from the hierarchy all subsets qualied with or all subsets qualied with. Subsequent normalization according to Fact 1 yields the desired system S 0. It remains to estimate the size of S 0. Let n 1 ; : : : ; n s be the sequence of sizes of the sets in the hierarchy qualied as and m 1 ; : : : ; m t the corresponding sequence for sets qualied as. If we remove all sets qualied from the hierarchy, we obtain from Prop. 4: We have: Proposition 4 Let be an environment for S (and hence also for each S n ()). Then the following holds: 4 js 0 j (n 1 h + 1) (n s h + 1) jsj Likewise, if we remove all sets qualied from the hierarchy, we obtain js 0 j (m 1 h + 1) (m t h + 1) jsj

6 We may remove that kind of qualication where sizes sum up to n=2. W.l.o.g. assume that this is again the case for, i.e., n 1 + : : : + n s n. First assume d is odd. Then s = t = (d + 1)=2. Hence, (n 1 h + 1) (n s h + 1) ( nh 2s + 1)s ( nh d )(d+1)=2 Now consider the case where d is even. Since s + t = d + 1 and js? tj 1, we have: d=2 s; t d= Therefore, (n 1 h + 1) (n s h + 1) ( nh 2s + 1)s and our assertion follows. ( nh d Finally applying Prop. 2, we conclude: + 1)d=2+1 Corollary 2 The solution of a normalized system S of alternation depth d > 0 and with n iteration variables can be computed in time O(( hn d + 1)d=2+1 h jsj). 2 Corollary 3 A xpoint expression e with alternation depth d > 0 and n occurrences of or can be evaluated in time O(( hn d +1)d=2+1 h jej). 2 5 Discussion and Conclusion We presented a simple method for computing the solution of hierarchical system S of equations. The algorithm has the same or even slightly better estimation of its worstcase complexity than the one sketched in [11]. Additional benet is gained from the new distinction between iteration variables and auxiliary ones. In light of our exposition, the algorithmic idea of Long et al. in [11] can be interpreted as evaluating system S 0 (which we constructed by syntactical xpoint removal) without explicitly 5 constructing S 0. Their hope is that usually xpoints are reached after much fewer iterations than theoretically possible. It seems, however, that this potential gain may as well be achieved by our method if we do not construct S 0 in advance but create an algorithmic description of it and apply some general demand{driven equation solver (e.g., the one from [9]) which builds up the system to be evaluated \by need". Acknowledgement: Many thanks to Andre Arnold whose patiently listened to rough sketches of the ideas and encouraged submission for publication. 6 References [1] H.R. Andersen: Model Checking and Boolean Graphs. Proc. ESOP'92, LNCS 582, 1{19, 1992 [2] A. Arnold, P. Crubille: A Linear Time Algorithm for Solve Fixpoint Equations on Transition Systems. Inf. Proc. Letters (29), 57{66, 1988 [3] O. Bernholtz, M.V. Vardi, P. Wolper: An Automata{Theoretic Approach to Branching{ Time Model Checking (Extended Abstract). Proc. Conf. Computer Aided Verication, LNCS 818, 142{155, 1994 [4] J.R. Burch, E.M. Clarke, K.L. McMillan: Symbolic Model Checking States and Beyond. Inf. and Comput. 98, 142{170, 1992 [5] R. Cleaveland, B. Steen: A Linear Time Model Checking Algorithm for the Alternation{Free Modal {Calculus. Proc. 3rd CAV'91, LNCS 575, 1991 [6] R. Cleaveland, M. Klein, B. Steen: Faster Model Checking for the Modal {Calculus. Proc. of fourth CAV'92, LNCS 663, 410{422, 1996 [7] E.A. Emerson, C.{L. Lei: Ecient Modell Checking in Fragments of the Propositional { Calculus. Proc. 1st IEEE Symp. on Logic in Computer Science, 267{278, 1986 [8] E.A. Emerson, C.S. Jutla, A.P. Sistla: On Model{Checking for Fragments of {Calculus. Proc. Conf. on Computer Aided Verication, LNCS 697, 385{396, 1993

7 [9] C. Fecht, H. Seidl: An Even More Ecient Solver for General Systems of Equations. Tech. Report Saarbrucken and Trier, 1996 [10] D. Kozen: Results on the Propositional { Calculus. TCS 27, 333{354, 1983 [11] D.E. Long, A. Browne, E.M. Clarke, S. Jha, W.R. Marrero: An Improved Algorithm for the Evaluation of Fixpoint Expressions. Proc. Conf. on Computer Aided Verication, LNCS 818, 338{350, 1994 [12] C. Stirling: Modal and Temporal Logics. In: S. Abramsky, D. Gabbay, and T. Maibaum (eds.): Handbook of Logic in Computer Science, 477{563, 1992 [13] M.Y. Vardi: A Temporal Fixpoint Calculus. Proc. 15th POPL, 250{259, 1988 [14] M.Y. Vardi, P. Wolper: Automata{Theoretic Techniques for Modal Logics of Programs. JCSS 32, 183{221,

Model Checking Real-Time Properties. of Symmetric Systems? E. Allen Emerson and Richard J. Treer. Computer Sciences Department and

Model Checking Real-Time Properties. of Symmetric Systems? E. Allen Emerson and Richard J. Treer. Computer Sciences Department and Model Checking Real-Time Properties of Symmetric Systems? E. Allen Emerson and Richard J. Treer Computer Sciences Department and Computer Engineering Research Center University of Texas, Austin, TX, 78712,

More information

of concurrent and reactive systems is now well developed [2] as well as a deductive methodology for proving their properties [3]. Part of the reason f

of concurrent and reactive systems is now well developed [2] as well as a deductive methodology for proving their properties [3]. Part of the reason f A New Decidability Proof for Full Branching Time Logic CPL N.V. Shilov Research On Program Analysis System (ROPAS) Department of Computer Science Korean Advanced Institute of Science and Technology (KAIST)

More information

Precise Relational Invariants Through Strategy Iteration

Precise Relational Invariants Through Strategy Iteration Precise Relational Invariants Through Strategy Iteration Thomas Gawlitza and Helmut Seidl TU München, Institut für Informatik, I2 85748 München, Germany {gawlitza, seidl}@in.tum.de Abstract. We present

More information

Helsinki University of Technology Laboratory for Theoretical Computer Science Research Reports 99

Helsinki University of Technology Laboratory for Theoretical Computer Science Research Reports 99 Helsinki University of Technology Laboratory for Theoretical Computer Science Research Reports 99 Teknillisen korkeakoulun tietojenkäsittelyteorian laboratorion tutkimusraportti 99 Espoo 2005 HUT-TCS-A99

More information

Polynomial Precise Interval Analysis Revisited

Polynomial Precise Interval Analysis Revisited Polynomial Precise Interval Analysis Revisited Thomas Gawlitza 1, Jérôme Leroux 2, Jan Reineke 3, Helmut Seidl 1, Grégoire Sutre 2, and Reinhard Wilhelm 3 1 TU München, Institut für Informatik, I2 80333

More information

Diagram-based Formalisms for the Verication of. Reactive Systems. Anca Browne, Luca de Alfaro, Zohar Manna, Henny B. Sipma and Tomas E.

Diagram-based Formalisms for the Verication of. Reactive Systems. Anca Browne, Luca de Alfaro, Zohar Manna, Henny B. Sipma and Tomas E. In CADE-1 Workshop on Visual Reasoning, New Brunswick, NJ, July 1996. Diagram-based Formalisms for the Verication of Reactive Systems Anca Browne, Luca de Alfaro, Zohar Manna, Henny B. Sipma and Tomas

More information

of acceptance conditions (nite, looping and repeating) for the automata. It turns out,

of acceptance conditions (nite, looping and repeating) for the automata. It turns out, Reasoning about Innite Computations Moshe Y. Vardi y IBM Almaden Research Center Pierre Wolper z Universite de Liege Abstract We investigate extensions of temporal logic by connectives dened by nite automata

More information

Fixpoint Extensions of Temporal Description Logics

Fixpoint Extensions of Temporal Description Logics Fixpoint Extensions of Temporal Description Logics Enrico Franconi Faculty of Computer Science Free University of Bozen-Bolzano, Italy franconi@inf.unibz.it David Toman School of Computer Science University

More information

Model Checking in the Propositional µ-calculus

Model Checking in the Propositional µ-calculus Model Checking in the Propositional µ-calculus Ka I Violet Pun INF 9140 - Specification and Verification of Parallel Systems 13 th May, 2011 Overview Model Checking is a useful means to automatically ascertain

More information

Model Checking and Transitive-Closure Logic? Abstract. We give a linear-time algorithm to translate any formula

Model Checking and Transitive-Closure Logic? Abstract. We give a linear-time algorithm to translate any formula Model Checking and Transitive-Closure Logic? Neil Immerman??1 and Moshe Y. Vardi???2 1 Computer Science Dept., University of Massachusetts, Amherst, MA 01003, http://www.cs.umass.edu/immerman, immerman@cs.umass.edu

More information

Fuzzy Limits of Functions

Fuzzy Limits of Functions Fuzzy Limits of Functions Mark Burgin Department of Mathematics University of California, Los Angeles 405 Hilgard Ave. Los Angeles, CA 90095 Abstract The goal of this work is to introduce and study fuzzy

More information

CS357: CTL Model Checking (two lectures worth) David Dill

CS357: CTL Model Checking (two lectures worth) David Dill CS357: CTL Model Checking (two lectures worth) David Dill 1 CTL CTL = Computation Tree Logic It is a propositional temporal logic temporal logic extended to properties of events over time. CTL is a branching

More information

Compositionality in SLD-derivations and their abstractions Marco Comini, Giorgio Levi and Maria Chiara Meo Dipartimento di Informatica, Universita di

Compositionality in SLD-derivations and their abstractions Marco Comini, Giorgio Levi and Maria Chiara Meo Dipartimento di Informatica, Universita di Compositionality in SLD-derivations and their abstractions Marco Comini Giorgio Levi and Maria Chiara Meo Dipartimento di Informatica Universita di Pisa Corso Italia 40 56125 Pisa Italy fcomini levi meog@di.unipi.it

More information

Splitting a Default Theory. Hudson Turner. University of Texas at Austin.

Splitting a Default Theory. Hudson Turner. University of Texas at Austin. Splitting a Default Theory Hudson Turner Department of Computer Sciences University of Texas at Austin Austin, TX 7872-88, USA hudson@cs.utexas.edu Abstract This paper presents mathematical results that

More information

Linear Temporal Logic and Büchi Automata

Linear Temporal Logic and Büchi Automata Linear Temporal Logic and Büchi Automata Yih-Kuen Tsay Department of Information Management National Taiwan University FLOLAC 2009 Yih-Kuen Tsay (SVVRL @ IM.NTU) Linear Temporal Logic and Büchi Automata

More information

Model Checking for the -calculus. Paolo Zuliani , Spring 2011

Model Checking for the -calculus. Paolo Zuliani , Spring 2011 Model Checking for the -calculus Paolo Zuliani 15-817, Spring 2011 Outline What is the -calculus? Semantics Model Checking algorithms [Other fixpoint theorems] The -calculus A language for describing properties

More information

Chapter 6: Computation Tree Logic

Chapter 6: Computation Tree Logic Chapter 6: Computation Tree Logic Prof. Ali Movaghar Verification of Reactive Systems Outline We introduce Computation Tree Logic (CTL), a branching temporal logic for specifying system properties. A comparison

More information

Computing Game Values for Crash Games

Computing Game Values for Crash Games Computing Game Values for Crash Games Thomas Gawlitza and Helmut Seidl TU München, Institut für Informatik, I2 85748 München, Germany {gawlitza, seidl}@in.tum.de Abstract. We consider crash games which

More information

Electronic Notes in Theoretical Computer Science 18 (1998) URL: 8 pages Towards characterizing bisim

Electronic Notes in Theoretical Computer Science 18 (1998) URL:   8 pages Towards characterizing bisim Electronic Notes in Theoretical Computer Science 18 (1998) URL: http://www.elsevier.nl/locate/entcs/volume18.html 8 pages Towards characterizing bisimilarity of value-passing processes with context-free

More information

2 PLTL Let P be a set of propositional variables. The set of formulae of propositional linear time logic PLTL (over P) is inductively dened as follows

2 PLTL Let P be a set of propositional variables. The set of formulae of propositional linear time logic PLTL (over P) is inductively dened as follows Translating PLTL into WSS: Application Description B. Hirsch and U. Hustadt Department of Computer Science, University of Liverpool Liverpool L69 7ZF, United Kingdom, fb.hirsch,u.hustadtg@csc.liv.ac.uk

More information

Partial model checking via abstract interpretation

Partial model checking via abstract interpretation Partial model checking via abstract interpretation N. De Francesco, G. Lettieri, L. Martini, G. Vaglini Università di Pisa, Dipartimento di Ingegneria dell Informazione, sez. Informatica, Via Diotisalvi

More information

The Stevens-Stirling-Algorithm For Solving Parity Games Locally Requires Exponential Time

The Stevens-Stirling-Algorithm For Solving Parity Games Locally Requires Exponential Time The Stevens-Stirling-Algorithm For Solving Parity Games Locally Requires Exponential Time Oliver Friedmann Institut für Informatik, LMU München Oliver.Friedmann@googlemail.com Abstract. This paper presents

More information

Weak ω-automata. Shaked Flur

Weak ω-automata. Shaked Flur Weak ω-automata Shaked Flur Weak ω-automata Research Thesis Submitted in partial fulllment of the requirements for the degree of Master of Science in Computer Science Shaked Flur Submitted to the Senate

More information

Mathematik / Informatik

Mathematik / Informatik .. UNIVERSITAT TRIER Mathematik / Informatik Forschungsbericht Nr. 95{11 On communication games with more than two players Stasys Jukna Electronic copies of technical reports are available: Via FTP: Host

More information

Model checking the basic modalities of CTL with Description Logic

Model checking the basic modalities of CTL with Description Logic Model checking the basic modalities of CTL with Description Logic Shoham Ben-David Richard Trefler Grant Weddell David R. Cheriton School of Computer Science University of Waterloo Abstract. Model checking

More information

On the Complexity of the Reflected Logic of Proofs

On the Complexity of the Reflected Logic of Proofs On the Complexity of the Reflected Logic of Proofs Nikolai V. Krupski Department of Math. Logic and the Theory of Algorithms, Faculty of Mechanics and Mathematics, Moscow State University, Moscow 119899,

More information

PROPOSITIONAL MIXED LOGIC: ITS SYNTAX AND SEMANTICS

PROPOSITIONAL MIXED LOGIC: ITS SYNTAX AND SEMANTICS PROPOSITIONAL MIXED LOGIC: ITS SYNTAX AND SEMANTICS Karim NOUR 1 and Abir NOUR 2 Abstract In this paper, we present a propositional logic (called mixed logic) containing disjoint copies of minimal, intuitionistic

More information

EAHyper: Satisfiability, Implication, and Equivalence Checking of Hyperproperties

EAHyper: Satisfiability, Implication, and Equivalence Checking of Hyperproperties EAHyper: Satisfiability, Implication, and Equivalence Checking of Hyperproperties Bernd Finkbeiner, Christopher Hahn, and Marvin Stenger Saarland Informatics Campus, Saarland University, Saarbrücken, Germany

More information

Part II. Logic and Set Theory. Year

Part II. Logic and Set Theory. Year Part II Year 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2018 60 Paper 4, Section II 16G State and prove the ǫ-recursion Theorem. [You may assume the Principle of ǫ- Induction.]

More information

On Boolean Encodings of Transition Relation for Parallel Compositions of Transition Systems

On Boolean Encodings of Transition Relation for Parallel Compositions of Transition Systems On Boolean Encodings of Transition Relation for Parallel Compositions of Transition Systems Extended abstract Andrzej Zbrzezny IMCS, Jan Długosz University in Częstochowa, Al. Armii Krajowej 13/15, 42-2

More information

Equational Logic. Chapter Syntax Terms and Term Algebras

Equational Logic. Chapter Syntax Terms and Term Algebras Chapter 2 Equational Logic 2.1 Syntax 2.1.1 Terms and Term Algebras The natural logic of algebra is equational logic, whose propositions are universally quantified identities between terms built up from

More information

Wojciech Penczek. Polish Academy of Sciences, Warsaw, Poland. and. Institute of Informatics, Siedlce, Poland.

Wojciech Penczek. Polish Academy of Sciences, Warsaw, Poland. and. Institute of Informatics, Siedlce, Poland. A local approach to modal logic for multi-agent systems? Wojciech Penczek 1 Institute of Computer Science Polish Academy of Sciences, Warsaw, Poland and 2 Akademia Podlaska Institute of Informatics, Siedlce,

More information

On the Complexity of Bounded-Variable Queries. (Extended Abstract) Moshe Y. Vardi. Rice University

On the Complexity of Bounded-Variable Queries. (Extended Abstract) Moshe Y. Vardi. Rice University On the Complexity of Bounded-Variable Queries (Extended Abstract) Moshe Y. Vardi Rice University Abstract It is known that the expression complexity and combined complexity of query evaluation in relational

More information

Moshe Y. Vardi y. IBM Almaden Research Center. Abstract. We present an automata-theoretic framework to the verication of concurrent

Moshe Y. Vardi y. IBM Almaden Research Center. Abstract. We present an automata-theoretic framework to the verication of concurrent Verication of Concurrent Programs: The Automata-Theoretic Framework Moshe Y. Vardi y IBM Almaden Research Center Abstract We present an automata-theoretic framework to the verication of concurrent and

More information

1 CHAPTER 1 INTRODUCTION 1.1 Background One branch of the study of descriptive complexity aims at characterizing complexity classes according to the l

1 CHAPTER 1 INTRODUCTION 1.1 Background One branch of the study of descriptive complexity aims at characterizing complexity classes according to the l viii CONTENTS ABSTRACT IN ENGLISH ABSTRACT IN TAMIL LIST OF TABLES LIST OF FIGURES iii v ix x 1 INTRODUCTION 1 1.1 Background : : : : : : : : : : : : : : : : : : : : : : : : : : : : 1 1.2 Preliminaries

More information

Moshe Y. Vardi y. Rice University. LTL formula, can be translated to an alternationfree. -calculus formula, and describe the translation,

Moshe Y. Vardi y. Rice University. LTL formula, can be translated to an alternationfree. -calculus formula, and describe the translation, Freedom, Weakness, and Determinism: From Linear-time to Branching-time Orna Kupferman UC Berkeley Moshe Y. Vardi y Rice University Abstract Model checking is a method for the verication of systems with

More information

2 Z. Lonc and M. Truszczynski investigations, we use the framework of the xed-parameter complexity introduced by Downey and Fellows [Downey and Fellow

2 Z. Lonc and M. Truszczynski investigations, we use the framework of the xed-parameter complexity introduced by Downey and Fellows [Downey and Fellow Fixed-parameter complexity of semantics for logic programs ZBIGNIEW LONC Technical University of Warsaw and MIROS LAW TRUSZCZYNSKI University of Kentucky A decision problem is called parameterized if its

More information

Solving Disjunctive/Conjunctive Boolean Equation Systems with Alternating Fixed Points

Solving Disjunctive/Conjunctive Boolean Equation Systems with Alternating Fixed Points Solving Disjunctive/Conjunctive Boolean Equation Systems with Alternating Fixed Points Jan Friso Groote 2,3 and Misa Keinänen 1,3 1 Dept. of Computer Science and Engineering, Lab. for Theoretical Comp.

More information

Real-Time Logics: Fictitious Clock as an Abstraction of Dense Time Jean-Francois Raskin and Pierre-Yves Schobbens Computer

Real-Time Logics: Fictitious Clock as an Abstraction of Dense Time Jean-Francois Raskin and Pierre-Yves Schobbens Computer Facultes Universitaires Notre-Dame de la Paix Namur, Belgium Institut d'informatique Rue Grandgagnage, 21 B-5000 Namur BELGIUM Real-Time Logics: Fictitious Clock as an Abstraction of Dense Time Jean-Francois

More information

PSPACE-completeness of LTL/CTL model checking

PSPACE-completeness of LTL/CTL model checking PSPACE-completeness of LTL/CTL model checking Peter Lohmann April 10, 2007 Abstract This paper will give a proof for the PSPACE-completeness of LTLsatisfiability and for the PSPACE-completeness of the

More information

In a second part, we concentrate on interval models similar to the traditional ITL models presented in [, 5]. By making various assumptions about time

In a second part, we concentrate on interval models similar to the traditional ITL models presented in [, 5]. By making various assumptions about time Complete Proof Systems for First Order Interval Temporal Logic Bruno Dutertre Department of Computer Science Royal Holloway, University of London Egham, Surrey TW0 0EX, United Kingdom Abstract Dierent

More information

SBMC : Symmetric Bounded Model Checking

SBMC : Symmetric Bounded Model Checking SBMC : Symmetric Bounded Model Checing Brahim NASRAOUI LIP2 and Faculty of Sciences of Tunis Campus Universitaire 2092 - El Manar Tunis Tunisia brahim.nasraoui@gmail.com Syrine AYADI LIP2 and Faculty of

More information

Characterising FS domains by means of power domains

Characterising FS domains by means of power domains Theoretical Computer Science 264 (2001) 195 203 www.elsevier.com/locate/tcs Characterising FS domains by means of power domains Reinhold Heckmann FB 14 Informatik, Universitat des Saarlandes, Postfach

More information

Supremum and Infimum

Supremum and Infimum Supremum and Infimum UBC M0 Lecture Notes by Philip D. Loewen The Real Number System. Work hard to construct from the axioms a set R with special elements O and I, and a subset P R, and mappings A: R R

More information

New Complexity Results for Some Linear Counting Problems Using Minimal Solutions to Linear Diophantine Equations

New Complexity Results for Some Linear Counting Problems Using Minimal Solutions to Linear Diophantine Equations New Complexity Results for Some Linear Counting Problems Using Minimal Solutions to Linear Diophantine Equations (Extended Abstract) Gaoyan Xie, Cheng Li and Zhe Dang School of Electrical Engineering and

More information

State-Space Exploration. Stavros Tripakis University of California, Berkeley

State-Space Exploration. Stavros Tripakis University of California, Berkeley EE 144/244: Fundamental Algorithms for System Modeling, Analysis, and Optimization Fall 2014 State-Space Exploration Stavros Tripakis University of California, Berkeley Stavros Tripakis (UC Berkeley) EE

More information

Connectedness. Proposition 2.2. The following are equivalent for a topological space (X, T ).

Connectedness. Proposition 2.2. The following are equivalent for a topological space (X, T ). Connectedness 1 Motivation Connectedness is the sort of topological property that students love. Its definition is intuitive and easy to understand, and it is a powerful tool in proofs of well-known results.

More information

A note on monotone real circuits

A note on monotone real circuits A note on monotone real circuits Pavel Hrubeš and Pavel Pudlák March 14, 2017 Abstract We show that if a Boolean function f : {0, 1} n {0, 1} can be computed by a monotone real circuit of size s using

More information

Reasoning about Strategies: From module checking to strategy logic

Reasoning about Strategies: From module checking to strategy logic Reasoning about Strategies: From module checking to strategy logic based on joint works with Fabio Mogavero, Giuseppe Perelli, Luigi Sauro, and Moshe Y. Vardi Luxembourg September 23, 2013 Reasoning about

More information

Preliminaries. Introduction to EF-games. Inexpressivity results for first-order logic. Normal forms for first-order logic

Preliminaries. Introduction to EF-games. Inexpressivity results for first-order logic. Normal forms for first-order logic Introduction to EF-games Inexpressivity results for first-order logic Normal forms for first-order logic Algorithms and complexity for specific classes of structures General complexity bounds Preliminaries

More information

Parameter Synthesis for Timed Kripke Structures

Parameter Synthesis for Timed Kripke Structures Parameter Synthesis for Timed Kripke Structures Extended Abstract Micha l Knapik 1 and Wojciech Penczek 1,2 1 Institute of Computer Science, PAS, Warsaw, Poland 2 University of Natural Sciences and Humanities,

More information

THE STEVENS-STIRLING-ALGORITHM FOR SOLVING PARITY GAMES LOCALLY REQUIRES EXPONENTIAL TIME

THE STEVENS-STIRLING-ALGORITHM FOR SOLVING PARITY GAMES LOCALLY REQUIRES EXPONENTIAL TIME International Journal of Foundations of Computer Science c World Scientific Publishing Company THE STEVENS-STIRLING-ALGORITHM FOR SOLVING PARITY GAMES LOCALLY REQUIRES EXPONENTIAL TIME OLIVER FRIEDMANN

More information

A Family of Finite De Morgan Algebras

A Family of Finite De Morgan Algebras A Family of Finite De Morgan Algebras Carol L Walker Department of Mathematical Sciences New Mexico State University Las Cruces, NM 88003, USA Email: hardy@nmsuedu Elbert A Walker Department of Mathematical

More information

Weak Alternating Automata and Tree Automata Emptiness

Weak Alternating Automata and Tree Automata Emptiness Weak Alternating Automata and Tree Automata Emptiness Orna Kupferman UC Berkeley Moshe Y. Vardi Rice University Abstract Automata on infinite words and trees are used for specification and verification

More information

Encoding formulas with partially constrained weights in a possibilistic-like many-sorted propositional logic

Encoding formulas with partially constrained weights in a possibilistic-like many-sorted propositional logic Encoding formulas with partially constrained weights in a possibilistic-like many-sorted propositional logic Salem Benferhat CRIL-CNRS, Université d Artois rue Jean Souvraz 62307 Lens Cedex France benferhat@criluniv-artoisfr

More information

Cyclic Proofs for Linear Temporal Logic

Cyclic Proofs for Linear Temporal Logic Cyclic Proofs for Linear Temporal Logic Ioannis Kokkinis Thomas Studer Abstract Annotated sequents provide an elegant approach for the design of deductive systems for temporal logics. Their proof theory,

More information

Entropy and Ergodic Theory Lecture 4: Conditional entropy and mutual information

Entropy and Ergodic Theory Lecture 4: Conditional entropy and mutual information Entropy and Ergodic Theory Lecture 4: Conditional entropy and mutual information 1 Conditional entropy Let (Ω, F, P) be a probability space, let X be a RV taking values in some finite set A. In this lecture

More information

On Elementary Loops of Logic Programs

On Elementary Loops of Logic Programs Under consideration for publication in Theory and Practice of Logic Programming 1 On Elementary Loops of Logic Programs Martin Gebser Institut für Informatik Universität Potsdam, Germany (e-mail: gebser@cs.uni-potsdam.de)

More information

UNIVERSIT A DEGLI STUDI DI PISA DIPARTIMENTO DI INFORMATICA DOTTORATO DI RICERCA IN INFORMATICA Universita di Pisa-Genova-Udine Ph.D. Thesis Verication of Temporal and Real-Time Properties of Statecharts

More information

Abstraction in Program Analysis & Model Checking. Abstraction in Model Checking. Motivations & Results

Abstraction in Program Analysis & Model Checking. Abstraction in Model Checking. Motivations & Results On Completeness in Abstract Model Checking from the Viewpoint of Abstract Interpretation Abstraction in Program Analysis & Model Checking Abstract interpretation has been successfully applied in: static

More information

Loop Formulas for Disjunctive Logic Programs

Loop Formulas for Disjunctive Logic Programs Nineteenth International Conference on Logic Programming (ICLP-03), pages 451-465, Mumbai, India, 2003 Loop Formulas for Disjunctive Logic Programs Joohyung Lee and Vladimir Lifschitz Department of Computer

More information

Towards a quantum calculus

Towards a quantum calculus QPL 2006 Preliminary Version Towards a quantum calculus (work in progress, extended abstract) Philippe Jorrand 1 Simon Perdrix 2 Leibniz Laboratory IMAG-INPG Grenoble, France Abstract The aim of this paper

More information

Chapter 4: Computation tree logic

Chapter 4: Computation tree logic INFOF412 Formal verification of computer systems Chapter 4: Computation tree logic Mickael Randour Formal Methods and Verification group Computer Science Department, ULB March 2017 1 CTL: a specification

More information

VERIFICATION OF A LARGE DISCRETE SYSTEM USING ALGEBRAIC METHODS

VERIFICATION OF A LARGE DISCRETE SYSTEM USING ALGEBRAIC METHODS VERIFICATION OF A LARGE DISCRETE SYSTEM USING ALGEBRAIC METHODS Johan Gunnarsson Jonas Plantin Roger Germundsson Department of Electrical Engineering Linköping University S-58 83 Linköping, Sweden Email:

More information

On Modal µ-calculus And Non-Well-Founded Set Theory

On Modal µ-calculus And Non-Well-Founded Set Theory On Modal µ-calculus And Non-Well-Founded Set Theory Luca Alberucci (albe@iam.unibe.ch) and Vincenzo Salipante (salipant@iam.unibe.ch) Institut für Informatik und angewandte Mathematik, Universität Bern,

More information

ON MONADIC LOGIC OF RECURSIVE PROGRAMS WITH PARAMETERS

ON MONADIC LOGIC OF RECURSIVE PROGRAMS WITH PARAMETERS Bulletin of the Section of Logic Volume 18/2 (1989), pp. 57 61 reedition 2006 [original edition, pp. 57 62] A. L. Rastsvetaev ON MONADIC LOGIC OF RECURSIVE PROGRAMS WITH PARAMETERS 1. Introduction The

More information

Quantum logics with given centres and variable state spaces Mirko Navara 1, Pavel Ptak 2 Abstract We ask which logics with a given centre allow for en

Quantum logics with given centres and variable state spaces Mirko Navara 1, Pavel Ptak 2 Abstract We ask which logics with a given centre allow for en Quantum logics with given centres and variable state spaces Mirko Navara 1, Pavel Ptak 2 Abstract We ask which logics with a given centre allow for enlargements with an arbitrary state space. We show in

More information

Logic via Algebra. Sam Chong Tay. A Senior Exercise in Mathematics Kenyon College November 29, 2012

Logic via Algebra. Sam Chong Tay. A Senior Exercise in Mathematics Kenyon College November 29, 2012 Logic via Algebra Sam Chong Tay A Senior Exercise in Mathematics Kenyon College November 29, 2012 Abstract The purpose of this paper is to gain insight to mathematical logic through an algebraic perspective.

More information

Non-elementary Lower Bound for Propositional Duration. Calculus. A. Rabinovich. Department of Computer Science. Tel Aviv University

Non-elementary Lower Bound for Propositional Duration. Calculus. A. Rabinovich. Department of Computer Science. Tel Aviv University Non-elementary Lower Bound for Propositional Duration Calculus A. Rabinovich Department of Computer Science Tel Aviv University Tel Aviv 69978, Israel 1 Introduction The Duration Calculus (DC) [5] is a

More information

Alternating Time Temporal Logics*

Alternating Time Temporal Logics* Alternating Time Temporal Logics* Sophie Pinchinat Visiting Research Fellow at RSISE Marie Curie Outgoing International Fellowship * @article{alur2002, title={alternating-time Temporal Logic}, author={alur,

More information

Computer Science Dept.

Computer Science Dept. A NOTE ON COMPUTATIONAL INDISTINGUISHABILITY 1 Oded Goldreich Computer Science Dept. Technion, Haifa, Israel ABSTRACT We show that following two conditions are equivalent: 1) The existence of pseudorandom

More information

MA103 Introduction to Abstract Mathematics Second part, Analysis and Algebra

MA103 Introduction to Abstract Mathematics Second part, Analysis and Algebra 206/7 MA03 Introduction to Abstract Mathematics Second part, Analysis and Algebra Amol Sasane Revised by Jozef Skokan, Konrad Swanepoel, and Graham Brightwell Copyright c London School of Economics 206

More information

Introduction to Metalogic

Introduction to Metalogic Philosophy 135 Spring 2008 Tony Martin Introduction to Metalogic 1 The semantics of sentential logic. The language L of sentential logic. Symbols of L: Remarks: (i) sentence letters p 0, p 1, p 2,... (ii)

More information

CS632 Notes on Relational Query Languages I

CS632 Notes on Relational Query Languages I CS632 Notes on Relational Query Languages I A. Demers 6 Feb 2003 1 Introduction Here we define relations, and introduce our notational conventions, which are taken almost directly from [AD93]. We begin

More information

Synthesis of Designs from Property Specifications

Synthesis of Designs from Property Specifications Synthesis of Designs from Property Specifications Amir Pnueli New York University and Weizmann Institute of Sciences FMCAD 06 San Jose, November, 2006 Joint work with Nir Piterman, Yaniv Sa ar, Research

More information

Structural Grobner Basis. Bernd Sturmfels and Markus Wiegelmann TR May Department of Mathematics, UC Berkeley.

Structural Grobner Basis. Bernd Sturmfels and Markus Wiegelmann TR May Department of Mathematics, UC Berkeley. I 1947 Center St. Suite 600 Berkeley, California 94704-1198 (510) 643-9153 FAX (510) 643-7684 INTERNATIONAL COMPUTER SCIENCE INSTITUTE Structural Grobner Basis Detection Bernd Sturmfels and Markus Wiegelmann

More information

A Resolution Method for Modal Logic S5

A Resolution Method for Modal Logic S5 EPiC Series in Computer Science Volume 36, 2015, Pages 252 262 GCAI 2015. Global Conference on Artificial Intelligence A Resolution Method for Modal Logic S5 Yakoub Salhi and Michael Sioutis Université

More information

A Game-Theoretic Decision Procedure for the Constructive Description Logic calc

A Game-Theoretic Decision Procedure for the Constructive Description Logic calc A Game-Theoretic Decision Procedure for the Constructive Description Logic calc Martin Sticht University of Bamberg, Informatics Theory Group Abstract In recent years, several languages of non-classical

More information

Chapter 2. Assertions. An Introduction to Separation Logic c 2011 John C. Reynolds February 3, 2011

Chapter 2. Assertions. An Introduction to Separation Logic c 2011 John C. Reynolds February 3, 2011 Chapter 2 An Introduction to Separation Logic c 2011 John C. Reynolds February 3, 2011 Assertions In this chapter, we give a more detailed exposition of the assertions of separation logic: their meaning,

More information

Arguing and Explaining Classifications

Arguing and Explaining Classifications Arguing and Explaining Classifications Leila Amgoud IRIT CNRS 118, route de Narbonne 31062, Toulouse, France amgoud@irit.fr Mathieu Serrurier IRIT CNRS 118, route de Narbonne 31062, Toulouse, France serrurier@irit.fr

More information

Socratic Proofs for Some Temporal Logics RESEARCH REPORT

Socratic Proofs for Some Temporal Logics RESEARCH REPORT Section of Logic and Cognitive Science Institute of Psychology Adam Mickiewicz University in Poznań Mariusz Urbański Socratic Proofs for Some Temporal Logics RESEARCH REPORT Szamarzewskiego 89, 60-589

More information

MATH 13 SAMPLE FINAL EXAM SOLUTIONS

MATH 13 SAMPLE FINAL EXAM SOLUTIONS MATH 13 SAMPLE FINAL EXAM SOLUTIONS WINTER 2014 Problem 1 (15 points). For each statement below, circle T or F according to whether the statement is true or false. You do NOT need to justify your answers.

More information

Improved Algorithms for Module Extraction and Atomic Decomposition

Improved Algorithms for Module Extraction and Atomic Decomposition Improved Algorithms for Module Extraction and Atomic Decomposition Dmitry Tsarkov tsarkov@cs.man.ac.uk School of Computer Science The University of Manchester Manchester, UK Abstract. In recent years modules

More information

for Propositional Temporal Logic with Since and Until Y. S. Ramakrishna, L. E. Moser, L. K. Dillon, P. M. Melliar-Smith, G. Kutty

for Propositional Temporal Logic with Since and Until Y. S. Ramakrishna, L. E. Moser, L. K. Dillon, P. M. Melliar-Smith, G. Kutty An Automata-Theoretic Decision Procedure for Propositional Temporal Logic with Since and Until Y. S. Ramakrishna, L. E. Moser, L. K. Dillon, P. M. Melliar-Smith, G. Kutty Department of Electrical and Computer

More information

The priority promotion approach to parity games

The priority promotion approach to parity games The priority promotion approach to parity games Massimo Benerecetti 1, Daniele Dell Erba 1, and Fabio Mogavero 2 1 Università degli Studi di Napoli Federico II 2 Università degli Studi di Verona Abstract.

More information

Introduction to Kleene Algebra Lecture 14 CS786 Spring 2004 March 15, 2004

Introduction to Kleene Algebra Lecture 14 CS786 Spring 2004 March 15, 2004 Introduction to Kleene Algebra Lecture 14 CS786 Spring 2004 March 15, 2004 KAT and Hoare Logic In this lecture and the next we show that KAT subsumes propositional Hoare logic (PHL). Thus the specialized

More information

Weak Alternating Automata and Tree Automata Emptiness. Moshe Y. Vardi y. Rice University. are used for specication and verication of nonterminating

Weak Alternating Automata and Tree Automata Emptiness. Moshe Y. Vardi y. Rice University. are used for specication and verication of nonterminating Weak Alternating Automata and Tree Automata Emptiness Orna Kupferman UC Berkeley Moshe Y. Vardi y Rice University Abstract Automata on innite words and trees are used for specication and verication of

More information

Automata, Logic and Games: Theory and Application

Automata, Logic and Games: Theory and Application Automata, Logic and Games: Theory and Application 1. Büchi Automata and S1S Luke Ong University of Oxford TACL Summer School University of Salerno, 14-19 June 2015 Luke Ong Büchi Automata & S1S 14-19 June

More information

Upper and Lower Bounds on the Number of Faults. a System Can Withstand Without Repairs. Cambridge, MA 02139

Upper and Lower Bounds on the Number of Faults. a System Can Withstand Without Repairs. Cambridge, MA 02139 Upper and Lower Bounds on the Number of Faults a System Can Withstand Without Repairs Michel Goemans y Nancy Lynch z Isaac Saias x Laboratory for Computer Science Massachusetts Institute of Technology

More information

Petri nets. s 1 s 2. s 3 s 4. directed arcs.

Petri nets. s 1 s 2. s 3 s 4. directed arcs. Petri nets Petri nets Petri nets are a basic model of parallel and distributed systems (named after Carl Adam Petri). The basic idea is to describe state changes in a system with transitions. @ @R s 1

More information

Strategy Logic. 1 Introduction. Krishnendu Chatterjee 1, Thomas A. Henzinger 1,2, and Nir Piterman 2

Strategy Logic. 1 Introduction. Krishnendu Chatterjee 1, Thomas A. Henzinger 1,2, and Nir Piterman 2 Strategy Logic Krishnendu Chatterjee 1, Thomas A. Henzinger 1,2, and Nir Piterman 2 1 University of California, Berkeley, USA 2 EPFL, Switzerland c krish@eecs.berkeley.edu, {tah,nir.piterman}@epfl.ch Abstract.

More information

Reasoning: From Basic Entailments. to Plausible Relations. Department of Computer Science. School of Mathematical Sciences. Tel-Aviv University

Reasoning: From Basic Entailments. to Plausible Relations. Department of Computer Science. School of Mathematical Sciences. Tel-Aviv University General Patterns for Nonmonotonic Reasoning: From Basic Entailments to Plausible Relations Ofer Arieli Arnon Avron Department of Computer Science School of Mathematical Sciences Tel-Aviv University Tel-Aviv

More information

Binary Decision Diagrams

Binary Decision Diagrams Binary Decision Diagrams Literature Some pointers: H.R. Andersen, An Introduction to Binary Decision Diagrams, Lecture notes, Department of Information Technology, IT University of Copenhagen Tools: URL:

More information

How to lie without being (easily) convicted and the lengths of proofs in propositional calculus Pavel Pudlak?1 and Samuel R. Buss??2 1 Mathematics Ins

How to lie without being (easily) convicted and the lengths of proofs in propositional calculus Pavel Pudlak?1 and Samuel R. Buss??2 1 Mathematics Ins How to lie without being (easily) convicted and the lengths of proofs in propositional calculus Pavel Pudlak?1 and Samuel R. Buss??2 1 Mathematics Institute, Academy of Sciences of the Czech Republic,

More information

Universität Stuttgart Fakultät Informatik, Elektrotechnik und Informationstechnik

Universität Stuttgart Fakultät Informatik, Elektrotechnik und Informationstechnik Universität Stuttgart Fakultät Informatik, Elektrotechnik und Informationstechnik Fixpoint logics on hierarchical structures Stefan Göller and Markus Lohrey Report Nr. 005/0 Institut für Formale Methoden

More information

Resolution and the Weak Pigeonhole Principle

Resolution and the Weak Pigeonhole Principle Resolution and the Weak Pigeonhole Principle Sam Buss 1 and Toniann Pitassi 2 1 Departments of Mathematics and Computer Science University of California, San Diego, La Jolla, CA 92093-0112. 2 Department

More information

1 Introduction A general problem that arises in dierent areas of computer science is the following combination problem: given two structures or theori

1 Introduction A general problem that arises in dierent areas of computer science is the following combination problem: given two structures or theori Combining Unication- and Disunication Algorithms Tractable and Intractable Instances Klaus U. Schulz CIS, University of Munich Oettingenstr. 67 80538 Munchen, Germany e-mail: schulz@cis.uni-muenchen.de

More information

Model Checking Fixed Point Logic with Chop

Model Checking Fixed Point Logic with Chop Model Checking Fixed Point Logic with Chop Martin Lange and Colin Stirling Laboratory for Foundations of Computer Science Division of Informatics University of Edinburgh {martin,cps}@dcs.ed.ac.uk Abstract.

More information

, Department of Computer and Communication Sciences, University of Michigan, Ann Arbor, Michigan

, Department of Computer and Communication Sciences, University of Michigan, Ann Arbor, Michigan SIAM J. COMPUT. Vol. 13, No. 4, November 1984 (C) 1984 Society for Industrial and Applied Mathematics 002 EQUIVALENCE RELATIONS, INVARIANTS, AND NORMAL FORMS* ANDREAS BLASS" AND YURI GUREVICH* Abstract.

More information