Mathematik / Informatik
|
|
- Shon Wilkinson
- 6 years ago
- Views:
Transcription
1 .. UNIVERSITAT TRIER Mathematik / Informatik Forschungsbericht Nr Fast and Simple Nested Fixpoints Helmut Seidl FB IV { Informatik Universitat Trier D{54286 Trier, Germany seidl@psi.uni-trier.de Electronic copies of technical reports are available: Printed copies: Via FTP: Via WWW: Via URL ftp://ftp.informatik.uni-trier.de/pub/users-root/reports URL Send a mail to ftpmail@ftp.informatik.uni-trier.de, subject HELP, for detailed instructions Trierer Forschungsberichte Fachbereich IV - Mathematik / Informatik.. Universitat Trier D Trier ISSN
2 Fast and Simple Nested Fixpoints Helmut Seidl FB IV { Informatik Universitat Trier D{54286 Trier, Germany seidl@psi.uni-trier.de March 1, 1996 Abstract We give an alternative proof of the result of Long et al. in [11] that nested xpoint expressions e of alternation depth d > 0 can be evaluated over a complete lattice of height h in time O((h jej) d=2+2 ). The advantage of our proof is that it is both extremely short and extremely simple. 1 Introduction Since Kozen's seminal paper [10] on modal { calculus in 1983, this logic has been widely used for the specication of properties of concurrent processes (see, e.g., [12, 13]). Especially, the model checking problem, i.e., the question to determine whether or not a given system satises a formula, has attracted attention. In [7], Emerson and Lei presented an algorithm where the exponent in the worstcase complexity is given by d + 1 where d is the alternation depth of the formula to be veried. Their method has been rened by Cleaveland, Klein and Steen [6]. For formulas of alternation depth 0, even linear algorithms have been proposed (see, e.g., [2], [1] or [5]). For other important fragments of {calculus, Emerson, Jutla and Sistla exhibited polynomial algorithms [8]. A major improvement in the general case has been achieved by Long et al. [11]. They pointed out that the exponent in the worst case complexity can be lowered even to \about" d=2+1. Their paper explains the method for certain special kinds of formulas. Nevertheless, the argumentation is non{trivial and involved. Their result itself, however, is (at least to our opinion) so important that a simpler explanation is worthwhile. In fact, our argumentation turns out to be almost trivial. Our idea consists in removing one sort of xpoint iterations simply by syntactical iteration, i.e., unfolding. The whole art consists in doing so without overly increasing the size of the resulting system. 1 To make our idea precise, this short note is organized as follows. Section 2 introduces basic notions concerning (hierarchical) systems of equations. Section 3 deals with the case of alternation depth 0. Section 4 formalizes our idea of syntactical removal of xpoint iterations and derives the main result. Section 5 contains a brief discussion of our method and concludes. 2 A Fixpoint Calculus In essence, the model checking problem for { formulas boils down to the evaluation of a xpoint expression like x 1 :f 1 (x 2 :f 2 (h(x 1 ); x 2 ); y:g(h(x 1 ); y) over some nite complete lattice. Instead of dening such kinds of expressions (together with their semantics) formally, we prefer to introduce the slightly more exible concept of
3 hierarchical systems of equations. By a subsequent example, we hope to convince the reader that xpoint expressions very easily can be translated into our formalism. Assume we are given a nite complete lattice D of height h, i.e., the maximal number of elements in a strictly increasing sequence d d : : d h in D equals h + 1. Let denote a set of operator symbols where each f 2 denotes a monotonic function [f ] : D k! D for some k 1. As right hand sides of equations we allow expressions built up from formal variables from some set Y and constants by application of operators from. The set of all these expressions is denoted by E [D (Y). Every expression f 2 E [D (Y) denotes a function [f ] : (Y! D)! D. This function is monotonic since all operations in are monotonic. A hierarchical system of equations with free variables from F is a pair (S; H). S is the basic set of equations x = f x ; x 2 X, where for every x, f x is an expression in E [D (X [ F), and H is a hierarchy on X. A hierarchy consists of a sequence H = (hx k ; k i; : : : ; hx 1 ; 1 i) of mutually disjoint nonempty sets X j where X X 1 [ : : : [ X k together with qualications j 2 f; g. Intuitively, hierarchy H on S is introduced in order to reect the nesting of scopes of variables within which xpoint iteration is performed. The set X 0 = X n(x 1 [ : : : [ X k ) represents the \non{recursive" auxiliary variables. Therefore, we assume a partial ordering \" on x 2 X 0 such that y 2 X 0 occurs in right hand side f x ; x 2 X 0 only if y < x. Fixpoint iteration is (potentially) performed on the variables in X 1 [ : : : [ X k. These are therefore also called iteration variables. Example 1 Assume we are given a xpoint expression like x 1 :f 1 (x 2 :f 2 (h(x 1 ); x 2 ); y:g(h(x 1 ); y) A representation of this formula by a hierarchical system is obtained by introducing an extra 2 equation for each xpoint subexpression. For our example this gives set S consisting of: x 1 = f 1 (x 2 ; y) x 2 = f 2 (h(x 1 ); x 2 ) y = g(h(x 1 ); y) Hierarchy H now is obtained by dividing the set of xpoint variables of into \layers" within which only xpoints of the same kind occur. Thus for our example formula, H = (hx 2 ; i; hx 1 ; i) where X 1 = fyg and X 2 = fx 1 ; x 2 g. Auxiliary variables can be introduced for returning the result for the whole formula (in case it does not have a xpoint on top level) or to remove multiple occurrences of the same subexpression. In our example, we could introduce a fresh auxiliary variable z to receive the value for h(x 1 ). This results in the following set of equations: x 1 = f 1 (x 2 ; y) x 2 = f 2 (z; x 2 ) y = g(z; y) z = h(x 1 ) Usually, if H is understood, we write S for the hierarchical system. We also denote the fact that X j is qualied with j by X j : j. Fix some 0 j k, and let X 0 = X 0 [ : : :[X j. Then the j{th subsystem S j of S is given by the base set of equations x = f x ; x 2 X 0 ; together with hierarchy H j = (hx j ; j i; : : : ; hx 1 ; 1 i). Note that the free variables of S j are contained in F [ X j+1 [ : : : [ X k. An environment for S is a mapping : F! D. The solution of S relative to environment in D, denoted by [S ], is a mapping X! D. It is dened by induction on length k of hierarchy H. If k = 0, then no xpoint iteration is necessary. Values [S ] x; x 2 X 0 i, are simply obtained by successively evaluating right hand sides according to ordering \". For k > 0, let X 0 = X nx k and S k?1 denote the (k? 1){th subsystem of S. Dene 2
4 R : (F [X k! D)! X 0! D by R (+) x = [[S k?1 ]] ( + ) x whenever x 2 X 0. Note that we use the \+"{operator to combine two functions with disjoint domains into one. Consider monotonic function G : (X k! D)! X k! D given by G x = [f x ] ( + + R ( + )). In case X k is qualied as, let denote the least xpoint of G. Otherwise, let denote the greatest xpoint of G. Then [S ] is dened by [[S]] x = x if x 2 X k and [[S]] x = [[S k?1 ] ( + ) x if x 2 X 0. Fact 1 Assume k > 1 and S is system of equation with hierarchy H given by (hx k ; k i; hx k?1 ; k?1 i; : : : ; hx 1 ; 1 i). If k = k?1 then for every environment, S together with H has the same solution as S together with hierarchy (hx k [ X k?1 ; k i; hx k?2 ; k?2 i; : : : ; hx 1 ; 1 i). 2 Proposition 2 Given a system S of alternation depth 0 and environment for the free variables in S, the solution of S can be computed in time O(h jsj). 2 4 Syntactical Removal of Fixpoint Iterations The idea of our algorithm is based on the trivial observation that in a lattice of height h, the least xpoint is reached after at most h iterations. Dene the n{th iterate of g on d by g 0 d = d and for n > 0, g n d = g(g n?1 d). We have: Observation 3 If g : D! D is monotonic then the least xpoint (resp. greatest xpoint) of g is given by g h? (resp. g h >). 2 It follows that we can always remove successive occurrences of 's or 's in the hierarchy until we end up with a hierarchy (hx k ; k i; : : : ; hx 1 ; 1 i) where j 6= j?1 for all j > 1. Systems with this property are called normalized. If k is the length of the hierarchy of a normalized system then k?1 is also called its alternation depth. 3 Systems with Alternation Depth 0 For simplicity, let us assume that our algorithm is implemented on a Random Access Machine with uniform cost measure, i.e., storing and retrieving elements from D, comparing elements from D for equality and applying operators from are all counted for 1. Accordingly, P we dene the size of system S as jsj = x2x 1 + jf x j. In case the alternation depth of system S equals 0, computation of the solution reduces to the task of computing the least (resp. greatest) solution of an ordinary system of equations over complete lattice D. This can be done by an standard worklist algorithm. We conclude: The same observation holds true for monotonic mapping g : (Y! d)! (Y! d) if exponent h is replaced with exponent q = h #Y. So let S denote a normalized system of alternation depth k with hierarchy (hx k+1 ; k+1 i; : : : ; hx 1 ; 1 i). For every n 1 and : X k+1! D, we construct system S n () with alternation depth k?1. S n () is obtained from S by (syntactically) unroling the iteration on the variables in X k+1. 3 Dene X 00 = fhx; ji j x 2 X ; 0 j < ng, and X 0 = X [ X 00. S n () consists of the equations x = f 0 x ; x 2 X 0, together with hierarchy (hx 0 k; k i; : : : ; hx 0 1; 1 i) where for j = 1; : : : ; k, X 0 j = X j [ fhx; ii j x 2 X j ; 0 i < ng. The right hand sides f 0 x of the equations are dened as follows. If x 2 X k+1, then fx 0 is obtained from f x by replacing each occurrence of variable y 2 X through hy; n? 1i; f 0 = x, and hx;0i for j > 0, f 0 hx;ji is obtained from f x by replacing each occurrence of variables y through hy; j? 1i;
5 If x 2 X nx k+1, then f 0 x f x, and for all j, f 0 hx;ji is obtained from f x by replacing each occurrence of y 2 X with hy; ji. Intuitively, S n () is obtained by taking n extra copies of S. The variables hx; ji, x 2 X k+1, are meant to receive the j{th iteration for variable x. hx; 0i receives the start value x for the iteration whereas for j > 0, the value of hx; ji is computed relative to the values of hx i 0; j? 1i, i.e., the former approximations. Finally, variables x receive the values of the n{th approximation. Example 2 Consider the system of equations from our last example and assume we are going to compute its solution over lattice D = 1g with height 1. Removing least xpoint iteration on fx 1 ; x 2 g results in: x 1 = f 1 (hx 2 ; 1i; hy; 1i) x 2 = f 2 (hz; 1i; hx 2 ; 1i) hx 1 ; 1i = f 1 (hx; 0i; hy; 0i) hx 2 ; 1i = f 2 (hz; 0i; hx; 0i) hx 1 ; 0i =? hx 2 ; 0i =? y = g(z; y) hy; 1i = g(hz; 1i; hy; 1i) hy; 0i = g(hz; 0i; hy; 0i) z = h(x 1 ) hz; 1i = h(hx 1 ; 1i) hz; 0i = h(hx; 0i) with hierarchy H = (hx 1 ; i) where X 1 = fy; hy; 1i; hy; 0ig. Note that variables x i ; hx i ; ji now have become auxiliary js n ()j (n + 1) jsj. 2. S n () can be constructed from S in time O((n + 1) jsj). 3. If h #X k+1 n and X k+1 : then [S ] x = [S n (?)] x for all x 2 X where variable assignment? maps every x 2 X k+1 to?. In case X k+1 :, the same holds true if? is replaced with >, mapping every x 2 X k+1 to >. 2 We combine Fact 1 together with Prop. 4 to derive our main Theorem: Theorem 1 Assume S is a normalized hierarchical system of alternation depth d > 0 with n iteration variables. Then there exists a system S 0 of alternation depth 0 with identical set of free variables such that the following holds: 1. If d is odd, js 0 j ( hn d+1 + 1)(d+1)=2 jsj; If d is even, js 0 j ( hn d + 1)d=2+1 jsj; 2. js 0 j can be constructed in time proportional to its size; 3. [S ] x = [S 0 ] x for every environment and every variable x of S. Proof. Iteratedly applying Prop. 4 to the subsystems of S we either may remove from the hierarchy all subsets qualied with or all subsets qualied with. Subsequent normalization according to Fact 1 yields the desired system S 0. It remains to estimate the size of S 0. Let n 1 ; : : : ; n s be the sequence of sizes of the sets in the hierarchy qualied as and m 1 ; : : : ; m t the corresponding sequence for sets qualied as. If we remove all sets qualied from the hierarchy, we obtain from Prop. 4: We have: Proposition 4 Let be an environment for S (and hence also for each S n ()). Then the following holds: 4 js 0 j (n 1 h + 1) (n s h + 1) jsj Likewise, if we remove all sets qualied from the hierarchy, we obtain js 0 j (m 1 h + 1) (m t h + 1) jsj
6 We may remove that kind of qualication where sizes sum up to n=2. W.l.o.g. assume that this is again the case for, i.e., n 1 + : : : + n s n. First assume d is odd. Then s = t = (d + 1)=2. Hence, (n 1 h + 1) (n s h + 1) ( nh 2s + 1)s ( nh d )(d+1)=2 Now consider the case where d is even. Since s + t = d + 1 and js? tj 1, we have: d=2 s; t d= Therefore, (n 1 h + 1) (n s h + 1) ( nh 2s + 1)s and our assertion follows. ( nh d Finally applying Prop. 2, we conclude: + 1)d=2+1 Corollary 2 The solution of a normalized system S of alternation depth d > 0 and with n iteration variables can be computed in time O(( hn d + 1)d=2+1 h jsj). 2 Corollary 3 A xpoint expression e with alternation depth d > 0 and n occurrences of or can be evaluated in time O(( hn d +1)d=2+1 h jej). 2 5 Discussion and Conclusion We presented a simple method for computing the solution of hierarchical system S of equations. The algorithm has the same or even slightly better estimation of its worstcase complexity than the one sketched in [11]. Additional benet is gained from the new distinction between iteration variables and auxiliary ones. In light of our exposition, the algorithmic idea of Long et al. in [11] can be interpreted as evaluating system S 0 (which we constructed by syntactical xpoint removal) without explicitly 5 constructing S 0. Their hope is that usually xpoints are reached after much fewer iterations than theoretically possible. It seems, however, that this potential gain may as well be achieved by our method if we do not construct S 0 in advance but create an algorithmic description of it and apply some general demand{driven equation solver (e.g., the one from [9]) which builds up the system to be evaluated \by need". Acknowledgement: Many thanks to Andre Arnold whose patiently listened to rough sketches of the ideas and encouraged submission for publication. 6 References [1] H.R. Andersen: Model Checking and Boolean Graphs. Proc. ESOP'92, LNCS 582, 1{19, 1992 [2] A. Arnold, P. Crubille: A Linear Time Algorithm for Solve Fixpoint Equations on Transition Systems. Inf. Proc. Letters (29), 57{66, 1988 [3] O. Bernholtz, M.V. Vardi, P. Wolper: An Automata{Theoretic Approach to Branching{ Time Model Checking (Extended Abstract). Proc. Conf. Computer Aided Verication, LNCS 818, 142{155, 1994 [4] J.R. Burch, E.M. Clarke, K.L. McMillan: Symbolic Model Checking States and Beyond. Inf. and Comput. 98, 142{170, 1992 [5] R. Cleaveland, B. Steen: A Linear Time Model Checking Algorithm for the Alternation{Free Modal {Calculus. Proc. 3rd CAV'91, LNCS 575, 1991 [6] R. Cleaveland, M. Klein, B. Steen: Faster Model Checking for the Modal {Calculus. Proc. of fourth CAV'92, LNCS 663, 410{422, 1996 [7] E.A. Emerson, C.{L. Lei: Ecient Modell Checking in Fragments of the Propositional { Calculus. Proc. 1st IEEE Symp. on Logic in Computer Science, 267{278, 1986 [8] E.A. Emerson, C.S. Jutla, A.P. Sistla: On Model{Checking for Fragments of {Calculus. Proc. Conf. on Computer Aided Verication, LNCS 697, 385{396, 1993
7 [9] C. Fecht, H. Seidl: An Even More Ecient Solver for General Systems of Equations. Tech. Report Saarbrucken and Trier, 1996 [10] D. Kozen: Results on the Propositional { Calculus. TCS 27, 333{354, 1983 [11] D.E. Long, A. Browne, E.M. Clarke, S. Jha, W.R. Marrero: An Improved Algorithm for the Evaluation of Fixpoint Expressions. Proc. Conf. on Computer Aided Verication, LNCS 818, 338{350, 1994 [12] C. Stirling: Modal and Temporal Logics. In: S. Abramsky, D. Gabbay, and T. Maibaum (eds.): Handbook of Logic in Computer Science, 477{563, 1992 [13] M.Y. Vardi: A Temporal Fixpoint Calculus. Proc. 15th POPL, 250{259, 1988 [14] M.Y. Vardi, P. Wolper: Automata{Theoretic Techniques for Modal Logics of Programs. JCSS 32, 183{221,
Model Checking Real-Time Properties. of Symmetric Systems? E. Allen Emerson and Richard J. Treer. Computer Sciences Department and
Model Checking Real-Time Properties of Symmetric Systems? E. Allen Emerson and Richard J. Treer Computer Sciences Department and Computer Engineering Research Center University of Texas, Austin, TX, 78712,
More informationof concurrent and reactive systems is now well developed [2] as well as a deductive methodology for proving their properties [3]. Part of the reason f
A New Decidability Proof for Full Branching Time Logic CPL N.V. Shilov Research On Program Analysis System (ROPAS) Department of Computer Science Korean Advanced Institute of Science and Technology (KAIST)
More informationPrecise Relational Invariants Through Strategy Iteration
Precise Relational Invariants Through Strategy Iteration Thomas Gawlitza and Helmut Seidl TU München, Institut für Informatik, I2 85748 München, Germany {gawlitza, seidl}@in.tum.de Abstract. We present
More informationHelsinki University of Technology Laboratory for Theoretical Computer Science Research Reports 99
Helsinki University of Technology Laboratory for Theoretical Computer Science Research Reports 99 Teknillisen korkeakoulun tietojenkäsittelyteorian laboratorion tutkimusraportti 99 Espoo 2005 HUT-TCS-A99
More informationPolynomial Precise Interval Analysis Revisited
Polynomial Precise Interval Analysis Revisited Thomas Gawlitza 1, Jérôme Leroux 2, Jan Reineke 3, Helmut Seidl 1, Grégoire Sutre 2, and Reinhard Wilhelm 3 1 TU München, Institut für Informatik, I2 80333
More informationDiagram-based Formalisms for the Verication of. Reactive Systems. Anca Browne, Luca de Alfaro, Zohar Manna, Henny B. Sipma and Tomas E.
In CADE-1 Workshop on Visual Reasoning, New Brunswick, NJ, July 1996. Diagram-based Formalisms for the Verication of Reactive Systems Anca Browne, Luca de Alfaro, Zohar Manna, Henny B. Sipma and Tomas
More informationof acceptance conditions (nite, looping and repeating) for the automata. It turns out,
Reasoning about Innite Computations Moshe Y. Vardi y IBM Almaden Research Center Pierre Wolper z Universite de Liege Abstract We investigate extensions of temporal logic by connectives dened by nite automata
More informationFixpoint Extensions of Temporal Description Logics
Fixpoint Extensions of Temporal Description Logics Enrico Franconi Faculty of Computer Science Free University of Bozen-Bolzano, Italy franconi@inf.unibz.it David Toman School of Computer Science University
More informationModel Checking in the Propositional µ-calculus
Model Checking in the Propositional µ-calculus Ka I Violet Pun INF 9140 - Specification and Verification of Parallel Systems 13 th May, 2011 Overview Model Checking is a useful means to automatically ascertain
More informationModel Checking and Transitive-Closure Logic? Abstract. We give a linear-time algorithm to translate any formula
Model Checking and Transitive-Closure Logic? Neil Immerman??1 and Moshe Y. Vardi???2 1 Computer Science Dept., University of Massachusetts, Amherst, MA 01003, http://www.cs.umass.edu/immerman, immerman@cs.umass.edu
More informationFuzzy Limits of Functions
Fuzzy Limits of Functions Mark Burgin Department of Mathematics University of California, Los Angeles 405 Hilgard Ave. Los Angeles, CA 90095 Abstract The goal of this work is to introduce and study fuzzy
More informationCS357: CTL Model Checking (two lectures worth) David Dill
CS357: CTL Model Checking (two lectures worth) David Dill 1 CTL CTL = Computation Tree Logic It is a propositional temporal logic temporal logic extended to properties of events over time. CTL is a branching
More informationCompositionality in SLD-derivations and their abstractions Marco Comini, Giorgio Levi and Maria Chiara Meo Dipartimento di Informatica, Universita di
Compositionality in SLD-derivations and their abstractions Marco Comini Giorgio Levi and Maria Chiara Meo Dipartimento di Informatica Universita di Pisa Corso Italia 40 56125 Pisa Italy fcomini levi meog@di.unipi.it
More informationSplitting a Default Theory. Hudson Turner. University of Texas at Austin.
Splitting a Default Theory Hudson Turner Department of Computer Sciences University of Texas at Austin Austin, TX 7872-88, USA hudson@cs.utexas.edu Abstract This paper presents mathematical results that
More informationLinear Temporal Logic and Büchi Automata
Linear Temporal Logic and Büchi Automata Yih-Kuen Tsay Department of Information Management National Taiwan University FLOLAC 2009 Yih-Kuen Tsay (SVVRL @ IM.NTU) Linear Temporal Logic and Büchi Automata
More informationModel Checking for the -calculus. Paolo Zuliani , Spring 2011
Model Checking for the -calculus Paolo Zuliani 15-817, Spring 2011 Outline What is the -calculus? Semantics Model Checking algorithms [Other fixpoint theorems] The -calculus A language for describing properties
More informationChapter 6: Computation Tree Logic
Chapter 6: Computation Tree Logic Prof. Ali Movaghar Verification of Reactive Systems Outline We introduce Computation Tree Logic (CTL), a branching temporal logic for specifying system properties. A comparison
More informationComputing Game Values for Crash Games
Computing Game Values for Crash Games Thomas Gawlitza and Helmut Seidl TU München, Institut für Informatik, I2 85748 München, Germany {gawlitza, seidl}@in.tum.de Abstract. We consider crash games which
More informationElectronic Notes in Theoretical Computer Science 18 (1998) URL: 8 pages Towards characterizing bisim
Electronic Notes in Theoretical Computer Science 18 (1998) URL: http://www.elsevier.nl/locate/entcs/volume18.html 8 pages Towards characterizing bisimilarity of value-passing processes with context-free
More information2 PLTL Let P be a set of propositional variables. The set of formulae of propositional linear time logic PLTL (over P) is inductively dened as follows
Translating PLTL into WSS: Application Description B. Hirsch and U. Hustadt Department of Computer Science, University of Liverpool Liverpool L69 7ZF, United Kingdom, fb.hirsch,u.hustadtg@csc.liv.ac.uk
More informationPartial model checking via abstract interpretation
Partial model checking via abstract interpretation N. De Francesco, G. Lettieri, L. Martini, G. Vaglini Università di Pisa, Dipartimento di Ingegneria dell Informazione, sez. Informatica, Via Diotisalvi
More informationThe Stevens-Stirling-Algorithm For Solving Parity Games Locally Requires Exponential Time
The Stevens-Stirling-Algorithm For Solving Parity Games Locally Requires Exponential Time Oliver Friedmann Institut für Informatik, LMU München Oliver.Friedmann@googlemail.com Abstract. This paper presents
More informationWeak ω-automata. Shaked Flur
Weak ω-automata Shaked Flur Weak ω-automata Research Thesis Submitted in partial fulllment of the requirements for the degree of Master of Science in Computer Science Shaked Flur Submitted to the Senate
More informationMathematik / Informatik
.. UNIVERSITAT TRIER Mathematik / Informatik Forschungsbericht Nr. 95{11 On communication games with more than two players Stasys Jukna Electronic copies of technical reports are available: Via FTP: Host
More informationModel checking the basic modalities of CTL with Description Logic
Model checking the basic modalities of CTL with Description Logic Shoham Ben-David Richard Trefler Grant Weddell David R. Cheriton School of Computer Science University of Waterloo Abstract. Model checking
More informationOn the Complexity of the Reflected Logic of Proofs
On the Complexity of the Reflected Logic of Proofs Nikolai V. Krupski Department of Math. Logic and the Theory of Algorithms, Faculty of Mechanics and Mathematics, Moscow State University, Moscow 119899,
More informationPROPOSITIONAL MIXED LOGIC: ITS SYNTAX AND SEMANTICS
PROPOSITIONAL MIXED LOGIC: ITS SYNTAX AND SEMANTICS Karim NOUR 1 and Abir NOUR 2 Abstract In this paper, we present a propositional logic (called mixed logic) containing disjoint copies of minimal, intuitionistic
More informationEAHyper: Satisfiability, Implication, and Equivalence Checking of Hyperproperties
EAHyper: Satisfiability, Implication, and Equivalence Checking of Hyperproperties Bernd Finkbeiner, Christopher Hahn, and Marvin Stenger Saarland Informatics Campus, Saarland University, Saarbrücken, Germany
More informationPart II. Logic and Set Theory. Year
Part II Year 2018 2017 2016 2015 2014 2013 2012 2011 2010 2009 2008 2007 2006 2005 2018 60 Paper 4, Section II 16G State and prove the ǫ-recursion Theorem. [You may assume the Principle of ǫ- Induction.]
More informationOn Boolean Encodings of Transition Relation for Parallel Compositions of Transition Systems
On Boolean Encodings of Transition Relation for Parallel Compositions of Transition Systems Extended abstract Andrzej Zbrzezny IMCS, Jan Długosz University in Częstochowa, Al. Armii Krajowej 13/15, 42-2
More informationEquational Logic. Chapter Syntax Terms and Term Algebras
Chapter 2 Equational Logic 2.1 Syntax 2.1.1 Terms and Term Algebras The natural logic of algebra is equational logic, whose propositions are universally quantified identities between terms built up from
More informationWojciech Penczek. Polish Academy of Sciences, Warsaw, Poland. and. Institute of Informatics, Siedlce, Poland.
A local approach to modal logic for multi-agent systems? Wojciech Penczek 1 Institute of Computer Science Polish Academy of Sciences, Warsaw, Poland and 2 Akademia Podlaska Institute of Informatics, Siedlce,
More informationOn the Complexity of Bounded-Variable Queries. (Extended Abstract) Moshe Y. Vardi. Rice University
On the Complexity of Bounded-Variable Queries (Extended Abstract) Moshe Y. Vardi Rice University Abstract It is known that the expression complexity and combined complexity of query evaluation in relational
More informationMoshe Y. Vardi y. IBM Almaden Research Center. Abstract. We present an automata-theoretic framework to the verication of concurrent
Verication of Concurrent Programs: The Automata-Theoretic Framework Moshe Y. Vardi y IBM Almaden Research Center Abstract We present an automata-theoretic framework to the verication of concurrent and
More information1 CHAPTER 1 INTRODUCTION 1.1 Background One branch of the study of descriptive complexity aims at characterizing complexity classes according to the l
viii CONTENTS ABSTRACT IN ENGLISH ABSTRACT IN TAMIL LIST OF TABLES LIST OF FIGURES iii v ix x 1 INTRODUCTION 1 1.1 Background : : : : : : : : : : : : : : : : : : : : : : : : : : : : 1 1.2 Preliminaries
More informationMoshe Y. Vardi y. Rice University. LTL formula, can be translated to an alternationfree. -calculus formula, and describe the translation,
Freedom, Weakness, and Determinism: From Linear-time to Branching-time Orna Kupferman UC Berkeley Moshe Y. Vardi y Rice University Abstract Model checking is a method for the verication of systems with
More information2 Z. Lonc and M. Truszczynski investigations, we use the framework of the xed-parameter complexity introduced by Downey and Fellows [Downey and Fellow
Fixed-parameter complexity of semantics for logic programs ZBIGNIEW LONC Technical University of Warsaw and MIROS LAW TRUSZCZYNSKI University of Kentucky A decision problem is called parameterized if its
More informationSolving Disjunctive/Conjunctive Boolean Equation Systems with Alternating Fixed Points
Solving Disjunctive/Conjunctive Boolean Equation Systems with Alternating Fixed Points Jan Friso Groote 2,3 and Misa Keinänen 1,3 1 Dept. of Computer Science and Engineering, Lab. for Theoretical Comp.
More informationReal-Time Logics: Fictitious Clock as an Abstraction of Dense Time Jean-Francois Raskin and Pierre-Yves Schobbens Computer
Facultes Universitaires Notre-Dame de la Paix Namur, Belgium Institut d'informatique Rue Grandgagnage, 21 B-5000 Namur BELGIUM Real-Time Logics: Fictitious Clock as an Abstraction of Dense Time Jean-Francois
More informationPSPACE-completeness of LTL/CTL model checking
PSPACE-completeness of LTL/CTL model checking Peter Lohmann April 10, 2007 Abstract This paper will give a proof for the PSPACE-completeness of LTLsatisfiability and for the PSPACE-completeness of the
More informationIn a second part, we concentrate on interval models similar to the traditional ITL models presented in [, 5]. By making various assumptions about time
Complete Proof Systems for First Order Interval Temporal Logic Bruno Dutertre Department of Computer Science Royal Holloway, University of London Egham, Surrey TW0 0EX, United Kingdom Abstract Dierent
More informationSBMC : Symmetric Bounded Model Checking
SBMC : Symmetric Bounded Model Checing Brahim NASRAOUI LIP2 and Faculty of Sciences of Tunis Campus Universitaire 2092 - El Manar Tunis Tunisia brahim.nasraoui@gmail.com Syrine AYADI LIP2 and Faculty of
More informationCharacterising FS domains by means of power domains
Theoretical Computer Science 264 (2001) 195 203 www.elsevier.com/locate/tcs Characterising FS domains by means of power domains Reinhold Heckmann FB 14 Informatik, Universitat des Saarlandes, Postfach
More informationSupremum and Infimum
Supremum and Infimum UBC M0 Lecture Notes by Philip D. Loewen The Real Number System. Work hard to construct from the axioms a set R with special elements O and I, and a subset P R, and mappings A: R R
More informationNew Complexity Results for Some Linear Counting Problems Using Minimal Solutions to Linear Diophantine Equations
New Complexity Results for Some Linear Counting Problems Using Minimal Solutions to Linear Diophantine Equations (Extended Abstract) Gaoyan Xie, Cheng Li and Zhe Dang School of Electrical Engineering and
More informationState-Space Exploration. Stavros Tripakis University of California, Berkeley
EE 144/244: Fundamental Algorithms for System Modeling, Analysis, and Optimization Fall 2014 State-Space Exploration Stavros Tripakis University of California, Berkeley Stavros Tripakis (UC Berkeley) EE
More informationConnectedness. Proposition 2.2. The following are equivalent for a topological space (X, T ).
Connectedness 1 Motivation Connectedness is the sort of topological property that students love. Its definition is intuitive and easy to understand, and it is a powerful tool in proofs of well-known results.
More informationA note on monotone real circuits
A note on monotone real circuits Pavel Hrubeš and Pavel Pudlák March 14, 2017 Abstract We show that if a Boolean function f : {0, 1} n {0, 1} can be computed by a monotone real circuit of size s using
More informationReasoning about Strategies: From module checking to strategy logic
Reasoning about Strategies: From module checking to strategy logic based on joint works with Fabio Mogavero, Giuseppe Perelli, Luigi Sauro, and Moshe Y. Vardi Luxembourg September 23, 2013 Reasoning about
More informationPreliminaries. Introduction to EF-games. Inexpressivity results for first-order logic. Normal forms for first-order logic
Introduction to EF-games Inexpressivity results for first-order logic Normal forms for first-order logic Algorithms and complexity for specific classes of structures General complexity bounds Preliminaries
More informationParameter Synthesis for Timed Kripke Structures
Parameter Synthesis for Timed Kripke Structures Extended Abstract Micha l Knapik 1 and Wojciech Penczek 1,2 1 Institute of Computer Science, PAS, Warsaw, Poland 2 University of Natural Sciences and Humanities,
More informationTHE STEVENS-STIRLING-ALGORITHM FOR SOLVING PARITY GAMES LOCALLY REQUIRES EXPONENTIAL TIME
International Journal of Foundations of Computer Science c World Scientific Publishing Company THE STEVENS-STIRLING-ALGORITHM FOR SOLVING PARITY GAMES LOCALLY REQUIRES EXPONENTIAL TIME OLIVER FRIEDMANN
More informationA Family of Finite De Morgan Algebras
A Family of Finite De Morgan Algebras Carol L Walker Department of Mathematical Sciences New Mexico State University Las Cruces, NM 88003, USA Email: hardy@nmsuedu Elbert A Walker Department of Mathematical
More informationWeak Alternating Automata and Tree Automata Emptiness
Weak Alternating Automata and Tree Automata Emptiness Orna Kupferman UC Berkeley Moshe Y. Vardi Rice University Abstract Automata on infinite words and trees are used for specification and verification
More informationEncoding formulas with partially constrained weights in a possibilistic-like many-sorted propositional logic
Encoding formulas with partially constrained weights in a possibilistic-like many-sorted propositional logic Salem Benferhat CRIL-CNRS, Université d Artois rue Jean Souvraz 62307 Lens Cedex France benferhat@criluniv-artoisfr
More informationCyclic Proofs for Linear Temporal Logic
Cyclic Proofs for Linear Temporal Logic Ioannis Kokkinis Thomas Studer Abstract Annotated sequents provide an elegant approach for the design of deductive systems for temporal logics. Their proof theory,
More informationEntropy and Ergodic Theory Lecture 4: Conditional entropy and mutual information
Entropy and Ergodic Theory Lecture 4: Conditional entropy and mutual information 1 Conditional entropy Let (Ω, F, P) be a probability space, let X be a RV taking values in some finite set A. In this lecture
More informationOn Elementary Loops of Logic Programs
Under consideration for publication in Theory and Practice of Logic Programming 1 On Elementary Loops of Logic Programs Martin Gebser Institut für Informatik Universität Potsdam, Germany (e-mail: gebser@cs.uni-potsdam.de)
More informationUNIVERSIT A DEGLI STUDI DI PISA DIPARTIMENTO DI INFORMATICA DOTTORATO DI RICERCA IN INFORMATICA Universita di Pisa-Genova-Udine Ph.D. Thesis Verication of Temporal and Real-Time Properties of Statecharts
More informationAbstraction in Program Analysis & Model Checking. Abstraction in Model Checking. Motivations & Results
On Completeness in Abstract Model Checking from the Viewpoint of Abstract Interpretation Abstraction in Program Analysis & Model Checking Abstract interpretation has been successfully applied in: static
More informationLoop Formulas for Disjunctive Logic Programs
Nineteenth International Conference on Logic Programming (ICLP-03), pages 451-465, Mumbai, India, 2003 Loop Formulas for Disjunctive Logic Programs Joohyung Lee and Vladimir Lifschitz Department of Computer
More informationTowards a quantum calculus
QPL 2006 Preliminary Version Towards a quantum calculus (work in progress, extended abstract) Philippe Jorrand 1 Simon Perdrix 2 Leibniz Laboratory IMAG-INPG Grenoble, France Abstract The aim of this paper
More informationChapter 4: Computation tree logic
INFOF412 Formal verification of computer systems Chapter 4: Computation tree logic Mickael Randour Formal Methods and Verification group Computer Science Department, ULB March 2017 1 CTL: a specification
More informationVERIFICATION OF A LARGE DISCRETE SYSTEM USING ALGEBRAIC METHODS
VERIFICATION OF A LARGE DISCRETE SYSTEM USING ALGEBRAIC METHODS Johan Gunnarsson Jonas Plantin Roger Germundsson Department of Electrical Engineering Linköping University S-58 83 Linköping, Sweden Email:
More informationOn Modal µ-calculus And Non-Well-Founded Set Theory
On Modal µ-calculus And Non-Well-Founded Set Theory Luca Alberucci (albe@iam.unibe.ch) and Vincenzo Salipante (salipant@iam.unibe.ch) Institut für Informatik und angewandte Mathematik, Universität Bern,
More informationON MONADIC LOGIC OF RECURSIVE PROGRAMS WITH PARAMETERS
Bulletin of the Section of Logic Volume 18/2 (1989), pp. 57 61 reedition 2006 [original edition, pp. 57 62] A. L. Rastsvetaev ON MONADIC LOGIC OF RECURSIVE PROGRAMS WITH PARAMETERS 1. Introduction The
More informationQuantum logics with given centres and variable state spaces Mirko Navara 1, Pavel Ptak 2 Abstract We ask which logics with a given centre allow for en
Quantum logics with given centres and variable state spaces Mirko Navara 1, Pavel Ptak 2 Abstract We ask which logics with a given centre allow for enlargements with an arbitrary state space. We show in
More informationLogic via Algebra. Sam Chong Tay. A Senior Exercise in Mathematics Kenyon College November 29, 2012
Logic via Algebra Sam Chong Tay A Senior Exercise in Mathematics Kenyon College November 29, 2012 Abstract The purpose of this paper is to gain insight to mathematical logic through an algebraic perspective.
More informationNon-elementary Lower Bound for Propositional Duration. Calculus. A. Rabinovich. Department of Computer Science. Tel Aviv University
Non-elementary Lower Bound for Propositional Duration Calculus A. Rabinovich Department of Computer Science Tel Aviv University Tel Aviv 69978, Israel 1 Introduction The Duration Calculus (DC) [5] is a
More informationAlternating Time Temporal Logics*
Alternating Time Temporal Logics* Sophie Pinchinat Visiting Research Fellow at RSISE Marie Curie Outgoing International Fellowship * @article{alur2002, title={alternating-time Temporal Logic}, author={alur,
More informationComputer Science Dept.
A NOTE ON COMPUTATIONAL INDISTINGUISHABILITY 1 Oded Goldreich Computer Science Dept. Technion, Haifa, Israel ABSTRACT We show that following two conditions are equivalent: 1) The existence of pseudorandom
More informationMA103 Introduction to Abstract Mathematics Second part, Analysis and Algebra
206/7 MA03 Introduction to Abstract Mathematics Second part, Analysis and Algebra Amol Sasane Revised by Jozef Skokan, Konrad Swanepoel, and Graham Brightwell Copyright c London School of Economics 206
More informationIntroduction to Metalogic
Philosophy 135 Spring 2008 Tony Martin Introduction to Metalogic 1 The semantics of sentential logic. The language L of sentential logic. Symbols of L: Remarks: (i) sentence letters p 0, p 1, p 2,... (ii)
More informationCS632 Notes on Relational Query Languages I
CS632 Notes on Relational Query Languages I A. Demers 6 Feb 2003 1 Introduction Here we define relations, and introduce our notational conventions, which are taken almost directly from [AD93]. We begin
More informationSynthesis of Designs from Property Specifications
Synthesis of Designs from Property Specifications Amir Pnueli New York University and Weizmann Institute of Sciences FMCAD 06 San Jose, November, 2006 Joint work with Nir Piterman, Yaniv Sa ar, Research
More informationStructural Grobner Basis. Bernd Sturmfels and Markus Wiegelmann TR May Department of Mathematics, UC Berkeley.
I 1947 Center St. Suite 600 Berkeley, California 94704-1198 (510) 643-9153 FAX (510) 643-7684 INTERNATIONAL COMPUTER SCIENCE INSTITUTE Structural Grobner Basis Detection Bernd Sturmfels and Markus Wiegelmann
More informationA Resolution Method for Modal Logic S5
EPiC Series in Computer Science Volume 36, 2015, Pages 252 262 GCAI 2015. Global Conference on Artificial Intelligence A Resolution Method for Modal Logic S5 Yakoub Salhi and Michael Sioutis Université
More informationA Game-Theoretic Decision Procedure for the Constructive Description Logic calc
A Game-Theoretic Decision Procedure for the Constructive Description Logic calc Martin Sticht University of Bamberg, Informatics Theory Group Abstract In recent years, several languages of non-classical
More informationChapter 2. Assertions. An Introduction to Separation Logic c 2011 John C. Reynolds February 3, 2011
Chapter 2 An Introduction to Separation Logic c 2011 John C. Reynolds February 3, 2011 Assertions In this chapter, we give a more detailed exposition of the assertions of separation logic: their meaning,
More informationArguing and Explaining Classifications
Arguing and Explaining Classifications Leila Amgoud IRIT CNRS 118, route de Narbonne 31062, Toulouse, France amgoud@irit.fr Mathieu Serrurier IRIT CNRS 118, route de Narbonne 31062, Toulouse, France serrurier@irit.fr
More informationSocratic Proofs for Some Temporal Logics RESEARCH REPORT
Section of Logic and Cognitive Science Institute of Psychology Adam Mickiewicz University in Poznań Mariusz Urbański Socratic Proofs for Some Temporal Logics RESEARCH REPORT Szamarzewskiego 89, 60-589
More informationMATH 13 SAMPLE FINAL EXAM SOLUTIONS
MATH 13 SAMPLE FINAL EXAM SOLUTIONS WINTER 2014 Problem 1 (15 points). For each statement below, circle T or F according to whether the statement is true or false. You do NOT need to justify your answers.
More informationImproved Algorithms for Module Extraction and Atomic Decomposition
Improved Algorithms for Module Extraction and Atomic Decomposition Dmitry Tsarkov tsarkov@cs.man.ac.uk School of Computer Science The University of Manchester Manchester, UK Abstract. In recent years modules
More informationfor Propositional Temporal Logic with Since and Until Y. S. Ramakrishna, L. E. Moser, L. K. Dillon, P. M. Melliar-Smith, G. Kutty
An Automata-Theoretic Decision Procedure for Propositional Temporal Logic with Since and Until Y. S. Ramakrishna, L. E. Moser, L. K. Dillon, P. M. Melliar-Smith, G. Kutty Department of Electrical and Computer
More informationThe priority promotion approach to parity games
The priority promotion approach to parity games Massimo Benerecetti 1, Daniele Dell Erba 1, and Fabio Mogavero 2 1 Università degli Studi di Napoli Federico II 2 Università degli Studi di Verona Abstract.
More informationIntroduction to Kleene Algebra Lecture 14 CS786 Spring 2004 March 15, 2004
Introduction to Kleene Algebra Lecture 14 CS786 Spring 2004 March 15, 2004 KAT and Hoare Logic In this lecture and the next we show that KAT subsumes propositional Hoare logic (PHL). Thus the specialized
More informationWeak Alternating Automata and Tree Automata Emptiness. Moshe Y. Vardi y. Rice University. are used for specication and verication of nonterminating
Weak Alternating Automata and Tree Automata Emptiness Orna Kupferman UC Berkeley Moshe Y. Vardi y Rice University Abstract Automata on innite words and trees are used for specication and verication of
More informationAutomata, Logic and Games: Theory and Application
Automata, Logic and Games: Theory and Application 1. Büchi Automata and S1S Luke Ong University of Oxford TACL Summer School University of Salerno, 14-19 June 2015 Luke Ong Büchi Automata & S1S 14-19 June
More informationUpper and Lower Bounds on the Number of Faults. a System Can Withstand Without Repairs. Cambridge, MA 02139
Upper and Lower Bounds on the Number of Faults a System Can Withstand Without Repairs Michel Goemans y Nancy Lynch z Isaac Saias x Laboratory for Computer Science Massachusetts Institute of Technology
More informationPetri nets. s 1 s 2. s 3 s 4. directed arcs.
Petri nets Petri nets Petri nets are a basic model of parallel and distributed systems (named after Carl Adam Petri). The basic idea is to describe state changes in a system with transitions. @ @R s 1
More informationStrategy Logic. 1 Introduction. Krishnendu Chatterjee 1, Thomas A. Henzinger 1,2, and Nir Piterman 2
Strategy Logic Krishnendu Chatterjee 1, Thomas A. Henzinger 1,2, and Nir Piterman 2 1 University of California, Berkeley, USA 2 EPFL, Switzerland c krish@eecs.berkeley.edu, {tah,nir.piterman}@epfl.ch Abstract.
More informationReasoning: From Basic Entailments. to Plausible Relations. Department of Computer Science. School of Mathematical Sciences. Tel-Aviv University
General Patterns for Nonmonotonic Reasoning: From Basic Entailments to Plausible Relations Ofer Arieli Arnon Avron Department of Computer Science School of Mathematical Sciences Tel-Aviv University Tel-Aviv
More informationBinary Decision Diagrams
Binary Decision Diagrams Literature Some pointers: H.R. Andersen, An Introduction to Binary Decision Diagrams, Lecture notes, Department of Information Technology, IT University of Copenhagen Tools: URL:
More informationHow to lie without being (easily) convicted and the lengths of proofs in propositional calculus Pavel Pudlak?1 and Samuel R. Buss??2 1 Mathematics Ins
How to lie without being (easily) convicted and the lengths of proofs in propositional calculus Pavel Pudlak?1 and Samuel R. Buss??2 1 Mathematics Institute, Academy of Sciences of the Czech Republic,
More informationUniversität Stuttgart Fakultät Informatik, Elektrotechnik und Informationstechnik
Universität Stuttgart Fakultät Informatik, Elektrotechnik und Informationstechnik Fixpoint logics on hierarchical structures Stefan Göller and Markus Lohrey Report Nr. 005/0 Institut für Formale Methoden
More informationResolution and the Weak Pigeonhole Principle
Resolution and the Weak Pigeonhole Principle Sam Buss 1 and Toniann Pitassi 2 1 Departments of Mathematics and Computer Science University of California, San Diego, La Jolla, CA 92093-0112. 2 Department
More information1 Introduction A general problem that arises in dierent areas of computer science is the following combination problem: given two structures or theori
Combining Unication- and Disunication Algorithms Tractable and Intractable Instances Klaus U. Schulz CIS, University of Munich Oettingenstr. 67 80538 Munchen, Germany e-mail: schulz@cis.uni-muenchen.de
More informationModel Checking Fixed Point Logic with Chop
Model Checking Fixed Point Logic with Chop Martin Lange and Colin Stirling Laboratory for Foundations of Computer Science Division of Informatics University of Edinburgh {martin,cps}@dcs.ed.ac.uk Abstract.
More information, Department of Computer and Communication Sciences, University of Michigan, Ann Arbor, Michigan
SIAM J. COMPUT. Vol. 13, No. 4, November 1984 (C) 1984 Society for Industrial and Applied Mathematics 002 EQUIVALENCE RELATIONS, INVARIANTS, AND NORMAL FORMS* ANDREAS BLASS" AND YURI GUREVICH* Abstract.
More information