Distributed Synthesis for LTL Fragments

Size: px
Start display at page:

Download "Distributed Synthesis for LTL Fragments"

Transcription

1 Dstrbuted Synthess for LTL Fragments Krshnendu Chatterjee, Thomas A. Henznger, Jan Otop, Andreas Pavloganns IST Austra {chatterjee, tah, jotop, Abstract We consder the dstrbuted synthess problem for temporal logc specfcatons. Tradtonally, the problem has been studed for LTL, and the prevous results show that the problem s decdable ff there s no nformaton fork n the archtecture. We consder the problem for fragments of LTL and our man results are as follows: (1) We show that the problem s undecdable for archtectures wth nformaton forks even for the fragment of LTL wth temporal operators restrcted to next and eventually. (2) For specfcatons restrcted to globally along wth non-nested next operators, we establsh decdablty (n EXPSPACE) for star archtectures where the processes receve dsjont nputs, whereas we establsh undecdablty for archtectures contanng an nformaton fork-meet structure. (3) Fnally, we consder LTL wthout the next operator, and establsh decdablty (NEXPTIME-complete) for all archtectures for a fragment that conssts of a set of safety assumptons, and a set of guarantees where each guarantee s a safety, reachablty, or lveness condton. I. INTRODUCTION Synthess and dstrbuted synthess. The synthess problem s the most rgorous form of systems desgn, where the goal s to construct a system from a gven temporal logc specfcaton. The problem was orgnally proposed by Church [1] for synthess of crcuts, and has been revsted n many dfferent contexts, such as supervsory control of dscrete event systems [2], synthess of reactve modules [3], and several others. In a semnal work, Pnuel and Rosner [4] extended the classcal synthess problem to a dstrbuted settng. In the dstrbuted synthess problem, the nput conssts of () an archtecture of synchronously communcatng processes, that exchange messages through communcaton channels; and () a specfcaton gven as a temporal logc formula; and the synthess queston asks for a reactve system for each process such that the specfcaton s satsfed. The most common logc to express the temporal logc specfcaton s the lnear-tme temporal logc (LTL) [5]. Prevous results for dstrbuted synthess for LTL. In general the dstrbuted synthess problem s undecdable for LTL, but the problem s decdable for ppelne archtectures [4]. The undecdablty proof uses deas orgnatng from the undecdablty proof of three-player mperfect-nformaton games [6], [7]. The decdablty results for dstrbuted synthess have been extended to other smlar archtectures, such as oneway rngs [8], and also a dstrbuted games framework was proposed n [9]. Fnally, a complete topologcal crteron on the archtecture for decdablty of dstrbuted synthess for LTL was presented [10], where t was shown that the problem s decdable f and only f there s no nformaton fork n the underlyng archtecture. Archtectures wthout nformaton forks can essentally be reduced to ppelnes. Fragments of LTL. Whle LTL provdes a very rch framework to express temporal logc specfcatons, n recent years, several fragments of LTL have been consdered for effcent synthess of systems n the non-dstrbuted settng. Such fragments often encompass a large class of propertes that arse n practce and admt effcent synthess algorthms, as compared to the whole LTL. In [11], [12] the authors consdered a fragment of LTL wth only eventually (reachablty) and globally (safety) as the temporal operators. In [13] LTL wth only eventually and globally operators (but wthout next and untl operators) was consdered for effcent translaton to determnstc automata. The temporal logc specfcatons for reactve systems often consst of a set of assumptons and a set of guarantees, and the reactve system must satsfy the guarantees f the envronment satsfes the assumptons. In [14] the GR1 (generalzed reactvty 1) fragment of LTL was ntroduced where each assumpton and guarantee s a lveness condton; and t has been shown that GR1 synthess s very effectve to automatcally synthesze ndustral protocols such as the AMBA protocol [15], [16]. Our contrbutons. In ths work we consder the dstrbuted synthess problem for fragments of LTL. The prevous results n the lterature consdered the whole LTL and characterzed archtectures that lead to decdablty of dstrbuted synthess. In contrast, we consder fragments of LTL to present fner characterzatons of the decdablty results. Our man contrbutons are as follows: 1) Reachablty propertes. Frst we consder the fragment of LTL wth next and eventually (reachablty) as the only temporal operators, and establsh that the dstrbuted synthess problem s undecdable f there s an nformaton fork n the underlyng archtecture. In partcular, the problem s undecdable wth one nestng depth of the next operator and only one eventually operator;.e., f we consder the fragment of LTL that conssts of Boolean combnatons of atomc propostons and next of atomc propostons; and only one eventually as the temporal operator, then the dstrbuted synthess problem s undecdable ff there s an nformaton fork n the archtecture. 2) Safety propertes. We then consder the fragment of LTL wth next and globally (safety) as the only temporal operators, wth a sngle occurrence of the globally operator. We show that the dstrbuted synthess problem can be decdable under the exstence of nformaton forks; n partcular we establsh decdablty (n EXPSAPCE) for the star archtecture where processes have no common nputs from the envronment. However, we show that ISBN /13. Copyrght owned jontly by the authors and FMCAD Inc. 18 1

2 the problem remans undecdable for archtectures contanng an nformaton fork-meet, a structure n whch two processes receve sets of dsjont nputs, (as n the nformaton fork case), and a thrd process receves the unon of those sets. Moreover, our undecdablty proof agan uses specfcatons that do not contan nested next operators. In other words, f there s nformaton fork, the problem may be decdable, but f there s nformaton fork, and then the forked nformaton meets agan, then we obtan undecdablty. 3) Temporal specfcatons wthout the next operator. Snce our results show that even wth one nestng depth of the next operator, dstrbuted synthess s undecdable wth reachablty and safety objectves, we fnally consder the problem wthout the next operator. We show that f we consder a set of safety assumptons, and a set of guarantees such that each guarantee s a safety, reachablty, or a lveness guarantee, then the dstrbuted synthess problem s decdable (and NEXPTIME-complete) for all archtectures. Hence, our paper mproves upon exstng results by presentng fner (un)decdablty characterzatons of the dstrbuted synthess problem for fragments of LTL. We also remark that when we establsh decdablty, t s ether EXPSPACE or NEXPTIME-complete, as compared to prevous proofs of decdablty n dstrbuted synthess settng where the complexty s non-elementary. Thus as compared to the complexty of prevous decdablty results (tower of exponentals), our complextes (at most two exponentals) are very modest. II. MODEL DESCRIPTION Archtectures. An archtecture s a tuple A =(P,p e,v,e), where P = {p e,p 1,p 2,...p n } s a set of n +1 processes, p e s a dstngushed process representng the envronment, V s a set of (output) bnary varables, and E : P P!2 V defnes the communcaton varables between processes (.e, E(p, q) ={u, v} means that p wrtes to varables u, v, and q reads from them). For every process p 2P, we denote wth O(p) = S q2p E(p, q) the set of output varables of p, and wth I(p) = S q2p E(q, p) the set of nput varables of p. We requre that for all p, q 2P: O(p) \ O(q) =;,.e., no two processes wrte to the same varable. Fnally, we wll denote wth P = P\{p e }. An archtecture descrbes a dstrbuted reactve system, wth the envronment provdng the nputs va O(p e ), and the system respondng va I(p e ). The par (P,E) descrbes the archtecture of the system as a multgraph, wth P beng the set of nodes, and E(p, q) the set of drected p! q edges wth the correspondng varables as labels. Trees. We defne a (full) B-tree T over some fnte set B as the set of all nodes x 2 2 B. A (possbly nfnte) sequence of nodes =(x 1,x 2...) forms a path n T, f for every 1 we have x +1 = x z, for some z 2 2 B. For such a path, we wll use [] to denote the element of at the -th poston, whle [, 1] denotes the nfnte suffx of startng at poston. An A-labeled B-tree T s a B-tree equpped wth a labelng functon of ts nodes, : 2 B! 2 A. For every node x = yz 2 T wth z 2 2 B we denote wth ` (x) =z [ (x),.e., the ` of x conssts of the branch z from the parent and the label (x). For a (possbly nfnte) path =(x 1,x 2,...), we defne wth ` ( ) =(` (x 1 ),` (x 2 )...). Local strateges. For every process p 2P,alocal strategy p s a functon p : 2 I(p)! 2 O(p), settng the output varables of p accordng to the hstory of ts nput varables. Observe that every such local strategy p can be vewed as a labelng of an O(p)-labeled I(p)-tree T p. A local strategy p has fnte memory f there exsts a fnte set M, m 0 2M, and functons f : M 2 I(p)!Mand g : M!2 O(p) such that for all x = x 1 x 2...x k wth x 2 2 I(p), we have p(x) =g(f(...(f(f(m 0,x 1 ),x 2 )...,x k )). The memory of p s sad to be M, whle f M =1, then p s called memoryless. Collectve strateges. The collectve strategy of the archtecture A s a functon : 2 O(pe)! 2 V \O(pe), mappng every fnte sequence of the outputs of the envronment to a subset of the outputs of the processes p accordng to the composton ( p : p 2P ). The collectve strategy can be vewed as a (V \ O(p e ))-labeled O(p e )-tree T and for any nfnte path n T, we wll call ` ( ) a computaton. Hence, T descrbes a dstrbuted algorthm, and every nfnte path =(x 1,x 2,...) startng from the root represents a dstrbuted computaton ` ( ), accordng to the local strateges ( p : p 2P ). Synthess (realzablty). We wll consder dstrbuted reactve systems wth specfcatons gven by temporal logc formulae. For temporal logc formulae we wll consder LTL; see [5] for the formal syntax and semantcs of LTL. The problem of realzablty of a temporal logc formula n an archtecture A asks whether there exst local strateges p for every process p, such that for every nfnte path of the (V \O(p e ))-labeled O(p e )-tree T of the collectve strategy, wth startng from the root, we have ` ( ) =. If admts such strateges p for every p 2P, then t s called realzable, and the collectve strategy gves an mplementaton for on A. III. SYNTHESIS FOR REACHABILITY SPECIFICATIONS In the current secton we dscuss the synthess problem for reachablty specfcatons, where the objectve conssts of propostonal formulae connected wth Boolean operators and non-nested X (next) operators. We wll show that even under such restrctons, the synthess problem remans undecdable for all archtectures contanng an nformaton fork, va a reducton from the haltng problem of Turng machnes. Fragment LTL. We consder LTL that conssts of formulae from the followng LTL fragment: = P XP = 1 ^ 2 1 _ 2 = Q! where P, Q are propostonal formulae, X s the next operator, s the eventually temporal operator. We consder the standard semantcs of LTL. Formula represents a reachablty objectve, and Q wll capture the ntal nput n the archtecture. Turng machnes. Let M be a determnstc Turng machne fxed throughout ths secton and let Q be the set of states 2 19

3 of M (see [17] for detaled descrptons of Turng machnes). The machne M works over the alphabet {0, 1, t}, and ts tape s bounded by # symbols. The machne M cannot move left on a # symbol, and movng rght to a # symbol effects n extendng the tape by a blank symbol t. In our analyss, M starts wth the empty tape. A confguraton of M s a word #vqaut#, where a 2{0, 1}, v, u 2{0, 1} and q 2Q. Such a confguraton has the standard nterpretaton as an nfnte tape such that v s the part of the tape precedng the head, q s the current state of M, a s the letter under the head, and u s a sequence of symbols succeedng the head. The blank symbol t represents the rghtmost cell of the tape that has not been altered by M. We defne the projecton? over words w from some alphabet contanng?, such that? (w) s the result of omttng all? symbols from w. We defne a scattered confguraton C of M as a word over ={0, 1, t,?, #}[Q such that? (C) s a confguraton of M. Informaton-fork archtecture. We frst consder the archtecture A 0 (Fgure 1), characterzed as an nformaton fork n [10], for whch the problem of realzablty has been shown to be undecdable, usng LTL formulae wth nested untl operators (n [4]). Here we show that the problem remans undecdable for A 0 and specfcatons n the restrcted fragment of LTL. Ths s obtaned through a reducton from the haltng problem of M, by constructng a specfcaton 2 LTL whch s realzable ff M halts on the empty nput. Proof dea. The archtecture A 0 conssts of the envronment p e and two processes p 1 and p 2. The processes act as I/O streams, outputtng confguratons of M; the envronment sends separately to each process next and stall sgnals, ndcatng that the correspondng process should output the next letter from {0, 1, t, #}[Q of the current confguraton of M, or t should output?. Constructon of '. Frst, we wll provde a regular safety property ' whch specfes that f the envronment satsfes an alternaton assumpton,.e., every stall sgnal s followed by a next sgnal, then p 1 and p 2 conform wth a seres of guarantees. The property ' does not belong to the LTL fragment, but we wll show how t can be expressed by a safety automaton A safe. Then, we wll prove that f ' s realzable, and the envronment conforms wth the alternaton assumpton, then the processes output a legal sequence of confguratons of M, scattered wth the? symbol. Converson to LTL. Next, we wll provde the specfcaton for the synthess problem 2 LTL, such that s realzable ff ' s realzable and M halts on the empty nput. Formula does not express ' drectly, but t asserts that the envronment smulates a run of A safe fathfully, and fnally one of the processes outputs a haltng confguraton of M. More precsely, the envronment smulates a run of A safe storng the current state of A safe n a set of hdden varables {q 1,...,q m } 2 E(p e,p e ), and encodes that eventually ether () the envronment cheats n the smulaton of A safe, or () one of the processes outputs a haltng state q of M, whle the current state of A safe s not rejectng (.e., q was reached legally wth respect to M). We wll conclude that s realzable ff M halts on the empty nput. 20 q 1,...,q m p e x 1 x 2 p 1 p 2 y 1 y 2 Fg. 1: The archtecture A 0 whch conssts an nformaton fork. Formal proof. A safety automaton cannot express a scattered confguraton that s fnte. Thus, we defne a scattered preconfguraton C (of M) as a (possbly nfnte) word whose every fnte prefx can be extended to a scattered confguraton of M. A scattered preconfguraton s formally defned as a fnte or nfnte word over that begns wth #, there s at most one symbol from Q, there are no symbols after the second # and the t symbol s followed by the # symbol. Let C 1,C 2 be scattered preconfguratons. We denote wth?(c) the set of postons n C where? occurs, and wrte C 1 k C 2 f the symmetrc dfference of?(c 1 ) and?(c 2 ) has at most one element,.e.,?(c 1 )4?(C 2 ) apple1. We defne as C 1 ` C 2 f C 1 k C 2 and ()? (C 2 ) follows legally from? (C 1 ) accordng to M, or () both C 1,C 2 are nfnte preconfguratons such that every fnte prefx can be extended to fnte preconfguratons C 0 1,C 0 2 such that? (C 0 2) follows legally from? (C 0 1). For nfnte words w 1,w 2, we defne w 1 w 2 as a word over such that the -th letter of w 1 w 2 s a par of the -th letters of w 1,w 2. Observe that there are safety automata workng over that recognze the languages {C 1 C 2 : C 1 k C 2 } and {C 1 C 2 : C 1 ` C 2 }. Constructon of '. We frst construct the regular safety property ' = L! V 0appleapple4 Cond, where L (the alternaton assumpton) and Cond are defned as follows: L: for every process, every stall sgnal s followed by a next sgnal. Cond 0 : each process outputs? when ts nput s stall, otherwse t outputs a letter from \ {?}, Cond 1 : each process produces a sequence of scattered preconfguratons, Cond 2 : ntally, each process produces two scattered confguratons of M, whose projectons are the frst two vald confguratons of M, Cond 3 : f startng from some poston, p 1 outputs consecutvely C 1,C 2 and p 2 outputs consecutvely C1,C 0 2, 0 then C1 0 ` C 1 mples C2 0 ` C 2 or C2 0, C 2, Cond 4 : f D, D 0 are outputs of p 1,p 2 up to some postons such that D k D 0 and? (D) =? (D 0 ), then? (D) =? (D 0 ). We provde a hgh-level descrpton of the constructon of an alternatng safety automaton A safe (see [18] for the defnton of alternatng automata) whch verfes that every executon satsfes '. Note that A safe can be transformed to a nondetermnstc automaton by a standard power-set constructon. Clearly, condtons L, Cond 0 and Cond 1 can be expressed by a safety automaton. For the condton Cond 2, observe 3

4 that the frst two confguratons of M have at most 9 letters #q 0 t ##q 1 a t #, wth a 2 {0, 1, }. To show that the rest of condtons can be expressed by a safety automaton, we assume that L s satsfed; otherwse those condtons do not have to be checked (note that f L s volated, A safe accepts uncondtonally). Because of L, A safe can verfy that p 1 and p 2 conform wth Cond 2 by checkng the frst 18 output letters. For the condton Cond 3, A safe operates as follows: whenever t encounters a # symbol markng the begnnng of a confguraton, t splts unversally. One copy looks for the next confguraton, and the second copy, denoted by A 3, verfes that Cond 3 holds at the current poston, as follows. It gnores? symbols and compares whether C 1 k C 0 1, confguratons? (C 1 ) and? (C 0 1) are equal everywhere except for postons adjunct to the head of M, and the letters adjunct to the head are consstent wth the transton of M. If one of these condtons s volated, C 0 1 6` C 1, therefore A 3 accepts the word regardless of what follows. Otherwse, f those condtons hold,.e., C 0 1 ` C 1, A 3 non-determnstcally verfes one of the followng condtons: C 0 2 6k C 2 or C 0 2 ` C 2. Both condtons can be verfed by safety automata, snce C 2 and C 0 2 ether start concurrently, or C 2 s delayed by 1 step from C 0 2. For the condton Cond 4 observe that f D k D 0 and? (D) =? (D 0 ), then D D 0 apple 1 and the automaton needs to remember at most one symbol to compare? (D) and? (D 0 ). We can now prove the followng lemma. Lemma 1. If ' s realzable, then for every k 2N, n all executons where L holds, both p 1 and p 2 output sequences of scattered confguratons whose? projectons are sequences of at least k consecutve vald confguratons of M, startng wth the ntal confguraton on the empty nput. Proof: Frst note that there exst executons where the envronment ndeed satsfes L, and thus p 1 and p 2 satsfy condtons Cond 0 -Cond 4. The lemma clearly holds for k =1, 2, due to condtons Cond 0 Cond 2. For the nductve step, assume that the lemma holds for k 2. Consder a sequence of nputs to p 1 consstng of next sgnals only. Then, there s a sequence of nputs to p 2 consstng of some number of next sgnals and exactly? (C k ) stall sgnals placed n a such way that p 1 outputs C 1...C k C k+1, p 2 outputs C1 0...Ck 0 1 C0 k, and C kc k+1, Ck 0 1 C0 k are synchronzed,.e. they start at the same poston and C k k Ck 0 1, C k+1 k Ck 0. By the nducton assumpton? (Ck 0 1 ) and?(c k )=? (Ck 0 ) are, respectvely, (k 1)-th and k-th confguratons of M. Therefore, Ck 0 1 ` C k and, by Cond 3, Ck 0 ` C k+1. Ths mples that C k+1 s a fnte scattered preconfguraton and? (C k+1 ) s the (k + 1)-th confguraton of M. Gven that for an nput consstng of next sgnals only, p 1 outputs C 1...C k C k+1 satsfyng the statement, we can show that regardless of the number of stall sgnals, under condton L, p 1,p 2 output k +1 scattered confguratons satsfyng the statement. Frst, the condton Cond 4 mples that f p 2 also has an nput sequence consstng of next sgnals alone, t wll output the same sequence, that s, C 1...C k C k+1. By a smple nducton on the number of stall sgnals each process receves, and condton Cond 4, we conclude that for any number of stall sgnals, as long as L s satsfed by the envronment, p 1,p 2 output k +1 scattered confguratons whose projectons are the frst k +1 consecutve confguratons of M. Converson to LTL. Gven the safety automaton A safe whch verfes that ' s satsfed, we can construct a specfcaton 2 LTL, such that s realzable f and only f the Turng machne M does not halt on the empty nput. The envronment uses the hdden (not vsble to p 1,p 2 ) varables q 1,...,q k 2 E(p e,p e ) to smulate the automaton A safe. We provde a hgh level descrpton of the followng formulae: Q specfes that the frst state of A safe accordng to the output varables {q 1,...q m } s compatble wth the ntal values of x 1, x 2, y 1 and y 2 (.e. {q 1,...q m } represent the state of A safe reached from the ntal state after readng the ntal values of x 1, x 2, y 1 and y 2 ; Q s propostonal) 1 specfes that A safe has a transton from the current state to the next state, encoded by the values of {q 1,...q m } n the current and the next round, accordng to the value of varables x 1, x 2, y 1 and y 2 n the next round (.e., p e smulates A safe fathfully; 1 contans only propostonals and non-nested X operators). 2 specfes that the current state of A safe s not rejectng, and p 1 or p 2 outputs a haltng state of M (.e., some process reached a haltng confguraton of M, and both processes behaved accordng to A safe ; 2 s propostonal). Fnally, we construct = Q! ( 1 _ 2 ), wth 2 LTL. If s realzable, the processes satsfy 2 n all runs where the envronment fathfully smulates A safe and conforms wth condton L(.e., Q and 1 are true). Then p 1, p 2 output a haltng state of M and satsfy ', whch by Lemma 1, guarantees that the haltng state was reached by a legal sequence of confguratons of M. In the nverse drecton, f M halts, then s realzable by (fnte) local strateges whch output a fnte, legal sequence of confguratons of M and conform wth condton Cond 0. Hence, we obtan the followng theorem. Theorem 1. The realzablty of specfcatons from LTL n A 0 s undecdable. Smlarly as n [10], the above argument can be carred out to any archtecture whch contans an nformaton fork, by ntroducng addtonal safety condtons n ', whch requre that all processes propagate the nputs of the envronment to the two processes consttutng the nformaton fork. It has also been shown n [10] that n archtectures wthout nformaton forks, the realzablty of every LTL specfcaton s decdable. Hence, Theorem 1 together wth the results from [10] lead to the followng corollary. Corollary 1. For every archtecture A, the realzablty of specfcatons from LTL n A s decdable ff A does not contan an nformaton fork. IV. SYNTHESIS FOR SAFETY SPECIFICATIONS In the current secton we consder safety specfcatons where the safety condton conssts of propostonal formulae connected wth Boolean operators, and the X temporal operator. Frst, we show that the synthess problem s undecdable 4 21

5 for archtectures contanng an nformaton fork-meet (see Fgure 3), by a smlar constructon as n the case of LTL. Then we show that the problem s decdable for a famly of star archtectures, despte the exstence of nformaton forks. Fragment LTL. We consder LTL that conssts of formulae from the followng LTL fragment: = P 1 ^ 2 1 _ 2 X = Q ^ where P, Q are propostonal formulae, and s the globally operator. We consder the standard semantcs of LTL. The part of specfes a safety condton, and we nterpret Q as the ntal condtons. The fragment LTL can express safety specfcatons, one of the most basc specfcatons n verfcaton. Whle the nformaton fork crteron s decsve for the undecdablty of reachablty specfcatons, here we extend ths crteron to the famly of star archtectures of n +1 processes, denoted as S n (.e., p e s the central process, and S I(p ) = O(p e )) (Fgure 2) and show that: () the realzablty of some 2 LTL n S n s decdable f all processes receve parwse dsjont nputs, () t s undecdable f n 3 and we allow overlappng nputs. The latter can be generalzed to all archtectures whch contan such a structure, whch we call an nformaton fork-meet. O(p n ) p n I(p n ) I(p 1 ) O(p 1 ) p e p 1 I(p 2 ) p 2 O(p 2 ) Fg. 2: The famly of start archtectures S n. A. Overlappng nputs Here we demonstrate undecdablty of realzablty of specfcatons 2 LTL for star archtectures wth overlappng nputs, and wth havng X -depth 1 (.e., belongs to a subclass of LTL where X operators are not nested). We frst consder the star archtecture A 1 (Fgure 3), and obtan the undecdablty of realzablty of such specfcatons va a reducton from the (non) haltng problem. p e x 1 x 1 x 2 p 1 y 1 p 3 q 1,...,q m Fg. 3: The archtecture A 1 conssts an nformaton fork-meet. Gven a Turng machne M, recall the specfcaton ' (from Secton 3 for LTL ) encodng condtons L and Cond 0 Cond 4 through the safety automaton A safe. In contrast wth 22 x 2 p 2 y 2 the prevous secton, here we requre that process p 3 (nstead of p e ) fathfully smulates the safety automaton A safe usng the output varables q 1,...q m 2 E(p 3,p e ). Note that A safe operates on the varables x 1,x 2,y 1,y 2, whle p 3 does not have access to y 1 and y 2. However, t can nfer these values by smulatng p 1 and p 2 nternally, snce p 3 receves both x 1 and x 2 (overlappng nputs). Formal proof. We provde a hgh level descrpton of the followng formulae: Q specfes that the frst state of A safe accordng to the output varables {q 1,...q m } s compatble wth the ntal values of x 1, x 2, y 1 and y 2 (.e. {q 1,...q m } represent the state of A safe reached from the ntal state after readng the ntal values of x 1, x 2, y 1 and y 2 ; Q s propostonal) 1 specfes that A safe has a transton from the current state to the next state, encoded by the values of {q 1,...q m } n the current and the next round, accordng to the value of varables x 1, x 2, y 1 and y 2 n the next round (.e., p e smulates A safe fathfully; 1 contans only propostonals and non-nested X operators). 2 specfes that p 1 and p 2 do not output a haltng state of M (.e., M does not termnate; 2 s propostonal). 3 specfes that A safe does not reach a rejectng state (.e., the processes conform to condtons Cond 0 -Cond 4 or the envronment volates L; 3 s propostonal). We construct = Q ^ ( 1 ^ 2 ^ 3 ). Smlarly as n the case of LTL, f s realzable, p 3 fathfully smulates A safe (Q and 1 are true), and p 1, p 2 satsfy ' n all runs where the envronment conforms wth condton L ( 3 s true). By Lemma 1, p 1 and p 2 output a legal sequence of confguratons of M, and 2 guarantees that M does not halt. In the nverse drecton, f M does not halt, s realzable by local strateges where () p 1, p 2 output a legal sequence of confguratons of M and conform wth condton Cond 0, and () p 3 fathfully smulates A safe. Hence we have the followng result. Theorem 2. The realzablty of specfcatons from LTL n A 1 s undecdable. Remark 1. We remark that our proof of undecdablty n Theorem 2 makes use of nfnte-memory strateges, snce the processes p 1 and p 2 are requred to output an nfnte, non-haltng computaton. However, the realzablty problem for LTL n A 1 remans undecdable even f we restrct the strateges to be fnte-memory. We refer to the longer verson of ths paper n [19] for the proof. Informaton fork-meet. We say that an archtecture A = (P,p e,v,e) has an nformaton fork-meet f there are three processes p 1,p 2,p 3 2P and paths 1, 2 n the underlyng graph such that 1) the frst edges n 1, 2 are labeled by output varables of p e, 2) the last edge of 1 s an nput varable of p 1, but not p 2 3) the last edge of 2 s an nput varable of p 2, but not p 1 4) the last edges of 1, 2 are nput varables of p 3 Observe that an nformaton fork-meet s a specal case of nformaton fork, wth a thrd process that collects all nformaton that s dvded between p 1 and p 2. 5

6 As n the case of LTL, the undecdablty argument can be carred to any archtecture contanng such a structure, by ntroducng addtonal condtons n ' whch requre the rest of the processes to propagate the nputs of the envronment to p 1, p 2 and p 3 accordngly. Corollary 2. The realzablty of LTL specfcatons n archtectures contanng an nformaton fork-meet s undecdable. B. Parwse dsjont nputs In ths subsecton we dscuss synthess for formulae 2 LTL for the class of star archtectures, wth the addtonal property that all pars of processes receve dsjont nputs (.e., 8 6= j : I(p ) \ I(p j )=;), denoted as S n. Our goal s to prove decdablty of realzablty of such 2 LTL n every archtecture A2S n, by showng that whenever such s realzable, t admts strateges of bounded memory. Consder some archtecture A2S n and an arbtrary = Q ^ 2 LTL, wth the nestng level of X operators n beng k. Assume that s realzable n A by local strateges for every process p. These strateges can be represented by O(p )-labeled I(p )-trees T. We wll show how to construct strateges that also realze, where each tree I(p )-tree T representng s defned from frst 2 2k V +1 levels of T by applyng a foldng functon gven below. We frst defne the noton of some 2N closng n some computaton. Defnton 1. For a computaton `( ) and some 2N we say that closes n `( ) f `( )[ k, 1] =. Remark 2. `( ) = ff no closes n `( ). Let 1,..., n be local strateges and be the collectve strategy nduced by 1,..., n. For every 2{1,...,n}, the local strategy s represented by an O(p )-labeled I(p )-tree T. For every node x 2 T, wth x k, we denote wth x =(x k,x k 1...x 1 ) the k-node suffx of the unque path to x = x 1, and defne the type of x under as t (x) =` ( x ). For every level l k we defne the type of l under as t (l) ={t (x) : 2{1,...,n},x 2 T and x = l},.e., the type of a level l s the set of the types of the nodes of level l of every T, where 2{1,...,n}. Note that there exst at most 2 k V dstnct types of nodes. Consequently, there exst at most 2 2k V dstnct types of levels. We naturally extend the defnton of types to nodes of the (V \ O(p e ))-labeled O(p e )-tree T as t (x) =` ( x ). Consder some computaton ` ( ) n T. Observe that whether some closes n depends only on the ` ( )[].e., the type t ( []) determnes whether closes n. Hence, we have the followng remark: Remark 3. For a formula 2 LTL there exsts a set of types such that for every tree T, a path n T satsfes f ` ( )[1] = Q and for all 2N, we have t ( []) 2,.e., the set of types of nodes n T s a subset of. Foldng functon. Assume that there exst two levels l 1 <l 2 such that t (l 1 )=t (l 2 ). Then for every tree T, for every node x n level l 2 there exsts a node y n level l 1 such that t (x) =t (y),.e., x and y have the same type. For such l 1, l 2, and every process p, we defne the foldng functon f : 2 I(p)! 2 I(p) recursvely as follows: 8 >< x f x <l 2 f (x) = y f x = l 2 where y = l 1 and t (x) =t (y) >: f (f (y)z) f x >l 2 for x = yz wth z 2 2 I(p) and construct local strateges (x) = (f (x)). Hence, every strategy behaves as up to level l 2, whle for nodes further below, t maps them to nodes between levels l 1 and l 2, by recursvely foldng the levels l 1 and l 2 wth respect to the types of ther nodes. Snce the collectve strateges and behave dentcally on the frst l 1 levels, realzes the propostonal Q. The followng analyss focuses on the part of. The strateges preserve the types under of all local nodes up to level l 2, and only those. Because of the parwse dsjont nputs, ths property s mpled for the global nodes of the collectve strategy as well. The set of all such types serves as the set of Remark 3, whch n turn guarantees that the collectve strategy also realzes, as t does not ntroduce new types. We formalze these arguments below. The followng lemma establshes that for all nodes x n all T, the type of x s the same as the type of ts mage under f n the correspondng T. Lemma 2. For every x 2 2 I(p) wth x k, we have that t (x) =t (f (x)). Proof: Our proof proceeds by nducton on x : 1) x <l 2 : For all nodes w n x, we have that (w) = (f (w)) = (w), hence ` ( x )=` ( x ) and thus t (x) =t (f(x)). 2) x = l 2 : The statement holds by defnton. 3) x = m +1: Let x = yz wth y = m. By the nductve hypothess, t (y) =t (f (y)). We dstngush between the followng cases, dependng on whether f (y) extended by z hts the level l 2 (Fgure 4): () f (y) <l 2 1: Then f (x) =f (f (y)z) =f (y)z, that s, f we reach node x by extendng node y by an edge z, the same holds for ther correspondng mages under f. Then (x) = (f (x)) = (f (y)z), thus t (x) =t (f (y)z) =t (f (x)) (.e., the strategy wll label x as labels ts mage f (x), and the types of these two nodes are equal). () f (y) = l 2 1: By constructon, t (f (x)) = t (f (y)z) (.e., f (y) extended by z hts level l 2, and the foldng functon f wll brng x to level l 1, to a node of the same type). Then (x) = (f (x)) = (f (y)z), hence as n (), t (x) =t (f (y)z) =t (x). The desred result follows. The followng remark observes that for every archtecture from S n, every node n the collectve strategy tree corresponds to a unque set of nodes n the local strategy trees and vce versa, and that the collectve strategy on that node equals the unon of the local strateges on the correspondng local nodes. Remark 4. The followng assertons hold: 1) For every global node x = x 1 x 2...x m n T wth every x 2 2 O(pe), for every tree T j, there exsts a (unque) node x j = x 1 j x2 j...xm j such that x j = x \ 2 I(pj), and 6 23

7 l 1 f (y) z f (x) y z x (a) Case () l 2 z f (x) f (y) y z x (b) Case () Fg. 4: The two cases of the nductve step of Lemma 2. 2) for every set of nodes {x j = x 1 j x2 j...xm j } wth one x j from each T j, there exsts a (unque) global node x such that for all we have x = S j x j. Moreover, for every collectve strategy, we have (x) = S j j(x j ). It follows from the above remark and Lemma 2, that for every x 2 T we have that t (x) = t (f(x)), where f(x) = S f (x ). That s, the local foldng functons f result n a unque, global foldng functon f, and the types n the correspondng collectve strategy tree are preserved between the global nodes, and ther mages under f. Ths mples that the set of types occurrng n T s a subset of types of T. Then, by Remark 3 we conclude: Lemma 3. The collectve strategy mplements. Hence, whenever for a realzable 2 LTL exst levels l 1 and l 2 wth the same type under, we can construct a collectve strategy for whch every local strategy uses only the frst l 2 levels of the correspondng, and Lemma 3 guarantees that mplements. By our prevous observaton and the pgeonhole prncple, l 2 s upper bounded by 2 2k V +1, and thus every local strategy operates n the frst 2 2k V +1 levels of the correspondng I(p )-tree. There are a bounded number of local strateges wth ths property, thus the problem of realzablty n ths case reduces to exhaustvely explorng all of them. Moreover, t follows from our analyss that local nodes n the same level and havng the same type can be merged, snce the local strategy that behaves dentcally n both subtrees preserves the set of types appearng n the global tree. Hence, the wdth of each level s bounded by the number of dfferent possble types, 2 k V. Ths leads to Theorem 3 (we refer to [19] for the formal proof). Theorem 3. The realzablty of 2 LTL for the class S n of star archtectures wth parwse dsjont nputs s decdable n EXPSPACE. V. SYNTHESIS WITHOUT THE NEXT OPERATOR In the current secton we consder a fragment of LTL wthout the X operator, for whch the problem of realzablty s decdable n non-determnstc exponental tme n the sze of the specfcaton. Fragment LTL AG. We consder LTL AG that conssts of formulae from the followng LTL fragment: 24 l 1 l 2 = ^ P! ^ P! P! ^ Q ^ ^ R ^ ^! F ^ Q ^ ^ R ^ ^! F Q ^ ^ R ^ ^! F for 2{1,...m}, wth P, Q, R, F propostonal formulae, and P = V P, Q = V Q. We consder the standard semantcs of LTL. The LTL AG can express specfcatons that consst of conjuncton of safety assumptons, and guarantees where each guarantee s a safety, reachablty, or a lveness condton. A propostonal formula Q has the property that can ether be realzed n a sngle step, or s not realzable. Ths mples that realzable formulae Q admt memoryless strateges whch repeat the sngle step realzaton of Q. A smlar argument establshes that reachablty and safety specfcatons of propostonal formulae are equvalent wth respect to realzablty. We formally state these observatons n Lemmas 4 and 5, and refer to [19] for the proofs. Lemma 4. Let A be any archtecture. Every formula = Q, for some propostonal Q, s realzable n A ff t s realzable by memoryless strateges. Lemma 5. Let A be any archtecture. For every formula = Q for some propostonal Q, s realzable n A ff 0 = Q s realzable n A. Lemma 6 shows that the realzablty of some 2 LTL AG reduces to realzng a set of safety formulae of the form of Lemma 4. Lemma 6. Let A be any archtecture and = P! ( Q ^ V R ^ V F ) 2 LTL AG. The formula s realzable n A ff every R = (P! (Q ^ R )) and every F = (P! (Q ^ F )) s realzable n A. Proof: () For the rght to left drecton, assume that there exst famles of memoryless (by Lemma 4) local strateges ( R j ) and ( F j ) for every process p j, such that the collectve strategy R mplements R, and the collectve strategy F mplements F. Construct local strateges j such that for every x = yz wth z = (1 + x mod 2m), we have j (x) = R z j (z) f z apple m, and j (x) = F z m j (z) f z >m(.e. the local strategy j repeatedly alternates between R all the strateges j n the frst m steps, and between all F the strateges j the next m steps). Let be the collectve strategy of all j and consder an arbtrary path n T. Ether ` ( )[k] = P for some k, or for all k, t holds ` ( )[k] = P, and by constructon, for = 1 + k mod 2m, we have ` ( )[k] = Q ^ R when apple m and ` ( )[k] = Q ^ F m when >m. In both cases, ` ( ) =. () For the left to rght drecton, assume that for some, R s not realzable (the analyss s smlar for F ). By Lemma 5, (P! (Q ^ R ) s not realzable. Hence, for any collectve strategy there exsts some path n T, such that for all 7

8 k, we have ` ( )[k] = P ^ ( Q _ R ), and does not mplement. Hence, Lemma 6 establshes that every formula 2 LTL AG s realzable f and only f t admts local strateges for all the correspondng F, R, by provdng a constructve argument. As a consequence of Lemma 4, decdng whether every F, R s realzable reduces to realzng the propostonal formulae (P! (Q^R ) and (P! (Q^F ). Ths can be done n NEXPTIME, by havng a non-determnstc Turng machne guessng the local strateges of all processes, and verfyng that such strateges satsfy the formula under all the (exponentally many) possble nputs of the envronment. We show that the problem s also NEXPTIME-hard, va a reducton from the Dependency Quantfer Boolean Formula (DQBF) valdty problem ntroduced n [20] to study tme bounded mult-player alternatng machnes. A DQBF s a quantfed Boolean formula wth a succnct descrpton of dependences between the quantfed varables. Every DQBF has an equvalent form n whch all exstentally quantfed varables are substtuted by exstentally quantfed Skolem functons defned over ther dependences, and appearng at the begnnng of the formula (e.g. 8x 1 8x 2 9y 1 (x 1 )9y 2 (x 2 )'(x 1,x 2,y 1,y 2 ) s a DQBF statng that y depends on x, and has a functonal form x 1 8x 2 '(x 1,x 2, 1(x 1 ), 2(x 2 )) wth 1, 2 the Skolem functons). Lemma 7. Gven an archtecture A and a formula 2 LTL AG, decdng whether s realzable n A s NEXPTIME-hard. Proof: Consder any DQBF formula : 8x 1...8x k 9y 1 ( x! 1 )...9y n ( x! n )'(x 1,...x k,y 1...y n ) wth k unversally quantfed varables x and n exstentally quantfed varables y. We assume w.l.o.g. that the dependences of each y are only on some unversally quantfed varables! x. We construct the archtecture A = (P,p e,v,e), where P contans n +1 processes, V = {x 2 }[{y 2 }, process p receves as nputs from the envronment all! x, outputs varable y, whle the envronment uses all remanng x j as hdden varables. We construct the specfcaton = ' 2 LTL AG. Both A and are polynomal n the sze of. Because of Lemma 4, s realzable n A ff ' s realzable n A. In turn, ' s realzable ff s vald, wth local strateges correspondng to the Skolem functons n the functonal form of, and unversal varables correspondng to all possble choces of the envronment n A. Snce DQBF valdty s NEXPTIME-hard [20], the statement follows. Hence, we have the followng result. Theorem 4. Gven an archtecture A and a specfcaton 2 LTL AG, the realzablty of n A s NEXPTIME-complete. Observe that Lemma 6 reduces the problem of realzablty of some ' 2 LTL AG to realzng a set of formulae of the form Q, where Q s propostonal. Ths n turn s reducble to DQBF valdty (because of Lemma 4), and because of Lemma 7, the two problems are equvalent. In consequence, effcent algorthms for solvng DQBF, such as [21], yeld effcent synthess procedures for LTL AG, and vce versa. Moreover, f the DQBF tool outputs the correspondng Skolem functons, then a wtness collectve strategy for realzablty can be obtaned. VI. CONCLUSIONS In ths paper we studed the dstrbuted synthess problem for relevant fragments of LTL. We presented a much fner characterzaton of undecdablty results for dstrbuted synthess n terms of LTL fragments that uses eventually, globally and next operators. In contrast to prevous decdablty results that were non-elementary, we dentfy fragments where the complexty s EXPSPACE (or NEXPTIME-complete). An nterestng drecton of future work would be to develop algorthms for the problems for whch we establsh decdablty, obtan effcent mplementatons of the algorthms for dstrbuted synthess problems, and fnally consder some casestudes of practcal examples. Acknowledgments. The research was supported by Austran Scence Fund (FWF) Grant No P N23, FWF NFN Grant No S N23 (RSE), ERC Start grant (279307: Graph Games), Mcrosoft faculty fellows award, the Austran Scence Fund NFN RSE (Rgorous Systems Engneerng), the ERC Advanced Grant QUAREM (Quanttatve Reactve Modelng). REFERENCES [1] A. Church, Logc, arthmetc and automata, n Proceedngs of the nternatonal congress of mathematcans, pp , [2] P. Ramadge and W. Wonham, Supervsory control of a class of dscrete event processes, SIAM Journal on Control and Optmzaton, vol. 25, no. 1, pp , [3] A. Pnuel and R. Rosner, On the synthess of a reactve module, POPL 89, pp , ACM, [4] A. Pnuel and R. Rosner, Dstrbuted reactve systems are hard to synthesze, SFCS 90, pp vol.2, [5] A. Pnuel, The temporal logc of programs, n FOCS, pp , [6] J. H. Ref, Unversal games of ncomplete nformaton, STOC 79, pp , ACM, [7] G. L. Peterson and J. H. Ref, Multple-person alternaton, n FOCS, pp , [8] O. Kupferman and M. Y. Vard, Syntheszng dstrbuted systems, n LICS, pp , [9] S. Mohalk and I. Walukewcz, Dstrbuted games, n FSTTCS, pp , [10] B. Fnkbener and S. Schewe, Unform dstrbuted synthess, LICS, pp , [11] R. Alur, S. La Torre, and P. Madhusudan, Playng games wth boxes and damonds, n CONCUR, pp , [12] R. Alur and S. La Torre, Determnstc generators and games for LTL fragments, ACM Trans. Comput. Log., vol. 5, no. 1, pp. 1 25, [13] J. Kretínský and J. Esparza, Determnstc automata for the (F, G)- fragment of LTL, n CAV, pp. 7 22, [14] N. Pterman, A. Pnuel, and Y. Sa ar, Synthess of reactve(1) desgns, n VMCAI, LNCS 3855, Sprnger, pp , [15] Y. Godhal, K. Chatterjee, and T. A. Henznger, Synthess of AMBA AHB from formal specfcaton: A case study, STTT, [16] R. Bloem, S. J. Galler, B. Jobstmann, N. Pterman, A. Pnuel, and M. Weglhofer, Interactve presentaton: Automatc hardware synthess from specfcatons: a case study, n DATE, pp , [17] C. Papadmtrou, Computatonal complexty. Addson-Wesley, [18] O. Kupferman, M. Y. Vard, and P. Wolper, An automata-theoretc approach to branchng-tme model checkng, Journal of the ACM (JACM), vol. 47, no. 2, pp , [19] K. Chatterjee, T. A. Henznger, J. Otop, and A. Pavloganns, Dstrbuted synthess for LTL fragments, Techncal Report: IST Synthess.pdf. [20] G. Peterson, J. Ref, and S. Azhar, Lower bounds for multplayer noncooperatve games of ncomplete nformaton, Journal of Computers and Mathematcs wth Applcatons, vol. 41, pp , [21] A. Fröhlch, G. Kovászna, and A. Bere, A DPLL algorthm for solvng DQBF, Pragmatcs of SAT, vol. 2012,

Distributed Synthesis for LTL Fragments

Distributed Synthesis for LTL Fragments 1 Dstrbuted Synthess for LTL Fragments Krshnendu Chatterjee, Thomas A. Henznger, Jan Otop, Andreas Pavloganns IST Austra {chatterjee, tah, jotop, pavloganns}@st.ac.at Abstract We consder the dstrbuted

More information

Turing Machines (intro)

Turing Machines (intro) CHAPTER 3 The Church-Turng Thess Contents Turng Machnes defntons, examples, Turng-recognzable and Turng-decdable languages Varants of Turng Machne Multtape Turng machnes, non-determnstc Turng Machnes,

More information

Affine transformations and convexity

Affine transformations and convexity Affne transformatons and convexty The purpose of ths document s to prove some basc propertes of affne transformatons nvolvng convex sets. Here are a few onlne references for background nformaton: http://math.ucr.edu/

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

Basic Regular Expressions. Introduction. Introduction to Computability. Theory. Motivation. Lecture4: Regular Expressions

Basic Regular Expressions. Introduction. Introduction to Computability. Theory. Motivation. Lecture4: Regular Expressions Introducton to Computablty Theory Lecture: egular Expressons Prof Amos Israel Motvaton If one wants to descrbe a regular language, La, she can use the a DFA, Dor an NFA N, such L ( D = La that that Ths

More information

More metrics on cartesian products

More metrics on cartesian products More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The first idea is connectedness.

20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The first idea is connectedness. 20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The frst dea s connectedness. Essentally, we want to say that a space cannot be decomposed

More information

Edge Isoperimetric Inequalities

Edge Isoperimetric Inequalities November 7, 2005 Ross M. Rchardson Edge Isopermetrc Inequaltes 1 Four Questons Recall that n the last lecture we looked at the problem of sopermetrc nequaltes n the hypercube, Q n. Our noton of boundary

More information

Notes on Frequency Estimation in Data Streams

Notes on Frequency Estimation in Data Streams Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to

More information

U.C. Berkeley CS278: Computational Complexity Professor Luca Trevisan 2/21/2008. Notes for Lecture 8

U.C. Berkeley CS278: Computational Complexity Professor Luca Trevisan 2/21/2008. Notes for Lecture 8 U.C. Berkeley CS278: Computatonal Complexty Handout N8 Professor Luca Trevsan 2/21/2008 Notes for Lecture 8 1 Undrected Connectvty In the undrected s t connectvty problem (abbrevated ST-UCONN) we are gven

More information

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009 College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:

More information

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction ECONOMICS 5* -- NOTE (Summary) ECON 5* -- NOTE The Multple Classcal Lnear Regresson Model (CLRM): Specfcaton and Assumptons. Introducton CLRM stands for the Classcal Lnear Regresson Model. The CLRM s also

More information

Week 2. This week, we covered operations on sets and cardinality.

Week 2. This week, we covered operations on sets and cardinality. Week 2 Ths week, we covered operatons on sets and cardnalty. Defnton 0.1 (Correspondence). A correspondence between two sets A and B s a set S contaned n A B = {(a, b) a A, b B}. A correspondence from

More information

Games of Threats. Elon Kohlberg Abraham Neyman. Working Paper

Games of Threats. Elon Kohlberg Abraham Neyman. Working Paper Games of Threats Elon Kohlberg Abraham Neyman Workng Paper 18-023 Games of Threats Elon Kohlberg Harvard Busness School Abraham Neyman The Hebrew Unversty of Jerusalem Workng Paper 18-023 Copyrght 2017

More information

Perfect Competition and the Nash Bargaining Solution

Perfect Competition and the Nash Bargaining Solution Perfect Competton and the Nash Barganng Soluton Renhard John Department of Economcs Unversty of Bonn Adenauerallee 24-42 53113 Bonn, Germany emal: rohn@un-bonn.de May 2005 Abstract For a lnear exchange

More information

Lecture 4: Universal Hash Functions/Streaming Cont d

Lecture 4: Universal Hash Functions/Streaming Cont d CSE 5: Desgn and Analyss of Algorthms I Sprng 06 Lecture 4: Unversal Hash Functons/Streamng Cont d Lecturer: Shayan Oves Gharan Aprl 6th Scrbe: Jacob Schreber Dsclamer: These notes have not been subjected

More information

Introductory Cardinality Theory Alan Kaylor Cline

Introductory Cardinality Theory Alan Kaylor Cline Introductory Cardnalty Theory lan Kaylor Clne lthough by name the theory of set cardnalty may seem to be an offshoot of combnatorcs, the central nterest s actually nfnte sets. Combnatorcs deals wth fnte

More information

Min Cut, Fast Cut, Polynomial Identities

Min Cut, Fast Cut, Polynomial Identities Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.

More information

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of

More information

Learning Theory: Lecture Notes

Learning Theory: Lecture Notes Learnng Theory: Lecture Notes Lecturer: Kamalka Chaudhur Scrbe: Qush Wang October 27, 2012 1 The Agnostc PAC Model Recall that one of the constrants of the PAC model s that the data dstrbuton has to be

More information

Homotopy Type Theory Lecture Notes

Homotopy Type Theory Lecture Notes 15-819 Homotopy Type Theory Lecture Notes Evan Cavallo and Stefan Muller November 18 and 20, 2013 1 Reconsder Nat n smple types s a warmup to dscussng nductve types, we frst revew several equvalent presentatons

More information

Foundations of Arithmetic

Foundations of Arithmetic Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an

More information

A CLASS OF RECURSIVE SETS. Florentin Smarandache University of New Mexico 200 College Road Gallup, NM 87301, USA

A CLASS OF RECURSIVE SETS. Florentin Smarandache University of New Mexico 200 College Road Gallup, NM 87301, USA A CLASS OF RECURSIVE SETS Florentn Smarandache Unversty of New Mexco 200 College Road Gallup, NM 87301, USA E-mal: smarand@unmedu In ths artcle one bulds a class of recursve sets, one establshes propertes

More information

Maximizing the number of nonnegative subsets

Maximizing the number of nonnegative subsets Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum

More information

12 MATH 101A: ALGEBRA I, PART C: MULTILINEAR ALGEBRA. 4. Tensor product

12 MATH 101A: ALGEBRA I, PART C: MULTILINEAR ALGEBRA. 4. Tensor product 12 MATH 101A: ALGEBRA I, PART C: MULTILINEAR ALGEBRA Here s an outlne of what I dd: (1) categorcal defnton (2) constructon (3) lst of basc propertes (4) dstrbutve property (5) rght exactness (6) localzaton

More information

NP-Completeness : Proofs

NP-Completeness : Proofs NP-Completeness : Proofs Proof Methods A method to show a decson problem Π NP-complete s as follows. (1) Show Π NP. (2) Choose an NP-complete problem Π. (3) Show Π Π. A method to show an optmzaton problem

More information

Lecture Space-Bounded Derandomization

Lecture Space-Bounded Derandomization Notes on Complexty Theory Last updated: October, 2008 Jonathan Katz Lecture Space-Bounded Derandomzaton 1 Space-Bounded Derandomzaton We now dscuss derandomzaton of space-bounded algorthms. Here non-trval

More information

FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP

FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP C O L L O Q U I U M M A T H E M A T I C U M VOL. 80 1999 NO. 1 FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP BY FLORIAN K A I N R A T H (GRAZ) Abstract. Let H be a Krull monod wth nfnte class

More information

Volume 18 Figure 1. Notation 1. Notation 2. Observation 1. Remark 1. Remark 2. Remark 3. Remark 4. Remark 5. Remark 6. Theorem A [2]. Theorem B [2].

Volume 18 Figure 1. Notation 1. Notation 2. Observation 1. Remark 1. Remark 2. Remark 3. Remark 4. Remark 5. Remark 6. Theorem A [2]. Theorem B [2]. Bulletn of Mathematcal Scences and Applcatons Submtted: 016-04-07 ISSN: 78-9634, Vol. 18, pp 1-10 Revsed: 016-09-08 do:10.1805/www.scpress.com/bmsa.18.1 Accepted: 016-10-13 017 ScPress Ltd., Swtzerland

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

Computing Correlated Equilibria in Multi-Player Games

Computing Correlated Equilibria in Multi-Player Games Computng Correlated Equlbra n Mult-Player Games Chrstos H. Papadmtrou Presented by Zhanxang Huang December 7th, 2005 1 The Author Dr. Chrstos H. Papadmtrou CS professor at UC Berkley (taught at Harvard,

More information

Finding Primitive Roots Pseudo-Deterministically

Finding Primitive Roots Pseudo-Deterministically Electronc Colloquum on Computatonal Complexty, Report No 207 (205) Fndng Prmtve Roots Pseudo-Determnstcally Ofer Grossman December 22, 205 Abstract Pseudo-determnstc algorthms are randomzed search algorthms

More information

Lecture 5 Decoding Binary BCH Codes

Lecture 5 Decoding Binary BCH Codes Lecture 5 Decodng Bnary BCH Codes In ths class, we wll ntroduce dfferent methods for decodng BCH codes 51 Decodng the [15, 7, 5] 2 -BCH Code Consder the [15, 7, 5] 2 -code C we ntroduced n the last lecture

More information

FINITELY-GENERATED MODULES OVER A PRINCIPAL IDEAL DOMAIN

FINITELY-GENERATED MODULES OVER A PRINCIPAL IDEAL DOMAIN FINITELY-GENERTED MODULES OVER PRINCIPL IDEL DOMIN EMMNUEL KOWLSKI Throughout ths note, s a prncpal deal doman. We recall the classfcaton theorem: Theorem 1. Let M be a fntely-generated -module. (1) There

More information

Linear, affine, and convex sets and hulls In the sequel, unless otherwise specified, X will denote a real vector space.

Linear, affine, and convex sets and hulls In the sequel, unless otherwise specified, X will denote a real vector space. Lnear, affne, and convex sets and hulls In the sequel, unless otherwse specfed, X wll denote a real vector space. Lnes and segments. Gven two ponts x, y X, we defne xy = {x + t(y x) : t R} = {(1 t)x +

More information

Difference Equations

Difference Equations Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1

More information

Time-Varying Systems and Computations Lecture 6

Time-Varying Systems and Computations Lecture 6 Tme-Varyng Systems and Computatons Lecture 6 Klaus Depold 14. Januar 2014 The Kalman Flter The Kalman estmaton flter attempts to estmate the actual state of an unknown dscrete dynamcal system, gven nosy

More information

A General Architecture for Reliable Decentralized Supervisory Control of Discrete Event Systems

A General Architecture for Reliable Decentralized Supervisory Control of Discrete Event Systems Jont 48th IEEE Conference on Decson and Control and 28th Chnese Control Conference Shangha, P.R. Chna, December 16-18, 2009 WeA06.3 A General Archtecture for Relable Decentralzed Supervsory Control of

More information

arxiv: v1 [math.co] 1 Mar 2014

arxiv: v1 [math.co] 1 Mar 2014 Unon-ntersectng set systems Gyula O.H. Katona and Dánel T. Nagy March 4, 014 arxv:1403.0088v1 [math.co] 1 Mar 014 Abstract Three ntersecton theorems are proved. Frst, we determne the sze of the largest

More information

On the Complexity of Partial Order Trace Model Checking

On the Complexity of Partial Order Trace Model Checking On the Complexty of Partal Order Trace Model Checkng Therry Massart Cédrc Meuter Laurent Van Begn Unversté Lbre de Bruxelles (U.L.B.), Boulevard du Tromphe, CP-212, 1050 Bruxelles, Belgum {tmassart,cmeuter,lvbegn}@ulb.ac.be

More information

CHAPTER III Neural Networks as Associative Memory

CHAPTER III Neural Networks as Associative Memory CHAPTER III Neural Networs as Assocatve Memory Introducton One of the prmary functons of the bran s assocatve memory. We assocate the faces wth names, letters wth sounds, or we can recognze the people

More information

Anti-van der Waerden numbers of 3-term arithmetic progressions.

Anti-van der Waerden numbers of 3-term arithmetic progressions. Ant-van der Waerden numbers of 3-term arthmetc progressons. Zhanar Berkkyzy, Alex Schulte, and Mchael Young Aprl 24, 2016 Abstract The ant-van der Waerden number, denoted by aw([n], k), s the smallest

More information

Efficient Solutions for the Complement of ww R and the Complement of ww

Efficient Solutions for the Complement of ww R and the Complement of ww Effcent Solutons for the Complement of ww R and the Complement of ww Allaoua Refouf Computer Scence Department Unversty of Sétf Algéra allaouarefouf@unv-setfdz Journal of Dgtal Informaton Management ABSTRACT:

More information

REAL ANALYSIS I HOMEWORK 1

REAL ANALYSIS I HOMEWORK 1 REAL ANALYSIS I HOMEWORK CİHAN BAHRAN The questons are from Tao s text. Exercse 0.0.. If (x α ) α A s a collecton of numbers x α [0, + ] such that x α

More information

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal

Inner Product. Euclidean Space. Orthonormal Basis. Orthogonal Inner Product Defnton 1 () A Eucldean space s a fnte-dmensonal vector space over the reals R, wth an nner product,. Defnton 2 (Inner Product) An nner product, on a real vector space X s a symmetrc, blnear,

More information

Report on Image warping

Report on Image warping Report on Image warpng Xuan Ne, Dec. 20, 2004 Ths document summarzed the algorthms of our mage warpng soluton for further study, and there s a detaled descrpton about the mplementaton of these algorthms.

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

Stanford University CS254: Computational Complexity Notes 7 Luca Trevisan January 29, Notes for Lecture 7

Stanford University CS254: Computational Complexity Notes 7 Luca Trevisan January 29, Notes for Lecture 7 Stanford Unversty CS54: Computatonal Complexty Notes 7 Luca Trevsan January 9, 014 Notes for Lecture 7 1 Approxmate Countng wt an N oracle We complete te proof of te followng result: Teorem 1 For every

More information

a b a In case b 0, a being divisible by b is the same as to say that

a b a In case b 0, a being divisible by b is the same as to say that Secton 6.2 Dvsblty among the ntegers An nteger a ε s dvsble by b ε f there s an nteger c ε such that a = bc. Note that s dvsble by any nteger b, snce = b. On the other hand, a s dvsble by only f a = :

More information

APPENDIX A Some Linear Algebra

APPENDIX A Some Linear Algebra APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,

More information

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg prnceton unv. F 17 cos 521: Advanced Algorthm Desgn Lecture 7: LP Dualty Lecturer: Matt Wenberg Scrbe: LP Dualty s an extremely useful tool for analyzng structural propertes of lnear programs. Whle there

More information

Graph Reconstruction by Permutations

Graph Reconstruction by Permutations Graph Reconstructon by Permutatons Perre Ille and Wllam Kocay* Insttut de Mathémathques de Lumny CNRS UMR 6206 163 avenue de Lumny, Case 907 13288 Marselle Cedex 9, France e-mal: lle@ml.unv-mrs.fr Computer

More information

Economics 101. Lecture 4 - Equilibrium and Efficiency

Economics 101. Lecture 4 - Equilibrium and Efficiency Economcs 0 Lecture 4 - Equlbrum and Effcency Intro As dscussed n the prevous lecture, we wll now move from an envronment where we looed at consumers mang decsons n solaton to analyzng economes full of

More information

Variants of Quantified Linear Programming and Quantified Linear Implication

Variants of Quantified Linear Programming and Quantified Linear Implication Varants of Quantfed Lnear Programmng and Quantfed Lnear Implcaton Potr Wojcechowsk LDCSEE West Vrgna Unversty Morgantown, WV pwojcec@mx.wvu.edu Pavlos Ernaks DMST Athens Unversty of Economcs and Busness

More information

For now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results.

For now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results. Neural Networks : Dervaton compled by Alvn Wan from Professor Jtendra Malk s lecture Ths type of computaton s called deep learnng and s the most popular method for many problems, such as computer vson

More information

Every planar graph is 4-colourable a proof without computer

Every planar graph is 4-colourable a proof without computer Peter Dörre Department of Informatcs and Natural Scences Fachhochschule Südwestfalen (Unversty of Appled Scences) Frauenstuhlweg 31, D-58644 Iserlohn, Germany Emal: doerre(at)fh-swf.de Mathematcs Subject

More information

Perron Vectors of an Irreducible Nonnegative Interval Matrix

Perron Vectors of an Irreducible Nonnegative Interval Matrix Perron Vectors of an Irreducble Nonnegatve Interval Matrx Jr Rohn August 4 2005 Abstract As s well known an rreducble nonnegatve matrx possesses a unquely determned Perron vector. As the man result of

More information

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could

More information

Calculation of time complexity (3%)

Calculation of time complexity (3%) Problem 1. (30%) Calculaton of tme complexty (3%) Gven n ctes, usng exhaust search to see every result takes O(n!). Calculaton of tme needed to solve the problem (2%) 40 ctes:40! dfferent tours 40 add

More information

Equivalence Checking of Dissimilar Circuits II

Equivalence Checking of Dissimilar Circuits II Equvalence Checkng of Dssmlar Crcuts II Cadence Berkeley Labs 1995 Unversty Ave.,Sute 460, Berkeley, Calforna,94704 phone: (510)-647-2825, fax: (510)-486-0205 CDNL-TR-2004-0830 August 2004 Eugene Goldberg

More information

The Minimum Universal Cost Flow in an Infeasible Flow Network

The Minimum Universal Cost Flow in an Infeasible Flow Network Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran

More information

= z 20 z n. (k 20) + 4 z k = 4

= z 20 z n. (k 20) + 4 z k = 4 Problem Set #7 solutons 7.2.. (a Fnd the coeffcent of z k n (z + z 5 + z 6 + z 7 + 5, k 20. We use the known seres expanson ( n+l ( z l l z n below: (z + z 5 + z 6 + z 7 + 5 (z 5 ( + z + z 2 + z + 5 5

More information

n α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0

n α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0 MODULE 2 Topcs: Lnear ndependence, bass and dmenson We have seen that f n a set of vectors one vector s a lnear combnaton of the remanng vectors n the set then the span of the set s unchanged f that vector

More information

5 The Rational Canonical Form

5 The Rational Canonical Form 5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces

More information

Exercise Solutions to Real Analysis

Exercise Solutions to Real Analysis xercse Solutons to Real Analyss Note: References refer to H. L. Royden, Real Analyss xersze 1. Gven any set A any ɛ > 0, there s an open set O such that A O m O m A + ɛ. Soluton 1. If m A =, then there

More information

arxiv: v1 [cs.gt] 14 Mar 2019

arxiv: v1 [cs.gt] 14 Mar 2019 Stable Roommates wth Narcssstc, Sngle-Peaked, and Sngle-Crossng Preferences Robert Bredereck 1, Jehua Chen 2, Ugo Paavo Fnnendahl 1, and Rolf Nedermeer 1 arxv:1903.05975v1 [cs.gt] 14 Mar 2019 1 TU Berln,

More information

Complete subgraphs in multipartite graphs

Complete subgraphs in multipartite graphs Complete subgraphs n multpartte graphs FLORIAN PFENDER Unverstät Rostock, Insttut für Mathematk D-18057 Rostock, Germany Floran.Pfender@un-rostock.de Abstract Turán s Theorem states that every graph G

More information

Common loop optimizations. Example to improve locality. Why Dependence Analysis. Data Dependence in Loops. Goal is to find best schedule:

Common loop optimizations. Example to improve locality. Why Dependence Analysis. Data Dependence in Loops. Goal is to find best schedule: 15-745 Lecture 6 Data Dependence n Loops Copyrght Seth Goldsten, 2008 Based on sldes from Allen&Kennedy Lecture 6 15-745 2005-8 1 Common loop optmzatons Hostng of loop-nvarant computatons pre-compute before

More information

Lecture 4: November 17, Part 1 Single Buffer Management

Lecture 4: November 17, Part 1 Single Buffer Management Lecturer: Ad Rosén Algorthms for the anagement of Networs Fall 2003-2004 Lecture 4: November 7, 2003 Scrbe: Guy Grebla Part Sngle Buffer anagement In the prevous lecture we taled about the Combned Input

More information

Text S1: Detailed proofs for The time scale of evolutionary innovation

Text S1: Detailed proofs for The time scale of evolutionary innovation Text S: Detaled proofs for The tme scale of evolutonary nnovaton Krshnendu Chatterjee Andreas Pavloganns Ben Adlam Martn A. Nowak. Overvew and Organzaton We wll present detaled proofs of all our results.

More information

HMMT February 2016 February 20, 2016

HMMT February 2016 February 20, 2016 HMMT February 016 February 0, 016 Combnatorcs 1. For postve ntegers n, let S n be the set of ntegers x such that n dstnct lnes, no three concurrent, can dvde a plane nto x regons (for example, S = {3,

More information

VQ widely used in coding speech, image, and video

VQ widely used in coding speech, image, and video at Scalar quantzers are specal cases of vector quantzers (VQ): they are constraned to look at one sample at a tme (memoryless) VQ does not have such constrant better RD perfomance expected Source codng

More information

Appendix B. Criterion of Riemann-Stieltjes Integrability

Appendix B. Criterion of Riemann-Stieltjes Integrability Appendx B. Crteron of Remann-Steltes Integrablty Ths note s complementary to [R, Ch. 6] and [T, Sec. 3.5]. The man result of ths note s Theorem B.3, whch provdes the necessary and suffcent condtons for

More information

arxiv: v1 [quant-ph] 6 Sep 2007

arxiv: v1 [quant-ph] 6 Sep 2007 An Explct Constructon of Quantum Expanders Avraham Ben-Aroya Oded Schwartz Amnon Ta-Shma arxv:0709.0911v1 [quant-ph] 6 Sep 2007 Abstract Quantum expanders are a natural generalzaton of classcal expanders.

More information

Supplement: Proofs and Technical Details for The Solution Path of the Generalized Lasso

Supplement: Proofs and Technical Details for The Solution Path of the Generalized Lasso Supplement: Proofs and Techncal Detals for The Soluton Path of the Generalzed Lasso Ryan J. Tbshran Jonathan Taylor In ths document we gve supplementary detals to the paper The Soluton Path of the Generalzed

More information

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Structure and Drive Paul A. Jensen Copyright July 20, 2003 Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.

More information

Module 9. Lecture 6. Duality in Assignment Problems

Module 9. Lecture 6. Duality in Assignment Problems Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept

More information

The optimal delay of the second test is therefore approximately 210 hours earlier than =2.

The optimal delay of the second test is therefore approximately 210 hours earlier than =2. THE IEC 61508 FORMULAS 223 The optmal delay of the second test s therefore approxmately 210 hours earler than =2. 8.4 The IEC 61508 Formulas IEC 61508-6 provdes approxmaton formulas for the PF for smple

More information

NUMERICAL DIFFERENTIATION

NUMERICAL DIFFERENTIATION NUMERICAL DIFFERENTIATION 1 Introducton Dfferentaton s a method to compute the rate at whch a dependent output y changes wth respect to the change n the ndependent nput x. Ths rate of change s called the

More information

TOPICS MULTIPLIERLESS FILTER DESIGN ELEMENTARY SCHOOL ALGORITHM MULTIPLICATION

TOPICS MULTIPLIERLESS FILTER DESIGN ELEMENTARY SCHOOL ALGORITHM MULTIPLICATION 1 2 MULTIPLIERLESS FILTER DESIGN Realzaton of flters wthout full-fledged multplers Some sldes based on support materal by W. Wolf for hs book Modern VLSI Desgn, 3 rd edton. Partly based on followng papers:

More information

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems

Chapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons

More information

Model theory makes formulas large

Model theory makes formulas large Model theory makes formulas large Anuj Dawar Martn Grohe Stephan Kreutzer Ncole Schwekardt Unversty of Cambrdge, U.K., Emal: anuj.dawar@ cl.cam.ac.uk Humboldt-Unverstät zu Berln, Germany, Emal: {grohe

More information

Lecture 7: Gluing prevarieties; products

Lecture 7: Gluing prevarieties; products Lecture 7: Glung prevaretes; products 1 The category of algebrac prevaretes Proposton 1. Let (f,ϕ) : (X,O X ) (Y,O Y ) be a morphsm of algebrac prevaretes. If U X and V Y are affne open subvaretes wth

More information

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4) I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes

More information

Lecture 10: May 6, 2013

Lecture 10: May 6, 2013 TTIC/CMSC 31150 Mathematcal Toolkt Sprng 013 Madhur Tulsan Lecture 10: May 6, 013 Scrbe: Wenje Luo In today s lecture, we manly talked about random walk on graphs and ntroduce the concept of graph expander,

More information

The Complexity of Early-Deciding in Unreliable Synchronous Networks Fabrice Le Fessant 1

The Complexity of Early-Deciding in Unreliable Synchronous Networks Fabrice Le Fessant 1 The Complexty of Early-Decdng n Unrelable Synchronous Networks Fabrce Le Fessant 1 fabrce@lefessant.net Mcrosoft Research Lab., Cambrdge, CB3 0FB, UK Aprl 1, 2003 Techncal Report MSR-TR-2003-23 Mcrosoft

More information

Approximate Smallest Enclosing Balls

Approximate Smallest Enclosing Balls Chapter 5 Approxmate Smallest Enclosng Balls 5. Boundng Volumes A boundng volume for a set S R d s a superset of S wth a smple shape, for example a box, a ball, or an ellpsod. Fgure 5.: Boundng boxes Q(P

More information

An efficient algorithm for multivariate Maclaurin Newton transformation

An efficient algorithm for multivariate Maclaurin Newton transformation Annales UMCS Informatca AI VIII, 2 2008) 5 14 DOI: 10.2478/v10065-008-0020-6 An effcent algorthm for multvarate Maclaurn Newton transformaton Joanna Kapusta Insttute of Mathematcs and Computer Scence,

More information

ECE559VV Project Report

ECE559VV Project Report ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate

More information

An Introduction to Morita Theory

An Introduction to Morita Theory An Introducton to Morta Theory Matt Booth October 2015 Nov. 2017: made a few revsons. Thanks to Nng Shan for catchng a typo. My man reference for these notes was Chapter II of Bass s book Algebrac K-Theory

More information

Polynomials. 1 More properties of polynomials

Polynomials. 1 More properties of polynomials Polynomals 1 More propertes of polynomals Recall that, for R a commutatve rng wth unty (as wth all rngs n ths course unless otherwse noted), we defne R[x] to be the set of expressons n =0 a x, where a

More information

Grover s Algorithm + Quantum Zeno Effect + Vaidman

Grover s Algorithm + Quantum Zeno Effect + Vaidman Grover s Algorthm + Quantum Zeno Effect + Vadman CS 294-2 Bomb 10/12/04 Fall 2004 Lecture 11 Grover s algorthm Recall that Grover s algorthm for searchng over a space of sze wors as follows: consder the

More information

Edit-Distance between Visibly Pushdown Languages

Edit-Distance between Visibly Pushdown Languages Edt-Dstance between Vsbly Pushdown Languages Yo-Sub Han 1 and Sang-K Ko 2 1 Department of Computer Scence, Yonse Unversty 50, Yonse-Ro, Seodaemun-Gu, Seoul 120-749, Republc of Korea emmous@yonse.ac.kr

More information

The internal structure of natural numbers and one method for the definition of large prime numbers

The internal structure of natural numbers and one method for the definition of large prime numbers The nternal structure of natural numbers and one method for the defnton of large prme numbers Emmanul Manousos APM Insttute for the Advancement of Physcs and Mathematcs 3 Poulou str. 53 Athens Greece Abstract

More information

Supporting Information

Supporting Information Supportng Informaton The neural network f n Eq. 1 s gven by: f x l = ReLU W atom x l + b atom, 2 where ReLU s the element-wse rectfed lnear unt, 21.e., ReLUx = max0, x, W atom R d d s the weght matrx to

More information

and problem sheet 2

and problem sheet 2 -8 and 5-5 problem sheet Solutons to the followng seven exercses and optonal bonus problem are to be submtted through gradescope by :0PM on Wednesday th September 08. There are also some practce problems,

More information

SL n (F ) Equals its Own Derived Group

SL n (F ) Equals its Own Derived Group Internatonal Journal of Algebra, Vol. 2, 2008, no. 12, 585-594 SL n (F ) Equals ts Own Derved Group Jorge Macel BMCC-The Cty Unversty of New York, CUNY 199 Chambers street, New York, NY 10007, USA macel@cms.nyu.edu

More information

Case A. P k = Ni ( 2L i k 1 ) + (# big cells) 10d 2 P k.

Case A. P k = Ni ( 2L i k 1 ) + (# big cells) 10d 2 P k. THE CELLULAR METHOD In ths lecture, we ntroduce the cellular method as an approach to ncdence geometry theorems lke the Szemeréd-Trotter theorem. The method was ntroduced n the paper Combnatoral complexty

More information

Errors for Linear Systems

Errors for Linear Systems Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch

More information