Trace Compaction using SAT-based Reachability Analysis

Size: px
Start display at page:

Download "Trace Compaction using SAT-based Reachability Analysis"

Transcription

1 Trce Compction using SAT-bsed Rechbility Anlysis Sen Sfrpour, Andres Veneris, Hrtch Mngssrin Deprtment of Electricl nd Computer Engineering University of Toronto, Toronto, Cnd {sen, veneris, Abstrct In tody s designs, when functionl verifiction fils, engineers perform debugging using the provided error trces. Reducing the length of error trces cn help the debugging tsk by decresing the number of vribles nd clock cycles tht must be considered. We propose novel trce length compction pproch bsed on SAT-bsed rechbility nlysis. We develop procedures nd lgorithms using pre-imge computtion to efficiently trverse the stte spce nd reduce the trce lengths. We further introduce dt structure used to store the visited sttes which is criticl to the performnce of the proposed pproch. Experiments demonstrte the effectiveness of the rechbility pproch s pproximtely 75% of the trces re reduced by one or two orders of mgnitudes. I. INTRODUCTION Functionl verifiction of digitl circuits is mjor problem for the VLSI design community. It is reported tht up 70% of the cost nd effort of VLSI design is due to verifiction nd debugging []. Debugging, which consists of locting nd fixing errors or bugs in n erroneous design, is responsible for pproximtely 50% of the overll verifiction cost []. Given seuentil circuit nd golden model tht specifies the correct behvior of the circuit, verifiction tools cn determine whether the circuit is consistent with the golden model. Mny different verifiction pproches exist tody such s simultion-bsed methods, nd bounded nd unbounded forml techniues [2]. Despite the recent dvnces in the field of forml verifiction, most VLSI compnies still use simultion techniues s centrl verifiction strtegy []. Performing verifiction vi simultion cnnot prove the correctness of design unless the complete behvior of the design is exercised [2]. Since proving the correctness my not be n option for tody s lrge designs, performing lrge number of simultions cn chieve high level of confidence in the design s correctness. A testbench cn exercise the design with the help of rndom or semi-rndom stimulus genertors. The testbench cn lso determine whether the design nd the model re inconsistent in their response to the stimulus. In this cse, n error trce or counter-exmple, consisting of seuence of ctions or sttes from the initil sttes to the error, is produced. The verifiction engineer hs the responsibility of determining why design nd golden model hve inconsistent behviors bsed on the error trce(s). Since trce is often derived from rndom simultion, the seuence of events leding to the error cn be unnecessrily long. In other words, shorter error trce my be ble to describe the sme erroneous behvior in less clock cycles. With shorter trce, the debugging tsk of the verifiction engineer cn be considerbly reduced s fewer signls nd clock cycles must be considered. As result, reducing the length of trces cn substntilly increse the efficiency of design debugging. Previous work shows tht for rndom nd semi-rndom bsed simultions, error trces cn often be reduced to frction of their initil size [3], [4], [5], [6]. One such techniue uses forwrd imge computtion using Binry Decision Digrms (BDDs) to reduce the trces [3]. In [4], techniues re presented to remove vribles from counter exmples in order to simplify them, but their lengths re not reduced. Another recent work uses severl techniues bsed on performing further simultions nd Bounded Model Checking (BMC) to chieve smll trces [5]. The techniue of [6] is the closest to ours s they utilize seuentil Boolen Stisfibility (SAT) solver to find short-cuts in the originl trce. More specificlly, [6] seeks to find the shortest pth from the initil stte to some cndidte intermedite stte similr to BMC but using seuentil SAT solver. In this work, we propose trce length compction techniue where the shortest pth from the initil stte to finl stte is sought. This pproch is bsed on rechbility nlysis where n ll-solution SAT solver is used s the pre-imge computtion engine [7], [8], [9]. The benefits over the existing BDD [3] nd BMC techniues [5] re tht the BDD memory explosion problem cn be verted nd tht compctions exceeding the finite bound of BMC pproches my be pplied. Our techniue ppers to shre mny of the dvntges of the seuentil SAT pproch proposed in [6]. The min difference is tht ours relies on rechbility nlysis nd pre-imge computtion while mking use of novel dt structure to determine stte continment reltionships. More specificlly, the contributions of this pper re the following. A trce compction techniue bsed purely on pre-imge computtion nd rechbility nlysis using n ll-solution SAT solver. A set of continment rules tht help drw reltionships between existing sttes nd sttes found through pre-imge computtion which my result in shorter trces. A stte selection procedure within the rechbility nlysis engine nd set of heuristics tht improve the performnce of the overll pproch in prctice. A novel dt structure for storing visited sttes tht llows for uick identifiction of stte continment reltionships. This pper is orgnized s follows. In the next section, some bckground informtion is provided on finite stte mchines, preimge computtion, nd rechbility nlysis. Section III presents the proposed trce compction pproch nd discusses its centrl procedures. Section IV, introduces novel dt structure criticl for the efficient performnce of the proposed pproch. Sections V nd VI demonstrte the experimentl results nd conclude the pper, respectively. II. PRELIMINARIES In this section we provide some bckground on Finite Stte Mchines, trces, imge nd pre-imge computtion, nd rechbility nlysis. We ssume tht the reder is fmilir with SAT solver terminology [7]. A. Finite Stte Mchines A seuentil digitl circuit cn be modeled by Finite Stte Mchine (FSM) represented by 6-tuple M := (Q,Σ,, δ, λ, 0)

2 where Q is the finite set of sttes, Σ re re the input nd output lphbets respectively, δ : Q Σ Q is the stte trnsition function, λ : Q Σ is the output function, nd 0 is the initil stte [2]. Figure illustrtes simple FSM where the sttes re represented by nodes nd the trnsitions re represented by edges pre-imge i 0 pre-imge 3 pre-imge 2 pre-imge k Fig.. Finite Stte Mchine with 7 sttes A trce of length k for n FSM is n input seuence <,,, k > tht leds the FSM through seuence of sttes < 0,,, k, k >. Note tht some sttes my be repeted in the stte seuence. Figure 2 represents one possible trce for the FSM of Figure Fig A smple trce for the bove FSM B. Imge nd Pre-imge Computtion Given seuentil circuit with current stte vribles V nd next stte vribles V, set of current sttes nd set of next sttes re lbeled by Q(V ) nd Q(V ) respectively. The trnsition reltion from set of sttes Q(V ) to Q(V ), denoted by T(Q(V ), Q(V )), is true for ech pir of Q(V ) nd Q(V ) if δ(q(v )) = Q(V ) for set of input ssignments [2]. Given the bove, the imge nd pre-imge of circuit cn be defined s follows. IMAGE: Q(V ) = V.(T(Q(V ), Q(V )) Q(V )) PRE-IMAGE: Q(V ) = V.(T(Q(V ), Q(V )) Q(V )) Intuitively, the imge of stte i is ll the sttes tht cn be reched from i under ll possible input combintions in single clock cycle. Similrly, the pre-imge of i comprises of ll the sttes tht cn led to i under ll possible input combintions in one clock cycle. In the FSM of Figure, the imge of stte is { 2, 6} while its pre-imge is { 0, 3}. Although the imge nd pre-imge of circuits re trditionlly computed using BDDs [2], some techniues bsed on ll-solution Boolen Stisfibility (SAT) solvers cn lso be used [8], [9], [0], []. All-solution SAT solvers cn compute the pre-imge set Q(V ) by constrining the circuit CNF to Q(V ) nd itertively finding ll the solutions tht stisfy the CNF in terms of the current stte vribles V [0]. Recent work on SAT-bsed Unbounded Model Checking (UMC) nd pre-imge computtion techniues hve demonstrted considerble dvncements [8], [9], [0], []. In this work, we re minly concerned with SAT-bsed pre-imge computtion. Since this techniue finds sttes one t time, we use the term pre-imge loosely to lso refer to single stte jtht belongs to the pre-imge of i. Furthermore, we use the term stte to refer to stte cube, which is stte encoding tht my contin unssigned or don t cre vribles. As such, stte my be superset (cover) of other sttes. For instnce, the stte cube {v, v 2, v 3} =X covers the sttes {v, v 2, v 3}=0 nd {v, v 2, v 3}=. For brevity, in the remining of this pper we drop the vrible nmes (i.e. v, v 2, v 2) when describing stte vlues. C. Rechbility Anlysis Rechbility nlysis is the process of determining whether stte k is rechble from nother stte 0. In the relm of UMC, 0 6 Fig. 3. initil stte found Illustrtion of rechbility nlysis rechbility nlysis cn be used to check CTL properties of type EF k where k is bd stte nd 0 is legl or initil stte [2]. Intuitively, rechbility nlysis trverses the stte spce bckwrds from stte k until stte 0 is found or fix-point, where no new sttes re found, is reched [2]. Pre-imge computtion is centrl procedure of rechbility nlysis s it performs the single bckwrd steps. The mnner in which the stte spce is trversed depends on which of the visited sttes is selected for ech preimge computtion step. If the visited sttes re stored in stck-like dt structure, depth-first trversl is performed, while ueue-like dt structure results in bredth-first trversl. Figure 3 illustrtes bredth-first rechbility nlysis process tht eventully finds the initil stte 0. In this figure, the blck nodes represent sttes while ech cone represents set of sttes found by one pre-imge computtion step. III. PROPOSED TRACE COMPACTION APPROACH In this section we present our proposed trce length compction pproch. First we introduce the centrl concept followed by detils of the stte selection procedure nd the ll-solution SAT solver. A. Rechbility Bsed Trce Compction A trce cn be represented by directed grph G = (N, E) where the nodes N represent sttes nd the edges E represent trnsitions between sttes. An edge from stte i to j denotes tht i belongs to the pre-imge of j nd j belongs to the imge of i. Our objective is to reduce the length of the pth from the initil stte 0 to the finl stte k by pplying pre-imge computtion nd rechbility nlysis techniues. Our proposed pproch performs rechbility nlysis on ll the sttes belonging to the originl trce. The mnner in which sttes re selected for rechbility nlysis is described in Section III-C. All the sttes (or stte cubes) found by the pre-imge computtion steps of the rechbility engine re dded to the grph G. Grph G is updted with edges denoting tht ech newly found sttes i is pre-imge of some stte j, selected for pre-imge computtion. Fig Updting the grph G with new nodes nd edges When sttes found by pre-imge computtion lredy exist in the grph G, extr edges my be drwn in G to illustrte new legl trnsitions. These trnsitions my provide shorter pth (or short-cut) from the initil stte to the finl stte thus reducing the overll trce length. For exmple consider the sitution described in Figure 4 where the originl trce is shown s the seuence < 0,, 2, 3, 4 > nd the dshed nodes re sttes found through rechbility nlysis. Since 2 is found s pre-imge of 4, nd is the pre-imge of 2 in the originl trce, new edge shown 5 4

3 s dshed line cn be drwn directly from the originl (non-dshed) 2 to 4 nd the dshed 2 cn be removed. The overll result is shorter pth from 0 to 4 which skips node 3. As motivted by the bove exmple, finding stte euivlences in the grph G cn led to more short-cuts which cn reduce the overll trce size. Along with the stte euivlence reltion discussed, there re other stte continment reltionships tht cn led to further short-cuts in the grph. The following rules determine how the grph G is updted fter ech pre-imges computtion step. Consider stte i found s pre-imge of stte i+, nd the seuence < j, j, j+ > existing in the grph G. Rule. If i = j: Stte i is not dded to G, but n edge is drwn from j to i+. Rule 2. If i j: Stte i is dded to G, n edge is drwn from i to i+, nd nother edge is drwn from j to i+. Rule 3. If i j: Stte i is dded to G, n edge is drwn from i to i+, nother edge is drwn from j to i, nd nother edge is drwn from i to j+. The correctness of rule is evident s the imges of euivlent sttes re lso euivlent. Rule 2 cn be explined by expnding the stte cube i, into two components i = { j} S { i j}. From here we use the fct tht ny imge of i is lso n imge of j. Similrly, rule 3 cn be explined by expnding j into two components j = { i} S { j i}. i =X i+ =0 i+ =0 = X j- j j+ j- j j+ () Fig. 5. Illustrting rules 2 nd 3 The following exmple helps clrify rules 2 nd 3. Consider stte i found s pre-imge of stte i+, nd the seuence < j, j, j+ >, where stte i =X nd the stte j = 0. By rule 2, n edge is first drwn from i to i+ to indicte tht i is pre-imge of stte i+. Since X 0 nd i+ is n imge of i =X= {0} S {}, then i+ must lso be n imge of j = 0. This scenrio is illustrted in Figure 5 () with the new edges drwn s dshed lines. Similrly, by rule 3 n edge is first drwn to indicte tht i is pre-imge of stte i+. Since stte i =0 is subset of stte j =X= {0} S {}, then the sttes j nd j+ must be pre-imge nd n imge of i lso, respectively. The three edges dded in this scenrio re drwn s dshed lines in Figure 5 (b). Our overll trce compction techniue using rechbility nlysis is shown in Figure 6. Lines -7 set up the problem, build the initil grph G nd determine the initil trce length. The remining lines perform rechbility nlysis by selecting stte for preimge computtion (line 0), computing the pre-imges (line 2), nd pplying the stte continment rules (line 4). The rechbility nlysis is terminted fter ll sttes hve been selected for pre-imge computtion or fter mximum, mx, number of steps hve been performed determined by the counter. B. Creting More Short-cuts As discussed in the previous section, the continment rules re criticl for creting short-cuts in the grph G. To increse the likelihood of pplying these rules, the rechbility engine is slightly modified from its typicl UMC ppliction. Trditionlly in UMC, rechbility engines focus on finding only new sttes nd block previously visited sttes [8]. This llows them to uickly identify i (b) : G = 2: V isited = 3: counter = 0 4: for ll (sttes i between 0 to k (inclusive)) do 5: V isited.dd( i ) 6: G = dd to grph( i ) 7: end for 8: length = BFS(G, k, 0 ) 9: while (counter mx &&!V isited.empty()) do 0: j = select stte(v isited) : V isited = V isited j 2: PreImges = pre-imge( j ) 3: for ll (sttes i PreImges) do 4: pply rules 2 3(G, i, j ) 5: end for 6: V isited = V isited PreImges 7: counter = counter + 8: length = BFS(G, k, 0 ) 9: Print(Trce is of size length) 20: end while 2: return length Fig. 6. Trce compction procedure using rechbility nlysis when fixed-point is reched, or when ll legl sttes re visited [9]. In contrst, this work encourges finding previous sttes or sttes tht cover or re covered by others. These continment reltionships llow us to drw dditionl edges between nodes nd incresing the likelihood of reducing the trce. It should be noted tht precutions re tken to void repetedly visiting the sme set of sttes. A second techniue used to increse the likelihood of pplying the continment rules is to populte the grph with more sttes thn those provided in the originl trce. Since the originl trce only hs s mny sttes s its trce length, there my not be enough uniue sttes to crete mny short-cuts. We propose populting the grph initilly by computing single pre-imge for the sttes in the originl trce. This pproch llows us to uickly dd stte cubes to the grph which leds to more pplictions of the continment rules. The prcticl dvntge of this techniue is highlighted in the experiments of Section V. C. Stte Selection Procedure During rechbility nlysis, which stte is selected for pre-imge computtion determines the mnner in which the stte spce is trversed. For instnce, if the most recently visited (found) stte is lwys selected, then the stte spce is trversed in depth-first mnner. Here, we develop stte selection criteri tht help guide the rechbility engine towrds finding short-cuts from the initil stte to the finl stte. It should be noted tht these criteris re heuristics which my not lwys be dvntgeous. The first criteri is to select cndidte stte from the set of visited sttes with the smllest hmming distnce to the initil stte 0. The hmming distnce between two sttes is the number of stte vribles with different vlues (0 or ). For sttes with don t cres (X), every X mtches both the 0 nd vlue. For instnce, if sttes {00, 0, 0X, XX0} re visited nd 0 = 0000, then stte XX0 is selected since it hs hmming distnce of with respect to 0. The intuition behind the bove criteri is tht sttes with smller hmming distnce to 0 reuire less stte vribles to chnge to rech 0 s pre-imge. Therefore, the likelihood of finding 0 t the next step my be higher. A second fctor tht influences the stte selection procedure is the pth length from cndidte stte to the lst stte k. If this length is greter thn 50% of the current shortest pth from 0 to k then the stte is not considered for selection. This criteri encourges finding mny pre-imges ner the end of the trce (closer to k ) nd less closer to the initil stte. Together, both criteris increse the probbility of creting lrge short-cuts between sttes t the two ends of the originl trce.

4 D. All-Solution SAT Solver The rechbility engine is highly dependent on the performnce of the pre-imge computtion engine, which is bsed on n llsolution SAT solver. This SAT solver uses circuit don t cres to determine whether vribles my remin unssigned while stisfying the problem [0], [2]. Since the don t cres re propgted bckwrds through gte (from output to input) they re idel for preimge computtion where current stte vribles V cn be viewed s pseudo inputs to the circuit. The ll-solution SAT solver contins mny solution reduction techniues to ensure tht smll solutions re returned in n efficient mnner [8], [9], [0]. For our ppliction, chieving smll stte cubes is criticl to trversing the stte spce efficiently. Ech pre-imge computtion step corresponds to cll to the llsolution SAT solver. Since it my not be prcticl to find ll of the pre-imge sttes due to the exponentil nture of the problem, the ll-solution SAT solver is lso euipped with limit t. If ll the pre-imge stte cubes re not found in time nd memory efficient mnner, the ll-solution SAT solver will return the first t stte cubes it finds. This llows us to perform rechbility nlysis by finding prtil pre-imges. IV. STORING VISITED STATES The success of the rechbility nlysis pproch described in Section III depends on the bility to uickly pply the rules of Section III-A. More specificlly, the situtions where newly found stte i ) is eul to existing sttes, 2) is superset of existing sttes, or 3) is subset of existing sttes must be rpidly identified. In this section we introduce dt structure tht stores ll the sttes belonging to G while identifying the stte continment reltionships uickly. Note tht this dt structure is not only vible for trce compction, but cn lso be used for rechbility nlysis within UMC frmework [9], [8], []. A. Determining Stte Continment Reltionships The dt structure described here is composed of two components ) binry tree T nd 2) hsh tble. The binry tree is used to detect the stte continment reltionships, while the hsh tble is used to locte the exct stte. The stte continment reltionship depends on the number of don t cres in ech stte. A stte with more don t cres my cover one with fewer, while the converse is not true irrespective of the ctul position of the don t cres. To tke dvntge of the bove, we llocte n ordered cube for ech stte. The ordered cube is defined s the stte vlue with ll the zeros in the most significnt positions, followed by ll ones, followed by the don t cres (X) in the lest significnt positions. For exmple, five sttes nd their corresponding ordered cubes re shown below. sttes 0X 00X XX00 X00X XXX ordered cube 0X 00X 00XX 00XX XXX 3 XX00 X00X Fig X Hsh tble XXX 0X Illustrting stte storge dt structure The hsh tble contins ll sttes tht mp to the sme ordered cube. For instnce, t the node corresponding to the ordered cube 00XX in Figure 7, there cn be two uniue stte cubes XX00 nd X00X. Figure 7 illustrtes how the sttes 0X, 00X, XX00, X00X, XXX re stored in the described dt structure. Given stte i, this dt structure cn efficiently determine whether i lredy exists in G, whether i is subset of other sttes in G, nd whether i is superset of other sttes in G. For ll three tsks, first the node n i corresponding to ordered cube of i must be locted in the binry tree. If i exists in the hsh tble pointed by node n i, then i lredy exists in G. To find whether i is proper subset of other sttes, ll the nodes with t lest s mny don t cres (X) s n i hve to be visited. At ech node, the sttes within the hsh tbles must be tested to determine if i is subset. Within the tree T, the nodes with t lest s mny don t cres s n i re found inside n r+ by s+ rectngle, where r is the number of zeros nd s is the number of ones in i. Therefore, there re (r+) (s+) nodes tht cn potentilly contin supersets of i (including node n i). These nodes re illustrted in the dshed rectngle bove node n i in Figure 8. Similrly, to find whether i is proper superset of other sttes, ll the nodes with t lest s mny zeros nd ones must be visited nd the sttes within the hsh tbles must be tested to determine if i is superset. Within the tree T, these nodes re found inside n isosceles tringle with euivlent sides n r s. Therefore, there re (n r s)(n r s+) nodes tht cn potentilly be subsets of 2 i (including node n i). These nodes re illustrted in the dshed tringle under the node n i in Figure 8. As demonstrted through Figure 8, only the white nodes must be considered when serching for subsets nd supersets. Therefore, the number of comprisons reuired my be only frction of the totl number of existing sttes. In prctice, this dt structure is found to be very efficient since the tree T is often not fully populted nd the number of items in ech hsh tble is reltively smll. The procedure for finding the supersets (covers) of given stte i is presented in Figure 9. Lines 2-3 generte the ordered cube nd find its loction in the tree T. Line 4 gets ll the potentil superset When sttes re dded to the grph G, they re lso stored ccording to their ordered cube in the binry tree T. Ech node of given depth in the binry tree corresponds to position in the ordered cube. The top-most node t depth zero of the tree represents the most significnt position, the nodes t depth represent the second most significnt position, the nodes t depth 2 represent the third most significnt position, etc. The left (right) edge of node denotes zero (one) in the ordered cube t the position corresponding to the prent node. There re no edges corresponding to don t cre in the ordered cube. By scnning over the vlues of n ordered cube from the most significnt to the lest significnt, the binry tree is trversed for tht cube. Trversl ends when the ordered cube is fully scnned or when don t cre is encountered. By the end of the trversl, the finl visited node points to hsh tble where the stte vlue is stored. n-r-s Fig. 8. n i s r n-r-s Finding supersets nd subsets in the tree T

5 Fig. 9. : Covers = 2: ordered cube = Order( i ) 3: n i = Get tree node(ordered cube) 4: Supset =get rectngle(n i ) 5: for ll (nodes n j in Supset) do 6: for ll (sttes j in hsh tble of n j ) do 7: if ( j i ) then 8: Covers = Covers j 9: end if 0: end for : end for 2: return Covers Determine the sttes tht re supersets of this stte nodes by finding the nodes contined in the rectngle. The remining lines iterte through these nodes nd test the sttes inside the hsh tbles to determine whether they re supersets of i. Note tht testing whether prticulr node is superset or subset of nother is simple comprison procedure where the sttes must be identicl over ll positions except where the superset is don t cre. A procedure similr to tht of Figure 9 is used to find the subsets of i where the get rectngle procedure is replce with get tringle s described previously. V. EXPERIMENTS In this section we demonstrte the effectiveness nd efficiency of the proposed trce compction pproch. All experiments re conducted on Sun Blde 000 with 750MHz Sprc processor nd 2.5GB of memory. Trces of length 50, 00, nd 000 re obtined vi rndom simultion for the circuits in the ISCAS 89 nd ITC 99 benchmrk suites. The rechbility nlysis engine is developed using the ll-solutions SAT solver of [0] which is circuit vrint of zchff [7] nd Grsp [3]. To evlute the overll proposed pproch we limit the number of stored sttes to t most 0,000 stte cubes nd do not use n explicit timeout. Since the compction techniues of previous works [3], [4], [6] re not publicly vilble nd due to the fct tht the ssertions nd errors used re unknown, we cnnot directly or indirectly compre with them. We first evlute the effectiveness of the stte selection procedure described in Section III-C. We compre this heuristic ginst three other selection pproches, Depth-First Serch (DFS), Bredth-First Serch (BFS), nd rndom selection. The bove techniues re used to perform rechbility nlysis from rndom stte to the initil stte given timeout of 200 seconds. The runtimes over ll the benchmrks re collected nd presented in Figure 0. Both the DFS nd BFS methods result in runtimes of over 4000 seconds, while the rndom method fres better t over 3500 seconds. The proposed stte selection strtegy bsed on the smllest hmming distnce reltive to the initil stte nd the position of the stte in the grph G results in runtimes of just over 3000 seconds. This performnce demonstrtes tht the proposed stte selection heuristics is n efficient overll rechbility nlysis procedure. Runtime (s) BFS DFS rndom proposed Stte selection methods Fig. 0. Comprison of stte selection methods Next, we demonstrte the effectiveness of the overll proposed trce compction pproch. Tble I illustrtes the results of the experiments on ll ISCAS 89 nd ITC 99 circuits for trces of length 50, 00 nd 000. The first column shows the circuit nmes while the remining columns re orgnized into three sections bsed on their originl trce length. The first column of ech section lbeled org describes the originl length of ech trce (50, 00, or 000). The second column of ech section lbeled pre describes the length of the trces fter performing the single step pre-imge process described in Section III-B. We chose to find single step pre-imges for no more thn 50 sttes to chieve blnce between the number of preimges found nd the time reuired to find them. The third column of ech section lbeled rech, presents the length of the trces fter pplying the proposed rechbility nlysis method. As described in section III-B, it is most beneficil to first find the single step preimges followed by the rechbility nlysis (rech) method. The fourth nd fifth columns of ech section, lbeled cpu pre nd cpu rech respectively, present the runtimes in seconds ssocited to the pre nd rech techniues. Tble I shows tht the pre-imge computtion techniues help reduce the trces considerbly. For mny circuits, the originl trce length is first reduced gretly by the single step pre-imge (pre) techniue nd further reduced by the rechbility nlysis (rech). For exmple, the trce for circuit s344 is first reduced from 50 to 33 using pre, nd then gin from 33 to using rech. Anlyzing the results of Tble I, we notice tht mny trces re reduced to hving single clock cycle (length of ) or very smll trce size fter pplying rechbility nlysis. This result cn be prtilly ttributed to the stte selection heuristics of Section III-C nd the performnce improvement techniues of Section III-B. These techniues cn increse the number of short-cuts creted through the grph G nd likelihood tht they will led to the initil stte. Tble II summrizes the results in Tble I by providing the verge length compctions (reductions) chieved by the different components of the proposed pproch for trces of size 50, 00, nd 000. Similr to Tble I, the summries re provided for ech originl trce length seprtely. Column one presents the nme of the compction method: single step pre-imge computtion (pre), rechbility nlysis (rech), or combined. For ech trce length, the overll verge reduction is presented under the lbel vg. reduced. This field is clculted by dding the reduction in size over ll circuits divided over the number of circuits. Since not ll circuit trces re reduced by the proposed method, this number my not provide good representtion of the verge fctor of reduction chieved. Insted, the columns lbeled ffected nd reduced show the percentge of trces tht re ffected by ech pproch nd the mount by which they re reduced, respectively. For exmple, for trces of length 50, the proposed pproches seprtely chieve 0.08 times nd 3.8 times reductions while the combined pproch reches 9.67 times reductions. Furthermore, pproximtely 70% of the circuits re ffected by the pre techniues which results in n verge reduction of 3.77 times. Similrly, the rech techniue nd the combined pproch ffect 37% nd 74% of trces for reduction of 8.45 times nd times, respectively. The experimentl results demonstrte tht not only is the proposed pproch effective for reducing trces, but it is lso very efficient. For the mjority of circuits in Tble I, compcted trces re found within few minutes. This performnce reffirms the prcticlity of the dt structure introduced in Section IV. The memory reuirements of the overll pproch re lso mngeble since memory usge never exceeds 300MB when storing up to 0,000 stte cubes. The bility to uickly reduce trces in memory efficient mnner is crucil for mking this pproch vible in rel-life debugging environments. VI. CONCLUSION This work proposed novel trce reduction techniue using SATbsed rechbility nlysis nd set of stte continment reltionships. The components of the rechbility nlysis engine re finetuned to increse the likelihood of generting short-cuts in the originl

6 circuits org pre rech cpu pre cpu rech org pre rech cpu pre cpu rech org pre rech cpu pre cpu rech s s s s s s s s s s s s526n s s s s s s s s s s s s s s s s s s s b b b b b b b b b b b b b b TABLE I EXPERIMENTAL RESULTS FOR THE PROPOSED TRACE LENGTH COMPACTION APPROACH FOR TRACES OF LENGTH 50, 00 AND 000. orginl size 50 orginl size 00 orginl size 000 pproch vg. reduced ffected reduced vg. reduced ffected reduced vg. reduced ffected reduced pre 0.08 X 70 % 3.77 X 6.88 X 72 % X X 7 % X rech 3.8 X 37 % 8.54 X 6.0 X 35 % 5.36 X 2.77 X 5 % 2.40 X combined 9.67 X 74 % X 36.2 X 72 % 49.0 X X 72 % X TABLE II SUMMARY OF THE RESULTS FOR THE PROPOSED TRACE LENGTH COMPACTION APPROACH trce. Furthermore, novel dt structure is presented which stores visited sttes such tht the stte continment reltionships cn be uickly pplied. Experiments demonstrte the effectiveness of the proposed techniues s pproximtely 75% of the trces re reduced by one or two orders of mgnitude. REFERENCES [] P. Rshinkr, P. Pterson, nd L. Singh, System-on--chip Verifiction: Methodology nd Techniues. Kluwer Acdemic Publisher, 996. [2] T. Kropf, Introduction to Forml Hrdwre Verifiction. Springer, 999. [3] Y. Chen nd F. Chen, Algorithms for compcting error trces, in ASP Design Automtion Conf., 2003, pp [4] S. Shen, Y. Qin, nd S. Li, A fster counterexmple minimiztion lgorithm bsed on refuttion nlysis, in Design, Automtion nd Test in Europe, 2005, pp [5] K. Chng, V. Bertcco, nd I. Mrkov, Simultion-bsed bug trce minimiztion with BMC-bsed refinement, in Int l Conf. on CAD, 2005, pp [6] S.-J. Pn, K.-T. Cheng, J. Moondnos, nd Z. Hnn, Genertion of shorter seuences for high resolution error dignosis using seuentil st, in ASP Design Automtion Conf., 2006, pp [7] J. Mrues-Silv nd K. Skllh, GRASP new serch lgorithm for stisfibility, in Int l Conf. on CAD, 996, pp [8] K. McMilln, Applying SAT methods in unbounded symbolic model checking. in Computer Aided Verifiction, 2002, pp [9] H.-J. Kng nd I.-C. Prk, SAT-bsed unbounded symbolic model checking, IEEE Trns. on CAD, vol. 24, no. 2, pp , [0] S. Sfrpour, A. Veneris, nd R. Drechsler, Integrting observbility don t cres in ll-solution SAT solvers, in IEEE Interntionl Symposium on Circuits nd Systems, 2006, pp [] B. Li, M. Hsio, nd S. Sheng, A novel SAT ll-solutions solver for efficient preimge computtion, in Design, Automtion nd Test in Europe, 2004, pp [2] Q. Zhu, N. Kitchen, A. Kuehlmnn, nd A. Sngiovnni-Vincentelli, St sweeping with locl observbility don t-cres, in Design Automtion Conf., 2006, pp [3] M. Moskewicz, C. Mdign, Y. Zho, L. Zhng, nd S. Mlik, Chff: Engineering n efficient SAT solver, in Design Automtion Conf., 200, pp

Convert the NFA into DFA

Convert the NFA into DFA Convert the NF into F For ech NF we cn find F ccepting the sme lnguge. The numer of sttes of the F could e exponentil in the numer of sttes of the NF, ut in prctice this worst cse occurs rrely. lgorithm:

More information

Reinforcement Learning

Reinforcement Learning Reinforcement Lerning Tom Mitchell, Mchine Lerning, chpter 13 Outline Introduction Comprison with inductive lerning Mrkov Decision Processes: the model Optiml policy: The tsk Q Lerning: Q function Algorithm

More information

1 Online Learning and Regret Minimization

1 Online Learning and Regret Minimization 2.997 Decision-Mking in Lrge-Scle Systems My 10 MIT, Spring 2004 Hndout #29 Lecture Note 24 1 Online Lerning nd Regret Minimiztion In this lecture, we consider the problem of sequentil decision mking in

More information

New data structures to reduce data size and search time

New data structures to reduce data size and search time New dt structures to reduce dt size nd serch time Tsuneo Kuwbr Deprtment of Informtion Sciences, Fculty of Science, Kngw University, Hirtsuk-shi, Jpn FIT2018 1D-1, No2, pp1-4 Copyright (c)2018 by The Institute

More information

Lecture 14: Quadrature

Lecture 14: Quadrature Lecture 14: Qudrture This lecture is concerned with the evlution of integrls fx)dx 1) over finite intervl [, b] The integrnd fx) is ssumed to be rel-vlues nd smooth The pproximtion of n integrl by numericl

More information

Properties of Integrals, Indefinite Integrals. Goals: Definition of the Definite Integral Integral Calculations using Antiderivatives

Properties of Integrals, Indefinite Integrals. Goals: Definition of the Definite Integral Integral Calculations using Antiderivatives Block #6: Properties of Integrls, Indefinite Integrls Gols: Definition of the Definite Integrl Integrl Clcultions using Antiderivtives Properties of Integrls The Indefinite Integrl 1 Riemnn Sums - 1 Riemnn

More information

DATA Search I 魏忠钰. 复旦大学大数据学院 School of Data Science, Fudan University. March 7 th, 2018

DATA Search I 魏忠钰. 复旦大学大数据学院 School of Data Science, Fudan University. March 7 th, 2018 DATA620006 魏忠钰 Serch I Mrch 7 th, 2018 Outline Serch Problems Uninformed Serch Depth-First Serch Bredth-First Serch Uniform-Cost Serch Rel world tsk - Pc-mn Serch problems A serch problem consists of:

More information

Reinforcement learning II

Reinforcement learning II CS 1675 Introduction to Mchine Lerning Lecture 26 Reinforcement lerning II Milos Huskrecht milos@cs.pitt.edu 5329 Sennott Squre Reinforcement lerning Bsics: Input x Lerner Output Reinforcement r Critic

More information

Learning Moore Machines from Input-Output Traces

Learning Moore Machines from Input-Output Traces Lerning Moore Mchines from Input-Output Trces Georgios Gintmidis 1 nd Stvros Tripkis 1,2 1 Alto University, Finlnd 2 UC Berkeley, USA Motivtion: lerning models from blck boxes Inputs? Lerner Forml Model

More information

CMSC 330: Organization of Programming Languages. DFAs, and NFAs, and Regexps (Oh my!)

CMSC 330: Organization of Programming Languages. DFAs, and NFAs, and Regexps (Oh my!) CMSC 330: Orgniztion of Progrmming Lnguges DFAs, nd NFAs, nd Regexps (Oh my!) CMSC330 Spring 2018 Types of Finite Automt Deterministic Finite Automt (DFA) Exctly one sequence of steps for ech string All

More information

State space systems analysis (continued) Stability. A. Definitions A system is said to be Asymptotically Stable (AS) when it satisfies

State space systems analysis (continued) Stability. A. Definitions A system is said to be Asymptotically Stable (AS) when it satisfies Stte spce systems nlysis (continued) Stbility A. Definitions A system is sid to be Asymptoticlly Stble (AS) when it stisfies ut () = 0, t > 0 lim xt () 0. t A system is AS if nd only if the impulse response

More information

CS 188: Artificial Intelligence Spring 2007

CS 188: Artificial Intelligence Spring 2007 CS 188: Artificil Intelligence Spring 2007 Lecture 3: Queue-Bsed Serch 1/23/2007 Srini Nrynn UC Berkeley Mny slides over the course dpted from Dn Klein, Sturt Russell or Andrew Moore Announcements Assignment

More information

Duality # Second iteration for HW problem. Recall our LP example problem we have been working on, in equality form, is given below.

Duality # Second iteration for HW problem. Recall our LP example problem we have been working on, in equality form, is given below. Dulity #. Second itertion for HW problem Recll our LP emple problem we hve been working on, in equlity form, is given below.,,,, 8 m F which, when written in slightly different form, is 8 F Recll tht we

More information

Lecture 3 ( ) (translated and slightly adapted from lecture notes by Martin Klazar)

Lecture 3 ( ) (translated and slightly adapted from lecture notes by Martin Klazar) Lecture 3 (5.3.2018) (trnslted nd slightly dpted from lecture notes by Mrtin Klzr) Riemnn integrl Now we define precisely the concept of the re, in prticulr, the re of figure U(, b, f) under the grph of

More information

APPROXIMATE INTEGRATION

APPROXIMATE INTEGRATION APPROXIMATE INTEGRATION. Introduction We hve seen tht there re functions whose nti-derivtives cnnot be expressed in closed form. For these resons ny definite integrl involving these integrnds cnnot be

More information

p-adic Egyptian Fractions

p-adic Egyptian Fractions p-adic Egyptin Frctions Contents 1 Introduction 1 2 Trditionl Egyptin Frctions nd Greedy Algorithm 2 3 Set-up 3 4 p-greedy Algorithm 5 5 p-egyptin Trditionl 10 6 Conclusion 1 Introduction An Egyptin frction

More information

NUMERICAL INTEGRATION. The inverse process to differentiation in calculus is integration. Mathematically, integration is represented by.

NUMERICAL INTEGRATION. The inverse process to differentiation in calculus is integration. Mathematically, integration is represented by. NUMERICAL INTEGRATION 1 Introduction The inverse process to differentition in clculus is integrtion. Mthemticlly, integrtion is represented by f(x) dx which stnds for the integrl of the function f(x) with

More information

This lecture covers Chapter 8 of HMU: Properties of CFLs

This lecture covers Chapter 8 of HMU: Properties of CFLs This lecture covers Chpter 8 of HMU: Properties of CFLs Turing Mchine Extensions of Turing Mchines Restrictions of Turing Mchines Additionl Reding: Chpter 8 of HMU. Turing Mchine: Informl Definition B

More information

Uninformed Search Lecture 4

Uninformed Search Lecture 4 Lecture 4 Wht re common serch strtegies tht operte given only serch problem? How do they compre? 1 Agend A quick refresher DFS, BFS, ID-DFS, UCS Unifiction! 2 Serch Problem Formlism Defined vi the following

More information

Genetic Programming. Outline. Evolutionary Strategies. Evolutionary strategies Genetic programming Summary

Genetic Programming. Outline. Evolutionary Strategies. Evolutionary strategies Genetic programming Summary Outline Genetic Progrmming Evolutionry strtegies Genetic progrmming Summry Bsed on the mteril provided y Professor Michel Negnevitsky Evolutionry Strtegies An pproch simulting nturl evolution ws proposed

More information

THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS.

THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS. THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS RADON ROSBOROUGH https://intuitiveexplntionscom/picrd-lindelof-theorem/ This document is proof of the existence-uniqueness theorem

More information

5.7 Improper Integrals

5.7 Improper Integrals 458 pplictions of definite integrls 5.7 Improper Integrls In Section 5.4, we computed the work required to lift pylod of mss m from the surfce of moon of mss nd rdius R to height H bove the surfce of the

More information

Model Reduction of Finite State Machines by Contraction

Model Reduction of Finite State Machines by Contraction Model Reduction of Finite Stte Mchines y Contrction Alessndro Giu Dip. di Ingegneri Elettric ed Elettronic, Università di Cgliri, Pizz d Armi, 09123 Cgliri, Itly Phone: +39-070-675-5892 Fx: +39-070-675-5900

More information

CBE 291b - Computation And Optimization For Engineers

CBE 291b - Computation And Optimization For Engineers The University of Western Ontrio Fculty of Engineering Science Deprtment of Chemicl nd Biochemicl Engineering CBE 9b - Computtion And Optimiztion For Engineers Mtlb Project Introduction Prof. A. Jutn Jn

More information

Acceptance Sampling by Attributes

Acceptance Sampling by Attributes Introduction Acceptnce Smpling by Attributes Acceptnce smpling is concerned with inspection nd decision mking regrding products. Three spects of smpling re importnt: o Involves rndom smpling of n entire

More information

Math 426: Probability Final Exam Practice

Math 426: Probability Final Exam Practice Mth 46: Probbility Finl Exm Prctice. Computtionl problems 4. Let T k (n) denote the number of prtitions of the set {,..., n} into k nonempty subsets, where k n. Argue tht T k (n) kt k (n ) + T k (n ) by

More information

COMPUTER SCIENCE TRIPOS

COMPUTER SCIENCE TRIPOS CST.2011.2.1 COMPUTER SCIENCE TRIPOS Prt IA Tuesdy 7 June 2011 1.30 to 4.30 COMPUTER SCIENCE Pper 2 Answer one question from ech of Sections A, B nd C, nd two questions from Section D. Submit the nswers

More information

SOLUTIONS FOR ADMISSIONS TEST IN MATHEMATICS, COMPUTER SCIENCE AND JOINT SCHOOLS WEDNESDAY 5 NOVEMBER 2014

SOLUTIONS FOR ADMISSIONS TEST IN MATHEMATICS, COMPUTER SCIENCE AND JOINT SCHOOLS WEDNESDAY 5 NOVEMBER 2014 SOLUTIONS FOR ADMISSIONS TEST IN MATHEMATICS, COMPUTER SCIENCE AND JOINT SCHOOLS WEDNESDAY 5 NOVEMBER 014 Mrk Scheme: Ech prt of Question 1 is worth four mrks which re wrded solely for the correct nswer.

More information

Review of Calculus, cont d

Review of Calculus, cont d Jim Lmbers MAT 460 Fll Semester 2009-10 Lecture 3 Notes These notes correspond to Section 1.1 in the text. Review of Clculus, cont d Riemnn Sums nd the Definite Integrl There re mny cses in which some

More information

Bayesian Networks: Approximate Inference

Bayesian Networks: Approximate Inference pproches to inference yesin Networks: pproximte Inference xct inference Vrillimintion Join tree lgorithm pproximte inference Simplify the structure of the network to mkxct inferencfficient (vritionl methods,

More information

SUMMER KNOWHOW STUDY AND LEARNING CENTRE

SUMMER KNOWHOW STUDY AND LEARNING CENTRE SUMMER KNOWHOW STUDY AND LEARNING CENTRE Indices & Logrithms 2 Contents Indices.2 Frctionl Indices.4 Logrithms 6 Exponentil equtions. Simplifying Surds 13 Opertions on Surds..16 Scientific Nottion..18

More information

Unit #9 : Definite Integral Properties; Fundamental Theorem of Calculus

Unit #9 : Definite Integral Properties; Fundamental Theorem of Calculus Unit #9 : Definite Integrl Properties; Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl

More information

19 Optimal behavior: Game theory

19 Optimal behavior: Game theory Intro. to Artificil Intelligence: Dle Schuurmns, Relu Ptrscu 1 19 Optiml behvior: Gme theory Adversril stte dynmics hve to ccount for worst cse Compute policy π : S A tht mximizes minimum rewrd Let S (,

More information

Tests for the Ratio of Two Poisson Rates

Tests for the Ratio of Two Poisson Rates Chpter 437 Tests for the Rtio of Two Poisson Rtes Introduction The Poisson probbility lw gives the probbility distribution of the number of events occurring in specified intervl of time or spce. The Poisson

More information

Finite Automata Theory and Formal Languages TMV027/DIT321 LP4 2018

Finite Automata Theory and Formal Languages TMV027/DIT321 LP4 2018 Finite Automt Theory nd Forml Lnguges TMV027/DIT321 LP4 2018 Lecture 10 An Bove April 23rd 2018 Recp: Regulr Lnguges We cn convert between FA nd RE; Hence both FA nd RE ccept/generte regulr lnguges; More

More information

Concepts of Concurrent Computation Spring 2015 Lecture 9: Petri Nets

Concepts of Concurrent Computation Spring 2015 Lecture 9: Petri Nets Concepts of Concurrent Computtion Spring 205 Lecture 9: Petri Nets Sebstin Nnz Chris Poskitt Chir of Softwre Engineering Petri nets Petri nets re mthemticl models for describing systems with concurrency

More information

Fig. 1. Open-Loop and Closed-Loop Systems with Plant Variations

Fig. 1. Open-Loop and Closed-Loop Systems with Plant Variations ME 3600 Control ystems Chrcteristics of Open-Loop nd Closed-Loop ystems Importnt Control ystem Chrcteristics o ensitivity of system response to prmetric vritions cn be reduced o rnsient nd stedy-stte responses

More information

The Minimum Label Spanning Tree Problem: Illustrating the Utility of Genetic Algorithms

The Minimum Label Spanning Tree Problem: Illustrating the Utility of Genetic Algorithms The Minimum Lel Spnning Tree Prolem: Illustrting the Utility of Genetic Algorithms Yupei Xiong, Univ. of Mrylnd Bruce Golden, Univ. of Mrylnd Edwrd Wsil, Americn Univ. Presented t BAE Systems Distinguished

More information

Jin-Fu Li. Department of Electrical Engineering National Central University Jhongli, Taiwan

Jin-Fu Li. Department of Electrical Engineering National Central University Jhongli, Taiwan Trnsprent BIST for RAMs Jin-Fu Li Advnced d Relible Systems (ARES) Lb. Deprtment of Electricl Engineering Ntionl Centrl University Jhongli, Tiwn Outline Introduction Concept of Trnsprent Test Trnsprent

More information

2D1431 Machine Learning Lab 3: Reinforcement Learning

2D1431 Machine Learning Lab 3: Reinforcement Learning 2D1431 Mchine Lerning Lb 3: Reinforcement Lerning Frnk Hoffmnn modified by Örjn Ekeberg December 7, 2004 1 Introduction In this lb you will lern bout dynmic progrmming nd reinforcement lerning. It is ssumed

More information

Math 1B, lecture 4: Error bounds for numerical methods

Math 1B, lecture 4: Error bounds for numerical methods Mth B, lecture 4: Error bounds for numericl methods Nthn Pflueger 4 September 0 Introduction The five numericl methods descried in the previous lecture ll operte by the sme principle: they pproximte the

More information

Module 9: Tries and String Matching

Module 9: Tries and String Matching Module 9: Tries nd String Mtching CS 240 - Dt Structures nd Dt Mngement Sjed Hque Veronik Irvine Tylor Smith Bsed on lecture notes by mny previous cs240 instructors Dvid R. Cheriton School of Computer

More information

Module 9: Tries and String Matching

Module 9: Tries and String Matching Module 9: Tries nd String Mtching CS 240 - Dt Structures nd Dt Mngement Sjed Hque Veronik Irvine Tylor Smith Bsed on lecture notes by mny previous cs240 instructors Dvid R. Cheriton School of Computer

More information

Recitation 3: More Applications of the Derivative

Recitation 3: More Applications of the Derivative Mth 1c TA: Pdric Brtlett Recittion 3: More Applictions of the Derivtive Week 3 Cltech 2012 1 Rndom Question Question 1 A grph consists of the following: A set V of vertices. A set E of edges where ech

More information

Goals: Determine how to calculate the area described by a function. Define the definite integral. Explore the relationship between the definite

Goals: Determine how to calculate the area described by a function. Define the definite integral. Explore the relationship between the definite Unit #8 : The Integrl Gols: Determine how to clculte the re described by function. Define the definite integrl. Eplore the reltionship between the definite integrl nd re. Eplore wys to estimte the definite

More information

Strong Bisimulation. Overview. References. Actions Labeled transition system Transition semantics Simulation Bisimulation

Strong Bisimulation. Overview. References. Actions Labeled transition system Transition semantics Simulation Bisimulation Strong Bisimultion Overview Actions Lbeled trnsition system Trnsition semntics Simultion Bisimultion References Robin Milner, Communiction nd Concurrency Robin Milner, Communicting nd Mobil Systems 32

More information

Chapter 4: Techniques of Circuit Analysis. Chapter 4: Techniques of Circuit Analysis

Chapter 4: Techniques of Circuit Analysis. Chapter 4: Techniques of Circuit Analysis Chpter 4: Techniques of Circuit Anlysis Terminology Node-Voltge Method Introduction Dependent Sources Specil Cses Mesh-Current Method Introduction Dependent Sources Specil Cses Comprison of Methods Source

More information

Finite Automata. Informatics 2A: Lecture 3. John Longley. 22 September School of Informatics University of Edinburgh

Finite Automata. Informatics 2A: Lecture 3. John Longley. 22 September School of Informatics University of Edinburgh Lnguges nd Automt Finite Automt Informtics 2A: Lecture 3 John Longley School of Informtics University of Edinburgh jrl@inf.ed.c.uk 22 September 2017 1 / 30 Lnguges nd Automt 1 Lnguges nd Automt Wht is

More information

Chapter 4 Contravariance, Covariance, and Spacetime Diagrams

Chapter 4 Contravariance, Covariance, and Spacetime Diagrams Chpter 4 Contrvrince, Covrince, nd Spcetime Digrms 4. The Components of Vector in Skewed Coordintes We hve seen in Chpter 3; figure 3.9, tht in order to show inertil motion tht is consistent with the Lorentz

More information

DIRECT CURRENT CIRCUITS

DIRECT CURRENT CIRCUITS DRECT CURRENT CUTS ELECTRC POWER Consider the circuit shown in the Figure where bttery is connected to resistor R. A positive chrge dq will gin potentil energy s it moves from point to point b through

More information

Review of basic calculus

Review of basic calculus Review of bsic clculus This brief review reclls some of the most importnt concepts, definitions, nd theorems from bsic clculus. It is not intended to tech bsic clculus from scrtch. If ny of the items below

More information

How to simulate Turing machines by invertible one-dimensional cellular automata

How to simulate Turing machines by invertible one-dimensional cellular automata How to simulte Turing mchines by invertible one-dimensionl cellulr utomt Jen-Christophe Dubcq Déprtement de Mthémtiques et d Informtique, École Normle Supérieure de Lyon, 46, llée d Itlie, 69364 Lyon Cedex

More information

Student Activity 3: Single Factor ANOVA

Student Activity 3: Single Factor ANOVA MATH 40 Student Activity 3: Single Fctor ANOVA Some Bsic Concepts In designed experiment, two or more tretments, or combintions of tretments, is pplied to experimentl units The number of tretments, whether

More information

We partition C into n small arcs by forming a partition of [a, b] by picking s i as follows: a = s 0 < s 1 < < s n = b.

We partition C into n small arcs by forming a partition of [a, b] by picking s i as follows: a = s 0 < s 1 < < s n = b. Mth 255 - Vector lculus II Notes 4.2 Pth nd Line Integrls We begin with discussion of pth integrls (the book clls them sclr line integrls). We will do this for function of two vribles, but these ides cn

More information

Improper Integrals. Type I Improper Integrals How do we evaluate an integral such as

Improper Integrals. Type I Improper Integrals How do we evaluate an integral such as Improper Integrls Two different types of integrls cn qulify s improper. The first type of improper integrl (which we will refer to s Type I) involves evluting n integrl over n infinite region. In the grph

More information

Riemann Sums and Riemann Integrals

Riemann Sums and Riemann Integrals Riemnn Sums nd Riemnn Integrls Jmes K. Peterson Deprtment of Biologicl Sciences nd Deprtment of Mthemticl Sciences Clemson University August 26, 203 Outline Riemnn Sums Riemnn Integrls Properties Abstrct

More information

CMDA 4604: Intermediate Topics in Mathematical Modeling Lecture 19: Interpolation and Quadrature

CMDA 4604: Intermediate Topics in Mathematical Modeling Lecture 19: Interpolation and Quadrature CMDA 4604: Intermedite Topics in Mthemticl Modeling Lecture 19: Interpoltion nd Qudrture In this lecture we mke brief diversion into the res of interpoltion nd qudrture. Given function f C[, b], we sy

More information

A Signal-Level Fusion Model for Image-Based Change Detection in DARPA's Dynamic Database System

A Signal-Level Fusion Model for Image-Based Change Detection in DARPA's Dynamic Database System SPIE Aerosense 001 Conference on Signl Processing, Sensor Fusion, nd Trget Recognition X, April 16-0, Orlndo FL. (Minor errors in published version corrected.) A Signl-Level Fusion Model for Imge-Bsed

More information

Nondeterminism and Nodeterministic Automata

Nondeterminism and Nodeterministic Automata Nondeterminism nd Nodeterministic Automt 61 Nondeterminism nd Nondeterministic Automt The computtionl mchine models tht we lerned in the clss re deterministic in the sense tht the next move is uniquely

More information

1 Nondeterministic Finite Automata

1 Nondeterministic Finite Automata 1 Nondeterministic Finite Automt Suppose in life, whenever you hd choice, you could try oth possiilities nd live your life. At the end, you would go ck nd choose the one tht worked out the est. Then you

More information

CS 188 Introduction to Artificial Intelligence Fall 2018 Note 7

CS 188 Introduction to Artificial Intelligence Fall 2018 Note 7 CS 188 Introduction to Artificil Intelligence Fll 2018 Note 7 These lecture notes re hevily bsed on notes originlly written by Nikhil Shrm. Decision Networks In the third note, we lerned bout gme trees

More information

Combinational Logic. Precedence. Quick Quiz 25/9/12. Schematics à Boolean Expression. 3 Representations of Logic Functions. Dr. Hayden So.

Combinational Logic. Precedence. Quick Quiz 25/9/12. Schematics à Boolean Expression. 3 Representations of Logic Functions. Dr. Hayden So. 5/9/ Comintionl Logic ENGG05 st Semester, 0 Dr. Hyden So Representtions of Logic Functions Recll tht ny complex logic function cn e expressed in wys: Truth Tle, Boolen Expression, Schemtics Only Truth

More information

Intermediate Math Circles Wednesday, November 14, 2018 Finite Automata II. Nickolas Rollick a b b. a b 4

Intermediate Math Circles Wednesday, November 14, 2018 Finite Automata II. Nickolas Rollick a b b. a b 4 Intermedite Mth Circles Wednesdy, Novemer 14, 2018 Finite Automt II Nickols Rollick nrollick@uwterloo.c Regulr Lnguges Lst time, we were introduced to the ide of DFA (deterministic finite utomton), one

More information

Riemann Sums and Riemann Integrals

Riemann Sums and Riemann Integrals Riemnn Sums nd Riemnn Integrls Jmes K. Peterson Deprtment of Biologicl Sciences nd Deprtment of Mthemticl Sciences Clemson University August 26, 2013 Outline 1 Riemnn Sums 2 Riemnn Integrls 3 Properties

More information

Math 8 Winter 2015 Applications of Integration

Math 8 Winter 2015 Applications of Integration Mth 8 Winter 205 Applictions of Integrtion Here re few importnt pplictions of integrtion. The pplictions you my see on n exm in this course include only the Net Chnge Theorem (which is relly just the Fundmentl

More information

20 MATHEMATICS POLYNOMIALS

20 MATHEMATICS POLYNOMIALS 0 MATHEMATICS POLYNOMIALS.1 Introduction In Clss IX, you hve studied polynomils in one vrible nd their degrees. Recll tht if p(x) is polynomil in x, the highest power of x in p(x) is clled the degree of

More information

Refined interfaces for compositional verification

Refined interfaces for compositional verification Refined interfces for compositionl verifiction Frédéric Lng INRI Rhône-lpes http://www.inrilpes.fr/vsy Motivtion Enumertive verifiction of concurrent systems Prllel composition of synchronous processes

More information

Numerical Analysis: Trapezoidal and Simpson s Rule

Numerical Analysis: Trapezoidal and Simpson s Rule nd Simpson s Mthemticl question we re interested in numericlly nswering How to we evlute I = f (x) dx? Clculus tells us tht if F(x) is the ntiderivtive of function f (x) on the intervl [, b], then I =

More information

An Algorithm for the Discovery of Arbitrary Length Ordinal Association Rules

An Algorithm for the Discovery of Arbitrary Length Ordinal Association Rules An Algorithm for the Discovery of Arbitrry Length Ordinl Assocition Rules Alin Cmpn, Gbriel Serbn, Trin Mrius Trut, nd Andrin Mrcus Abstrct Assocition rule mining techniques re used to serch ttribute-vlue

More information

Physics 201 Lab 3: Measurement of Earth s local gravitational field I Data Acquisition and Preliminary Analysis Dr. Timothy C. Black Summer I, 2018

Physics 201 Lab 3: Measurement of Earth s local gravitational field I Data Acquisition and Preliminary Analysis Dr. Timothy C. Black Summer I, 2018 Physics 201 Lb 3: Mesurement of Erth s locl grvittionl field I Dt Acquisition nd Preliminry Anlysis Dr. Timothy C. Blck Summer I, 2018 Theoreticl Discussion Grvity is one of the four known fundmentl forces.

More information

Types of Finite Automata. CMSC 330: Organization of Programming Languages. Comparing DFAs and NFAs. Comparing DFAs and NFAs (cont.) Finite Automata 2

Types of Finite Automata. CMSC 330: Organization of Programming Languages. Comparing DFAs and NFAs. Comparing DFAs and NFAs (cont.) Finite Automata 2 CMSC 330: Orgniztion of Progrmming Lnguges Finite Automt 2 Types of Finite Automt Deterministic Finite Automt () Exctly one sequence of steps for ech string All exmples so fr Nondeterministic Finite Automt

More information

CS 275 Automata and Formal Language Theory

CS 275 Automata and Formal Language Theory CS 275 Automt nd Forml Lnguge Theory Course Notes Prt II: The Recognition Problem (II) Chpter II.6.: Push Down Automt Remrk: This mteril is no longer tught nd not directly exm relevnt Anton Setzer (Bsed

More information

Reversals of Signal-Posterior Monotonicity for Any Bounded Prior

Reversals of Signal-Posterior Monotonicity for Any Bounded Prior Reversls of Signl-Posterior Monotonicity for Any Bounded Prior Christopher P. Chmbers Pul J. Hely Abstrct Pul Milgrom (The Bell Journl of Economics, 12(2): 380 391) showed tht if the strict monotone likelihood

More information

Formal languages, automata, and theory of computation

Formal languages, automata, and theory of computation Mälrdlen University TEN1 DVA337 2015 School of Innovtion, Design nd Engineering Forml lnguges, utomt, nd theory of computtion Thursdy, Novemer 5, 14:10-18:30 Techer: Dniel Hedin, phone 021-107052 The exm

More information

Riemann Integrals and the Fundamental Theorem of Calculus

Riemann Integrals and the Fundamental Theorem of Calculus Riemnn Integrls nd the Fundmentl Theorem of Clculus Jmes K. Peterson Deprtment of Biologicl Sciences nd Deprtment of Mthemticl Sciences Clemson University September 16, 2013 Outline Grphing Riemnn Sums

More information

MATH 144: Business Calculus Final Review

MATH 144: Business Calculus Final Review MATH 144: Business Clculus Finl Review 1 Skills 1. Clculte severl limits. 2. Find verticl nd horizontl symptotes for given rtionl function. 3. Clculte derivtive by definition. 4. Clculte severl derivtives

More information

Tangent Line and Tangent Plane Approximations of Definite Integral

Tangent Line and Tangent Plane Approximations of Definite Integral Rose-Hulmn Undergrdute Mthemtics Journl Volume 16 Issue 2 Article 8 Tngent Line nd Tngent Plne Approximtions of Definite Integrl Meghn Peer Sginw Vlley Stte University Follow this nd dditionl works t:

More information

MAA 4212 Improper Integrals

MAA 4212 Improper Integrals Notes by Dvid Groisser, Copyright c 1995; revised 2002, 2009, 2014 MAA 4212 Improper Integrls The Riemnn integrl, while perfectly well-defined, is too restrictive for mny purposes; there re functions which

More information

A recursive construction of efficiently decodable list-disjunct matrices

A recursive construction of efficiently decodable list-disjunct matrices CSE 709: Compressed Sensing nd Group Testing. Prt I Lecturers: Hung Q. Ngo nd Atri Rudr SUNY t Bufflo, Fll 2011 Lst updte: October 13, 2011 A recursive construction of efficiently decodble list-disjunct

More information

Decision Networks. CS 188: Artificial Intelligence Fall Example: Decision Networks. Decision Networks. Decisions as Outcome Trees

Decision Networks. CS 188: Artificial Intelligence Fall Example: Decision Networks. Decision Networks. Decisions as Outcome Trees CS 188: Artificil Intelligence Fll 2011 Decision Networks ME: choose the ction which mximizes the expected utility given the evidence mbrell Lecture 17: Decision Digrms 10/27/2011 Cn directly opertionlize

More information

Frobenius numbers of generalized Fibonacci semigroups

Frobenius numbers of generalized Fibonacci semigroups Frobenius numbers of generlized Fiboncci semigroups Gretchen L. Mtthews 1 Deprtment of Mthemticl Sciences, Clemson University, Clemson, SC 29634-0975, USA gmtthe@clemson.edu Received:, Accepted:, Published:

More information

ARITHMETIC OPERATIONS. The real numbers have the following properties: a b c ab ac

ARITHMETIC OPERATIONS. The real numbers have the following properties: a b c ab ac REVIEW OF ALGEBRA Here we review the bsic rules nd procedures of lgebr tht you need to know in order to be successful in clculus. ARITHMETIC OPERATIONS The rel numbers hve the following properties: b b

More information

Summer School Verification Technology, Systems & Applications

Summer School Verification Technology, Systems & Applications VTSA 2011 Summer School Verifiction Technology, Systems & Applictions 4th edition since 2008: Liège (Belgium), Sep. 19 23, 2011 free prticiption, limited number of prticipnts ppliction dedline: July 22,

More information

f(x) dx, If one of these two conditions is not met, we call the integral improper. Our usual definition for the value for the definite integral

f(x) dx, If one of these two conditions is not met, we call the integral improper. Our usual definition for the value for the definite integral Improper Integrls Every time tht we hve evluted definite integrl such s f(x) dx, we hve mde two implicit ssumptions bout the integrl:. The intervl [, b] is finite, nd. f(x) is continuous on [, b]. If one

More information

Types of Finite Automata. CMSC 330: Organization of Programming Languages. Comparing DFAs and NFAs. NFA for (a b)*abb.

Types of Finite Automata. CMSC 330: Organization of Programming Languages. Comparing DFAs and NFAs. NFA for (a b)*abb. CMSC 330: Orgniztion of Progrmming Lnguges Finite Automt 2 Types of Finite Automt Deterministic Finite Automt () Exctly one sequence of steps for ech string All exmples so fr Nondeterministic Finite Automt

More information

1 Error Analysis of Simple Rules for Numerical Integration

1 Error Analysis of Simple Rules for Numerical Integration cs41: introduction to numericl nlysis 11/16/10 Lecture 19: Numericl Integrtion II Instructor: Professor Amos Ron Scries: Mrk Cowlishw, Nthnel Fillmore 1 Error Anlysis of Simple Rules for Numericl Integrtion

More information

8 Laplace s Method and Local Limit Theorems

8 Laplace s Method and Local Limit Theorems 8 Lplce s Method nd Locl Limit Theorems 8. Fourier Anlysis in Higher DImensions Most of the theorems of Fourier nlysis tht we hve proved hve nturl generliztions to higher dimensions, nd these cn be proved

More information

Connected-components. Summary of lecture 9. Algorithms and Data Structures Disjoint sets. Example: connected components in graphs

Connected-components. Summary of lecture 9. Algorithms and Data Structures Disjoint sets. Example: connected components in graphs Prm University, Mth. Deprtment Summry of lecture 9 Algorithms nd Dt Structures Disjoint sets Summry of this lecture: (CLR.1-3) Dt Structures for Disjoint sets: Union opertion Find opertion Mrco Pellegrini

More information

Here are the graphs of some power functions with negative index y (x) =ax n = a n is a positive integer, and a 6= 0acoe±cient.

Here are the graphs of some power functions with negative index y (x) =ax n = a n is a positive integer, and a 6= 0acoe±cient. BEE4 { Bsic Mthemtics for Economists BEE5 { Introduction to Mthemticl Economics Week 9, Lecture, Notes: Rtionl Functions, 26//2 Hint: The WEB site for the tetbook is worth look. Dieter Blkenborg Deprtment

More information

List all of the possible rational roots of each equation. Then find all solutions (both real and imaginary) of the equation. 1.

List all of the possible rational roots of each equation. Then find all solutions (both real and imaginary) of the equation. 1. Mth Anlysis CP WS 4.X- Section 4.-4.4 Review Complete ech question without the use of grphing clcultor.. Compre the mening of the words: roots, zeros nd fctors.. Determine whether - is root of 0. Show

More information

2.4 Linear Inequalities and Problem Solving

2.4 Linear Inequalities and Problem Solving Section.4 Liner Inequlities nd Problem Solving 77.4 Liner Inequlities nd Problem Solving S 1 Use Intervl Nottion. Solve Liner Inequlities Using the Addition Property of Inequlity. 3 Solve Liner Inequlities

More information

Math& 152 Section Integration by Parts

Math& 152 Section Integration by Parts Mth& 5 Section 7. - Integrtion by Prts Integrtion by prts is rule tht trnsforms the integrl of the product of two functions into other (idelly simpler) integrls. Recll from Clculus I tht given two differentible

More information

Lecture 1. Functional series. Pointwise and uniform convergence.

Lecture 1. Functional series. Pointwise and uniform convergence. 1 Introduction. Lecture 1. Functionl series. Pointwise nd uniform convergence. In this course we study mongst other things Fourier series. The Fourier series for periodic function f(x) with period 2π is

More information

Administrivia CSE 190: Reinforcement Learning: An Introduction

Administrivia CSE 190: Reinforcement Learning: An Introduction Administrivi CSE 190: Reinforcement Lerning: An Introduction Any emil sent to me bout the course should hve CSE 190 in the subject line! Chpter 4: Dynmic Progrmming Acknowledgment: A good number of these

More information

1 APL13: Suffix Arrays: more space reduction

1 APL13: Suffix Arrays: more space reduction 1 APL13: Suffix Arrys: more spce reduction In Section??, we sw tht when lphbet size is included in the time nd spce bounds, the suffix tree for string of length m either requires Θ(m Σ ) spce or the minimum

More information

Predict Global Earth Temperature using Linier Regression

Predict Global Earth Temperature using Linier Regression Predict Globl Erth Temperture using Linier Regression Edwin Swndi Sijbt (23516012) Progrm Studi Mgister Informtik Sekolh Teknik Elektro dn Informtik ITB Jl. Gnesh 10 Bndung 40132, Indonesi 23516012@std.stei.itb.c.id

More information

For the percentage of full time students at RCC the symbols would be:

For the percentage of full time students at RCC the symbols would be: Mth 17/171 Chpter 7- ypothesis Testing with One Smple This chpter is s simple s the previous one, except it is more interesting In this chpter we will test clims concerning the sme prmeters tht we worked

More information

different methods (left endpoint, right endpoint, midpoint, trapezoid, Simpson s).

different methods (left endpoint, right endpoint, midpoint, trapezoid, Simpson s). Mth 1A with Professor Stnkov Worksheet, Discussion #41; Wednesdy, 12/6/217 GSI nme: Roy Zho Problems 1. Write the integrl 3 dx s limit of Riemnn sums. Write it using 2 intervls using the 1 x different

More information

Chapter 3 Solving Nonlinear Equations

Chapter 3 Solving Nonlinear Equations Chpter 3 Solving Nonliner Equtions 3.1 Introduction The nonliner function of unknown vrible x is in the form of where n could be non-integer. Root is the numericl vlue of x tht stisfies f ( x) 0. Grphiclly,

More information

CS 275 Automata and Formal Language Theory

CS 275 Automata and Formal Language Theory CS 275 Automt nd Forml Lnguge Theory Course Notes Prt II: The Recognition Problem (II) Chpter II.5.: Properties of Context Free Grmmrs (14) Anton Setzer (Bsed on book drft by J. V. Tucker nd K. Stephenson)

More information