Analyzing Real-Time Systems 1
|
|
- Jonathan Porter
- 6 years ago
- Views:
Transcription
1 Anlyzing Rel-Time Systems 1 Jürgen Ruf nd Thoms Kropf Wilhelm-Schickrd-Institute University of Tübingen, Snd 13, 7076 Tübingen, Germny {ruf,kropf}@informtik.uni-tuebingen.de Abstrct Temporl logic model checking is technique for the utomtic verifiction of systems ginst specifictions. Besides the correctness of sfety nd liveness properties it is often importnt to determine criticl nswer nd dely times of systems, especilly if they re embedded in rel-time environment. In this pper we present n pproch which llows the verifiction s well s the timing nlysis of reltime systems. The systems re described s networks of communicting time-extended finite stte mchines (I/Ointervl structures). We use compct symbolic representtion to obtin efficient nlysis lgorithms This work is supported by the Germn Reserch Grnt (DFG project GRASP) 1. Introduction Forml verifiction hs become n importnt tsk in the design of softwre nd hrdwre. Especilly utomtic techniques like temporl logic model checking re used to support or even to replce stndrd test nd simultion methods. In the re of embedded rective systems, the verifiction of timing constrins plys n importnt role. E.g. miniml nd mximl rection times of controller hve to be gurnteed, setup nd hold times of flipflops hve to be kept or wit times of work pieces in puse sttions of production utomtion system should be minimized. One possibility to verify such timing properties is to use rel-time temporl logic model checker. In this cse, the designer hs to specify the timing properties with temporl logic formuls nd the system s stte trnsition grph. After the utomted verifiction process, the model checker nswers yes or no. This mens the system stisfies the specifiction or not, e.g. the rection time lies under certin time bound or not. But the designer obtins no sttement bout the ctul vlue of the rection time. Therefore Cmpos nd Clrke developed n nlysis tool (VERUS) which llows the verifiction of rel-time properties s well s the quntittive nlysis of rel-time systems [1]. This tool gets n description of system s synchronous progrm, the specifictions in temporl logic nd the nlysis queries. The system description is trnslted into ROBDDs [] representing the stte trnsition grph. The disdvntge of this pproch lies in the representtion of time. Since time progress is represented by counters, there exists for every time step seprte stte in the underlying grph. Especilly if mny counters with lrge vlues exist, the stte spce my explode. Other pproches for rel-time model checking use timed utomt [3, 4, 5]. Timed utomt llow very detiled description of rel-time systems through fixed number of clocks defined over dense time model. However, these pproches hve very complex model checking lgorithms (they re PSPACE-complete) nd there exist no nlysis lgorithms. In [10] we hve presented new formlism clled I/Ointervl structure. This formlism expnds finite stte mchines by timed stte trnsitions. We developed efficient model checking lgorithms bsed on representtion of these structures with extended chrcteristic functions [6]. These functions re implemented with MTBDDs [7,8]. In [9] we hve presented method for the composition of I/Ointervl structures completely working on the MTBDD representtion, including two minimiztion heuristics. This pproch llows the integrtion of untimed FSMs (e.g. controller) nd I/O-intervl structures (e.g. timed environment). In this pper we develop nlysis lgorithms working on the symbolic representtion of intervl structures nd which mke optiml use of this MTBDD-Bsed representtion. These lgorithms determine criticl times of specified systems, e.g. wit times of production systems, rection times of embedded systems or mximl dely times of communiction protocols. Together with the lredy developed verifiction lgorithms, we now hve powerful tool for the verifiction nd the nlysis of rel-time systems out of mny domins.
2 Section 1 introduces the rel-time model checking pproch which is the bsis of the nlysis lgorithms. First the modeling formlism (I/O-intervl structures) nd the specifiction logic (CCTL) re introduced. Afterwrds we present the symbolic representtion with extended chrcteristic functions. In Section 3 the different nlysis lgorithms re introduced. Section 4 describes some optimiztions ccelerting the nlysis lgorithms. Experimentl results re shown in Section 5. Section 6 concludes this pper.. Rel-time model checking.1. Intervl structures nd I/O-intervl structures Structures re stte-trnsition systems modeling HW- or SW-systems. The fundmentl structures re Kripke structures (unit-dely [1,3] structures, temporl structures) which my be derived from FSMs. The bsic models for reltime systems re intervl structures, i.e., stte trnsition systems with dditionl lbelled trnsitions. We ssume tht ech intervl structure hs exctly one time clock for mesuring time. The Fig..1. Exmple IS clock is reset to zero if stte is entered. A stte my be left if the ctul clock vlue corresponds to dely time lbelled t n outgoing trnsition. The stte must be left if the mximl dely time of ll outgoing trnsitions is reched (Fig..1). One clock tick is the lowest grnulrity for the time modeling. Definition.1. An intervl structure (IS) I is tuple I = ( PSTLI,,,, ) with set of tomic propositions P, set of sttes S (i-sttes), trnsition reltion between the sttes T S S such tht every stte in S hs successor stte, stte lbeling function L:S ( P) nd trnsition lbeling function I:T ( IN ) with IN = { 1, } nd is the potentil set opertor. Every stte of the IS must be left fter the mximl stte time. Definition.. The mximl stte time of stte s MxTime:S IN is the mximl dely time of ll outgoing trnsitions of s, i.e. MxTime()= s. mx{ t s'. ( ss', ) T t = mx( I( s, s' ))} (1) Besides the sttes, we lso hve to consider the currently elpsed time to determine the trnsition behvior of the system. Hence, the ctul stte of system, clled the generlized stte, is given by n i-stte s nd the ctul clock vlue v (the elpsed time). Definition.3. A generlized stte (g-stte) g = ( s, v) is n i-stte s S ssocited with clock vlue v IN 0 ( IN 0 = { 01,, }). The set of ll g-sttes in I = ( PSTLI,,,, ) is given by: G = {( s, v) s S 0 v < MxTime() s } () The semntics of ISs is represented by runs. Definition.4. Given the IS I = ( PSTLI,,,, ) nd strting g-stte g 0. A run is sequence of g-sttes r = ( g 0, g 1, ). For the g-sttes g j = ( s j, v j ) G of the sequence holds either g j + 1 = ( s j, v j + 1) with v j + 1 < MxTime( s j ) or g j + 1 = ( s j + 1, 0) with ( s j, s j + 1 ) T nd v j + 1 Is ( j, s j + 1 ). To expnd intervl structures by possibility for communiction, we extend them to I/O-intervl structures. These structures crry dditionl input lbels on ech trnsition. Such n input lbel is Boolen formul over the inputs. We interpret this formuls s input conditions which hve to hold during the corresponding trnsition times. Inputinsensitive edges crry the formul true. Definition.5. An I/O-intervl structure (I/O-IS) is tuple I I O = ( PP, I, S, T, L, I, I I ). The set of ll input vlutions is: Inp := ( P I ). The components PSL,, nd I re defined s in IS. P I is finite set of tomic input propositions. The trnsition reltion connects pirs of sttes nd the destintion inputs: T S S Inp. 1 I I : T ( Inp) is the trnsition input lbeling. The execution semntics of I/O-intervl structures re similr to intervl structures. The only difference lies in the input restrictions. A trnsition my only be tken if the corresponding input restriction holds until the dely time is reched nd the stte is left.. The logic CCTL CCTL [9] is temporl logic extending CTL with quntittive bounded temporl opertors. Two new temporl opertors re introduced to mke the specifiction of timed properties esier. The syntx of CCTL is shown in (3); where p P is n tomic proposition, IN nd b IN { } re time bounds. All intervl opertors cn lso be ccompnied by single time-bound only. In this cse the lower bound is set to zero by defult. If no intervl is specified, the lower bound is implicitly set to zero nd the upper bound is set to infinity. If the X-opertor hs no 1. In the most cses, the input vlutions of the trget sttes re irrelevnt [10].
3 time bound, it is implicitly set to one. The semntics of CCTL is given in [10]. p ϕ ϕ ϕ ϕ ϕ ϕ ϕ ϕ ϕ EX [ ] ϕ EF [ b, ] ϕ EG [ b, ] ϕ E( ϕ U [ b, ] ϕ) ϕ := E( ϕ C [ ] ϕ) E( ϕ S [ ] ϕ) AX [ ] ϕ AF [ b, ] ϕ AG [ b, ] ϕ A( ϕ U [ b, ] ϕ) A( ϕ C [ ] ϕ) A( ϕ S [ ] ϕ).3 Symbolic representtion of intervl structures In contrst to n explicit representtion, the symbolic representtion of FSMs uses chrcteristic functions. These functions mp sttes or trnsitions to true if they belong to the represented set. This representtion voids the explicit enumertion of sttes or trnsitions nd is therefore ble to represent sets of sttes with more thn 10 0 elements [11]. The representtion of g-sttes in IS need to store the elpsed time besides the ctul stte. Therefore we use extended chrcteristic functions (ECF, [1]) for symbolic representtion of IS. The following definition of ECFs is dpted to the representtion of IS. Definition.6. Given set of elements U (the universe, e.g. the set of sttes S) nd subset A U, where every element in A is ssocited with set of nturl numbers (the clock vlues, lso clled the ttribute set). An extended chrcteristic function representing A is given by: Λ A : U ( IN) with α if s A nd α IN Λ A ( s) 0 ssoc. with s := (4) otherwise I.e. we ccumulte ll clock vlues of g-sttes in the clock set which hve the sme i-stte. The stndrd set opertions like union or intersection my be extended to this kind of chrcteristic functions. ECFs my lso be used to represent the trnsition reltion. In this cse we mp pirs of sttes (the trnsition) to the vlid dely times. Also I/O-IS my be represented with ECFs..4 Model checking nd composition The min ide for the model checking lgorithm in [6] is to ssocite ech subformul of the specifiction with the set of g-sttes holding it. E.g. the formul "true" is ssocited with the set of ll g-sttes. The tomic proposition p P will be ssocited with the following g-stte set: { g g G s S. v IN 0.g = ( s, v) p L( s) } (5) The formul EXϕ will be ssocited with the set of predecessor g-sttes of the g-sttes ssocited with ϕ. Other temporl opertors my be computed by specil fixed point itertions bsed on the predecessor computtion. This com- (3) puttion my be split in two min opertions: the locl nd the globl predecessor computtion. The locl predecessor computtion tkes n ECF representing the ctul g-stte set nd decrements ll ttribute sets by one. A zero vlue will be removed: s.locl_ pre( Λ) ( s) = { v 1 v 1 v Λ( s) } (6) For set A of nturl numbers, we identify the set where ech vlue is decremented with: A 1. The globl predecessor computtion computes the predecessor of zero clocked g-sttes. This opertion works similr to the predecessor computtion of symbolic FSM trversl techniques. This opertion selects the g-sttes with zero clock vlues nd computes together with the trnsition reltion the predecessor g-sttes in predecessor i- sttes. This opertion is more complex thn the locl predecessor computtion. More detils my be found in [9]. The function pre is the union of the locl nd the globl predecessors. The result of this function is exctly the set of predecessors of given g-stte set. The function succ works similr nd computes the successor g-sttes. Model checking s described bove works exctly on one IS, but rel-life systems re usully described in modulr wy by mny intercting components. In order to mke model checking pplicble to networks of communicting components, it is necessry to compute the product structure of ll submodules. This product-computtion is clled composition. The composition is described in detil in [9]. The composition lgorithms re lso pplicble to networks of I/O-IS if we work with closed systems, where every free vrible is bounded by structure. After composition, the efficient model checking lgorithms for IS my be used for verifiction. These lgorithms re described in detil in [6]. Composition s well s the model checking lgorithms use the symbolic representtion of g-stte sets nd trnsition reltions with ECFs. 3. The nlysis lgorithms The nlysis technique should help designer to extrct importnt time bounds from his forml system description. An often rising problem is to compute the mximl stbility of signl. E.g. if we wnt to exmine switch circuit with dely times, it my be very importnt to determine the number of time steps, the out put signl stys stble high. This stbility nlysis is lso useful to compute the mximl number of time steps, work piece wits on buffer until it will be processed. Other typicl problems re miniml nd mximl dely times between events, e.g. how long does it miniml/mximl tke until the first work piece leves the production cell. In the following two subsections we present the nlysis lgorithms.
4 3.1 The STABLE lgorithm The nlysis lgorithms do lso use the trversl techniques (predecessor computtion) of the model checking lgorithms. The progrm 1 shows the implementtion of the STABLE-lgorithms in n impertive (C- or Pscllike) progrmming lnguge. 1 int stble(ecf f) ct := f 5 while (ct old ct ) do 6 old := ct 7 ct := pre(ct) ct 8 res := res if ct = then return res 10 else return Progrm 1. The STABLE lgorithm The lgorithm gets set of g-sttes to exmine (f). This set my be specified s CCTL formul nd my be computed by the model checking lgorithm (see Section.4). The lgorithm determines the mximl number of steps (res) such tht there exist run in which the first res g- sttes re members of the set represented by f but the g- stte t position res+1 is not member of f. The computtion of the lgorithms initilizes set of ctul g-sttes (ct) with the set of the g-sttes to exmine (f). Then it strts shrinking this set successively by intersecting it with its predecessors. If the set ct is empty, the mximl stbility is computed. If the lgorithm reches fixed point, i.e. ct=old, then there exist cycle in f. The figure 3.1 illustrtes the computtion of the STA- BLE lgorithm. The intervl structure to exmine is shown t the top. The lower prt displys the g-sttes nd the predecessor reltion (dotted rrows). The nlysis set is given by the CCTL formul AF [ ] which mens, tht on ll pths the signl must be rechble within two time steps. The grey ovl includes the ctul g-sttes (ct). The numbers on the left shows the ctul itertion (equl to res). 3. The MIN/MAX lgorithms The following two lgorithms compute the miniml resp. mximl number of unit time-steps between strt nd n im set of g-sttes. Cmpos nd Clrke introduced lgorithms bsed on n ROBDD representtion [13]. The ide of the lgorithm in progrm is to initilize set of g-sttes (ct) with the set of strt sttes nd then to expnd this set successively by its successors. The lgorithm counts the number of predecessor computtions while iterting (the dely time between g-stte nd its successor is exctly one time step). This procedure will be repeted until t lest one im stte is reched or the set AF [ ] 4 Fig Illustrtion of the STABLE-computtion. will not chnge nymore. In the ltter cse, there exist no pth from the strt sttes to the im sttes. 1 int min(ecf strt, im) ct := strt 5 while (ct old ct im = ) do 6 old := ct 7 ct := ct succ(ct) 8 res := res if ct im then return res 10 else return Progrm. The MIN lgorithm The lgorithm computing the mximl dely time is shown in progrm 3. It initilizes set with ll g-sttes except the the im set (ct). Then it shrinks this set by intersectin ct with its predecessors until no strt g-stte is left or fixed point is reched. In the ltter cse, there exists either no connection between the strt set nd the im set or there exist loop such tht the mximl dely time is infinite. 1 int min(ecf strt, im) ct := im 5 while (ct old ct im = )do 6 old := ct 7 ct := ct pre(ct) 8 res := res if ct=old then return 10 else return res Progrm 3. The MAX lgorithm 4. Time prediction nd time jumps As lredy mentioned in Section.4, the globl predecessor computtion is more expensive thn the locl predeces- 1
5 sor computtion. But on the other hnd, the set of globl predecessor g-sttes my sty constnt during some itertion steps. Upon this observtion, we present n optimiztion technique which computes globl predecessors only if they chnge. This technique (clled time prediction) ccelertes the nlysis lgorithms enormously. The ide is to predict the number of computtions for which the globl predecessors sty constnt. For this number of steps, the itertion will be performed loclly on the ttribute sets of the ECFs. We show this technique exemplrily for the STABLE lgorithm. The prediction exmines ll ttribute sets of the ctul stte set ( Λ A ) nd the globl predecessors ( Λ G ), computes the number of steps nd returns the minimum: predict( Λ A, Λ G ) := min s S l_ pred( Λ A ( s), Λ G ( s) ) (7) After the prediction is computed, the itertion of line 5 to 9 in progrm 1 my be performed loclly on the ttribute sets. Therefore we introduce locl itertion function (l_iter) which preforms this itertion on the ctul clock vlues ( A) nd the ctul globl predecessors ( G) of one stte: 1 set l_iter(set A, G, int n) res := A 4 i := 0 5 while i n res old do 6 old := res 7 res := res (res-1 G) 8 return res Progrm 4. Locl itertion function As lredy defined, the decrementtion in line 7 ffects ll vlues in the set. To pply this ttribute oriented function to n ECF, we pply it to every ttribute set: s. itertion( Λ A, Λ G, n) = l_iter( Λ A ( s), Λ G ( s), n) (8) With the knowledge of the locl itertion, we my define the locl prediction function. The function l_ pred receives two sets of nturl numbers, the ctul clock vlues ( A) nd the ctul globl predecessors ( G) of the exmined stte. The locl prediction hs to distinguishe two cses: l_ pred( A, G) n. { 0,, n} A n + 1 A := n + 1 if c G.c 0,, n (9) otherwise The only reson to recompute the globl predecessor is when zero clock vlue disppers. A new zero clock vlue my never pper. The zero clock vlue disppers fter n + 1 steps, when the vlues 0 to n re in the ctul g-stte nd the vlue n + 1 is not n ctul clock vlue. Moreover there my not exist vlue in G smller thn 1 int stble_predict(ecf f) ct := f 5 while (ct old ct ) do 6 old := ct 7 g := globl_pre(ct) 8 n := predict(ct,g) 9 ct := itertion(ct,g,n) 10 res := res + n 11 if ct = then return res 1 else return Progrm 5. Stble computtion with prediction n + 1 becuse this vlue supports the zero vlue. In this sitution every itertion step removes one element in A. The first step removes the vlue n, the second step removes the vlue n 1 nd so on. This mens fter n + 1 steps the zero clock vlue will be removed. In progrm 5 the complete lgorithm with time prediction is shown. An dditionl technique to ccelerte the lgorithms is clled time jump. This technique tries to improve the locl itertion. If we regrd the set of clock vlues in different itertion steps in figure 4.1, we relize, tht the ctul clock vlue set shrinks until it will be supported by vlue in G. itertion A G clock vlue Fig The behvior of the g-stte sets Therefore it is not necessry to perform every itertion step explicitly, we exploit this regulr behvior to execute in one complex opertion n itertion steps. Formlly we my define the time jump for the stbility nlysis through: jump( A, G, n) := v { v,, v+ n} A w v.w G { v,, w} A (10) This opertion is very implementtion dependent, therefore we will not show further detils. Figure Fig. 4. shows the computtion of figure 3.1with time prediction nd time jumps. On the right side of this figure, the result of the prediction for the next jump is shown. Becuse of the time prediction technique only globl itertion steps re necessry. 5. Experimentl results All presented lgorithms re implemented in our rel-time verifiction tool RAVEN. The ECFs re implemented by
6 0 1 Fig. 4.. Optimized STABLE-computtion multi terminl binry decision digrms (MTBDDs). We compred our implementtion with VERUS [1]. We modeled timed trnsitions in VERUS by loops which wit one time unit nd decrement counter. We compred only the min/mx lgorithms becuse VERUS do not support the stble query but on the other hnd VERUS offers two queries mincount nd mxcount which re ctully not supported by RAVEN. We hve chosen the sme vrible ordering for the signls. The exmined cse studies re the single pulser circuit enriched by timed gtes (SP), production cell (PC) nd the rbitrtion mechnism of the J1850 bus protocol. The first two systems re widely used to compre forml methods. Detils of the exmined systems my be found in [10]. For the single pulser we computed the miniml nd the mximl length of the output impulse. In the production cell we were interested in the miniml nd the mximl time when the first work piece leves the cell. In the J1850 exmple we checked the miniml nd the mximl dely time when node will leve the sending mode. The following tble compres the runtimes of both tools. For the VERUS run-times we tried vrious options nd choose the best results. For RAVEN we compred the time prediction (+t) nd the prediction together with the time jumps (+tj). The run-times in the tbel with nd without optimiztions seems to show, tht these techniques cuse only tiny speedup. But the run-times shown in the tble contin besides the nlyse times lso the composition times of the structures. In ll three exmples the composition consumes the mjor prt of the times (11.73 sec. for the single pulser, 000 seconds for the production cell nd 5 sec. for the J1850). If there will be more thn two nlysis (s computed in the exmples), thn the frction of composition time to nlyse time will shrink nd the the optimiztions will cuse lrger speedup. SP PC J1850 VERUS b RAVEN RAVEN +t RAVEN +tj VERUS terminted with n error: string tble overflow b. VERUS ws terminted due to memory consumption over 600MB predict = 6. Conclusion In this pper we presented new pproch for the nlysis of rel-time systems. This pproch works on the sme representtion s rel-time model checking. This llows the verifiction s well s nlysis. The systems re described by networks of communicting I/O-intervl structures. These structures include timed trnsitions nd the lbeling of these trnsitions with input restrictions. After the composition of the substructures, RAVEN performs the model checking nd the nlysis on the resulting intervl structure. Due to the symbolic representtion of the structures nd g-stte sets with extended chrcteristic functions, this pproch works very compct in the memory consumption. Especilly if long dely times re specified, the dvntges of this technique re obvious. By exploiting the loclly stored timing informtion (in the ttribute sets), techniques like time prediction nd time jumps ccelerte the model checking nd nlysis lgorithms. Bibliogrphy [1] S. Cmpos, E. Clrke, nd M. Mine. The verus tool: A quntittive pproch to the forml verifiction of rel-time systems. In CAV, LNCS. Springer Verlg, June [] R. Brynt. Grph-Bsed Algorithms for Boolen Function Mnipultion. IEEE Trnsctions on Computers, August [3] R. Alur, C. Courcoubetics, nd D. Dill. Model Checking for Rel- Time Systems. In LICS, Wshington, D.C., June IEEE CSP. [4] T. Henzinger, X. Nicollin, J. Sifkis, nd S. Yovine. Symbolic Model Checking for Rel-Time Systems. In LICS, Snt-Cruz, June 199. IEEE Computer Society Press. [5] M. Bozg, O. Mler, A. Pnueli, nd S. Yovine. Some progress in the symbolic verifiction of timed utomt. In CAV 97. Springer Verlg, June [6] J. Ruf nd T. Kropf. Symbolic model checking for discrete clocked temporl logic with intervls. In CHARME 97, Montrel, Cnd, Oct Chpmn nd Hll. [7] E. Clrke, K. McMillin, X. Zho, M. Fujit, nd J.-Y. Yng. Spectrl Trnsforms for lrge Boolen Functions with Appliction to Technologie Mpping. In DAC 93, Dlls, TX, June [8] R. Bhr, E. Frohm, C. Gon, G. Hchtel, E. Mcii, A. Prdo, nd F. Somenzi. Algebric Decision Digrms nd Their Applictions. In ICCAD, Snt Clr, CA, Nov ACM/IEEE, IEEE CSP. [9] J. Ruf nd T. Kropf. Using MTBDDs for composition nd model checking of rel-time systems. In FMCAD 1998, Plo Alto.Springer. [10] J. Ruf nd T. Kropf. Modeling nd Checking Networks of Rel- Time Systems. In CHARME 99, Bd Herrenlb, Germny. Springer Verlg, Septemper [11] J. Burch, E. Clrke, K. McMilln nd D. Dill. Symbolic Model Checking: 10 0 Sttes nd Beyond. In LICS, IEEE Computer Society press, June [1] J. Ruf nd T. Kropf. Using MTBDDs for discrete timed symbolic model checking. Multiple-Vlued Logic An Interntionl Journl, Gordon nd Brech publisher. [13] S. Cmpos, E. Clrke, W. Mrrero, M. Mine, nd H. Hirishi. Computing quntitive chrkteristics of finite-stte rel-time systems. Technicl Report, Pittsburgh, My 1994.
State space systems analysis (continued) Stability. A. Definitions A system is said to be Asymptotically Stable (AS) when it satisfies
Stte spce systems nlysis (continued) Stbility A. Definitions A system is sid to be Asymptoticlly Stble (AS) when it stisfies ut () = 0, t > 0 lim xt () 0. t A system is AS if nd only if the impulse response
More informationAUTOMATA AND LANGUAGES. Definition 1.5: Finite Automaton
25. Finite Automt AUTOMATA AND LANGUAGES A system of computtion tht only hs finite numer of possile sttes cn e modeled using finite utomton A finite utomton is often illustrted s stte digrm d d d. d q
More information19 Optimal behavior: Game theory
Intro. to Artificil Intelligence: Dle Schuurmns, Relu Ptrscu 1 19 Optiml behvior: Gme theory Adversril stte dynmics hve to ccount for worst cse Compute policy π : S A tht mximizes minimum rewrd Let S (,
More information1.4 Nonregular Languages
74 1.4 Nonregulr Lnguges The number of forml lnguges over ny lphbet (= decision/recognition problems) is uncountble On the other hnd, the number of regulr expressions (= strings) is countble Hence, ll
More informationFinite Automata. Informatics 2A: Lecture 3. John Longley. 22 September School of Informatics University of Edinburgh
Lnguges nd Automt Finite Automt Informtics 2A: Lecture 3 John Longley School of Informtics University of Edinburgh jrl@inf.ed.c.uk 22 September 2017 1 / 30 Lnguges nd Automt 1 Lnguges nd Automt Wht is
More informationCS 275 Automata and Formal Language Theory
CS 275 Automt nd Forml Lnguge Theory Course Notes Prt II: The Recognition Problem (II) Chpter II.6.: Push Down Automt Remrk: This mteril is no longer tught nd not directly exm relevnt Anton Setzer (Bsed
More informationStrong Bisimulation. Overview. References. Actions Labeled transition system Transition semantics Simulation Bisimulation
Strong Bisimultion Overview Actions Lbeled trnsition system Trnsition semntics Simultion Bisimultion References Robin Milner, Communiction nd Concurrency Robin Milner, Communicting nd Mobil Systems 32
More informationConcepts of Concurrent Computation Spring 2015 Lecture 9: Petri Nets
Concepts of Concurrent Computtion Spring 205 Lecture 9: Petri Nets Sebstin Nnz Chris Poskitt Chir of Softwre Engineering Petri nets Petri nets re mthemticl models for describing systems with concurrency
More informationAcceptance Sampling by Attributes
Introduction Acceptnce Smpling by Attributes Acceptnce smpling is concerned with inspection nd decision mking regrding products. Three spects of smpling re importnt: o Involves rndom smpling of n entire
More informationTypes of Finite Automata. CMSC 330: Organization of Programming Languages. Comparing DFAs and NFAs. Comparing DFAs and NFAs (cont.) Finite Automata 2
CMSC 330: Orgniztion of Progrmming Lnguges Finite Automt 2 Types of Finite Automt Deterministic Finite Automt () Exctly one sequence of steps for ech string All exmples so fr Nondeterministic Finite Automt
More informationDesigning finite automata II
Designing finite utomt II Prolem: Design DFA A such tht L(A) consists of ll strings of nd which re of length 3n, for n = 0, 1, 2, (1) Determine wht to rememer out the input string Assign stte to ech of
More informationCS 188: Artificial Intelligence Spring 2007
CS 188: Artificil Intelligence Spring 2007 Lecture 3: Queue-Bsed Serch 1/23/2007 Srini Nrynn UC Berkeley Mny slides over the course dpted from Dn Klein, Sturt Russell or Andrew Moore Announcements Assignment
More informationReview of Calculus, cont d
Jim Lmbers MAT 460 Fll Semester 2009-10 Lecture 3 Notes These notes correspond to Section 1.1 in the text. Review of Clculus, cont d Riemnn Sums nd the Definite Integrl There re mny cses in which some
More informationTypes of Finite Automata. CMSC 330: Organization of Programming Languages. Comparing DFAs and NFAs. NFA for (a b)*abb.
CMSC 330: Orgniztion of Progrmming Lnguges Finite Automt 2 Types of Finite Automt Deterministic Finite Automt () Exctly one sequence of steps for ech string All exmples so fr Nondeterministic Finite Automt
More informationConvert the NFA into DFA
Convert the NF into F For ech NF we cn find F ccepting the sme lnguge. The numer of sttes of the F could e exponentil in the numer of sttes of the NF, ut in prctice this worst cse occurs rrely. lgorithm:
More informationFinite Automata Theory and Formal Languages TMV027/DIT321 LP4 2018
Finite Automt Theory nd Forml Lnguges TMV027/DIT321 LP4 2018 Lecture 10 An Bove April 23rd 2018 Recp: Regulr Lnguges We cn convert between FA nd RE; Hence both FA nd RE ccept/generte regulr lnguges; More
More informationTHE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS.
THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS RADON ROSBOROUGH https://intuitiveexplntionscom/picrd-lindelof-theorem/ This document is proof of the existence-uniqueness theorem
More informationCMSC 330: Organization of Programming Languages. DFAs, and NFAs, and Regexps (Oh my!)
CMSC 330: Orgniztion of Progrmming Lnguges DFAs, nd NFAs, nd Regexps (Oh my!) CMSC330 Spring 2018 Types of Finite Automt Deterministic Finite Automt (DFA) Exctly one sequence of steps for ech string All
More informationLecture 9: LTL and Büchi Automata
Lecture 9: LTL nd Büchi Automt 1 LTL Property Ptterns Quite often the requirements of system follow some simple ptterns. Sometimes we wnt to specify tht property should only hold in certin context, clled
More informationCMSC 330: Organization of Programming Languages
CMSC 330: Orgniztion of Progrmming Lnguges Finite Automt 2 CMSC 330 1 Types of Finite Automt Deterministic Finite Automt (DFA) Exctly one sequence of steps for ech string All exmples so fr Nondeterministic
More informationCMPSCI 250: Introduction to Computation. Lecture #31: What DFA s Can and Can t Do David Mix Barrington 9 April 2014
CMPSCI 250: Introduction to Computtion Lecture #31: Wht DFA s Cn nd Cn t Do Dvid Mix Brrington 9 April 2014 Wht DFA s Cn nd Cn t Do Deterministic Finite Automt Forml Definition of DFA s Exmples of DFA
More informationGenetic Programming. Outline. Evolutionary Strategies. Evolutionary strategies Genetic programming Summary
Outline Genetic Progrmming Evolutionry strtegies Genetic progrmming Summry Bsed on the mteril provided y Professor Michel Negnevitsky Evolutionry Strtegies An pproch simulting nturl evolution ws proposed
More informationCS 275 Automata and Formal Language Theory
CS 275 Automt nd Forml Lnguge Theory Course Notes Prt II: The Recognition Problem (II) Chpter II.5.: Properties of Context Free Grmmrs (14) Anton Setzer (Bsed on book drft by J. V. Tucker nd K. Stephenson)
More informationMinimal DFA. minimal DFA for L starting from any other
Miniml DFA Among the mny DFAs ccepting the sme regulr lnguge L, there is exctly one (up to renming of sttes) which hs the smllest possile numer of sttes. Moreover, it is possile to otin tht miniml DFA
More informationNondeterminism and Nodeterministic Automata
Nondeterminism nd Nodeterministic Automt 61 Nondeterminism nd Nondeterministic Automt The computtionl mchine models tht we lerned in the clss re deterministic in the sense tht the next move is uniquely
More informationThe Regulated and Riemann Integrals
Chpter 1 The Regulted nd Riemnn Integrls 1.1 Introduction We will consider severl different pproches to defining the definite integrl f(x) dx of function f(x). These definitions will ll ssign the sme vlue
More information7.2 The Definite Integral
7.2 The Definite Integrl the definite integrl In the previous section, it ws found tht if function f is continuous nd nonnegtive, then the re under the grph of f on [, b] is given by F (b) F (), where
More informationCS 267: Automated Verification. Lecture 8: Automata Theoretic Model Checking. Instructor: Tevfik Bultan
CS 267: Automted Verifiction Lecture 8: Automt Theoretic Model Checking Instructor: Tevfik Bultn LTL Properties Büchi utomt [Vrdi nd Wolper LICS 86] Büchi utomt: Finite stte utomt tht ccept infinite strings
More information1.3 Regular Expressions
56 1.3 Regulr xpressions These hve n importnt role in describing ptterns in serching for strings in mny pplictions (e.g. wk, grep, Perl,...) All regulr expressions of lphbet re 1.Ønd re regulr expressions,
More informationFormal Methods in Software Engineering
Forml Methods in Softwre Engineering Lecture 09 orgniztionl issues Prof. Dr. Joel Greenyer Decemer 9, 2014 Written Exm The written exm will tke plce on Mrch 4 th, 2015 The exm will tke 60 minutes nd strt
More informationFinite Automata. Informatics 2A: Lecture 3. Mary Cryan. 21 September School of Informatics University of Edinburgh
Finite Automt Informtics 2A: Lecture 3 Mry Cryn School of Informtics University of Edinburgh mcryn@inf.ed.c.uk 21 September 2018 1 / 30 Lnguges nd Automt Wht is lnguge? Finite utomt: recp Some forml definitions
More informationIntermediate Math Circles Wednesday, November 14, 2018 Finite Automata II. Nickolas Rollick a b b. a b 4
Intermedite Mth Circles Wednesdy, Novemer 14, 2018 Finite Automt II Nickols Rollick nrollick@uwterloo.c Regulr Lnguges Lst time, we were introduced to the ide of DFA (deterministic finite utomton), one
More informationp-adic Egyptian Fractions
p-adic Egyptin Frctions Contents 1 Introduction 1 2 Trditionl Egyptin Frctions nd Greedy Algorithm 2 3 Set-up 3 4 p-greedy Algorithm 5 5 p-egyptin Trditionl 10 6 Conclusion 1 Introduction An Egyptin frction
More informationAnatomy of a Deterministic Finite Automaton. Deterministic Finite Automata. A machine so simple that you can understand it in less than one minute
Victor Admchik Dnny Sletor Gret Theoreticl Ides In Computer Science CS 5-25 Spring 2 Lecture 2 Mr 3, 2 Crnegie Mellon University Deterministic Finite Automt Finite Automt A mchine so simple tht you cn
More informationRELATIONAL MODEL.
RELATIONAL MODEL Structure of Reltionl Dtbses Reltionl Algebr Tuple Reltionl Clculus Domin Reltionl Clculus Extended Reltionl-Algebr- Opertions Modifiction of the Dtbse Views EXAMPLE OF A RELATION BASIC
More informationHow to simulate Turing machines by invertible one-dimensional cellular automata
How to simulte Turing mchines by invertible one-dimensionl cellulr utomt Jen-Christophe Dubcq Déprtement de Mthémtiques et d Informtique, École Normle Supérieure de Lyon, 46, llée d Itlie, 69364 Lyon Cedex
More informationMath 8 Winter 2015 Applications of Integration
Mth 8 Winter 205 Applictions of Integrtion Here re few importnt pplictions of integrtion. The pplictions you my see on n exm in this course include only the Net Chnge Theorem (which is relly just the Fundmentl
More informationNFAs and Regular Expressions. NFA-ε, continued. Recall. Last class: Today: Fun:
CMPU 240 Lnguge Theory nd Computtion Spring 2019 NFAs nd Regulr Expressions Lst clss: Introduced nondeterministic finite utomt with -trnsitions Tody: Prove n NFA- is no more powerful thn n NFA Introduce
More informationReinforcement learning II
CS 1675 Introduction to Mchine Lerning Lecture 26 Reinforcement lerning II Milos Huskrecht milos@cs.pitt.edu 5329 Sennott Squre Reinforcement lerning Bsics: Input x Lerner Output Reinforcement r Critic
More informationNotes on specifying systems in EST
Robert Meolic, Ttjn Kpus: Notes on specifying systems in EST 1 Notes on specifying systems in EST Robert Meolic, Ttjn Kpus Fculty of EE & CS University of Mribor Robert Meolic, Ttjn Kpus: Notes on specifying
More informationNew Expansion and Infinite Series
Interntionl Mthemticl Forum, Vol. 9, 204, no. 22, 06-073 HIKARI Ltd, www.m-hikri.com http://dx.doi.org/0.2988/imf.204.4502 New Expnsion nd Infinite Series Diyun Zhng College of Computer Nnjing University
More informationProperties of Integrals, Indefinite Integrals. Goals: Definition of the Definite Integral Integral Calculations using Antiderivatives
Block #6: Properties of Integrls, Indefinite Integrls Gols: Definition of the Definite Integrl Integrl Clcultions using Antiderivtives Properties of Integrls The Indefinite Integrl 1 Riemnn Sums - 1 Riemnn
More informationNew data structures to reduce data size and search time
New dt structures to reduce dt size nd serch time Tsuneo Kuwbr Deprtment of Informtion Sciences, Fculty of Science, Kngw University, Hirtsuk-shi, Jpn FIT2018 1D-1, No2, pp1-4 Copyright (c)2018 by The Institute
More informationMore on automata. Michael George. March 24 April 7, 2014
More on utomt Michel George Mrch 24 April 7, 2014 1 Automt constructions Now tht we hve forml model of mchine, it is useful to mke some generl constructions. 1.1 DFA Union / Product construction Suppose
More information20 MATHEMATICS POLYNOMIALS
0 MATHEMATICS POLYNOMIALS.1 Introduction In Clss IX, you hve studied polynomils in one vrible nd their degrees. Recll tht if p(x) is polynomil in x, the highest power of x in p(x) is clled the degree of
More informationCS415 Compilers. Lexical Analysis and. These slides are based on slides copyrighted by Keith Cooper, Ken Kennedy & Linda Torczon at Rice University
CS415 Compilers Lexicl Anlysis nd These slides re sed on slides copyrighted y Keith Cooper, Ken Kennedy & Lind Torczon t Rice University First Progrmming Project Instruction Scheduling Project hs een posted
More informationChapter Five: Nondeterministic Finite Automata. Formal Language, chapter 5, slide 1
Chpter Five: Nondeterministic Finite Automt Forml Lnguge, chpter 5, slide 1 1 A DFA hs exctly one trnsition from every stte on every symol in the lphet. By relxing this requirement we get relted ut more
More information1 Online Learning and Regret Minimization
2.997 Decision-Mking in Lrge-Scle Systems My 10 MIT, Spring 2004 Hndout #29 Lecture Note 24 1 Online Lerning nd Regret Minimiztion In this lecture, we consider the problem of sequentil decision mking in
More informationMath 1B, lecture 4: Error bounds for numerical methods
Mth B, lecture 4: Error bounds for numericl methods Nthn Pflueger 4 September 0 Introduction The five numericl methods descried in the previous lecture ll operte by the sme principle: they pproximte the
More informationRiemann Sums and Riemann Integrals
Riemnn Sums nd Riemnn Integrls Jmes K. Peterson Deprtment of Biologicl Sciences nd Deprtment of Mthemticl Sciences Clemson University August 26, 2013 Outline 1 Riemnn Sums 2 Riemnn Integrls 3 Properties
More informationKNOWLEDGE-BASED AGENTS INFERENCE
AGENTS THAT REASON LOGICALLY KNOWLEDGE-BASED AGENTS Two components: knowledge bse, nd n inference engine. Declrtive pproch to building n gent. We tell it wht it needs to know, nd It cn sk itself wht to
More informationBisimulation. R.J. van Glabbeek
Bisimultion R.J. vn Glbbeek NICTA, Sydney, Austrli. School of Computer Science nd Engineering, The University of New South Wles, Sydney, Austrli. Computer Science Deprtment, Stnford University, CA 94305-9045,
More informationA Criterion on Existence and Uniqueness of Behavior in Electric Circuit
Institute Institute of of Advnced Advnced Engineering Engineering nd nd Science Science Interntionl Journl of Electricl nd Computer Engineering (IJECE) Vol 6, No 4, August 2016, pp 1529 1533 ISSN: 2088-8708,
More informationLecture 20: Numerical Integration III
cs4: introduction to numericl nlysis /8/0 Lecture 0: Numericl Integrtion III Instructor: Professor Amos Ron Scribes: Mrk Cowlishw, Yunpeng Li, Nthnel Fillmore For the lst few lectures we hve discussed
More informationMath& 152 Section Integration by Parts
Mth& 5 Section 7. - Integrtion by Prts Integrtion by prts is rule tht trnsforms the integrl of the product of two functions into other (idelly simpler) integrls. Recll from Clculus I tht given two differentible
More informationSoftware Engineering using Formal Methods
Softwre Engineering using Forml Methods Propositionl nd (Liner) Temporl Logic Wolfgng Ahrendt 13th Septemer 2016 SEFM: Liner Temporl Logic /GU 160913 1 / 60 Recpitultion: FormlistionFormlistion: Syntx,
More informationSemantic reachability for simple process algebras. Richard Mayr. Abstract
Semntic rechbility for simple process lgebrs Richrd Myr Abstrct This pper is n pproch to combine the rechbility problem with semntic notions like bisimultion equivlence. It dels with questions of the following
More informationRiemann Sums and Riemann Integrals
Riemnn Sums nd Riemnn Integrls Jmes K. Peterson Deprtment of Biologicl Sciences nd Deprtment of Mthemticl Sciences Clemson University August 26, 203 Outline Riemnn Sums Riemnn Integrls Properties Abstrct
More informationUninformed Search Lecture 4
Lecture 4 Wht re common serch strtegies tht operte given only serch problem? How do they compre? 1 Agend A quick refresher DFS, BFS, ID-DFS, UCS Unifiction! 2 Serch Problem Formlism Defined vi the following
More informationReview of basic calculus
Review of bsic clculus This brief review reclls some of the most importnt concepts, definitions, nd theorems from bsic clculus. It is not intended to tech bsic clculus from scrtch. If ny of the items below
More informationUnit #9 : Definite Integral Properties; Fundamental Theorem of Calculus
Unit #9 : Definite Integrl Properties; Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl
More informationCS375: Logic and Theory of Computing
CS375: Logic nd Theory of Computing Fuhu (Frnk) Cheng Deprtment of Computer Science University of Kentucky 1 Tble of Contents: Week 1: Preliminries (set lgebr, reltions, functions) (red Chpters 1-4) Weeks
More informationBernoulli Numbers Jeff Morton
Bernoulli Numbers Jeff Morton. We re interested in the opertor e t k d k t k, which is to sy k tk. Applying this to some function f E to get e t f d k k tk d k f f + d k k tk dk f, we note tht since f
More informationPhysics 116C Solution of inhomogeneous ordinary differential equations using Green s functions
Physics 6C Solution of inhomogeneous ordinry differentil equtions using Green s functions Peter Young November 5, 29 Homogeneous Equtions We hve studied, especilly in long HW problem, second order liner
More informationChapter 4 Contravariance, Covariance, and Spacetime Diagrams
Chpter 4 Contrvrince, Covrince, nd Spcetime Digrms 4. The Components of Vector in Skewed Coordintes We hve seen in Chpter 3; figure 3.9, tht in order to show inertil motion tht is consistent with the Lorentz
More informationCOMPUTER SCIENCE TRIPOS
CST.2011.2.1 COMPUTER SCIENCE TRIPOS Prt IA Tuesdy 7 June 2011 1.30 to 4.30 COMPUTER SCIENCE Pper 2 Answer one question from ech of Sections A, B nd C, nd two questions from Section D. Submit the nswers
More information8 Laplace s Method and Local Limit Theorems
8 Lplce s Method nd Locl Limit Theorems 8. Fourier Anlysis in Higher DImensions Most of the theorems of Fourier nlysis tht we hve proved hve nturl generliztions to higher dimensions, nd these cn be proved
More informationLecture 14: Quadrature
Lecture 14: Qudrture This lecture is concerned with the evlution of integrls fx)dx 1) over finite intervl [, b] The integrnd fx) is ssumed to be rel-vlues nd smooth The pproximtion of n integrl by numericl
More informationAdvanced Calculus: MATH 410 Notes on Integrals and Integrability Professor David Levermore 17 October 2004
Advnced Clculus: MATH 410 Notes on Integrls nd Integrbility Professor Dvid Levermore 17 October 2004 1. Definite Integrls In this section we revisit the definite integrl tht you were introduced to when
More informationChapter 0. What is the Lebesgue integral about?
Chpter 0. Wht is the Lebesgue integrl bout? The pln is to hve tutoril sheet ech week, most often on Fridy, (to be done during the clss) where you will try to get used to the ides introduced in the previous
More informationGlobal Session Types for Dynamic Checking of Protocol Conformance of Multi-Agent Systems
Globl Session Types for Dynmic Checking of Protocol Conformnce of Multi-Agent Systems (Extended Abstrct) Dvide Ancon, Mtteo Brbieri, nd Vivin Mscrdi DIBRIS, University of Genov, Itly emil: dvide@disi.unige.it,
More informationFoundations for Timed Systems
Foundtions for Timed Systems Ptrici Bouyer LSV CNRS UMR 8643 & ENS de Cchn 6, venue du Président Wilson 9423 Cchn Frnce emil: bouyer@lsv.ens-cchn.fr Introduction Explicit timing constrints re nturlly present
More informationDuality # Second iteration for HW problem. Recall our LP example problem we have been working on, in equality form, is given below.
Dulity #. Second itertion for HW problem Recll our LP emple problem we hve been working on, in equlity form, is given below.,,,, 8 m F which, when written in slightly different form, is 8 F Recll tht we
More informationUNIFORM CONVERGENCE. Contents 1. Uniform Convergence 1 2. Properties of uniform convergence 3
UNIFORM CONVERGENCE Contents 1. Uniform Convergence 1 2. Properties of uniform convergence 3 Suppose f n : Ω R or f n : Ω C is sequence of rel or complex functions, nd f n f s n in some sense. Furthermore,
More informationWhere did dynamic programming come from?
Where did dynmic progrmming come from? String lgorithms Dvid Kuchk cs302 Spring 2012 Richrd ellmn On the irth of Dynmic Progrmming Sturt Dreyfus http://www.eng.tu.c.il/~mi/cd/ or50/1526-5463-2002-50-01-0048.pdf
More informationNFA DFA Example 3 CMSC 330: Organization of Programming Languages. Equivalence of DFAs and NFAs. Equivalence of DFAs and NFAs (cont.
NFA DFA Exmple 3 CMSC 330: Orgniztion of Progrmming Lnguges NFA {B,D,E {A,E {C,D {E Finite Automt, con't. R = { {A,E, {B,D,E, {C,D, {E 2 Equivlence of DFAs nd NFAs Any string from {A to either {D or {CD
More informationWeek 10: Line Integrals
Week 10: Line Integrls Introduction In this finl week we return to prmetrised curves nd consider integrtion long such curves. We lredy sw this in Week 2 when we integrted long curve to find its length.
More information1.9 C 2 inner variations
46 CHAPTER 1. INDIRECT METHODS 1.9 C 2 inner vritions So fr, we hve restricted ttention to liner vritions. These re vritions of the form vx; ǫ = ux + ǫφx where φ is in some liner perturbtion clss P, for
More informationGoals: Determine how to calculate the area described by a function. Define the definite integral. Explore the relationship between the definite
Unit #8 : The Integrl Gols: Determine how to clculte the re described by function. Define the definite integrl. Eplore the reltionship between the definite integrl nd re. Eplore wys to estimte the definite
More informationTheory of Computation Regular Languages. (NTU EE) Regular Languages Fall / 38
Theory of Computtion Regulr Lnguges (NTU EE) Regulr Lnguges Fll 2017 1 / 38 Schemtic of Finite Automt control 0 0 1 0 1 1 1 0 Figure: Schemtic of Finite Automt A finite utomton hs finite set of control
More informationExam 2, Mathematics 4701, Section ETY6 6:05 pm 7:40 pm, March 31, 2016, IH-1105 Instructor: Attila Máté 1
Exm, Mthemtics 471, Section ETY6 6:5 pm 7:4 pm, Mrch 1, 16, IH-115 Instructor: Attil Máté 1 17 copies 1. ) Stte the usul sufficient condition for the fixed-point itertion to converge when solving the eqution
More informationSupervisory Control (4CM30)
Supervisory Control (4CM30) Verifiction in mcrl2 Michel Reniers M.A.Reniers@tue.nl 2016-2017 Verifiction in mcrl2 M CIF = φ CIF iff M mcrl2 = φ mcrl2 1. Adpt CIF model 2. Formulte property in modl µ-clculus
More informationFormal Languages and Automata
Moile Computing nd Softwre Engineering p. 1/5 Forml Lnguges nd Automt Chpter 2 Finite Automt Chun-Ming Liu cmliu@csie.ntut.edu.tw Deprtment of Computer Science nd Informtion Engineering Ntionl Tipei University
More informationMath 61CM - Solutions to homework 9
Mth 61CM - Solutions to homework 9 Cédric De Groote November 30 th, 2018 Problem 1: Recll tht the left limit of function f t point c is defined s follows: lim f(x) = l x c if for ny > 0 there exists δ
More informationNUMERICAL INTEGRATION. The inverse process to differentiation in calculus is integration. Mathematically, integration is represented by.
NUMERICAL INTEGRATION 1 Introduction The inverse process to differentition in clculus is integrtion. Mthemticlly, integrtion is represented by f(x) dx which stnds for the integrl of the function f(x) with
More informationLecture 08: Feb. 08, 2019
4CS4-6:Theory of Computtion(Closure on Reg. Lngs., regex to NDFA, DFA to regex) Prof. K.R. Chowdhry Lecture 08: Fe. 08, 2019 : Professor of CS Disclimer: These notes hve not een sujected to the usul scrutiny
More informationNumerical Integration
Chpter 1 Numericl Integrtion Numericl differentition methods compute pproximtions to the derivtive of function from known vlues of the function. Numericl integrtion uses the sme informtion to compute numericl
More information5.7 Improper Integrals
458 pplictions of definite integrls 5.7 Improper Integrls In Section 5.4, we computed the work required to lift pylod of mss m from the surfce of moon of mss nd rdius R to height H bove the surfce of the
More informationP 3 (x) = f(0) + f (0)x + f (0) 2. x 2 + f (0) . In the problem set, you are asked to show, in general, the n th order term is a n = f (n) (0)
1 Tylor polynomils In Section 3.5, we discussed how to pproximte function f(x) round point in terms of its first derivtive f (x) evluted t, tht is using the liner pproximtion f() + f ()(x ). We clled this
More informationCS103B Handout 18 Winter 2007 February 28, 2007 Finite Automata
CS103B ndout 18 Winter 2007 Ferury 28, 2007 Finite Automt Initil text y Mggie Johnson. Introduction Severl childrens gmes fit the following description: Pieces re set up on plying ord; dice re thrown or
More informationProbabilistic Model Checking Michaelmas Term Dr. Dave Parker. Department of Computer Science University of Oxford
Probbilistic Model Checking Michelms Term 2011 Dr. Dve Prker Deprtment of Computer Science University of Oxford Long-run properties Lst lecture: regulr sfety properties e.g. messge filure never occurs
More informationImproper Integrals, and Differential Equations
Improper Integrls, nd Differentil Equtions October 22, 204 5.3 Improper Integrls Previously, we discussed how integrls correspond to res. More specificlly, we sid tht for function f(x), the region creted
More information1 Nondeterministic Finite Automata
1 Nondeterministic Finite Automt Suppose in life, whenever you hd choice, you could try oth possiilities nd live your life. At the end, you would go ck nd choose the one tht worked out the est. Then you
More informationRiemann is the Mann! (But Lebesgue may besgue to differ.)
Riemnn is the Mnn! (But Lebesgue my besgue to differ.) Leo Livshits My 2, 2008 1 For finite intervls in R We hve seen in clss tht every continuous function f : [, b] R hs the property tht for every ɛ >
More informationI1 = I2 I1 = I2 + I3 I1 + I2 = I3 + I4 I 3
2 The Prllel Circuit Electric Circuits: Figure 2- elow show ttery nd multiple resistors rrnged in prllel. Ech resistor receives portion of the current from the ttery sed on its resistnce. The split is
More informationCMDA 4604: Intermediate Topics in Mathematical Modeling Lecture 19: Interpolation and Quadrature
CMDA 4604: Intermedite Topics in Mthemticl Modeling Lecture 19: Interpoltion nd Qudrture In this lecture we mke brief diversion into the res of interpoltion nd qudrture. Given function f C[, b], we sy
More informationGlobal Types for Dynamic Checking of Protocol Conformance of Multi-Agent Systems
Globl Types for Dynmic Checking of Protocol Conformnce of Multi-Agent Systems (Extended Abstrct) Dvide Ancon, Mtteo Brbieri, nd Vivin Mscrdi DIBRIS, University of Genov, Itly emil: dvide@disi.unige.it,
More informationTheory of Computation Regular Languages
Theory of Computtion Regulr Lnguges Bow-Yw Wng Acdemi Sinic Spring 2012 Bow-Yw Wng (Acdemi Sinic) Regulr Lnguges Spring 2012 1 / 38 Schemtic of Finite Automt control 0 0 1 0 1 1 1 0 Figure: Schemtic of
More informationSemantic Reachability. Richard Mayr. Institut fur Informatik. Technische Universitat Munchen. Arcisstr. 21, D Munchen, Germany E. N. T. C. S.
URL: http://www.elsevier.nl/locte/entcs/volume6.html?? pges Semntic Rechbility Richrd Myr Institut fur Informtik Technische Universitt Munchen Arcisstr. 21, D-80290 Munchen, Germny e-mil: myrri@informtik.tu-muenchen.de
More informationMath 520 Final Exam Topic Outline Sections 1 3 (Xiao/Dumas/Liaw) Spring 2008
Mth 520 Finl Exm Topic Outline Sections 1 3 (Xio/Dums/Liw) Spring 2008 The finl exm will be held on Tuesdy, My 13, 2-5pm in 117 McMilln Wht will be covered The finl exm will cover the mteril from ll of
More information