Analyzing Real-Time Systems 1

Size: px
Start display at page:

Download "Analyzing Real-Time Systems 1"

Transcription

1 Anlyzing Rel-Time Systems 1 Jürgen Ruf nd Thoms Kropf Wilhelm-Schickrd-Institute University of Tübingen, Snd 13, 7076 Tübingen, Germny {ruf,kropf}@informtik.uni-tuebingen.de Abstrct Temporl logic model checking is technique for the utomtic verifiction of systems ginst specifictions. Besides the correctness of sfety nd liveness properties it is often importnt to determine criticl nswer nd dely times of systems, especilly if they re embedded in rel-time environment. In this pper we present n pproch which llows the verifiction s well s the timing nlysis of reltime systems. The systems re described s networks of communicting time-extended finite stte mchines (I/Ointervl structures). We use compct symbolic representtion to obtin efficient nlysis lgorithms This work is supported by the Germn Reserch Grnt (DFG project GRASP) 1. Introduction Forml verifiction hs become n importnt tsk in the design of softwre nd hrdwre. Especilly utomtic techniques like temporl logic model checking re used to support or even to replce stndrd test nd simultion methods. In the re of embedded rective systems, the verifiction of timing constrins plys n importnt role. E.g. miniml nd mximl rection times of controller hve to be gurnteed, setup nd hold times of flipflops hve to be kept or wit times of work pieces in puse sttions of production utomtion system should be minimized. One possibility to verify such timing properties is to use rel-time temporl logic model checker. In this cse, the designer hs to specify the timing properties with temporl logic formuls nd the system s stte trnsition grph. After the utomted verifiction process, the model checker nswers yes or no. This mens the system stisfies the specifiction or not, e.g. the rection time lies under certin time bound or not. But the designer obtins no sttement bout the ctul vlue of the rection time. Therefore Cmpos nd Clrke developed n nlysis tool (VERUS) which llows the verifiction of rel-time properties s well s the quntittive nlysis of rel-time systems [1]. This tool gets n description of system s synchronous progrm, the specifictions in temporl logic nd the nlysis queries. The system description is trnslted into ROBDDs [] representing the stte trnsition grph. The disdvntge of this pproch lies in the representtion of time. Since time progress is represented by counters, there exists for every time step seprte stte in the underlying grph. Especilly if mny counters with lrge vlues exist, the stte spce my explode. Other pproches for rel-time model checking use timed utomt [3, 4, 5]. Timed utomt llow very detiled description of rel-time systems through fixed number of clocks defined over dense time model. However, these pproches hve very complex model checking lgorithms (they re PSPACE-complete) nd there exist no nlysis lgorithms. In [10] we hve presented new formlism clled I/Ointervl structure. This formlism expnds finite stte mchines by timed stte trnsitions. We developed efficient model checking lgorithms bsed on representtion of these structures with extended chrcteristic functions [6]. These functions re implemented with MTBDDs [7,8]. In [9] we hve presented method for the composition of I/Ointervl structures completely working on the MTBDD representtion, including two minimiztion heuristics. This pproch llows the integrtion of untimed FSMs (e.g. controller) nd I/O-intervl structures (e.g. timed environment). In this pper we develop nlysis lgorithms working on the symbolic representtion of intervl structures nd which mke optiml use of this MTBDD-Bsed representtion. These lgorithms determine criticl times of specified systems, e.g. wit times of production systems, rection times of embedded systems or mximl dely times of communiction protocols. Together with the lredy developed verifiction lgorithms, we now hve powerful tool for the verifiction nd the nlysis of rel-time systems out of mny domins.

2 Section 1 introduces the rel-time model checking pproch which is the bsis of the nlysis lgorithms. First the modeling formlism (I/O-intervl structures) nd the specifiction logic (CCTL) re introduced. Afterwrds we present the symbolic representtion with extended chrcteristic functions. In Section 3 the different nlysis lgorithms re introduced. Section 4 describes some optimiztions ccelerting the nlysis lgorithms. Experimentl results re shown in Section 5. Section 6 concludes this pper.. Rel-time model checking.1. Intervl structures nd I/O-intervl structures Structures re stte-trnsition systems modeling HW- or SW-systems. The fundmentl structures re Kripke structures (unit-dely [1,3] structures, temporl structures) which my be derived from FSMs. The bsic models for reltime systems re intervl structures, i.e., stte trnsition systems with dditionl lbelled trnsitions. We ssume tht ech intervl structure hs exctly one time clock for mesuring time. The Fig..1. Exmple IS clock is reset to zero if stte is entered. A stte my be left if the ctul clock vlue corresponds to dely time lbelled t n outgoing trnsition. The stte must be left if the mximl dely time of ll outgoing trnsitions is reched (Fig..1). One clock tick is the lowest grnulrity for the time modeling. Definition.1. An intervl structure (IS) I is tuple I = ( PSTLI,,,, ) with set of tomic propositions P, set of sttes S (i-sttes), trnsition reltion between the sttes T S S such tht every stte in S hs successor stte, stte lbeling function L:S ( P) nd trnsition lbeling function I:T ( IN ) with IN = { 1, } nd is the potentil set opertor. Every stte of the IS must be left fter the mximl stte time. Definition.. The mximl stte time of stte s MxTime:S IN is the mximl dely time of ll outgoing trnsitions of s, i.e. MxTime()= s. mx{ t s'. ( ss', ) T t = mx( I( s, s' ))} (1) Besides the sttes, we lso hve to consider the currently elpsed time to determine the trnsition behvior of the system. Hence, the ctul stte of system, clled the generlized stte, is given by n i-stte s nd the ctul clock vlue v (the elpsed time). Definition.3. A generlized stte (g-stte) g = ( s, v) is n i-stte s S ssocited with clock vlue v IN 0 ( IN 0 = { 01,, }). The set of ll g-sttes in I = ( PSTLI,,,, ) is given by: G = {( s, v) s S 0 v < MxTime() s } () The semntics of ISs is represented by runs. Definition.4. Given the IS I = ( PSTLI,,,, ) nd strting g-stte g 0. A run is sequence of g-sttes r = ( g 0, g 1, ). For the g-sttes g j = ( s j, v j ) G of the sequence holds either g j + 1 = ( s j, v j + 1) with v j + 1 < MxTime( s j ) or g j + 1 = ( s j + 1, 0) with ( s j, s j + 1 ) T nd v j + 1 Is ( j, s j + 1 ). To expnd intervl structures by possibility for communiction, we extend them to I/O-intervl structures. These structures crry dditionl input lbels on ech trnsition. Such n input lbel is Boolen formul over the inputs. We interpret this formuls s input conditions which hve to hold during the corresponding trnsition times. Inputinsensitive edges crry the formul true. Definition.5. An I/O-intervl structure (I/O-IS) is tuple I I O = ( PP, I, S, T, L, I, I I ). The set of ll input vlutions is: Inp := ( P I ). The components PSL,, nd I re defined s in IS. P I is finite set of tomic input propositions. The trnsition reltion connects pirs of sttes nd the destintion inputs: T S S Inp. 1 I I : T ( Inp) is the trnsition input lbeling. The execution semntics of I/O-intervl structures re similr to intervl structures. The only difference lies in the input restrictions. A trnsition my only be tken if the corresponding input restriction holds until the dely time is reched nd the stte is left.. The logic CCTL CCTL [9] is temporl logic extending CTL with quntittive bounded temporl opertors. Two new temporl opertors re introduced to mke the specifiction of timed properties esier. The syntx of CCTL is shown in (3); where p P is n tomic proposition, IN nd b IN { } re time bounds. All intervl opertors cn lso be ccompnied by single time-bound only. In this cse the lower bound is set to zero by defult. If no intervl is specified, the lower bound is implicitly set to zero nd the upper bound is set to infinity. If the X-opertor hs no 1. In the most cses, the input vlutions of the trget sttes re irrelevnt [10].

3 time bound, it is implicitly set to one. The semntics of CCTL is given in [10]. p ϕ ϕ ϕ ϕ ϕ ϕ ϕ ϕ ϕ EX [ ] ϕ EF [ b, ] ϕ EG [ b, ] ϕ E( ϕ U [ b, ] ϕ) ϕ := E( ϕ C [ ] ϕ) E( ϕ S [ ] ϕ) AX [ ] ϕ AF [ b, ] ϕ AG [ b, ] ϕ A( ϕ U [ b, ] ϕ) A( ϕ C [ ] ϕ) A( ϕ S [ ] ϕ).3 Symbolic representtion of intervl structures In contrst to n explicit representtion, the symbolic representtion of FSMs uses chrcteristic functions. These functions mp sttes or trnsitions to true if they belong to the represented set. This representtion voids the explicit enumertion of sttes or trnsitions nd is therefore ble to represent sets of sttes with more thn 10 0 elements [11]. The representtion of g-sttes in IS need to store the elpsed time besides the ctul stte. Therefore we use extended chrcteristic functions (ECF, [1]) for symbolic representtion of IS. The following definition of ECFs is dpted to the representtion of IS. Definition.6. Given set of elements U (the universe, e.g. the set of sttes S) nd subset A U, where every element in A is ssocited with set of nturl numbers (the clock vlues, lso clled the ttribute set). An extended chrcteristic function representing A is given by: Λ A : U ( IN) with α if s A nd α IN Λ A ( s) 0 ssoc. with s := (4) otherwise I.e. we ccumulte ll clock vlues of g-sttes in the clock set which hve the sme i-stte. The stndrd set opertions like union or intersection my be extended to this kind of chrcteristic functions. ECFs my lso be used to represent the trnsition reltion. In this cse we mp pirs of sttes (the trnsition) to the vlid dely times. Also I/O-IS my be represented with ECFs..4 Model checking nd composition The min ide for the model checking lgorithm in [6] is to ssocite ech subformul of the specifiction with the set of g-sttes holding it. E.g. the formul "true" is ssocited with the set of ll g-sttes. The tomic proposition p P will be ssocited with the following g-stte set: { g g G s S. v IN 0.g = ( s, v) p L( s) } (5) The formul EXϕ will be ssocited with the set of predecessor g-sttes of the g-sttes ssocited with ϕ. Other temporl opertors my be computed by specil fixed point itertions bsed on the predecessor computtion. This com- (3) puttion my be split in two min opertions: the locl nd the globl predecessor computtion. The locl predecessor computtion tkes n ECF representing the ctul g-stte set nd decrements ll ttribute sets by one. A zero vlue will be removed: s.locl_ pre( Λ) ( s) = { v 1 v 1 v Λ( s) } (6) For set A of nturl numbers, we identify the set where ech vlue is decremented with: A 1. The globl predecessor computtion computes the predecessor of zero clocked g-sttes. This opertion works similr to the predecessor computtion of symbolic FSM trversl techniques. This opertion selects the g-sttes with zero clock vlues nd computes together with the trnsition reltion the predecessor g-sttes in predecessor i- sttes. This opertion is more complex thn the locl predecessor computtion. More detils my be found in [9]. The function pre is the union of the locl nd the globl predecessors. The result of this function is exctly the set of predecessors of given g-stte set. The function succ works similr nd computes the successor g-sttes. Model checking s described bove works exctly on one IS, but rel-life systems re usully described in modulr wy by mny intercting components. In order to mke model checking pplicble to networks of communicting components, it is necessry to compute the product structure of ll submodules. This product-computtion is clled composition. The composition is described in detil in [9]. The composition lgorithms re lso pplicble to networks of I/O-IS if we work with closed systems, where every free vrible is bounded by structure. After composition, the efficient model checking lgorithms for IS my be used for verifiction. These lgorithms re described in detil in [6]. Composition s well s the model checking lgorithms use the symbolic representtion of g-stte sets nd trnsition reltions with ECFs. 3. The nlysis lgorithms The nlysis technique should help designer to extrct importnt time bounds from his forml system description. An often rising problem is to compute the mximl stbility of signl. E.g. if we wnt to exmine switch circuit with dely times, it my be very importnt to determine the number of time steps, the out put signl stys stble high. This stbility nlysis is lso useful to compute the mximl number of time steps, work piece wits on buffer until it will be processed. Other typicl problems re miniml nd mximl dely times between events, e.g. how long does it miniml/mximl tke until the first work piece leves the production cell. In the following two subsections we present the nlysis lgorithms.

4 3.1 The STABLE lgorithm The nlysis lgorithms do lso use the trversl techniques (predecessor computtion) of the model checking lgorithms. The progrm 1 shows the implementtion of the STABLE-lgorithms in n impertive (C- or Pscllike) progrmming lnguge. 1 int stble(ecf f) ct := f 5 while (ct old ct ) do 6 old := ct 7 ct := pre(ct) ct 8 res := res if ct = then return res 10 else return Progrm 1. The STABLE lgorithm The lgorithm gets set of g-sttes to exmine (f). This set my be specified s CCTL formul nd my be computed by the model checking lgorithm (see Section.4). The lgorithm determines the mximl number of steps (res) such tht there exist run in which the first res g- sttes re members of the set represented by f but the g- stte t position res+1 is not member of f. The computtion of the lgorithms initilizes set of ctul g-sttes (ct) with the set of the g-sttes to exmine (f). Then it strts shrinking this set successively by intersecting it with its predecessors. If the set ct is empty, the mximl stbility is computed. If the lgorithm reches fixed point, i.e. ct=old, then there exist cycle in f. The figure 3.1 illustrtes the computtion of the STA- BLE lgorithm. The intervl structure to exmine is shown t the top. The lower prt displys the g-sttes nd the predecessor reltion (dotted rrows). The nlysis set is given by the CCTL formul AF [ ] which mens, tht on ll pths the signl must be rechble within two time steps. The grey ovl includes the ctul g-sttes (ct). The numbers on the left shows the ctul itertion (equl to res). 3. The MIN/MAX lgorithms The following two lgorithms compute the miniml resp. mximl number of unit time-steps between strt nd n im set of g-sttes. Cmpos nd Clrke introduced lgorithms bsed on n ROBDD representtion [13]. The ide of the lgorithm in progrm is to initilize set of g-sttes (ct) with the set of strt sttes nd then to expnd this set successively by its successors. The lgorithm counts the number of predecessor computtions while iterting (the dely time between g-stte nd its successor is exctly one time step). This procedure will be repeted until t lest one im stte is reched or the set AF [ ] 4 Fig Illustrtion of the STABLE-computtion. will not chnge nymore. In the ltter cse, there exist no pth from the strt sttes to the im sttes. 1 int min(ecf strt, im) ct := strt 5 while (ct old ct im = ) do 6 old := ct 7 ct := ct succ(ct) 8 res := res if ct im then return res 10 else return Progrm. The MIN lgorithm The lgorithm computing the mximl dely time is shown in progrm 3. It initilizes set with ll g-sttes except the the im set (ct). Then it shrinks this set by intersectin ct with its predecessors until no strt g-stte is left or fixed point is reched. In the ltter cse, there exists either no connection between the strt set nd the im set or there exist loop such tht the mximl dely time is infinite. 1 int min(ecf strt, im) ct := im 5 while (ct old ct im = )do 6 old := ct 7 ct := ct pre(ct) 8 res := res if ct=old then return 10 else return res Progrm 3. The MAX lgorithm 4. Time prediction nd time jumps As lredy mentioned in Section.4, the globl predecessor computtion is more expensive thn the locl predeces- 1

5 sor computtion. But on the other hnd, the set of globl predecessor g-sttes my sty constnt during some itertion steps. Upon this observtion, we present n optimiztion technique which computes globl predecessors only if they chnge. This technique (clled time prediction) ccelertes the nlysis lgorithms enormously. The ide is to predict the number of computtions for which the globl predecessors sty constnt. For this number of steps, the itertion will be performed loclly on the ttribute sets of the ECFs. We show this technique exemplrily for the STABLE lgorithm. The prediction exmines ll ttribute sets of the ctul stte set ( Λ A ) nd the globl predecessors ( Λ G ), computes the number of steps nd returns the minimum: predict( Λ A, Λ G ) := min s S l_ pred( Λ A ( s), Λ G ( s) ) (7) After the prediction is computed, the itertion of line 5 to 9 in progrm 1 my be performed loclly on the ttribute sets. Therefore we introduce locl itertion function (l_iter) which preforms this itertion on the ctul clock vlues ( A) nd the ctul globl predecessors ( G) of one stte: 1 set l_iter(set A, G, int n) res := A 4 i := 0 5 while i n res old do 6 old := res 7 res := res (res-1 G) 8 return res Progrm 4. Locl itertion function As lredy defined, the decrementtion in line 7 ffects ll vlues in the set. To pply this ttribute oriented function to n ECF, we pply it to every ttribute set: s. itertion( Λ A, Λ G, n) = l_iter( Λ A ( s), Λ G ( s), n) (8) With the knowledge of the locl itertion, we my define the locl prediction function. The function l_ pred receives two sets of nturl numbers, the ctul clock vlues ( A) nd the ctul globl predecessors ( G) of the exmined stte. The locl prediction hs to distinguishe two cses: l_ pred( A, G) n. { 0,, n} A n + 1 A := n + 1 if c G.c 0,, n (9) otherwise The only reson to recompute the globl predecessor is when zero clock vlue disppers. A new zero clock vlue my never pper. The zero clock vlue disppers fter n + 1 steps, when the vlues 0 to n re in the ctul g-stte nd the vlue n + 1 is not n ctul clock vlue. Moreover there my not exist vlue in G smller thn 1 int stble_predict(ecf f) ct := f 5 while (ct old ct ) do 6 old := ct 7 g := globl_pre(ct) 8 n := predict(ct,g) 9 ct := itertion(ct,g,n) 10 res := res + n 11 if ct = then return res 1 else return Progrm 5. Stble computtion with prediction n + 1 becuse this vlue supports the zero vlue. In this sitution every itertion step removes one element in A. The first step removes the vlue n, the second step removes the vlue n 1 nd so on. This mens fter n + 1 steps the zero clock vlue will be removed. In progrm 5 the complete lgorithm with time prediction is shown. An dditionl technique to ccelerte the lgorithms is clled time jump. This technique tries to improve the locl itertion. If we regrd the set of clock vlues in different itertion steps in figure 4.1, we relize, tht the ctul clock vlue set shrinks until it will be supported by vlue in G. itertion A G clock vlue Fig The behvior of the g-stte sets Therefore it is not necessry to perform every itertion step explicitly, we exploit this regulr behvior to execute in one complex opertion n itertion steps. Formlly we my define the time jump for the stbility nlysis through: jump( A, G, n) := v { v,, v+ n} A w v.w G { v,, w} A (10) This opertion is very implementtion dependent, therefore we will not show further detils. Figure Fig. 4. shows the computtion of figure 3.1with time prediction nd time jumps. On the right side of this figure, the result of the prediction for the next jump is shown. Becuse of the time prediction technique only globl itertion steps re necessry. 5. Experimentl results All presented lgorithms re implemented in our rel-time verifiction tool RAVEN. The ECFs re implemented by

6 0 1 Fig. 4.. Optimized STABLE-computtion multi terminl binry decision digrms (MTBDDs). We compred our implementtion with VERUS [1]. We modeled timed trnsitions in VERUS by loops which wit one time unit nd decrement counter. We compred only the min/mx lgorithms becuse VERUS do not support the stble query but on the other hnd VERUS offers two queries mincount nd mxcount which re ctully not supported by RAVEN. We hve chosen the sme vrible ordering for the signls. The exmined cse studies re the single pulser circuit enriched by timed gtes (SP), production cell (PC) nd the rbitrtion mechnism of the J1850 bus protocol. The first two systems re widely used to compre forml methods. Detils of the exmined systems my be found in [10]. For the single pulser we computed the miniml nd the mximl length of the output impulse. In the production cell we were interested in the miniml nd the mximl time when the first work piece leves the cell. In the J1850 exmple we checked the miniml nd the mximl dely time when node will leve the sending mode. The following tble compres the runtimes of both tools. For the VERUS run-times we tried vrious options nd choose the best results. For RAVEN we compred the time prediction (+t) nd the prediction together with the time jumps (+tj). The run-times in the tbel with nd without optimiztions seems to show, tht these techniques cuse only tiny speedup. But the run-times shown in the tble contin besides the nlyse times lso the composition times of the structures. In ll three exmples the composition consumes the mjor prt of the times (11.73 sec. for the single pulser, 000 seconds for the production cell nd 5 sec. for the J1850). If there will be more thn two nlysis (s computed in the exmples), thn the frction of composition time to nlyse time will shrink nd the the optimiztions will cuse lrger speedup. SP PC J1850 VERUS b RAVEN RAVEN +t RAVEN +tj VERUS terminted with n error: string tble overflow b. VERUS ws terminted due to memory consumption over 600MB predict = 6. Conclusion In this pper we presented new pproch for the nlysis of rel-time systems. This pproch works on the sme representtion s rel-time model checking. This llows the verifiction s well s nlysis. The systems re described by networks of communicting I/O-intervl structures. These structures include timed trnsitions nd the lbeling of these trnsitions with input restrictions. After the composition of the substructures, RAVEN performs the model checking nd the nlysis on the resulting intervl structure. Due to the symbolic representtion of the structures nd g-stte sets with extended chrcteristic functions, this pproch works very compct in the memory consumption. Especilly if long dely times re specified, the dvntges of this technique re obvious. By exploiting the loclly stored timing informtion (in the ttribute sets), techniques like time prediction nd time jumps ccelerte the model checking nd nlysis lgorithms. Bibliogrphy [1] S. Cmpos, E. Clrke, nd M. Mine. The verus tool: A quntittive pproch to the forml verifiction of rel-time systems. In CAV, LNCS. Springer Verlg, June [] R. Brynt. Grph-Bsed Algorithms for Boolen Function Mnipultion. IEEE Trnsctions on Computers, August [3] R. Alur, C. Courcoubetics, nd D. Dill. Model Checking for Rel- Time Systems. In LICS, Wshington, D.C., June IEEE CSP. [4] T. Henzinger, X. Nicollin, J. Sifkis, nd S. Yovine. Symbolic Model Checking for Rel-Time Systems. In LICS, Snt-Cruz, June 199. IEEE Computer Society Press. [5] M. Bozg, O. Mler, A. Pnueli, nd S. Yovine. Some progress in the symbolic verifiction of timed utomt. In CAV 97. Springer Verlg, June [6] J. Ruf nd T. Kropf. Symbolic model checking for discrete clocked temporl logic with intervls. In CHARME 97, Montrel, Cnd, Oct Chpmn nd Hll. [7] E. Clrke, K. McMillin, X. Zho, M. Fujit, nd J.-Y. Yng. Spectrl Trnsforms for lrge Boolen Functions with Appliction to Technologie Mpping. In DAC 93, Dlls, TX, June [8] R. Bhr, E. Frohm, C. Gon, G. Hchtel, E. Mcii, A. Prdo, nd F. Somenzi. Algebric Decision Digrms nd Their Applictions. In ICCAD, Snt Clr, CA, Nov ACM/IEEE, IEEE CSP. [9] J. Ruf nd T. Kropf. Using MTBDDs for composition nd model checking of rel-time systems. In FMCAD 1998, Plo Alto.Springer. [10] J. Ruf nd T. Kropf. Modeling nd Checking Networks of Rel- Time Systems. In CHARME 99, Bd Herrenlb, Germny. Springer Verlg, Septemper [11] J. Burch, E. Clrke, K. McMilln nd D. Dill. Symbolic Model Checking: 10 0 Sttes nd Beyond. In LICS, IEEE Computer Society press, June [1] J. Ruf nd T. Kropf. Using MTBDDs for discrete timed symbolic model checking. Multiple-Vlued Logic An Interntionl Journl, Gordon nd Brech publisher. [13] S. Cmpos, E. Clrke, W. Mrrero, M. Mine, nd H. Hirishi. Computing quntitive chrkteristics of finite-stte rel-time systems. Technicl Report, Pittsburgh, My 1994.

State space systems analysis (continued) Stability. A. Definitions A system is said to be Asymptotically Stable (AS) when it satisfies

State space systems analysis (continued) Stability. A. Definitions A system is said to be Asymptotically Stable (AS) when it satisfies Stte spce systems nlysis (continued) Stbility A. Definitions A system is sid to be Asymptoticlly Stble (AS) when it stisfies ut () = 0, t > 0 lim xt () 0. t A system is AS if nd only if the impulse response

More information

AUTOMATA AND LANGUAGES. Definition 1.5: Finite Automaton

AUTOMATA AND LANGUAGES. Definition 1.5: Finite Automaton 25. Finite Automt AUTOMATA AND LANGUAGES A system of computtion tht only hs finite numer of possile sttes cn e modeled using finite utomton A finite utomton is often illustrted s stte digrm d d d. d q

More information

19 Optimal behavior: Game theory

19 Optimal behavior: Game theory Intro. to Artificil Intelligence: Dle Schuurmns, Relu Ptrscu 1 19 Optiml behvior: Gme theory Adversril stte dynmics hve to ccount for worst cse Compute policy π : S A tht mximizes minimum rewrd Let S (,

More information

1.4 Nonregular Languages

1.4 Nonregular Languages 74 1.4 Nonregulr Lnguges The number of forml lnguges over ny lphbet (= decision/recognition problems) is uncountble On the other hnd, the number of regulr expressions (= strings) is countble Hence, ll

More information

Finite Automata. Informatics 2A: Lecture 3. John Longley. 22 September School of Informatics University of Edinburgh

Finite Automata. Informatics 2A: Lecture 3. John Longley. 22 September School of Informatics University of Edinburgh Lnguges nd Automt Finite Automt Informtics 2A: Lecture 3 John Longley School of Informtics University of Edinburgh jrl@inf.ed.c.uk 22 September 2017 1 / 30 Lnguges nd Automt 1 Lnguges nd Automt Wht is

More information

CS 275 Automata and Formal Language Theory

CS 275 Automata and Formal Language Theory CS 275 Automt nd Forml Lnguge Theory Course Notes Prt II: The Recognition Problem (II) Chpter II.6.: Push Down Automt Remrk: This mteril is no longer tught nd not directly exm relevnt Anton Setzer (Bsed

More information

Strong Bisimulation. Overview. References. Actions Labeled transition system Transition semantics Simulation Bisimulation

Strong Bisimulation. Overview. References. Actions Labeled transition system Transition semantics Simulation Bisimulation Strong Bisimultion Overview Actions Lbeled trnsition system Trnsition semntics Simultion Bisimultion References Robin Milner, Communiction nd Concurrency Robin Milner, Communicting nd Mobil Systems 32

More information

Concepts of Concurrent Computation Spring 2015 Lecture 9: Petri Nets

Concepts of Concurrent Computation Spring 2015 Lecture 9: Petri Nets Concepts of Concurrent Computtion Spring 205 Lecture 9: Petri Nets Sebstin Nnz Chris Poskitt Chir of Softwre Engineering Petri nets Petri nets re mthemticl models for describing systems with concurrency

More information

Acceptance Sampling by Attributes

Acceptance Sampling by Attributes Introduction Acceptnce Smpling by Attributes Acceptnce smpling is concerned with inspection nd decision mking regrding products. Three spects of smpling re importnt: o Involves rndom smpling of n entire

More information

Types of Finite Automata. CMSC 330: Organization of Programming Languages. Comparing DFAs and NFAs. Comparing DFAs and NFAs (cont.) Finite Automata 2

Types of Finite Automata. CMSC 330: Organization of Programming Languages. Comparing DFAs and NFAs. Comparing DFAs and NFAs (cont.) Finite Automata 2 CMSC 330: Orgniztion of Progrmming Lnguges Finite Automt 2 Types of Finite Automt Deterministic Finite Automt () Exctly one sequence of steps for ech string All exmples so fr Nondeterministic Finite Automt

More information

Designing finite automata II

Designing finite automata II Designing finite utomt II Prolem: Design DFA A such tht L(A) consists of ll strings of nd which re of length 3n, for n = 0, 1, 2, (1) Determine wht to rememer out the input string Assign stte to ech of

More information

CS 188: Artificial Intelligence Spring 2007

CS 188: Artificial Intelligence Spring 2007 CS 188: Artificil Intelligence Spring 2007 Lecture 3: Queue-Bsed Serch 1/23/2007 Srini Nrynn UC Berkeley Mny slides over the course dpted from Dn Klein, Sturt Russell or Andrew Moore Announcements Assignment

More information

Review of Calculus, cont d

Review of Calculus, cont d Jim Lmbers MAT 460 Fll Semester 2009-10 Lecture 3 Notes These notes correspond to Section 1.1 in the text. Review of Clculus, cont d Riemnn Sums nd the Definite Integrl There re mny cses in which some

More information

Types of Finite Automata. CMSC 330: Organization of Programming Languages. Comparing DFAs and NFAs. NFA for (a b)*abb.

Types of Finite Automata. CMSC 330: Organization of Programming Languages. Comparing DFAs and NFAs. NFA for (a b)*abb. CMSC 330: Orgniztion of Progrmming Lnguges Finite Automt 2 Types of Finite Automt Deterministic Finite Automt () Exctly one sequence of steps for ech string All exmples so fr Nondeterministic Finite Automt

More information

Convert the NFA into DFA

Convert the NFA into DFA Convert the NF into F For ech NF we cn find F ccepting the sme lnguge. The numer of sttes of the F could e exponentil in the numer of sttes of the NF, ut in prctice this worst cse occurs rrely. lgorithm:

More information

Finite Automata Theory and Formal Languages TMV027/DIT321 LP4 2018

Finite Automata Theory and Formal Languages TMV027/DIT321 LP4 2018 Finite Automt Theory nd Forml Lnguges TMV027/DIT321 LP4 2018 Lecture 10 An Bove April 23rd 2018 Recp: Regulr Lnguges We cn convert between FA nd RE; Hence both FA nd RE ccept/generte regulr lnguges; More

More information

THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS.

THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS. THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS RADON ROSBOROUGH https://intuitiveexplntionscom/picrd-lindelof-theorem/ This document is proof of the existence-uniqueness theorem

More information

CMSC 330: Organization of Programming Languages. DFAs, and NFAs, and Regexps (Oh my!)

CMSC 330: Organization of Programming Languages. DFAs, and NFAs, and Regexps (Oh my!) CMSC 330: Orgniztion of Progrmming Lnguges DFAs, nd NFAs, nd Regexps (Oh my!) CMSC330 Spring 2018 Types of Finite Automt Deterministic Finite Automt (DFA) Exctly one sequence of steps for ech string All

More information

Lecture 9: LTL and Büchi Automata

Lecture 9: LTL and Büchi Automata Lecture 9: LTL nd Büchi Automt 1 LTL Property Ptterns Quite often the requirements of system follow some simple ptterns. Sometimes we wnt to specify tht property should only hold in certin context, clled

More information

CMSC 330: Organization of Programming Languages

CMSC 330: Organization of Programming Languages CMSC 330: Orgniztion of Progrmming Lnguges Finite Automt 2 CMSC 330 1 Types of Finite Automt Deterministic Finite Automt (DFA) Exctly one sequence of steps for ech string All exmples so fr Nondeterministic

More information

CMPSCI 250: Introduction to Computation. Lecture #31: What DFA s Can and Can t Do David Mix Barrington 9 April 2014

CMPSCI 250: Introduction to Computation. Lecture #31: What DFA s Can and Can t Do David Mix Barrington 9 April 2014 CMPSCI 250: Introduction to Computtion Lecture #31: Wht DFA s Cn nd Cn t Do Dvid Mix Brrington 9 April 2014 Wht DFA s Cn nd Cn t Do Deterministic Finite Automt Forml Definition of DFA s Exmples of DFA

More information

Genetic Programming. Outline. Evolutionary Strategies. Evolutionary strategies Genetic programming Summary

Genetic Programming. Outline. Evolutionary Strategies. Evolutionary strategies Genetic programming Summary Outline Genetic Progrmming Evolutionry strtegies Genetic progrmming Summry Bsed on the mteril provided y Professor Michel Negnevitsky Evolutionry Strtegies An pproch simulting nturl evolution ws proposed

More information

CS 275 Automata and Formal Language Theory

CS 275 Automata and Formal Language Theory CS 275 Automt nd Forml Lnguge Theory Course Notes Prt II: The Recognition Problem (II) Chpter II.5.: Properties of Context Free Grmmrs (14) Anton Setzer (Bsed on book drft by J. V. Tucker nd K. Stephenson)

More information

Minimal DFA. minimal DFA for L starting from any other

Minimal DFA. minimal DFA for L starting from any other Miniml DFA Among the mny DFAs ccepting the sme regulr lnguge L, there is exctly one (up to renming of sttes) which hs the smllest possile numer of sttes. Moreover, it is possile to otin tht miniml DFA

More information

Nondeterminism and Nodeterministic Automata

Nondeterminism and Nodeterministic Automata Nondeterminism nd Nodeterministic Automt 61 Nondeterminism nd Nondeterministic Automt The computtionl mchine models tht we lerned in the clss re deterministic in the sense tht the next move is uniquely

More information

The Regulated and Riemann Integrals

The Regulated and Riemann Integrals Chpter 1 The Regulted nd Riemnn Integrls 1.1 Introduction We will consider severl different pproches to defining the definite integrl f(x) dx of function f(x). These definitions will ll ssign the sme vlue

More information

7.2 The Definite Integral

7.2 The Definite Integral 7.2 The Definite Integrl the definite integrl In the previous section, it ws found tht if function f is continuous nd nonnegtive, then the re under the grph of f on [, b] is given by F (b) F (), where

More information

CS 267: Automated Verification. Lecture 8: Automata Theoretic Model Checking. Instructor: Tevfik Bultan

CS 267: Automated Verification. Lecture 8: Automata Theoretic Model Checking. Instructor: Tevfik Bultan CS 267: Automted Verifiction Lecture 8: Automt Theoretic Model Checking Instructor: Tevfik Bultn LTL Properties Büchi utomt [Vrdi nd Wolper LICS 86] Büchi utomt: Finite stte utomt tht ccept infinite strings

More information

1.3 Regular Expressions

1.3 Regular Expressions 56 1.3 Regulr xpressions These hve n importnt role in describing ptterns in serching for strings in mny pplictions (e.g. wk, grep, Perl,...) All regulr expressions of lphbet re 1.Ønd re regulr expressions,

More information

Formal Methods in Software Engineering

Formal Methods in Software Engineering Forml Methods in Softwre Engineering Lecture 09 orgniztionl issues Prof. Dr. Joel Greenyer Decemer 9, 2014 Written Exm The written exm will tke plce on Mrch 4 th, 2015 The exm will tke 60 minutes nd strt

More information

Finite Automata. Informatics 2A: Lecture 3. Mary Cryan. 21 September School of Informatics University of Edinburgh

Finite Automata. Informatics 2A: Lecture 3. Mary Cryan. 21 September School of Informatics University of Edinburgh Finite Automt Informtics 2A: Lecture 3 Mry Cryn School of Informtics University of Edinburgh mcryn@inf.ed.c.uk 21 September 2018 1 / 30 Lnguges nd Automt Wht is lnguge? Finite utomt: recp Some forml definitions

More information

Intermediate Math Circles Wednesday, November 14, 2018 Finite Automata II. Nickolas Rollick a b b. a b 4

Intermediate Math Circles Wednesday, November 14, 2018 Finite Automata II. Nickolas Rollick a b b. a b 4 Intermedite Mth Circles Wednesdy, Novemer 14, 2018 Finite Automt II Nickols Rollick nrollick@uwterloo.c Regulr Lnguges Lst time, we were introduced to the ide of DFA (deterministic finite utomton), one

More information

p-adic Egyptian Fractions

p-adic Egyptian Fractions p-adic Egyptin Frctions Contents 1 Introduction 1 2 Trditionl Egyptin Frctions nd Greedy Algorithm 2 3 Set-up 3 4 p-greedy Algorithm 5 5 p-egyptin Trditionl 10 6 Conclusion 1 Introduction An Egyptin frction

More information

Anatomy of a Deterministic Finite Automaton. Deterministic Finite Automata. A machine so simple that you can understand it in less than one minute

Anatomy of a Deterministic Finite Automaton. Deterministic Finite Automata. A machine so simple that you can understand it in less than one minute Victor Admchik Dnny Sletor Gret Theoreticl Ides In Computer Science CS 5-25 Spring 2 Lecture 2 Mr 3, 2 Crnegie Mellon University Deterministic Finite Automt Finite Automt A mchine so simple tht you cn

More information

RELATIONAL MODEL.

RELATIONAL MODEL. RELATIONAL MODEL Structure of Reltionl Dtbses Reltionl Algebr Tuple Reltionl Clculus Domin Reltionl Clculus Extended Reltionl-Algebr- Opertions Modifiction of the Dtbse Views EXAMPLE OF A RELATION BASIC

More information

How to simulate Turing machines by invertible one-dimensional cellular automata

How to simulate Turing machines by invertible one-dimensional cellular automata How to simulte Turing mchines by invertible one-dimensionl cellulr utomt Jen-Christophe Dubcq Déprtement de Mthémtiques et d Informtique, École Normle Supérieure de Lyon, 46, llée d Itlie, 69364 Lyon Cedex

More information

Math 8 Winter 2015 Applications of Integration

Math 8 Winter 2015 Applications of Integration Mth 8 Winter 205 Applictions of Integrtion Here re few importnt pplictions of integrtion. The pplictions you my see on n exm in this course include only the Net Chnge Theorem (which is relly just the Fundmentl

More information

NFAs and Regular Expressions. NFA-ε, continued. Recall. Last class: Today: Fun:

NFAs and Regular Expressions. NFA-ε, continued. Recall. Last class: Today: Fun: CMPU 240 Lnguge Theory nd Computtion Spring 2019 NFAs nd Regulr Expressions Lst clss: Introduced nondeterministic finite utomt with -trnsitions Tody: Prove n NFA- is no more powerful thn n NFA Introduce

More information

Reinforcement learning II

Reinforcement learning II CS 1675 Introduction to Mchine Lerning Lecture 26 Reinforcement lerning II Milos Huskrecht milos@cs.pitt.edu 5329 Sennott Squre Reinforcement lerning Bsics: Input x Lerner Output Reinforcement r Critic

More information

Notes on specifying systems in EST

Notes on specifying systems in EST Robert Meolic, Ttjn Kpus: Notes on specifying systems in EST 1 Notes on specifying systems in EST Robert Meolic, Ttjn Kpus Fculty of EE & CS University of Mribor Robert Meolic, Ttjn Kpus: Notes on specifying

More information

New Expansion and Infinite Series

New Expansion and Infinite Series Interntionl Mthemticl Forum, Vol. 9, 204, no. 22, 06-073 HIKARI Ltd, www.m-hikri.com http://dx.doi.org/0.2988/imf.204.4502 New Expnsion nd Infinite Series Diyun Zhng College of Computer Nnjing University

More information

Properties of Integrals, Indefinite Integrals. Goals: Definition of the Definite Integral Integral Calculations using Antiderivatives

Properties of Integrals, Indefinite Integrals. Goals: Definition of the Definite Integral Integral Calculations using Antiderivatives Block #6: Properties of Integrls, Indefinite Integrls Gols: Definition of the Definite Integrl Integrl Clcultions using Antiderivtives Properties of Integrls The Indefinite Integrl 1 Riemnn Sums - 1 Riemnn

More information

New data structures to reduce data size and search time

New data structures to reduce data size and search time New dt structures to reduce dt size nd serch time Tsuneo Kuwbr Deprtment of Informtion Sciences, Fculty of Science, Kngw University, Hirtsuk-shi, Jpn FIT2018 1D-1, No2, pp1-4 Copyright (c)2018 by The Institute

More information

More on automata. Michael George. March 24 April 7, 2014

More on automata. Michael George. March 24 April 7, 2014 More on utomt Michel George Mrch 24 April 7, 2014 1 Automt constructions Now tht we hve forml model of mchine, it is useful to mke some generl constructions. 1.1 DFA Union / Product construction Suppose

More information

20 MATHEMATICS POLYNOMIALS

20 MATHEMATICS POLYNOMIALS 0 MATHEMATICS POLYNOMIALS.1 Introduction In Clss IX, you hve studied polynomils in one vrible nd their degrees. Recll tht if p(x) is polynomil in x, the highest power of x in p(x) is clled the degree of

More information

CS415 Compilers. Lexical Analysis and. These slides are based on slides copyrighted by Keith Cooper, Ken Kennedy & Linda Torczon at Rice University

CS415 Compilers. Lexical Analysis and. These slides are based on slides copyrighted by Keith Cooper, Ken Kennedy & Linda Torczon at Rice University CS415 Compilers Lexicl Anlysis nd These slides re sed on slides copyrighted y Keith Cooper, Ken Kennedy & Lind Torczon t Rice University First Progrmming Project Instruction Scheduling Project hs een posted

More information

Chapter Five: Nondeterministic Finite Automata. Formal Language, chapter 5, slide 1

Chapter Five: Nondeterministic Finite Automata. Formal Language, chapter 5, slide 1 Chpter Five: Nondeterministic Finite Automt Forml Lnguge, chpter 5, slide 1 1 A DFA hs exctly one trnsition from every stte on every symol in the lphet. By relxing this requirement we get relted ut more

More information

1 Online Learning and Regret Minimization

1 Online Learning and Regret Minimization 2.997 Decision-Mking in Lrge-Scle Systems My 10 MIT, Spring 2004 Hndout #29 Lecture Note 24 1 Online Lerning nd Regret Minimiztion In this lecture, we consider the problem of sequentil decision mking in

More information

Math 1B, lecture 4: Error bounds for numerical methods

Math 1B, lecture 4: Error bounds for numerical methods Mth B, lecture 4: Error bounds for numericl methods Nthn Pflueger 4 September 0 Introduction The five numericl methods descried in the previous lecture ll operte by the sme principle: they pproximte the

More information

Riemann Sums and Riemann Integrals

Riemann Sums and Riemann Integrals Riemnn Sums nd Riemnn Integrls Jmes K. Peterson Deprtment of Biologicl Sciences nd Deprtment of Mthemticl Sciences Clemson University August 26, 2013 Outline 1 Riemnn Sums 2 Riemnn Integrls 3 Properties

More information

KNOWLEDGE-BASED AGENTS INFERENCE

KNOWLEDGE-BASED AGENTS INFERENCE AGENTS THAT REASON LOGICALLY KNOWLEDGE-BASED AGENTS Two components: knowledge bse, nd n inference engine. Declrtive pproch to building n gent. We tell it wht it needs to know, nd It cn sk itself wht to

More information

Bisimulation. R.J. van Glabbeek

Bisimulation. R.J. van Glabbeek Bisimultion R.J. vn Glbbeek NICTA, Sydney, Austrli. School of Computer Science nd Engineering, The University of New South Wles, Sydney, Austrli. Computer Science Deprtment, Stnford University, CA 94305-9045,

More information

A Criterion on Existence and Uniqueness of Behavior in Electric Circuit

A Criterion on Existence and Uniqueness of Behavior in Electric Circuit Institute Institute of of Advnced Advnced Engineering Engineering nd nd Science Science Interntionl Journl of Electricl nd Computer Engineering (IJECE) Vol 6, No 4, August 2016, pp 1529 1533 ISSN: 2088-8708,

More information

Lecture 20: Numerical Integration III

Lecture 20: Numerical Integration III cs4: introduction to numericl nlysis /8/0 Lecture 0: Numericl Integrtion III Instructor: Professor Amos Ron Scribes: Mrk Cowlishw, Yunpeng Li, Nthnel Fillmore For the lst few lectures we hve discussed

More information

Math& 152 Section Integration by Parts

Math& 152 Section Integration by Parts Mth& 5 Section 7. - Integrtion by Prts Integrtion by prts is rule tht trnsforms the integrl of the product of two functions into other (idelly simpler) integrls. Recll from Clculus I tht given two differentible

More information

Software Engineering using Formal Methods

Software Engineering using Formal Methods Softwre Engineering using Forml Methods Propositionl nd (Liner) Temporl Logic Wolfgng Ahrendt 13th Septemer 2016 SEFM: Liner Temporl Logic /GU 160913 1 / 60 Recpitultion: FormlistionFormlistion: Syntx,

More information

Semantic reachability for simple process algebras. Richard Mayr. Abstract

Semantic reachability for simple process algebras. Richard Mayr. Abstract Semntic rechbility for simple process lgebrs Richrd Myr Abstrct This pper is n pproch to combine the rechbility problem with semntic notions like bisimultion equivlence. It dels with questions of the following

More information

Riemann Sums and Riemann Integrals

Riemann Sums and Riemann Integrals Riemnn Sums nd Riemnn Integrls Jmes K. Peterson Deprtment of Biologicl Sciences nd Deprtment of Mthemticl Sciences Clemson University August 26, 203 Outline Riemnn Sums Riemnn Integrls Properties Abstrct

More information

Uninformed Search Lecture 4

Uninformed Search Lecture 4 Lecture 4 Wht re common serch strtegies tht operte given only serch problem? How do they compre? 1 Agend A quick refresher DFS, BFS, ID-DFS, UCS Unifiction! 2 Serch Problem Formlism Defined vi the following

More information

Review of basic calculus

Review of basic calculus Review of bsic clculus This brief review reclls some of the most importnt concepts, definitions, nd theorems from bsic clculus. It is not intended to tech bsic clculus from scrtch. If ny of the items below

More information

Unit #9 : Definite Integral Properties; Fundamental Theorem of Calculus

Unit #9 : Definite Integral Properties; Fundamental Theorem of Calculus Unit #9 : Definite Integrl Properties; Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl

More information

CS375: Logic and Theory of Computing

CS375: Logic and Theory of Computing CS375: Logic nd Theory of Computing Fuhu (Frnk) Cheng Deprtment of Computer Science University of Kentucky 1 Tble of Contents: Week 1: Preliminries (set lgebr, reltions, functions) (red Chpters 1-4) Weeks

More information

Bernoulli Numbers Jeff Morton

Bernoulli Numbers Jeff Morton Bernoulli Numbers Jeff Morton. We re interested in the opertor e t k d k t k, which is to sy k tk. Applying this to some function f E to get e t f d k k tk d k f f + d k k tk dk f, we note tht since f

More information

Physics 116C Solution of inhomogeneous ordinary differential equations using Green s functions

Physics 116C Solution of inhomogeneous ordinary differential equations using Green s functions Physics 6C Solution of inhomogeneous ordinry differentil equtions using Green s functions Peter Young November 5, 29 Homogeneous Equtions We hve studied, especilly in long HW problem, second order liner

More information

Chapter 4 Contravariance, Covariance, and Spacetime Diagrams

Chapter 4 Contravariance, Covariance, and Spacetime Diagrams Chpter 4 Contrvrince, Covrince, nd Spcetime Digrms 4. The Components of Vector in Skewed Coordintes We hve seen in Chpter 3; figure 3.9, tht in order to show inertil motion tht is consistent with the Lorentz

More information

COMPUTER SCIENCE TRIPOS

COMPUTER SCIENCE TRIPOS CST.2011.2.1 COMPUTER SCIENCE TRIPOS Prt IA Tuesdy 7 June 2011 1.30 to 4.30 COMPUTER SCIENCE Pper 2 Answer one question from ech of Sections A, B nd C, nd two questions from Section D. Submit the nswers

More information

8 Laplace s Method and Local Limit Theorems

8 Laplace s Method and Local Limit Theorems 8 Lplce s Method nd Locl Limit Theorems 8. Fourier Anlysis in Higher DImensions Most of the theorems of Fourier nlysis tht we hve proved hve nturl generliztions to higher dimensions, nd these cn be proved

More information

Lecture 14: Quadrature

Lecture 14: Quadrature Lecture 14: Qudrture This lecture is concerned with the evlution of integrls fx)dx 1) over finite intervl [, b] The integrnd fx) is ssumed to be rel-vlues nd smooth The pproximtion of n integrl by numericl

More information

Advanced Calculus: MATH 410 Notes on Integrals and Integrability Professor David Levermore 17 October 2004

Advanced Calculus: MATH 410 Notes on Integrals and Integrability Professor David Levermore 17 October 2004 Advnced Clculus: MATH 410 Notes on Integrls nd Integrbility Professor Dvid Levermore 17 October 2004 1. Definite Integrls In this section we revisit the definite integrl tht you were introduced to when

More information

Chapter 0. What is the Lebesgue integral about?

Chapter 0. What is the Lebesgue integral about? Chpter 0. Wht is the Lebesgue integrl bout? The pln is to hve tutoril sheet ech week, most often on Fridy, (to be done during the clss) where you will try to get used to the ides introduced in the previous

More information

Global Session Types for Dynamic Checking of Protocol Conformance of Multi-Agent Systems

Global Session Types for Dynamic Checking of Protocol Conformance of Multi-Agent Systems Globl Session Types for Dynmic Checking of Protocol Conformnce of Multi-Agent Systems (Extended Abstrct) Dvide Ancon, Mtteo Brbieri, nd Vivin Mscrdi DIBRIS, University of Genov, Itly emil: dvide@disi.unige.it,

More information

Foundations for Timed Systems

Foundations for Timed Systems Foundtions for Timed Systems Ptrici Bouyer LSV CNRS UMR 8643 & ENS de Cchn 6, venue du Président Wilson 9423 Cchn Frnce emil: bouyer@lsv.ens-cchn.fr Introduction Explicit timing constrints re nturlly present

More information

Duality # Second iteration for HW problem. Recall our LP example problem we have been working on, in equality form, is given below.

Duality # Second iteration for HW problem. Recall our LP example problem we have been working on, in equality form, is given below. Dulity #. Second itertion for HW problem Recll our LP emple problem we hve been working on, in equlity form, is given below.,,,, 8 m F which, when written in slightly different form, is 8 F Recll tht we

More information

UNIFORM CONVERGENCE. Contents 1. Uniform Convergence 1 2. Properties of uniform convergence 3

UNIFORM CONVERGENCE. Contents 1. Uniform Convergence 1 2. Properties of uniform convergence 3 UNIFORM CONVERGENCE Contents 1. Uniform Convergence 1 2. Properties of uniform convergence 3 Suppose f n : Ω R or f n : Ω C is sequence of rel or complex functions, nd f n f s n in some sense. Furthermore,

More information

Where did dynamic programming come from?

Where did dynamic programming come from? Where did dynmic progrmming come from? String lgorithms Dvid Kuchk cs302 Spring 2012 Richrd ellmn On the irth of Dynmic Progrmming Sturt Dreyfus http://www.eng.tu.c.il/~mi/cd/ or50/1526-5463-2002-50-01-0048.pdf

More information

NFA DFA Example 3 CMSC 330: Organization of Programming Languages. Equivalence of DFAs and NFAs. Equivalence of DFAs and NFAs (cont.

NFA DFA Example 3 CMSC 330: Organization of Programming Languages. Equivalence of DFAs and NFAs. Equivalence of DFAs and NFAs (cont. NFA DFA Exmple 3 CMSC 330: Orgniztion of Progrmming Lnguges NFA {B,D,E {A,E {C,D {E Finite Automt, con't. R = { {A,E, {B,D,E, {C,D, {E 2 Equivlence of DFAs nd NFAs Any string from {A to either {D or {CD

More information

Week 10: Line Integrals

Week 10: Line Integrals Week 10: Line Integrls Introduction In this finl week we return to prmetrised curves nd consider integrtion long such curves. We lredy sw this in Week 2 when we integrted long curve to find its length.

More information

1.9 C 2 inner variations

1.9 C 2 inner variations 46 CHAPTER 1. INDIRECT METHODS 1.9 C 2 inner vritions So fr, we hve restricted ttention to liner vritions. These re vritions of the form vx; ǫ = ux + ǫφx where φ is in some liner perturbtion clss P, for

More information

Goals: Determine how to calculate the area described by a function. Define the definite integral. Explore the relationship between the definite

Goals: Determine how to calculate the area described by a function. Define the definite integral. Explore the relationship between the definite Unit #8 : The Integrl Gols: Determine how to clculte the re described by function. Define the definite integrl. Eplore the reltionship between the definite integrl nd re. Eplore wys to estimte the definite

More information

Theory of Computation Regular Languages. (NTU EE) Regular Languages Fall / 38

Theory of Computation Regular Languages. (NTU EE) Regular Languages Fall / 38 Theory of Computtion Regulr Lnguges (NTU EE) Regulr Lnguges Fll 2017 1 / 38 Schemtic of Finite Automt control 0 0 1 0 1 1 1 0 Figure: Schemtic of Finite Automt A finite utomton hs finite set of control

More information

Exam 2, Mathematics 4701, Section ETY6 6:05 pm 7:40 pm, March 31, 2016, IH-1105 Instructor: Attila Máté 1

Exam 2, Mathematics 4701, Section ETY6 6:05 pm 7:40 pm, March 31, 2016, IH-1105 Instructor: Attila Máté 1 Exm, Mthemtics 471, Section ETY6 6:5 pm 7:4 pm, Mrch 1, 16, IH-115 Instructor: Attil Máté 1 17 copies 1. ) Stte the usul sufficient condition for the fixed-point itertion to converge when solving the eqution

More information

Supervisory Control (4CM30)

Supervisory Control (4CM30) Supervisory Control (4CM30) Verifiction in mcrl2 Michel Reniers M.A.Reniers@tue.nl 2016-2017 Verifiction in mcrl2 M CIF = φ CIF iff M mcrl2 = φ mcrl2 1. Adpt CIF model 2. Formulte property in modl µ-clculus

More information

Formal Languages and Automata

Formal Languages and Automata Moile Computing nd Softwre Engineering p. 1/5 Forml Lnguges nd Automt Chpter 2 Finite Automt Chun-Ming Liu cmliu@csie.ntut.edu.tw Deprtment of Computer Science nd Informtion Engineering Ntionl Tipei University

More information

Math 61CM - Solutions to homework 9

Math 61CM - Solutions to homework 9 Mth 61CM - Solutions to homework 9 Cédric De Groote November 30 th, 2018 Problem 1: Recll tht the left limit of function f t point c is defined s follows: lim f(x) = l x c if for ny > 0 there exists δ

More information

NUMERICAL INTEGRATION. The inverse process to differentiation in calculus is integration. Mathematically, integration is represented by.

NUMERICAL INTEGRATION. The inverse process to differentiation in calculus is integration. Mathematically, integration is represented by. NUMERICAL INTEGRATION 1 Introduction The inverse process to differentition in clculus is integrtion. Mthemticlly, integrtion is represented by f(x) dx which stnds for the integrl of the function f(x) with

More information

Lecture 08: Feb. 08, 2019

Lecture 08: Feb. 08, 2019 4CS4-6:Theory of Computtion(Closure on Reg. Lngs., regex to NDFA, DFA to regex) Prof. K.R. Chowdhry Lecture 08: Fe. 08, 2019 : Professor of CS Disclimer: These notes hve not een sujected to the usul scrutiny

More information

Numerical Integration

Numerical Integration Chpter 1 Numericl Integrtion Numericl differentition methods compute pproximtions to the derivtive of function from known vlues of the function. Numericl integrtion uses the sme informtion to compute numericl

More information

5.7 Improper Integrals

5.7 Improper Integrals 458 pplictions of definite integrls 5.7 Improper Integrls In Section 5.4, we computed the work required to lift pylod of mss m from the surfce of moon of mss nd rdius R to height H bove the surfce of the

More information

P 3 (x) = f(0) + f (0)x + f (0) 2. x 2 + f (0) . In the problem set, you are asked to show, in general, the n th order term is a n = f (n) (0)

P 3 (x) = f(0) + f (0)x + f (0) 2. x 2 + f (0) . In the problem set, you are asked to show, in general, the n th order term is a n = f (n) (0) 1 Tylor polynomils In Section 3.5, we discussed how to pproximte function f(x) round point in terms of its first derivtive f (x) evluted t, tht is using the liner pproximtion f() + f ()(x ). We clled this

More information

CS103B Handout 18 Winter 2007 February 28, 2007 Finite Automata

CS103B Handout 18 Winter 2007 February 28, 2007 Finite Automata CS103B ndout 18 Winter 2007 Ferury 28, 2007 Finite Automt Initil text y Mggie Johnson. Introduction Severl childrens gmes fit the following description: Pieces re set up on plying ord; dice re thrown or

More information

Probabilistic Model Checking Michaelmas Term Dr. Dave Parker. Department of Computer Science University of Oxford

Probabilistic Model Checking Michaelmas Term Dr. Dave Parker. Department of Computer Science University of Oxford Probbilistic Model Checking Michelms Term 2011 Dr. Dve Prker Deprtment of Computer Science University of Oxford Long-run properties Lst lecture: regulr sfety properties e.g. messge filure never occurs

More information

Improper Integrals, and Differential Equations

Improper Integrals, and Differential Equations Improper Integrls, nd Differentil Equtions October 22, 204 5.3 Improper Integrls Previously, we discussed how integrls correspond to res. More specificlly, we sid tht for function f(x), the region creted

More information

1 Nondeterministic Finite Automata

1 Nondeterministic Finite Automata 1 Nondeterministic Finite Automt Suppose in life, whenever you hd choice, you could try oth possiilities nd live your life. At the end, you would go ck nd choose the one tht worked out the est. Then you

More information

Riemann is the Mann! (But Lebesgue may besgue to differ.)

Riemann is the Mann! (But Lebesgue may besgue to differ.) Riemnn is the Mnn! (But Lebesgue my besgue to differ.) Leo Livshits My 2, 2008 1 For finite intervls in R We hve seen in clss tht every continuous function f : [, b] R hs the property tht for every ɛ >

More information

I1 = I2 I1 = I2 + I3 I1 + I2 = I3 + I4 I 3

I1 = I2 I1 = I2 + I3 I1 + I2 = I3 + I4 I 3 2 The Prllel Circuit Electric Circuits: Figure 2- elow show ttery nd multiple resistors rrnged in prllel. Ech resistor receives portion of the current from the ttery sed on its resistnce. The split is

More information

CMDA 4604: Intermediate Topics in Mathematical Modeling Lecture 19: Interpolation and Quadrature

CMDA 4604: Intermediate Topics in Mathematical Modeling Lecture 19: Interpolation and Quadrature CMDA 4604: Intermedite Topics in Mthemticl Modeling Lecture 19: Interpoltion nd Qudrture In this lecture we mke brief diversion into the res of interpoltion nd qudrture. Given function f C[, b], we sy

More information

Global Types for Dynamic Checking of Protocol Conformance of Multi-Agent Systems

Global Types for Dynamic Checking of Protocol Conformance of Multi-Agent Systems Globl Types for Dynmic Checking of Protocol Conformnce of Multi-Agent Systems (Extended Abstrct) Dvide Ancon, Mtteo Brbieri, nd Vivin Mscrdi DIBRIS, University of Genov, Itly emil: dvide@disi.unige.it,

More information

Theory of Computation Regular Languages

Theory of Computation Regular Languages Theory of Computtion Regulr Lnguges Bow-Yw Wng Acdemi Sinic Spring 2012 Bow-Yw Wng (Acdemi Sinic) Regulr Lnguges Spring 2012 1 / 38 Schemtic of Finite Automt control 0 0 1 0 1 1 1 0 Figure: Schemtic of

More information

Semantic Reachability. Richard Mayr. Institut fur Informatik. Technische Universitat Munchen. Arcisstr. 21, D Munchen, Germany E. N. T. C. S.

Semantic Reachability. Richard Mayr. Institut fur Informatik. Technische Universitat Munchen. Arcisstr. 21, D Munchen, Germany E. N. T. C. S. URL: http://www.elsevier.nl/locte/entcs/volume6.html?? pges Semntic Rechbility Richrd Myr Institut fur Informtik Technische Universitt Munchen Arcisstr. 21, D-80290 Munchen, Germny e-mil: myrri@informtik.tu-muenchen.de

More information

Math 520 Final Exam Topic Outline Sections 1 3 (Xiao/Dumas/Liaw) Spring 2008

Math 520 Final Exam Topic Outline Sections 1 3 (Xiao/Dumas/Liaw) Spring 2008 Mth 520 Finl Exm Topic Outline Sections 1 3 (Xio/Dums/Liw) Spring 2008 The finl exm will be held on Tuesdy, My 13, 2-5pm in 117 McMilln Wht will be covered The finl exm will cover the mteril from ll of

More information