Boolean Affine Approximation with Binary Decision Diagrams

Size: px
Start display at page:

Download "Boolean Affine Approximation with Binary Decision Diagrams"

Transcription

1 Boolean Affine Approimation ith Binar Decision Diagrams Kein Henshall Peter Schachte Harald Søndergaard Leigh Whiting Department of Computer Science and Softare Engineering The Uniersit of Melbourne, Vic 3010, Australia Abstract Selman and Kaut s ork on knoledge compilation has established ho approimation (strengthening and/or eakening) of a propositional knoledgebase can be used to speed up quer processing, at the epense of completeness In the classical approach, the knoledge-base is assumed to be presented as a propositional formula in conjunctie normal form (CNF), and Horn functions are used to oerand under-approimate it (in the hope that man queries can be ansered efficientl using the approimations onl) Hoeer, other representations are possible, and functions other than Horn can be used for approimations, as long as the hae deductioncomputational properties similar to those of the Horn functions Zanuttini has suggested that the class of affine Boolean functions ould be especiall useful in knoledge compilation and has presented arious affine approimation algorithms Since CNF is akard for presenting affine functions, Zanuttini considers both a sets-of-models representation and the use of modulo 2 congruence equations Here e consider the use of reduced ordered binar decision diagrams (ROBDDs), a representation hich is more compact than the sets of models and hich (unlike modulo 2 congruences) can epress an source knoledge-base We present an ROBDD algorithm to find strongest affine upper-approimations of a Boolean function and e argue its correctness 1 Introduction A recurrent theme in artificial intelligence is the efficient use of (propositional) knoledge-bases A promising approach, hich as initiall proposed b Selman & Kaut (1996), is to quer (and perform deductions from) upper and loer approimations of the gien knoledge-base B choosing approimations that allo more efficient inference, it is often possible to quickl determine that some logical consequence of the knoledge-base entails the quer, and therefore so does the original knoledge-base, aoiding the costl inference from the original When this fails, it ma be possible to quickl sho that the quer is not entailed b some implicant, and therefore not entailed b the full knoledge-base Onl hen both of these fail must the full knoledge-base be used for inference This approach to deduction is particularl Copright c 2009, Australian Computer Societ, Inc This paper appeared at the Fifteenth Computing: The Australasian Theor Smposium (CATS 2009), Wellington, Ne Zealand Conferences in Research and Practice in Information Technolog, Vol 94 Rod Done and Prabhu Manem, Ed Reproduction for academic, not-for profit purposes permitted proided this tet is included attractie if the knoledge-base is relatiel stable (that is, man queries are handled beteen each time the knoledge-base changes), because in that case, the amortised cost of calculating the approimations is small It is usuall assumed that Boolean functions are represented in clausal form, and that approimations are Horn (Selman & Kaut 1996, del Val 2005) The reason is that inference from Horn knoledge-bases ma be eponentiall more efficient than from unrestricted knoledge-bases Hoeer, it has been noted that there are man other ell-understood classes that hae computational properties that include some of the attractie properties of the Horn class Zanuttini (2002a, 2002b) discusses the use of other classes of Boolean functions for approimation and points out that affine approimations hae certain adantages oer Horn approimations, most notabl the fact that the do not blo out in sie This is certainl the case hen affine functions are represented in the form of modulo-2 congruence equations The more general sets-of-models representation is also considered b Zanuttini In this paper, e consider a third, general, representation, namel reduced ordered binar decision diagrams (ROBDDs) We proe some important properties of affine functions and their ROBDD representation Utilising these properties e design a ne ROBDD algorithm for deriing strongest affine consequences (also knon as affine enelopes) Schachte and Søndergaard (2006, 2007) hae preiousl gien ROBDD algorithms for finding monotone, Krom, and Horn enelopes, but also noticed that hile those algorithms could be epressed as instances of a common scheme, the same scheme did not appl to affine functions A different, less compositional, approach is needed in this case The rest of this paper proceeds as follos In Section 2 e recapitulate the definition of the Boolean affine class, and e establish some of its important properties We also briefl introduce ROBDDs, but mainl to fi our notation, as e assume that the reader is familiar ith Boolean functions and their representation as decision diagrams Section 3 recalls the model-based affine enelope algorithm, and deelops an ROBDD-based algorithm, hose correctness rests on results established in Section 22 Section 4 describes our testing methodolog, including our algorithm for generating random ROBDDs, and presents our results Section 5 discusses related ork and applications, and concludes 2 Propositional Classes, Approimation and ROBDDs We use ROBDDs (Brace, Rudell & Brant 1990, Brant 1986) to represent Boolean functions

2 Horiama & Ibaraki (2002) hae recommended ROBDDs as suitable for implementing knoledge bases Our choice of ROBDDs as a data structure is due to the fact that it offers a canonical representation for an Boolean function a representation that is highl suitable for inductie reasoning Zanuttini (2002a) suggests using modulo 2 congruence equations to represent affine Boolean functions, and proes a polnomial compleit bound for computing affine enelopes in this representation Hoeer, using a specialised representation has a cost in implementation compleit here affine and non-affine Boolean functions must be used together For eample, the algorithm for ealuating hether one ROBDD entails another is er straightforard, hereas ealuating hether a set of congruence equations entails a Boolean function in some other representation ould be more complicated Similarl, sstems hich repeatedl construct an affine approimation, manipulate it as a general Boolean function, and then approimate the result again, hae much simpler implementations ith a single uniersal representation than ith a specialised affine representation plus a uniersal representation For our purposes, computing enelopes as ROBDDs permits us to use the same representation for approimation to man different Boolean classes Additionall, ROBDD-based inference is fast, and in particular, checking hether a aluation is a model, or finding a model, of an n- place function gien b an ROBDD requires a path traersal of length no more than n 21 Boolean functions Let B = {0,1} and let V be a denumerable set of ariables A aluation µ : V B is a (total) assignment of truth alues to the ariables in V Let I = V B denote the set of V-aluations A partial aluation µ : V B { } assigns truth alues to some ariables in V, and to others Let I p = V B { } We use the notation µ[ i], here V and i B, to denote the aluation µ updated to map to i, that is, { i if = µ[ i]() = µ() otherise A Boolean function oer V is a function ϕ : I B We let B denote the set of all Boolean functions oer V The ordering on B is the usual: iff = 0 = 1 B is ordered pointise, so that the ordering relation corresponds eactl to classical entailment, = It is conenient to oerload the smbols for truth and falsehood Thus e let 1 denote the largest element of B (that is, λµ1) as ell as of B Similarl 0 denotes the smallest element of B (that is, λµ0) as ell as of B A aluation µ is a model for ϕ, denoted µ = ϕ, if ϕ(µ) = 1 We let models(ϕ) denote the set of models of ϕ Conersel, the unique Boolean function that has eactl the set M as models is denoted fn(m) A Boolean function ϕ is said to be independent of a ariable hen for all aluations µ, µ[ 0] = ϕ iff µ[ 1] = ϕ Eistential quantification is defined as follos Let ϕ be a Boolean function and M = models(ϕ), then (ϕ) = fn({µ[ 0] µ M} {µ[ 1] µ M}) and uniersal quantification can be defined duall (e ill not need it here) Clearl (ϕ) is independent of In the contet of an ordered set of n ariables of interest, 1,, n, e ma identif ith µ the binar sequence bits(µ) of length n: µ( 1 ),, µ( n ) hich e ill rite simpl as a bit-string of length n Similarl e ma think of, and rite, the set of aluations M as a set of bit-strings: bits(m) = {bits(µ) µ M} As it could hardl create confusion, e shall present aluations ariousl as functions or bitstrings We denote the ero aluation, hich maps i to 0 for all 1 i n, b 0 We use the Boolean connecties (negation), (conjunction), (disjunction) and + (eclusie or, or or ) These connecties operate on Boolean functions, that is, on elements of B Traditionall the are oerloaded to also operate on truth alues, that is, elements of B Hoeer, e deiate at this point, as the distinction beteen or and its bit-ise analogue ill be critical in hat follos Hence e denote the B (bit) ersion b We etend this to aluations and bit-strings in the natural a: (µ 1 µ 2 )() = µ 1 () µ 2 () and e let 3 denote the or of three operation λµ 1 µ 2 µ 3 µ 1 µ 2 µ 3 We follo Zanuttini (2002a) in further oerloading and using the notation M µ = µ M = {µ µ µ M} We read M µ as M translated b µ Note that for an set M, the function λµm µ is an inolution: (M µ ) µ = M A final oerloading results in the folloing definition For ϕ B, and µ I, let ϕ µ = fn(m µ ) here M = models(ϕ) The distributed ersion of is defined b {ϕ1, ϕ n } = ϕ 1 ϕ n 22 The affine class An affine function is one hose set of models is closed under pointise application of 3 (Schaefer 1978) Affine functions hae a number of attractie properties, as e shall see Sntacticall, a Boolean function is affine iff it can be ritten as a conjunction of affine equations c c c n n = c 0 here c i {0, 1} for all i {0,, n} 1 This is ell knon, but for completeness e proe it belo, as Proposition 22 The affine class contains 1 and is closed under conjunction Hence the concept of a unique best affine upper-approimation is ell defined, and the function that takes a Boolean function and returns its best affine upper-approimation is an upper closure operator (Ward 1942, Ore 1943) For conenience, let us introduce a name for this operator: Definition 21 Let ϕ be a Boolean function The affine enelope, aff(ϕ), of ϕ is defined: aff(ϕ) = {ψ ϕ = ψ and ψ is affine} 1 In some circles, such as the crptograph/coding communit, the term affine is used onl for a function that is 0 or 1, or can be ritten c c c n n + c 0 (the latter is hat Post (1941) called an alternating function) The resulting set of affine functions is not closed under conjunction

3 There are numerous other classes of interest, including isotone, antitone, Krom, Horn, contra-dual Horn, k-horn (Dechter & Pearl 1992), and k-quasi-horn functions, for hich the concept of an enelope is elldefined, as each class is closed under conjunction 2 Zanuttini (2002a) eploits the close connection beteen ector spaces and the sets of models of affine functions A set S B k of bitstrings is a ector space iff 0 S and S is closed under The net proposition suggests ho one can simplif the task of doing model-closure under 3 Proposition 21 (Zanuttini 2002a) Gien a nonempt set of models M and a aluation µ M, M is closed under 3 iff M µ is a ector space Proof: Let µ be an arbitrar element of M Clearl M µ contains 0, so the right-hand side of the claim amounts to M µ being closed under For the if direction, assume M µ is closed under and consider µ 1, µ 2, µ 3 M Since µ µ 2 and µ µ 3 are in M µ, so is µ 2 µ 3 And since furthermore µ µ 1 is in M µ, so is µ µ 1 µ 2 µ 3 Hence µ 1 µ 2 µ 3 is in M For the onl if direction, assume M is closed under 3, and consider µ 1, µ 2 M µ All of µ, µ µ 1 and µ µ 2 are in M, and so µ (µ µ 1 ) (µ µ 2 ) = µ µ 1 µ 2 M Hence µ 1 µ 2 M µ Proposition 22 A Boolean function is affine iff it can be ritten as a conjunction of equations c c c n n = c 0 here c i {0, 1} for all i {0,, n} Proof: Assume the Boolean function ϕ is gien as a conjunction of equations of the indicated form and let µ 1, µ 2 and µ 3 be models That is, for each equation e hae c 1 µ 1 ( 1 ) + c 2 µ 1 ( 2 ) + + c n µ 1 ( n ) = c 0 c 1 µ 2 ( 1 ) + c 2 µ 2 ( 2 ) + + c n µ 2 ( n ) = c 0 c 1 µ 3 ( 1 ) + c 2 µ 3 ( 2 ) + + c n µ 3 ( n ) = c 0 Adding left-hand sides and adding right-hand sides, making use of the fact that distributes oer +, e get c 1 µ( 1 ) + c 2 µ( 2 ) + + c n µ( n ) = c 0 + c 0 + c 0 = c 0 here µ = µ 1 µ 2 µ 3 As µ thus satisfies each equation, µ is a model of ϕ This establishes the if direction For the onl if part, note that b Proposition 21, e obtain a ector space M µ from an non-empt set M closed under 3 b translating each element of M b µ M No form a basis B for M µ b taking one non- 0 ector at a time from M µ and adding it to the set of basis ectors collected so far iff it is linearl independent of that set Let j = n B (note that 0 j n) B can be etended to a basis for B n b bringing B (read as a B n matri) into echelon form and adding j ectors V = { 1,, j } (these 2 Other classes that are commonl considered in AI are not closed under conjunction and therefore do not hae ell-defined concepts of (unique) enelopes Eamples are the unate functions (a unate function is one that can be turned into an isotone function b sstematic negation of ero or more ariables) and the renamable Horn functions (a renamable Horn function is similarl one that can be turned into a Horn function b sstematic negation of ero or more ariables) For eample, and both are unate, hile is not, so the unate enelope of the latter is not ell-defined can be chosen from the natural basis for B n ) From B and V e can compute a set of j linear equations a 11 1 a 1n n = 0 a 21 1 a 2n n = 0 a j1 1 a jn n = 0 (1) that hae eactl M µ as their set of models For each i {1,,j}, the coefficients a i = (a i1,,a in ) are uniquel determined b the set of n equations a i i = 1 a i k = 0 1 k j, k i a i b = 0 b B This construction guarantees that = ( 1,, n ) satisfies the conjunction of equations (1) iff is in the span of B (that is, in M µ ) Each function is linear, so for ν M µ, f i = λ a i f i (ν µ) = f i (ν) + f i (µ) = f i (µ) Hence M can be described b the set of j affine equations as desired a 11 1 a 1n n = f 1 (µ) a 21 1 a 2n n = f 2 (µ) a j1 1 a jn n = f j (µ) Eample 21 In B 4, the set of models M = {0100, 0111, 1001, 1010} is closed under 3 and so determines an affine function Choosing µ = 0100 as translation, e hae M µ = {0000, 0011, 1101, 1110} One basis for M µ is {0011, 1101}, hich can be etended to a basis for B 4 b adding V = {0100, 0001} Hence M µ can be described b the conjunction a 11 1 a 14 4 = 0 a 21 1 a 24 4 = 0 here the coefficients are determined b soling a a a = a a 21 a 22 a 23 a 24 = In other ords, M µ is described b 1 2 = = In the case of ( 1, 2, 3, 4 ) = µ = (0, 1, 0, 0), the left-hand sides ealuate to 1 and 0, respectiel Hence M is described b 1 2 = = 0

4 Zanuttini (2002a) shos that the compleit of generating the equational form from an affine function s set of models is O(n 4 ) It follos from the sntactic characterisation that the number of models possessed b an affine function is either 0 or a poer of 2 Other properties ill no be established that are used in the justification of the affine enelope algorithm of Section 3 The first propert is that if a Boolean function ϕ has to models that differ for eactl one ariable, then its affine enelope is independent of To state this precisel e introduce a concept of a characteristic aluation for a ariable Definition 22 In the contet of a set of ariables V, let V The characteristic aluation for, χ, is defined b { 1 if = χ () = 0 otherise Note that µ χ is the aluation hich agrees ith µ for all ariables ecept Moreoer, if µ = ϕ, then both of µ and µ χ are models of (ϕ) Proposition 23 Let ϕ be a Boolean function hose set of models forms a ector space, and assume that for some aluation µ and some ariable, µ and µ χ both satisf ϕ Then ϕ is independent of Proof: The set M of models contains at least to elements, and since it is closed under, χ is a model Hence for eer model ν of ϕ, ν χ is another model It follos that ϕ is independent of Proposition 24 Let ϕ be a Boolean function If, for some aluation µ and some ariable, µ and µ χ both satisf ϕ, then aff(ϕ) = (aff(ϕ)) Proof: Let µ be a model of ϕ, ith µ χ also a model For eer model ν of ϕ, e hae that ν µ (µ χ ) satisfies aff(ϕ), that is, ν χ = aff(ϕ) No since both ν and ν χ satisf aff(ϕ), it follos that (aff(ϕ)) cannot hae a model that is not alread a model of aff(ϕ) (and the conerse holds triiall) Hence aff(ϕ) = (aff(ϕ)) Lemma 25 Let ϕ be a satisfiable Boolean function ith set M of models, and let µ = aff(ϕ) Then there is an odd positie integer k and a subset M of M, such that M = k and µ = M Proof: Define M 0 = M M i = M i 1 {µ 1 µ 2 µ 3 µ 1, µ 2, µ 3 M i 1 } for i > 0 Then {M i } i 0 is an increasing sequence of sets of models, stabilising in a finite number of steps, that is, for some non-negatie j, M i = M j = models(aff(ϕ)) for all i j An induction on i no shos that for all i and all µ M i, µ can be ritten as a sum M of an odd number of models of M 0 = M ( odd plus odd plus odd equals odd ) In particular this holds for µ in M j, that is, for each model of aff(ϕ) Proposition 26 For all Boolean functions ϕ and ariables, aff( (ϕ)) = (aff(ϕ)) Proof: We need to sho that the models of aff( (ϕ)) are eactl the models of (aff(ϕ)) Clearl aff( (ϕ)) is 0 iff ϕ is 0 iff (aff(ϕ)) is 0 So e can assume that aff( (ϕ)) is satisfiable let µ = aff( (ϕ)) B Lemma 25, for some positie odd number k, µ = µ 1 µ 2 µ k ith µ 1,, µ k being different models of (ϕ) These k models can be partitioned into to sets, according to hether the satisf ϕ; let M = {µ i 1 i k, µ i = ϕ} M = {µ i 1 i k, µ i = ϕ} Then both M and M χ consist entirel of models of ϕ Hence, depending on the parit of M s cardinalit, either µ or µ χ is a model of aff(ϕ) (or both are) In either case, µ = (aff(ϕ)) Conersel, let µ = (aff(ϕ)) Then either µ or µ χ is a model of aff(ϕ) (or both are) Hence µ (or µ χ as the case ma be) can be ritten as a sum of k models µ 1,, µ k (k odd) of ϕ It follos that both µ 1 µ 2 µ k and µ 1 µ 2 µ k χ are models of (ϕ) Hence µ = aff( (ϕ)) These propositions are important because the allo an aggressie approach to the elimination of ariables in an affine enelope algorithm It should be noted that both aff and are upper closure operators, but there as no a priori reason to assume that the commute (Ore 1943) Indeed, there are natural classes of Boolean functions for hich enelopes are elldefined, but here approimation into the class does not commute ith eistential quantification As an eample take the class of positie functions A function is positie iff it ealuates to 1 hen all ariables are 1 This class is closed under conjunction, so e can define pos(ϕ) to be the positie enelope of ϕ The reader can no erif that in B 2, for eample, pos( ( )) = pos( ) = 1 = ( ) = (pos( )) Hence approimation and ariable elimination do not commute in this case 23 ROBDDs We briefl recall the essentials of ROBDDs (Brant 1992) Let the set V of propositional ariables be equipped ith a total ordering Binar decision diagrams (BDDs) are defined inductiel as follos: 0 is a BDD 1 is a BDD If V and R 1 and R 2 are BDDs then ite(, R 1, R 2 ) is a BDD Let R = ite(, R 1, R 2 ) We sa a BDD R appears in R iff R = R or R appears in R 1 or R 2 We define ars(r) = { ite(,, ) appears in R} The meaning of a BDD is gien as follos [0] = 0 [1] = 1 [ite(, R 1, R 2 )] = ( [R 1 ]) ( [R 2 ]) A BDD is an Ordered binar decision diagram (OBDD) iff it is 0 or 1 or if it is ite(, R 1, R 2 ), R 1 and R 2 are OBDDs, and ars(r 1 ) ars(r 2 ) :

5 M = µ = M µ = Figure 1: An eample of our diagrammatic representation of an ROBDD Our diagrams leae out the 0 sink and all arcs to it An OBDD R is a Reduced Ordered Binar Decision Diagram (ROBDD (Brant 1986, Brant 1992)) iff for all BDDs R 1 and R 2 appearing in R, R 1 = R 2 hen [R 1 ] = [R 2 ] Practical implementations (Brace et al 1990) use a function mknd(, R 1, R 2 ) to create all ROBDD nodes as follos: 1 If R 1 = R 2, return R 1 instead of a ne node, as [ite(, R 1, R 2 )] = [R 1 ] 2 If an identical ROBDD as preiousl built, return that one instead of a ne one; this is accomplished b keeping a hash table, called the unique table, of all preiousl created nodes 3 Otherise, return ite(, R 1, R 2 ) This ensures that ROBDDs are strongl canonical: a shallo equalit test is sufficient to determine hether to ROBDDs represent the same Boolean function Figure 1 shos an eample of an ROBDD In general e depict the ROBDD ite(, R 1, R 2 ) as a directed acclic graph rooted in, ith a solid arc from to the dag for R 1 and a dashed line from to the dag for R 2 Hoeer, to aoid unnecessar clutter, e omit the 0 node (sink) and all arcs leading to that sink The ROBDD in Figure 1 denotes the function hich has fie models: {00011, 00110, 01001, 01101, 10101} As a tpical eample of an ROBDD algorithm, Algorithm 1 generates the disjunction of to gien ROBDDs We present algorithms in Haskell stle, using pattern matching and guarded equations This operation ill be used b the affine approimation algorithm presented in Section 3 Algorithm 2 is used to etract a model from an ROBDD For an unsatisfiable ROBDD (that is, 0) e return Although presented here in recursie fashion, it is better implemented in an iteratie manner hereb e traerse through the ROBDD, one pointer moing don the else branch at each node, a second pointer trailing immediatel behind If a 1 sink is found, e return the path traersed thus far and note that an further ariables hich e are et to encounter ma be assigned an alue If a 0 sink is found, e use the trailing pointer to step up a leel, follo the then branch for one step and continue searching for a model b folloing else branches This method relies on the fact that ROBDDs are reduced, so that if no 1 sink can be reached from a node, then the node itself is the 0 sink N = N µ = aff(m) = Figure 2: Steps in Algorithm We shall later use the folloing obious corollar of Proposition 23: Corollar 27 Let ROBDD R represent a function hose set of models form a ector space Then eer path from R s root node to the 1 sink contains the same sequence of ariables, namel ars(r) listed in ariable order 3 Finding Affine Enelopes for ROBDDs Zanuttini (2002a) gies an algorithm, here presented as Algorithm 3, for finding the affine enelope, assuming a Boolean function ϕ is represented as a set of models This algorithm is justified b Proposition 21 Eample 31 To see Algorithm 3 in action, assume that ϕ has four models, M = {01011, 01100, 10111, 11001}, and refer to Figure 2 We randoml pick µ = and obtain M µ as shon The first round of completion under adds three bit-strings: {11100, 10010, 01110}, and another round adds to produce N Finall, adding back µ = ields the affine enelope N µ = aff(m) We are interested in deeloping an algorithm for ROBDDs We can improe on Algorithm 3 and at the same time make it more suitable for ROBDD manipulation The idea is to build the result N step b step, b picking the models ν of M µ one at a time and computing N := N N ν at each step We can start from N = { 0}, as 0 has to be in M µ This leads to Algorithm 4 This formulation is ell suited to ROBDDs, as the operation N ν, that is, taking the or of a model ν ith each model of the ROBDD N can be implemented b traersing N and, for each -node ith ν() = 1, sapping that node s children And e can do better, utilising to obserations First, during its construction, there is no need to traerse the ROBDD N for each indiidual model ν A full traersal of N ill find all its models sstematicall, eliminating a need to remoe them one b one Second, the ROBDD being constructed can be simplified aggressiel during its construction, b utilising Propositions 24 and 26 Namel, as e traerse ROBDD R sstematicall, man paths from

6 Algorithm 1 The or operator for ROBDDs or(1, ) = 1 or(0, ) = 0 or(, 1) = 1 or(, 0) = 0 or(ite(, T, E), ite(, T, E )) = mknd(, or(t, ite(, T, E )), or(e, ite(, T, E ))) = mknd(, or(ite(, T, E), T ), or(ite(, T, E), E )) otherise = mknd(, or(t, T ), or(e, E )) Algorithm 2 get model algorithm for ROBDDs get model(0) = get model(1) = λ get model(ite(, T, E)) = let µ = get model(t) in if µ = then get model(e)[ 0] else µ[ 1] Algorithm 3 The sets-of-models based affine enelope algorithm Input: The set M of models for function ϕ Output: aff(m) the set of models of ϕ s affine enelope if M = then return M end if N choose µ M Ne M µ repeat N N Ne Ne {µ 1 µ 2 µ 1, µ 2 N} \ N until Ne = return N µ Algorithm 4 A ariant of Algorithm 3 Input: The set M of models for function ϕ Output: aff(m) the set of models of ϕ s affine enelope if M = then return M end if N { 0} choose µ M R M µ \ { 0} for all ν R do N N N ν end for return N µ

7 the root to the 1 sink ill be found that do not contain eer ariable in ars(r) Each such path corresponds to a model set of cardinalit 2 k, k being the number of skipped ariables Proposition 24 tells us that, eentuall, the affine enelope ill be independent of all such skipped ariables, and Proposition 26 guarantees that ariable elimination can be interspersed arbitraril ith the process of or-ing models, that is, e can eliminate ariables aggressiel This leads to Algorithm 5 The algorithm combines seeral operations in an effort to amortise their cost In hat follos e step through the details of the algorithm The to aff function finds an initial model µ of R, before translating R through the call to translate This initial call to translate has the effect of or-ing µ ith all of the models of R Once translated, the or closure is taken, before translating again using the initial model µ to obtain the affine closure translate is responsible for computing the or of a model ith an ROBDD Its operation relies on the obseration that for a gien node in the ROBDD, if µ() = 1, then the operation is equialent to echanging the then and else branches of or close is used to compute the or-closure of an ROBDD R The third argument passed to tra is an accumulator in hich the result is constructed As in Algorithm 4, e kno that 0 ill be a model of the result, so e initialise the accumulator as (the ROBDD for) { ars(r)} tra implements a recursie traersal of the ROBDD, and hen a model is found in µ, e etend the affine enelope to include the nel found model Namel, etend(r, S, µ) produces (the ROBDD for) R S µ Note that once a model is found during the traersal, tra checks if µ is alread present ithin the or-closure, and if it is not, inokes etend accordingl This simple check aoids making unnecessar calls to etend The cons function represents a special case of mknd It takes an additional argument in µ and uses it to determine hether to restrict aa the corresponding node being constructed The correctness of cons rests on Propositions 24 and 26, hich guarantee that affine approimation can be interspersed ith ariable elimination, so that the latter can be performed aggressiel Finall, once a model is found during a traersal, etend is used to build up the affine closure of the ROBDD In the contet of the initial call etend(s, S, µ), Corollar 27 ensures that the pattern of the last equation for etend is sufficient: If neither argument is a sink, the to ill hae the same root ariable Eample 32 Consider the ROBDD R (shon again in Figure 3(a)), hose set of models is {00011, 00110, 01001, 01101, 10101} Picking µ = and translating gies R µ, shon in Figure 3(b) This ROBDD represents a set of ectors {00000, 00101, 01010, 01110, 10110} hich is to be etended to a ector space The algorithm no builds up S, the or-closure of R µ, b taking one ector at a time from R µ and etending S to a ector space that includes S begins as the ero ector The first step of the algorithm just adds to the eisting ero ector (Figure 3(c)) The net step comes across the ector 01X10 (hich actuall represents to aluations) and eistentiall quantifies aa the ariable (Figure 4(a)) Note that the ariable 1 1 (a) (b) (c) Figure 3: (a): The ROBDD R from Figure 1 (b): The translated ersion R µ (c): The ector space S that has been etended to coer (a) (b) (c) Figure 4: (a): The ector space S after being etended to coer 01X10 (b): S after etending to coer (c): S translated to gie the affine closure of R also disappears: this is due to the etension required to include 01X10 that adds enough aluations such that is coered b the ector space Etending to coer simpl requires eer model to be copied, ith mapped to 1 (Figure 4(b)) Finall, translating back b µ produces A, the affine closure of R, shon in Figure 4(c) 4 Eperimental Ealuation To ealuate Algorithms 3 and 5 e generated random Boolean functions using Algorithm 6 We generated random Boolean functions of n ariables, ith an additional parameter to control the densit of the generated function, that is, to set the likelihood of a random aluation being a model For Algorithm 3 e etracted models from the generated ROBDDs, so that both algorithms ere tested on identical Boolean functions The function gen rand bdd(n, pr) builds, in the form of an ROBDD R, a random Boolean function ith the propert that the likelihood of an arbitrar aluation satisfing R is 2 pr It inokes rand bdd(0, n 1, pr) This recursie algorithm builds a ROBDD of (n pr) ariables and at depth (n pr), a random choice is made as to hether to continue generating the random function or to simpl join the 1

8 Algorithm 5 Affine enelopes for ROBDDs Input: An ROBDD R Output: The affine enelope of R to aff(0) = 0 to aff(r) = let µ = get model(r) in translate(or close(translate(r, µ)), µ) translate(0, ) = 0 translate(1, ) = 1 translate(ite(, T, E), µ) (µ() = 0) = cons(, translate(t, µ), translate(e, µ), µ) (µ() = 1) = cons(, translate(e, µ), translate(t, µ), µ) or close(r) = tra(r, λ, { ars(r)}) tra(0,, S) = S tra(1, µ, S) (µ = S) = S otherise = etend(s, S, µ) tra(ite(, T, E), µ, S) = tra(t, µ[ 1], tra(e, µ[ 0], S)) cons(, T, E, µ) (µ() = ) = or(t, E) otherise = mknd(, T, E) etend(1,, ) = 1 etend(, 1, ) = 1 etend(0, S, µ) = translate(s, µ) etend(ite(, T, E), 0, µ) = cons(, etend(t, 0, µ), etend(e, 0, µ), µ) etend(ite(, T, E), ite(, T, E ), µ) (µ() = 1) = mknd(, etend(t, E, µ), etend(e, T, µ)) otherise = cons(, etend(t, T, µ), etend(e, E, µ), µ) Algorithm 6 Generation of random Boolean functions as ROBDDs Input: The number n of ariables in the random function, pr a calibrator set so that the probabilit of a aluation being a model is 2 pr Output: A random Boolean function represented as an ROBDD gen rand bdd(n, pr) = rand bdd(0, n 1, pr) rand bdd(m, n, pr) (m = n) = mknd(m, rand sink(), rand sink()) otherise = mknd(m, T, E) here T = if (m > n pr) cointoss() then rand bdd(m + 1, n, pr) else 0 E = if (m > n pr) cointoss() then rand bdd(m + 1, n, pr) else 0 rand sink()= if cointoss() then 1 else 0 cointoss() returns 1 or 0 ith equal probabilit

9 Variables Algorithm 3 Algorithm Table 1: Aerage time in milliseconds to compute one affine enelope branch ith a 0 sink If the choice is to continue, then the algorithm recursiel applies rand bdd(m + 1, n, pr) to the branch B building a complete ROBDD of (n pr) ariables, e ere able to distribute the number of models for a gien number of ariables In this a, e ere able to compare the arious algorithms for differing model distributions Table 1 shos the aerage time (in milliseconds) taken b each of the algorithms oer 10,000 repetitions ith the probabilit 1/1024 of a aluation being a model Timing data ere collected on a machine running Solaris 9, ith to Intel Xeon CPUs running at 28GH and 4GB of memor Onl one CPU as used and tests ere run under minimal load on the sstem Our implementation of Algorithm 3 uses sorted arras of bitstrings (so that search for models is logarithmic) As the number of models gros eponentiall ith the number of ariables, it is not surprising that memor consumption eceeded aailable space, so e ere unable to collect timing data for more than 15 ariables 5 Conclusion Approimation and the generation of enelopes for Boolean formulas is used etensiel in the quering of knoledge bases Preious research has focused on the use of Horn approimations represented in conjunctie normal form (CNF) In this paper, folloing the suggestion of Zanuttini, e instead focused on the class of affine functions, using an approimation algorithm suggested b Zanuttini (2002a) Our initial implementation using a naie sets-of-models (as arras of bitstrings) representation as disappointing, as een for functions ith er fe models, the affine enelope often has er man models (in fact, the affine enelope of er man functions is 1), so storing sets of models as an arra becomes prohibitie een for functions oer rather fe ariables ROBDDs hae proed to be an appropriate representation for man applications of Boolean functions Functions ith er man models, as ell as er fe, hae compact ROBDD representations Thus e hae deeloped a ne affine enelope algorithm using ROBDDs Our approach is based on the same principle as Zanuttini s, but takes adantage of some useful characteristics of ROBDDs In particular, Propositions 24 and 26 allo us to project aa ariables aggressiel, often significantl reducing the sies of the representations being manipulated earlier than ould happen otherise Further research in this area includes implementing Zanuttini s suggested modulo 2 congruence equations representation and comparing to our ROBDD implementation This also includes ealuating the cost of determining hether a set of congruence equations entail a gien general Boolean function It ould also be interesting to compare affine approimation to approimation to other classes for information loss to ealuate hether affine functions reall are as suitable for knoledge-base approimations as Horn or other functions References Brace, K, Rudell, R & Brant, R (1990), Efficient implementation of a BDD package, in Proc Tent-seenth ACM/IEEE Design Automation Conf, pp Brant, R (1986), Graph-based algorithms for Boolean function manipulation, IEEE Trans Computers C 35(8), Brant, R (1992), Smbolic Boolean manipulation ith ordered binar-decision diagrams, ACM Computing Sures 24(3), Dechter, R & Pearl, J (1992), Structure identification in relational data, Artificial Intelligence 58, del Val, A (2005), First order LUB approimations: Characteriation and algorithms, Artificial Intelligence 162, 7 48 Horiama, T & Ibaraki, T (2002), Ordered binar decision diagrams as knoledge-bases, Artificial Intelligence 136, Ore, O (1943), Combinations of closure relations, Ann Math 44(3), Post, E (1941), The To-Valued Iteratie Sstems of Mathematical Logic, Princeton Uniersit Press Reprinted in M Dais, Solabilit, Proabilit, Definabilit: The Collected Works of Emil L Post, pages , Birkhaüser, 1994 Schachte, P & Søndergaard, H (2006), Closure operators for ROBDDs, in E A Emerson & K Namjoshi, eds, Proc Seenth Int Conf Verification, Model Checking and Abstract Interpretation, Vol 3855 of Lecture Notes in Computer Science, Springer, pp 1 16 Schachte, P & Søndergaard, H (2007), Boolean approimation reisited, in I Miguel & W Ruml, eds, Abstraction, Reformulation and Approimation: Proc SARA 2007, Vol 4612 of Lecture Notes in Artificial Intelligence, Springer, pp Schaefer, T J (1978), The compleit of satisfiabilit problems, in Proc Tenth Ann ACM Smp Theor of Computing, pp Selman, B & Kaut, H (1996), Knoledge compilation and theor approimation, Journal of the ACM 43(2), Ward, M (1942), The closure operators of a lattice, Ann Math 43(2), Zanuttini, B (2002a), Approimating propositional knoledge ith affine formulas, in Proc Fifteenth European Conf Artificial Intelligence (ECAI 02), IOS Press, pp Zanuttini, B (2002b), Approimation of relations b propositional formulas: Compleit and semantics, in S Koenig & R Holte, eds, Abstraction, Reformulation and Approimation: Proc SARA 2002, Vol 2371 of Lecture Notes in Artificial Intelligence, Springer, pp

10

An example of Lagrangian for a non-holonomic system

An example of Lagrangian for a non-holonomic system Uniersit of North Georgia Nighthaks Open Institutional Repositor Facult Publications Department of Mathematics 9-9-05 An eample of Lagrangian for a non-holonomic sstem Piotr W. Hebda Uniersit of North

More information

Chapter 8: MULTIPLE CONTINUOUS RANDOM VARIABLES

Chapter 8: MULTIPLE CONTINUOUS RANDOM VARIABLES Charles Boncelet Probabilit Statistics and Random Signals" Oord Uniersit Press 06. ISBN: 978-0-9-0005-0 Chapter 8: MULTIPLE CONTINUOUS RANDOM VARIABLES Sections 8. Joint Densities and Distribution unctions

More information

Toda s Theorem: PH P #P

Toda s Theorem: PH P #P CS254: Computational Compleit Theor Prof. Luca Trevisan Final Project Ananth Raghunathan 1 Introduction Toda s Theorem: PH P #P The class NP captures the difficult of finding certificates. However, in

More information

1 :: Mathematical notation

1 :: Mathematical notation 1 :: Mathematical notation x A means x is a member of the set A. A B means the set A is contained in the set B. {a 1,..., a n } means the set hose elements are a 1,..., a n. {x A : P } means the set of

More information

The Maze Generation Problem is NP-complete

The Maze Generation Problem is NP-complete The Mae Generation Problem is NP-complete Mario Alviano Department of Mathematics, Universit of Calabria, 87030 Rende (CS), Ital alviano@mat.unical.it Abstract. The Mae Generation problem has been presented

More information

Polynomial and Rational Functions

Polynomial and Rational Functions Polnomial and Rational Functions Figure -mm film, once the standard for capturing photographic images, has been made largel obsolete b digital photograph. (credit film : modification of ork b Horia Varlan;

More information

8. BOOLEAN ALGEBRAS x x

8. BOOLEAN ALGEBRAS x x 8. BOOLEAN ALGEBRAS 8.1. Definition of a Boolean Algebra There are man sstems of interest to computing scientists that have a common underling structure. It makes sense to describe such a mathematical

More information

Two NP-hard Interchangeable Terminal Problems*

Two NP-hard Interchangeable Terminal Problems* o NP-hard Interchangeable erminal Problems* Sartaj Sahni and San-Yuan Wu Universit of Minnesota ABSRAC o subproblems that arise hen routing channels ith interchangeable terminals are shon to be NP-hard

More information

A Generalization of a result of Catlin: 2-factors in line graphs

A Generalization of a result of Catlin: 2-factors in line graphs AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 72(2) (2018), Pages 164 184 A Generalization of a result of Catlin: 2-factors in line graphs Ronald J. Gould Emory University Atlanta, Georgia U.S.A. rg@mathcs.emory.edu

More information

An Explicit Lower Bound of 5n o(n) for Boolean Circuits

An Explicit Lower Bound of 5n o(n) for Boolean Circuits An Eplicit Lower Bound of 5n o(n) for Boolean Circuits Kazuo Iwama, Oded Lachish, Hiroki Morizumi, and Ran Raz Graduate School of Informatics, Kyoto Uniersity, Kyoto, JAPAN {iwama, morizumi}@kuis.kyoto-u.ac.jp

More information

Polynomial and Rational Functions

Polynomial and Rational Functions Polnomial and Rational Functions Figure -mm film, once the standard for capturing photographic images, has been made largel obsolete b digital photograph. (credit film : modification of ork b Horia Varlan;

More information

Math 20C. Lecture Examples.

Math 20C. Lecture Examples. Math 20C. Lecture Eamples. (8//08) Section 2.. Vectors in the plane Definition A ector represents a nonnegatie number and, if the number is not zero, a direction. The number associated ith the ector is

More information

ES.1803 Topic 16 Notes Jeremy Orloff

ES.1803 Topic 16 Notes Jeremy Orloff ES803 Topic 6 Notes Jerem Orloff 6 Eigenalues, diagonalization, decoupling This note coers topics that will take us seeral classes to get through We will look almost eclusiel at 2 2 matrices These hae

More information

Binary Decision Diagrams

Binary Decision Diagrams Binar Decision Diagrams Ma 3, 2004 1 Overview Boolean functions Possible representations Binar decision trees Binar decision diagrams Ordered binar decision diagrams Reduced ordered binar decision diagrams

More information

Chapter 3. Systems of Linear Equations: Geometry

Chapter 3. Systems of Linear Equations: Geometry Chapter 3 Systems of Linear Equations: Geometry Motiation We ant to think about the algebra in linear algebra (systems of equations and their solution sets) in terms of geometry (points, lines, planes,

More information

The Dot Product

The Dot Product The Dot Product 1-9-017 If = ( 1,, 3 ) and = ( 1,, 3 ) are ectors, the dot product of and is defined algebraically as = 1 1 + + 3 3. Example. (a) Compute the dot product (,3, 7) ( 3,,0). (b) Compute the

More information

Space Coordinates and Vectors in Space. Coordinates in Space

Space Coordinates and Vectors in Space. Coordinates in Space 0_110.qd 11//0 : PM Page 77 SECTION 11. Space Coordinates and Vectors in Space 77 -plane Section 11. -plane -plane The three-dimensional coordinate sstem Figure 11.1 Space Coordinates and Vectors in Space

More information

Foundations of Databases

Foundations of Databases Foundations of Databases (Slides adapted from Thomas Eiter, Leonid Libkin and Werner Nutt) Foundations of Databases 1 Quer optimization: finding a good wa to evaluate a quer Queries are declarative, and

More information

Bloom Filters and Locality-Sensitive Hashing

Bloom Filters and Locality-Sensitive Hashing Randomized Algorithms, Summer 2016 Bloom Filters and Locality-Sensitive Hashing Instructor: Thomas Kesselheim and Kurt Mehlhorn 1 Notation Lecture 4 (6 pages) When e talk about the probability of an event,

More information

Blocks of Hypergraphs applied to Hypergraphs and Outerplanarity

Blocks of Hypergraphs applied to Hypergraphs and Outerplanarity Blocks of Hpergraphs applied to Hpergraphs and Outerplanarit Ulrik Brandes, Sabine Cornelsen, Barbara Pampel, Arnaud Sallaberr To cite this ersion: Ulrik Brandes, Sabine Cornelsen, Barbara Pampel, Arnaud

More information

arxiv: v1 [math.co] 30 May 2016

arxiv: v1 [math.co] 30 May 2016 ENUMERATION OF DOMINO TILINGS OF AN AZTEC RECTANGLE WITH BOUNDARY DEFECTS MANJIL P. SAIKIA Abstract. Helfgott and Gessel gave the number of domino tilings of an Atec Rectangle ith defects of sie one on

More information

The Inverse Function Theorem

The Inverse Function Theorem Inerse Function Theorem April, 3 The Inerse Function Theorem Suppose and Y are Banach spaces and f : Y is C (continuousl differentiable) Under what circumstances does a (local) inerse f exist? In the simplest

More information

Announcements Wednesday, September 06

Announcements Wednesday, September 06 Announcements Wednesday, September 06 WeBWorK due on Wednesday at 11:59pm. The quiz on Friday coers through 1.2 (last eek s material). My office is Skiles 244 and my office hours are Monday, 1 3pm and

More information

8.1 Exponents and Roots

8.1 Exponents and Roots Section 8. Eponents and Roots 75 8. Eponents and Roots Before defining the net famil of functions, the eponential functions, we will need to discuss eponent notation in detail. As we shall see, eponents

More information

Section 3.1. ; X = (0, 1]. (i) f : R R R, f (x, y) = x y

Section 3.1. ; X = (0, 1]. (i) f : R R R, f (x, y) = x y Paul J. Bruillard MATH 0.970 Problem Set 6 An Introduction to Abstract Mathematics R. Bond and W. Keane Section 3.1: 3b,c,e,i, 4bd, 6, 9, 15, 16, 18c,e, 19a, 0, 1b Section 3.: 1f,i, e, 6, 1e,f,h, 13e,

More information

1 Algebraic Methods. 1.1 Gröbner Bases Applied to SAT

1 Algebraic Methods. 1.1 Gröbner Bases Applied to SAT 1 Algebraic Methods In an algebraic system Boolean constraints are expressed as a system of algebraic equations or inequalities which has a solution if and only if the constraints are satisfiable. Equations

More information

Concept of Stress at a Point

Concept of Stress at a Point Washkeic College of Engineering Section : STRONG FORMULATION Concept of Stress at a Point Consider a point ithin an arbitraril loaded deformable bod Define Normal Stress Shear Stress lim A Fn A lim A FS

More information

Estimation of Efficiency with the Stochastic Frontier Cost. Function and Heteroscedasticity: A Monte Carlo Study

Estimation of Efficiency with the Stochastic Frontier Cost. Function and Heteroscedasticity: A Monte Carlo Study Estimation of Efficiency ith the Stochastic Frontier Cost Function and Heteroscedasticity: A Monte Carlo Study By Taeyoon Kim Graduate Student Oklahoma State Uniersity Department of Agricultural Economics

More information

Dynamics ( 동역학 ) Ch.2 Motion of Translating Bodies (2.1 & 2.2)

Dynamics ( 동역학 ) Ch.2 Motion of Translating Bodies (2.1 & 2.2) Dynamics ( 동역학 ) Ch. Motion of Translating Bodies (. &.) Motion of Translating Bodies This chapter is usually referred to as Kinematics of Particles. Particles: In dynamics, a particle is a body without

More information

Alternative non-linear predictive control under constraints applied to a two-wheeled nonholonomic mobile robot

Alternative non-linear predictive control under constraints applied to a two-wheeled nonholonomic mobile robot Alternatie non-linear predictie control under constraints applied to a to-heeled nonholonomic mobile robot Gaspar Fontineli Dantas Júnior *, João Ricardo Taares Gadelha *, Carlor Eduardo Trabuco Dórea

More information

Exploiting Source Redundancy to Improve the Rate of Polar Codes

Exploiting Source Redundancy to Improve the Rate of Polar Codes Exploiting Source Redundancy to Improe the Rate of Polar Codes Ying Wang ECE Department Texas A&M Uniersity yingang@tamu.edu Krishna R. Narayanan ECE Department Texas A&M Uniersity krn@tamu.edu Aiao (Andre)

More information

SAT based BDD solver for Quantified Boolean Formulas

SAT based BDD solver for Quantified Boolean Formulas SAT based BDD solver for Quantified Boolean Formulas Gilles Audemard and Lakhdar Saïs CRIL CNRS Université d Artois rue Jean Souvraz SP-8 F-62307 Lens Cede France {audemard,sais}@cril.univ-artois.fr Abstract

More information

10.2 The Unit Circle: Cosine and Sine

10.2 The Unit Circle: Cosine and Sine 0. The Unit Circle: Cosine and Sine 77 0. The Unit Circle: Cosine and Sine In Section 0.., we introduced circular motion and derived a formula which describes the linear velocit of an object moving on

More information

On Shortest Single/Multiple Path Computation Problems in Fiber-Wireless (FiWi) Access Networks

On Shortest Single/Multiple Path Computation Problems in Fiber-Wireless (FiWi) Access Networks 2014 IEEE 15th International Conference on High Performance Sitching and Routing (HPSR) On Shortest Single/Multiple Path Computation Problems in Fiber-Wireless (FiWi) Access Netorks Chenyang Zhou, Anisha

More information

We have examined power functions like f (x) = x 2. Interchanging x

We have examined power functions like f (x) = x 2. Interchanging x CHAPTER 5 Eponential and Logarithmic Functions We have eamined power functions like f =. Interchanging and ields a different function f =. This new function is radicall different from a power function

More information

CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION. From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum

CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION. From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION From Exploratory Factor Analysis Ledyard R Tucker and Robert C. MacCallum 1997 19 CHAPTER 3 THE COMMON FACTOR MODEL IN THE POPULATION 3.0. Introduction

More information

3 - Vector Spaces Definition vector space linear space u, v,

3 - Vector Spaces Definition vector space linear space u, v, 3 - Vector Spaces Vectors in R and R 3 are essentially matrices. They can be vieed either as column vectors (matrices of size and 3, respectively) or ro vectors ( and 3 matrices). The addition and scalar

More information

Reduced Ordered Binary Decision Diagrams

Reduced Ordered Binary Decision Diagrams Reduced Ordered Binary Decision Diagrams Lecture #12 of Advanced Model Checking Joost-Pieter Katoen Lehrstuhl 2: Software Modeling & Verification E-mail: katoen@cs.rwth-aachen.de December 13, 2016 c JPK

More information

Differentiation 9 examples using the product and quotient rules

Differentiation 9 examples using the product and quotient rules 1 Differentiation 9 eamples using the proct and quotient rules J A Rossiter http://controlecation.group.shef.ac.uk/mathematics.html Slides Anthon Rossiter Introction The preious ideos hae gien a definition

More information

1 Introduction. Control 2:

1 Introduction. Control 2: Introduction Kinematics of Wheeled Mobile Robots (No legs here. They ork like arms. We e seen arms already) For control purposes, the kinematics of heeled mobile robots (WMRs) that e care about are the

More information

ELECTRICAL AND COMPUTER ENGINEERING DEPARTMENT, OAKLAND UNIVERSITY ECE-2700: Digital Logic Design Winter Notes - Unit 2

ELECTRICAL AND COMPUTER ENGINEERING DEPARTMENT, OAKLAND UNIVERSITY ECE-2700: Digital Logic Design Winter Notes - Unit 2 ECE-7: Digital Logic Design Winter 8 Notes - Unit OPTIMIZED IMPLEMENTATION OF LOGIC FUNCTIONS BASIC TECHNIQUES: We can alas minimie logic unctions using the Boolean theorems. Hoever, more poerul methods

More information

Section 6: PRISMATIC BEAMS. Beam Theory

Section 6: PRISMATIC BEAMS. Beam Theory Beam Theory There are two types of beam theory aailable to craft beam element formulations from. They are Bernoulli-Euler beam theory Timoshenko beam theory One learns the details of Bernoulli-Euler beam

More information

Announcements Wednesday, September 06. WeBWorK due today at 11:59pm. The quiz on Friday covers through Section 1.2 (last weeks material)

Announcements Wednesday, September 06. WeBWorK due today at 11:59pm. The quiz on Friday covers through Section 1.2 (last weeks material) Announcements Wednesday, September 06 WeBWorK due today at 11:59pm. The quiz on Friday coers through Section 1.2 (last eeks material) Announcements Wednesday, September 06 Good references about applications(introductions

More information

Non-linear consolidation of soil with vertical and horizontal drainage under time-dependent loading

Non-linear consolidation of soil with vertical and horizontal drainage under time-dependent loading Uniersity of Wollongong Research Online Faculty of Engineering - Papers (Archie) Faculty of Engineering and Information Sciences Non-linear consolidation of soil ith ertical and horizontal drainage under

More information

MAT 1275: Introduction to Mathematical Analysis. Graphs and Simplest Equations for Basic Trigonometric Functions. y=sin( x) Function

MAT 1275: Introduction to Mathematical Analysis. Graphs and Simplest Equations for Basic Trigonometric Functions. y=sin( x) Function MAT 275: Introduction to Mathematical Analsis Dr. A. Rozenblum Graphs and Simplest Equations for Basic Trigonometric Functions We consider here three basic functions: sine, cosine and tangent. For them,

More information

EXERCISES Chapter 7: Transcendental Functions. Hyperbolic Function Values and Identities

EXERCISES Chapter 7: Transcendental Functions. Hyperbolic Function Values and Identities 54 Chapter 7: ranscendental Functions EXERCISES 7.8 perbolic Function Values and Identities Each of Eercises 4 gives a value of sinh or cosh. Use the definitions and the identit cosh - sinh = to find the

More information

Logics for Bisimulation and Divergence

Logics for Bisimulation and Divergence Logics for Bisimulation and Divergence Xinxin Liu, Tingting Yu (B), and Wenhui Zhang State Key Laboratory of Computer Science, Institute of Softare, CAS, University of Chinese Academy of Sciences, Beijing,

More information

Chapter 4: Techniques of Circuit Analysis

Chapter 4: Techniques of Circuit Analysis Chapter 4: Techniques of Circuit Analysis This chapter gies us many useful tools for soling and simplifying circuits. We saw a few simple tools in the last chapter (reduction of circuits ia series and

More information

NP and NP-Completeness

NP and NP-Completeness 0/2/206 Algorithms NP-Completeness 7- Algorithms NP-Completeness 7-2 Efficient Certification NP and NP-Completeness By a solution of a decision problem X we understand a certificate witnessing that an

More information

Note on Mathematical Development of Plate Theories

Note on Mathematical Development of Plate Theories Advanced Studies in Theoretical Phsics Vol. 9, 015, no. 1, 47-55 HIKARI Ltd,.m-hikari.com http://d.doi.org/10.1988/astp.015.411150 Note on athematical Development of Plate Theories Patiphan Chantaraichit

More information

Scalar multiplication and algebraic direction of a vector

Scalar multiplication and algebraic direction of a vector Roberto s Notes on Linear Algebra Chapter 1: Geometric ectors Section 5 Scalar multiplication and algebraic direction of a ector What you need to know already: of a geometric ectors. Length and geometric

More information

Math 249B. Geometric Bruhat decomposition

Math 249B. Geometric Bruhat decomposition Math 249B. Geometric Bruhat decomposition 1. Introduction Let (G, T ) be a split connected reductive group over a field k, and Φ = Φ(G, T ). Fix a positive system of roots Φ Φ, and let B be the unique

More information

A Proof System for Separation Logic with Magic Wand

A Proof System for Separation Logic with Magic Wand A Proof System for Separation Logic ith Magic Wand Wonyeol Lee Sungoo Park Department of Computer Science and Engineering Pohang University of Science and Technology (POSTECH) Republic of Korea {leeygla}@postechackr

More information

You don't have to be a mathematician to have a feel for numbers. John Forbes Nash, Jr.

You don't have to be a mathematician to have a feel for numbers. John Forbes Nash, Jr. Course Title: Real Analsis Course Code: MTH3 Course instructor: Dr. Atiq ur Rehman Class: MSc-II Course URL: www.mathcit.org/atiq/fa5-mth3 You don't have to be a mathematician to have a feel for numbers.

More information

Trichotomy Results on the Complexity of Reasoning with Disjunctive Logic Programs

Trichotomy Results on the Complexity of Reasoning with Disjunctive Logic Programs Trichotomy Results on the Complexity of Reasoning with Disjunctive Logic Programs Mirosław Truszczyński Department of Computer Science, University of Kentucky, Lexington, KY 40506, USA Abstract. We present

More information

Geometry review, part I

Geometry review, part I Geometr reie, part I Geometr reie I Vectors and points points and ectors Geometric s. coordinate-based (algebraic) approach operations on ectors and points Lines implicit and parametric equations intersections,

More information

Lesson 3: Free fall, Vectors, Motion in a plane (sections )

Lesson 3: Free fall, Vectors, Motion in a plane (sections ) Lesson 3: Free fall, Vectors, Motion in a plane (sections.6-3.5) Last time we looked at position s. time and acceleration s. time graphs. Since the instantaneous elocit is lim t 0 t the (instantaneous)

More information

Interpretable Matrix Factorization with Stochasticity Constrained Nonnegative DEDICOM

Interpretable Matrix Factorization with Stochasticity Constrained Nonnegative DEDICOM Interpretable Matri Factoriation ith Stochasticit Constrained Nonnegatie DEDICOM Rafet Sifa 1,2, Cesar Ojeda 1, Kostadin Cejoski 1, and Christian Bauckhage 1,2 1 Fraunhofer IAIS, Sankt Augustin, German

More information

Hamiltonicity and Fault Tolerance

Hamiltonicity and Fault Tolerance Hamiltonicit and Fault Tolerance in the k-ar n-cube B Clifford R. Haithcock Portland State Universit Department of Mathematics and Statistics 006 In partial fulfillment of the requirements of the degree

More information

Basing Decisions on Sentences in Decision Diagrams

Basing Decisions on Sentences in Decision Diagrams Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence Basing Decisions on Sentences in Decision Diagrams Yexiang Xue Department of Computer Science Cornell University yexiang@cs.cornell.edu

More information

Critical Reading of Optimization Methods for Logical Inference [1]

Critical Reading of Optimization Methods for Logical Inference [1] Critical Reading of Optimization Methods for Logical Inference [1] Undergraduate Research Internship Department of Management Sciences Fall 2007 Supervisor: Dr. Miguel Anjos UNIVERSITY OF WATERLOO Rajesh

More information

Week 3 September 5-7.

Week 3 September 5-7. MA322 Weekl topics and quiz preparations Week 3 September 5-7. Topics These are alread partl covered in lectures. We collect the details for convenience.. Solutions of homogeneous equations AX =. 2. Using

More information

Artificial Neural Networks. Part 2

Artificial Neural Networks. Part 2 Artificial Neural Netorks Part Artificial Neuron Model Folloing simplified model of real neurons is also knon as a Threshold Logic Unit x McCullouch-Pitts neuron (943) x x n n Body of neuron f out Biological

More information

Network Flow Problems Luis Goddyn, Math 408

Network Flow Problems Luis Goddyn, Math 408 Network Flow Problems Luis Goddyn, Math 48 Let D = (V, A) be a directed graph, and let s, t V (D). For S V we write δ + (S) = {u A : u S, S} and δ (S) = {u A : u S, S} for the in-arcs and out-arcs of S

More information

Econ 201: Problem Set 3 Answers

Econ 201: Problem Set 3 Answers Econ 20: Problem Set 3 Ansers Instructor: Alexandre Sollaci T.A.: Ryan Hughes Winter 208 Question a) The firm s fixed cost is F C = a and variable costs are T V Cq) = 2 bq2. b) As seen in class, the optimal

More information

Chapter 6. Self-Adjusting Data Structures

Chapter 6. Self-Adjusting Data Structures Chapter 6 Self-Adjusting Data Structures Chapter 5 describes a data structure that is able to achieve an epected quer time that is proportional to the entrop of the quer distribution. The most interesting

More information

Integer Parameter Synthesis for Real-time Systems

Integer Parameter Synthesis for Real-time Systems 1 Integer Parameter Synthesis for Real-time Systems Aleksandra Joanoić, Didier Lime and Oliier H. Roux École Centrale de Nantes - IRCCyN UMR CNRS 6597 Nantes, France Abstract We proide a subclass of parametric

More information

Decision tables and decision spaces

Decision tables and decision spaces Abstract Decision tables and decision spaces Z. Pawlak 1 Abstract. In this paper an Euclidean space, called a decision space is associated with ever decision table. This can be viewed as a generalization

More information

1.3 LIMITS AT INFINITY; END BEHAVIOR OF A FUNCTION

1.3 LIMITS AT INFINITY; END BEHAVIOR OF A FUNCTION . Limits at Infinit; End Behavior of a Function 89. LIMITS AT INFINITY; END BEHAVIOR OF A FUNCTION Up to now we have been concerned with its that describe the behavior of a function f) as approaches some

More information

10.5 Graphs of the Trigonometric Functions

10.5 Graphs of the Trigonometric Functions 790 Foundations of Trigonometr 0.5 Graphs of the Trigonometric Functions In this section, we return to our discussion of the circular (trigonometric functions as functions of real numbers and pick up where

More information

Patterns of Non-Simple Continued Fractions

Patterns of Non-Simple Continued Fractions Patterns of Non-Simple Continued Fractions Jesse Schmieg A final report written for the Uniersity of Minnesota Undergraduate Research Opportunities Program Adisor: Professor John Greene March 01 Contents

More information

2 The Bhaduri-Marglin model

2 The Bhaduri-Marglin model The Bhaduri-Marglin model n this chapter the basics o the Bhaduri-Marglin model ill be discussed. Doing so, attention ill be directed on hich eatures o the model ill hae to be altered hen endogeniing labor

More information

Review Topics for MATH 1400 Elements of Calculus Table of Contents

Review Topics for MATH 1400 Elements of Calculus Table of Contents Math 1400 - Mano Table of Contents - Review - page 1 of 2 Review Topics for MATH 1400 Elements of Calculus Table of Contents MATH 1400 Elements of Calculus is one of the Marquette Core Courses for Mathematical

More information

Support Vector Machines

Support Vector Machines Support Vector Machines Optimall deined decision surace Tpicall nonlinear in the input space Linear in a higher dimensional space Implicitl deined b a kernel unction What are Support Vector Machines Used

More information

N-bit Parity Neural Networks with minimum number of threshold neurons

N-bit Parity Neural Networks with minimum number of threshold neurons Open Eng. 2016; 6:309 313 Research Article Open Access Marat Z. Arslanov*, Zhazira E. Amirgalieva, and Chingiz A. Kenshimov N-bit Parity Neural Netorks ith minimum number of threshold neurons DOI 10.1515/eng-2016-0037

More information

Part 1: Propositional Logic

Part 1: Propositional Logic Part 1: Propositional Logic Literature (also for first-order logic) Schöning: Logik für Informatiker, Spektrum Fitting: First-Order Logic and Automated Theorem Proving, Springer 1 Last time 1.1 Syntax

More information

Reduced Ordered Binary Decision Diagrams

Reduced Ordered Binary Decision Diagrams Reduced Ordered Binary Decision Diagrams Lecture #13 of Advanced Model Checking Joost-Pieter Katoen Lehrstuhl 2: Software Modeling & Verification E-mail: katoen@cs.rwth-aachen.de June 5, 2012 c JPK Switching

More information

Randomized Smoothing Networks

Randomized Smoothing Networks Randomized Smoothing Netorks Maurice Herlihy Computer Science Dept., Bron University, Providence, RI, USA Srikanta Tirthapura Dept. of Electrical and Computer Engg., Ioa State University, Ames, IA, USA

More information

Sequential Synthesis Using S1S

Sequential Synthesis Using S1S Sequential Snthesis Using S1S Adnan Aziz 1 Felice Balarin 2 Robert Braton 1 Alberto Sangioanni-Vincentelli 1 1 Department of Electrical Engineering and Computer Sciences 2 Cadence Design Sstems Uniersit

More information

The optimal pebbling number of the complete m-ary tree

The optimal pebbling number of the complete m-ary tree Discrete Mathematics 222 (2000) 89 00 www.elseier.com/locate/disc The optimal pebbling number of the complete m-ary tree Hung-Lin Fu, Chin-Lin Shiue Department of Applied Mathematics, National Chiao Tung

More information

CS 151 Complexity Theory Spring Solution Set 5

CS 151 Complexity Theory Spring Solution Set 5 CS 151 Complexity Theory Spring 2017 Solution Set 5 Posted: May 17 Chris Umans 1. We are given a Boolean circuit C on n variables x 1, x 2,..., x n with m, and gates. Our 3-CNF formula will have m auxiliary

More information

arxiv: v1 [math.gt] 2 Nov 2010

arxiv: v1 [math.gt] 2 Nov 2010 CONSTRUCTING UNIVERSAL ABELIAN COVERS OF GRAPH MANIFOLDS HELGE MØLLER PEDERSEN arxi:101105551 [mathgt] 2 No 2010 Abstract To a rational homology sphere graph manifold one can associate a weighted tree

More information

CIRCUIT COMPLEXITY AND PROBLEM STRUCTURE IN HAMMING SPACE

CIRCUIT COMPLEXITY AND PROBLEM STRUCTURE IN HAMMING SPACE CIRCUIT COMPLEXITY AND PROBLEM STRUCTURE IN HAMMING SPACE KOJI KOBAYASHI Abstract. This paper describes about relation between circuit compleit and accept inputs structure in Hamming space b using almost

More information

5. Biconnected Components of A Graph

5. Biconnected Components of A Graph 5. Biconnected Components of A Graph If one city s airport is closed by bad eather, can you still fly beteen any other pair of cities? If one computer in a netork goes don, can a message be sent beteen

More information

reader is comfortable with the meaning of expressions such as # g, f (g) >, and their

reader is comfortable with the meaning of expressions such as # g, f (g) >, and their The Abelian Hidden Subgroup Problem Stephen McAdam Department of Mathematics University of Texas at Austin mcadam@math.utexas.edu Introduction: The general Hidden Subgroup Problem is as follos. Let G be

More information

Linear Algebra Math 221

Linear Algebra Math 221 Linea Algeba Math Open Book Eam Open Notes Sept Calculatos Pemitted Sho all ok (ecept #). ( pts) Gien the sstem of equations a) ( pts) Epess this sstem as an augmented mati. b) ( pts) Bing this mati to

More information

HALF-SPACE KINETIC EQUATIONS WITH GENERAL BOUNDARY CONDITIONS. 1. Introduction

HALF-SPACE KINETIC EQUATIONS WITH GENERAL BOUNDARY CONDITIONS. 1. Introduction HALF-SPACE KINETIC EQUATIONS WITH GENERAL BOUNDARY CONDITIONS QIN LI, JIANFENG LU, AND WEIRAN SUN Abstract. We stud half-space linear kinetic equations with general boundar conditions that consist of both

More information

Propositional Logic Language

Propositional Logic Language Propositional Logic Language A logic consists of: an alphabet A, a language L, i.e., a set of formulas, and a binary relation = between a set of formulas and a formula. An alphabet A consists of a finite

More information

A Unit-Derivation for the Vacuum Field

A Unit-Derivation for the Vacuum Field Albuquerque, NM 22 PROCEEDINGS of the NPA 97 A Unit-Derivation for the Vacuum Field Jeffrey N. Cook 727 Christopher Lane, Maumee, OH 43537 e-mail: jnoelcook@yahoo.com I derive a Lagrangian for all fields

More information

11.4 Polar Coordinates

11.4 Polar Coordinates 11. Polar Coordinates 917 11. Polar Coordinates In Section 1.1, we introduced the Cartesian coordinates of a point in the plane as a means of assigning ordered pairs of numbers to points in the plane.

More information

Symbolic Model Checking with ROBDDs

Symbolic Model Checking with ROBDDs Symbolic Model Checking with ROBDDs Lecture #13 of Advanced Model Checking Joost-Pieter Katoen Lehrstuhl 2: Software Modeling & Verification E-mail: katoen@cs.rwth-aachen.de December 14, 2016 c JPK Symbolic

More information

A proof of topological completeness for S4 in (0,1)

A proof of topological completeness for S4 in (0,1) A proof of topological completeness for S4 in (,) Grigori Mints and Ting Zhang 2 Philosophy Department, Stanford University mints@csli.stanford.edu 2 Computer Science Department, Stanford University tingz@cs.stanford.edu

More information

CALCULATION OF STEAM AND WATER RELATIVE PERMEABILITIES USING FIELD PRODUCTION DATA, WITH LABORATORY VERIFICATION

CALCULATION OF STEAM AND WATER RELATIVE PERMEABILITIES USING FIELD PRODUCTION DATA, WITH LABORATORY VERIFICATION CALCULATION OF STEAM AND WATER RELATIVE PERMEABILITIES USING FIELD PRODUCTION DATA, WITH LABORATORY VERIFICATION Jericho L. P. Reyes, Chih-Ying Chen, Keen Li and Roland N. Horne Stanford Geothermal Program,

More information

Logic, Sets, and Proofs

Logic, Sets, and Proofs Logic, Sets, and Proofs David A. Cox and Catherine C. McGeoch Amherst College 1 Logic Logical Operators. A logical statement is a mathematical statement that can be assigned a value either true or false.

More information

Session R4F Methods to Formulate and to Solve Problems in Mechanical Engineering

Session R4F Methods to Formulate and to Solve Problems in Mechanical Engineering Methods to Formulate and to Sole Problems in Mechanical Engineering Eusebio Jiménez López, Luis Rees Áila, Francisco Jaier Ochoa Estrella 3, Francisco Galindo Gutiérrez 4, Jaier Ruiz Galán 5, and Esteban

More information

Some Classes of Invertible Matrices in GF(2)

Some Classes of Invertible Matrices in GF(2) Some Classes of Invertible Matrices in GF() James S. Plank Adam L. Buchsbaum Technical Report UT-CS-07-599 Department of Electrical Engineering and Computer Science University of Tennessee August 16, 007

More information

FACULTY OF MATHEMATICAL STUDIES MATHEMATICS FOR PART I ENGINEERING. Lectures AB = BA = I,

FACULTY OF MATHEMATICAL STUDIES MATHEMATICS FOR PART I ENGINEERING. Lectures AB = BA = I, FACULTY OF MATHEMATICAL STUDIES MATHEMATICS FOR PART I ENGINEERING Lectures MODULE 7 MATRICES II Inverse of a matri Sstems of linear equations Solution of sets of linear equations elimination methods 4

More information

Why do Golf Balls have Dimples on Their Surfaces?

Why do Golf Balls have Dimples on Their Surfaces? Name: Partner(s): 1101 Section: Desk # Date: Why do Golf Balls have Dimples on Their Surfaces? Purpose: To study the drag force on objects ith different surfaces, ith the help of a ind tunnel. Overvie

More information

Mathematics 309 Conic sections and their applicationsn. Chapter 2. Quadric figures. ai,j x i x j + b i x i + c =0. 1. Coordinate changes

Mathematics 309 Conic sections and their applicationsn. Chapter 2. Quadric figures. ai,j x i x j + b i x i + c =0. 1. Coordinate changes Mathematics 309 Conic sections and their applicationsn Chapter 2. Quadric figures In this chapter want to outline quickl how to decide what figure associated in 2D and 3D to quadratic equations look like.

More information

Computational Logic. Davide Martinenghi. Spring Free University of Bozen-Bolzano. Computational Logic Davide Martinenghi (1/30)

Computational Logic. Davide Martinenghi. Spring Free University of Bozen-Bolzano. Computational Logic Davide Martinenghi (1/30) Computational Logic Davide Martinenghi Free University of Bozen-Bolzano Spring 2010 Computational Logic Davide Martinenghi (1/30) Propositional Logic - sequent calculus To overcome the problems of natural

More information