Figure 4: Expansion of (S b jt jc 1 jc 2 jr b ) n L. def. def. def. P T ABP as given in section 5, we can conclude

Size: px
Start display at page:

Download "Figure 4: Expansion of (S b jt jc 1 jc 2 jr b ) n L. def. def. def. P T ABP as given in section 5, we can conclude"

Transcription

1 (S b jt jc 1 jc 2 jr b ) n L A B C T accet:a n L where = (S 0 b jt jc 1jC 2 jr b ) T :(send S;b :start:s 00 b jt jc 1jC 2 jr b ) T ::(start:s 00 b jt jh0; send R;b:C 1 + :C 1 i s jc 2 jr b ) T :::(R 00 b jhsto:t ; timeout:t i tjh0; send R;b :C 1 + :C 1 i s jc 2 jr b ) T ::h0; (S 00 b jhsto:t ; timeout:t i t0sjsend R;b :C 1 + :C 1 jc 2 jr b )i s T h0; :B + :Ci s = (S 00 b jhsto:t ; timeout:t i t0sjc 1 jc 2 jdeliver:ack R;b :Rb ) deliver:d T = (S 00 b jhsto:t ; timeout:t i t0sjc 1 jc 2 jr b ) T h0; (ack S;b :sto:sb + ack S;b :S00 b + timeout:s0 b jtimeout:t jc 1jC 2 jr b )i t0s D E F G T h0; Ai t0s = (S 00 b jhsto:t ; timeout:t i t0sjc 1 jc 2 jack R;b :R b ) T :(S 00 b jhsto:t ; timeout:t i t0sjc 1 jh0; ack S;b :C 2 + :C 2 i a jrb ) T :h0; (S 00 b jhsto:t ; timeout:t i t0(s+a)jc 1 jack S;b :C 2 + :C 2 jrb )i a T h0; :E + :F i a = (S 00 b jhsto:t ; timeout:t i t0(s+a)jc 1 jack R;b :C 2 jrb ) T :(sto:sb jhsto:t ; timeout:t i t0(s+a)jc 1 jc 2 jrb ) T Sb jt jc 1jC 2 jrb = (S 00 b jhsto:t ; timeout:t i t0(s+a)jc 1 jc 2 jrb ) T h0; Gi t0(s+a) = (S 0 b jt jc 1jC 2 jrb ) T h0; :h0; :E + :F i a + :h0; Gi t0s i s Figure 4: Exansion of (S b jt jc 1 jc 2 jr b ) n L where L = fsend S;b ; send R;b ; send ; send ; S;b R;b ack S;b ; ack R;b ; ack ; ack ; start; sto; S;b timeoutg. R;b Using the timed strong equivalence and timed observation equivalence, we derive an exansion of (S b jtjc 1 jc 2 jr b ) n L as shown in Figure 4. Exression A follows directly from Corollary 1, while A T h0; :B + :Ci s is derived from Proosition 5. Derivations of exressions B to G are similar to that of A. From Figure 4, we can transform (S b jtjc 1 jc 2 jr b )nl into a timed observation equivalent exression P as follows: P A G = accet:a = h0; :deliver:h0; :P + :h0; Gi t0(s+a) i a + :h0; Ai t0s i s = h0; :h0; :A + :h0; Gi t0(s+a) i a + :h0; Gi t0s i s Furthermore, since it can be easily shown that P T ABP as given in section 5, we can conclude that ABP is timed observation equivalent to (S b jt jc 1 jc 2 jr b ) n L. (S b jt jc 1 jc 2 jr b ) n L T P where

2 P + Q = Q + P P + (Q + R) = (P + Q) + R P + P = P P + 0 = P (P + Q) n L = P n L + Q n L (:P ) n L = (P + Q)[f] = P [f] + Q[f] (:P )[f] = f():p [f] 8 < : 0 if 2 L [ L :P n L otherwise h:p ; :P i t = :P h:p + Q; Ri t = :P + Q (t > 0) hp; Qi 0 = Q hhp; Qi s ; Ri t = 8 < : hp; Ri t (s t) hp; hq; Ri t0s i s (s < t) hp; Q + Ri t = hp; Qi t + hp; Ri t hp + Q; Ri t = hp; Ri t + hq; Ri t hp; Qi t [f] = hp [f]; Q[f]i t hp; Ri t n L = hp n L; Q n Li t P jq = QjP P j(qjr) = (P jq)jr P j0 = P P jq = P i = j :(P i jq j ) + P i2i i:(p i jq) + P j2j j:(p jq j ) where P P i2i i:p i and Q P j2j j:q j P jq = h P i = j :(P i jq j ) + P i2i i:(p i jq) + P j2j j:(p jq j ) ; P 0 jqi 1 where P h P i2i i:p i ; P 0 i 1 and Q P j2j j:q j P jq = h P i = j :(P i jq j ) + P i2i i:(p i jq) + P j2j j:(p jq j ) ; P 0 jq 0 i 1 where P h P i2i i:p i ; P 0 i 1 and Q h P j2j j:q j ; Q 0 i 1 Figure 3: Equational Proof System based on T Proosition 10 For each P 2 P, there exists a normal form P 0 such P = P 0. Proof. By structural induction on P. Lemma 1 1. If P T Q where P is in NF 6 and Q is in NF, then Q is in NF If P T Q where P is in NF hi and Q is in NF, then Q is in NF hi. Proof. The structure of NF 6 rocesses cannot be transformed by and any NF hi rocess transforms its structure by. Theorem 2 (Comleteness) If P T P; Q 2 P, then P = Q. Q where Proof. Assume that P T Q. By roosition 10, we can nd normal form rocesses P 0 and Q 0 where P = P 0 and Q = Q 0. By lemma 1, both P 0 and Q 0 must be in NF 6 or both P 0 and Q 0 must be in NF hi. Hence we have that P = Q. Aendix B In this aendix we resent a rather detailed descrition of the behavior and timing of the Alternating Bit Protocol as given in section 5 under the assumtion that s + a < t. The whole rotocol is reresented as a arallel comosition of the ve comonent as follows: (S b jt jc 1 jc 2 jr b ) n L

3 In roceedings of the 11th IEEE Real-Time Systems Symosium, [6] Hennessy, M. and Regan, T., A Temoral Process Algebra, Technical Reort 2/90, University of Sussex, 1990 [7] Hoare, C. A. R., Communicating Sequential Processes, Prentice Hall, [8] Honda, K., and Tokoro, M., An Object Calculus for Asynchronous Communication, In roceedings of ECOOP'91, LNCS 512, [9] Ishikawa, Y., Tokuda, H., and Mercer, C. W., Object-Oriented Real-Time Language Design: Construction for Timing Constraints, In roceedings of ECOOP/OOPSLA'90, [10] Milner, R., Calculi for Synchrony and Asynchrony, Theoretical Comuter Science, Vol.25, [11] Milner, R., Communication and Concurrency, Prentice Hall, [12] Milner, R., A Comlete Axiomatization for Observational Congruence of Finite Behavior, Information and Comutation, Vol.81, [13] Milner, R., Parrow, J., and Walker, D., A Calculus of Mobile Processes Part 1 & 2, Technical reort ECS-LFCS & 86, University of Edinburgh, [14] Moller, F., and Tofts, C., A Temoral Calculus of Communicating Systems, In roceedings of CON- CUR'90, LNCS 458, [15] Najm, E., and Stefani, J. B., Object-Based Concurrency: A Process Calculus Analysis, In roceedings of TAPSOFT'91, LNCS 493, [16] Nicollin, X., and Sifakis, J., The Algebra of Timed Process ATP: Theory and Alications, IMAG Technical Reort, RT-C26, [17] Nierstrasz, O. M., and Paathomas, M., Viewing Objects as Patterns of Communicating Agents, In roceedings of ECOOP/OOPSLA'90, [18] Nierstrasz, O. M., Towards an Object Calculus, In roceedings of ECOOP'91 Worksho on Concurrent Object-Based Concurrent Comuting, LNCS 612, [19] Satoh, I., and Tokoro, M., A Formal Descrition and Verication for Parallel Comuting with Timed Constraints, In roceeding of Joint Symosium Parallel Processing'92, June, (in Jaanese) [20] Satoh, I., and Tokoro, M., Timed Process Calculus Semantics for A Real-Timed Concurrent Object- Oriented Language, Technical Reort, Det. Comuter Science, Keio University, February, [21] Takashio, K., and Tokoro, M., DROL: An Object- Orinted Programming Language for Distributed Real-time Systems, In roceedings of ACM OOP- SLA'92, October, [22] Walker, D., -Calculus Semantics of Object- Oriented Programming Languages, In roceedings of Theoretical Asects of Comuter Software, LNCS 526, [23] Yi, W., CCS + Time = an Interleaving Model for Real Time Systems, In roceedings of Automata, Languages and Programming'91, LNCS 510, [24] Yonezawa, A., and Tokoro, M., editors, Object- Oriented Concurrent Programming, MIT Press, Aendix A In this aendix, we develo a sound and comlete equational roof system based on timed strong equivalence. We rst restrict our attention to the non-recursive nite rocess exressions. The equational system for RtCCS is dened in Figure 3. We shall use \=" to denote derivability in our equational system, and \" to denote syntactical identity. It can be easily shown that the equational rocesses in Figure 3 are timed strongly equivalent. Therefore, we get the following result. Theorem 1 (Soundness) If P = Q where P; Q 2 P, then P T Q. Proof. Obvious according to the roositions 1 to 3, and Corollary 1. Next, we want to show that the system is comlete. We can accomlish this by using the following normal forms. Denition 7 A normal form (NF) is dened inductively by: (i) A rocess is in normal form if it is in NF 6 or NF hi. (ii) A rocess is in NF6 if it is of the form P 0in i:p i where each P i is in NF. (iii) A rocess is in NF hi if it is of the form hp; Qi 1 where P is in NF 6 and Q is in NF.

4 the sender, the receiver, the two channels, and the timer, as follows: (S b jt jc 1 jc 2 jr b ) n L where L = fsend S;b ; send ; send S;b R;b; send ; R;b ack S;b ; ack S; b b ; ack R;b ; ack R; b b ; start; sto; timeoutg By using timed bisimilarity, we transform (S b jtjc 1 jc 2 jr b )nl into a timed observation equivalent exression ABP, which is a sequential rocess: ABP ABP 0 (S b jt jc 1 jc 2 jr b ) n L T ABP where = accet:abp 0 = :h0; deliver: X i0 + :h0; ABP 0 i t h0; ABPi i2t+a i s We resent the roof of this transformation in Aendix B. By using the simler exression, we can not only investigate the behavior of the rotocol but also temoral roerties, such as the minimal and maximal delay for delivering a message. With secications based on RtCCS, we can derive the behavior and timing of whole systems from the descrition of its comonents. Timed bisimilarities allows us to analyze systems through timed and behaviorally equivalent rocesses which may have substantially less comlexity in their structure. 6 Conclusion We have dened a formal model called RtCCS for real-time object-oriented comutations. RtCCS is an extension of Milner's CCS by introducing a tick action and a timeout oerator. It can formally describe the asects of time deendence in realtime systems and enjoy many leasant roerties of CCS. We have introduced two timed equivalences based on CCS's bisimulation: timed strong equivalence and timed observation equivalence. The equivalences rovide a formal framework for analyzing the behavior and timing of real-time comutations. We have resented examles that demonstrate the exressiveness and the roof method of RtCCS. Furthermore, we have given a sound and comlete equational roof system based on timed strong equivalence in aendix. As an alication of RtCCS, we are resently develoing on the semantics of real-time objectoriented languages, such as DROL [21]. The semantics is dened by translation rules from the syntactical constructions of the languages into RtCCS rocess exressions, also used as a static verication model for real-time rograms. Details are resented in [19]. We are also interested in investigating whether an axiomatization based on observation congruence [12] can be alied to RtCCS, and whether other rocess equivalences such as distributed bisimulation [3] and testing equivalence [4] can be adoted by RtCCS. Acknowledgements We are grateful to P. Wegner, and K. Takashio for useful discussions. We would like to thank Y. Ishikawa and K. Honda for suggestions at the early stage of this work. We thank V. Vasconcelos, and T. Minohara for comments on an earlier version of this aer. References [1] America, P., de Bakker, J., Kok, J., and Rutten, J., Oerational Semantics of a Parallel Object- Oriented Language, In roceedings of ACM POPL, [2] Beaten, J. C. M, and Bergstra, J. A, Process Algebra, Cambridge University Press [3] Castellani, H., Hennessy, M., Distributed Bisimulation, Journal of ACM, Vol.36, No.4, [4] de Nicola, R. and Hennessy, M., Testing equivalence for rocesses, Theoretical Comuter Science, Vol.34, [5] Hansson, H. and Jonsson, B., A Calculus of Communicating Systems with Time and Probabilities,

5 Remarks It seems that we can always assume that if P Q (or P Q) holds in CCS, then P T Q (or P T Q) holds in RtCCS. There is however a counterexamle: unguarded recursion exressions, e.g., rec X : X exression. This is because in RtCCS such exressions are not allowed. However, we think that such exressions are unrealizable in object-oriented comuting. 5 Examles In this section we resent two examles which illustrate the exressiveness and utility of RtCCS. Examle 2 A Timer Object We describe a timer object T in RtCCS as follows: T = start:hsto:t ; timeout:t i t Uon recetion of a request start to start the timer, it receives the amount t of and then sends timeout. If it accets a request sto, the timer goes back to its initial state T. Examle 3 Verication of Timed Systems In order to illustrate how to describe and verify systems in RtCCS we describe the Alternating Bit Protocol for OSI data link layer. There are ve comonents: the sender, the receiver, the two unreliable channels, and the timer. To nd out dulicate messages or acknowledgments, messages and acknowledgements are sent tagged with bits 0 and 1 alternately. Uon recetion of a request to send a message (accet), the sender sends it tagged with an aroriate bit b (send S;b ) to the channel. It then waits for an aroriate acknowledgement (ack R;b ). If the acknowledgement cannot be received within a secied eriod of time, the sender retransmits the message. The two channels are unreliable. They may occasionally lose a message or an acknowledgement. The receiver waits for a message (send R;b or send, where b R;b is the comlement of b) and then it sends an acknowledgement to the channel (ack R;b or ack R;b ). If it accets a message tagged with an aroriate bit, it sends the message to the environment (deliver). The sender S has the following denition. S b S 0 b S 00 b S b S 0 b Sb 00 = accet:s 0 b = send S;b :start:s 00 b = ack S;b :sto:sb + ack S;b :S00 b + timeout:s 0 b = accet:s 0 b = send S;b :start:s00 b = ack S;b :sto:s b + ack S;b :S 00 b b + timeout:s 0 b b The timer T has the following denition, where t is the timeout time. T = start:hsto:t ; timeout:t i t The channel C 1 has the following denition, where s is the transmission time for a message. C 1 = send S;b :h0; send R;b :C 1 + :C 1 i s + send S;b :h0; send R;b :C 1 + :C 1 i s The channel C 2 has the following denition, where a is the transmission time for an acknowledgement. C 2 = ack R;b :h0; ack S;b :C 2 + :C 2 i a + ack R;b :h0; ack S;b :C 2 + :C 2 i a The receiver R has the following denition. R b R b = send R;b :deliver:ack R;b :R b + send R;b :ack R;b :R b = send R;b :deliver:ack R;b :R b + send R;b :ack R;b :R b We resent the behavior of the whole rotocol under the assumtion that s + a < t. The rotocol is constructed by the arallel comosition of

6 4.2 Timed Observation Equivalence The timed strong equivalence has several useful algebraic roerties but gives no secial status to the internal action which indeed should not be observed. We resent a weaker equivalence which reects the observation of behaviors and timing in the comutation. Denition 5 A binary relation S P 2 P is a timed weak bisimulation if (P; Q) 2 S imlies, for all 2 Act T, (i) 8P 0 : P =) P 0 9Q 0 : Q =) Q 0 ^ P 0 T Q 0. (ii) 8Q 0 : Q =) Q 0 9P 0 : P =) P 0 ^ P 0 T Q 0. (iii) P " i Q ". We write P = T Q if P and Q are timed observation congruent. Proosition 6 If P T Q and both rocesses are stable 2, then P = T Q. Proof. Direct from Denition 5 and 6. (i) 8P 0 : P (ii) 8Q 0 : Q =) P 0 9Q 0 : Q =) b Q 0 ^ (P 0 ; Q 0 ) 2 S. =) Q 0 9P 0 : P =) b P 0 ^ (P 0 ; Q 0 ) 2 S. Proosition 7 For all P; Q 2 P, if P T P = T Q, and if P = T Q then P T Q. Q then Let \ T " denote the largest timed weak bisimulation, and call P and Q timed observation equivalent if P T Q. Intuitively, if P and Q are timed observation equivalent, each action of P must be matched by a sequence of actions of Q with the same visible contents and timing, and conversely. The equivalence can equate objects that are not distinguishable by the observable behavior and the timing in the comutations. Proosition 5 1. :P T P 2. ::P T :P 3. :P + P T :P 4. :(:P + Q) T :(:P + Q) + :Q 5. h:p ; Qi t T P (t > 0) 6. hp; :Qi t T hp; Qi t 7. h:p ; :h:p ; Qi s i t T h:p ; Qi s+t Proof. Easy alication of Denition 5. Like a weak equivalence in CCS, T is not a congruence relation. However, we can dene a timed observation congruence relation based on the timed observation equivalence. Denition 6 P and Q are timed observation congruent if for all 2 Act T Proof. By Denition 4 to 6, clearly = T lies between T and T. Intuitively, if P T Q and both have no - derivative, then P = T Q. Therefore, we can easily rove the following roerties. Proosition 8 1. ::P = T :P 2. :P + P = T :P 3. :(:P + Q) = T :(:P + Q) + :Q 4. hp; :Qi t = T hp; Qi t (t > 0) 5. h:p ; :h:p ; Qi s i t = T h:p ; Qi s+t Proof. Use Proosition 5 and 6. Proosition 9 (Congruence) Timed observation congruence = T is reserved by all oerators. Proof. Same as Proosition 4. = T is a congruence relation and very close to timed observation equivalence. We grantee that if two objects are timed observation congruent, they are substitutable for each other even though their internal imlementations are dierent. 2 P is stable if P 0! P 0 is imossible for all P 0.

7 2. h:p ; h:p ; Qi t i s T h:p ; Qi s+t 3. h:p + Q; Ri t T :P + Q (t > 0) 4. hp; Qi t n L T hp n L; Q n Li t 5. hp; Qi t [f] T hp [f]; Q[f]i t 6. hp; Q + Ri t T hp; Qi t + hp; Ri t 7. hp + Q; Ri t T hp; Ri t + hq; Ri t 8. hhp; Qi s ; Ri t T hp; Rit (s t) hp; hq; Ri t0s i s (s < t) Proof. All the laws may be roved by exhibiting aroriate timed strong bisimulations. The hardest is (8) of Proosition 3 in the case of (s < t) which we rove as follows: We need to show that S is a timed strong bisimulation, where f ( hhp 1 ; P 2 i s ; P 3 i t ; hp 1 ; hp 2 ; P 3 i t0s i s ) j 0 s < t; P 1 ; P 2 ; P 3 2 Pg. So let hhp 1 ; P 2 i s ; P 3 i t 0! Q 1 ; it is enough to nd Q 2 such that hp 1 ; hp 2 ; P 3 i t0s i s 0! Q 2 and (Q 1 ; Q 2 ) 2 S. There are two cases: Case 1 2 Act and P 1 0! P 0. By TIME 1 0, Q 1 P 0, and 1 Q 2 P 0, and we know 1 Q 1 Q 2. Case 2 =. Case 2.1 s = 0. We assume that P 2 0! P 0 2. By TIME 2, Q 1 hp 0 2 ; P 3i t01 and Q 2 hp 0 2 ; P 3i t01, hence Q 1 Q 2. Case 2.2 s > 0. We assume that P 10!P 0. 1 By TIME 1, Q 1 hhp 0 1 ; P 2i s01 ; P 3 i t01, and Q 2 hp 0 1 ; hp 2; P 3 i t0s i s01, and clearly (Q 1 ; Q 2 ) 2 S. By a symmetric argument, we comlete the roof. RtCCS, like CCS, is based on the concet of interleaving and can reduce concurrent rocesses to sequential rocesses in terms of nondeterminism, for examle, :0j:0 T ::0 + ::0. Corollary 1 The Exansion Laws 1. Let P P i2i i:p i and Q P j2j j:q j ; PjQ T Pi2I i:(p i jq) + P j2j j:(p jq j ) + P i = j :(P i jq j ) 2. Let P h P i2i i:p i ; P 0 i 1 and Q P j2j j:q j ; P jq T h P i2i i:(p i jq) + P j2j j:(p jq j ) + P i = j :(P i jq j ) ; P 0 jqi 1 3. Let P h P i2i i:p i ; P 0 i 1 and Q h P j2j j:q j ; Q 0 i 1 ; P jq T h P i2i i:(p i jq) + P j2j j:(p jq j ) + P i = j :(P i jq j ) ; P 0 jq 0 i 1 From the laws in Proosition 1, 2, 3, and Corollary 1, we can develo an equational roof system based on timed strong equivalence. The system is given in aendix A. Proosition 4 (Congruence) Timed strong equivalence T is reserved by all oerators. Proof. We show a roof only for the timeout oerator; the roofs for the other oerations are similar to the roofs of [11]. We will rove that hp 1 ; Qi t T hp 2 ; Qi t where P 1 ; P 2 ; Q 2 P and P 1 T P 2. It is enough to show that S = f(hp 1 ; Qi t ; hp 2 ; Qi t ) : P 1 T P 2 ; t 0g is a timed strong bisimulation. We assume hp 1 ; Qi t 0! R. There are two cases: Case 1 2 Act and P 1 0! P 0 1. Then because P 1 T P 2, we have 9P 0 : 2 P 2 0! P 0 2 with P 0 1 T P 0. Hence 2 hp 1; Qi t 0! P 0, 1 hp 2 ; Qi t 0! P 0, and clearly 2 P 0 1 T P 0. 2 Case 2 =. Case 2.1 t = 0. Obvious. Case 2.2 t > 0, P 1 0! P 0, and 1 hp 1; Qi t 0! hp 0 1 ; Qi t01. Then because P 1 T P 2, we have 9P 0 : 2 P 2 0! P 0 with 2 P 0 1 T P 0. Hence 2 hp 2; Qi t 0! hp 0 2 ; Qi t01 and (hp 0 1 ; Qi t01; hp 0 2 ; Qi t01) 2 S. By a symmetric argument, we comlete the roof. The roof for the other case of the timeout oerator, i.e. hq; P 1 i t T hq; P 2 i t where P 1 T P 2, is similar. By this roosition we guarantee that if two objects are timed strongly equivalent, the objects are substitutable for each other.

8 Examle 1 Here we give some simle examles of RtCCS exressions. (1) a:h b:p ; 0i t After erforming an inut action a, it behaves as P if an outut action b is executed within t units of time, otherwise terminates. (2) a:h0; b:p i t After erforming a, it is idle for t time units and then behaves as b:p. (3) a:(h0; b:0i d jp ) After erforming a, it behaves as P but b becomes available after d time units. Note that h0; b:0i d jp reresents a rocess which behaves as P and sends b as an asynchronous outut communication with transmission delay d time units. Remarks 1. The fundamental asects of concurrent objectoriented comuting are modeled as the rimitive constructions of RtCCS as follows: Objects as rocesses. Concurrency among objects as arallel comosition. Message assing as communication between rocesses. Encasulation in objects as restriction and relabeling. Also, we cature the fundamental asects of real-time comuting delayed rocessing and timeout handling, through the timeout oerator of RtCCS. 2. An external action cannot be erformed before its artner action in another rocess is ready to communicate. While a rocess having an external action is waiting for its artner action, it must erform actions. If a rocess has an executable communication (including ), it must erform the communication immediately, instead of idling. 4 Timed Bisimilarity In this section we resent two equivalences over rocesses, which are extensions of CCS's bisimulation with the notion of time. The equivalences rovide a formal framework for analyzing the behavior and timing of real-time object-oriented comutations. 4.1 Timed Strong Equivalence Denition 4 A binary relation S P 2 P is a timed strong bisimulation if (P; Q) 2 S imlies, for all 2 Act T, (i) 8P 0 : P 0! P 0 9Q 0 : Q 0! Q 0 ^ (P 0 ; Q 0 ) 2 S. (ii) 8Q 0 : Q 0! Q 0 9P 0 : P 0! P 0 ^ (P 0 ; Q 0 ) 2 S. We let \ T " denote the largest timed strong bisimulation, and call P and Q timed strongly equivalent if P T Q. Intuitively, if P and Q are timed strongly equivalent, they seem indistinguishable from one another in behavior and timing. We show some algebraic roerties of the equivalence: Proosition 1 1. P + Q T Q + P 2. P + (Q + R) T (P + Q) + R 3. P + P T P 4. P + 0 T P Proosition 2 1. P jq T QjP 2. P j(qjr) T (P jq)jr 3. P j0 T P 4. (P + Q) n L T P n L + Q n L 5. (:P ) n L T 0 if 2 L [ L :P n L otherwise 6. (P + Q)[f] T P [f] + Q[f] 7. (:P )[f] T f():p [f] Proosition 3 1. h:p ; :P i t T :P

9 where t is a natural number, f 2 Act! Act and L Act. We assume that f() =, f( ) =, and that X is always guarded 1 [11]. We denote the set of closed exressions by P( E), ranged over P; Q;.... The syntax of RtCCS is essentially the same as that of CCS, excet for the newly introduced tick action and timeout oerator. Intuitively, the meaning of rocess constructions are as follows: 0 reresents a deadlocked or terminated rocess; :E erforms an action and then behaves like E; E 1 + E 2 is the rocess which may behave as E 1 or E 2 ; E 1 je 2 reresents rocesses E 1 and E 2 executing concurrently; E[f] behaves like E but with the actions relabeled by function f; E n L behaves like E but with actions in L [ L rohibited; rec X : E binds the free occurrences of X in E but we shall often use the more readable notation X = E instead Oerational Semantics of RtCCS RtCCS is a labeled transition system h E; Act T ; f 0! j 2 Act T g i where 0! is a transition relation ( 0! E 2 E). The transition relation 0! is dened by structural induction and is the smallest relation given by the rules in Figure 2. The 0! relation does not distinguish between observable and unobservable actions. In order to reect that is not visible, we dene two transition relations due to the unobservability of. Denition 2 (i) P =) Q = P ( 0!) 3 0! ( 0!) 3 Q (ii) P =) b Q = P ( 0!) 3 0! ( 0!) 3 Q if 6= and otherwise P ( 0!) 3 Q. Also, we dene an oeration to denote a rocess caable of innite internal comutation. Denition 3 E " if 9E 0 : E( 0!)! E 0 1 X is guarded in E if each occurrence of X is only within some subexressions :E 0 in E; c.f. unguarded exressions, e.g. rec X : X or rec X : X + E. ACT 0 : 0 :E 0! E ACT 1 : 0 a:e 0! a:e ACT 2 : 0 0 0! 0 SUM 0 : E 0! E 0 E + F 0! E 0 SUM 1 : F 0! F 0 E + F 0! F 0 E SUM 2 : 0! E 0 ; F 0! F 0 E + F 0! E 0 + F 0 COM 0 : E 0! E 0 EjF 0! E 0 jf COM 1 : F 0! F 0 COM 2 : COM 3 : RES 0 : RES 1 : E EjF 0! EjF 0 E 0! a E 0 ; F 0! a F 0 EjF 0! E 0 jf 0 0! E 0 ; F 0! F 0 ; EjF 0! 6 EjF 0! E 0 jf 0 E 0! E 0 ; ; =2 L E n L 0! E 0 n L E 0! E 0 E n L 0! E 0 n L REL : E 0! E 0 REC : TIME 0 : TIME 1 : E[f] f () 0! E 0 [f] Efrec X : E=Xg 0! E 0 rec X : E=X 0! E 0 E 0! E 0 ; t > 0 he; F i t 0! E 0 E 0! E 0 ; t > 0 he; F i t 0! he 0 ; F i t01 TIME 2 : F 0! F 0 he; F i 0 0! F 0 Figure 2: Inference Rules of RtCCS

10 an extension of CCS with discrete time and robability. PTCCS is similar to our RtCCS. However, unlike ours, time stos inside the timeout oerator of PTCCS. Therefore, the timeout oerator of PTCCS cannot aly to a rocess with timed roerties, and PTCCS cannot describe a timeout excetion for such a rocess. The timeout oerator of ATP is similar to ours. However, ATP has no notion of observation equivalence because ATP has no action, since it is not based on CCS. 3 RtCCS In this section, we resent the basic idea of RtCCS and rovide its formal denition. 3.1 Time Extensions We assume a concetual global clock: time asses as the global clock erforms tick actions. The tick action is a synchronous broadcast message over all rocesses. It is described as. The advance of time can be reresented as a sequence of tick actions and is viewed as discrete time. Also, we assume that all communications and internal actions take no time, and that comlementary actions and internal actions are erformed as soon as they become ossible. Therefore, a rocess having a communication action ready must wait until other rocess becomes ready to communicate with it. Once both the artners of a communication are ready, they must erform the communication actions immediately, before the next tick. As mentioned reviously, many real-time rogramming languages have timed oerations such as delay and timeout. In order to be used as a framework for formal semantics of languages, RtCCS needs to reresent behaviors deendent on the advancing of time. We introduce a secial binary oerator: h ; i t, called a timeout oerator. As shown in Figure 1, hp; Qi t denotes a rocess that after t time units becomes Q, unless P erforms any actions rior to that. Intuitively hp; Qi t behaves as rocess P if P can execute an initial transition within t units of time, whereas hp; Qi t behaves as rocess Q if P does not erform any action within t units of time. That is to say, P and Q corresond to ordinary and timeout rocesses resectively, in ractical rogramming. if t > 1 if t = 1 P 0 P 0 a 0 09 a 0 09 hp; hp 00 ; a P 0! P 0 P 0! P 00 hp; Qi 1 P 0! a P 0 Figure 1: The behavior of the timeout oerator Q 3.2 The RtCCS Language In this subsection, we resent the syntax and the oerational semantics of RtCCS Notation and Syntax of RtCCS We resuose that A is a set of communication action names and A the set of co-names. Let a,b,... range over A and a,b,... over A. An action a is the comlementary action of a, and a a. Let denote an internal action, and a tick action. Finally let Act A[A[fg ranged over by,,..., and Act T Act [ f g ranged over by,,.... Denition 1 The set E of RtCCS exressions ranged over by E; E 1 ; E 2 ; F;... is dened recursively by the following abstract syntax. E ::= 0 (Deadlock Process) j X (Process Variable) j :E (Action Prex) j E 1 + E 2 (Summation) j E 1 je 2 (Comosition) j E[f] (Relabeling) j E n L (Restriction) j rec X : E (Recursion) j he 1 ; E 2 i t (Timeout)

11 cesses which may change their states when communicating with another agent. Also, rocess calculi have equivalence relations over rocesses which rovide theoretical frameworks for analyzing the behavior of objects and for substituting objects. In this aer we develo a rocess calculus which ermits exressing and analyzing time constraints in real-time object-oriented comutations. To do this, we extend an existing rocess calculus with the notion of time and introduce a timed rocess calculus called RtCCS (Real-time Calculus of Communication Systems). It is an extension of Milner's CCS [11] with a minimal set of notions for time: a tick action and a timeout oerator. The execution of tick actions corresonds to the assage of time; the timeout oerator reresents a behavior deendent on the assage of time. Furthermore, we develo theoretical equivalences over rocesses with time roerties. In RtCCS, time indeendent roerties of rocesses can be treated as usual CCS while the time deendent roerties can be treated with the timed extensions. In order to demonstrate its eectiveness in a simler form, our timed extension is develoed for CCS. However, the same extension can be naturally adoted into -calculus [13] which has more owerful mechanisms for modeling object-oriented comuting. In the next section, we discuss some of the related works. In Section 3, we dene the syntax and the oerational semantics of RtCCS. Section 4 de- nes two equivalence relations called timed strong equivalence and timed observation equivalence resectively, and studies their basic roerties. In Section 5, we resent some examles that demonstrate the usefulness of RtCCS. The nal section contains some concluding remarks. In Aendix A, we dene an equational roof system based on timed strong equivalence. 2 Related Research Recently, many theoretical models for concurrent object-oriented comutations have been exlored in rocess calculi, such as CCS [11], -calculus [13], and ACP [2]. In the rocess calculus aradigm, objects can be viewed as rocesses, interactions among objects can be seen as communications, and encasulation can be modeled by the restriction of visible communications. In [8] a formal system based on the notion of actor-like object with asynchronous communication was investigated, and in [17] an executable notation for secifying concurrent object-oriented languages in a rocess calculus was exlored. In [18] some requirements for a calculus suitable for concurrent objects is resented. In [15] the author resents a language based on a rocess calculus and analyzes the essential features of object-based concurrency. In [22] a semantics for POOL [1] is dened by the translation of the language constructs into -calculus [13]. Many theoretical models for real-time comutations have been exlored in temoral logic, timed Petri nets, and denotational semantics frameworks based on linear history semantics. More recently, several studies develoed temoral models based on rocess calculi such as CCS, ACP, and CSP [6, 5, 10, 16, 14, 23]. Milner's SCCS [10] is a calculus for synchronous rocesses based on the idea that each atomic action takes one unit of time. The concurrent agents of SCCS essentially roceed in lockste and at every instant erform a single action; there is also an asynchronous oerator. Since each object in an object-oriented comutation roceeds at indeterminate relative seeds, SCCS does not t our uroses. TPA [6], timed CCS [23], and Temoral CCS [14] introduce delay oerators into CCS. The delay oerators reresent the susension of execution for a secied time, similarly to the delay command in Ada. In TPA and timed CCS, like in RtCCS, there are two assumtions: time advances only when communications are not ossible and that actions are instantaneous. Once an action is enabled, it cannot be disabled. Therefore, they cannot exress timeout behavior. On the other hand, Temoral CCS can reresent timeout behavior but has no equivalent relation over rocesses based on observation of their behaviors. PTCCS [5] and ATP [16], like ours, have a timeout oerator. PTCCS is

12 To aear in Proceedings of ACM OOPSLA'92 A Formalism for Real-Time Concurrent Object-Oriented Comuting Ichiro Satoh satoh@mt.cs.keio.ac.j Mario Tokoro 3 mario@mt.cs.keio.ac.j Deartment of Comuter Science, Keio University , Hiyoshi, Kohoku-ku, Yokohama, 223, Jaan Tel: Fax: Abstract We investigate a formal model for reasoning about real-time object-oriented comutations. The model is an extension of CCS with the notion of time, called RtCCS (Real-time Calculus of Communication Systems). It can naturally model real-time concurrent objects as communicating rocesses and reresent the timed roerties of objects. We de- ne two timed equivalences based on CCS's bisimulation and derive algebraic laws for reasoning about real-time rocesses. The equivalences rovide a formal framework for analyzing the behavior and timing of real-time comutations. Also, we dene a sound and comlete equational roof system for - nite rocesses. Some examles in RtCCS are shown in order to demonstrate its usefulness. 1 Introduction Real-time systems are increasingly being used in various areas such as factory automation, robotics, and multi-media systems. These systems have to interact and cooerate with many external ele- 3 Also with Sony Comuter Science Laboratory Inc Higashi-Gotanda, Shinagawa-ku, Tokyo, 141, Jaan. ments which run in arallel, such as other comuters, sensors, and actuators. The notion of concurrent object-oriented comuting [24] is considered as a owerful method to design and to develo such real-time systems. This is because concurrent object-oriented systems consist of objects which are logically self-contained active entities that cooerate with each other. Concurrent objects can naturally model such active elements directly. Recently, some real-time systems and languages use this concet as their basis [9, 21]. Real-time systems have certain time constraints which must be satised. The correctness of a realtime system deends not only on the logical results of comutation, but also on the time at which the results are roduced. Therefore, the construction and debugging of real-time rograms is far more comlex and dicult than those of ordinary concurrent rograms. We need the suort of formal verication methods for reasoning about real-time rograms. In the ast few years several researchers have roosed such methods based on timed Petri nets, rst order logics, and temoral logics. However, these frameworks are not always t for concurrent object-oriented comuting. The goal of this aer is to investigate a formal model to reason about real-time object-oriented comutations. Various formal models for concurrent objectoriented comutation have reviously been devised. Among these, rocess calculus [2, 11, 13] is a well-dened theory that can model naturally and easily concurrent objects as communicating ro-

Time values are often denoted as positive real numbers including zero. We dene symbols to present the events of processes. Denition 2.2 l Let A be an

Time values are often denoted as positive real numbers including zero. We dene symbols to present the events of processes. Denition 2.2 l Let A be an A rocess Algebra for Optimization for arallel rograms Ichiro Satoh Department of Information Sciences, Ochanomizu University 2-1-1 Otsuka Bunkyo-ku Tokyo 112-8610 Japan Tel: +81-3-5978-5388 Fax: +81-3-5978-5390

More information

p,egp AFp EFp ... p,agp

p,egp AFp EFp ... p,agp TUESDAY, Session 2 Temoral logic and model checking, cont 1 Branching time and CTL model checking In a branching time temoral logics, we consider not just a single ath through the Krike model, but all

More information

Model checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle]

Model checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle] Chater 5 Model checking, verification of CTL One must verify or exel... doubts, and convert them into the certainty of YES or NO. [Thomas Carlyle] 5. The verification setting Page 66 We introduce linear

More information

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i

For q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:

More information

Encoding Named Channels Communication by Behavioral Schemes

Encoding Named Channels Communication by Behavioral Schemes Acta olytechnica Hungarica Vol. 8, o. 2, 2011 Encoding amed Channels Communication by Behavioral Schemes Martin Tomášek Deartment of Comuters and Informatics, Faculty of Electrical Engineering and Informatics,

More information

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule

The Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule The Grah Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule STEFAN D. BRUDA Deartment of Comuter Science Bisho s University Lennoxville, Quebec J1M 1Z7 CANADA bruda@cs.ubishos.ca

More information

Periodic scheduling 05/06/

Periodic scheduling 05/06/ Periodic scheduling T T or eriodic scheduling, the best that we can do is to design an algorithm which will always find a schedule if one exists. A scheduler is defined to be otimal iff it will find a

More information

Principles. Model (System Requirements) Answer: Model Checker. Specification (System Property) Yes, if the model satisfies the specification

Principles. Model (System Requirements) Answer: Model Checker. Specification (System Property) Yes, if the model satisfies the specification Model Checking Princiles Model (System Requirements) Secification (System Proerty) Model Checker Answer: Yes, if the model satisfies the secification Counterexamle, otherwise Krike Model Krike Structure

More information

Review of The π-calculus: A Theory of Mobile Processes

Review of The π-calculus: A Theory of Mobile Processes Review of The π-calculus: A Theory of Mobile Processes Riccardo Pucella Department of Computer Science Cornell University July 8, 2001 Introduction With the rise of computer networks in the past decades,

More information

Linear diophantine equations for discrete tomography

Linear diophantine equations for discrete tomography Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,

More information

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS

ON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS #A13 INTEGERS 14 (014) ON THE LEAST SIGNIFICANT ADIC DIGITS OF CERTAIN LUCAS NUMBERS Tamás Lengyel Deartment of Mathematics, Occidental College, Los Angeles, California lengyel@oxy.edu Received: 6/13/13,

More information

Elementary Analysis in Q p

Elementary Analysis in Q p Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some

More information

Blame, coercion, and threesomes: Together again for the first time

Blame, coercion, and threesomes: Together again for the first time Blame, coercion, and threesomes: Together again for the first time Draft, 19 October 2014 Jeremy Siek Indiana University jsiek@indiana.edu Peter Thiemann Universität Freiburg thiemann@informatik.uni-freiburg.de

More information

x 1 1 x x 4 Figure 1: A system of four rocesses 1,, 3, and 4, and three interactions x 1, x 13, and x 4 that is innitely often enabled (ie, wit

x 1 1 x x 4 Figure 1: A system of four rocesses 1,, 3, and 4, and three interactions x 1, x 13, and x 4 that is innitely often enabled (ie, wit On Strong-Feasibilities of Equivalence-Comletions Yuh-Jzer Joung joung@ccmsntuedutw Deartment of Information Management National Taiwan University Taiei, Taiwan Abstract The notion of comletion has been

More information

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition

A Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition A Qualitative Event-based Aroach to Multile Fault Diagnosis in Continuous Systems using Structural Model Decomosition Matthew J. Daigle a,,, Anibal Bregon b,, Xenofon Koutsoukos c, Gautam Biswas c, Belarmino

More information

Improved Capacity Bounds for the Binary Energy Harvesting Channel

Improved Capacity Bounds for the Binary Energy Harvesting Channel Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,

More information

DRAFT - do not circulate

DRAFT - do not circulate An Introduction to Proofs about Concurrent Programs K. V. S. Prasad (for the course TDA383/DIT390) Deartment of Comuter Science Chalmers University Setember 26, 2016 Rough sketch of notes released since

More information

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL

MODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management

More information

Computer arithmetic. Intensive Computation. Annalisa Massini 2017/2018

Computer arithmetic. Intensive Computation. Annalisa Massini 2017/2018 Comuter arithmetic Intensive Comutation Annalisa Massini 7/8 Intensive Comutation - 7/8 References Comuter Architecture - A Quantitative Aroach Hennessy Patterson Aendix J Intensive Comutation - 7/8 3

More information

Finite-State Verification or Model Checking. Finite State Verification (FSV) or Model Checking

Finite-State Verification or Model Checking. Finite State Verification (FSV) or Model Checking Finite-State Verification or Model Checking Finite State Verification (FSV) or Model Checking Holds the romise of roviding a cost effective way of verifying imortant roerties about a system Not all faults

More information

Parallelism and Locality in Priority Queues. A. Ranade S. Cheng E. Deprit J. Jones S. Shih. University of California. Berkeley, CA 94720

Parallelism and Locality in Priority Queues. A. Ranade S. Cheng E. Deprit J. Jones S. Shih. University of California. Berkeley, CA 94720 Parallelism and Locality in Priority Queues A. Ranade S. Cheng E. Derit J. Jones S. Shih Comuter Science Division University of California Berkeley, CA 94720 Abstract We exlore two ways of incororating

More information

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK

MATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment

More information

Petri Net Plans. 1 Introduction. Vittorio Amos Ziparo 1 and Luca Iocchi 2

Petri Net Plans. 1 Introduction. Vittorio Amos Ziparo 1 and Luca Iocchi 2 Fourth International Worksho on Modelling of Objects, Comonents, and Agents (MOCA'06), 2006 Petri Net Plans Vittorio Amos Ziaro 1 and Luca Iocchi 2 1 Diartimento di Informatica e Sistemistica, Università

More information

An Analysis of TCP over Random Access Satellite Links

An Analysis of TCP over Random Access Satellite Links An Analysis of over Random Access Satellite Links Chunmei Liu and Eytan Modiano Massachusetts Institute of Technology Cambridge, MA 0239 Email: mayliu, modiano@mit.edu Abstract This aer analyzes the erformance

More information

A Forxnalism for Real-Time Concurrent Object-Oriented Computing

A Forxnalism for Real-Time Concurrent Object-Oriented Computing A Forxnalism for Real-Time Concurrent Object-Oriented Computing chiro Satoh Mario Tokoro * satoh&nt.cs.keio.ac.jp rnario@mt.cs.keio.ac.jp Department of Computer Science, Keio University 3-14-1, Hiyoshi,

More information

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model

Shadow Computing: An Energy-Aware Fault Tolerant Computing Model Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms

More information

Their proof is rather lengthy and hard to grasp; it ultimately relies on showing a periodicity for any transition graph generated from normed context-

Their proof is rather lengthy and hard to grasp; it ultimately relies on showing a periodicity for any transition graph generated from normed context- Bisimulation Equivalence is Decidable for all Context-Free Processes Sren Christensen Hans Huttel y Colin Stirling 1 Introduction Over the past decade much attention has been devoted to the study of process

More information

Combinatorics of topmost discs of multi-peg Tower of Hanoi problem

Combinatorics of topmost discs of multi-peg Tower of Hanoi problem Combinatorics of tomost discs of multi-eg Tower of Hanoi roblem Sandi Klavžar Deartment of Mathematics, PEF, Unversity of Maribor Koroška cesta 160, 000 Maribor, Slovenia Uroš Milutinović Deartment of

More information

A Parallel Algorithm for Minimization of Finite Automata

A Parallel Algorithm for Minimization of Finite Automata A Parallel Algorithm for Minimization of Finite Automata B. Ravikumar X. Xiong Deartment of Comuter Science University of Rhode Island Kingston, RI 02881 E-mail: fravi,xiongg@cs.uri.edu Abstract In this

More information

Correspondence Between Fractal-Wavelet. Transforms and Iterated Function Systems. With Grey Level Maps. F. Mendivil and E.R.

Correspondence Between Fractal-Wavelet. Transforms and Iterated Function Systems. With Grey Level Maps. F. Mendivil and E.R. 1 Corresondence Between Fractal-Wavelet Transforms and Iterated Function Systems With Grey Level Mas F. Mendivil and E.R. Vrscay Deartment of Alied Mathematics Faculty of Mathematics University of Waterloo

More information

ABSTRACT MODEL REPAIR

ABSTRACT MODEL REPAIR Logical Methods in Comuter Science Vol. 11(3:11)2015,. 1 43 www.lmcs-online.org Submitted Jul. 2, 2014 Published Se. 17, 2015 ABSTRACT MODEL REPAIR GEORGE CHATZIELEFTHERIOU a, BORZOO BONAKDARPOUR b, PANAGIOTIS

More information

Trace Refinement of π-calculus Processes

Trace Refinement of π-calculus Processes Trace Refinement of pi-calculus Processes Trace Refinement of π-calculus Processes Manuel Gieseking manuel.gieseking@informatik.uni-oldenburg.de) Correct System Design, Carl von Ossietzky University of

More information

Research Article Controllability of Linear Discrete-Time Systems with Both Delayed States and Delayed Inputs

Research Article Controllability of Linear Discrete-Time Systems with Both Delayed States and Delayed Inputs Abstract and Alied Analysis Volume 203 Article ID 97546 5 ages htt://dxdoiorg/055/203/97546 Research Article Controllability of Linear Discrete-Time Systems with Both Delayed States and Delayed Inuts Hong

More information

2 J.Burton and M.Koutny we have to exlicitly generate a state sace, namely when testing for trace inclusion, only two rocesses are involved and the te

2 J.Burton and M.Koutny we have to exlicitly generate a state sace, namely when testing for trace inclusion, only two rocesses are involved and the te Verication of Communicating Processes in the Event of Interface Dierence Jonathan Burton and Maciej Koutny Deartment of Comuting Science, University of Newcastle, Newcastle uon Tyne NE1 7RU, U.K. fj.i.burton,

More information

1 Gambler s Ruin Problem

1 Gambler s Ruin Problem Coyright c 2017 by Karl Sigman 1 Gambler s Ruin Problem Let N 2 be an integer and let 1 i N 1. Consider a gambler who starts with an initial fortune of $i and then on each successive gamble either wins

More information

The non-stochastic multi-armed bandit problem

The non-stochastic multi-armed bandit problem Submitted for journal ublication. The non-stochastic multi-armed bandit roblem Peter Auer Institute for Theoretical Comuter Science Graz University of Technology A-8010 Graz (Austria) auer@igi.tu-graz.ac.at

More information

Optimism, Delay and (In)Efficiency in a Stochastic Model of Bargaining

Optimism, Delay and (In)Efficiency in a Stochastic Model of Bargaining Otimism, Delay and In)Efficiency in a Stochastic Model of Bargaining Juan Ortner Boston University Setember 10, 2012 Abstract I study a bilateral bargaining game in which the size of the surlus follows

More information

John Weatherwax. Analysis of Parallel Depth First Search Algorithms

John Weatherwax. Analysis of Parallel Depth First Search Algorithms Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel

More information

Statics and dynamics: some elementary concepts

Statics and dynamics: some elementary concepts 1 Statics and dynamics: some elementary concets Dynamics is the study of the movement through time of variables such as heartbeat, temerature, secies oulation, voltage, roduction, emloyment, rices and

More information

The π-calculus Semantics. Equivalence and Value-Passing. Infinite Sums 4/12/2004

The π-calculus Semantics. Equivalence and Value-Passing. Infinite Sums 4/12/2004 The π-calculus Semantics Overview ate and early semantics Bisimulation and congruence Variations of the calculus eferences obin Milner, Communicating and Mobil Systems Davide Sangiorgi and David Walker,

More information

Inequalities for the L 1 Deviation of the Empirical Distribution

Inequalities for the L 1 Deviation of the Empirical Distribution Inequalities for the L 1 Deviation of the Emirical Distribution Tsachy Weissman, Erik Ordentlich, Gadiel Seroussi, Sergio Verdu, Marcelo J. Weinberger June 13, 2003 Abstract We derive bounds on the robability

More information

Topic 7: Using identity types

Topic 7: Using identity types Toic 7: Using identity tyes June 10, 2014 Now we would like to learn how to use identity tyes and how to do some actual mathematics with them. By now we have essentially introduced all inference rules

More information

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar

Topic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar 15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider

More information

Sets of Real Numbers

Sets of Real Numbers Chater 4 Sets of Real Numbers 4. The Integers Z and their Proerties In our revious discussions about sets and functions the set of integers Z served as a key examle. Its ubiquitousness comes from the fact

More information

1-way quantum finite automata: strengths, weaknesses and generalizations

1-way quantum finite automata: strengths, weaknesses and generalizations 1-way quantum finite automata: strengths, weaknesses and generalizations arxiv:quant-h/9802062v3 30 Se 1998 Andris Ambainis UC Berkeley Abstract Rūsiņš Freivalds University of Latvia We study 1-way quantum

More information

A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS. 1. Abstract

A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS. 1. Abstract A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS CASEY BRUCK 1. Abstract The goal of this aer is to rovide a concise way for undergraduate mathematics students to learn about how rime numbers behave

More information

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks

Analysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks Analysis of Multi-Ho Emergency Message Proagation in Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) are attracting the attention of researchers, industry, and governments for their

More information

ABSTRACT MODEL REPAIR

ABSTRACT MODEL REPAIR ABSTRACT MODEL REPAIR GEORGE CHATZIELEFTHERIOU a, BORZOO BONAKDARPOUR b, PANAGIOTIS KATSAROS c, AND SCOTT A. SMOLKA d a Deartment of Informatics, Aristotle University of Thessaloniki, 54124 Thessaloniki,

More information

Solvability and Number of Roots of Bi-Quadratic Equations over p adic Fields

Solvability and Number of Roots of Bi-Quadratic Equations over p adic Fields Malaysian Journal of Mathematical Sciences 10(S February: 15-35 (016 Secial Issue: The 3 rd International Conference on Mathematical Alications in Engineering 014 (ICMAE 14 MALAYSIAN JOURNAL OF MATHEMATICAL

More information

CTL, the branching-time temporal logic

CTL, the branching-time temporal logic CTL, the branching-time temoral logic Cătălin Dima Université Paris-Est Créteil Cătălin Dima (UPEC) CTL 1 / 29 Temoral roerties CNIL Safety, termination, mutual exclusion LTL. Liveness, reactiveness, resonsiveness,

More information

A Reduction Theorem for the Verification of Round-Based Distributed Algorithms

A Reduction Theorem for the Verification of Round-Based Distributed Algorithms A Reduction Theorem for the Verification of Round-Based Distributed Algorithms Mouna Chaouch-Saad 1, Bernadette Charron-Bost 2, and Stehan Merz 3 1 Faculté des Sciences, Tunis, Tunisia, Mouna.Saad@fst.rnu.tn

More information

Approximating min-max k-clustering

Approximating min-max k-clustering Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost

More information

c Copyright by Helen J. Elwood December, 2011

c Copyright by Helen J. Elwood December, 2011 c Coyright by Helen J. Elwood December, 2011 CONSTRUCTING COMPLEX EQUIANGULAR PARSEVAL FRAMES A Dissertation Presented to the Faculty of the Deartment of Mathematics University of Houston In Partial Fulfillment

More information

Fault Tolerant Quantum Computing Robert Rogers, Thomas Sylwester, Abe Pauls

Fault Tolerant Quantum Computing Robert Rogers, Thomas Sylwester, Abe Pauls CIS 410/510, Introduction to Quantum Information Theory Due: June 8th, 2016 Sring 2016, University of Oregon Date: June 7, 2016 Fault Tolerant Quantum Comuting Robert Rogers, Thomas Sylwester, Abe Pauls

More information

Re-entry Protocols for Seismically Active Mines Using Statistical Analysis of Aftershock Sequences

Re-entry Protocols for Seismically Active Mines Using Statistical Analysis of Aftershock Sequences Re-entry Protocols for Seismically Active Mines Using Statistical Analysis of Aftershock Sequences J.A. Vallejos & S.M. McKinnon Queen s University, Kingston, ON, Canada ABSTRACT: Re-entry rotocols are

More information

Radial Basis Function Networks: Algorithms

Radial Basis Function Networks: Algorithms Radial Basis Function Networks: Algorithms Introduction to Neural Networks : Lecture 13 John A. Bullinaria, 2004 1. The RBF Maing 2. The RBF Network Architecture 3. Comutational Power of RBF Networks 4.

More information

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests

System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests 009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract

More information

ECON Answers Homework #2

ECON Answers Homework #2 ECON 33 - Answers Homework #2 Exercise : Denote by x the number of containers of tye H roduced, y the number of containers of tye T and z the number of containers of tye I. There are 3 inut equations that

More information

Chapter 1: PROBABILITY BASICS

Chapter 1: PROBABILITY BASICS Charles Boncelet, obability, Statistics, and Random Signals," Oxford University ess, 0. ISBN: 978-0-9-0005-0 Chater : PROBABILITY BASICS Sections. What Is obability?. Exeriments, Outcomes, and Events.

More information

Bayesian System for Differential Cryptanalysis of DES

Bayesian System for Differential Cryptanalysis of DES Available online at www.sciencedirect.com ScienceDirect IERI Procedia 7 (014 ) 15 0 013 International Conference on Alied Comuting, Comuter Science, and Comuter Engineering Bayesian System for Differential

More information

Matching Partition a Linked List and Its Optimization

Matching Partition a Linked List and Its Optimization Matching Partition a Linked List and Its Otimization Yijie Han Deartment of Comuter Science University of Kentucky Lexington, KY 40506 ABSTRACT We show the curve O( n log i + log (i) n + log i) for the

More information

Elements of Asymptotic Theory. James L. Powell Department of Economics University of California, Berkeley

Elements of Asymptotic Theory. James L. Powell Department of Economics University of California, Berkeley Elements of Asymtotic Theory James L. Powell Deartment of Economics University of California, Berkeley Objectives of Asymtotic Theory While exact results are available for, say, the distribution of the

More information

MATH 2710: NOTES FOR ANALYSIS

MATH 2710: NOTES FOR ANALYSIS MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite

More information

Lecture 21: Quantum Communication

Lecture 21: Quantum Communication CS 880: Quantum Information Processing 0/6/00 Lecture : Quantum Communication Instructor: Dieter van Melkebeek Scribe: Mark Wellons Last lecture, we introduced the EPR airs which we will use in this lecture

More information

Convex Optimization methods for Computing Channel Capacity

Convex Optimization methods for Computing Channel Capacity Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem

More information

#A47 INTEGERS 15 (2015) QUADRATIC DIOPHANTINE EQUATIONS WITH INFINITELY MANY SOLUTIONS IN POSITIVE INTEGERS

#A47 INTEGERS 15 (2015) QUADRATIC DIOPHANTINE EQUATIONS WITH INFINITELY MANY SOLUTIONS IN POSITIVE INTEGERS #A47 INTEGERS 15 (015) QUADRATIC DIOPHANTINE EQUATIONS WITH INFINITELY MANY SOLUTIONS IN POSITIVE INTEGERS Mihai Ciu Simion Stoilow Institute of Mathematics of the Romanian Academy, Research Unit No. 5,

More information

On a Markov Game with Incomplete Information

On a Markov Game with Incomplete Information On a Markov Game with Incomlete Information Johannes Hörner, Dinah Rosenberg y, Eilon Solan z and Nicolas Vieille x{ January 24, 26 Abstract We consider an examle of a Markov game with lack of information

More information

Models of Concurrency

Models of Concurrency Models of Concurrency GERARDO SCHNEIDER UPPSALA UNIVERSITY DEPARTMENT OF INFORMATION TECHNOLOGY UPPSALA, SWEDEN Thanks to Frank Valencia Models of Concurrency p.1/57 Concurrency is Everywhere Concurrent

More information

Estimation of the large covariance matrix with two-step monotone missing data

Estimation of the large covariance matrix with two-step monotone missing data Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo

More information

Chapter 1 Fundamentals

Chapter 1 Fundamentals Chater Fundamentals. Overview of Thermodynamics Industrial Revolution brought in large scale automation of many tedious tasks which were earlier being erformed through manual or animal labour. Inventors

More information

On generalizing happy numbers to fractional base number systems

On generalizing happy numbers to fractional base number systems On generalizing hay numbers to fractional base number systems Enriue Treviño, Mikita Zhylinski October 17, 018 Abstract Let n be a ositive integer and S (n) be the sum of the suares of its digits. It is

More information

Uncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning

Uncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning TNN-2009-P-1186.R2 1 Uncorrelated Multilinear Princial Comonent Analysis for Unsuervised Multilinear Subsace Learning Haiing Lu, K. N. Plataniotis and A. N. Venetsanooulos The Edward S. Rogers Sr. Deartment

More information

Positive decomposition of transfer functions with multiple poles

Positive decomposition of transfer functions with multiple poles Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.

More information

1. INTRODUCTION. Fn 2 = F j F j+1 (1.1)

1. INTRODUCTION. Fn 2 = F j F j+1 (1.1) CERTAIN CLASSES OF FINITE SUMS THAT INVOLVE GENERALIZED FIBONACCI AND LUCAS NUMBERS The beautiful identity R.S. Melham Deartment of Mathematical Sciences, University of Technology, Sydney PO Box 23, Broadway,

More information

Recursive equations in higher-order process calculi

Recursive equations in higher-order process calculi Theoretical Computer Science 266 (2001) 839 852 www.elsevier.com/locate/tcs Recursive equations in higher-order process calculi Mingsheng Ying a; ;1, Martin Wirsing b a State Key Laboratory of Intelligent

More information

Distributed Rule-Based Inference in the Presence of Redundant Information

Distributed Rule-Based Inference in the Presence of Redundant Information istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced

More information

TRACES OF SCHUR AND KRONECKER PRODUCTS FOR BLOCK MATRICES

TRACES OF SCHUR AND KRONECKER PRODUCTS FOR BLOCK MATRICES Khayyam J. Math. DOI:10.22034/kjm.2019.84207 TRACES OF SCHUR AND KRONECKER PRODUCTS FOR BLOCK MATRICES ISMAEL GARCÍA-BAYONA Communicated by A.M. Peralta Abstract. In this aer, we define two new Schur and

More information

Introduction Consider a set of jobs that are created in an on-line fashion and should be assigned to disks. Each job has a weight which is the frequen

Introduction Consider a set of jobs that are created in an on-line fashion and should be assigned to disks. Each job has a weight which is the frequen Ancient and new algorithms for load balancing in the L norm Adi Avidor Yossi Azar y Jir Sgall z July 7, 997 Abstract We consider the on-line load balancing roblem where there are m identical machines (servers)

More information

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging

Optimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging 1 Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie, Member, IEEE, arxiv:1401.0340v3 [cs.it] 27 Ar 2014

More information

The Semantics of Data Flow Diagrams. P.D. Bruza. Th.P. van der Weide. Dept. of Information Systems, University of Nijmegen

The Semantics of Data Flow Diagrams. P.D. Bruza. Th.P. van der Weide. Dept. of Information Systems, University of Nijmegen The Seantics of Data Flow Diagras P.D. Bruza Th.P. van der Weide Det. of Inforation Systes, University of Nijegen Toernooiveld, NL-6525 ED Nijegen, The Netherlands July 26, 1993 Abstract In this article

More information

Fibration of Toposes PSSL 101, Leeds

Fibration of Toposes PSSL 101, Leeds Fibration of Tooses PSSL 101, Leeds Sina Hazratour sinahazratour@gmail.com Setember 2017 AUs AUs as finitary aroximation of Grothendieck tooses Pretooses 1 finite limits 2 stable finite disjoint coroducts

More information

Mobius Functions, Legendre Symbols, and Discriminants

Mobius Functions, Legendre Symbols, and Discriminants Mobius Functions, Legendre Symbols, and Discriminants 1 Introduction Zev Chonoles, Erick Knight, Tim Kunisky Over the integers, there are two key number-theoretic functions that take on values of 1, 1,

More information

Strong bisimilarity can be opened

Strong bisimilarity can be opened Strong bisimilarity can be opened Henning E. Andersen Hans Hüttel Karina N. Jensen June 7, 2002 Abstract We present an extension of the semantics of the π-calculus without match where strong bisimilarity

More information

On Code Design for Simultaneous Energy and Information Transfer

On Code Design for Simultaneous Energy and Information Transfer On Code Design for Simultaneous Energy and Information Transfer Anshoo Tandon Electrical and Comuter Engineering National University of Singaore Email: anshoo@nus.edu.sg Mehul Motani Electrical and Comuter

More information

Additive results for the generalized Drazin inverse in a Banach algebra

Additive results for the generalized Drazin inverse in a Banach algebra Additive results for the generalized Drazin inverse in a Banach algebra Dragana S. Cvetković-Ilić Dragan S. Djordjević and Yimin Wei* Abstract In this aer we investigate additive roerties of the generalized

More information

Analysis of some entrance probabilities for killed birth-death processes

Analysis of some entrance probabilities for killed birth-death processes Analysis of some entrance robabilities for killed birth-death rocesses Master s Thesis O.J.G. van der Velde Suervisor: Dr. F.M. Sieksma July 5, 207 Mathematical Institute, Leiden University Contents Introduction

More information

Wojciech Penczek. Polish Academy of Sciences, Warsaw, Poland. and. Institute of Informatics, Siedlce, Poland.

Wojciech Penczek. Polish Academy of Sciences, Warsaw, Poland. and. Institute of Informatics, Siedlce, Poland. A local approach to modal logic for multi-agent systems? Wojciech Penczek 1 Institute of Computer Science Polish Academy of Sciences, Warsaw, Poland and 2 Akademia Podlaska Institute of Informatics, Siedlce,

More information

On Doob s Maximal Inequality for Brownian Motion

On Doob s Maximal Inequality for Brownian Motion Stochastic Process. Al. Vol. 69, No., 997, (-5) Research Reort No. 337, 995, Det. Theoret. Statist. Aarhus On Doob s Maximal Inequality for Brownian Motion S. E. GRAVERSEN and G. PESKIR If B = (B t ) t

More information

Multi-Operation Multi-Machine Scheduling

Multi-Operation Multi-Machine Scheduling Multi-Oeration Multi-Machine Scheduling Weizhen Mao he College of William and Mary, Williamsburg VA 3185, USA Abstract. In the multi-oeration scheduling that arises in industrial engineering, each job

More information

Optimal Design of Truss Structures Using a Neutrosophic Number Optimization Model under an Indeterminate Environment

Optimal Design of Truss Structures Using a Neutrosophic Number Optimization Model under an Indeterminate Environment Neutrosohic Sets and Systems Vol 14 016 93 University of New Mexico Otimal Design of Truss Structures Using a Neutrosohic Number Otimization Model under an Indeterminate Environment Wenzhong Jiang & Jun

More information

Laboratoire de l Informatique du Parallélisme

Laboratoire de l Informatique du Parallélisme Laboratoire de l Informatique du Parallélisme Ecole Normale Suérieure de Lyon Unité de recherche associée au CNRS n 1398 Asynchronous Sub-Logarithmic Adders J.M. Muller, A. Tisserand and J.M. Vincent May

More information

Memoryfull Branching-Time Logic

Memoryfull Branching-Time Logic Memoryfull Branching-Time Logic Orna Kuferman 1 and Moshe Y. Vardi 2 1 Hebrew University, School of Engineering and Comuter Science, Jerusalem 91904, Israel Email: orna@cs.huji.ac.il, URL: htt://www.cs.huji.ac.il/

More information

Really Visual Temporal Reasoning. Y S Ramakrishna, P M Melliar-Smith, L E Moser, L K Dillon, G Kutty

Really Visual Temporal Reasoning. Y S Ramakrishna, P M Melliar-Smith, L E Moser, L K Dillon, G Kutty Really Visual Temoral Reasoning Y S Ramakrishna, P M Melliar-Smith, L E Moser, L K Dillon, Kutty Deartment of Electrical and Comuter Engineering and Deartment of Comuter Science University of California,

More information

Unsupervised Hyperspectral Image Analysis Using Independent Component Analysis (ICA)

Unsupervised Hyperspectral Image Analysis Using Independent Component Analysis (ICA) Unsuervised Hyersectral Image Analysis Using Indeendent Comonent Analysis (ICA) Shao-Shan Chiang Chein-I Chang Irving W. Ginsberg Remote Sensing Signal and Image Processing Laboratory Deartment of Comuter

More information

An Introduction to Information Theory: Notes

An Introduction to Information Theory: Notes An Introduction to Information Theory: Notes Jon Shlens jonshlens@ucsd.edu 03 February 003 Preliminaries. Goals. Define basic set-u of information theory. Derive why entroy is the measure of information

More information

LEIBNIZ SEMINORMS IN PROBABILITY SPACES

LEIBNIZ SEMINORMS IN PROBABILITY SPACES LEIBNIZ SEMINORMS IN PROBABILITY SPACES ÁDÁM BESENYEI AND ZOLTÁN LÉKA Abstract. In this aer we study the (strong) Leibniz roerty of centered moments of bounded random variables. We shall answer a question

More information

The Fekete Szegő theorem with splitting conditions: Part I

The Fekete Szegő theorem with splitting conditions: Part I ACTA ARITHMETICA XCIII.2 (2000) The Fekete Szegő theorem with slitting conditions: Part I by Robert Rumely (Athens, GA) A classical theorem of Fekete and Szegő [4] says that if E is a comact set in the

More information

2 K. ENTACHER 2 Generalized Haar function systems In the following we x an arbitrary integer base b 2. For the notations and denitions of generalized

2 K. ENTACHER 2 Generalized Haar function systems In the following we x an arbitrary integer base b 2. For the notations and denitions of generalized BIT 38 :2 (998), 283{292. QUASI-MONTE CARLO METHODS FOR NUMERICAL INTEGRATION OF MULTIVARIATE HAAR SERIES II KARL ENTACHER y Deartment of Mathematics, University of Salzburg, Hellbrunnerstr. 34 A-52 Salzburg,

More information

Node-voltage method using virtual current sources technique for special cases

Node-voltage method using virtual current sources technique for special cases Node-oltage method using irtual current sources technique for secial cases George E. Chatzarakis and Marina D. Tortoreli Electrical and Electronics Engineering Deartments, School of Pedagogical and Technological

More information

216 S. Chandrasearan and I.C.F. Isen Our results dier from those of Sun [14] in two asects: we assume that comuted eigenvalues or singular values are

216 S. Chandrasearan and I.C.F. Isen Our results dier from those of Sun [14] in two asects: we assume that comuted eigenvalues or singular values are Numer. Math. 68: 215{223 (1994) Numerische Mathemati c Sringer-Verlag 1994 Electronic Edition Bacward errors for eigenvalue and singular value decomositions? S. Chandrasearan??, I.C.F. Isen??? Deartment

More information