Figure 4: Expansion of (S b jt jc 1 jc 2 jr b ) n L. def. def. def. P T ABP as given in section 5, we can conclude
|
|
- Lydia Dean
- 6 years ago
- Views:
Transcription
1 (S b jt jc 1 jc 2 jr b ) n L A B C T accet:a n L where = (S 0 b jt jc 1jC 2 jr b ) T :(send S;b :start:s 00 b jt jc 1jC 2 jr b ) T ::(start:s 00 b jt jh0; send R;b:C 1 + :C 1 i s jc 2 jr b ) T :::(R 00 b jhsto:t ; timeout:t i tjh0; send R;b :C 1 + :C 1 i s jc 2 jr b ) T ::h0; (S 00 b jhsto:t ; timeout:t i t0sjsend R;b :C 1 + :C 1 jc 2 jr b )i s T h0; :B + :Ci s = (S 00 b jhsto:t ; timeout:t i t0sjc 1 jc 2 jdeliver:ack R;b :Rb ) deliver:d T = (S 00 b jhsto:t ; timeout:t i t0sjc 1 jc 2 jr b ) T h0; (ack S;b :sto:sb + ack S;b :S00 b + timeout:s0 b jtimeout:t jc 1jC 2 jr b )i t0s D E F G T h0; Ai t0s = (S 00 b jhsto:t ; timeout:t i t0sjc 1 jc 2 jack R;b :R b ) T :(S 00 b jhsto:t ; timeout:t i t0sjc 1 jh0; ack S;b :C 2 + :C 2 i a jrb ) T :h0; (S 00 b jhsto:t ; timeout:t i t0(s+a)jc 1 jack S;b :C 2 + :C 2 jrb )i a T h0; :E + :F i a = (S 00 b jhsto:t ; timeout:t i t0(s+a)jc 1 jack R;b :C 2 jrb ) T :(sto:sb jhsto:t ; timeout:t i t0(s+a)jc 1 jc 2 jrb ) T Sb jt jc 1jC 2 jrb = (S 00 b jhsto:t ; timeout:t i t0(s+a)jc 1 jc 2 jrb ) T h0; Gi t0(s+a) = (S 0 b jt jc 1jC 2 jrb ) T h0; :h0; :E + :F i a + :h0; Gi t0s i s Figure 4: Exansion of (S b jt jc 1 jc 2 jr b ) n L where L = fsend S;b ; send R;b ; send ; send ; S;b R;b ack S;b ; ack R;b ; ack ; ack ; start; sto; S;b timeoutg. R;b Using the timed strong equivalence and timed observation equivalence, we derive an exansion of (S b jtjc 1 jc 2 jr b ) n L as shown in Figure 4. Exression A follows directly from Corollary 1, while A T h0; :B + :Ci s is derived from Proosition 5. Derivations of exressions B to G are similar to that of A. From Figure 4, we can transform (S b jtjc 1 jc 2 jr b )nl into a timed observation equivalent exression P as follows: P A G = accet:a = h0; :deliver:h0; :P + :h0; Gi t0(s+a) i a + :h0; Ai t0s i s = h0; :h0; :A + :h0; Gi t0(s+a) i a + :h0; Gi t0s i s Furthermore, since it can be easily shown that P T ABP as given in section 5, we can conclude that ABP is timed observation equivalent to (S b jt jc 1 jc 2 jr b ) n L. (S b jt jc 1 jc 2 jr b ) n L T P where
2 P + Q = Q + P P + (Q + R) = (P + Q) + R P + P = P P + 0 = P (P + Q) n L = P n L + Q n L (:P ) n L = (P + Q)[f] = P [f] + Q[f] (:P )[f] = f():p [f] 8 < : 0 if 2 L [ L :P n L otherwise h:p ; :P i t = :P h:p + Q; Ri t = :P + Q (t > 0) hp; Qi 0 = Q hhp; Qi s ; Ri t = 8 < : hp; Ri t (s t) hp; hq; Ri t0s i s (s < t) hp; Q + Ri t = hp; Qi t + hp; Ri t hp + Q; Ri t = hp; Ri t + hq; Ri t hp; Qi t [f] = hp [f]; Q[f]i t hp; Ri t n L = hp n L; Q n Li t P jq = QjP P j(qjr) = (P jq)jr P j0 = P P jq = P i = j :(P i jq j ) + P i2i i:(p i jq) + P j2j j:(p jq j ) where P P i2i i:p i and Q P j2j j:q j P jq = h P i = j :(P i jq j ) + P i2i i:(p i jq) + P j2j j:(p jq j ) ; P 0 jqi 1 where P h P i2i i:p i ; P 0 i 1 and Q P j2j j:q j P jq = h P i = j :(P i jq j ) + P i2i i:(p i jq) + P j2j j:(p jq j ) ; P 0 jq 0 i 1 where P h P i2i i:p i ; P 0 i 1 and Q h P j2j j:q j ; Q 0 i 1 Figure 3: Equational Proof System based on T Proosition 10 For each P 2 P, there exists a normal form P 0 such P = P 0. Proof. By structural induction on P. Lemma 1 1. If P T Q where P is in NF 6 and Q is in NF, then Q is in NF If P T Q where P is in NF hi and Q is in NF, then Q is in NF hi. Proof. The structure of NF 6 rocesses cannot be transformed by and any NF hi rocess transforms its structure by. Theorem 2 (Comleteness) If P T P; Q 2 P, then P = Q. Q where Proof. Assume that P T Q. By roosition 10, we can nd normal form rocesses P 0 and Q 0 where P = P 0 and Q = Q 0. By lemma 1, both P 0 and Q 0 must be in NF 6 or both P 0 and Q 0 must be in NF hi. Hence we have that P = Q. Aendix B In this aendix we resent a rather detailed descrition of the behavior and timing of the Alternating Bit Protocol as given in section 5 under the assumtion that s + a < t. The whole rotocol is reresented as a arallel comosition of the ve comonent as follows: (S b jt jc 1 jc 2 jr b ) n L
3 In roceedings of the 11th IEEE Real-Time Systems Symosium, [6] Hennessy, M. and Regan, T., A Temoral Process Algebra, Technical Reort 2/90, University of Sussex, 1990 [7] Hoare, C. A. R., Communicating Sequential Processes, Prentice Hall, [8] Honda, K., and Tokoro, M., An Object Calculus for Asynchronous Communication, In roceedings of ECOOP'91, LNCS 512, [9] Ishikawa, Y., Tokuda, H., and Mercer, C. W., Object-Oriented Real-Time Language Design: Construction for Timing Constraints, In roceedings of ECOOP/OOPSLA'90, [10] Milner, R., Calculi for Synchrony and Asynchrony, Theoretical Comuter Science, Vol.25, [11] Milner, R., Communication and Concurrency, Prentice Hall, [12] Milner, R., A Comlete Axiomatization for Observational Congruence of Finite Behavior, Information and Comutation, Vol.81, [13] Milner, R., Parrow, J., and Walker, D., A Calculus of Mobile Processes Part 1 & 2, Technical reort ECS-LFCS & 86, University of Edinburgh, [14] Moller, F., and Tofts, C., A Temoral Calculus of Communicating Systems, In roceedings of CON- CUR'90, LNCS 458, [15] Najm, E., and Stefani, J. B., Object-Based Concurrency: A Process Calculus Analysis, In roceedings of TAPSOFT'91, LNCS 493, [16] Nicollin, X., and Sifakis, J., The Algebra of Timed Process ATP: Theory and Alications, IMAG Technical Reort, RT-C26, [17] Nierstrasz, O. M., and Paathomas, M., Viewing Objects as Patterns of Communicating Agents, In roceedings of ECOOP/OOPSLA'90, [18] Nierstrasz, O. M., Towards an Object Calculus, In roceedings of ECOOP'91 Worksho on Concurrent Object-Based Concurrent Comuting, LNCS 612, [19] Satoh, I., and Tokoro, M., A Formal Descrition and Verication for Parallel Comuting with Timed Constraints, In roceeding of Joint Symosium Parallel Processing'92, June, (in Jaanese) [20] Satoh, I., and Tokoro, M., Timed Process Calculus Semantics for A Real-Timed Concurrent Object- Oriented Language, Technical Reort, Det. Comuter Science, Keio University, February, [21] Takashio, K., and Tokoro, M., DROL: An Object- Orinted Programming Language for Distributed Real-time Systems, In roceedings of ACM OOP- SLA'92, October, [22] Walker, D., -Calculus Semantics of Object- Oriented Programming Languages, In roceedings of Theoretical Asects of Comuter Software, LNCS 526, [23] Yi, W., CCS + Time = an Interleaving Model for Real Time Systems, In roceedings of Automata, Languages and Programming'91, LNCS 510, [24] Yonezawa, A., and Tokoro, M., editors, Object- Oriented Concurrent Programming, MIT Press, Aendix A In this aendix, we develo a sound and comlete equational roof system based on timed strong equivalence. We rst restrict our attention to the non-recursive nite rocess exressions. The equational system for RtCCS is dened in Figure 3. We shall use \=" to denote derivability in our equational system, and \" to denote syntactical identity. It can be easily shown that the equational rocesses in Figure 3 are timed strongly equivalent. Therefore, we get the following result. Theorem 1 (Soundness) If P = Q where P; Q 2 P, then P T Q. Proof. Obvious according to the roositions 1 to 3, and Corollary 1. Next, we want to show that the system is comlete. We can accomlish this by using the following normal forms. Denition 7 A normal form (NF) is dened inductively by: (i) A rocess is in normal form if it is in NF 6 or NF hi. (ii) A rocess is in NF6 if it is of the form P 0in i:p i where each P i is in NF. (iii) A rocess is in NF hi if it is of the form hp; Qi 1 where P is in NF 6 and Q is in NF.
4 the sender, the receiver, the two channels, and the timer, as follows: (S b jt jc 1 jc 2 jr b ) n L where L = fsend S;b ; send ; send S;b R;b; send ; R;b ack S;b ; ack S; b b ; ack R;b ; ack R; b b ; start; sto; timeoutg By using timed bisimilarity, we transform (S b jtjc 1 jc 2 jr b )nl into a timed observation equivalent exression ABP, which is a sequential rocess: ABP ABP 0 (S b jt jc 1 jc 2 jr b ) n L T ABP where = accet:abp 0 = :h0; deliver: X i0 + :h0; ABP 0 i t h0; ABPi i2t+a i s We resent the roof of this transformation in Aendix B. By using the simler exression, we can not only investigate the behavior of the rotocol but also temoral roerties, such as the minimal and maximal delay for delivering a message. With secications based on RtCCS, we can derive the behavior and timing of whole systems from the descrition of its comonents. Timed bisimilarities allows us to analyze systems through timed and behaviorally equivalent rocesses which may have substantially less comlexity in their structure. 6 Conclusion We have dened a formal model called RtCCS for real-time object-oriented comutations. RtCCS is an extension of Milner's CCS by introducing a tick action and a timeout oerator. It can formally describe the asects of time deendence in realtime systems and enjoy many leasant roerties of CCS. We have introduced two timed equivalences based on CCS's bisimulation: timed strong equivalence and timed observation equivalence. The equivalences rovide a formal framework for analyzing the behavior and timing of real-time comutations. We have resented examles that demonstrate the exressiveness and the roof method of RtCCS. Furthermore, we have given a sound and comlete equational roof system based on timed strong equivalence in aendix. As an alication of RtCCS, we are resently develoing on the semantics of real-time objectoriented languages, such as DROL [21]. The semantics is dened by translation rules from the syntactical constructions of the languages into RtCCS rocess exressions, also used as a static verication model for real-time rograms. Details are resented in [19]. We are also interested in investigating whether an axiomatization based on observation congruence [12] can be alied to RtCCS, and whether other rocess equivalences such as distributed bisimulation [3] and testing equivalence [4] can be adoted by RtCCS. Acknowledgements We are grateful to P. Wegner, and K. Takashio for useful discussions. We would like to thank Y. Ishikawa and K. Honda for suggestions at the early stage of this work. We thank V. Vasconcelos, and T. Minohara for comments on an earlier version of this aer. References [1] America, P., de Bakker, J., Kok, J., and Rutten, J., Oerational Semantics of a Parallel Object- Oriented Language, In roceedings of ACM POPL, [2] Beaten, J. C. M, and Bergstra, J. A, Process Algebra, Cambridge University Press [3] Castellani, H., Hennessy, M., Distributed Bisimulation, Journal of ACM, Vol.36, No.4, [4] de Nicola, R. and Hennessy, M., Testing equivalence for rocesses, Theoretical Comuter Science, Vol.34, [5] Hansson, H. and Jonsson, B., A Calculus of Communicating Systems with Time and Probabilities,
5 Remarks It seems that we can always assume that if P Q (or P Q) holds in CCS, then P T Q (or P T Q) holds in RtCCS. There is however a counterexamle: unguarded recursion exressions, e.g., rec X : X exression. This is because in RtCCS such exressions are not allowed. However, we think that such exressions are unrealizable in object-oriented comuting. 5 Examles In this section we resent two examles which illustrate the exressiveness and utility of RtCCS. Examle 2 A Timer Object We describe a timer object T in RtCCS as follows: T = start:hsto:t ; timeout:t i t Uon recetion of a request start to start the timer, it receives the amount t of and then sends timeout. If it accets a request sto, the timer goes back to its initial state T. Examle 3 Verication of Timed Systems In order to illustrate how to describe and verify systems in RtCCS we describe the Alternating Bit Protocol for OSI data link layer. There are ve comonents: the sender, the receiver, the two unreliable channels, and the timer. To nd out dulicate messages or acknowledgments, messages and acknowledgements are sent tagged with bits 0 and 1 alternately. Uon recetion of a request to send a message (accet), the sender sends it tagged with an aroriate bit b (send S;b ) to the channel. It then waits for an aroriate acknowledgement (ack R;b ). If the acknowledgement cannot be received within a secied eriod of time, the sender retransmits the message. The two channels are unreliable. They may occasionally lose a message or an acknowledgement. The receiver waits for a message (send R;b or send, where b R;b is the comlement of b) and then it sends an acknowledgement to the channel (ack R;b or ack R;b ). If it accets a message tagged with an aroriate bit, it sends the message to the environment (deliver). The sender S has the following denition. S b S 0 b S 00 b S b S 0 b Sb 00 = accet:s 0 b = send S;b :start:s 00 b = ack S;b :sto:sb + ack S;b :S00 b + timeout:s 0 b = accet:s 0 b = send S;b :start:s00 b = ack S;b :sto:s b + ack S;b :S 00 b b + timeout:s 0 b b The timer T has the following denition, where t is the timeout time. T = start:hsto:t ; timeout:t i t The channel C 1 has the following denition, where s is the transmission time for a message. C 1 = send S;b :h0; send R;b :C 1 + :C 1 i s + send S;b :h0; send R;b :C 1 + :C 1 i s The channel C 2 has the following denition, where a is the transmission time for an acknowledgement. C 2 = ack R;b :h0; ack S;b :C 2 + :C 2 i a + ack R;b :h0; ack S;b :C 2 + :C 2 i a The receiver R has the following denition. R b R b = send R;b :deliver:ack R;b :R b + send R;b :ack R;b :R b = send R;b :deliver:ack R;b :R b + send R;b :ack R;b :R b We resent the behavior of the whole rotocol under the assumtion that s + a < t. The rotocol is constructed by the arallel comosition of
6 4.2 Timed Observation Equivalence The timed strong equivalence has several useful algebraic roerties but gives no secial status to the internal action which indeed should not be observed. We resent a weaker equivalence which reects the observation of behaviors and timing in the comutation. Denition 5 A binary relation S P 2 P is a timed weak bisimulation if (P; Q) 2 S imlies, for all 2 Act T, (i) 8P 0 : P =) P 0 9Q 0 : Q =) Q 0 ^ P 0 T Q 0. (ii) 8Q 0 : Q =) Q 0 9P 0 : P =) P 0 ^ P 0 T Q 0. (iii) P " i Q ". We write P = T Q if P and Q are timed observation congruent. Proosition 6 If P T Q and both rocesses are stable 2, then P = T Q. Proof. Direct from Denition 5 and 6. (i) 8P 0 : P (ii) 8Q 0 : Q =) P 0 9Q 0 : Q =) b Q 0 ^ (P 0 ; Q 0 ) 2 S. =) Q 0 9P 0 : P =) b P 0 ^ (P 0 ; Q 0 ) 2 S. Proosition 7 For all P; Q 2 P, if P T P = T Q, and if P = T Q then P T Q. Q then Let \ T " denote the largest timed weak bisimulation, and call P and Q timed observation equivalent if P T Q. Intuitively, if P and Q are timed observation equivalent, each action of P must be matched by a sequence of actions of Q with the same visible contents and timing, and conversely. The equivalence can equate objects that are not distinguishable by the observable behavior and the timing in the comutations. Proosition 5 1. :P T P 2. ::P T :P 3. :P + P T :P 4. :(:P + Q) T :(:P + Q) + :Q 5. h:p ; Qi t T P (t > 0) 6. hp; :Qi t T hp; Qi t 7. h:p ; :h:p ; Qi s i t T h:p ; Qi s+t Proof. Easy alication of Denition 5. Like a weak equivalence in CCS, T is not a congruence relation. However, we can dene a timed observation congruence relation based on the timed observation equivalence. Denition 6 P and Q are timed observation congruent if for all 2 Act T Proof. By Denition 4 to 6, clearly = T lies between T and T. Intuitively, if P T Q and both have no - derivative, then P = T Q. Therefore, we can easily rove the following roerties. Proosition 8 1. ::P = T :P 2. :P + P = T :P 3. :(:P + Q) = T :(:P + Q) + :Q 4. hp; :Qi t = T hp; Qi t (t > 0) 5. h:p ; :h:p ; Qi s i t = T h:p ; Qi s+t Proof. Use Proosition 5 and 6. Proosition 9 (Congruence) Timed observation congruence = T is reserved by all oerators. Proof. Same as Proosition 4. = T is a congruence relation and very close to timed observation equivalence. We grantee that if two objects are timed observation congruent, they are substitutable for each other even though their internal imlementations are dierent. 2 P is stable if P 0! P 0 is imossible for all P 0.
7 2. h:p ; h:p ; Qi t i s T h:p ; Qi s+t 3. h:p + Q; Ri t T :P + Q (t > 0) 4. hp; Qi t n L T hp n L; Q n Li t 5. hp; Qi t [f] T hp [f]; Q[f]i t 6. hp; Q + Ri t T hp; Qi t + hp; Ri t 7. hp + Q; Ri t T hp; Ri t + hq; Ri t 8. hhp; Qi s ; Ri t T hp; Rit (s t) hp; hq; Ri t0s i s (s < t) Proof. All the laws may be roved by exhibiting aroriate timed strong bisimulations. The hardest is (8) of Proosition 3 in the case of (s < t) which we rove as follows: We need to show that S is a timed strong bisimulation, where f ( hhp 1 ; P 2 i s ; P 3 i t ; hp 1 ; hp 2 ; P 3 i t0s i s ) j 0 s < t; P 1 ; P 2 ; P 3 2 Pg. So let hhp 1 ; P 2 i s ; P 3 i t 0! Q 1 ; it is enough to nd Q 2 such that hp 1 ; hp 2 ; P 3 i t0s i s 0! Q 2 and (Q 1 ; Q 2 ) 2 S. There are two cases: Case 1 2 Act and P 1 0! P 0. By TIME 1 0, Q 1 P 0, and 1 Q 2 P 0, and we know 1 Q 1 Q 2. Case 2 =. Case 2.1 s = 0. We assume that P 2 0! P 0 2. By TIME 2, Q 1 hp 0 2 ; P 3i t01 and Q 2 hp 0 2 ; P 3i t01, hence Q 1 Q 2. Case 2.2 s > 0. We assume that P 10!P 0. 1 By TIME 1, Q 1 hhp 0 1 ; P 2i s01 ; P 3 i t01, and Q 2 hp 0 1 ; hp 2; P 3 i t0s i s01, and clearly (Q 1 ; Q 2 ) 2 S. By a symmetric argument, we comlete the roof. RtCCS, like CCS, is based on the concet of interleaving and can reduce concurrent rocesses to sequential rocesses in terms of nondeterminism, for examle, :0j:0 T ::0 + ::0. Corollary 1 The Exansion Laws 1. Let P P i2i i:p i and Q P j2j j:q j ; PjQ T Pi2I i:(p i jq) + P j2j j:(p jq j ) + P i = j :(P i jq j ) 2. Let P h P i2i i:p i ; P 0 i 1 and Q P j2j j:q j ; P jq T h P i2i i:(p i jq) + P j2j j:(p jq j ) + P i = j :(P i jq j ) ; P 0 jqi 1 3. Let P h P i2i i:p i ; P 0 i 1 and Q h P j2j j:q j ; Q 0 i 1 ; P jq T h P i2i i:(p i jq) + P j2j j:(p jq j ) + P i = j :(P i jq j ) ; P 0 jq 0 i 1 From the laws in Proosition 1, 2, 3, and Corollary 1, we can develo an equational roof system based on timed strong equivalence. The system is given in aendix A. Proosition 4 (Congruence) Timed strong equivalence T is reserved by all oerators. Proof. We show a roof only for the timeout oerator; the roofs for the other oerations are similar to the roofs of [11]. We will rove that hp 1 ; Qi t T hp 2 ; Qi t where P 1 ; P 2 ; Q 2 P and P 1 T P 2. It is enough to show that S = f(hp 1 ; Qi t ; hp 2 ; Qi t ) : P 1 T P 2 ; t 0g is a timed strong bisimulation. We assume hp 1 ; Qi t 0! R. There are two cases: Case 1 2 Act and P 1 0! P 0 1. Then because P 1 T P 2, we have 9P 0 : 2 P 2 0! P 0 2 with P 0 1 T P 0. Hence 2 hp 1; Qi t 0! P 0, 1 hp 2 ; Qi t 0! P 0, and clearly 2 P 0 1 T P 0. 2 Case 2 =. Case 2.1 t = 0. Obvious. Case 2.2 t > 0, P 1 0! P 0, and 1 hp 1; Qi t 0! hp 0 1 ; Qi t01. Then because P 1 T P 2, we have 9P 0 : 2 P 2 0! P 0 with 2 P 0 1 T P 0. Hence 2 hp 2; Qi t 0! hp 0 2 ; Qi t01 and (hp 0 1 ; Qi t01; hp 0 2 ; Qi t01) 2 S. By a symmetric argument, we comlete the roof. The roof for the other case of the timeout oerator, i.e. hq; P 1 i t T hq; P 2 i t where P 1 T P 2, is similar. By this roosition we guarantee that if two objects are timed strongly equivalent, the objects are substitutable for each other.
8 Examle 1 Here we give some simle examles of RtCCS exressions. (1) a:h b:p ; 0i t After erforming an inut action a, it behaves as P if an outut action b is executed within t units of time, otherwise terminates. (2) a:h0; b:p i t After erforming a, it is idle for t time units and then behaves as b:p. (3) a:(h0; b:0i d jp ) After erforming a, it behaves as P but b becomes available after d time units. Note that h0; b:0i d jp reresents a rocess which behaves as P and sends b as an asynchronous outut communication with transmission delay d time units. Remarks 1. The fundamental asects of concurrent objectoriented comuting are modeled as the rimitive constructions of RtCCS as follows: Objects as rocesses. Concurrency among objects as arallel comosition. Message assing as communication between rocesses. Encasulation in objects as restriction and relabeling. Also, we cature the fundamental asects of real-time comuting delayed rocessing and timeout handling, through the timeout oerator of RtCCS. 2. An external action cannot be erformed before its artner action in another rocess is ready to communicate. While a rocess having an external action is waiting for its artner action, it must erform actions. If a rocess has an executable communication (including ), it must erform the communication immediately, instead of idling. 4 Timed Bisimilarity In this section we resent two equivalences over rocesses, which are extensions of CCS's bisimulation with the notion of time. The equivalences rovide a formal framework for analyzing the behavior and timing of real-time object-oriented comutations. 4.1 Timed Strong Equivalence Denition 4 A binary relation S P 2 P is a timed strong bisimulation if (P; Q) 2 S imlies, for all 2 Act T, (i) 8P 0 : P 0! P 0 9Q 0 : Q 0! Q 0 ^ (P 0 ; Q 0 ) 2 S. (ii) 8Q 0 : Q 0! Q 0 9P 0 : P 0! P 0 ^ (P 0 ; Q 0 ) 2 S. We let \ T " denote the largest timed strong bisimulation, and call P and Q timed strongly equivalent if P T Q. Intuitively, if P and Q are timed strongly equivalent, they seem indistinguishable from one another in behavior and timing. We show some algebraic roerties of the equivalence: Proosition 1 1. P + Q T Q + P 2. P + (Q + R) T (P + Q) + R 3. P + P T P 4. P + 0 T P Proosition 2 1. P jq T QjP 2. P j(qjr) T (P jq)jr 3. P j0 T P 4. (P + Q) n L T P n L + Q n L 5. (:P ) n L T 0 if 2 L [ L :P n L otherwise 6. (P + Q)[f] T P [f] + Q[f] 7. (:P )[f] T f():p [f] Proosition 3 1. h:p ; :P i t T :P
9 where t is a natural number, f 2 Act! Act and L Act. We assume that f() =, f( ) =, and that X is always guarded 1 [11]. We denote the set of closed exressions by P( E), ranged over P; Q;.... The syntax of RtCCS is essentially the same as that of CCS, excet for the newly introduced tick action and timeout oerator. Intuitively, the meaning of rocess constructions are as follows: 0 reresents a deadlocked or terminated rocess; :E erforms an action and then behaves like E; E 1 + E 2 is the rocess which may behave as E 1 or E 2 ; E 1 je 2 reresents rocesses E 1 and E 2 executing concurrently; E[f] behaves like E but with the actions relabeled by function f; E n L behaves like E but with actions in L [ L rohibited; rec X : E binds the free occurrences of X in E but we shall often use the more readable notation X = E instead Oerational Semantics of RtCCS RtCCS is a labeled transition system h E; Act T ; f 0! j 2 Act T g i where 0! is a transition relation ( 0! E 2 E). The transition relation 0! is dened by structural induction and is the smallest relation given by the rules in Figure 2. The 0! relation does not distinguish between observable and unobservable actions. In order to reect that is not visible, we dene two transition relations due to the unobservability of. Denition 2 (i) P =) Q = P ( 0!) 3 0! ( 0!) 3 Q (ii) P =) b Q = P ( 0!) 3 0! ( 0!) 3 Q if 6= and otherwise P ( 0!) 3 Q. Also, we dene an oeration to denote a rocess caable of innite internal comutation. Denition 3 E " if 9E 0 : E( 0!)! E 0 1 X is guarded in E if each occurrence of X is only within some subexressions :E 0 in E; c.f. unguarded exressions, e.g. rec X : X or rec X : X + E. ACT 0 : 0 :E 0! E ACT 1 : 0 a:e 0! a:e ACT 2 : 0 0 0! 0 SUM 0 : E 0! E 0 E + F 0! E 0 SUM 1 : F 0! F 0 E + F 0! F 0 E SUM 2 : 0! E 0 ; F 0! F 0 E + F 0! E 0 + F 0 COM 0 : E 0! E 0 EjF 0! E 0 jf COM 1 : F 0! F 0 COM 2 : COM 3 : RES 0 : RES 1 : E EjF 0! EjF 0 E 0! a E 0 ; F 0! a F 0 EjF 0! E 0 jf 0 0! E 0 ; F 0! F 0 ; EjF 0! 6 EjF 0! E 0 jf 0 E 0! E 0 ; ; =2 L E n L 0! E 0 n L E 0! E 0 E n L 0! E 0 n L REL : E 0! E 0 REC : TIME 0 : TIME 1 : E[f] f () 0! E 0 [f] Efrec X : E=Xg 0! E 0 rec X : E=X 0! E 0 E 0! E 0 ; t > 0 he; F i t 0! E 0 E 0! E 0 ; t > 0 he; F i t 0! he 0 ; F i t01 TIME 2 : F 0! F 0 he; F i 0 0! F 0 Figure 2: Inference Rules of RtCCS
10 an extension of CCS with discrete time and robability. PTCCS is similar to our RtCCS. However, unlike ours, time stos inside the timeout oerator of PTCCS. Therefore, the timeout oerator of PTCCS cannot aly to a rocess with timed roerties, and PTCCS cannot describe a timeout excetion for such a rocess. The timeout oerator of ATP is similar to ours. However, ATP has no notion of observation equivalence because ATP has no action, since it is not based on CCS. 3 RtCCS In this section, we resent the basic idea of RtCCS and rovide its formal denition. 3.1 Time Extensions We assume a concetual global clock: time asses as the global clock erforms tick actions. The tick action is a synchronous broadcast message over all rocesses. It is described as. The advance of time can be reresented as a sequence of tick actions and is viewed as discrete time. Also, we assume that all communications and internal actions take no time, and that comlementary actions and internal actions are erformed as soon as they become ossible. Therefore, a rocess having a communication action ready must wait until other rocess becomes ready to communicate with it. Once both the artners of a communication are ready, they must erform the communication actions immediately, before the next tick. As mentioned reviously, many real-time rogramming languages have timed oerations such as delay and timeout. In order to be used as a framework for formal semantics of languages, RtCCS needs to reresent behaviors deendent on the advancing of time. We introduce a secial binary oerator: h ; i t, called a timeout oerator. As shown in Figure 1, hp; Qi t denotes a rocess that after t time units becomes Q, unless P erforms any actions rior to that. Intuitively hp; Qi t behaves as rocess P if P can execute an initial transition within t units of time, whereas hp; Qi t behaves as rocess Q if P does not erform any action within t units of time. That is to say, P and Q corresond to ordinary and timeout rocesses resectively, in ractical rogramming. if t > 1 if t = 1 P 0 P 0 a 0 09 a 0 09 hp; hp 00 ; a P 0! P 0 P 0! P 00 hp; Qi 1 P 0! a P 0 Figure 1: The behavior of the timeout oerator Q 3.2 The RtCCS Language In this subsection, we resent the syntax and the oerational semantics of RtCCS Notation and Syntax of RtCCS We resuose that A is a set of communication action names and A the set of co-names. Let a,b,... range over A and a,b,... over A. An action a is the comlementary action of a, and a a. Let denote an internal action, and a tick action. Finally let Act A[A[fg ranged over by,,..., and Act T Act [ f g ranged over by,,.... Denition 1 The set E of RtCCS exressions ranged over by E; E 1 ; E 2 ; F;... is dened recursively by the following abstract syntax. E ::= 0 (Deadlock Process) j X (Process Variable) j :E (Action Prex) j E 1 + E 2 (Summation) j E 1 je 2 (Comosition) j E[f] (Relabeling) j E n L (Restriction) j rec X : E (Recursion) j he 1 ; E 2 i t (Timeout)
11 cesses which may change their states when communicating with another agent. Also, rocess calculi have equivalence relations over rocesses which rovide theoretical frameworks for analyzing the behavior of objects and for substituting objects. In this aer we develo a rocess calculus which ermits exressing and analyzing time constraints in real-time object-oriented comutations. To do this, we extend an existing rocess calculus with the notion of time and introduce a timed rocess calculus called RtCCS (Real-time Calculus of Communication Systems). It is an extension of Milner's CCS [11] with a minimal set of notions for time: a tick action and a timeout oerator. The execution of tick actions corresonds to the assage of time; the timeout oerator reresents a behavior deendent on the assage of time. Furthermore, we develo theoretical equivalences over rocesses with time roerties. In RtCCS, time indeendent roerties of rocesses can be treated as usual CCS while the time deendent roerties can be treated with the timed extensions. In order to demonstrate its eectiveness in a simler form, our timed extension is develoed for CCS. However, the same extension can be naturally adoted into -calculus [13] which has more owerful mechanisms for modeling object-oriented comuting. In the next section, we discuss some of the related works. In Section 3, we dene the syntax and the oerational semantics of RtCCS. Section 4 de- nes two equivalence relations called timed strong equivalence and timed observation equivalence resectively, and studies their basic roerties. In Section 5, we resent some examles that demonstrate the usefulness of RtCCS. The nal section contains some concluding remarks. In Aendix A, we dene an equational roof system based on timed strong equivalence. 2 Related Research Recently, many theoretical models for concurrent object-oriented comutations have been exlored in rocess calculi, such as CCS [11], -calculus [13], and ACP [2]. In the rocess calculus aradigm, objects can be viewed as rocesses, interactions among objects can be seen as communications, and encasulation can be modeled by the restriction of visible communications. In [8] a formal system based on the notion of actor-like object with asynchronous communication was investigated, and in [17] an executable notation for secifying concurrent object-oriented languages in a rocess calculus was exlored. In [18] some requirements for a calculus suitable for concurrent objects is resented. In [15] the author resents a language based on a rocess calculus and analyzes the essential features of object-based concurrency. In [22] a semantics for POOL [1] is dened by the translation of the language constructs into -calculus [13]. Many theoretical models for real-time comutations have been exlored in temoral logic, timed Petri nets, and denotational semantics frameworks based on linear history semantics. More recently, several studies develoed temoral models based on rocess calculi such as CCS, ACP, and CSP [6, 5, 10, 16, 14, 23]. Milner's SCCS [10] is a calculus for synchronous rocesses based on the idea that each atomic action takes one unit of time. The concurrent agents of SCCS essentially roceed in lockste and at every instant erform a single action; there is also an asynchronous oerator. Since each object in an object-oriented comutation roceeds at indeterminate relative seeds, SCCS does not t our uroses. TPA [6], timed CCS [23], and Temoral CCS [14] introduce delay oerators into CCS. The delay oerators reresent the susension of execution for a secied time, similarly to the delay command in Ada. In TPA and timed CCS, like in RtCCS, there are two assumtions: time advances only when communications are not ossible and that actions are instantaneous. Once an action is enabled, it cannot be disabled. Therefore, they cannot exress timeout behavior. On the other hand, Temoral CCS can reresent timeout behavior but has no equivalent relation over rocesses based on observation of their behaviors. PTCCS [5] and ATP [16], like ours, have a timeout oerator. PTCCS is
12 To aear in Proceedings of ACM OOPSLA'92 A Formalism for Real-Time Concurrent Object-Oriented Comuting Ichiro Satoh satoh@mt.cs.keio.ac.j Mario Tokoro 3 mario@mt.cs.keio.ac.j Deartment of Comuter Science, Keio University , Hiyoshi, Kohoku-ku, Yokohama, 223, Jaan Tel: Fax: Abstract We investigate a formal model for reasoning about real-time object-oriented comutations. The model is an extension of CCS with the notion of time, called RtCCS (Real-time Calculus of Communication Systems). It can naturally model real-time concurrent objects as communicating rocesses and reresent the timed roerties of objects. We de- ne two timed equivalences based on CCS's bisimulation and derive algebraic laws for reasoning about real-time rocesses. The equivalences rovide a formal framework for analyzing the behavior and timing of real-time comutations. Also, we dene a sound and comlete equational roof system for - nite rocesses. Some examles in RtCCS are shown in order to demonstrate its usefulness. 1 Introduction Real-time systems are increasingly being used in various areas such as factory automation, robotics, and multi-media systems. These systems have to interact and cooerate with many external ele- 3 Also with Sony Comuter Science Laboratory Inc Higashi-Gotanda, Shinagawa-ku, Tokyo, 141, Jaan. ments which run in arallel, such as other comuters, sensors, and actuators. The notion of concurrent object-oriented comuting [24] is considered as a owerful method to design and to develo such real-time systems. This is because concurrent object-oriented systems consist of objects which are logically self-contained active entities that cooerate with each other. Concurrent objects can naturally model such active elements directly. Recently, some real-time systems and languages use this concet as their basis [9, 21]. Real-time systems have certain time constraints which must be satised. The correctness of a realtime system deends not only on the logical results of comutation, but also on the time at which the results are roduced. Therefore, the construction and debugging of real-time rograms is far more comlex and dicult than those of ordinary concurrent rograms. We need the suort of formal verication methods for reasoning about real-time rograms. In the ast few years several researchers have roosed such methods based on timed Petri nets, rst order logics, and temoral logics. However, these frameworks are not always t for concurrent object-oriented comuting. The goal of this aer is to investigate a formal model to reason about real-time object-oriented comutations. Various formal models for concurrent objectoriented comutation have reviously been devised. Among these, rocess calculus [2, 11, 13] is a well-dened theory that can model naturally and easily concurrent objects as communicating ro-
Time values are often denoted as positive real numbers including zero. We dene symbols to present the events of processes. Denition 2.2 l Let A be an
A rocess Algebra for Optimization for arallel rograms Ichiro Satoh Department of Information Sciences, Ochanomizu University 2-1-1 Otsuka Bunkyo-ku Tokyo 112-8610 Japan Tel: +81-3-5978-5388 Fax: +81-3-5978-5390
More informationp,egp AFp EFp ... p,agp
TUESDAY, Session 2 Temoral logic and model checking, cont 1 Branching time and CTL model checking In a branching time temoral logics, we consider not just a single ath through the Krike model, but all
More informationModel checking, verification of CTL. One must verify or expel... doubts, and convert them into the certainty of YES [Thomas Carlyle]
Chater 5 Model checking, verification of CTL One must verify or exel... doubts, and convert them into the certainty of YES or NO. [Thomas Carlyle] 5. The verification setting Page 66 We introduce linear
More informationFor q 0; 1; : : : ; `? 1, we have m 0; 1; : : : ; q? 1. The set fh j(x) : j 0; 1; ; : : : ; `? 1g forms a basis for the tness functions dened on the i
Comuting with Haar Functions Sami Khuri Deartment of Mathematics and Comuter Science San Jose State University One Washington Square San Jose, CA 9519-0103, USA khuri@juiter.sjsu.edu Fax: (40)94-500 Keywords:
More informationEncoding Named Channels Communication by Behavioral Schemes
Acta olytechnica Hungarica Vol. 8, o. 2, 2011 Encoding amed Channels Communication by Behavioral Schemes Martin Tomášek Deartment of Comuters and Informatics, Faculty of Electrical Engineering and Informatics,
More informationThe Graph Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule
The Grah Accessibility Problem and the Universality of the Collision CRCW Conflict Resolution Rule STEFAN D. BRUDA Deartment of Comuter Science Bisho s University Lennoxville, Quebec J1M 1Z7 CANADA bruda@cs.ubishos.ca
More informationPeriodic scheduling 05/06/
Periodic scheduling T T or eriodic scheduling, the best that we can do is to design an algorithm which will always find a schedule if one exists. A scheduler is defined to be otimal iff it will find a
More informationPrinciples. Model (System Requirements) Answer: Model Checker. Specification (System Property) Yes, if the model satisfies the specification
Model Checking Princiles Model (System Requirements) Secification (System Proerty) Model Checker Answer: Yes, if the model satisfies the secification Counterexamle, otherwise Krike Model Krike Structure
More informationReview of The π-calculus: A Theory of Mobile Processes
Review of The π-calculus: A Theory of Mobile Processes Riccardo Pucella Department of Computer Science Cornell University July 8, 2001 Introduction With the rise of computer networks in the past decades,
More informationLinear diophantine equations for discrete tomography
Journal of X-Ray Science and Technology 10 001 59 66 59 IOS Press Linear diohantine euations for discrete tomograhy Yangbo Ye a,gewang b and Jiehua Zhu a a Deartment of Mathematics, The University of Iowa,
More informationON THE LEAST SIGNIFICANT p ADIC DIGITS OF CERTAIN LUCAS NUMBERS
#A13 INTEGERS 14 (014) ON THE LEAST SIGNIFICANT ADIC DIGITS OF CERTAIN LUCAS NUMBERS Tamás Lengyel Deartment of Mathematics, Occidental College, Los Angeles, California lengyel@oxy.edu Received: 6/13/13,
More informationElementary Analysis in Q p
Elementary Analysis in Q Hannah Hutter, May Szedlák, Phili Wirth November 17, 2011 This reort follows very closely the book of Svetlana Katok 1. 1 Sequences and Series In this section we will see some
More informationBlame, coercion, and threesomes: Together again for the first time
Blame, coercion, and threesomes: Together again for the first time Draft, 19 October 2014 Jeremy Siek Indiana University jsiek@indiana.edu Peter Thiemann Universität Freiburg thiemann@informatik.uni-freiburg.de
More informationx 1 1 x x 4 Figure 1: A system of four rocesses 1,, 3, and 4, and three interactions x 1, x 13, and x 4 that is innitely often enabled (ie, wit
On Strong-Feasibilities of Equivalence-Comletions Yuh-Jzer Joung joung@ccmsntuedutw Deartment of Information Management National Taiwan University Taiei, Taiwan Abstract The notion of comletion has been
More informationA Qualitative Event-based Approach to Multiple Fault Diagnosis in Continuous Systems using Structural Model Decomposition
A Qualitative Event-based Aroach to Multile Fault Diagnosis in Continuous Systems using Structural Model Decomosition Matthew J. Daigle a,,, Anibal Bregon b,, Xenofon Koutsoukos c, Gautam Biswas c, Belarmino
More informationImproved Capacity Bounds for the Binary Energy Harvesting Channel
Imroved Caacity Bounds for the Binary Energy Harvesting Channel Kaya Tutuncuoglu 1, Omur Ozel 2, Aylin Yener 1, and Sennur Ulukus 2 1 Deartment of Electrical Engineering, The Pennsylvania State University,
More informationDRAFT - do not circulate
An Introduction to Proofs about Concurrent Programs K. V. S. Prasad (for the course TDA383/DIT390) Deartment of Comuter Science Chalmers University Setember 26, 2016 Rough sketch of notes released since
More informationMODELING THE RELIABILITY OF C4ISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL
Technical Sciences and Alied Mathematics MODELING THE RELIABILITY OF CISR SYSTEMS HARDWARE/SOFTWARE COMPONENTS USING AN IMPROVED MARKOV MODEL Cezar VASILESCU Regional Deartment of Defense Resources Management
More informationComputer arithmetic. Intensive Computation. Annalisa Massini 2017/2018
Comuter arithmetic Intensive Comutation Annalisa Massini 7/8 Intensive Comutation - 7/8 References Comuter Architecture - A Quantitative Aroach Hennessy Patterson Aendix J Intensive Comutation - 7/8 3
More informationFinite-State Verification or Model Checking. Finite State Verification (FSV) or Model Checking
Finite-State Verification or Model Checking Finite State Verification (FSV) or Model Checking Holds the romise of roviding a cost effective way of verifying imortant roerties about a system Not all faults
More informationParallelism and Locality in Priority Queues. A. Ranade S. Cheng E. Deprit J. Jones S. Shih. University of California. Berkeley, CA 94720
Parallelism and Locality in Priority Queues A. Ranade S. Cheng E. Derit J. Jones S. Shih Comuter Science Division University of California Berkeley, CA 94720 Abstract We exlore two ways of incororating
More informationMATHEMATICAL MODELLING OF THE WIRELESS COMMUNICATION NETWORK
Comuter Modelling and ew Technologies, 5, Vol.9, o., 3-39 Transort and Telecommunication Institute, Lomonosov, LV-9, Riga, Latvia MATHEMATICAL MODELLIG OF THE WIRELESS COMMUICATIO ETWORK M. KOPEETSK Deartment
More informationPetri Net Plans. 1 Introduction. Vittorio Amos Ziparo 1 and Luca Iocchi 2
Fourth International Worksho on Modelling of Objects, Comonents, and Agents (MOCA'06), 2006 Petri Net Plans Vittorio Amos Ziaro 1 and Luca Iocchi 2 1 Diartimento di Informatica e Sistemistica, Università
More informationAn Analysis of TCP over Random Access Satellite Links
An Analysis of over Random Access Satellite Links Chunmei Liu and Eytan Modiano Massachusetts Institute of Technology Cambridge, MA 0239 Email: mayliu, modiano@mit.edu Abstract This aer analyzes the erformance
More informationA Forxnalism for Real-Time Concurrent Object-Oriented Computing
A Forxnalism for Real-Time Concurrent Object-Oriented Computing chiro Satoh Mario Tokoro * satoh&nt.cs.keio.ac.jp rnario@mt.cs.keio.ac.jp Department of Computer Science, Keio University 3-14-1, Hiyoshi,
More informationShadow Computing: An Energy-Aware Fault Tolerant Computing Model
Shadow Comuting: An Energy-Aware Fault Tolerant Comuting Model Bryan Mills, Taieb Znati, Rami Melhem Deartment of Comuter Science University of Pittsburgh (bmills, znati, melhem)@cs.itt.edu Index Terms
More informationTheir proof is rather lengthy and hard to grasp; it ultimately relies on showing a periodicity for any transition graph generated from normed context-
Bisimulation Equivalence is Decidable for all Context-Free Processes Sren Christensen Hans Huttel y Colin Stirling 1 Introduction Over the past decade much attention has been devoted to the study of process
More informationCombinatorics of topmost discs of multi-peg Tower of Hanoi problem
Combinatorics of tomost discs of multi-eg Tower of Hanoi roblem Sandi Klavžar Deartment of Mathematics, PEF, Unversity of Maribor Koroška cesta 160, 000 Maribor, Slovenia Uroš Milutinović Deartment of
More informationA Parallel Algorithm for Minimization of Finite Automata
A Parallel Algorithm for Minimization of Finite Automata B. Ravikumar X. Xiong Deartment of Comuter Science University of Rhode Island Kingston, RI 02881 E-mail: fravi,xiongg@cs.uri.edu Abstract In this
More informationCorrespondence Between Fractal-Wavelet. Transforms and Iterated Function Systems. With Grey Level Maps. F. Mendivil and E.R.
1 Corresondence Between Fractal-Wavelet Transforms and Iterated Function Systems With Grey Level Mas F. Mendivil and E.R. Vrscay Deartment of Alied Mathematics Faculty of Mathematics University of Waterloo
More informationABSTRACT MODEL REPAIR
Logical Methods in Comuter Science Vol. 11(3:11)2015,. 1 43 www.lmcs-online.org Submitted Jul. 2, 2014 Published Se. 17, 2015 ABSTRACT MODEL REPAIR GEORGE CHATZIELEFTHERIOU a, BORZOO BONAKDARPOUR b, PANAGIOTIS
More informationTrace Refinement of π-calculus Processes
Trace Refinement of pi-calculus Processes Trace Refinement of π-calculus Processes Manuel Gieseking manuel.gieseking@informatik.uni-oldenburg.de) Correct System Design, Carl von Ossietzky University of
More informationResearch Article Controllability of Linear Discrete-Time Systems with Both Delayed States and Delayed Inputs
Abstract and Alied Analysis Volume 203 Article ID 97546 5 ages htt://dxdoiorg/055/203/97546 Research Article Controllability of Linear Discrete-Time Systems with Both Delayed States and Delayed Inuts Hong
More information2 J.Burton and M.Koutny we have to exlicitly generate a state sace, namely when testing for trace inclusion, only two rocesses are involved and the te
Verication of Communicating Processes in the Event of Interface Dierence Jonathan Burton and Maciej Koutny Deartment of Comuting Science, University of Newcastle, Newcastle uon Tyne NE1 7RU, U.K. fj.i.burton,
More information1 Gambler s Ruin Problem
Coyright c 2017 by Karl Sigman 1 Gambler s Ruin Problem Let N 2 be an integer and let 1 i N 1. Consider a gambler who starts with an initial fortune of $i and then on each successive gamble either wins
More informationThe non-stochastic multi-armed bandit problem
Submitted for journal ublication. The non-stochastic multi-armed bandit roblem Peter Auer Institute for Theoretical Comuter Science Graz University of Technology A-8010 Graz (Austria) auer@igi.tu-graz.ac.at
More informationOptimism, Delay and (In)Efficiency in a Stochastic Model of Bargaining
Otimism, Delay and In)Efficiency in a Stochastic Model of Bargaining Juan Ortner Boston University Setember 10, 2012 Abstract I study a bilateral bargaining game in which the size of the surlus follows
More informationJohn Weatherwax. Analysis of Parallel Depth First Search Algorithms
Sulementary Discussions and Solutions to Selected Problems in: Introduction to Parallel Comuting by Viin Kumar, Ananth Grama, Anshul Guta, & George Karyis John Weatherwax Chater 8 Analysis of Parallel
More informationStatics and dynamics: some elementary concepts
1 Statics and dynamics: some elementary concets Dynamics is the study of the movement through time of variables such as heartbeat, temerature, secies oulation, voltage, roduction, emloyment, rices and
More informationThe π-calculus Semantics. Equivalence and Value-Passing. Infinite Sums 4/12/2004
The π-calculus Semantics Overview ate and early semantics Bisimulation and congruence Variations of the calculus eferences obin Milner, Communicating and Mobil Systems Davide Sangiorgi and David Walker,
More informationInequalities for the L 1 Deviation of the Empirical Distribution
Inequalities for the L 1 Deviation of the Emirical Distribution Tsachy Weissman, Erik Ordentlich, Gadiel Seroussi, Sergio Verdu, Marcelo J. Weinberger June 13, 2003 Abstract We derive bounds on the robability
More informationTopic 7: Using identity types
Toic 7: Using identity tyes June 10, 2014 Now we would like to learn how to use identity tyes and how to do some actual mathematics with them. By now we have essentially introduced all inference rules
More informationTopic: Lower Bounds on Randomized Algorithms Date: September 22, 2004 Scribe: Srinath Sridhar
15-859(M): Randomized Algorithms Lecturer: Anuam Guta Toic: Lower Bounds on Randomized Algorithms Date: Setember 22, 2004 Scribe: Srinath Sridhar 4.1 Introduction In this lecture, we will first consider
More informationSets of Real Numbers
Chater 4 Sets of Real Numbers 4. The Integers Z and their Proerties In our revious discussions about sets and functions the set of integers Z served as a key examle. Its ubiquitousness comes from the fact
More information1-way quantum finite automata: strengths, weaknesses and generalizations
1-way quantum finite automata: strengths, weaknesses and generalizations arxiv:quant-h/9802062v3 30 Se 1998 Andris Ambainis UC Berkeley Abstract Rūsiņš Freivalds University of Latvia We study 1-way quantum
More informationA CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS. 1. Abstract
A CONCRETE EXAMPLE OF PRIME BEHAVIOR IN QUADRATIC FIELDS CASEY BRUCK 1. Abstract The goal of this aer is to rovide a concise way for undergraduate mathematics students to learn about how rime numbers behave
More informationAnalysis of Multi-Hop Emergency Message Propagation in Vehicular Ad Hoc Networks
Analysis of Multi-Ho Emergency Message Proagation in Vehicular Ad Hoc Networks ABSTRACT Vehicular Ad Hoc Networks (VANETs) are attracting the attention of researchers, industry, and governments for their
More informationABSTRACT MODEL REPAIR
ABSTRACT MODEL REPAIR GEORGE CHATZIELEFTHERIOU a, BORZOO BONAKDARPOUR b, PANAGIOTIS KATSAROS c, AND SCOTT A. SMOLKA d a Deartment of Informatics, Aristotle University of Thessaloniki, 54124 Thessaloniki,
More informationSolvability and Number of Roots of Bi-Quadratic Equations over p adic Fields
Malaysian Journal of Mathematical Sciences 10(S February: 15-35 (016 Secial Issue: The 3 rd International Conference on Mathematical Alications in Engineering 014 (ICMAE 14 MALAYSIAN JOURNAL OF MATHEMATICAL
More informationCTL, the branching-time temporal logic
CTL, the branching-time temoral logic Cătălin Dima Université Paris-Est Créteil Cătălin Dima (UPEC) CTL 1 / 29 Temoral roerties CNIL Safety, termination, mutual exclusion LTL. Liveness, reactiveness, resonsiveness,
More informationA Reduction Theorem for the Verification of Round-Based Distributed Algorithms
A Reduction Theorem for the Verification of Round-Based Distributed Algorithms Mouna Chaouch-Saad 1, Bernadette Charron-Bost 2, and Stehan Merz 3 1 Faculté des Sciences, Tunis, Tunisia, Mouna.Saad@fst.rnu.tn
More informationApproximating min-max k-clustering
Aroximating min-max k-clustering Asaf Levin July 24, 2007 Abstract We consider the roblems of set artitioning into k clusters with minimum total cost and minimum of the maximum cost of a cluster. The cost
More informationc Copyright by Helen J. Elwood December, 2011
c Coyright by Helen J. Elwood December, 2011 CONSTRUCTING COMPLEX EQUIANGULAR PARSEVAL FRAMES A Dissertation Presented to the Faculty of the Deartment of Mathematics University of Houston In Partial Fulfillment
More informationFault Tolerant Quantum Computing Robert Rogers, Thomas Sylwester, Abe Pauls
CIS 410/510, Introduction to Quantum Information Theory Due: June 8th, 2016 Sring 2016, University of Oregon Date: June 7, 2016 Fault Tolerant Quantum Comuting Robert Rogers, Thomas Sylwester, Abe Pauls
More informationRe-entry Protocols for Seismically Active Mines Using Statistical Analysis of Aftershock Sequences
Re-entry Protocols for Seismically Active Mines Using Statistical Analysis of Aftershock Sequences J.A. Vallejos & S.M. McKinnon Queen s University, Kingston, ON, Canada ABSTRACT: Re-entry rotocols are
More informationRadial Basis Function Networks: Algorithms
Radial Basis Function Networks: Algorithms Introduction to Neural Networks : Lecture 13 John A. Bullinaria, 2004 1. The RBF Maing 2. The RBF Network Architecture 3. Comutational Power of RBF Networks 4.
More informationSystem Reliability Estimation and Confidence Regions from Subsystem and Full System Tests
009 American Control Conference Hyatt Regency Riverfront, St. Louis, MO, USA June 0-, 009 FrB4. System Reliability Estimation and Confidence Regions from Subsystem and Full System Tests James C. Sall Abstract
More informationECON Answers Homework #2
ECON 33 - Answers Homework #2 Exercise : Denote by x the number of containers of tye H roduced, y the number of containers of tye T and z the number of containers of tye I. There are 3 inut equations that
More informationChapter 1: PROBABILITY BASICS
Charles Boncelet, obability, Statistics, and Random Signals," Oxford University ess, 0. ISBN: 978-0-9-0005-0 Chater : PROBABILITY BASICS Sections. What Is obability?. Exeriments, Outcomes, and Events.
More informationBayesian System for Differential Cryptanalysis of DES
Available online at www.sciencedirect.com ScienceDirect IERI Procedia 7 (014 ) 15 0 013 International Conference on Alied Comuting, Comuter Science, and Comuter Engineering Bayesian System for Differential
More informationMatching Partition a Linked List and Its Optimization
Matching Partition a Linked List and Its Otimization Yijie Han Deartment of Comuter Science University of Kentucky Lexington, KY 40506 ABSTRACT We show the curve O( n log i + log (i) n + log i) for the
More informationElements of Asymptotic Theory. James L. Powell Department of Economics University of California, Berkeley
Elements of Asymtotic Theory James L. Powell Deartment of Economics University of California, Berkeley Objectives of Asymtotic Theory While exact results are available for, say, the distribution of the
More informationMATH 2710: NOTES FOR ANALYSIS
MATH 270: NOTES FOR ANALYSIS The main ideas we will learn from analysis center around the idea of a limit. Limits occurs in several settings. We will start with finite limits of sequences, then cover infinite
More informationLecture 21: Quantum Communication
CS 880: Quantum Information Processing 0/6/00 Lecture : Quantum Communication Instructor: Dieter van Melkebeek Scribe: Mark Wellons Last lecture, we introduced the EPR airs which we will use in this lecture
More informationConvex Optimization methods for Computing Channel Capacity
Convex Otimization methods for Comuting Channel Caacity Abhishek Sinha Laboratory for Information and Decision Systems (LIDS), MIT sinhaa@mit.edu May 15, 2014 We consider a classical comutational roblem
More information#A47 INTEGERS 15 (2015) QUADRATIC DIOPHANTINE EQUATIONS WITH INFINITELY MANY SOLUTIONS IN POSITIVE INTEGERS
#A47 INTEGERS 15 (015) QUADRATIC DIOPHANTINE EQUATIONS WITH INFINITELY MANY SOLUTIONS IN POSITIVE INTEGERS Mihai Ciu Simion Stoilow Institute of Mathematics of the Romanian Academy, Research Unit No. 5,
More informationOn a Markov Game with Incomplete Information
On a Markov Game with Incomlete Information Johannes Hörner, Dinah Rosenberg y, Eilon Solan z and Nicolas Vieille x{ January 24, 26 Abstract We consider an examle of a Markov game with lack of information
More informationModels of Concurrency
Models of Concurrency GERARDO SCHNEIDER UPPSALA UNIVERSITY DEPARTMENT OF INFORMATION TECHNOLOGY UPPSALA, SWEDEN Thanks to Frank Valencia Models of Concurrency p.1/57 Concurrency is Everywhere Concurrent
More informationEstimation of the large covariance matrix with two-step monotone missing data
Estimation of the large covariance matrix with two-ste monotone missing data Masashi Hyodo, Nobumichi Shutoh 2, Takashi Seo, and Tatjana Pavlenko 3 Deartment of Mathematical Information Science, Tokyo
More informationChapter 1 Fundamentals
Chater Fundamentals. Overview of Thermodynamics Industrial Revolution brought in large scale automation of many tedious tasks which were earlier being erformed through manual or animal labour. Inventors
More informationOn generalizing happy numbers to fractional base number systems
On generalizing hay numbers to fractional base number systems Enriue Treviño, Mikita Zhylinski October 17, 018 Abstract Let n be a ositive integer and S (n) be the sum of the suares of its digits. It is
More informationUncorrelated Multilinear Principal Component Analysis for Unsupervised Multilinear Subspace Learning
TNN-2009-P-1186.R2 1 Uncorrelated Multilinear Princial Comonent Analysis for Unsuervised Multilinear Subsace Learning Haiing Lu, K. N. Plataniotis and A. N. Venetsanooulos The Edward S. Rogers Sr. Deartment
More informationPositive decomposition of transfer functions with multiple poles
Positive decomosition of transfer functions with multile oles Béla Nagy 1, Máté Matolcsi 2, and Márta Szilvási 1 Deartment of Analysis, Technical University of Budaest (BME), H-1111, Budaest, Egry J. u.
More information1. INTRODUCTION. Fn 2 = F j F j+1 (1.1)
CERTAIN CLASSES OF FINITE SUMS THAT INVOLVE GENERALIZED FIBONACCI AND LUCAS NUMBERS The beautiful identity R.S. Melham Deartment of Mathematical Sciences, University of Technology, Sydney PO Box 23, Broadway,
More informationRecursive equations in higher-order process calculi
Theoretical Computer Science 266 (2001) 839 852 www.elsevier.com/locate/tcs Recursive equations in higher-order process calculi Mingsheng Ying a; ;1, Martin Wirsing b a State Key Laboratory of Intelligent
More informationDistributed Rule-Based Inference in the Presence of Redundant Information
istribution Statement : roved for ublic release; distribution is unlimited. istributed Rule-ased Inference in the Presence of Redundant Information June 8, 004 William J. Farrell III Lockheed Martin dvanced
More informationTRACES OF SCHUR AND KRONECKER PRODUCTS FOR BLOCK MATRICES
Khayyam J. Math. DOI:10.22034/kjm.2019.84207 TRACES OF SCHUR AND KRONECKER PRODUCTS FOR BLOCK MATRICES ISMAEL GARCÍA-BAYONA Communicated by A.M. Peralta Abstract. In this aer, we define two new Schur and
More informationIntroduction Consider a set of jobs that are created in an on-line fashion and should be assigned to disks. Each job has a weight which is the frequen
Ancient and new algorithms for load balancing in the L norm Adi Avidor Yossi Azar y Jir Sgall z July 7, 997 Abstract We consider the on-line load balancing roblem where there are m identical machines (servers)
More informationOptimal Random Access and Random Spectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging
1 Otimal Random Access and Random Sectrum Sensing for an Energy Harvesting Cognitive Radio with and without Primary Feedback Leveraging Ahmed El Shafie, Member, IEEE, arxiv:1401.0340v3 [cs.it] 27 Ar 2014
More informationThe Semantics of Data Flow Diagrams. P.D. Bruza. Th.P. van der Weide. Dept. of Information Systems, University of Nijmegen
The Seantics of Data Flow Diagras P.D. Bruza Th.P. van der Weide Det. of Inforation Systes, University of Nijegen Toernooiveld, NL-6525 ED Nijegen, The Netherlands July 26, 1993 Abstract In this article
More informationFibration of Toposes PSSL 101, Leeds
Fibration of Tooses PSSL 101, Leeds Sina Hazratour sinahazratour@gmail.com Setember 2017 AUs AUs as finitary aroximation of Grothendieck tooses Pretooses 1 finite limits 2 stable finite disjoint coroducts
More informationMobius Functions, Legendre Symbols, and Discriminants
Mobius Functions, Legendre Symbols, and Discriminants 1 Introduction Zev Chonoles, Erick Knight, Tim Kunisky Over the integers, there are two key number-theoretic functions that take on values of 1, 1,
More informationStrong bisimilarity can be opened
Strong bisimilarity can be opened Henning E. Andersen Hans Hüttel Karina N. Jensen June 7, 2002 Abstract We present an extension of the semantics of the π-calculus without match where strong bisimilarity
More informationOn Code Design for Simultaneous Energy and Information Transfer
On Code Design for Simultaneous Energy and Information Transfer Anshoo Tandon Electrical and Comuter Engineering National University of Singaore Email: anshoo@nus.edu.sg Mehul Motani Electrical and Comuter
More informationAdditive results for the generalized Drazin inverse in a Banach algebra
Additive results for the generalized Drazin inverse in a Banach algebra Dragana S. Cvetković-Ilić Dragan S. Djordjević and Yimin Wei* Abstract In this aer we investigate additive roerties of the generalized
More informationAnalysis of some entrance probabilities for killed birth-death processes
Analysis of some entrance robabilities for killed birth-death rocesses Master s Thesis O.J.G. van der Velde Suervisor: Dr. F.M. Sieksma July 5, 207 Mathematical Institute, Leiden University Contents Introduction
More informationWojciech Penczek. Polish Academy of Sciences, Warsaw, Poland. and. Institute of Informatics, Siedlce, Poland.
A local approach to modal logic for multi-agent systems? Wojciech Penczek 1 Institute of Computer Science Polish Academy of Sciences, Warsaw, Poland and 2 Akademia Podlaska Institute of Informatics, Siedlce,
More informationOn Doob s Maximal Inequality for Brownian Motion
Stochastic Process. Al. Vol. 69, No., 997, (-5) Research Reort No. 337, 995, Det. Theoret. Statist. Aarhus On Doob s Maximal Inequality for Brownian Motion S. E. GRAVERSEN and G. PESKIR If B = (B t ) t
More informationMulti-Operation Multi-Machine Scheduling
Multi-Oeration Multi-Machine Scheduling Weizhen Mao he College of William and Mary, Williamsburg VA 3185, USA Abstract. In the multi-oeration scheduling that arises in industrial engineering, each job
More informationOptimal Design of Truss Structures Using a Neutrosophic Number Optimization Model under an Indeterminate Environment
Neutrosohic Sets and Systems Vol 14 016 93 University of New Mexico Otimal Design of Truss Structures Using a Neutrosohic Number Otimization Model under an Indeterminate Environment Wenzhong Jiang & Jun
More informationLaboratoire de l Informatique du Parallélisme
Laboratoire de l Informatique du Parallélisme Ecole Normale Suérieure de Lyon Unité de recherche associée au CNRS n 1398 Asynchronous Sub-Logarithmic Adders J.M. Muller, A. Tisserand and J.M. Vincent May
More informationMemoryfull Branching-Time Logic
Memoryfull Branching-Time Logic Orna Kuferman 1 and Moshe Y. Vardi 2 1 Hebrew University, School of Engineering and Comuter Science, Jerusalem 91904, Israel Email: orna@cs.huji.ac.il, URL: htt://www.cs.huji.ac.il/
More informationReally Visual Temporal Reasoning. Y S Ramakrishna, P M Melliar-Smith, L E Moser, L K Dillon, G Kutty
Really Visual Temoral Reasoning Y S Ramakrishna, P M Melliar-Smith, L E Moser, L K Dillon, Kutty Deartment of Electrical and Comuter Engineering and Deartment of Comuter Science University of California,
More informationUnsupervised Hyperspectral Image Analysis Using Independent Component Analysis (ICA)
Unsuervised Hyersectral Image Analysis Using Indeendent Comonent Analysis (ICA) Shao-Shan Chiang Chein-I Chang Irving W. Ginsberg Remote Sensing Signal and Image Processing Laboratory Deartment of Comuter
More informationAn Introduction to Information Theory: Notes
An Introduction to Information Theory: Notes Jon Shlens jonshlens@ucsd.edu 03 February 003 Preliminaries. Goals. Define basic set-u of information theory. Derive why entroy is the measure of information
More informationLEIBNIZ SEMINORMS IN PROBABILITY SPACES
LEIBNIZ SEMINORMS IN PROBABILITY SPACES ÁDÁM BESENYEI AND ZOLTÁN LÉKA Abstract. In this aer we study the (strong) Leibniz roerty of centered moments of bounded random variables. We shall answer a question
More informationThe Fekete Szegő theorem with splitting conditions: Part I
ACTA ARITHMETICA XCIII.2 (2000) The Fekete Szegő theorem with slitting conditions: Part I by Robert Rumely (Athens, GA) A classical theorem of Fekete and Szegő [4] says that if E is a comact set in the
More information2 K. ENTACHER 2 Generalized Haar function systems In the following we x an arbitrary integer base b 2. For the notations and denitions of generalized
BIT 38 :2 (998), 283{292. QUASI-MONTE CARLO METHODS FOR NUMERICAL INTEGRATION OF MULTIVARIATE HAAR SERIES II KARL ENTACHER y Deartment of Mathematics, University of Salzburg, Hellbrunnerstr. 34 A-52 Salzburg,
More informationNode-voltage method using virtual current sources technique for special cases
Node-oltage method using irtual current sources technique for secial cases George E. Chatzarakis and Marina D. Tortoreli Electrical and Electronics Engineering Deartments, School of Pedagogical and Technological
More information216 S. Chandrasearan and I.C.F. Isen Our results dier from those of Sun [14] in two asects: we assume that comuted eigenvalues or singular values are
Numer. Math. 68: 215{223 (1994) Numerische Mathemati c Sringer-Verlag 1994 Electronic Edition Bacward errors for eigenvalue and singular value decomositions? S. Chandrasearan??, I.C.F. Isen??? Deartment
More information