Towards Unifying Semantic Constraints and Security Constraints in Distributed Information Systems

Size: px
Start display at page:

Download "Towards Unifying Semantic Constraints and Security Constraints in Distributed Information Systems"

Transcription

1 Towrds Unifying Semntic Constrints nd Security Constrints in Distributed Informtion Systems Disserttion von Brbr Sprick zur Erlngung des Grdes eines Doktors der Nturwissenschften der Universität Dortmund m Fchbereich Informtik Dortmund 2003

2 Tg der mündlichen Prüfung: 6. Oktober 2003 Dekn: Prof. Dr. Bernhrd Steffen 1. Gutchter: Prof. Dr. Jochim Biskup 2. Gutchter: Prof. Dr. Ernst-Erich Doberkt

3 Acknowledgement My work would not hve been possible without the help, the guidnce nd the ptience of lot of people. First nd foremost, I wish to thnk my supervisor Jochim Biskup for his guidnce, his encourgement nd his ptience. His extensive wy of giving comments on nd mking suggestions for my work hs lwys significntly nd positively influenced both form nd content of the work. I especilly owe lot of thnks to my collegue Rlf Menzel. Rlf ws lwys willing to discuss ides s well s technicl detils with me. The discussions with him were invluble for my understnding of the interction of knowledge nd ction. Mny times when I got stuck in proof he helped me with his stright forwrd thinking nd with his bility to rrnge my ides. It ws gret plesure to work with him. Very importnt for the development of the tbleu system were the fruitful discussions with Hubert Wgner. When I hd no ide how to tckle the interction of knowledge nd belief in the tbleu system, he helped me with his brod knowledge bout logics in generl nd bout tbleu systems. The discussions with him were lwys motivting nd invluble for my work. I thnk Professor Doberkt for greeing to be the second referee of this work nd for his comments on the text. I would lso like to thnk my other collegues, Christin Altenschmidt, Ulrich Flegel, Jürgen Freitg, Yücel Krbulut, Thoms Leineweber, Frnk Müller, Jörg Prthe nd Sndr Wortmnn for the good coopertion in the group nd for ll the support in my fights with the computers. Especilly Frnk, with his mthemticl bckground, ws of gret help for detils of the numerous proofs in my work. I m most grteful for ll the support I got from Sudhir Agrwl, for his morl support, for listening to ll my problems, to ech dy s success nd filures nd for his enthusism for discussing ides. My flt mtes Sbine Kühle nd Birgitt Wolf showed lot of considertion for me nd ptiently listened to ll my reports bout filures. They lwys cheered me up in long evenings with good food nd wine. Nturlly, my work would not hve been possible without my prents. I owe them lot of thnks for their untiring morl support. 3

4 Abstrct Modern informtion systems must respect certin restrictions in order to gurntee the proper nd desired functionlity. Semntic constrints help to prevent inconsistencies in the stored dt resulting from fulty updtes. Security constrints re to mintin integrity, secrecy nd vilbility over updtes nd over queries. This thesis designs unifying frmework for the specifiction of semntic constrints nd security constrints in informtion systems in order to study interctions between them. We consider n informtion system s distributed, rective system in which ech ctor nd ech object cts utonomously nd concurrently. Actors gin knowledge by performing red opertions on objects nd they my updte the content of n object by performing updte opertions. To execute red or updte opertions, ctors need execute rights tht cn be grnted or revoked by other ctors. This view of n informtion system is cptured in computtionl model. In this model, we consider ech component of the informtion system, ctors s well s objects, uniformly s sequentil gent tht performs opertions utonomously nd jointly with other sequentil gents. Ech gent is ffilited with set of locl propositions nd set of locl opertions s well s with reltions tht cpture the gent s knowledge nd belief. An gent s knowledge is determined completely by its locl stte. Chnge in knowledge of n gent is due to opertions performed by the gent. Interction between knowledge nd opertions is cptured by the requirement tht the enbling nd the effect of n opertion is completely determined by the knowledge of the cting gents. Knowledge of gents cn be chnged only by opertions in which they prticipte. We define temporl nd epistemic specifiction lnguge with temporl nd epistemic opertors. The logic provides for ech gent locl next nd until opertors s temporl opertors nd locl knowledge nd belief opertors s epistemic opertors. We develop modl tbleu bsed proof system for subset of the logic nd show its soundness. Completeness cn be shown only for smller, but still resonble subset of the logic, decidbility remins n open question. The min difficulty of the tbleu system rises from the interction requirement between knowledge nd ction. In detiled exmple we demonstrte how the frmework cn be used for specifying semntic constrints nd security constrints in informtion systems. 4

5 Contents 1 Introduction Vrious Types of Constrints for Informtion Systems Semntic Constrints Security Constrints The Problem Anlysis of the Problem Our Approch Outline of the Thesis Relted Work Temporl Aspects in Distributed Informtion Systems Epistemic Aspects in Distributed Systems Deontic Aspects Combintion of Deontic nd Epistemic Aspects Our View of n Informtion System Sttic Aspects Dynmic Aspects Concerning Control Dynmic Aspects Concerning Knowledge nd Belief Summrized View A Temporl nd Epistemic Logic L (Ag,Õ, P) Syntx of the logic L (Ag, Õ, P) Semntics of the logic L (Ag,Õ, P) Properties of the logic L (Ag, Õ, P) A Tbleu Proof System for L (Ag,Õ, P) Introduction to Tbleux Preliminries Tbleu Formule Tbleu Rules Axioms nd Locl Rules Rules Concerning Epistemic Structure

6 Contents Rules Concerning Temporl Structure Interction Between Knowledge nd Action Definition of Tbleux Bsic Properties of Regulr Tbleux Firness on Appliction of Tbleu Rules Soundness nd Completeness of the Tbleu System Soundness Completeness of the Tbleu System Construction of Model M nd stisfying L-embedding A Specifiction Exmple Privcy Oriented Clering for the Germn Helth Cre System Initiliztion Phse Tretment nd Billing Phse Logicl Specifiction of the Billing nd Clering Scheme Sttic Prt of the System Semntic Constrints Temporl Behvior Semntic Constrints Epistemic Behvior Specifiction of Security Constrints Fetures nd Limittions of the Frmework Conclusion nd Outlook Summry Competency of the Frmework Open Problems Bibliogrphy 225 A Nottions 229 B A Tbleu System for L 233 B.1 The Tbleu Rules B.2 Blocks for Rule Applictions C Tbleu Exmple 239 6

7 Chpter 1 Introduction An informtion system models prt of the rel world while respecting certin constrints in order to gurntee the proper nd desired functionlity. These constrints cn be imposed by the rel world s well s by the ppliction context nd cn be declred on the stored dt in the informtion system s well s on the behvior of the system nd its users. Semntic constrints help to prevent the informtion system to hve dt tht is incomptible to the rel world. For exmple, 25 yers old employee cnnot hve work history of 30 yers, ech employee hs socil security number, n employee s slry my not decrese, every person cn either be mle or femle. Since dt incomptible to the rel world my result from fulty updtes, semntic constrints re to be checked during the execution of updte opertions. They restrict the possible (sequences of) updtes in ech stte of the informtion system. Security constrints help to mintin integrity, secrecy nd vilbility over (sequences of ) updtes s well s over queries. For exmple, n employee my not increse her own slry, n dministrtion employee in hospitl my not lter lbortory dt of ptient, secret informtion my not be disclosed to n unclssified user, whenever user queries the system, she must eventully get the requested informtion, 7

8 Chpter 1 Introduction While semntic constrints re concerning the vlues of dt in the informtion system, security constrints re more concerning the circumstnces under which the dt my be modified or disclosed. Some yers go, informtion systems were mostly monolithic: We could ssume tht dt ws stored centrlly in one plce tht there ws one schem for the dtbse which included ll semntic constrints imposed on the dt nd thus tht there ws centrl nd globl control over the system. Over time, the dt stored in informtion systems hs been drmticlly incresing, nd the potentils of combining informtion systems over network hve been growing. So, distributed systems with heterogeneous distributed components becme more nd more importnt. We cn now consider n informtion system s highly distributed system with heterogeneous distributed components. In such systems, it seems unrelistic to ssume nything like globl schem or centrlized mechnism for updtes with enforcement of semntic constrints nd for query evlution. Insted, we hve to ssume tht ech individul component hs only restricted view on the whole system. Accordingly, security is considered s being concerned with the different interests nd views of the vrious components. Here, it seems to be rther undesirble to ssume nything like globl security policy or centrlized supervising mechnisms. Insted, whenever possible, security interests should be enforced by the components utonomously. In the reminder of this thesis, whenever we consider semntic constrints nd security constrints, we will hve to keep in mind tht these constrints re employed in distributed environment. In prticulr, even if n idel observer thinks in terms of globl stte, which, however, is questionble becuse of the problem of synchronized time, in prctice ny component will hve only prtil knowledge bout tht fictitious stte. Our gol is to provide unifying frmework for both kinds of constrints, semntic constrints s well s security constrints declred for distributed informtion systems in order to study interctions between these constrints on the conceptul level t design time in mngeble wy supported by n lgorithmic tool. In the following we review the bsic fetures of the two kinds of constrints tht we hve in mind to provide unifying frmework for both of them. 1.1 Vrious Types of Constrints for Informtion Systems Let us first investigte the vrious types of constrints in informtion systems in order to justify the required fetures of our frmework. 8

9 1.1 Vrious Types of Constrints for Informtion Systems Semntic Constrints Semntic constrints reflect properties of n outside mini-world tht is modeled by the informtion system. There re severl possibilities to clssify these properties: We cn distinguish between properties tht cn be found in the rel world (like An employee of 25 yers ge cnnot hve work history of 30 yers, A person cnnot hve two biologicl mothers or A person hs exctly one birth dte) nd properties tht re be imposed by the ppliction requirements (like Every employee must hve socil security number, A person my get her driving license only fter she is 18 yers old or Every prticipnt of the lb course must be student). Another wy to clssify semntic constrints is to distinguish between sttic constrints, tht re properties reltive to one instnce of the informtion system (like the bove constrints Every employee must hve socil security number, Every prticipnt of the prcticl course must be student or A person my sign n invoice only if she holds the secret signture key) nd dynmic constrints, tht re properties regrding sequence of instnces over time (like The slry of n employee my not decrese, Once bnk ccount exists, it exists forever or A prescription cn be used only once). Semntic constrints re invrints tht need to be mintined by the informtion system whenever the current instnce of the informtion system is chnged by some updte opertion. Further, semntic constrins re intended to support the users of n informtion system when they interpret instnces of system in terms of rel world Security Constrints Security constrints reflect obligtions nd restrictions of humn individuls in the outside mini-world modeled by the informtion system. Their min purpose is to mintin secrecy, integrity, nd vilbility. Mintining secrecy mens preventing the improper disclosure of dt. Users my ccess informtion directly by querying the informtion system or indirectly through logicl conclusions of their knowledge or belief. Thus, we cn distinguish between two types of confidentility. The first type is uthoriztion confidentility, roughly 9

10 Chpter 1 Introduction mening queries should be successfully invoked only by uthorized users. The second type of confidentility roughly mens tht the users knowledge nd belief should comply with the tsk specific restrictions, they should not be ble to infer informtion they re not entitled to know. Mintining vilbility mens voidnce of denil of service. Avilbility hs two spects: Firstly, whenever informtion is requested by user, the system should eventully provide this informtion or, in other words, user knowledge should eventully comply with the tsk specific richness. Secondly, whenever user submits n (updte) opertion, this opertion should eventully be executed. Mintining integrity mens preventing the improper modifiction of dt. In the context of security requirements this cn be seen s uthoriztion integrity : updtes should be successfully invoked only by uthorized users, e.g. in compny, employees my not increse their own slry. Security constrints re invrints tht re to be mintined by the system whenever some opertion sequences re executed on behlf of n ctor. Here, updte opertions (e.g. for mintining integrity) s well s red opertions (e.g. for mintining secrecy) re importnt. Further, security constrints re intended to support system users when they employ the system s communiction tool, e.g. by controlling the flow of informtion. Often we cnnot strictly distinguish mong integrity in the context of security, integrity s semntic constrints, nd integrity required by vilbility. However, in ll the three contexts, we sometimes hve obligtions concerning sequences of opertions: user should eventully invoke required opertion, collection of users should eventully invoke required sequences of opertions or stored dt should eventully rech required sttes. These obligtions cn be seen s wek obligtions: it is not required, tht they lwys re lwys stisfied, or tht they re stisfied immeditely fter some checkpoint. It is only required tht they will eventully be stisfied. Similrly, constrints in the context of vilbility cn be seen s wek constrints: gin, it is only required tht the system hs to execute requested opertions eventully nd not necessrily immeditely. 1.2 The Problem There re subtle interctions of semntic constrints nd security constrints in informtion systems. For exmple, the semntic constrints my demnd tht if some dt is modified, then dt b needs to be modified ccordingly, while the security constrints llow the user to modify only dt but not dt b. Another 10

11 1.3 Anlysis of the Problem exmple could be tht the knowledge bout semntic constrints revels informtion to user tht should be kept secret from her. To gurntee the desired functionlity of n informtion system, the specifiction of the system nd of the constrints should cover the requirements imposed by the rel world nd the ppliction context. It is essentil to investigte the interctions between the vrious types of constrints to ensure the correct design. The question tht rise re: Are the imposed constrints consistent? Does the system description ensure the desired constrints? Interctions of semntic constrints nd security constrints cn be investigted only if they re uniformly expressed in the sme frmework. Our im is to develop such frmework nd to hve n (t lest semi-) utomtic proof tool to nswer the bove questions. 1.3 Anlysis of the Problem An informtion system models prt of the rel world, often clled mini-world. The outside mini-world imposes certin restrictions on the dt stored in its objects. Semntic constrints of n informtion system reflect these restrictions of the modeled mini-world. In section we distinguished between two types of semntic constrints, nmely sttic semntic constrints nd dynmic semntic constrints. Sttic constrints restrict the possible sttes of the informtion system, wheres dynmic constrints restrict possible updtes nd sequences of updtes. Thus, our frmework must be ble to del with sttes nd (sequences of) updtes. The outside mini-world imposes certin obligtions nd restrictions on its ctors. Security constrints of n informtion system reflect these obligtions nd restrictions of the modeled outside mini-world. In section we identified three min types of security constrints, nmely secrecy, integrity, nd vilbility. Secrecy constrints restrict the flow of informtion by keeping trck of the ctors knowledge nd by restricting red ccess to dt. Thus, our frmework must hve notion of ctors knowledge nd of execute rights for red opertions. Integrity constrints restrict the possible updtes nd sequences of updtes by restricting the ctors write ccess to objects. Thus, our frmework must hve notion of execute rights for write opertions. 11

12 Chpter 1 Introduction Avilbility constrints impose obligtions on the system. In wek sense, these obligtions cn be modeled using temporl notions: If user submits n opertion, the system should eventully execute it. Thus, our frmework must hve notion of time. In the context of semntic constrints s well s in the context of security constrints we sometimes tlk bout sequences of opertions. Such sequences cn lso be modeled using temporl notions. Further, the frmework must be ble to formlize ctors, e.g. users, dministrtors etc. These ctors perform opertions, thus we need notion of opertions. Our frmework must lso be cpble of formlizing stored dt, e.g. by formlizing objects whose current stte represents the stored dt. On these objects, opertions re executble. Also, the current stte of the objects my chnge over time by the execution of opertions, which mens tht the stte of objects over time hs to be formlized. As observed bove, opertions cn be of vrious types: queries or red opertions, which chnge the knowledge of users, updte or write opertions, which chnge the stte of stored dt, nd uthoriztion opertions (like grnt or revoke) by which ctors cn grnt or revoke other ctors uthoriztions of opertions. If our frmework is cpble to express ll the constrints we wish to formlize, then it would be of gret help to hve n utomted resoning tool tht decides for set of constrints expressed in this frmework whether it is consistent or inconsistent. So, we re looking for frmework tht on the one hnd is expressive enough to encode ll the desired constrints nd on the other hnd is restricted enough to be decidble or t lest semi-decidble. 1.4 Our Approch In this work we develop logicl frmework tht is cpble to uniformly formlize semntic constrints nd security constrints of informtion systems. The frmework consists of computtionl model, logicl clculus the semntics of which is defined over the computtionl model nd tbleu bsed proof system. The computtionl model represents ech ctor nd ech object of n informtion system uniformly s gents. Ech gent cn perform opertions nd hs her own 12

13 1.4 Our Approch opertion lphbet. The dt stored in objects is represented by propositions locl to the respective gent. The fctul knowledge of n ctor is represented by propositions locl to the respective gent. We ssume tht ech gent works utonomously of other gents nd hs her own locl time line. Agents synchronize with other gents by jointly performing synchroniztion opertions. Ech gent hs locl view on the system nd locl stte. Two sttes of the system re equivlent for gent i if they do not differ in the locl stte of gent i, however, they cn differ in the locl stte of some gent j other thn i. This mens, if the system reches stte c from stte c through n opertion in which i hs not prticipted, the sttes c nd c re equivlent for i. To cpture n gent s knowledge in the model we define n indistinguishbility reltion for knowledge for ech gent i tht describes for ech stte c, which sttes re indistinguishble from c for gent i. Similrly, to cpture n gent s belief in the model, we define n indistinguishbility reltion for belief for ech gent i. Aprt from the computtionl model, our frmework contins temporl nd epistemic logic the semntics of which is defined on the described computtionl model. For ech gent, the lnguge provides locl next opertors lbelled by opertions, locl until opertor, locl belief nd locl knowledge opertor. The temporl prt of the logicl clculus is lightweight version of tht presented in [Nie97]. The key ide of the temporl prt of the logic is tht formule look t the configurtions from locl point of view of either single gent or of group of gents. The epistemic prt of the logicl clculus is closely relted to the work of Rmnujm presented in [Rm96]. We will discuss this in detil lter in chpter 2. The key ide of the epistemic prt of the logic is tht knowledge of gents chnges due to ctions: if n gent does not prticipte in n ction, her knowledge remins unffected nd lso, the enbling of n ction remins is independent of the knowledge of gents tht do not prticipte in the ction. The third component of our unifying frmework is sound nd complete tbleu bsed proof system for subset of this logic tht does not contin belief opertors. In the computtionl model, chnge of knowledge of n gent is only due to performnce of opertions by the gent. The enbling nd the effect of n opertion is dependent only on the knowledge of prticipting gents. This seems to be very nturl constrint. However, exctly this constrint mkes the tbleu system quite involved. Our tbleu system will explicitly represent the temporl reltions nd epistemic indistinguishbility reltions in the tbleu to hve kind of globl view on the whole system under construction. 13

14 Chpter 1 Introduction 1.5 Outline of the Thesis In chpter 2 we try to get n overview over the vrious pproches of modl logics vilble so fr for the specifiction of the vrious types of constrints nd discuss in detil the pproches relevnt for our frmework. In chpter 3 we describe our view of n informtion system. We define computtionl model nd show how this model represents our view of n informtion system. In chpter 4 we formlly define the syntx nd semntics of the specifiction lnguge nd investigte some properties of the lnguge. Chpters 5 nd 6 present the tbleu bsed proof system for the logic nd prove its soundness. The developed tbleu system is not complete if we consider the full logic. However, we show tht the tbleu system is complete for resonble subset of the defined logic. In chpter 7 we present detiled exmple in which we show, how the developed frmework cn be used to uniformly specify the vrious types of constrints in n informtion system. Finlly, in chpter 8 we discuss open problems which we did not investigte in this thesis. A prt of this work, nmely our view of n informtion system cptured in the computtionl model in chpter 3 nd the logicl lnguge defined in chpter 4 ws published s [BS03]. At some points in this work, we use text pssges from the mentioned publiction, if we find it pproprite nd do not see the need of reformultion. 14

15 Chpter 2 Relted Work In the pst lot of work concerning formliztion of dtbse constrints hs been done. In the logicl pproch to informtion systems, it is ssumed tht the system dministrtor expresses the semntic constrints in declrtive style t design time. He specifies formule in n ppropritely restricted forml lnguge of logic clculus. The logic clculus is presumed to hve syntx for formule nd model-theoretic semntics, i.e., there exists definition of formul is stisfied by some structure (or some interprettion) nd bsed on tht definition of set of formule implies nother formul. In the context of informtion system, instnces of n informtion system re considered s structures in the sense of the logic clculus. In policy oriented pproch to security, security dministrtor expresses the security constrints in declrtive style. He specifies some formule in n pproprite forml lnguge. It is ssumed tht besides syntx for formule, semntics is provided too, i.e. definition of formul is stisfied by history tht comprises, possibly mong others, sequence of ctul executions of opertions, nd bsed on tht, of set of formule implies nother formul. In this section we nlyze vrious pproches for the logicl formliztion of informtion systems found in the literture. While semnticl constrints hve been widely investigted, still lot of work is required with regrd to security constrints nd in prticulr with regrd to the combintion of both types. In the introduction we hve identified spects tht should be met by the frmework: The frmework should be suited to model sttes of the informtion system, its temporl behviour nd its epistemic behviour in distributed environment, in which vrious components ct utonomously nd concurrently. In most ppers only few spects of security constrints were investigted, other spects were fded out. 15

16 Chpter 2 Relted Work 2.1 Temporl Aspects in Distributed Informtion Systems Temporl logics hve been successfully used for modeling temporl integrity constrints in informtion systems (see e.g. [CT98]): Updtes nd integrity constrints cn be formulted in n bstrct, representtion-independent wy. Chomicki nd Tomn give n overview of the development of temporl logics in informtion systems. Informtion systems cn be seen s open, rective nd usully distributed systems tht dministrte persistent dt. Ech component (object, user, dministrtor, etc.) crries out opertions tht chnge the stte of the informtion system. It is especilly interesting for our im to look for temporl logics tht llow to model distributed behviour. A lot of work hs been done in the field of modeling temporl behviour in rective systems nd multi-gent systems (see for exmple [MP92], [Lm94], [LPRT93], [Wei99], [HS98], [Woo00]). In the field of multi-gent systems very common pproch re BDI-models (beliefdesire-intention-models), [Wei99], [HS98], [Woo00]. Agents re seen s entities tht re cpble of observing their environment nd of resoning bout it nd of independently nd utonomously performing ctions bsed upon decisions mde by these gents dependent on their observtions of the environment. In this perspective, ech gent is ssumed to hve its own belief, desires nd intentions. In [Woo00], Wooldridge introduces very powerful first-order BDI-logic clled LORA (Logic for Resoning Agents). LORA consists of severl components: first-order component, belief/desire/intention component nd temporl component. The temporl component is bsed on CTL, well known temporl logic with n interleving semntics. Rective systems cn be seen bit wider thn multi-gent-systems. In rective systems, not ll components necessrily need to be gents in the sense described bove. A very common model for rective systems re so-clled Mzurkiewicz trces, refer [Mz95], [MOP89]. Mzurkiewicz trces re semntic concept for modeling concurrency. Unlike other semntic concepts, e.g. Kripke structures, the min chrcteristic of such trce systems is to explicitly differentite between concurrency nd nondeterministic choice. Another min feture of trce systems is the bstrction of interleving; modeling of true concurrency is possible. In trnsition system, b ( prllel b) is modeled sme s, b b, (nondeterministic choice between followed by b nd b followed by ). A trce system on the other hnd differentites between these two opertions. Although this model is not more expressive thn semntic concepts with interleving, it cn void the known (notorious) stte explosion problem. Temporl logics for distributed systems bsed on Mzurkiewicz-trce systems hve 16

17 2.2 Epistemic Aspects in Distributed Systems been developed by Penczek, Thigrjn, Lody, Rmnujm, Niebert nd others [Thi94, Pen93, Nie97]. Thigrjn develops TPTL (Trce bsed Propositionl Temporl Logic) in [Thi93] to express nonsequentil behviour directly without using interleving. Nonsequentil behviour occurs in rective systems with multiple utonomous sequentil gents. A more expressive logic ws introduced by Niebert in [Nie95, Nie97]. In ddition to the usul logicl connectors, TPTL contins locl next nd until, similr to the ones known from PTL (for detiled description see [Thi93]). νtrptl contins fixpoint opertors insted of until, thus νtrptl is strongly more expressive thn TPTL. TPTL s well s νtrptl bse upon trces seen s nonsequentil runs of distributed system. Such system consists of n rbitrry but fixed number k of sequentil gents which synchronize by performing ctions jointly. Ech gent i is ssigned non-empty locl lphbet Σ i of ctions, Σ = (Σ 1, Σ 2,..., Σ k ), (k = number of gents of the system) is clled distributed lphbet. Agent i must tke prt in ech ction Σ i. Thus synchroniztion between individul gents is modeled by the joint execution of ctions. If two ctions nd b re not contined in the sme lphbet, they cn be executed independently. Infinite trces cn be seen s Σ-lbelled prtil orders (fulfilling certin chrcteristics), where Σ = i {1,...,k} Σ i. [Thi93, NS97] prove the decidbility of the stisfibility problem for TPTL s well s for νtrptl. Inspired by this development of logics for distributed systems, Ehrich, Cleiro, Sernds nd Denker presented in [ECSD98] two object-oriented logics cpble of expressing communiction mong objects. In these logics, ll objects of dtbse system re seen s sequentil gents nd re thus components of the distributed system. 2.2 Epistemic Aspects in Distributed Systems There re severl pproches in which dtbse is seen s collection of knowledge (see e.g. [Rei90] or [CD96, CD97]). If we follow this view, we cn uniformly see dtbse objects, users, dministrtors etc. s resoning gents in distributed environment. Over the lst decde, modelling of knowledge hs been field of gret reserch interest, especilly for multi-gent systems. [FHMV95] gives n excellent overview of the stte of the rt in this topic. Trditionlly, modl logics of knowledge re interpreted over globl sttes of the distributed system. As motivted in the introduction, we cnnot ssume such globl stte: Every gent only hs locl view on the system nd when the system chnges due to n ction by group of gents, only gents of the cting group 17

18 Chpter 2 Relted Work typiclly know the effect of tht ction. The knowledge of the non-prticipting gents remins unchnged, nd this fct is known by ll gents. Rmnujm nlyses in [Rm96, Rm94, Rm99] the mening of knowledge in distributed systems. A similr discussion crried out by Vn der Hoek nd Meyer in [vdhm92] ddresses the following questions: 1. Wht exctly is knowledge stte? 2. Is the knowledge tht is logiclly implied by the vilble informtion ctully computble? 3. Given knowledge stte, cn we decide, which other sttes re rechble? 4. Cn the ctions of one gent hve influence on the knowledge of nother? Rmnujm develops n ction bsed temporl nd epistemic logic ([Rm94]), in which knowledge chnges cused by ctions of gents cn be expressed. This logic is nturl extension of PDL (Propositionl Dynmic Logic) with ctions enriched with the modl opertor K s it is defined by Hintikk in the logic S Deontic Aspects We considered different types of constrints in the introduction. Security constrints in dtbse system lwys del with obligtions nd uthoriztions. The tendency to formlize such constrints through deontic logic hs been minly followed by Cuppens, Demolombe, Crmo nd Jones. In this method, dtbse is considered s normtive system nd the corresponding security nd semntic constrints re seen s deontic constrints: It ought to be, tht..., It is necessry, tht..., It is permitted, tht... The mening of normtive system in this context is, tht set of gents (softwre systems, humns etc.) interct ccording to some rules. It is not explicitly mentioned, tht the misconduct of the gents is impossible. Normtive systems rther suggest, how to hndle the misconduct of n gent. In these pproches, it is often distinguished between hrd nd soft deontic constrints (see [CJ94]). Hrd deontic constrints re constrints, tht my never be violted, such s Every member of the deprtment possesses n identifiction number. Soft deontic constrints, e.g. Books cn only be issued to the members of the deprtment, must eventully be fulfilled, however, they might be violted for certin period of time. Similr to this view is the distinction between idel, sub-idel nd prohibited sttes of such system. This method of clssifiction of sttes ws first introduced by [JP85]. Idel sttes in dtbses re those situtions, in which ll 18

19 2.4 Combintion of Deontic nd Epistemic Aspects constrints re fulfilled. In sub-idel sttes, some wek constrints my be violted, but the system must still be trnsformble in n idel stte, i.e. eventully fulfill ll constrints. Prohibited sttes correspond to situtions which re not llowed to occur. Logics suggested in this context (e.g. in [CJ94]) minly focus on the deontic spects. Temporl fetures s we would need them for our frmework re only very bsic (minly simple trnsitions between sttes), strong temporl components like until or eventully to cpture lrger periods of time re not provided. In our view, uthoriztions for performing opertions cn be modeled by ssigning prticulr rights to the components of the informtion system. Then we cn formlize temporl constrint, tht roughly expresses the following: All opertions tht re not explicitly llowed for component, cnnot hppen. We could lso formlize dul temporl constrint: All opertions tht re not explicitly forbidden, my eventully hppen. These rights re not sttic in the system but my be chnged by other components. The distinction between soft deontic constrints (those, tht must eventully be fulfilled) nd hrd deontic constrints (those, tht must lwys be fulfilled) cn lso be done in temporl wy: Hrd deontic constrints lwys hve to be fulfilled, wheres soft deontic constrints my be violted t some sttes but must eventully be fulfilled. As consequence, in our pproch deontic spects re completely reduced to temporl spects nd the dded feture of explicit rights, or explicit forbiddnces, respectively. Dignum et l hve somewht different interprettion of deontic spects in [DMWK96]. This pper dels with the question, which obligtions for individul users of dtbse systems re born from the corresponding pst of ech user. The logic developed in this pper consists of temporl opertors (directed into pst) nd deontic opertors, dynmic (ought-to-do), s well s sttic (ought-to-be). Further, the logic contins one more modl opertor, which formlizes the intention of the corresponding gent. This opertor cn be seen s kind of Next-opertor, which only llows ctions, which re idel in sense of intended ctions, s next ctions. 2.4 Combintion of Deontic nd Epistemic Aspects We look bck to the epistemic spects of security constrints. There re lot of works, minly by Reiter [Rei90], Cuppens nd Demolombe [CD96, CD97], but lso by McEwen [GMP92, MCK96] in which dtbse is seen s collection of knowledge: the dtbse knows or believes in set of fcts bout the rel world, users of the dtbse get to know the prts of these fcts by querying the dtbse. In 19

20 Chpter 2 Relted Work ssocition with inference control, the question rises, which knowledge is llowed to be ccumulted by user? Wht is he unuthorized to know? In ([CD97]), Cuppens nd Demolombe define modl logic with epistemic nd deontic opertors nd bsed on Kripke structures. They show, tht this logic is xiomtisble. It cn be expressed in this logic, which contents of dtbse user knows (KB i ), or my know (PKB i ) s well s which contents user in prticulr role my or my not know (PKB r, FKB r ). The knowledge, the prohibitions or permissions to know re lwys relted to the fcts in the dtbse. Knowledge bout the knowledge of other users or the knowledge bout the ctions performed in the dtbse is however not formultble. Chnges in the dtbse, which led to chnges of knowledge of the users, were lso disregrded. It is ssumed, tht the contents of the dtbse re fixed. In our context we must ssume, tht users cn gin knowledge not only bout the dt stored in the informtion system but lso bout the behviour of the system itself s well s of the knowledge (or belief) of other users. 20

21 Chpter 3 Our View of n Informtion System In this chpter, we cpture our view of n informtion system in computtionl model for the temporl nd epistemic logic defined in the next section. The model consists of three spects: sttic spects, dynmic spects concerning control nd dynmic spects concerning knowledge nd belief. In the first two spects we roughly follow the definitions in [Nie97] of prtil order model for rective system. We then extend the model by n epistemic component. The epistemic definitions re more or less stndrd: Situtions (worlds) re relted by indistinguishbility reltions. To cpture interction between knowledge nd time, we define the indistinguishbility reltions dependent of the temporl definitions. 3.1 Sttic Aspects We view distributed informtion system s consisting of severl components, e.g. dt objects, users, dministrtors, nd security mngers. If the informtion system is viewed s piece of softwre, then dt objects lie inside the system wheres users, dministrtors, etc. pper outside the system. If we provide representtive user-gent inside the system for ech outside ctor, nd repository-gent for ech dt object, then we cn model ll the components of n informtion system uniformly s sequentil gents. We cll the finite set of ll k gents of n informtion system Ag. Tht is, Ag := {1,..., k}. The current stte of ech object, i.e. its dt content, is represented by set of propositions locl to the corresponding repository-gents. Similrly, the current stte of user, i.e. wht dt she hs red or which rights hve been grnted to her, is represented by set of propositions locl to the corresponding user-gent. Ech gent i of our system is thus ssocited with finite set of locl propositions P i. Let P := (P 1,..., P k ) 21

22 Chpter 3 Our View of n Informtion System be the distributed set of propositions, such tht P i P j = for i j. Further, we denote with P = i Ag P i the set of ll propositions. All gents cn perform opertions (red, insert, delete, grnt rights, revoke rights, etc.) prtly utonomously, prtly together with other gents s joint opertions. Seen s whole system, ll these components work concurrently: E.g. while ctor 1 inserts some vlue x in object o, nother ctor 2 could t the sme time (concurrently) grnt some execute right r to third ctor 3. However, ech single component performs its opertions sequentilly. Thus, we equip ech gent i with her own finite, non-empty opertion lphbet O i. Let Õ = (O 1,..., O k ) be distributed set of opertions, nd O = i Ag O i. With g(op) := {i Ag op O i } we refer to the set of gents which re involved in the execution of joint opertion op. An opertion op O i O j is clled synchroniztion opertion between gents i nd j. Two opertions op 1 nd op 2 re clled independent iff g(op 1 ) g(op 2 ) =. The informl mening of these opertions will be represented by the chnges of the interprettion (see definition below) of locl propositions. Summrizing the discussion bove, we see the sttic declrtions of distributed informtion system s concurrent system of sequentil gents, where ech gent is equipped with set of opertions nd set of locl propositions. Definition (sttic declrtions of n informtion system) Let the sttic declrtions of n informtion system be defined s tuple (Ag, Õ, P), consisting of set of gents, their distributed set of opertions nd their distributed set of locl propositions. 3.2 Dynmic Aspects Concerning Control Given the sttic declrtions of n informtion system, we now describe the control flow of its possible dynmic behviours. Below, this control flow is formlized s runs. Ech occurrence of n opertion within behviour is denoted by n event. Thus possible behviour is cptured by set of events which should stisfy some requirements in order to represent resonble control flow. It should be finite or t most denumerbly infinite. 22

23 3.2 Dynmic Aspects Concerning Control It should be prtilly ordered ccording to the reltive occurrence of events in time. It should distinguish some specific events s the explicit beginning of behviour. More precisely, ech single event should hve only finite set of predecessors ccording to the prtil order. At ech event, exctly one opertion occurs. For ech gent i, the set of events this gent is involved in is even totlly ordered ccording to the reltive sequence in time. Every occurrence of n opertion in the control flow of possible behviour of n informtion system is n event. The set of ll events of run is prtilly ordered. And since we hve n explicit beginning of the run of such n informtion system, the downwrd closure of ech subset of the set of events of run is finite. Definition (downwrd closure) Let E be set nd E E be prtil order on E. For M E, M := {e E e M : e e } denotes the downwrd closure of M. For e E we write e insted of {e }. Now we cn formlly define the control flow of possible behviour of n informtion system s run. Definition (run) A run F (Ag,Õ, P) = (E,, λ) of n informtion system with the sttic declrtions (Ag, Õ, P) is prtilly ordered, lbelled set of events E, s.t. the following holds: E is finite or denumerbly infinite. is prtil order on E. For ll e E the downwrd closure e is finite. λ : E O is lbelling function yielding the opertion λ(e) occurred t event e. For ll i Ag, the reduction of on E i := {e E λ(e) O i }, i.e. (E i E i ), is totl order. 23

24 Chpter 3 Our View of n Informtion System We define F (Ag, Õ, P) s the set of ll possible runs F (Ag,Õ, P) over the sme sttic declrtions (Ag, Õ, P). We write F insted of F (Ag,Õ, P) nd F insted of F (Ag,Õ, P) where this does not led to misunderstndings. (F, c 0 ) (F, c 1 ) (F, c 2 ) (F, c 3 )(F, c 4 ) Ag 1 e 1 e 12 e 13 Ag 2 e 2 Ag 3 e 3 Exmples of configurtions: c 0 =, c 1 = {e 3 }, c 2 = {e 1, e 3 }, c 3 = {e 1, e 3, e 12 }, c 4 = {e 1, e 3, e 12, e 2 } Ag 3 s view of configurtion c 4 : g 3 c 4 = c 1 = {e 3 } c 1 Ag3 c 2 Ag3 c 3 Ag3 c 4 Figure 3.1: Exmple of run nd locl configurtions See figure 3.1 for n illustrtion of possible run: The exmple run is executed by three gents Ag 1, Ag 2 nd Ag 3. Ech gent is represented by her own (horizontl) time line. The gents perform opertions sequentilly: Ag 1 performs the sequence of opertions op 1, op 12, op 13. Agent Ag 2 performs the sequence of opertions op 12, op 2. And gent Ag 3 performs the sequence of opertions op 3, op 13. Ech event, i.e. occurrence of n opertion, is represented by verticl br with circles for the prticipting gents. Though the events for ech gent re totlly ordered, the set of ll events of the system re only prtilly ordered: for exmple, opertions op 1 nd op 3 re performed concurrently, no order is given between them. A configurtion c of run F is downwrd closed set of events, it contins ll events tht re performed by gents up to prticulr point in time. Ech gent only hs locl view on the system. The locl view on configurtion c of run F for n gent i is itself configurtion nd consists of the downwrd closure of ll events tht 24

25 3.2 Dynmic Aspects Concerning Control gent i hs performed in configurtion c. It is thus the lest configurtion which coincides with c on ll i-events. Formlly, we define configurtion s follows: Definition ((locl) configurtion; i-view) Let F = (E,, λ) be run. A configurtion c of F is finite, downwrd closed set of events (i.e. c E nd c = c). Let C F denote the set of ll configurtions of run F. The locliztion of configurtion i c := (c E i ) is clled the i-view of configurtion c, i.e. the i-view is the lest configurtion tht coincides with c on ll i-events. Two configurtions c, c of F re sid to be i-equivlent (c i c ), iff i c = i c. They re sid to be A-equivlent (c A c ), iff they re i-equivlent for ech i A. On configurtions of F we define successor reltion so tht c op c iff c = c {e} for some e E with λ(e) = op. Two configurtions of the sme run tht differ from ech other only through events in which gent i does not prticipte re equivlent from the point of view of gent i. We cll such configurtions i-equivlent. If configurtions c becomes configurtion d by execution of n opertion op nd configurtion c becomes configurtion d by execution of n opertion op, nd if c i c for t lest one i g(op), then opertion op is synchroniztion opertion for ll gents j g(op) nd thus, the resulting configurtions d nd d re j-equivlent (d j d ) for ll j g(op). Lemm Let c, c, d, d C F be configurtions of the sme run F, nd let op be n opertion. It holds tht if c i c for ny i g(op) nd c op d nd c op d then d j d for ll gents j g(op). Proof: Let F be run nd let c, c, d, d C F be configurtions of this run. Let op be n opertion. c i c for ny gent i g(op) nd c op d nd c op d. 25

26 Chpter 3 Our View of n Informtion System c i c for ny gent i g(op) nd c op d nd c op d. = (c E i ) = (c E i ) nd there exist events e, e E with c {e} = d with λ(e) = op nd c {e } = d with λ(e ) = op = (* by definition item (5) *) (c E i ) = (c E i ) nd there exists n event e E i with c {e} = d nd c {e} = d with λ(e) = op = (* by definition d nd d re downwrd closed *) c j c for ll j g(op) = (* e E j for ll j Ag *) d j d for ll gents j g(op) Consider gin figure 3.1. A configurtion is indicted by (more or less verticl) line tht crosses ech gent s time line t box. The configurtion contins ll events to the left of the line. The initil configurtion c 0 = contins no events. In the figure it is denoted by dshed line. The configurtions c 1, c 2, c 3 nd c 4 re equivlent from gent Ag 3 s point of view, which is illustrted by the solid lines through gent Ag 3 s second box. In ech of these configurtions, gent Ag 3 hs performed only event e 3, the configurtions differ only in events performed by other gents. Configurtion c 1 represents the view of gent Ag 3 on ll the configurtions c 1, c 2, c 3 nd c 4. Sometimes, we need to tlk bout configurtions of different runs. To mke sure, which configurtion of which run we men, we hve to nme both the configurtion nd the run to which it belongs. Definition (sitution) We cll (F, c) sitution, when F = (E,, λ) is run nd c C F is configurtion of this run. On situtions we define successor reltion so tht (F, c) op (F, c ) iff c op c for c, c C F. We define i (F, c) s the locliztion of sitution (F, c) iff i (F, c) = (F, c ) nd c = i c. Two situtions (F, c) nd (F, c ) re clled i-equivlent ((F, c) i (F, c )) iff c i c. For set of runs A we define A := {(F, c) F A, c C F } to be the set of ll situtions of ll runs in A. Note, tht our definition of sitution minly describes progress in time nd leves propositions still uninterpreted. 26

27 3.3 Dynmic Aspects Concerning Knowledge nd Belief 3.3 Dynmic Aspects Concerning Knowledge nd Belief In order to cpture the gent s knowledge nd belief, we need more generl notion of indistinguishbility thn is defined bove. An gent does not know the ctul current configurtion of the ctul run of the system. At ll times, n gent i only sees prtil system, e.g. it cn notice the behviour of other gents only vi synchroniztion opertions, other opertions of other gents re independent of nd invisible for gent i. Aprt from tht, the gent is not even wre of the ctul run, she for exmple cnnot distinguish between the ctul configurtion of the ctul run nd configurtion of different run, in which she hs cquired the sme knowledge. Though we ssume tht n gent knows, which opertions other gents my in principle perform, i.e. though the gent is wre bout other gents opertion lphbet, she does not know which opertions the other gents ctully perform. Further, we do not require tht the gents hve perfect recll, which mens, we do not ssume tht ech gent lwys remembers ll the opertions she hs lredy performed nd lwys remembers ll the knowledge, she hs lredy cquired. We llow tht n gent i considers two situtions s indistinguishble, though they hve different history locl to gent i. The gent does not necessrily remember the wy how she cquired some knowledge, she only knows, tht she hs cquired the knowledge. As lredy indicted bove, since ech gent only hs prtil view on the whole system, she does not know ll fcts tht re true. As in the epistemic logic S5 we require, however, tht if n gent knows fct, then this fct must be true. This property is often clled the Knowledge Axiom or the Truth Axiom. Further, s in the epistemic logic S5 we require tht gents cn do introspection regrding their knowledge. An gent should know, wht she knows (this is typiclly clled Positive Introspection) nd she should know, wht she does not know (typiclly clled Negtive Introspection). Lter, in chpter 4.2 we define tht n gent knows fct if this fct is true in ll situtions indistinguishble for this gent. (In terms of stndrd modl logics such situtions re clled indistinguishble, the corresponding reltion is clled indistinguishbility reltion.) We now define n indistinguishbility reltion R k i for knowledge for ech gent i Ag. In the definition of the indistinguishbility reltion we follow the stndrd pproch of the modl logic S5 (KT45). As for exmple shown in [FHMV95], ech of the bove requirements is directly reflected by properties of the indistinguishbility reltion: Reflexivity of the indistinguishbility reltion reflects the truth xiom, trnsitivity of the indistinguishbility reltion reflects the positive introspection xiom nd the Eucliden property reflects the negtive introspection xiom. Hence, 27

Duality # Second iteration for HW problem. Recall our LP example problem we have been working on, in equality form, is given below.

Duality # Second iteration for HW problem. Recall our LP example problem we have been working on, in equality form, is given below. Dulity #. Second itertion for HW problem Recll our LP emple problem we hve been working on, in equlity form, is given below.,,,, 8 m F which, when written in slightly different form, is 8 F Recll tht we

More information

KNOWLEDGE-BASED AGENTS INFERENCE

KNOWLEDGE-BASED AGENTS INFERENCE AGENTS THAT REASON LOGICALLY KNOWLEDGE-BASED AGENTS Two components: knowledge bse, nd n inference engine. Declrtive pproch to building n gent. We tell it wht it needs to know, nd It cn sk itself wht to

More information

Math 1B, lecture 4: Error bounds for numerical methods

Math 1B, lecture 4: Error bounds for numerical methods Mth B, lecture 4: Error bounds for numericl methods Nthn Pflueger 4 September 0 Introduction The five numericl methods descried in the previous lecture ll operte by the sme principle: they pproximte the

More information

Strong Bisimulation. Overview. References. Actions Labeled transition system Transition semantics Simulation Bisimulation

Strong Bisimulation. Overview. References. Actions Labeled transition system Transition semantics Simulation Bisimulation Strong Bisimultion Overview Actions Lbeled trnsition system Trnsition semntics Simultion Bisimultion References Robin Milner, Communiction nd Concurrency Robin Milner, Communicting nd Mobil Systems 32

More information

Bisimulation. R.J. van Glabbeek

Bisimulation. R.J. van Glabbeek Bisimultion R.J. vn Glbbeek NICTA, Sydney, Austrli. School of Computer Science nd Engineering, The University of New South Wles, Sydney, Austrli. Computer Science Deprtment, Stnford University, CA 94305-9045,

More information

Properties of Integrals, Indefinite Integrals. Goals: Definition of the Definite Integral Integral Calculations using Antiderivatives

Properties of Integrals, Indefinite Integrals. Goals: Definition of the Definite Integral Integral Calculations using Antiderivatives Block #6: Properties of Integrls, Indefinite Integrls Gols: Definition of the Definite Integrl Integrl Clcultions using Antiderivtives Properties of Integrls The Indefinite Integrl 1 Riemnn Sums - 1 Riemnn

More information

7.2 The Definite Integral

7.2 The Definite Integral 7.2 The Definite Integrl the definite integrl In the previous section, it ws found tht if function f is continuous nd nonnegtive, then the re under the grph of f on [, b] is given by F (b) F (), where

More information

Refined interfaces for compositional verification

Refined interfaces for compositional verification Refined interfces for compositionl verifiction Frédéric Lng INRI Rhône-lpes http://www.inrilpes.fr/vsy Motivtion Enumertive verifiction of concurrent systems Prllel composition of synchronous processes

More information

f(x) dx, If one of these two conditions is not met, we call the integral improper. Our usual definition for the value for the definite integral

f(x) dx, If one of these two conditions is not met, we call the integral improper. Our usual definition for the value for the definite integral Improper Integrls Every time tht we hve evluted definite integrl such s f(x) dx, we hve mde two implicit ssumptions bout the integrl:. The intervl [, b] is finite, nd. f(x) is continuous on [, b]. If one

More information

Recitation 3: More Applications of the Derivative

Recitation 3: More Applications of the Derivative Mth 1c TA: Pdric Brtlett Recittion 3: More Applictions of the Derivtive Week 3 Cltech 2012 1 Rndom Question Question 1 A grph consists of the following: A set V of vertices. A set E of edges where ech

More information

Lecture 1. Functional series. Pointwise and uniform convergence.

Lecture 1. Functional series. Pointwise and uniform convergence. 1 Introduction. Lecture 1. Functionl series. Pointwise nd uniform convergence. In this course we study mongst other things Fourier series. The Fourier series for periodic function f(x) with period 2π is

More information

1 Online Learning and Regret Minimization

1 Online Learning and Regret Minimization 2.997 Decision-Mking in Lrge-Scle Systems My 10 MIT, Spring 2004 Hndout #29 Lecture Note 24 1 Online Lerning nd Regret Minimiztion In this lecture, we consider the problem of sequentil decision mking in

More information

p-adic Egyptian Fractions

p-adic Egyptian Fractions p-adic Egyptin Frctions Contents 1 Introduction 1 2 Trditionl Egyptin Frctions nd Greedy Algorithm 2 3 Set-up 3 4 p-greedy Algorithm 5 5 p-egyptin Trditionl 10 6 Conclusion 1 Introduction An Egyptin frction

More information

Chapter 14. Matrix Representations of Linear Transformations

Chapter 14. Matrix Representations of Linear Transformations Chpter 4 Mtrix Representtions of Liner Trnsformtions When considering the Het Stte Evolution, we found tht we could describe this process using multipliction by mtrix. This ws nice becuse computers cn

More information

Review of Calculus, cont d

Review of Calculus, cont d Jim Lmbers MAT 460 Fll Semester 2009-10 Lecture 3 Notes These notes correspond to Section 1.1 in the text. Review of Clculus, cont d Riemnn Sums nd the Definite Integrl There re mny cses in which some

More information

Finite Automata. Informatics 2A: Lecture 3. John Longley. 22 September School of Informatics University of Edinburgh

Finite Automata. Informatics 2A: Lecture 3. John Longley. 22 September School of Informatics University of Edinburgh Lnguges nd Automt Finite Automt Informtics 2A: Lecture 3 John Longley School of Informtics University of Edinburgh jrl@inf.ed.c.uk 22 September 2017 1 / 30 Lnguges nd Automt 1 Lnguges nd Automt Wht is

More information

Bernoulli Numbers Jeff Morton

Bernoulli Numbers Jeff Morton Bernoulli Numbers Jeff Morton. We re interested in the opertor e t k d k t k, which is to sy k tk. Applying this to some function f E to get e t f d k k tk d k f f + d k k tk dk f, we note tht since f

More information

UNIFORM CONVERGENCE. Contents 1. Uniform Convergence 1 2. Properties of uniform convergence 3

UNIFORM CONVERGENCE. Contents 1. Uniform Convergence 1 2. Properties of uniform convergence 3 UNIFORM CONVERGENCE Contents 1. Uniform Convergence 1 2. Properties of uniform convergence 3 Suppose f n : Ω R or f n : Ω C is sequence of rel or complex functions, nd f n f s n in some sense. Furthermore,

More information

The Regulated and Riemann Integrals

The Regulated and Riemann Integrals Chpter 1 The Regulted nd Riemnn Integrls 1.1 Introduction We will consider severl different pproches to defining the definite integrl f(x) dx of function f(x). These definitions will ll ssign the sme vlue

More information

Concepts of Concurrent Computation Spring 2015 Lecture 9: Petri Nets

Concepts of Concurrent Computation Spring 2015 Lecture 9: Petri Nets Concepts of Concurrent Computtion Spring 205 Lecture 9: Petri Nets Sebstin Nnz Chris Poskitt Chir of Softwre Engineering Petri nets Petri nets re mthemticl models for describing systems with concurrency

More information

20 MATHEMATICS POLYNOMIALS

20 MATHEMATICS POLYNOMIALS 0 MATHEMATICS POLYNOMIALS.1 Introduction In Clss IX, you hve studied polynomils in one vrible nd their degrees. Recll tht if p(x) is polynomil in x, the highest power of x in p(x) is clled the degree of

More information

Lecture 3: Equivalence Relations

Lecture 3: Equivalence Relations Mthcmp Crsh Course Instructor: Pdric Brtlett Lecture 3: Equivlence Reltions Week 1 Mthcmp 2014 In our lst three tlks of this clss, we shift the focus of our tlks from proof techniques to proof concepts

More information

Improper Integrals. Type I Improper Integrals How do we evaluate an integral such as

Improper Integrals. Type I Improper Integrals How do we evaluate an integral such as Improper Integrls Two different types of integrls cn qulify s improper. The first type of improper integrl (which we will refer to s Type I) involves evluting n integrl over n infinite region. In the grph

More information

Reinforcement Learning

Reinforcement Learning Reinforcement Lerning Tom Mitchell, Mchine Lerning, chpter 13 Outline Introduction Comprison with inductive lerning Mrkov Decision Processes: the model Optiml policy: The tsk Q Lerning: Q function Algorithm

More information

The First Fundamental Theorem of Calculus. If f(x) is continuous on [a, b] and F (x) is any antiderivative. f(x) dx = F (b) F (a).

The First Fundamental Theorem of Calculus. If f(x) is continuous on [a, b] and F (x) is any antiderivative. f(x) dx = F (b) F (a). The Fundmentl Theorems of Clculus Mth 4, Section 0, Spring 009 We now know enough bout definite integrls to give precise formultions of the Fundmentl Theorems of Clculus. We will lso look t some bsic emples

More information

New data structures to reduce data size and search time

New data structures to reduce data size and search time New dt structures to reduce dt size nd serch time Tsuneo Kuwbr Deprtment of Informtion Sciences, Fculty of Science, Kngw University, Hirtsuk-shi, Jpn FIT2018 1D-1, No2, pp1-4 Copyright (c)2018 by The Institute

More information

Handout: Natural deduction for first order logic

Handout: Natural deduction for first order logic MATH 457 Introduction to Mthemticl Logic Spring 2016 Dr Json Rute Hndout: Nturl deduction for first order logic We will extend our nturl deduction rules for sententil logic to first order logic These notes

More information

Chapter Five: Nondeterministic Finite Automata. Formal Language, chapter 5, slide 1

Chapter Five: Nondeterministic Finite Automata. Formal Language, chapter 5, slide 1 Chpter Five: Nondeterministic Finite Automt Forml Lnguge, chpter 5, slide 1 1 A DFA hs exctly one trnsition from every stte on every symol in the lphet. By relxing this requirement we get relted ut more

More information

Infinite Geometric Series

Infinite Geometric Series Infinite Geometric Series Finite Geometric Series ( finite SUM) Let 0 < r < 1, nd let n be positive integer. Consider the finite sum It turns out there is simple lgebric expression tht is equivlent to

More information

Finite Automata Theory and Formal Languages TMV027/DIT321 LP4 2018

Finite Automata Theory and Formal Languages TMV027/DIT321 LP4 2018 Finite Automt Theory nd Forml Lnguges TMV027/DIT321 LP4 2018 Lecture 10 An Bove April 23rd 2018 Recp: Regulr Lnguges We cn convert between FA nd RE; Hence both FA nd RE ccept/generte regulr lnguges; More

More information

Riemann Sums and Riemann Integrals

Riemann Sums and Riemann Integrals Riemnn Sums nd Riemnn Integrls Jmes K. Peterson Deprtment of Biologicl Sciences nd Deprtment of Mthemticl Sciences Clemson University August 26, 2013 Outline 1 Riemnn Sums 2 Riemnn Integrls 3 Properties

More information

Advanced Calculus: MATH 410 Notes on Integrals and Integrability Professor David Levermore 17 October 2004

Advanced Calculus: MATH 410 Notes on Integrals and Integrability Professor David Levermore 17 October 2004 Advnced Clculus: MATH 410 Notes on Integrls nd Integrbility Professor Dvid Levermore 17 October 2004 1. Definite Integrls In this section we revisit the definite integrl tht you were introduced to when

More information

Parse trees, ambiguity, and Chomsky normal form

Parse trees, ambiguity, and Chomsky normal form Prse trees, miguity, nd Chomsky norml form In this lecture we will discuss few importnt notions connected with contextfree grmmrs, including prse trees, miguity, nd specil form for context-free grmmrs

More information

Chapter 0. What is the Lebesgue integral about?

Chapter 0. What is the Lebesgue integral about? Chpter 0. Wht is the Lebesgue integrl bout? The pln is to hve tutoril sheet ech week, most often on Fridy, (to be done during the clss) where you will try to get used to the ides introduced in the previous

More information

Intermediate Math Circles Wednesday, November 14, 2018 Finite Automata II. Nickolas Rollick a b b. a b 4

Intermediate Math Circles Wednesday, November 14, 2018 Finite Automata II. Nickolas Rollick a b b. a b 4 Intermedite Mth Circles Wednesdy, Novemer 14, 2018 Finite Automt II Nickols Rollick nrollick@uwterloo.c Regulr Lnguges Lst time, we were introduced to the ide of DFA (deterministic finite utomton), one

More information

Line and Surface Integrals: An Intuitive Understanding

Line and Surface Integrals: An Intuitive Understanding Line nd Surfce Integrls: An Intuitive Understnding Joseph Breen Introduction Multivrible clculus is ll bout bstrcting the ides of differentition nd integrtion from the fmilir single vrible cse to tht of

More information

Review of basic calculus

Review of basic calculus Review of bsic clculus This brief review reclls some of the most importnt concepts, definitions, nd theorems from bsic clculus. It is not intended to tech bsic clculus from scrtch. If ny of the items below

More information

Riemann Sums and Riemann Integrals

Riemann Sums and Riemann Integrals Riemnn Sums nd Riemnn Integrls Jmes K. Peterson Deprtment of Biologicl Sciences nd Deprtment of Mthemticl Sciences Clemson University August 26, 203 Outline Riemnn Sums Riemnn Integrls Properties Abstrct

More information

CS 275 Automata and Formal Language Theory

CS 275 Automata and Formal Language Theory CS 275 Automt nd Forml Lnguge Theory Course Notes Prt II: The Recognition Problem (II) Chpter II.6.: Push Down Automt Remrk: This mteril is no longer tught nd not directly exm relevnt Anton Setzer (Bsed

More information

W. We shall do so one by one, starting with I 1, and we shall do it greedily, trying

W. We shall do so one by one, starting with I 1, and we shall do it greedily, trying Vitli covers 1 Definition. A Vitli cover of set E R is set V of closed intervls with positive length so tht, for every δ > 0 nd every x E, there is some I V with λ(i ) < δ nd x I. 2 Lemm (Vitli covering)

More information

New Expansion and Infinite Series

New Expansion and Infinite Series Interntionl Mthemticl Forum, Vol. 9, 204, no. 22, 06-073 HIKARI Ltd, www.m-hikri.com http://dx.doi.org/0.2988/imf.204.4502 New Expnsion nd Infinite Series Diyun Zhng College of Computer Nnjing University

More information

THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS.

THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS. THE EXISTENCE-UNIQUENESS THEOREM FOR FIRST-ORDER DIFFERENTIAL EQUATIONS RADON ROSBOROUGH https://intuitiveexplntionscom/picrd-lindelof-theorem/ This document is proof of the existence-uniqueness theorem

More information

CS 188 Introduction to Artificial Intelligence Fall 2018 Note 7

CS 188 Introduction to Artificial Intelligence Fall 2018 Note 7 CS 188 Introduction to Artificil Intelligence Fll 2018 Note 7 These lecture notes re hevily bsed on notes originlly written by Nikhil Shrm. Decision Networks In the third note, we lerned bout gme trees

More information

Reinforcement learning II

Reinforcement learning II CS 1675 Introduction to Mchine Lerning Lecture 26 Reinforcement lerning II Milos Huskrecht milos@cs.pitt.edu 5329 Sennott Squre Reinforcement lerning Bsics: Input x Lerner Output Reinforcement r Critic

More information

Chapter 2 Finite Automata

Chapter 2 Finite Automata Chpter 2 Finite Automt 28 2.1 Introduction Finite utomt: first model of the notion of effective procedure. (They lso hve mny other pplictions). The concept of finite utomton cn e derived y exmining wht

More information

MATH 144: Business Calculus Final Review

MATH 144: Business Calculus Final Review MATH 144: Business Clculus Finl Review 1 Skills 1. Clculte severl limits. 2. Find verticl nd horizontl symptotes for given rtionl function. 3. Clculte derivtive by definition. 4. Clculte severl derivtives

More information

CS5371 Theory of Computation. Lecture 20: Complexity V (Polynomial-Time Reducibility)

CS5371 Theory of Computation. Lecture 20: Complexity V (Polynomial-Time Reducibility) CS5371 Theory of Computtion Lecture 20: Complexity V (Polynomil-Time Reducibility) Objectives Polynomil Time Reducibility Prove Cook-Levin Theorem Polynomil Time Reducibility Previously, we lernt tht if

More information

Improper Integrals, and Differential Equations

Improper Integrals, and Differential Equations Improper Integrls, nd Differentil Equtions October 22, 204 5.3 Improper Integrls Previously, we discussed how integrls correspond to res. More specificlly, we sid tht for function f(x), the region creted

More information

Operations with Polynomials

Operations with Polynomials 38 Chpter P Prerequisites P.4 Opertions with Polynomils Wht you should lern: How to identify the leding coefficients nd degrees of polynomils How to dd nd subtrct polynomils How to multiply polynomils

More information

19 Optimal behavior: Game theory

19 Optimal behavior: Game theory Intro. to Artificil Intelligence: Dle Schuurmns, Relu Ptrscu 1 19 Optiml behvior: Gme theory Adversril stte dynmics hve to ccount for worst cse Compute policy π : S A tht mximizes minimum rewrd Let S (,

More information

Convert the NFA into DFA

Convert the NFA into DFA Convert the NF into F For ech NF we cn find F ccepting the sme lnguge. The numer of sttes of the F could e exponentil in the numer of sttes of the NF, ut in prctice this worst cse occurs rrely. lgorithm:

More information

CALCULUS WITHOUT LIMITS

CALCULUS WITHOUT LIMITS CALCULUS WITHOUT LIMITS The current stndrd for the clculus curriculum is, in my opinion, filure in mny spects. We try to present it with the modern stndrd of mthemticl rigor nd comprehensiveness but of

More information

and that at t = 0 the object is at position 5. Find the position of the object at t = 2.

and that at t = 0 the object is at position 5. Find the position of the object at t = 2. 7.2 The Fundmentl Theorem of Clculus 49 re mny, mny problems tht pper much different on the surfce but tht turn out to be the sme s these problems, in the sense tht when we try to pproimte solutions we

More information

ECO 317 Economics of Uncertainty Fall Term 2007 Notes for lectures 4. Stochastic Dominance

ECO 317 Economics of Uncertainty Fall Term 2007 Notes for lectures 4. Stochastic Dominance Generl structure ECO 37 Economics of Uncertinty Fll Term 007 Notes for lectures 4. Stochstic Dominnce Here we suppose tht the consequences re welth mounts denoted by W, which cn tke on ny vlue between

More information

1.9 C 2 inner variations

1.9 C 2 inner variations 46 CHAPTER 1. INDIRECT METHODS 1.9 C 2 inner vritions So fr, we hve restricted ttention to liner vritions. These re vritions of the form vx; ǫ = ux + ǫφx where φ is in some liner perturbtion clss P, for

More information

Finite Automata. Informatics 2A: Lecture 3. Mary Cryan. 21 September School of Informatics University of Edinburgh

Finite Automata. Informatics 2A: Lecture 3. Mary Cryan. 21 September School of Informatics University of Edinburgh Finite Automt Informtics 2A: Lecture 3 Mry Cryn School of Informtics University of Edinburgh mcryn@inf.ed.c.uk 21 September 2018 1 / 30 Lnguges nd Automt Wht is lnguge? Finite utomt: recp Some forml definitions

More information

RELATIONAL MODEL.

RELATIONAL MODEL. RELATIONAL MODEL Structure of Reltionl Dtbses Reltionl Algebr Tuple Reltionl Clculus Domin Reltionl Clculus Extended Reltionl-Algebr- Opertions Modifiction of the Dtbse Views EXAMPLE OF A RELATION BASIC

More information

Equality and Inequality in the Dataflow Algebra. A. J. Cowling

Equality and Inequality in the Dataflow Algebra. A. J. Cowling Verifiction nd Testing Reserch Group, Deprtment of Computer Science, University of Sheffield, Regent Court, 211, Portobello Street, Sheffield, S1 4DP, United Kingdom Emil: A.Cowling @ dcs.shef.c.uk Telephone:

More information

Global Types for Dynamic Checking of Protocol Conformance of Multi-Agent Systems

Global Types for Dynamic Checking of Protocol Conformance of Multi-Agent Systems Globl Types for Dynmic Checking of Protocol Conformnce of Multi-Agent Systems (Extended Abstrct) Dvide Ancon, Mtteo Brbieri, nd Vivin Mscrdi DIBRIS, University of Genov, Itly emil: dvide@disi.unige.it,

More information

Riemann is the Mann! (But Lebesgue may besgue to differ.)

Riemann is the Mann! (But Lebesgue may besgue to differ.) Riemnn is the Mnn! (But Lebesgue my besgue to differ.) Leo Livshits My 2, 2008 1 For finite intervls in R We hve seen in clss tht every continuous function f : [, b] R hs the property tht for every ɛ >

More information

MAA 4212 Improper Integrals

MAA 4212 Improper Integrals Notes by Dvid Groisser, Copyright c 1995; revised 2002, 2009, 2014 MAA 4212 Improper Integrls The Riemnn integrl, while perfectly well-defined, is too restrictive for mny purposes; there re functions which

More information

This lecture covers Chapter 8 of HMU: Properties of CFLs

This lecture covers Chapter 8 of HMU: Properties of CFLs This lecture covers Chpter 8 of HMU: Properties of CFLs Turing Mchine Extensions of Turing Mchines Restrictions of Turing Mchines Additionl Reding: Chpter 8 of HMU. Turing Mchine: Informl Definition B

More information

CM10196 Topic 4: Functions and Relations

CM10196 Topic 4: Functions and Relations CM096 Topic 4: Functions nd Reltions Guy McCusker W. Functions nd reltions Perhps the most widely used notion in ll of mthemtics is tht of function. Informlly, function is n opertion which tkes n input

More information

Goals: Determine how to calculate the area described by a function. Define the definite integral. Explore the relationship between the definite

Goals: Determine how to calculate the area described by a function. Define the definite integral. Explore the relationship between the definite Unit #8 : The Integrl Gols: Determine how to clculte the re described by function. Define the definite integrl. Eplore the reltionship between the definite integrl nd re. Eplore wys to estimte the definite

More information

arxiv:math/ v2 [math.ho] 16 Dec 2003

arxiv:math/ v2 [math.ho] 16 Dec 2003 rxiv:mth/0312293v2 [mth.ho] 16 Dec 2003 Clssicl Lebesgue Integrtion Theorems for the Riemnn Integrl Josh Isrlowitz 244 Ridge Rd. Rutherford, NJ 07070 jbi2@njit.edu Februry 1, 2008 Abstrct In this pper,

More information

A BRIEF INTRODUCTION TO UNIFORM CONVERGENCE. In the study of Fourier series, several questions arise naturally, such as: c n e int

A BRIEF INTRODUCTION TO UNIFORM CONVERGENCE. In the study of Fourier series, several questions arise naturally, such as: c n e int A BRIEF INTRODUCTION TO UNIFORM CONVERGENCE HANS RINGSTRÖM. Questions nd exmples In the study of Fourier series, severl questions rise nturlly, such s: () (2) re there conditions on c n, n Z, which ensure

More information

Coalgebra, Lecture 15: Equations for Deterministic Automata

Coalgebra, Lecture 15: Equations for Deterministic Automata Colger, Lecture 15: Equtions for Deterministic Automt Julin Slmnc (nd Jurrin Rot) Decemer 19, 2016 In this lecture, we will study the concept of equtions for deterministic utomt. The notes re self contined

More information

Acceptance Sampling by Attributes

Acceptance Sampling by Attributes Introduction Acceptnce Smpling by Attributes Acceptnce smpling is concerned with inspection nd decision mking regrding products. Three spects of smpling re importnt: o Involves rndom smpling of n entire

More information

Formal Methods in Software Engineering

Formal Methods in Software Engineering Forml Methods in Softwre Engineering Lecture 09 orgniztionl issues Prof. Dr. Joel Greenyer Decemer 9, 2014 Written Exm The written exm will tke plce on Mrch 4 th, 2015 The exm will tke 60 minutes nd strt

More information

Frobenius numbers of generalized Fibonacci semigroups

Frobenius numbers of generalized Fibonacci semigroups Frobenius numbers of generlized Fiboncci semigroups Gretchen L. Mtthews 1 Deprtment of Mthemticl Sciences, Clemson University, Clemson, SC 29634-0975, USA gmtthe@clemson.edu Received:, Accepted:, Published:

More information

5.7 Improper Integrals

5.7 Improper Integrals 458 pplictions of definite integrls 5.7 Improper Integrls In Section 5.4, we computed the work required to lift pylod of mss m from the surfce of moon of mss nd rdius R to height H bove the surfce of the

More information

Decision Networks. CS 188: Artificial Intelligence Fall Example: Decision Networks. Decision Networks. Decisions as Outcome Trees

Decision Networks. CS 188: Artificial Intelligence Fall Example: Decision Networks. Decision Networks. Decisions as Outcome Trees CS 188: Artificil Intelligence Fll 2011 Decision Networks ME: choose the ction which mximizes the expected utility given the evidence mbrell Lecture 17: Decision Digrms 10/27/2011 Cn directly opertionlize

More information

Intuitionistic Fuzzy Lattices and Intuitionistic Fuzzy Boolean Algebras

Intuitionistic Fuzzy Lattices and Intuitionistic Fuzzy Boolean Algebras Intuitionistic Fuzzy Lttices nd Intuitionistic Fuzzy oolen Algebrs.K. Tripthy #1, M.K. Stpthy *2 nd P.K.Choudhury ##3 # School of Computing Science nd Engineering VIT University Vellore-632014, TN, Indi

More information

Chapters 4 & 5 Integrals & Applications

Chapters 4 & 5 Integrals & Applications Contents Chpters 4 & 5 Integrls & Applictions Motivtion to Chpters 4 & 5 2 Chpter 4 3 Ares nd Distnces 3. VIDEO - Ares Under Functions............................................ 3.2 VIDEO - Applictions

More information

The practical version

The practical version Roerto s Notes on Integrl Clculus Chpter 4: Definite integrls nd the FTC Section 7 The Fundmentl Theorem of Clculus: The prcticl version Wht you need to know lredy: The theoreticl version of the FTC. Wht

More information

ACCESS TO SCIENCE, ENGINEERING AND AGRICULTURE: MATHEMATICS 1 MATH00030 SEMESTER /2019

ACCESS TO SCIENCE, ENGINEERING AND AGRICULTURE: MATHEMATICS 1 MATH00030 SEMESTER /2019 ACCESS TO SCIENCE, ENGINEERING AND AGRICULTURE: MATHEMATICS MATH00030 SEMESTER 208/209 DR. ANTHONY BROWN 7.. Introduction to Integrtion. 7. Integrl Clculus As ws the cse with the chpter on differentil

More information

Summer School Verification Technology, Systems & Applications

Summer School Verification Technology, Systems & Applications VTSA 2011 Summer School Verifiction Technology, Systems & Applictions 4th edition since 2008: Liège (Belgium), Sep. 19 23, 2011 free prticiption, limited number of prticipnts ppliction dedline: July 22,

More information

Vyacheslav Telnin. Search for New Numbers.

Vyacheslav Telnin. Search for New Numbers. Vycheslv Telnin Serch for New Numbers. 1 CHAPTER I 2 I.1 Introduction. In 1984, in the first issue for tht yer of the Science nd Life mgzine, I red the rticle "Non-Stndrd Anlysis" by V. Uspensky, in which

More information

Lecture 9: LTL and Büchi Automata

Lecture 9: LTL and Büchi Automata Lecture 9: LTL nd Büchi Automt 1 LTL Property Ptterns Quite often the requirements of system follow some simple ptterns. Sometimes we wnt to specify tht property should only hold in certin context, clled

More information

Jim Lambers MAT 169 Fall Semester Lecture 4 Notes

Jim Lambers MAT 169 Fall Semester Lecture 4 Notes Jim Lmbers MAT 169 Fll Semester 2009-10 Lecture 4 Notes These notes correspond to Section 8.2 in the text. Series Wht is Series? An infinte series, usully referred to simply s series, is n sum of ll of

More information

1 Probability Density Functions

1 Probability Density Functions Lis Yn CS 9 Continuous Distributions Lecture Notes #9 July 6, 28 Bsed on chpter by Chris Piech So fr, ll rndom vribles we hve seen hve been discrete. In ll the cses we hve seen in CS 9, this ment tht our

More information

4.4 Areas, Integrals and Antiderivatives

4.4 Areas, Integrals and Antiderivatives . res, integrls nd ntiderivtives 333. Ares, Integrls nd Antiderivtives This section explores properties of functions defined s res nd exmines some connections mong res, integrls nd ntiderivtives. In order

More information

Informe Técnico / Technical Report

Informe Técnico / Technical Report DEPARTAMENTO DE SISTEMAS INFORMÁTICOS Y COMPUTACIÓN UNIVERSIDAD POLITÉCNICA DE VALENCIA P.O. Box: 22012 E-46071 Vlenci (SPAIN) Informe Técnico / Technicl Report Ref. No.: DSIC-II/03/10 Pges: 30 Title:

More information

1 Nondeterministic Finite Automata

1 Nondeterministic Finite Automata 1 Nondeterministic Finite Automt Suppose in life, whenever you hd choice, you could try oth possiilities nd live your life. At the end, you would go ck nd choose the one tht worked out the est. Then you

More information

How do we solve these things, especially when they get complicated? How do we know when a system has a solution, and when is it unique?

How do we solve these things, especially when they get complicated? How do we know when a system has a solution, and when is it unique? XII. LINEAR ALGEBRA: SOLVING SYSTEMS OF EQUATIONS Tody we re going to tlk bout solving systems of liner equtions. These re problems tht give couple of equtions with couple of unknowns, like: 6 2 3 7 4

More information

Using QM for Windows. Using QM for Windows. Using QM for Windows LEARNING OBJECTIVES. Solving Flair Furniture s LP Problem

Using QM for Windows. Using QM for Windows. Using QM for Windows LEARNING OBJECTIVES. Solving Flair Furniture s LP Problem LEARNING OBJECTIVES Vlu%on nd pricing (November 5, 2013) Lecture 11 Liner Progrmming (prt 2) 10/8/16, 2:46 AM Olivier J. de Jong, LL.M., MM., MBA, CFD, CFFA, AA www.olivierdejong.com Solving Flir Furniture

More information

Lecture 2 : Propositions DRAFT

Lecture 2 : Propositions DRAFT CS/Mth 240: Introduction to Discrete Mthemtics 1/20/2010 Lecture 2 : Propositions Instructor: Dieter vn Melkeeek Scrie: Dlior Zelený DRAFT Lst time we nlyzed vrious mze solving lgorithms in order to illustrte

More information

Section 6.1 INTRO to LAPLACE TRANSFORMS

Section 6.1 INTRO to LAPLACE TRANSFORMS Section 6. INTRO to LAPLACE TRANSFORMS Key terms: Improper Integrl; diverge, converge A A f(t)dt lim f(t)dt Piecewise Continuous Function; jump discontinuity Function of Exponentil Order Lplce Trnsform

More information

CMDA 4604: Intermediate Topics in Mathematical Modeling Lecture 19: Interpolation and Quadrature

CMDA 4604: Intermediate Topics in Mathematical Modeling Lecture 19: Interpolation and Quadrature CMDA 4604: Intermedite Topics in Mthemticl Modeling Lecture 19: Interpoltion nd Qudrture In this lecture we mke brief diversion into the res of interpoltion nd qudrture. Given function f C[, b], we sy

More information

Administrivia CSE 190: Reinforcement Learning: An Introduction

Administrivia CSE 190: Reinforcement Learning: An Introduction Administrivi CSE 190: Reinforcement Lerning: An Introduction Any emil sent to me bout the course should hve CSE 190 in the subject line! Chpter 4: Dynmic Progrmming Acknowledgment: A good number of these

More information

Centrum voor Wiskunde en Informatica REPORTRAPPORT. Supervisory control for nondeterministic systems

Centrum voor Wiskunde en Informatica REPORTRAPPORT. Supervisory control for nondeterministic systems Centrum voor Wiskunde en Informtic REPORTRAPPORT Supervisory control for nondeterministic systems A. Overkmp Deprtment of Opertions Reserch, Sttistics, nd System Theory BS-R9411 1994 Supervisory Control

More information

How to simulate Turing machines by invertible one-dimensional cellular automata

How to simulate Turing machines by invertible one-dimensional cellular automata How to simulte Turing mchines by invertible one-dimensionl cellulr utomt Jen-Christophe Dubcq Déprtement de Mthémtiques et d Informtique, École Normle Supérieure de Lyon, 46, llée d Itlie, 69364 Lyon Cedex

More information

Set up Invariable Axiom of Force Equilibrium and Solve Problems about Transformation of Force and Gravitational Mass

Set up Invariable Axiom of Force Equilibrium and Solve Problems about Transformation of Force and Gravitational Mass Applied Physics Reserch; Vol. 5, No. 1; 013 ISSN 1916-9639 E-ISSN 1916-9647 Published by Cndin Center of Science nd Eduction Set up Invrible Axiom of orce Equilibrium nd Solve Problems bout Trnsformtion

More information

STRUCTURE OF CONCURRENCY Ryszard Janicki. Department of Computing and Software McMaster University Hamilton, ON, L8S 4K1 Canada

STRUCTURE OF CONCURRENCY Ryszard Janicki. Department of Computing and Software McMaster University Hamilton, ON, L8S 4K1 Canada STRUCTURE OF CONCURRENCY Ryszrd Jnicki Deprtment of Computing nd Softwre McMster University Hmilton, ON, L8S 4K1 Cnd jnicki@mcmster.c 1 Introduction Wht is concurrency? How it cn e modelled? Wht re the

More information

Week 10: Line Integrals

Week 10: Line Integrals Week 10: Line Integrls Introduction In this finl week we return to prmetrised curves nd consider integrtion long such curves. We lredy sw this in Week 2 when we integrted long curve to find its length.

More information

Anatomy of a Deterministic Finite Automaton. Deterministic Finite Automata. A machine so simple that you can understand it in less than one minute

Anatomy of a Deterministic Finite Automaton. Deterministic Finite Automata. A machine so simple that you can understand it in less than one minute Victor Admchik Dnny Sletor Gret Theoreticl Ides In Computer Science CS 5-25 Spring 2 Lecture 2 Mr 3, 2 Crnegie Mellon University Deterministic Finite Automt Finite Automt A mchine so simple tht you cn

More information

Chapter 3. Vector Spaces

Chapter 3. Vector Spaces 3.4 Liner Trnsformtions 1 Chpter 3. Vector Spces 3.4 Liner Trnsformtions Note. We hve lredy studied liner trnsformtions from R n into R m. Now we look t liner trnsformtions from one generl vector spce

More information

COMPUTER SCIENCE TRIPOS

COMPUTER SCIENCE TRIPOS CST.2011.2.1 COMPUTER SCIENCE TRIPOS Prt IA Tuesdy 7 June 2011 1.30 to 4.30 COMPUTER SCIENCE Pper 2 Answer one question from ech of Sections A, B nd C, nd two questions from Section D. Submit the nswers

More information

State space systems analysis (continued) Stability. A. Definitions A system is said to be Asymptotically Stable (AS) when it satisfies

State space systems analysis (continued) Stability. A. Definitions A system is said to be Asymptotically Stable (AS) when it satisfies Stte spce systems nlysis (continued) Stbility A. Definitions A system is sid to be Asymptoticlly Stble (AS) when it stisfies ut () = 0, t > 0 lim xt () 0. t A system is AS if nd only if the impulse response

More information

APPROXIMATE INTEGRATION

APPROXIMATE INTEGRATION APPROXIMATE INTEGRATION. Introduction We hve seen tht there re functions whose nti-derivtives cnnot be expressed in closed form. For these resons ny definite integrl involving these integrnds cnnot be

More information