Robustness Analysis of Networked Systems

Size: px
Start display at page:

Download "Robustness Analysis of Networked Systems"

Transcription

1 Robustness Analysis of Networked Systems Roopsha Samanta The University of Texas at Austin Joint work with Jyotirmoy V. Deshmukh and Swarat Chaudhuri January, 0 Roopsha Samanta Robustness Analysis of Networked Systems / 5

2 Problem Overview P P P Programs rarely execute in isolation Roopsha Samanta Robustness Analysis of Networked Systems / 5

3 Problem Overview P P P Programs interact with other programs and the physical world Roopsha Samanta Robustness Analysis of Networked Systems / 5

4 Problem Overview P P P Predictability in the presence of uncertainty Roopsha Samanta Robustness Analysis of Networked Systems / 5

5 Problem Overview P P P Small perturbation in input Small perturbation in output Roopsha Samanta Robustness Analysis of Networked Systems / 5

6 Problem Overview P P P Robustness! Roopsha Samanta Robustness Analysis of Networked Systems / 5

7 Synchronous Networked System N : C, P C out Directed graph (P, C) P = {P,..., P n } C = I N O Synchronous P C in C, C, Computation alphabet: Σ P C, Roopsha Samanta Robustness Analysis of Networked Systems / 5

8 Process C, Process P i : (In i, Out i, M i ) Mealy Machine M i : (Σ In i, Σ Out i, Q i, q 0i, R i ) C in P C, Roopsha Samanta Robustness Analysis of Networked Systems / 5

9 Network Semantics N : (Σ I, Σ O, Q, q 0, R) Network state: (q,..., q n, c,..., c N ) N : C, P C out Network transition: (q,..., q n, c,..., c I ) P (a,..., a I ), (a,..., a w ) C in C, C, (q,..., q n, c,..., c O ) P Network execution: ρ(s) Network output: N (s) C, Roopsha Samanta Robustness Analysis of Networked Systems 5 / 5

10 Internal Channel Perturbations Instantaneous deletion or substitution of current symbol τ-transition: (q,..., q n, c,..., c I ) ε, ε (q,..., q n, c,..., c I ), Perturbed network execution: ρ τ (s) Perturbed network output: ρ τ (s) Channel-wise perturbation count in ρ τ (s): ρ τ (s) Roopsha Samanta Robustness Analysis of Networked Systems 6 / 5

11 Robust Networked System Given: a networked system N, max. pertb. count of internal channels, δ = (δ,..., δ N ), max. permissible error in output channel, ɛ, distance metric d over Σ P N : C,, δ C in C,, δ C,, δ P P C out, ɛ C,, δ N is defined to be (δ, ɛ)-robust if: s (Σ I ), ρ τ (s) : ρ τ (s) δ = d( N (s), ρ τ (s) ) ɛ Roopsha Samanta Robustness Analysis of Networked Systems 7 / 5

12 Robust Networked System Given: a networked system N, max. pertb. count of internal channels, δ = (δ,..., δ N ), max. permissible error in output channel, ɛ, distance metric d over Σ P N : C,, δ C in C,, δ C,, δ P P C out, ɛ C,, δ N is defined to be (δ, ɛ)-robust if: s (Σ I ), ρ τ (s) : ρ τ (s) δ = d( N (s), ρ τ (s) ) ɛ Roopsha Samanta Robustness Analysis of Networked Systems 7 / 5

13 Problem Definition Given: a networked system N, max. pertb. count of internal channels, δ = (δ,..., δ N ), max. permissible error in output channel, ɛ, distance metric d over Σ P N : C,, δ C in C,, δ C,, δ P P C out, ɛ C,, δ Check if N is (δ, ɛ)-robust. Roopsha Samanta Robustness Analysis of Networked Systems 8 / 5

14 Solution Strategy Given: a networked system N, max. pertb. count of internal channels, δ = (δ,..., δ N ), max. permissible error in output channel, ɛ, distance metric d over Σ P N : C,, δ C in C,, δ C,, δ P P C out, ɛ C,, δ Construct machine A: N is (δ, ɛ)-robust iff L(A) is empty. Roopsha Samanta Robustness Analysis of Networked Systems 9 / 5

15 Solution Strategy Construct machine A: N is (δ, ɛ)-robust iff L(A) is empty. In a run of A on s, A simultaneously: simulates unperturbed, perturbed executions: ρ(s), ρ τ (s) tracks channel perturbations along ρ τ (s), tracks distance between outputs of N along ρ(s), ρ τ (s). A accepts s iff ρ τ (s): ρ τ (s) δ and d( N (s), ρ τ (s)) > ɛ. Roopsha Samanta Robustness Analysis of Networked Systems 9 / 5

16 Review: Levenshtein Distance, d Lev (s, t) Minimum number of symbol insertions, deletions and substitutions required to transform s into t. d Lev (abc, bcd) = b c d a b c d Lev (acbcd, ccff ) = c c f f or, a c b c d c c f f a c b c d Roopsha Samanta Robustness Analysis of Networked Systems 0 / 5

17 Review: Levenshtein Distance, d Lev (s, t) Minimum number of symbol insertions, deletions and substitutions required to transform s into t. d Lev (abc, bcd) = b c d a b c d Lev (acbcd, ccff ) = c c f f or, a c b c d c c f f a c b c d Roopsha Samanta Robustness Analysis of Networked Systems 0 / 5

18 Review: Levenshtein Distance, d Lev (s, t) Minimum number of symbol insertions, deletions and substitutions required to transform s into t. d Lev (abc, bcd) = b c d a b c d Lev (acbcd, ccff ) = c c f f or, a c b c d c c f f a c b c d Roopsha Samanta Robustness Analysis of Networked Systems 0 / 5

19 Review: Levenshtein Distance Computation t c c f f s a c b d Lev (s[0], t[0]) = 0 d Lev (s[0, i], t[0]) = i d Lev (s[0], t[0, j]) = j c d 5 5 Roopsha Samanta Robustness Analysis of Networked Systems / 5

20 Review: Levenshtein Distance Computation t s a c b c 0 c c f f 0 0 subs del ins? d Lev (s[0, i], t[0, j]) = min(d Lev (s[0, i-], t[0, j-]) + (s[i], t[j]), d Lev (s[0, i-], t[0, j]) +, d Lev (s[0, i], t[0, j-]) + ) (a, b) equals 0 if a = b, else. d 5 5 Roopsha Samanta Robustness Analysis of Networked Systems / 5

21 Review: Levenshtein Distance Computation t s a c b 0 c c f f 0 0 d Lev (s[0, i], t[0, j]) = min(d Lev (s[0, i-], t[0, j-]) + (s[i], t[j]), d Lev (s[0, i-], t[0, j]) +, d Lev (s[0, i], t[0, j-]) + ) c (a, b) equals 0 if a = b, else. d 5 5 Roopsha Samanta Robustness Analysis of Networked Systems / 5

22 Review: Levenshtein Distance Computation t s a c b 0 c c f f 0 0 d Lev (s[0, i], t[0, j]) = min(d Lev (s[0, i-], t[0, j-]) + (s[i], t[j]), d Lev (s[0, i-], t[0, j]) +, d Lev (s[0, i], t[0, j-]) + ) c (a, b) equals 0 if a = b, else. d 5 5 Roopsha Samanta Robustness Analysis of Networked Systems / 5

23 Review: Levenshtein Distance Computation t s a c b 0 c c f f 0 0 d Lev (s[0, i], t[0, j]) = min(d Lev (s[0, i-], t[0, j-]) + (s[i], t[j]), d Lev (s[0, i-], t[0, j]) +, d Lev (s[0, i], t[0, j-]) + ) c (a, b) equals 0 if a = b, else. d 5 5 Roopsha Samanta Robustness Analysis of Networked Systems / 5

24 Review: Levenshtein Distance Computation t 0 c c f f 0 0 To check if d Lev (s, t) > ɛ, focus on ɛ-diagonal. a s c b c Construct DFA D ɛ Lev: runs on a string pair (s, t), and accepts iff d Lev (s, t) > ɛ. d 5 ɛ = Roopsha Samanta Robustness Analysis of Networked Systems / 5

25 Distance-Tracking Automaton, D ɛ Lev c c f f # # (λ, λ,,, 0,, ) (a, c) (c, f ) 0 0 (a, c,,,,, ) (bc, ff,,,,, ) a (c, c) (d, #) c (ac, cc,,,,, ) (cd, f #,,,,, ) b (b, f ) (#, #) c (cb, cf,,,,, ) accept d 5 # 6 ɛ = Roopsha Samanta Robustness Analysis of Networked Systems / 5

26 Distance-Tracking Automaton, D ɛ Lev D ɛ Lev accepts a pair of strings (s, t) iff d Lev(s, t) > ɛ. Roopsha Samanta Robustness Analysis of Networked Systems / 5

27 Review: Counter Machines (One-way, Nondeterministic) h-counter machine A: finite automaton with h integer counters In each step, A may read an input symbol, test counter values change state update each counter by some constant Transition: (x, σ, test, x, c,..., c h ) s is accepted by A iff (x 0, s 0, 0,... 0) A (acc, s j, z,..., z h ) Most interesting questions are undecidable. Roopsha Samanta Robustness Analysis of Networked Systems / 5

28 Review: Counter Machines (One-way, Nondeterministic) h-counter machine A: finite automaton with h integer counters In each step, A may read an input symbol, test counter values change state update each counter by some constant Transition: (x, σ, test, x, c,..., c h ) s is accepted by A iff (x 0, s 0, 0,... 0) A (acc, s j, z,..., z h ) Most interesting questions are undecidable. Roopsha Samanta Robustness Analysis of Networked Systems / 5

29 Review: Counter Machines (One-way, Nondeterministic) h-counter machine A: finite automaton with h integer counters In each step, A may read an input symbol, test counter values change state update each counter by some constant Transition: (x, σ, test, x, c,..., c h ) s is accepted by A iff (x 0, s 0, 0,... 0) A (acc, s j, z,..., z h ) Most interesting questions are undecidable. Roopsha Samanta Robustness Analysis of Networked Systems / 5

30 Review: Counter Machines (One-way, Nondeterministic) h-counter machine A: finite automaton with h integer counters In each step, A may read an input symbol, test counter values change state update each counter by some constant Transition: (x, σ, test, x, c,..., c h ) s is accepted by A iff (x 0, s 0, 0,... 0) A (acc, s j, z,..., z h ) Most interesting questions are undecidable. Roopsha Samanta Robustness Analysis of Networked Systems / 5

31 Review: Reversal-bounded Counter Machines (One-way, Nondeterministic) r-reversal bounded, h-counter machine: each counter alternates between an increasing mode and a decreasing mode at most r times. [GurariIbarra98] Nonemptiness for a r-reversal bounded, h-counter machine A is solvable in time polynomial in the size of A. Roopsha Samanta Robustness Analysis of Networked Systems / 5

32 Review: Reversal-bounded Counter Machines (One-way, Nondeterministic) r-reversal bounded, h-counter machine: each counter alternates between an increasing mode and a decreasing mode at most r times. [GurariIbarra98] Nonemptiness for a r-reversal bounded, h-counter machine A is solvable in time polynomial in the size of A. Roopsha Samanta Robustness Analysis of Networked Systems / 5

33 Robustness Analysis for Levenshtein distance Construct machine A δ,ɛ Lev A: N is (δ, ɛ)-robust iff L(A) is empty. In a run of A on s, A simultaneously: simulates unperturbed, perturbed executions: ρ(s), ρ τ (s) tracks channel perturbations along ρ τ (s), tracks distance between outputs of N along ρ(s), ρ τ (s). A accepts s iff ρ τ (s): ρ τ (s) δ and d( N (s), ρ τ (s)) > ɛ. Roopsha Samanta Robustness Analysis of Networked Systems 5 / 5

34 A: -reversal-bounded N -counter machine A state x: (q, r, q Lev ), q, r Q, q Lev Q Lev Initial state: (q 0, q 0, q 0 Lev ) Set of counters Z = {z,..., z N }, initially 0 Final state: {acc} Roopsha Samanta Robustness Analysis of Networked Systems 6 / 5

35 A: Initialization transition Initialize counters with perturbation bounds: ( (q 0, q 0, q 0 Lev ), ε, ) z k = 0, (q 0, q 0, q 0 Lev ), (+δ,..., +δ N ) k Roopsha Samanta Robustness Analysis of Networked Systems 7 / 5

36 A: Unperturbed network transitions Simulate pair of unperturbed N -transitions, track output distance: ( (q, r, q Lev ), a, ) z k 0, (q, r, q Lev), 0 k Roopsha Samanta Robustness Analysis of Networked Systems 8 / 5

37 A: Perturbed network transitions Simulate τ-transition, decrement counters of perturbed channels by : ( (q, r, q Lev ), ε, ) z k 0, (q, r τ, q Lev ), c k Roopsha Samanta Robustness Analysis of Networked Systems 9 / 5

38 A: Rejecting transitions Reject if any internal channel perturbation exceeds bound: ( (q, r, q Lev ), ε, ) z k < 0, rej, 0 k (rej, a, true, rej, 0) Roopsha Samanta Robustness Analysis of Networked Systems 0 / 5

39 A: Accepting transitions Accept witness to non-robustness: ( (q, r, acc Lev ), ε, ) z k 0, acc, 0 k Roopsha Samanta Robustness Analysis of Networked Systems / 5

40 Main Result(s) Checking if N is (δ, ɛ)-robust w.r.t the Levenshtein distance is polynomial in the size of N and exponential in ɛ. Checking if N is (δ, ɛ)-robust w.r.t the L -norm is polynomial in the size of N. Roopsha Samanta Robustness Analysis of Networked Systems / 5

41 Main Result(s) Checking if N is (δ, ɛ)-robust w.r.t the Levenshtein distance is polynomial in the size of N and exponential in ɛ. Checking if N is (δ, ɛ)-robust w.r.t the L -norm is polynomial in the size of N. Roopsha Samanta Robustness Analysis of Networked Systems / 5

42 Related Work Sequential programs with perturbed inputs [MS09, CGLN] Input-output stability of finite-state transducers [TBCSM] Sequential circuits, common suffix distance metric [DHLN0] Robust control, wireless control networks [ADJPW, Pappas] Reactive systems with ω-regular spec. in uncertain environment [MRT, CHR0, BGHJ09] Roopsha Samanta Robustness Analysis of Networked Systems / 5

43 Future Work Consider more distance-metrics Generalize error model - input noise, process failures etc. Synthesis of robust networked systems Roopsha Samanta Robustness Analysis of Networked Systems / 5

44 Thank you. Roopsha Samanta Robustness Analysis of Networked Systems 5 / 5

Robustness Analysis of Networked Systems

Robustness Analysis of Networked Systems Robustness Analysis of Networked Systems Roopsha Samanta 1, Jyotirmoy V. Deshmukh 2, and Swarat Chaudhuri 3 1 University of Texas at Austin roopsha@cs.utexas.edu 2 University of Pennsylvania djy@cis.upenn.edu

More information

Lipschitz Robustness of Finite-state Transducers

Lipschitz Robustness of Finite-state Transducers Lipschitz Robustness of Finite-state Transducers Roopsha Samanta IST Austria Joint work with Tom Henzinger and Jan Otop December 16, 2014 Roopsha Samanta Lipschitz Robustness of Finite-state Transducers

More information

Automatic Verification of Parameterized Data Structures

Automatic Verification of Parameterized Data Structures Automatic Verification of Parameterized Data Structures Jyotirmoy V. Deshmukh, E. Allen Emerson and Prateek Gupta The University of Texas at Austin The University of Texas at Austin 1 Outline Motivation

More information

FORMAL LANGUAGES, AUTOMATA AND COMPUTATION

FORMAL LANGUAGES, AUTOMATA AND COMPUTATION FORMAL LANGUAGES, AUTOMATA AND COMPUTATION DECIDABILITY ( LECTURE 15) SLIDES FOR 15-453 SPRING 2011 1 / 34 TURING MACHINES-SYNOPSIS The most general model of computation Computations of a TM are described

More information

Nondeterministic Streaming String Transducers

Nondeterministic Streaming String Transducers Nondeterministic Streaming String Transducers Rajeev Alur and Jyotirmoy V. Deshmukh Dept. of Computer and Information Science, University of Pennsylvania. {alur,djy}@cis.upenn.edu Abstract. We introduce

More information

Reducability. Sipser, pages

Reducability. Sipser, pages Reducability Sipser, pages 187-214 Reduction Reduction encodes (transforms) one problem as a second problem. A solution to the second, can be transformed into a solution to the first. We expect both transformations

More information

Finite-state machines (FSMs)

Finite-state machines (FSMs) Finite-state machines (FSMs) Dr. C. Constantinides Department of Computer Science and Software Engineering Concordia University Montreal, Canada January 10, 2017 1/19 Finite-state machines (FSMs) and state

More information

Lipschitz Robustness of Finite-state Transducers

Lipschitz Robustness of Finite-state Transducers Lipschitz Robustness of Finite-state Transducers Thomas A. Henzinger, Jan Otop, Roopsha Samanta IST Austria Abstract We investigate the problem of checking if a finite-state transducer is robust to uncertainty

More information

Towards Algorithmic Synthesis of Synchronization for Shared-Memory Concurrent Programs

Towards Algorithmic Synthesis of Synchronization for Shared-Memory Concurrent Programs Towards Algorithmic Synthesis of Synchronization for Shared-Memory Concurrent Programs Roopsha Samanta The University of Texas at Austin July 6, 2012 Roopsha Samanta Algorithmic Synthesis of Synchronization

More information

SOLUTION: SOLUTION: SOLUTION:

SOLUTION: SOLUTION: SOLUTION: Convert R and S into nondeterministic finite automata N1 and N2. Given a string s, if we know the states N1 and N2 may reach when s[1...i] has been read, we are able to derive the states N1 and N2 may

More information

Advanced Automata Theory 10 Transducers and Rational Relations

Advanced Automata Theory 10 Transducers and Rational Relations Advanced Automata Theory 10 Transducers and Rational Relations Frank Stephan Department of Computer Science Department of Mathematics National University of Singapore fstephan@comp.nus.edu.sg Advanced

More information

Computability and Complexity

Computability and Complexity Computability and Complexity Lecture 5 Reductions Undecidable problems from language theory Linear bounded automata given by Jiri Srba Lecture 5 Computability and Complexity 1/14 Reduction Informal Definition

More information

Language Stability and Stabilizability of Discrete Event Dynamical Systems 1

Language Stability and Stabilizability of Discrete Event Dynamical Systems 1 Language Stability and Stabilizability of Discrete Event Dynamical Systems 1 Ratnesh Kumar Department of Electrical Engineering University of Kentucky Lexington, KY 40506-0046 Vijay Garg Department of

More information

Polynomial Time Computation. Topics in Logic and Complexity Handout 2. Nondeterministic Polynomial Time. Succinct Certificates.

Polynomial Time Computation. Topics in Logic and Complexity Handout 2. Nondeterministic Polynomial Time. Succinct Certificates. 1 2 Topics in Logic and Complexity Handout 2 Anuj Dawar MPhil Advanced Computer Science, Lent 2010 Polynomial Time Computation P = TIME(n k ) k=1 The class of languages decidable in polynomial time. The

More information

Closure under the Regular Operations

Closure under the Regular Operations Closure under the Regular Operations Application of NFA Now we use the NFA to show that collection of regular languages is closed under regular operations union, concatenation, and star Earlier we have

More information

HKN CS/ECE 374 Midterm 1 Review. Nathan Bleier and Mahir Morshed

HKN CS/ECE 374 Midterm 1 Review. Nathan Bleier and Mahir Morshed HKN CS/ECE 374 Midterm 1 Review Nathan Bleier and Mahir Morshed For the most part, all about strings! String induction (to some extent) Regular languages Regular expressions (regexps) Deterministic finite

More information

September 7, Formal Definition of a Nondeterministic Finite Automaton

September 7, Formal Definition of a Nondeterministic Finite Automaton Formal Definition of a Nondeterministic Finite Automaton September 7, 2014 A comment first The formal definition of an NFA is similar to that of a DFA. Both have states, an alphabet, transition function,

More information

Complexity. Complexity Theory Lecture 3. Decidability and Complexity. Complexity Classes

Complexity. Complexity Theory Lecture 3. Decidability and Complexity. Complexity Classes Complexity Theory 1 Complexity Theory 2 Complexity Theory Lecture 3 Complexity For any function f : IN IN, we say that a language L is in TIME(f(n)) if there is a machine M = (Q, Σ, s, δ), such that: L

More information

Undecidable Problems and Reducibility

Undecidable Problems and Reducibility University of Georgia Fall 2014 Reducibility We show a problem decidable/undecidable by reducing it to another problem. One type of reduction: mapping reduction. Definition Let A, B be languages over Σ.

More information

Notes for Lecture Notes 2

Notes for Lecture Notes 2 Stanford University CS254: Computational Complexity Notes 2 Luca Trevisan January 11, 2012 Notes for Lecture Notes 2 In this lecture we define NP, we state the P versus NP problem, we prove that its formulation

More information

Advanced topic: Space complexity

Advanced topic: Space complexity Advanced topic: Space complexity CSCI 3130 Formal Languages and Automata Theory Siu On CHAN Chinese University of Hong Kong Fall 2016 1/28 Review: time complexity We have looked at how long it takes to

More information

Computability Theory

Computability Theory CS:4330 Theory of Computation Spring 2018 Computability Theory Decidable Languages Haniel Barbosa Readings for this lecture Chapter 4 of [Sipser 1996], 3rd edition. Section 4.1. Decidable Languages We

More information

CSE 105 Theory of Computation

CSE 105 Theory of Computation CSE 105 Theory of Computation http://www.jflap.org/jflaptmp/ Professor Jeanne Ferrante 1 Undecidability Today s Agenda Review: The TM Acceptance problem, A TM The Halting Problem for TM s Other problems

More information

4.2 The Halting Problem

4.2 The Halting Problem 172 4.2 The Halting Problem The technique of diagonalization was discovered in 1873 by Georg Cantor who was concerned with the problem of measuring the sizes of infinite sets For finite sets we can simply

More information

MA/CSSE 474 Theory of Computation

MA/CSSE 474 Theory of Computation MA/CSSE 474 Theory of Computation CFL Hierarchy CFL Decision Problems Your Questions? Previous class days' material Reading Assignments HW 12 or 13 problems Anything else I have included some slides online

More information

Closure under the Regular Operations

Closure under the Regular Operations September 7, 2013 Application of NFA Now we use the NFA to show that collection of regular languages is closed under regular operations union, concatenation, and star Earlier we have shown this closure

More information

Homing and Synchronizing Sequences

Homing and Synchronizing Sequences Homing and Synchronizing Sequences Sven Sandberg Information Technology Department Uppsala University Sweden 1 Outline 1. Motivations 2. Definitions and Examples 3. Algorithms (a) Current State Uncertainty

More information

Context Sensitive Grammar

Context Sensitive Grammar Context Sensitive Grammar Aparna S Vijayan Department of Computer Science and Automation December 2, 2011 Aparna S Vijayan (CSA) CSG December 2, 2011 1 / 12 Contents Aparna S Vijayan (CSA) CSG December

More information

Chapter 5. Finite Automata

Chapter 5. Finite Automata Chapter 5 Finite Automata 5.1 Finite State Automata Capable of recognizing numerous symbol patterns, the class of regular languages Suitable for pattern-recognition type applications, such as the lexical

More information

Theory of Computation (IX) Yijia Chen Fudan University

Theory of Computation (IX) Yijia Chen Fudan University Theory of Computation (IX) Yijia Chen Fudan University Review The Definition of Algorithm Polynomials and their roots A polynomial is a sum of terms, where each term is a product of certain variables and

More information

Lecture 1: Finite State Automaton

Lecture 1: Finite State Automaton Lecture 1: Finite State Automaton Instructor: Ketan Mulmuley Scriber: Yuan Li January 6, 2015 1 Deterministic Finite Automaton Informally, a deterministic finite automaton (DFA) has finite number of s-

More information

Clarifications from last time. This Lecture. Last Lecture. CMSC 330: Organization of Programming Languages. Finite Automata.

Clarifications from last time. This Lecture. Last Lecture. CMSC 330: Organization of Programming Languages. Finite Automata. CMSC 330: Organization of Programming Languages Last Lecture Languages Sets of strings Operations on languages Finite Automata Regular expressions Constants Operators Precedence CMSC 330 2 Clarifications

More information

Theory of Computation

Theory of Computation Thomas Zeugmann Hokkaido University Laboratory for Algorithmics http://www-alg.ist.hokudai.ac.jp/ thomas/toc/ Lecture 3: Finite State Automata Motivation In the previous lecture we learned how to formalize

More information

1 Computational Problems

1 Computational Problems Stanford University CS254: Computational Complexity Handout 2 Luca Trevisan March 31, 2010 Last revised 4/29/2010 In this lecture we define NP, we state the P versus NP problem, we prove that its formulation

More information

Homework Assignment 6 Answers

Homework Assignment 6 Answers Homework Assignment 6 Answers CSCI 2670 Introduction to Theory of Computing, Fall 2016 December 2, 2016 This homework assignment is about Turing machines, decidable languages, Turing recognizable languages,

More information

Embedded Systems Development

Embedded Systems Development Embedded Systems Development Lecture 2 Finite Automata & SyncCharts Daniel Kästner AbsInt Angewandte Informatik GmbH kaestner@absint.com Some things I forgot to mention 2 Remember the HISPOS registration

More information

Space Complexity. The space complexity of a program is how much memory it uses.

Space Complexity. The space complexity of a program is how much memory it uses. Space Complexity The space complexity of a program is how much memory it uses. Measuring Space When we compute the space used by a TM, we do not count the input (think of input as readonly). We say that

More information

Parikh s Theorem and Descriptional Complexity

Parikh s Theorem and Descriptional Complexity Parikh s Theorem and Descriptional Complexity Giovanna J. Lavado and Giovanni Pighizzini Dipartimento di Informatica e Comunicazione Università degli Studi di Milano SOFSEM 2012 Špindlerův Mlýn, Czech

More information

Part 4 out of 5 DFA NFA REX. Automata & languages. A primer on the Theory of Computation. Last week, we showed the equivalence of DFA, NFA and REX

Part 4 out of 5 DFA NFA REX. Automata & languages. A primer on the Theory of Computation. Last week, we showed the equivalence of DFA, NFA and REX Automata & languages A primer on the Theory of Computation Laurent Vanbever www.vanbever.eu Part 4 out of 5 ETH Zürich (D-ITET) October, 12 2017 Last week, we showed the equivalence of DFA, NFA and REX

More information

CSE 105 THEORY OF COMPUTATION

CSE 105 THEORY OF COMPUTATION CSE 105 THEORY OF COMPUTATION Spring 2016 http://cseweb.ucsd.edu/classes/sp16/cse105-ab/ Today's learning goals Sipser Ch 4.1, 5.1 Define reductions from one problem to another. Use reductions to prove

More information

Introduction to Kleene Algebras

Introduction to Kleene Algebras Introduction to Kleene Algebras Riccardo Pucella Basic Notions Seminar December 1, 2005 Introduction to Kleene Algebras p.1 Idempotent Semirings An idempotent semiring is a structure S = (S, +,, 1, 0)

More information

CS5371 Theory of Computation. Lecture 14: Computability V (Prove by Reduction)

CS5371 Theory of Computation. Lecture 14: Computability V (Prove by Reduction) CS5371 Theory of Computation Lecture 14: Computability V (Prove by Reduction) Objectives This lecture shows more undecidable languages Our proof is not based on diagonalization Instead, we reduce the problem

More information

UNIT-VIII COMPUTABILITY THEORY

UNIT-VIII COMPUTABILITY THEORY CONTEXT SENSITIVE LANGUAGE UNIT-VIII COMPUTABILITY THEORY A Context Sensitive Grammar is a 4-tuple, G = (N, Σ P, S) where: N Set of non terminal symbols Σ Set of terminal symbols S Start symbol of the

More information

Advanced Automata Theory 7 Automatic Functions

Advanced Automata Theory 7 Automatic Functions Advanced Automata Theory 7 Automatic Functions Frank Stephan Department of Computer Science Department of Mathematics National University of Singapore fstephan@comp.nus.edu.sg Advanced Automata Theory

More information

CS481F01 Prelim 2 Solutions

CS481F01 Prelim 2 Solutions CS481F01 Prelim 2 Solutions A. Demers 7 Nov 2001 1 (30 pts = 4 pts each part + 2 free points). For this question we use the following notation: x y means x is a prefix of y m k n means m n k For each of

More information

Decision Problems for Additive Regular Functions

Decision Problems for Additive Regular Functions Decision Problems for Additive Regular Functions Rajeev Alur and Mukund Raghothaman University of Pennsylvania {alur, rmukund}@cis.upenn.edu Abstract. Additive Cost Register Automata (ACRA) map strings

More information

Deterministic Finite Automata. Non deterministic finite automata. Non-Deterministic Finite Automata (NFA) Non-Deterministic Finite Automata (NFA)

Deterministic Finite Automata. Non deterministic finite automata. Non-Deterministic Finite Automata (NFA) Non-Deterministic Finite Automata (NFA) Deterministic Finite Automata Non deterministic finite automata Automata we ve been dealing with have been deterministic For every state and every alphabet symbol there is exactly one move that the machine

More information

Decidability (intro.)

Decidability (intro.) CHAPTER 4 Decidability Contents Decidable Languages decidable problems concerning regular languages decidable problems concerning context-free languages The Halting Problem The diagonalization method The

More information

CMSC 330: Organization of Programming Languages. Theory of Regular Expressions Finite Automata

CMSC 330: Organization of Programming Languages. Theory of Regular Expressions Finite Automata : Organization of Programming Languages Theory of Regular Expressions Finite Automata Previous Course Review {s s defined} means the set of string s such that s is chosen or defined as given s A means

More information

CS 455/555: Finite automata

CS 455/555: Finite automata CS 455/555: Finite automata Stefan D. Bruda Winter 2019 AUTOMATA (FINITE OR NOT) Generally any automaton Has a finite-state control Scans the input one symbol at a time Takes an action based on the currently

More information

3130CIT Theory of Computation

3130CIT Theory of Computation GRIFFITH UNIVERSITY School of Computing and Information Technology 3130CIT Theory of Computation Final Examination, Semester 2, 2006 Details Total marks: 120 (40% of the total marks for this subject) Perusal:

More information

CSE 311: Foundations of Computing. Lecture 23: Finite State Machine Minimization & NFAs

CSE 311: Foundations of Computing. Lecture 23: Finite State Machine Minimization & NFAs CSE : Foundations of Computing Lecture : Finite State Machine Minimization & NFAs State Minimization Many different FSMs (DFAs) for the same problem Take a given FSM and try to reduce its state set by

More information

CpSc 421 Final Exam December 15, 2006

CpSc 421 Final Exam December 15, 2006 CpSc 421 Final Exam December 15, 2006 Do problem zero and six of problems 1 through 9. If you write down solutions for more that six problems, clearly indicate those that you want graded. Note that problems

More information

Author: Vivek Kulkarni ( )

Author: Vivek Kulkarni ( ) Author: Vivek Kulkarni ( vivek_kulkarni@yahoo.com ) Chapter-2: Finite State Machines Solutions for Review Questions @ Oxford University Press 2013. All rights reserved. 1 Q.1 Construct Mealy and Moore

More information

Enhancing Active Automata Learning by a User Log Based Metric

Enhancing Active Automata Learning by a User Log Based Metric Master Thesis Computing Science Radboud University Enhancing Active Automata Learning by a User Log Based Metric Author Petra van den Bos First Supervisor prof. dr. Frits W. Vaandrager Second Supervisor

More information

SYLLABUS. Introduction to Finite Automata, Central Concepts of Automata Theory. CHAPTER - 3 : REGULAR EXPRESSIONS AND LANGUAGES

SYLLABUS. Introduction to Finite Automata, Central Concepts of Automata Theory. CHAPTER - 3 : REGULAR EXPRESSIONS AND LANGUAGES Contents i SYLLABUS UNIT - I CHAPTER - 1 : AUT UTOMA OMATA Introduction to Finite Automata, Central Concepts of Automata Theory. CHAPTER - 2 : FINITE AUT UTOMA OMATA An Informal Picture of Finite Automata,

More information

Non-context-Free Languages. CS215, Lecture 5 c

Non-context-Free Languages. CS215, Lecture 5 c Non-context-Free Languages CS215, Lecture 5 c 2007 1 The Pumping Lemma Theorem. (Pumping Lemma) Let be context-free. There exists a positive integer divided into five pieces, Proof for for each, and..

More information

Announcements. Problem Set 6 due next Monday, February 25, at 12:50PM. Midterm graded, will be returned at end of lecture.

Announcements. Problem Set 6 due next Monday, February 25, at 12:50PM. Midterm graded, will be returned at end of lecture. Turing Machines Hello Hello Condensed Slide Slide Readers! Readers! This This lecture lecture is is almost almost entirely entirely animations that that show show how how each each Turing Turing machine

More information

DM17. Beregnelighed. Jacob Aae Mikkelsen

DM17. Beregnelighed. Jacob Aae Mikkelsen DM17 Beregnelighed Jacob Aae Mikkelsen January 12, 2007 CONTENTS Contents 1 Introduction 2 1.1 Operations with languages...................... 2 2 Finite Automata 3 2.1 Regular expressions/languages....................

More information

Formal Definition of a Finite Automaton. August 26, 2013

Formal Definition of a Finite Automaton. August 26, 2013 August 26, 2013 Why a formal definition? A formal definition is precise: - It resolves any uncertainties about what is allowed in a finite automaton such as the number of accept states and number of transitions

More information

Turing Machines Part III

Turing Machines Part III Turing Machines Part III Announcements Problem Set 6 due now. Problem Set 7 out, due Monday, March 4. Play around with Turing machines, their powers, and their limits. Some problems require Wednesday's

More information

On the Executability of Interactive Computation. June 23, 2016 Where innovation starts

On the Executability of Interactive Computation. June 23, 2016 Where innovation starts On the Executability of Interactive Computation Bas Luttik Fei Yang June 23, 2016 Where innovation starts Outline 2/37 From Computation to Interactive Computation Executability - an Integration of Computability

More information

Finite State Machines 2

Finite State Machines 2 Finite State Machines 2 Joseph Spring School of Computer Science 1COM0044 Foundations of Computation 1 Discussion Points In the last lecture we looked at: 1. Abstract Machines 2. Finite State Machines

More information

From Monadic Second-Order Definable String Transformations to Transducers

From Monadic Second-Order Definable String Transformations to Transducers From Monadic Second-Order Definable String Transformations to Transducers Rajeev Alur 1 Antoine Durand-Gasselin 2 Ashutosh Trivedi 3 1 University of Pennsylvania 2 LIAFA, Université Paris Diderot 3 Indian

More information

Introduction to Computers & Programming

Introduction to Computers & Programming 16.070 Introduction to Computers & Programming Theory of computation: What is a computer? FSM, Automata Prof. Kristina Lundqvist Dept. of Aero/Astro, MIT Models of Computation What is a computer? If you

More information

Timed Automata VINO 2011

Timed Automata VINO 2011 Timed Automata VINO 2011 VeriDis Group - LORIA July 18, 2011 Content 1 Introduction 2 Timed Automata 3 Networks of timed automata Motivation Formalism for modeling and verification of real-time systems.

More information

CSE 135: Introduction to Theory of Computation Nondeterministic Finite Automata (cont )

CSE 135: Introduction to Theory of Computation Nondeterministic Finite Automata (cont ) CSE 135: Introduction to Theory of Computation Nondeterministic Finite Automata (cont ) Sungjin Im University of California, Merced 2-3-214 Example II A ɛ B ɛ D F C E Example II A ɛ B ɛ D F C E NFA accepting

More information

Nondeterminism. September 7, Nondeterminism

Nondeterminism. September 7, Nondeterminism September 7, 204 Introduction is a useful concept that has a great impact on the theory of computation Introduction is a useful concept that has a great impact on the theory of computation So far in our

More information

Finite Automata. Dr. Neil T. Dantam. Fall CSCI-561, Colorado School of Mines. Dantam (Mines CSCI-561) Finite Automata Fall / 35

Finite Automata. Dr. Neil T. Dantam. Fall CSCI-561, Colorado School of Mines. Dantam (Mines CSCI-561) Finite Automata Fall / 35 Finite Automata Dr. Neil T. Dantam CSCI-561, Colorado School of Mines Fall 2017 Dantam (Mines CSCI-561) Finite Automata Fall 2017 1 / 35 Outline Dantam (Mines CSCI-561) Finite Automata Fall 2017 2 / 35

More information

arxiv: v2 [cs.fl] 29 Nov 2013

arxiv: v2 [cs.fl] 29 Nov 2013 A Survey of Multi-Tape Automata Carlo A. Furia May 2012 arxiv:1205.0178v2 [cs.fl] 29 Nov 2013 Abstract This paper summarizes the fundamental expressiveness, closure, and decidability properties of various

More information

Verifying whether One-Tape Turing Machines Run in Linear Time

Verifying whether One-Tape Turing Machines Run in Linear Time Electronic Colloquium on Computational Complexity, Report No. 36 (2015) Verifying whether One-Tape Turing Machines Run in Linear Time David Gajser IMFM, Jadranska 19, 1000 Ljubljana, Slovenija david.gajser@fmf.uni-lj.si

More information

Equivalence of Regular Expressions and FSMs

Equivalence of Regular Expressions and FSMs Equivalence of Regular Expressions and FSMs Greg Plaxton Theory in Programming Practice, Spring 2005 Department of Computer Science University of Texas at Austin Regular Language Recall that a language

More information

Decidable and Expressive Classes of Probabilistic Automata

Decidable and Expressive Classes of Probabilistic Automata Decidable and Expressive Classes of Probabilistic Automata Yue Ben a, Rohit Chadha b, A. Prasad Sistla a, Mahesh Viswanathan c a University of Illinois at Chicago, USA b University of Missouri, USA c University

More information

Outline. Complexity Theory. Example. Sketch of a log-space TM for palindromes. Log-space computations. Example VU , SS 2018

Outline. Complexity Theory. Example. Sketch of a log-space TM for palindromes. Log-space computations. Example VU , SS 2018 Complexity Theory Complexity Theory Outline Complexity Theory VU 181.142, SS 2018 3. Logarithmic Space Reinhard Pichler Institute of Logic and Computation DBAI Group TU Wien 3. Logarithmic Space 3.1 Computational

More information

Advanced Automata Theory 11 Regular Languages and Learning Theory

Advanced Automata Theory 11 Regular Languages and Learning Theory Advanced Automata Theory 11 Regular Languages and Learning Theory Frank Stephan Department of Computer Science Department of Mathematics National University of Singapore fstephan@comp.nus.edu.sg Advanced

More information

CSE 311 Lecture 23: Finite State Machines. Emina Torlak and Kevin Zatloukal

CSE 311 Lecture 23: Finite State Machines. Emina Torlak and Kevin Zatloukal CSE 3 Lecture 3: Finite State Machines Emina Torlak and Kevin Zatloukal Topics Finite state machines (FSMs) Definition and examples. Finite state machines with output Definition and examples. Finite state

More information

An example of a decidable language that is not a CFL Implementation-level description of a TM State diagram of TM

An example of a decidable language that is not a CFL Implementation-level description of a TM State diagram of TM Turing Machines Review An example of a decidable language that is not a CFL Implementation-level description of a TM State diagram of TM Varieties of TMs Multi-Tape TMs Nondeterministic TMs String Enumerators

More information

CMSC 330: Organization of Programming Languages

CMSC 330: Organization of Programming Languages CMSC 330: Organization of Programming Languages Theory of Regular Expressions DFAs and NFAs Reminders Project 1 due Sep. 24 Homework 1 posted Exam 1 on Sep. 25 Exam topics list posted Practice homework

More information

15-251: Great Theoretical Ideas in Computer Science Lecture 7. Turing s Legacy Continues

15-251: Great Theoretical Ideas in Computer Science Lecture 7. Turing s Legacy Continues 15-251: Great Theoretical Ideas in Computer Science Lecture 7 Turing s Legacy Continues Solvable with Python = Solvable with C = Solvable with Java = Solvable with SML = Decidable Languages (decidable

More information

Proofs, Strings, and Finite Automata. CS154 Chris Pollett Feb 5, 2007.

Proofs, Strings, and Finite Automata. CS154 Chris Pollett Feb 5, 2007. Proofs, Strings, and Finite Automata CS154 Chris Pollett Feb 5, 2007. Outline Proofs and Proof Strategies Strings Finding proofs Example: For every graph G, the sum of the degrees of all the nodes in G

More information

Regular Languages. Problem Characterize those Languages recognized by Finite Automata.

Regular Languages. Problem Characterize those Languages recognized by Finite Automata. Regular Expressions Regular Languages Fundamental Question -- Cardinality Alphabet = Σ is finite Strings = Σ is countable Languages = P(Σ ) is uncountable # Finite Automata is countable -- Q Σ +1 transition

More information

Decentralized Control of Discrete Event Systems with Bounded or Unbounded Delay Communication 1

Decentralized Control of Discrete Event Systems with Bounded or Unbounded Delay Communication 1 Decentralized Control of Discrete Event Systems with Bounded or Unbounded Delay Communication 1 Stavros Tripakis 2 VERIMAG Technical Report TR-2004-26 November 2004 Abstract We introduce problems of decentralized

More information

Theory Bridge Exam Example Questions

Theory Bridge Exam Example Questions Theory Bridge Exam Example Questions Annotated version with some (sometimes rather sketchy) answers and notes. This is a collection of sample theory bridge exam questions. This is just to get some idea

More information

Decidable and undecidable languages

Decidable and undecidable languages The Chinese University of Hong Kong Fall 2011 CSCI 3130: Formal languages and automata theory Decidable and undecidable languages Andrej Bogdanov http://www.cse.cuhk.edu.hk/~andrejb/csc3130 Problems about

More information

Computability and Complexity

Computability and Complexity Computability and Complexity Push-Down Automata CAS 705 Ryszard Janicki Department of Computing and Software McMaster University Hamilton, Ontario, Canada janicki@mcmaster.ca Ryszard Janicki Computability

More information

CSE 105 THEORY OF COMPUTATION

CSE 105 THEORY OF COMPUTATION CSE 105 THEORY OF COMPUTATION Fall 2016 http://cseweb.ucsd.edu/classes/fa16/cse105-abc/ Logistics HW7 due tonight Thursday's class: REVIEW Final exam on Thursday Dec 8, 8am-11am, LEDDN AUD Note card allowed

More information

Decidability. Human-aware Robotics. 2017/10/31 Chapter 4.1 in Sipser Ø Announcement:

Decidability. Human-aware Robotics. 2017/10/31 Chapter 4.1 in Sipser Ø Announcement: Decidability 2017/10/31 Chapter 4.1 in Sipser Ø Announcement: q q q Slides for this lecture are here: http://www.public.asu.edu/~yzhan442/teaching/cse355/lectures/decidability.pdf Happy Hollaween! Delayed

More information

A Universal Turing Machine

A Universal Turing Machine A Universal Turing Machine A limitation of Turing Machines: Turing Machines are hardwired they execute only one program Real Computers are re-programmable Solution: Universal Turing Machine Attributes:

More information

Finite-State Machines (Automata) lecture 12

Finite-State Machines (Automata) lecture 12 Finite-State Machines (Automata) lecture 12 cl a simple form of computation used widely one way to find patterns 1 A current D B A B C D B C D A C next 2 Application Fields Industry real-time control,

More information

Variations of the Turing Machine

Variations of the Turing Machine Variations of the Turing Machine 1 The Standard Model Infinite Tape a a b a b b c a c a Read-Write Head (Left or Right) Control Unit Deterministic 2 Variations of the Standard Model Turing machines with:

More information

CPSC 421: Tutorial #1

CPSC 421: Tutorial #1 CPSC 421: Tutorial #1 October 14, 2016 Set Theory. 1. Let A be an arbitrary set, and let B = {x A : x / x}. That is, B contains all sets in A that do not contain themselves: For all y, ( ) y B if and only

More information

Chapter Five: Nondeterministic Finite Automata

Chapter Five: Nondeterministic Finite Automata Chapter Five: Nondeterministic Finite Automata From DFA to NFA A DFA has exactly one transition from every state on every symbol in the alphabet. By relaxing this requirement we get a related but more

More information

Nondeterministic Finite Automata

Nondeterministic Finite Automata Nondeterministic Finite Automata Not A DFA Does not have exactly one transition from every state on every symbol: Two transitions from q 0 on a No transition from q 1 (on either a or b) Though not a DFA,

More information

Outline. Nondetermistic Finite Automata. Transition diagrams. A finite automaton is a 5-tuple (Q, Σ,δ,q 0,F)

Outline. Nondetermistic Finite Automata. Transition diagrams. A finite automaton is a 5-tuple (Q, Σ,δ,q 0,F) Outline Nondeterminism Regular expressions Elementary reductions http://www.cs.caltech.edu/~cs20/a October 8, 2002 1 Determistic Finite Automata A finite automaton is a 5-tuple (Q, Σ,δ,q 0,F) Q is a finite

More information

Decision, Computation and Language

Decision, Computation and Language Decision, Computation and Language Non-Deterministic Finite Automata (NFA) Dr. Muhammad S Khan (mskhan@liv.ac.uk) Ashton Building, Room G22 http://www.csc.liv.ac.uk/~khan/comp218 Finite State Automata

More information

Automata & languages. A primer on the Theory of Computation. Laurent Vanbever. ETH Zürich (D-ITET) October,

Automata & languages. A primer on the Theory of Computation. Laurent Vanbever.   ETH Zürich (D-ITET) October, Automata & languages A primer on the Theory of Computation Laurent Vanbever www.vanbever.eu ETH Zürich (D-ITET) October, 19 2017 Part 5 out of 5 Last week was all about Context-Free Languages Context-Free

More information

Final Exam Version A December 16, 2014 Name: NetID: Section: # Total Score

Final Exam Version A December 16, 2014 Name: NetID: Section: # Total Score CS 374 : Algorithms and Models of Computation, Fall 2014 Final Exam Version A December 16, 2014 Name: NetID: Section: 1 2 3 # 1 2 3 4 5 6 Total Score Max 20 10 10 10 10 10 70 Grader Don t panic! Please

More information

Synthesis of Winning Strategies for Interaction under Partial Information

Synthesis of Winning Strategies for Interaction under Partial Information Synthesis of Winning Strategies for Interaction under Partial Information Oberseminar Informatik Bernd Puchala RWTH Aachen University June 10th, 2013 1 Introduction Interaction Strategy Synthesis 2 Main

More information

Theory of Computation 3 Deterministic Finite Automata

Theory of Computation 3 Deterministic Finite Automata Theory of Computation 3 Deterministic Finite Automata Frank Stephan Department of Computer Science Department of Mathematics National University of Singapore fstephan@comp.nus.edu.sg Theory of Computation

More information

Final Exam (Version B) December 16, 2014 Name: NetID: Section: 1 2 3

Final Exam (Version B) December 16, 2014 Name: NetID: Section: 1 2 3 CS 374 : Algorithms and Models of Computation, Fall 2014 Final Exam (Version B) December 16, 2014 Name: NetID: Section: 1 2 3 # 1 2 3 4 5 6 Total Score Max 20 10 10 10 10 10 70 Grader Don t panic! Please

More information