Robustness Analysis of Networked Systems
|
|
- Phoebe Kelley
- 5 years ago
- Views:
Transcription
1 Robustness Analysis of Networked Systems Roopsha Samanta The University of Texas at Austin Joint work with Jyotirmoy V. Deshmukh and Swarat Chaudhuri January, 0 Roopsha Samanta Robustness Analysis of Networked Systems / 5
2 Problem Overview P P P Programs rarely execute in isolation Roopsha Samanta Robustness Analysis of Networked Systems / 5
3 Problem Overview P P P Programs interact with other programs and the physical world Roopsha Samanta Robustness Analysis of Networked Systems / 5
4 Problem Overview P P P Predictability in the presence of uncertainty Roopsha Samanta Robustness Analysis of Networked Systems / 5
5 Problem Overview P P P Small perturbation in input Small perturbation in output Roopsha Samanta Robustness Analysis of Networked Systems / 5
6 Problem Overview P P P Robustness! Roopsha Samanta Robustness Analysis of Networked Systems / 5
7 Synchronous Networked System N : C, P C out Directed graph (P, C) P = {P,..., P n } C = I N O Synchronous P C in C, C, Computation alphabet: Σ P C, Roopsha Samanta Robustness Analysis of Networked Systems / 5
8 Process C, Process P i : (In i, Out i, M i ) Mealy Machine M i : (Σ In i, Σ Out i, Q i, q 0i, R i ) C in P C, Roopsha Samanta Robustness Analysis of Networked Systems / 5
9 Network Semantics N : (Σ I, Σ O, Q, q 0, R) Network state: (q,..., q n, c,..., c N ) N : C, P C out Network transition: (q,..., q n, c,..., c I ) P (a,..., a I ), (a,..., a w ) C in C, C, (q,..., q n, c,..., c O ) P Network execution: ρ(s) Network output: N (s) C, Roopsha Samanta Robustness Analysis of Networked Systems 5 / 5
10 Internal Channel Perturbations Instantaneous deletion or substitution of current symbol τ-transition: (q,..., q n, c,..., c I ) ε, ε (q,..., q n, c,..., c I ), Perturbed network execution: ρ τ (s) Perturbed network output: ρ τ (s) Channel-wise perturbation count in ρ τ (s): ρ τ (s) Roopsha Samanta Robustness Analysis of Networked Systems 6 / 5
11 Robust Networked System Given: a networked system N, max. pertb. count of internal channels, δ = (δ,..., δ N ), max. permissible error in output channel, ɛ, distance metric d over Σ P N : C,, δ C in C,, δ C,, δ P P C out, ɛ C,, δ N is defined to be (δ, ɛ)-robust if: s (Σ I ), ρ τ (s) : ρ τ (s) δ = d( N (s), ρ τ (s) ) ɛ Roopsha Samanta Robustness Analysis of Networked Systems 7 / 5
12 Robust Networked System Given: a networked system N, max. pertb. count of internal channels, δ = (δ,..., δ N ), max. permissible error in output channel, ɛ, distance metric d over Σ P N : C,, δ C in C,, δ C,, δ P P C out, ɛ C,, δ N is defined to be (δ, ɛ)-robust if: s (Σ I ), ρ τ (s) : ρ τ (s) δ = d( N (s), ρ τ (s) ) ɛ Roopsha Samanta Robustness Analysis of Networked Systems 7 / 5
13 Problem Definition Given: a networked system N, max. pertb. count of internal channels, δ = (δ,..., δ N ), max. permissible error in output channel, ɛ, distance metric d over Σ P N : C,, δ C in C,, δ C,, δ P P C out, ɛ C,, δ Check if N is (δ, ɛ)-robust. Roopsha Samanta Robustness Analysis of Networked Systems 8 / 5
14 Solution Strategy Given: a networked system N, max. pertb. count of internal channels, δ = (δ,..., δ N ), max. permissible error in output channel, ɛ, distance metric d over Σ P N : C,, δ C in C,, δ C,, δ P P C out, ɛ C,, δ Construct machine A: N is (δ, ɛ)-robust iff L(A) is empty. Roopsha Samanta Robustness Analysis of Networked Systems 9 / 5
15 Solution Strategy Construct machine A: N is (δ, ɛ)-robust iff L(A) is empty. In a run of A on s, A simultaneously: simulates unperturbed, perturbed executions: ρ(s), ρ τ (s) tracks channel perturbations along ρ τ (s), tracks distance between outputs of N along ρ(s), ρ τ (s). A accepts s iff ρ τ (s): ρ τ (s) δ and d( N (s), ρ τ (s)) > ɛ. Roopsha Samanta Robustness Analysis of Networked Systems 9 / 5
16 Review: Levenshtein Distance, d Lev (s, t) Minimum number of symbol insertions, deletions and substitutions required to transform s into t. d Lev (abc, bcd) = b c d a b c d Lev (acbcd, ccff ) = c c f f or, a c b c d c c f f a c b c d Roopsha Samanta Robustness Analysis of Networked Systems 0 / 5
17 Review: Levenshtein Distance, d Lev (s, t) Minimum number of symbol insertions, deletions and substitutions required to transform s into t. d Lev (abc, bcd) = b c d a b c d Lev (acbcd, ccff ) = c c f f or, a c b c d c c f f a c b c d Roopsha Samanta Robustness Analysis of Networked Systems 0 / 5
18 Review: Levenshtein Distance, d Lev (s, t) Minimum number of symbol insertions, deletions and substitutions required to transform s into t. d Lev (abc, bcd) = b c d a b c d Lev (acbcd, ccff ) = c c f f or, a c b c d c c f f a c b c d Roopsha Samanta Robustness Analysis of Networked Systems 0 / 5
19 Review: Levenshtein Distance Computation t c c f f s a c b d Lev (s[0], t[0]) = 0 d Lev (s[0, i], t[0]) = i d Lev (s[0], t[0, j]) = j c d 5 5 Roopsha Samanta Robustness Analysis of Networked Systems / 5
20 Review: Levenshtein Distance Computation t s a c b c 0 c c f f 0 0 subs del ins? d Lev (s[0, i], t[0, j]) = min(d Lev (s[0, i-], t[0, j-]) + (s[i], t[j]), d Lev (s[0, i-], t[0, j]) +, d Lev (s[0, i], t[0, j-]) + ) (a, b) equals 0 if a = b, else. d 5 5 Roopsha Samanta Robustness Analysis of Networked Systems / 5
21 Review: Levenshtein Distance Computation t s a c b 0 c c f f 0 0 d Lev (s[0, i], t[0, j]) = min(d Lev (s[0, i-], t[0, j-]) + (s[i], t[j]), d Lev (s[0, i-], t[0, j]) +, d Lev (s[0, i], t[0, j-]) + ) c (a, b) equals 0 if a = b, else. d 5 5 Roopsha Samanta Robustness Analysis of Networked Systems / 5
22 Review: Levenshtein Distance Computation t s a c b 0 c c f f 0 0 d Lev (s[0, i], t[0, j]) = min(d Lev (s[0, i-], t[0, j-]) + (s[i], t[j]), d Lev (s[0, i-], t[0, j]) +, d Lev (s[0, i], t[0, j-]) + ) c (a, b) equals 0 if a = b, else. d 5 5 Roopsha Samanta Robustness Analysis of Networked Systems / 5
23 Review: Levenshtein Distance Computation t s a c b 0 c c f f 0 0 d Lev (s[0, i], t[0, j]) = min(d Lev (s[0, i-], t[0, j-]) + (s[i], t[j]), d Lev (s[0, i-], t[0, j]) +, d Lev (s[0, i], t[0, j-]) + ) c (a, b) equals 0 if a = b, else. d 5 5 Roopsha Samanta Robustness Analysis of Networked Systems / 5
24 Review: Levenshtein Distance Computation t 0 c c f f 0 0 To check if d Lev (s, t) > ɛ, focus on ɛ-diagonal. a s c b c Construct DFA D ɛ Lev: runs on a string pair (s, t), and accepts iff d Lev (s, t) > ɛ. d 5 ɛ = Roopsha Samanta Robustness Analysis of Networked Systems / 5
25 Distance-Tracking Automaton, D ɛ Lev c c f f # # (λ, λ,,, 0,, ) (a, c) (c, f ) 0 0 (a, c,,,,, ) (bc, ff,,,,, ) a (c, c) (d, #) c (ac, cc,,,,, ) (cd, f #,,,,, ) b (b, f ) (#, #) c (cb, cf,,,,, ) accept d 5 # 6 ɛ = Roopsha Samanta Robustness Analysis of Networked Systems / 5
26 Distance-Tracking Automaton, D ɛ Lev D ɛ Lev accepts a pair of strings (s, t) iff d Lev(s, t) > ɛ. Roopsha Samanta Robustness Analysis of Networked Systems / 5
27 Review: Counter Machines (One-way, Nondeterministic) h-counter machine A: finite automaton with h integer counters In each step, A may read an input symbol, test counter values change state update each counter by some constant Transition: (x, σ, test, x, c,..., c h ) s is accepted by A iff (x 0, s 0, 0,... 0) A (acc, s j, z,..., z h ) Most interesting questions are undecidable. Roopsha Samanta Robustness Analysis of Networked Systems / 5
28 Review: Counter Machines (One-way, Nondeterministic) h-counter machine A: finite automaton with h integer counters In each step, A may read an input symbol, test counter values change state update each counter by some constant Transition: (x, σ, test, x, c,..., c h ) s is accepted by A iff (x 0, s 0, 0,... 0) A (acc, s j, z,..., z h ) Most interesting questions are undecidable. Roopsha Samanta Robustness Analysis of Networked Systems / 5
29 Review: Counter Machines (One-way, Nondeterministic) h-counter machine A: finite automaton with h integer counters In each step, A may read an input symbol, test counter values change state update each counter by some constant Transition: (x, σ, test, x, c,..., c h ) s is accepted by A iff (x 0, s 0, 0,... 0) A (acc, s j, z,..., z h ) Most interesting questions are undecidable. Roopsha Samanta Robustness Analysis of Networked Systems / 5
30 Review: Counter Machines (One-way, Nondeterministic) h-counter machine A: finite automaton with h integer counters In each step, A may read an input symbol, test counter values change state update each counter by some constant Transition: (x, σ, test, x, c,..., c h ) s is accepted by A iff (x 0, s 0, 0,... 0) A (acc, s j, z,..., z h ) Most interesting questions are undecidable. Roopsha Samanta Robustness Analysis of Networked Systems / 5
31 Review: Reversal-bounded Counter Machines (One-way, Nondeterministic) r-reversal bounded, h-counter machine: each counter alternates between an increasing mode and a decreasing mode at most r times. [GurariIbarra98] Nonemptiness for a r-reversal bounded, h-counter machine A is solvable in time polynomial in the size of A. Roopsha Samanta Robustness Analysis of Networked Systems / 5
32 Review: Reversal-bounded Counter Machines (One-way, Nondeterministic) r-reversal bounded, h-counter machine: each counter alternates between an increasing mode and a decreasing mode at most r times. [GurariIbarra98] Nonemptiness for a r-reversal bounded, h-counter machine A is solvable in time polynomial in the size of A. Roopsha Samanta Robustness Analysis of Networked Systems / 5
33 Robustness Analysis for Levenshtein distance Construct machine A δ,ɛ Lev A: N is (δ, ɛ)-robust iff L(A) is empty. In a run of A on s, A simultaneously: simulates unperturbed, perturbed executions: ρ(s), ρ τ (s) tracks channel perturbations along ρ τ (s), tracks distance between outputs of N along ρ(s), ρ τ (s). A accepts s iff ρ τ (s): ρ τ (s) δ and d( N (s), ρ τ (s)) > ɛ. Roopsha Samanta Robustness Analysis of Networked Systems 5 / 5
34 A: -reversal-bounded N -counter machine A state x: (q, r, q Lev ), q, r Q, q Lev Q Lev Initial state: (q 0, q 0, q 0 Lev ) Set of counters Z = {z,..., z N }, initially 0 Final state: {acc} Roopsha Samanta Robustness Analysis of Networked Systems 6 / 5
35 A: Initialization transition Initialize counters with perturbation bounds: ( (q 0, q 0, q 0 Lev ), ε, ) z k = 0, (q 0, q 0, q 0 Lev ), (+δ,..., +δ N ) k Roopsha Samanta Robustness Analysis of Networked Systems 7 / 5
36 A: Unperturbed network transitions Simulate pair of unperturbed N -transitions, track output distance: ( (q, r, q Lev ), a, ) z k 0, (q, r, q Lev), 0 k Roopsha Samanta Robustness Analysis of Networked Systems 8 / 5
37 A: Perturbed network transitions Simulate τ-transition, decrement counters of perturbed channels by : ( (q, r, q Lev ), ε, ) z k 0, (q, r τ, q Lev ), c k Roopsha Samanta Robustness Analysis of Networked Systems 9 / 5
38 A: Rejecting transitions Reject if any internal channel perturbation exceeds bound: ( (q, r, q Lev ), ε, ) z k < 0, rej, 0 k (rej, a, true, rej, 0) Roopsha Samanta Robustness Analysis of Networked Systems 0 / 5
39 A: Accepting transitions Accept witness to non-robustness: ( (q, r, acc Lev ), ε, ) z k 0, acc, 0 k Roopsha Samanta Robustness Analysis of Networked Systems / 5
40 Main Result(s) Checking if N is (δ, ɛ)-robust w.r.t the Levenshtein distance is polynomial in the size of N and exponential in ɛ. Checking if N is (δ, ɛ)-robust w.r.t the L -norm is polynomial in the size of N. Roopsha Samanta Robustness Analysis of Networked Systems / 5
41 Main Result(s) Checking if N is (δ, ɛ)-robust w.r.t the Levenshtein distance is polynomial in the size of N and exponential in ɛ. Checking if N is (δ, ɛ)-robust w.r.t the L -norm is polynomial in the size of N. Roopsha Samanta Robustness Analysis of Networked Systems / 5
42 Related Work Sequential programs with perturbed inputs [MS09, CGLN] Input-output stability of finite-state transducers [TBCSM] Sequential circuits, common suffix distance metric [DHLN0] Robust control, wireless control networks [ADJPW, Pappas] Reactive systems with ω-regular spec. in uncertain environment [MRT, CHR0, BGHJ09] Roopsha Samanta Robustness Analysis of Networked Systems / 5
43 Future Work Consider more distance-metrics Generalize error model - input noise, process failures etc. Synthesis of robust networked systems Roopsha Samanta Robustness Analysis of Networked Systems / 5
44 Thank you. Roopsha Samanta Robustness Analysis of Networked Systems 5 / 5
Robustness Analysis of Networked Systems
Robustness Analysis of Networked Systems Roopsha Samanta 1, Jyotirmoy V. Deshmukh 2, and Swarat Chaudhuri 3 1 University of Texas at Austin roopsha@cs.utexas.edu 2 University of Pennsylvania djy@cis.upenn.edu
More informationLipschitz Robustness of Finite-state Transducers
Lipschitz Robustness of Finite-state Transducers Roopsha Samanta IST Austria Joint work with Tom Henzinger and Jan Otop December 16, 2014 Roopsha Samanta Lipschitz Robustness of Finite-state Transducers
More informationAutomatic Verification of Parameterized Data Structures
Automatic Verification of Parameterized Data Structures Jyotirmoy V. Deshmukh, E. Allen Emerson and Prateek Gupta The University of Texas at Austin The University of Texas at Austin 1 Outline Motivation
More informationFORMAL LANGUAGES, AUTOMATA AND COMPUTATION
FORMAL LANGUAGES, AUTOMATA AND COMPUTATION DECIDABILITY ( LECTURE 15) SLIDES FOR 15-453 SPRING 2011 1 / 34 TURING MACHINES-SYNOPSIS The most general model of computation Computations of a TM are described
More informationNondeterministic Streaming String Transducers
Nondeterministic Streaming String Transducers Rajeev Alur and Jyotirmoy V. Deshmukh Dept. of Computer and Information Science, University of Pennsylvania. {alur,djy}@cis.upenn.edu Abstract. We introduce
More informationReducability. Sipser, pages
Reducability Sipser, pages 187-214 Reduction Reduction encodes (transforms) one problem as a second problem. A solution to the second, can be transformed into a solution to the first. We expect both transformations
More informationFinite-state machines (FSMs)
Finite-state machines (FSMs) Dr. C. Constantinides Department of Computer Science and Software Engineering Concordia University Montreal, Canada January 10, 2017 1/19 Finite-state machines (FSMs) and state
More informationLipschitz Robustness of Finite-state Transducers
Lipschitz Robustness of Finite-state Transducers Thomas A. Henzinger, Jan Otop, Roopsha Samanta IST Austria Abstract We investigate the problem of checking if a finite-state transducer is robust to uncertainty
More informationTowards Algorithmic Synthesis of Synchronization for Shared-Memory Concurrent Programs
Towards Algorithmic Synthesis of Synchronization for Shared-Memory Concurrent Programs Roopsha Samanta The University of Texas at Austin July 6, 2012 Roopsha Samanta Algorithmic Synthesis of Synchronization
More informationSOLUTION: SOLUTION: SOLUTION:
Convert R and S into nondeterministic finite automata N1 and N2. Given a string s, if we know the states N1 and N2 may reach when s[1...i] has been read, we are able to derive the states N1 and N2 may
More informationAdvanced Automata Theory 10 Transducers and Rational Relations
Advanced Automata Theory 10 Transducers and Rational Relations Frank Stephan Department of Computer Science Department of Mathematics National University of Singapore fstephan@comp.nus.edu.sg Advanced
More informationComputability and Complexity
Computability and Complexity Lecture 5 Reductions Undecidable problems from language theory Linear bounded automata given by Jiri Srba Lecture 5 Computability and Complexity 1/14 Reduction Informal Definition
More informationLanguage Stability and Stabilizability of Discrete Event Dynamical Systems 1
Language Stability and Stabilizability of Discrete Event Dynamical Systems 1 Ratnesh Kumar Department of Electrical Engineering University of Kentucky Lexington, KY 40506-0046 Vijay Garg Department of
More informationPolynomial Time Computation. Topics in Logic and Complexity Handout 2. Nondeterministic Polynomial Time. Succinct Certificates.
1 2 Topics in Logic and Complexity Handout 2 Anuj Dawar MPhil Advanced Computer Science, Lent 2010 Polynomial Time Computation P = TIME(n k ) k=1 The class of languages decidable in polynomial time. The
More informationClosure under the Regular Operations
Closure under the Regular Operations Application of NFA Now we use the NFA to show that collection of regular languages is closed under regular operations union, concatenation, and star Earlier we have
More informationHKN CS/ECE 374 Midterm 1 Review. Nathan Bleier and Mahir Morshed
HKN CS/ECE 374 Midterm 1 Review Nathan Bleier and Mahir Morshed For the most part, all about strings! String induction (to some extent) Regular languages Regular expressions (regexps) Deterministic finite
More informationSeptember 7, Formal Definition of a Nondeterministic Finite Automaton
Formal Definition of a Nondeterministic Finite Automaton September 7, 2014 A comment first The formal definition of an NFA is similar to that of a DFA. Both have states, an alphabet, transition function,
More informationComplexity. Complexity Theory Lecture 3. Decidability and Complexity. Complexity Classes
Complexity Theory 1 Complexity Theory 2 Complexity Theory Lecture 3 Complexity For any function f : IN IN, we say that a language L is in TIME(f(n)) if there is a machine M = (Q, Σ, s, δ), such that: L
More informationUndecidable Problems and Reducibility
University of Georgia Fall 2014 Reducibility We show a problem decidable/undecidable by reducing it to another problem. One type of reduction: mapping reduction. Definition Let A, B be languages over Σ.
More informationNotes for Lecture Notes 2
Stanford University CS254: Computational Complexity Notes 2 Luca Trevisan January 11, 2012 Notes for Lecture Notes 2 In this lecture we define NP, we state the P versus NP problem, we prove that its formulation
More informationAdvanced topic: Space complexity
Advanced topic: Space complexity CSCI 3130 Formal Languages and Automata Theory Siu On CHAN Chinese University of Hong Kong Fall 2016 1/28 Review: time complexity We have looked at how long it takes to
More informationComputability Theory
CS:4330 Theory of Computation Spring 2018 Computability Theory Decidable Languages Haniel Barbosa Readings for this lecture Chapter 4 of [Sipser 1996], 3rd edition. Section 4.1. Decidable Languages We
More informationCSE 105 Theory of Computation
CSE 105 Theory of Computation http://www.jflap.org/jflaptmp/ Professor Jeanne Ferrante 1 Undecidability Today s Agenda Review: The TM Acceptance problem, A TM The Halting Problem for TM s Other problems
More information4.2 The Halting Problem
172 4.2 The Halting Problem The technique of diagonalization was discovered in 1873 by Georg Cantor who was concerned with the problem of measuring the sizes of infinite sets For finite sets we can simply
More informationMA/CSSE 474 Theory of Computation
MA/CSSE 474 Theory of Computation CFL Hierarchy CFL Decision Problems Your Questions? Previous class days' material Reading Assignments HW 12 or 13 problems Anything else I have included some slides online
More informationClosure under the Regular Operations
September 7, 2013 Application of NFA Now we use the NFA to show that collection of regular languages is closed under regular operations union, concatenation, and star Earlier we have shown this closure
More informationHoming and Synchronizing Sequences
Homing and Synchronizing Sequences Sven Sandberg Information Technology Department Uppsala University Sweden 1 Outline 1. Motivations 2. Definitions and Examples 3. Algorithms (a) Current State Uncertainty
More informationContext Sensitive Grammar
Context Sensitive Grammar Aparna S Vijayan Department of Computer Science and Automation December 2, 2011 Aparna S Vijayan (CSA) CSG December 2, 2011 1 / 12 Contents Aparna S Vijayan (CSA) CSG December
More informationChapter 5. Finite Automata
Chapter 5 Finite Automata 5.1 Finite State Automata Capable of recognizing numerous symbol patterns, the class of regular languages Suitable for pattern-recognition type applications, such as the lexical
More informationTheory of Computation (IX) Yijia Chen Fudan University
Theory of Computation (IX) Yijia Chen Fudan University Review The Definition of Algorithm Polynomials and their roots A polynomial is a sum of terms, where each term is a product of certain variables and
More informationLecture 1: Finite State Automaton
Lecture 1: Finite State Automaton Instructor: Ketan Mulmuley Scriber: Yuan Li January 6, 2015 1 Deterministic Finite Automaton Informally, a deterministic finite automaton (DFA) has finite number of s-
More informationClarifications from last time. This Lecture. Last Lecture. CMSC 330: Organization of Programming Languages. Finite Automata.
CMSC 330: Organization of Programming Languages Last Lecture Languages Sets of strings Operations on languages Finite Automata Regular expressions Constants Operators Precedence CMSC 330 2 Clarifications
More informationTheory of Computation
Thomas Zeugmann Hokkaido University Laboratory for Algorithmics http://www-alg.ist.hokudai.ac.jp/ thomas/toc/ Lecture 3: Finite State Automata Motivation In the previous lecture we learned how to formalize
More information1 Computational Problems
Stanford University CS254: Computational Complexity Handout 2 Luca Trevisan March 31, 2010 Last revised 4/29/2010 In this lecture we define NP, we state the P versus NP problem, we prove that its formulation
More informationHomework Assignment 6 Answers
Homework Assignment 6 Answers CSCI 2670 Introduction to Theory of Computing, Fall 2016 December 2, 2016 This homework assignment is about Turing machines, decidable languages, Turing recognizable languages,
More informationEmbedded Systems Development
Embedded Systems Development Lecture 2 Finite Automata & SyncCharts Daniel Kästner AbsInt Angewandte Informatik GmbH kaestner@absint.com Some things I forgot to mention 2 Remember the HISPOS registration
More informationSpace Complexity. The space complexity of a program is how much memory it uses.
Space Complexity The space complexity of a program is how much memory it uses. Measuring Space When we compute the space used by a TM, we do not count the input (think of input as readonly). We say that
More informationParikh s Theorem and Descriptional Complexity
Parikh s Theorem and Descriptional Complexity Giovanna J. Lavado and Giovanni Pighizzini Dipartimento di Informatica e Comunicazione Università degli Studi di Milano SOFSEM 2012 Špindlerův Mlýn, Czech
More informationPart 4 out of 5 DFA NFA REX. Automata & languages. A primer on the Theory of Computation. Last week, we showed the equivalence of DFA, NFA and REX
Automata & languages A primer on the Theory of Computation Laurent Vanbever www.vanbever.eu Part 4 out of 5 ETH Zürich (D-ITET) October, 12 2017 Last week, we showed the equivalence of DFA, NFA and REX
More informationCSE 105 THEORY OF COMPUTATION
CSE 105 THEORY OF COMPUTATION Spring 2016 http://cseweb.ucsd.edu/classes/sp16/cse105-ab/ Today's learning goals Sipser Ch 4.1, 5.1 Define reductions from one problem to another. Use reductions to prove
More informationIntroduction to Kleene Algebras
Introduction to Kleene Algebras Riccardo Pucella Basic Notions Seminar December 1, 2005 Introduction to Kleene Algebras p.1 Idempotent Semirings An idempotent semiring is a structure S = (S, +,, 1, 0)
More informationCS5371 Theory of Computation. Lecture 14: Computability V (Prove by Reduction)
CS5371 Theory of Computation Lecture 14: Computability V (Prove by Reduction) Objectives This lecture shows more undecidable languages Our proof is not based on diagonalization Instead, we reduce the problem
More informationUNIT-VIII COMPUTABILITY THEORY
CONTEXT SENSITIVE LANGUAGE UNIT-VIII COMPUTABILITY THEORY A Context Sensitive Grammar is a 4-tuple, G = (N, Σ P, S) where: N Set of non terminal symbols Σ Set of terminal symbols S Start symbol of the
More informationAdvanced Automata Theory 7 Automatic Functions
Advanced Automata Theory 7 Automatic Functions Frank Stephan Department of Computer Science Department of Mathematics National University of Singapore fstephan@comp.nus.edu.sg Advanced Automata Theory
More informationCS481F01 Prelim 2 Solutions
CS481F01 Prelim 2 Solutions A. Demers 7 Nov 2001 1 (30 pts = 4 pts each part + 2 free points). For this question we use the following notation: x y means x is a prefix of y m k n means m n k For each of
More informationDecision Problems for Additive Regular Functions
Decision Problems for Additive Regular Functions Rajeev Alur and Mukund Raghothaman University of Pennsylvania {alur, rmukund}@cis.upenn.edu Abstract. Additive Cost Register Automata (ACRA) map strings
More informationDeterministic Finite Automata. Non deterministic finite automata. Non-Deterministic Finite Automata (NFA) Non-Deterministic Finite Automata (NFA)
Deterministic Finite Automata Non deterministic finite automata Automata we ve been dealing with have been deterministic For every state and every alphabet symbol there is exactly one move that the machine
More informationDecidability (intro.)
CHAPTER 4 Decidability Contents Decidable Languages decidable problems concerning regular languages decidable problems concerning context-free languages The Halting Problem The diagonalization method The
More informationCMSC 330: Organization of Programming Languages. Theory of Regular Expressions Finite Automata
: Organization of Programming Languages Theory of Regular Expressions Finite Automata Previous Course Review {s s defined} means the set of string s such that s is chosen or defined as given s A means
More informationCS 455/555: Finite automata
CS 455/555: Finite automata Stefan D. Bruda Winter 2019 AUTOMATA (FINITE OR NOT) Generally any automaton Has a finite-state control Scans the input one symbol at a time Takes an action based on the currently
More information3130CIT Theory of Computation
GRIFFITH UNIVERSITY School of Computing and Information Technology 3130CIT Theory of Computation Final Examination, Semester 2, 2006 Details Total marks: 120 (40% of the total marks for this subject) Perusal:
More informationCSE 311: Foundations of Computing. Lecture 23: Finite State Machine Minimization & NFAs
CSE : Foundations of Computing Lecture : Finite State Machine Minimization & NFAs State Minimization Many different FSMs (DFAs) for the same problem Take a given FSM and try to reduce its state set by
More informationCpSc 421 Final Exam December 15, 2006
CpSc 421 Final Exam December 15, 2006 Do problem zero and six of problems 1 through 9. If you write down solutions for more that six problems, clearly indicate those that you want graded. Note that problems
More informationAuthor: Vivek Kulkarni ( )
Author: Vivek Kulkarni ( vivek_kulkarni@yahoo.com ) Chapter-2: Finite State Machines Solutions for Review Questions @ Oxford University Press 2013. All rights reserved. 1 Q.1 Construct Mealy and Moore
More informationEnhancing Active Automata Learning by a User Log Based Metric
Master Thesis Computing Science Radboud University Enhancing Active Automata Learning by a User Log Based Metric Author Petra van den Bos First Supervisor prof. dr. Frits W. Vaandrager Second Supervisor
More informationSYLLABUS. Introduction to Finite Automata, Central Concepts of Automata Theory. CHAPTER - 3 : REGULAR EXPRESSIONS AND LANGUAGES
Contents i SYLLABUS UNIT - I CHAPTER - 1 : AUT UTOMA OMATA Introduction to Finite Automata, Central Concepts of Automata Theory. CHAPTER - 2 : FINITE AUT UTOMA OMATA An Informal Picture of Finite Automata,
More informationNon-context-Free Languages. CS215, Lecture 5 c
Non-context-Free Languages CS215, Lecture 5 c 2007 1 The Pumping Lemma Theorem. (Pumping Lemma) Let be context-free. There exists a positive integer divided into five pieces, Proof for for each, and..
More informationAnnouncements. Problem Set 6 due next Monday, February 25, at 12:50PM. Midterm graded, will be returned at end of lecture.
Turing Machines Hello Hello Condensed Slide Slide Readers! Readers! This This lecture lecture is is almost almost entirely entirely animations that that show show how how each each Turing Turing machine
More informationDM17. Beregnelighed. Jacob Aae Mikkelsen
DM17 Beregnelighed Jacob Aae Mikkelsen January 12, 2007 CONTENTS Contents 1 Introduction 2 1.1 Operations with languages...................... 2 2 Finite Automata 3 2.1 Regular expressions/languages....................
More informationFormal Definition of a Finite Automaton. August 26, 2013
August 26, 2013 Why a formal definition? A formal definition is precise: - It resolves any uncertainties about what is allowed in a finite automaton such as the number of accept states and number of transitions
More informationTuring Machines Part III
Turing Machines Part III Announcements Problem Set 6 due now. Problem Set 7 out, due Monday, March 4. Play around with Turing machines, their powers, and their limits. Some problems require Wednesday's
More informationOn the Executability of Interactive Computation. June 23, 2016 Where innovation starts
On the Executability of Interactive Computation Bas Luttik Fei Yang June 23, 2016 Where innovation starts Outline 2/37 From Computation to Interactive Computation Executability - an Integration of Computability
More informationFinite State Machines 2
Finite State Machines 2 Joseph Spring School of Computer Science 1COM0044 Foundations of Computation 1 Discussion Points In the last lecture we looked at: 1. Abstract Machines 2. Finite State Machines
More informationFrom Monadic Second-Order Definable String Transformations to Transducers
From Monadic Second-Order Definable String Transformations to Transducers Rajeev Alur 1 Antoine Durand-Gasselin 2 Ashutosh Trivedi 3 1 University of Pennsylvania 2 LIAFA, Université Paris Diderot 3 Indian
More informationIntroduction to Computers & Programming
16.070 Introduction to Computers & Programming Theory of computation: What is a computer? FSM, Automata Prof. Kristina Lundqvist Dept. of Aero/Astro, MIT Models of Computation What is a computer? If you
More informationTimed Automata VINO 2011
Timed Automata VINO 2011 VeriDis Group - LORIA July 18, 2011 Content 1 Introduction 2 Timed Automata 3 Networks of timed automata Motivation Formalism for modeling and verification of real-time systems.
More informationCSE 135: Introduction to Theory of Computation Nondeterministic Finite Automata (cont )
CSE 135: Introduction to Theory of Computation Nondeterministic Finite Automata (cont ) Sungjin Im University of California, Merced 2-3-214 Example II A ɛ B ɛ D F C E Example II A ɛ B ɛ D F C E NFA accepting
More informationNondeterminism. September 7, Nondeterminism
September 7, 204 Introduction is a useful concept that has a great impact on the theory of computation Introduction is a useful concept that has a great impact on the theory of computation So far in our
More informationFinite Automata. Dr. Neil T. Dantam. Fall CSCI-561, Colorado School of Mines. Dantam (Mines CSCI-561) Finite Automata Fall / 35
Finite Automata Dr. Neil T. Dantam CSCI-561, Colorado School of Mines Fall 2017 Dantam (Mines CSCI-561) Finite Automata Fall 2017 1 / 35 Outline Dantam (Mines CSCI-561) Finite Automata Fall 2017 2 / 35
More informationarxiv: v2 [cs.fl] 29 Nov 2013
A Survey of Multi-Tape Automata Carlo A. Furia May 2012 arxiv:1205.0178v2 [cs.fl] 29 Nov 2013 Abstract This paper summarizes the fundamental expressiveness, closure, and decidability properties of various
More informationVerifying whether One-Tape Turing Machines Run in Linear Time
Electronic Colloquium on Computational Complexity, Report No. 36 (2015) Verifying whether One-Tape Turing Machines Run in Linear Time David Gajser IMFM, Jadranska 19, 1000 Ljubljana, Slovenija david.gajser@fmf.uni-lj.si
More informationEquivalence of Regular Expressions and FSMs
Equivalence of Regular Expressions and FSMs Greg Plaxton Theory in Programming Practice, Spring 2005 Department of Computer Science University of Texas at Austin Regular Language Recall that a language
More informationDecidable and Expressive Classes of Probabilistic Automata
Decidable and Expressive Classes of Probabilistic Automata Yue Ben a, Rohit Chadha b, A. Prasad Sistla a, Mahesh Viswanathan c a University of Illinois at Chicago, USA b University of Missouri, USA c University
More informationOutline. Complexity Theory. Example. Sketch of a log-space TM for palindromes. Log-space computations. Example VU , SS 2018
Complexity Theory Complexity Theory Outline Complexity Theory VU 181.142, SS 2018 3. Logarithmic Space Reinhard Pichler Institute of Logic and Computation DBAI Group TU Wien 3. Logarithmic Space 3.1 Computational
More informationAdvanced Automata Theory 11 Regular Languages and Learning Theory
Advanced Automata Theory 11 Regular Languages and Learning Theory Frank Stephan Department of Computer Science Department of Mathematics National University of Singapore fstephan@comp.nus.edu.sg Advanced
More informationCSE 311 Lecture 23: Finite State Machines. Emina Torlak and Kevin Zatloukal
CSE 3 Lecture 3: Finite State Machines Emina Torlak and Kevin Zatloukal Topics Finite state machines (FSMs) Definition and examples. Finite state machines with output Definition and examples. Finite state
More informationAn example of a decidable language that is not a CFL Implementation-level description of a TM State diagram of TM
Turing Machines Review An example of a decidable language that is not a CFL Implementation-level description of a TM State diagram of TM Varieties of TMs Multi-Tape TMs Nondeterministic TMs String Enumerators
More informationCMSC 330: Organization of Programming Languages
CMSC 330: Organization of Programming Languages Theory of Regular Expressions DFAs and NFAs Reminders Project 1 due Sep. 24 Homework 1 posted Exam 1 on Sep. 25 Exam topics list posted Practice homework
More information15-251: Great Theoretical Ideas in Computer Science Lecture 7. Turing s Legacy Continues
15-251: Great Theoretical Ideas in Computer Science Lecture 7 Turing s Legacy Continues Solvable with Python = Solvable with C = Solvable with Java = Solvable with SML = Decidable Languages (decidable
More informationProofs, Strings, and Finite Automata. CS154 Chris Pollett Feb 5, 2007.
Proofs, Strings, and Finite Automata CS154 Chris Pollett Feb 5, 2007. Outline Proofs and Proof Strategies Strings Finding proofs Example: For every graph G, the sum of the degrees of all the nodes in G
More informationRegular Languages. Problem Characterize those Languages recognized by Finite Automata.
Regular Expressions Regular Languages Fundamental Question -- Cardinality Alphabet = Σ is finite Strings = Σ is countable Languages = P(Σ ) is uncountable # Finite Automata is countable -- Q Σ +1 transition
More informationDecentralized Control of Discrete Event Systems with Bounded or Unbounded Delay Communication 1
Decentralized Control of Discrete Event Systems with Bounded or Unbounded Delay Communication 1 Stavros Tripakis 2 VERIMAG Technical Report TR-2004-26 November 2004 Abstract We introduce problems of decentralized
More informationTheory Bridge Exam Example Questions
Theory Bridge Exam Example Questions Annotated version with some (sometimes rather sketchy) answers and notes. This is a collection of sample theory bridge exam questions. This is just to get some idea
More informationDecidable and undecidable languages
The Chinese University of Hong Kong Fall 2011 CSCI 3130: Formal languages and automata theory Decidable and undecidable languages Andrej Bogdanov http://www.cse.cuhk.edu.hk/~andrejb/csc3130 Problems about
More informationComputability and Complexity
Computability and Complexity Push-Down Automata CAS 705 Ryszard Janicki Department of Computing and Software McMaster University Hamilton, Ontario, Canada janicki@mcmaster.ca Ryszard Janicki Computability
More informationCSE 105 THEORY OF COMPUTATION
CSE 105 THEORY OF COMPUTATION Fall 2016 http://cseweb.ucsd.edu/classes/fa16/cse105-abc/ Logistics HW7 due tonight Thursday's class: REVIEW Final exam on Thursday Dec 8, 8am-11am, LEDDN AUD Note card allowed
More informationDecidability. Human-aware Robotics. 2017/10/31 Chapter 4.1 in Sipser Ø Announcement:
Decidability 2017/10/31 Chapter 4.1 in Sipser Ø Announcement: q q q Slides for this lecture are here: http://www.public.asu.edu/~yzhan442/teaching/cse355/lectures/decidability.pdf Happy Hollaween! Delayed
More informationA Universal Turing Machine
A Universal Turing Machine A limitation of Turing Machines: Turing Machines are hardwired they execute only one program Real Computers are re-programmable Solution: Universal Turing Machine Attributes:
More informationFinite-State Machines (Automata) lecture 12
Finite-State Machines (Automata) lecture 12 cl a simple form of computation used widely one way to find patterns 1 A current D B A B C D B C D A C next 2 Application Fields Industry real-time control,
More informationVariations of the Turing Machine
Variations of the Turing Machine 1 The Standard Model Infinite Tape a a b a b b c a c a Read-Write Head (Left or Right) Control Unit Deterministic 2 Variations of the Standard Model Turing machines with:
More informationCPSC 421: Tutorial #1
CPSC 421: Tutorial #1 October 14, 2016 Set Theory. 1. Let A be an arbitrary set, and let B = {x A : x / x}. That is, B contains all sets in A that do not contain themselves: For all y, ( ) y B if and only
More informationChapter Five: Nondeterministic Finite Automata
Chapter Five: Nondeterministic Finite Automata From DFA to NFA A DFA has exactly one transition from every state on every symbol in the alphabet. By relaxing this requirement we get a related but more
More informationNondeterministic Finite Automata
Nondeterministic Finite Automata Not A DFA Does not have exactly one transition from every state on every symbol: Two transitions from q 0 on a No transition from q 1 (on either a or b) Though not a DFA,
More informationOutline. Nondetermistic Finite Automata. Transition diagrams. A finite automaton is a 5-tuple (Q, Σ,δ,q 0,F)
Outline Nondeterminism Regular expressions Elementary reductions http://www.cs.caltech.edu/~cs20/a October 8, 2002 1 Determistic Finite Automata A finite automaton is a 5-tuple (Q, Σ,δ,q 0,F) Q is a finite
More informationDecision, Computation and Language
Decision, Computation and Language Non-Deterministic Finite Automata (NFA) Dr. Muhammad S Khan (mskhan@liv.ac.uk) Ashton Building, Room G22 http://www.csc.liv.ac.uk/~khan/comp218 Finite State Automata
More informationAutomata & languages. A primer on the Theory of Computation. Laurent Vanbever. ETH Zürich (D-ITET) October,
Automata & languages A primer on the Theory of Computation Laurent Vanbever www.vanbever.eu ETH Zürich (D-ITET) October, 19 2017 Part 5 out of 5 Last week was all about Context-Free Languages Context-Free
More informationFinal Exam Version A December 16, 2014 Name: NetID: Section: # Total Score
CS 374 : Algorithms and Models of Computation, Fall 2014 Final Exam Version A December 16, 2014 Name: NetID: Section: 1 2 3 # 1 2 3 4 5 6 Total Score Max 20 10 10 10 10 10 70 Grader Don t panic! Please
More informationSynthesis of Winning Strategies for Interaction under Partial Information
Synthesis of Winning Strategies for Interaction under Partial Information Oberseminar Informatik Bernd Puchala RWTH Aachen University June 10th, 2013 1 Introduction Interaction Strategy Synthesis 2 Main
More informationTheory of Computation 3 Deterministic Finite Automata
Theory of Computation 3 Deterministic Finite Automata Frank Stephan Department of Computer Science Department of Mathematics National University of Singapore fstephan@comp.nus.edu.sg Theory of Computation
More informationFinal Exam (Version B) December 16, 2014 Name: NetID: Section: 1 2 3
CS 374 : Algorithms and Models of Computation, Fall 2014 Final Exam (Version B) December 16, 2014 Name: NetID: Section: 1 2 3 # 1 2 3 4 5 6 Total Score Max 20 10 10 10 10 10 70 Grader Don t panic! Please
More information