CTL Model Checking. Goal Method for proving M sat σ, where M is a Kripke structure and σ is a CTL formula. Approach Model checking!
|
|
- Clinton Atkinson
- 6 years ago
- Views:
Transcription
1 CMSC 630 March 13, CTL Model Checking Goal Method for proving M sat σ, where M is a Kripke structure and σ is a CTL formula. Approach Model checking! Mathematically, M is a model of σ if s I = M σ. So determining if M sat σ amounts means checking whether M is a model of σ
2 CMSC 630 March 13, Recall the CTL Fragment of CTL... every path modality (i.e. F, G, U) must be preceded by a path quantifier A, E. The syntax can also be given directly as follows. σ ::= a σ σ σ EXσ E(σ U σ) E(σ R σ) Other operators (AX, AU, AR, EF, AF, EG, AG, etc.) can be defined in terms of these.
3 CMSC 630 March 13, So What s the Big Deal About CTL? Formulas are like those in LTL, but more complex. + Model-checking problem easier to solve in CTL.
4 CMSC 630 March 13, Properties in CTL Expressiveness of CTL, LTL are incomparable. One can reasonably argue that LTL is easier to understand. However, one can turn LTL system specs into CTL formulas that are at least as strong, provided LTL formulas are in positive normal form (i.e. negations only applied to atomic propositions). E.g. PNF: Not PNF: GF executed GF executed
5 CMSC 630 March 13, LTL, CTL and PNF Any LTL formula can be put in PNF provided logic is extended with the necessary duals (i.e., R). (φ 1 φ 2 ) ( φ 1 ) ( φ 2 ) (Xφ) X( φ) (φ 1 U φ 2 ) ( φ 1 ) R ( φ 2 )
6 CMSC 630 March 13, Generating CTL Approximations to LTL So how do we generate CTL formulas at least as strong as LTL system specs? 1. Put LTL formula in PNF. 2. Insert A path quantifier in front of each path modality. LTL G (send F receive) (GF enabled) (GF executed) CTL AG (send AF receive) (AFAG enabled) (AGAF executed)
7 CMSC 630 March 13, PNF CTL σ ::= a a σ σ σ σ EXσ AXσ E(σ U σ) A(σ U σ) E(σ R σ) A(σ R σ)
8 CMSC 630 March 13, The CTL Model-Checking Problem Given Kripke structure M = S, A, R, l, s I CTL formula (in PNF) σ Determine Does s I = M σ? One approach 1. Define proof rules for CTL correctness assertions s M σ. 2. Use rules to develop proofs.
9 CMSC 630 March 13, Sample Proof Rules Recall M = S, A, R, l, s I. A a l(s) s M a A a l(s) s M a 1 s M σ 1 s M σ 1 σ 2 2 s M σ 2 s M σ 1 σ 2 s M σ 1, s M σ 2 s M σ 1 σ 2 Are these rules sound? Complete?
10 CMSC 630 March 13, Proof Rules for CTL Next-Step Modalities How can we prove assertions of form s M EX σ? s M AX σ? M contains information about transitions from states. Proof rules should use this information. EX AX s M σ, s, s R s M EX σ s 1 M σ,...,s n M σ, {s 1,...,s n } = { s s, s R } s M AX σ
11 CMSC 630 March 13, Proof Rules for U, R Modalities Idea Use recursive characterizations of modalities. Notation σ 1 σ 2 means: for all M, s, s = M σ 1 iff s = M σ 2. Then: AF σ σ AX(AF σ). AF σ σ AX (AF σ) σ AF σ σ σ σ σ σ σ
12 CMSC 630 March 13, Other Recursive Characterizations EFσ AGσ E(σ 1 U σ 2 ) E(σ 1 R σ 2 )
13 CMSC 630 March 13, Turning Recursion into Proof Rules: U EU 1 s M σ 2 s M E(σ 1 U σ 2 ) AU 1 s M σ 2 s M A(σ 1 U σ 2 ) EU 2 AU 2 s M σ 1, s M E(σ 1 U σ 2 ), s, s R s M E(σ 1 U σ 2 ) s M σ 1, s 1 M A(σ 1 U σ 2 ),..., s n M A(σ 1 U σ 2 ), {s 1,...,s n } = { s s, s R } s M A(σ 1 U σ 2 )
14 CMSC 630 March 13, Turning Recursion into Proof Rules: R ER 1 s M σ 1, s M σ 2 s M E(σ 1 R σ 2 ) AR 1 s M σ 1, s M σ 2 s M A(σ 1 R σ 2 ) ER 2 AR 2 s M σ 2, s M E(σ 1 R σ 2 ), s, s R s M E(σ 1 R σ 2 ) s M σ 2, s 1 M A(σ 1 R σ 2 ),..., s n M A(σ 1 R σ 2 ), {s 1,...,s n } = { s s, s R } s M A(σ 1 R σ 2 )
15 CMSC 630 March 13, But What about Circular Proofs? Consider proof of E(a U b) for Kripke structure below. s 0 : {a,c} a l(s 1 ) a l(s 0 ) s 1 M a s 0 M E(a U b) s 1 : {a} s 0 M a s 1 M E(a U b) s 0 M E(a U b) Circularity is bad!
16 CMSC 630 March 13, But What about Circular Proofs (cont.)? Consider proof of EG a for Kripke structure below. s 0 : {a,c} a l(s 1 ) a l(s 0 ) s 1 M a s 0 M EGa s 1 : {a} s 0 M a s 0 M EGa s 1 M EGa Circularity is good!
17 CMSC 630 March 13, Is Circularity Bad Or Good? It depends on the modality... but how? And why? Precise answers depend on understanding fixpoint characterizations of the CTL operators. These characterizations will also lead to model-checking algorithms for finite-state Kripke structures.
18 CMSC 630 March 13, CTL Formulas and Fixpoints Recall: AFσ σ AX(AF σ) Equivalently, AFσ may be seen as: a solution to the equation a fixpoint of the function w σ AX w, f(w) = σ AX w Is the solution to the above equation unique? No! Consider the formula tt: tt σ AX tt (why?).
19 CMSC 630 March 13, So What? AF σ is a solution to an equation, but not a unique solution. How does this help us with circularity? Answer Tarski!... Polish emigré mathematician... Active in early to mid 1900 s... Well-known for work in logic, algebra, lattice theory In 1950 s, Tarski and Knaster proved: Theorem (Tarski-Knaster Fixpoint Theorem) Every monotonic function over a complete lattice has a complete lattice of fixpoints.
20 CMSC 630 March 13, Complete Lattice? A complete lattice consists of: a set E of elements a partial ordering ( less than or equal to ) E E a least upper-bound operator 2 E E a greatest lower-bound operator 2 E E Example Let S be a set. Then take: E = 2 S = = = This is a complete lattice!
21 CMSC 630 March 13, Facts about Lattices Theorem Let E,,, be a complete lattice. Then: 1. E has a greatest element =. 2. E has a least element =. 3. (Tarski-Knaster). Let f E E be monotonic, i.e. if e 1 e 2 then f(e 1 ) f(e 2 ). Then the structure { e e = f(e) },,, is also a complete lattice ( complete lattice of fixpoints ).
22 CMSC 630 March 13, How Can This Possibly Help? All the equations describing CTL operators have unique least and greatest solutions! Let M = S, A, l, R, s I be a Kripke structure. 2 S,,, forms a complete lattice. Each equation has equivalent form w = f(w) where f maps sets of states (meanings of formulas) to sets of states. Each of the f turns out to be monotonic over the lattice. Any complete lattice has a unique greatest and least element.
23 CMSC 630 March 13, Example AF σ is the unique least solution to w f(w), where f(w) σ AXx. (More precisely, the set of states satisfying AFσ is the smallest set satisfying the equation.) That is, any other solution is implied by AF σ. What is the largest?
24 CMSC 630 March 13, Another Example Consider: f(w) = σ EX w What is the least fixpoint? Greatest fixpoint?
25 CMSC 630 March 13, One More Example Consider: f(w) = σ 1 (σ 2 AX w) What is the least fixpoint? Greatest fixpoint?
26 CMSC 630 March 13, Recall Motivation: Circular Reasoning Least fixpoint CTL operator: Circularity bad! Greatest fixpoint CTL operator: Circularity good!
27 CMSC 630 March 13, Circularity Example #1 s 0 : {a,c} a l(s 1 ) a l(s 0 ) s 1 M a s 0 M E(a U b) s 1 : {a} s 0 M a s 1 M E(a U b) s 0 M E(a U b) Circularity involves least-fixpoint operator (EU) This proof is therefore invalid.
28 CMSC 630 March 13, Circularity Example #2 s 0 : {a,c} a l(s 1 ) a l(s 0 ) s 1 M a s 0 M EGa s 1 : {a} s 0 M a s 0 M EGa s 1 M EGa Circularity involves greatest-fixpoint operator (EG) This proof is therefore valid.
29 CMSC 630 March 13, Constructing Proofs for s M σ Use proof rules A, A, 1, 2,, EX, AX, EU 1, EU 2, AU 1, AU 2, ER 1, ER 2, AR 1, AR 2 Proofs are valid if they end in leaves or circularities only involve maximum fixpoint formulas.
30 CMSC 630 March 13, Example (Invalid) Proof: AFAGa s 0 : {a} s 1 : { }... s 2 : {a} s 0 M AFAGa s 0 M AFAGa s 1 M AFAGa
31 CMSC 630 March 13, Soundness and Completeness Proof construction is sound. Proof construction is complete for finite-state Kripke structures. Rules can be modified to be complete for arbitrary Kripke structures (sets of states rather than single states on the left of M ).
32 CMSC 630 March 13, Algorithmic Model Checking We have talked about model-checking in terms of proof. For certain kinds of Kripke structures (i.e. finite-state), model-checking can be performed automatically. Model-checking algorithms may be seen as conducting proof search.
33 CMSC 630 March 13, The Finite-State Model-Checking Problem for CTL Given Kripke structure M = S, A, R, l, s I with S < CTL formula σ Compute Does s I = M σ?
34 CMSC 630 March 13, Traditional CTL Model-Checking Algorithms Compute all states in S satisfying σ. See if s I is in this set. Why is the calculation of these sets of states be possible? Because of Kleene and the recursive characterizations of operators!
35 CMSC 630 March 13, Continuous Functions on Lattices Definition Let E,,, be a lattice. Then f E E is continuous if for every chain e 0 e 1, f( e i ) = f(e i ) i=0 i=0 Lemma 1. Every continuous function is monotonic. 2. If E < then every monotonic function is continous.
36 CMSC 630 March 13, Kleene s Fixpoint Theorem Let E,,, be a complete lattice, and let f E E be continuous. Then µf E and νf E, the least and greatest fixpoints of f, respectively, can be given as follows. µf = i=0 f 0 = f i+1 = f(f i ) f i, where νf = i=0 ˆf 0 = ˆf i, where ˆf i+1 = f( ˆf i )
37 CMSC 630 March 13, How Does This Help? For a finite-state Kripke structure S, A, R, l, s I, complete lattice 2 S,,, is finite. CTL operators are least / greatest fixpoints of functions f(w) over this lattice. All functions for PNF CTL are monotonic, hence continuous over this lattice.
38 CMSC 630 March 13, Calculating the Least Solution to an Equation Assume equation is x f(x). Set x = (i.e. ff). Compute f(x). If x = f(x) we re done; otherwise set x to f(x) and repeat. E.g. x a AXx. (In other words, which states satisfy AF a?) x f(x) {1} = a AX {1} {1, 2} = a AX{1} {1, 2} {1, 2} = a AX{1, 2} 0 a 1 2 3
39 CMSC 630 March 13, Another Example: E(a U b) We need to calculate the least solution to x b (a EXx). x f(x) a 0 a 3 a b 1 2
40 CMSC 630 March 13, Calculating the Largest Solution to an Equation Set x = S (i.e. tt) Compute f(x). If x = f(x), we re done; otherwise, set x to f(x) and repeat. E.g. x a EXx. (In other words, which states satisfy EGa?) x f(x) {0, 1} {0} = a EX{0, 1} {0} {0} = a EX{0} a 0 1
41 CMSC 630 March 13, Least vs. Greatest: An Example Consider the equation x b (a AXx). Least solution: x f(x) a 0 a 3 Greatest solution: x f(x) b 1 2
42 CMSC 630 March 13, Classical CTL Model Checking Recall that traditional CTL model checkers: Calculate all states that satisfy a given formula... Then ask if the start state is in this set. So how is the set of states calculated? By processing the formula from the inside out!
43 CMSC 630 March 13, Example: AFAGa First: For AG a, calculate largest solution to x = a AX x. a 0 x f(x) 1 a 2 Second: For AF x, compute least solution to y = x AX y. y g(y)
44 CMSC 630 March 13, Pragmatics I: Solving Equations Efficiently Let M = S, A, R, l, s I be a Kripke structure. Define: M = S + R. Claim: Equations defining CTL operators can be solved in M time. How? Counters
45 CMSC 630 March 13, Huh? E.g. to get least solution to x = σ AXx (assuming σ already known): Associate counter to each state. Counter reflects number of transitions leading to states not in current approximation to solution. When a state moves into solution, counters of states with transitions leading to state must be updated.
46 CMSC 630 March 13, Example: AF a Must calculate smallest solution to x = a AX x x = { } 0 2 a a 1
47 CMSC 630 March 13, Complexity Best classical algorithms process each state/transition once per subformula. How many subformulas are there in formula σ? σ! ( σ is number of operators in σ). So for Kripke structure M, CTL formula σ, model checking takes: O( M σ ) time.
48 CMSC 630 March 13, Pragmatics II: Short-circuiting... stop computation once status of start state is known. E.g. If least solution is being calculated, and start state added to intermediate approximation, can stop.... does not affect complexity, but can improve practical performance.
49 CMSC 630 March 13, Pragmatics III: On-the-fly Model Checking... short-circuiting taken to the extreme.... takes a top-down view ( what is the minimal information I need to compute to check if s I = M σ ). Approaches can be formulated in terms of proof search involving proof rules like the ones we have studied. Subtlety: circularity.
50 CMSC 630 March 13, Pragmatics IV: Efficient Data Structures Classical algorithms require manipulations of sets of states: Unions, intersections Equality checking Transitions from/to sets of states The right data structure can yield dramatic time/space improvement!
51 CMSC 630 March 13, Example: (Ordered) Binary Decision Diagrams In some applications states are fixed-width bit vectors (e.g. Murϕ with only boolean variables). OBDDs are data structures for representing sets of bit vectors compactly. Union, intersection, equality all supported efficiently. In hardware community, most successful model checkers use OBDDs.
52 CMSC 630 March 13, OBDDs and Sets of Fixed-Width Bit Vectors An OBDD is... a directed acyclic graph, with a leaf labeled 0 and a leaf labeled 1, and each internal node labeled by a variable, and each node having two edges, one labeled 0 and one 1. In addition, OBDDs satisfy: 1. No isomorphic subgraphs 2. No don t cares
53 CMSC 630 March 13, Example An OBDD for the set {000, 001, 011} with ordering v 1 v 2 v 3. 0 v1 1 0 v2 1 v
54 CMSC 630 March 13, Example An OBDD for the set {000, 001, 011} with ordering v 3 v 1 v 2. 0 v3 1 v v v2 0 1
55 CMSC 630 March 13, Facts about OBDDs 1. Variable ordering influences size of OBDDs. 2. Given a fixed variable ordering, set representation is canonical (equal sets have isomorphic OBDDs). 3. Efficient implementations exist for union, intersection, complementation, projection,...
56 CMSC 630 March 13, How Are OBDDs Used in Model Checking?... To represent Kripke structures States represented as bit-vectors of length n Transitions represented as bit-vectors of length 2n... To represent approximate solutions during equation solving If x = f(x) is an equation, process of applying f to get new approximations can be given as function on OBDDs!
Lecture 14: Basic Fixpoint Theorems (cont.)
Lecture 14: Basic Fixpoint Theorems (cont) Predicate Transformers Monotonicity and Continuity Existence of Fixpoints Computing Fixpoints Fixpoint Characterization of CTL Operators 1 2 E M Clarke and E
More informationLattices and the Knaster-Tarski Theorem
Lattices and the Knaster-Tarski Theorem Deepak D Souza Department of Computer Science and Automation Indian Institute of Science, Bangalore. 8 August 27 Outline 1 Why study lattices 2 Partial Orders 3
More informationBinary Decision Diagrams
Binary Decision Diagrams Hao Zheng Department of Computer Science and Engineering University of South Florida Tampa, FL 33620 Email: zheng@cse.usf.edu Phone: (813)974-4757 Fax: (813)974-5456 Hao Zheng
More informationBinary Decision Diagrams
Binary Decision Diagrams Hao Zheng Department of Computer Science and Engineering University of South Florida Tampa, FL 33620 Email: zheng@cse.usf.edu Phone: (813)974-4757 Fax: (813)974-5456 Hao Zheng
More informationThe illustrated zoo of order-preserving functions
The illustrated zoo of order-preserving functions David Wilding, February 2013 http://dpw.me/mathematics/ Posets (partially ordered sets) underlie much of mathematics, but we often don t give them a second
More informationCut-free sequent calculi for algebras with adjoint modalities
Cut-free sequent calculi for algebras with adjoint modalities Roy Dyckhoff (University of St Andrews) and Mehrnoosh Sadrzadeh (Universities of Oxford & Southampton) TANCL Conference, Oxford, 8 August 2007
More informationTableau Theorem Prover for Intuitionistic Propositional Logic
Tableau Theorem Prover for Intuitionistic Propositional Logic Portland State University CS 510 - Mathematical Logic and Programming Languages Motivation Tableau for Classical Logic If A is contradictory
More informationTableau Theorem Prover for Intuitionistic Propositional Logic
Tableau Theorem Prover for Intuitionistic Propositional Logic Portland State University CS 510 - Mathematical Logic and Programming Languages Motivation Tableau for Classical Logic If A is contradictory
More informationRecall: Data Flow Analysis. Data Flow Analysis Recall: Data Flow Equations. Forward Data Flow, Again
Data Flow Analysis 15-745 3/24/09 Recall: Data Flow Analysis A framework for proving facts about program Reasons about lots of little facts Little or no interaction between facts Works best on properties
More informationGödel algebras free over finite distributive lattices
TANCL, Oxford, August 4-9, 2007 1 Gödel algebras free over finite distributive lattices Stefano Aguzzoli Brunella Gerla Vincenzo Marra D.S.I. D.I.COM. D.I.C.O. University of Milano University of Insubria
More informationEDA045F: Program Analysis LECTURE 3: DATAFLOW ANALYSIS 2. Christoph Reichenbach
EDA045F: Program Analysis LECTURE 3: DATAFLOW ANALYSIS 2 Christoph Reichenbach In the last lecture... Eliminating Nested Expressions (Three-Address Code) Control-Flow Graphs Static Single Assignment Form
More informationSemantics and Verification of Software
Semantics and Verification of Software Thomas Noll Software Modeling and Verification Group RWTH Aachen University http://moves.rwth-aachen.de/teaching/ws-1718/sv-sw/ Recap: CCPOs and Continuous Functions
More informationGenerating all modular lattices of a given size
Generating all modular lattices of a given size ADAM 2013 Nathan Lawless Chapman University June 6-8, 2013 Outline Introduction to Lattice Theory: Modular Lattices The Objective: Generating and Counting
More informationEssays on Some Combinatorial Optimization Problems with Interval Data
Essays on Some Combinatorial Optimization Problems with Interval Data a thesis submitted to the department of industrial engineering and the institute of engineering and sciences of bilkent university
More informationExpTime Tableau Decision Procedures for Regular Grammar Logics with Converse
ExpTime Tableau Decision Procedures for Regular Grammar Logics with Converse Linh Anh Nguyen 1 and Andrzej Sza las 1,2 1 Institute of Informatics, University of Warsaw Banacha 2, 02-097 Warsaw, Poland
More informationAn orderly algorithm to enumerate finite (semi)modular lattices
An orderly algorithm to enumerate finite (semi)modular lattices BLAST 23 Chapman University October 6, 23 Outline The original algorithm: Generating all finite lattices Generating modular and semimodular
More informationCATEGORICAL SKEW LATTICES
CATEGORICAL SKEW LATTICES MICHAEL KINYON AND JONATHAN LEECH Abstract. Categorical skew lattices are a variety of skew lattices on which the natural partial order is especially well behaved. While most
More informationYao s Minimax Principle
Complexity of algorithms The complexity of an algorithm is usually measured with respect to the size of the input, where size may for example refer to the length of a binary word describing the input,
More informationCSE 21 Winter 2016 Homework 6 Due: Wednesday, May 11, 2016 at 11:59pm. Instructions
CSE 1 Winter 016 Homework 6 Due: Wednesday, May 11, 016 at 11:59pm Instructions Homework should be done in groups of one to three people. You are free to change group members at any time throughout the
More informationSAT and DPLL. Introduction. Preliminaries. Normal forms DPLL. Complexity. Espen H. Lian. DPLL Implementation. Bibliography.
SAT and Espen H. Lian Ifi, UiO Implementation May 4, 2010 Espen H. Lian (Ifi, UiO) SAT and May 4, 2010 1 / 59 Espen H. Lian (Ifi, UiO) SAT and May 4, 2010 2 / 59 Introduction Introduction SAT is the problem
More informationLecture l(x) 1. (1) x X
Lecture 14 Agenda for the lecture Kraft s inequality Shannon codes The relation H(X) L u (X) = L p (X) H(X) + 1 14.1 Kraft s inequality While the definition of prefix-free codes is intuitively clear, we
More informationGAME THEORY. Department of Economics, MIT, Follow Muhamet s slides. We need the following result for future reference.
14.126 GAME THEORY MIHAI MANEA Department of Economics, MIT, 1. Existence and Continuity of Nash Equilibria Follow Muhamet s slides. We need the following result for future reference. Theorem 1. Suppose
More informationFMCAD 2011 Effective Word-Level Interpolation for Software Verification
FMCAD 2011 Effective Word-Level Interpolation for Software Verification Alberto Griggio FBK-IRST Motivations Craig interpolation applied succesfully for Formal Verification of both hardware and software
More informationSAT and DPLL. Espen H. Lian. May 4, Ifi, UiO. Espen H. Lian (Ifi, UiO) SAT and DPLL May 4, / 59
SAT and DPLL Espen H. Lian Ifi, UiO May 4, 2010 Espen H. Lian (Ifi, UiO) SAT and DPLL May 4, 2010 1 / 59 Normal forms Normal forms DPLL Complexity DPLL Implementation Bibliography Espen H. Lian (Ifi, UiO)
More informationÉcole normale supérieure, MPRI, M2 Year 2007/2008. Course 2-6 Abstract interpretation: application to verification and static analysis P.
École normale supérieure, MPRI, M2 Year 2007/2008 Course 2-6 Abstract interpretation: application to verification and static analysis P. Cousot Questions and answers of the partial exam of Friday November
More informationProjective Lattices. with applications to isotope maps and databases. Ralph Freese CLA La Rochelle
Projective Lattices with applications to isotope maps and databases Ralph Freese CLA 2013. La Rochelle Ralph Freese () Projective Lattices Oct 2013 1 / 17 Projective Lattices A lattice L is projective
More informationDynamic Programming: An overview. 1 Preliminaries: The basic principle underlying dynamic programming
Dynamic Programming: An overview These notes summarize some key properties of the Dynamic Programming principle to optimize a function or cost that depends on an interval or stages. This plays a key role
More informationAlgorithmic Game Theory and Applications. Lecture 11: Games of Perfect Information
Algorithmic Game Theory and Applications Lecture 11: Games of Perfect Information Kousha Etessami finite games of perfect information Recall, a perfect information (PI) game has only 1 node per information
More informationA relation on 132-avoiding permutation patterns
Discrete Mathematics and Theoretical Computer Science DMTCS vol. VOL, 205, 285 302 A relation on 32-avoiding permutation patterns Natalie Aisbett School of Mathematics and Statistics, University of Sydney,
More informationLecture 2: The Simple Story of 2-SAT
0510-7410: Topics in Algorithms - Random Satisfiability March 04, 2014 Lecture 2: The Simple Story of 2-SAT Lecturer: Benny Applebaum Scribe(s): Mor Baruch 1 Lecture Outline In this talk we will show that
More informationOn the Optimality of a Family of Binary Trees Techical Report TR
On the Optimality of a Family of Binary Trees Techical Report TR-011101-1 Dana Vrajitoru and William Knight Indiana University South Bend Department of Computer and Information Sciences Abstract In this
More informationThe finite lattice representation problem and intervals in subgroup lattices of finite groups
The finite lattice representation problem and intervals in subgroup lattices of finite groups William DeMeo Math 613: Group Theory 15 December 2009 Abstract A well-known result of universal algebra states:
More informationarxiv: v1 [math.lo] 24 Feb 2014
Residuated Basic Logic II. Interpolation, Decidability and Embedding Minghui Ma 1 and Zhe Lin 2 arxiv:1404.7401v1 [math.lo] 24 Feb 2014 1 Institute for Logic and Intelligence, Southwest University, Beibei
More informationRational Behaviour and Strategy Construction in Infinite Multiplayer Games
Rational Behaviour and Strategy Construction in Infinite Multiplayer Games Michael Ummels ummels@logic.rwth-aachen.de FSTTCS 2006 Michael Ummels Rational Behaviour and Strategy Construction 1 / 15 Infinite
More informationIntroduction to Greedy Algorithms: Huffman Codes
Introduction to Greedy Algorithms: Huffman Codes Yufei Tao ITEE University of Queensland In computer science, one interesting method to design algorithms is to go greedy, namely, keep doing the thing that
More informationTABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC
TABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC THOMAS BOLANDER AND TORBEN BRAÜNER Abstract. Hybrid logics are a principled generalization of both modal logics and description logics. It is well-known
More informationTableau-based Decision Procedures for Hybrid Logic
Tableau-based Decision Procedures for Hybrid Logic Gert Smolka Saarland University Joint work with Mark Kaminski HyLo 2010 Edinburgh, July 10, 2010 Gert Smolka (Saarland University) Decision Procedures
More informationmonotone circuit value
monotone circuit value A monotone boolean circuit s output cannot change from true to false when one input changes from false to true. Monotone boolean circuits are hence less expressive than general circuits.
More information0.1 Equivalence between Natural Deduction and Axiomatic Systems
0.1 Equivalence between Natural Deduction and Axiomatic Systems Theorem 0.1.1. Γ ND P iff Γ AS P ( ) it is enough to prove that all axioms are theorems in ND, as MP corresponds to ( e). ( ) by induction
More informationLogic and Artificial Intelligence Lecture 24
Logic and Artificial Intelligence Lecture 24 Eric Pacuit Currently Visiting the Center for Formal Epistemology, CMU Center for Logic and Philosophy of Science Tilburg University ai.stanford.edu/ epacuit
More informationAnother Variant of 3sat. 3sat. 3sat Is NP-Complete. The Proof (concluded)
3sat k-sat, where k Z +, is the special case of sat. The formula is in CNF and all clauses have exactly k literals (repetition of literals is allowed). For example, (x 1 x 2 x 3 ) (x 1 x 1 x 2 ) (x 1 x
More informationNotes on the symmetric group
Notes on the symmetric group 1 Computations in the symmetric group Recall that, given a set X, the set S X of all bijections from X to itself (or, more briefly, permutations of X) is group under function
More informationMAT385 Final (Spring 2009): Boolean Algebras, FSM, and old stuff
MAT385 Final (Spring 2009): Boolean Algebras, FSM, and old stuff Name: Directions: Problems are equally weighted. Show your work! Answers without justification will likely result in few points. Your written
More informationMartingales. by D. Cox December 2, 2009
Martingales by D. Cox December 2, 2009 1 Stochastic Processes. Definition 1.1 Let T be an arbitrary index set. A stochastic process indexed by T is a family of random variables (X t : t T) defined on a
More informationVirtual Demand and Stable Mechanisms
Virtual Demand and Stable Mechanisms Jan Christoph Schlegel Faculty of Business and Economics, University of Lausanne, Switzerland jschlege@unil.ch Abstract We study conditions for the existence of stable
More informationTHE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET
THE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET MICHAEL PINSKER Abstract. We calculate the number of unary clones (submonoids of the full transformation monoid) containing the
More information5 Deduction in First-Order Logic
5 Deduction in First-Order Logic The system FOL C. Let C be a set of constant symbols. FOL C is a system of deduction for the language L # C. Axioms: The following are axioms of FOL C. (1) All tautologies.
More informationAnother Variant of 3sat
Another Variant of 3sat Proposition 32 3sat is NP-complete for expressions in which each variable is restricted to appear at most three times, and each literal at most twice. (3sat here requires only that
More informationChair of Communications Theory, Prof. Dr.-Ing. E. Jorswieck. Übung 5: Supermodular Games
Chair of Communications Theory, Prof. Dr.-Ing. E. Jorswieck Übung 5: Supermodular Games Introduction Supermodular games are a class of non-cooperative games characterized by strategic complemetariteis
More informationResiduated Lattices of Size 12 extended version
Residuated Lattices of Size 12 extended version Radim Belohlavek 1,2, Vilem Vychodil 1,2 1 Dept. Computer Science, Palacky University, Olomouc 17. listopadu 12, Olomouc, CZ 771 46, Czech Republic 2 SUNY
More informationGeneralising the weak compactness of ω
Generalising the weak compactness of ω Andrew Brooke-Taylor Generalised Baire Spaces Masterclass Royal Netherlands Academy of Arts and Sciences 22 August 2018 Andrew Brooke-Taylor Generalising the weak
More informationMAT 4250: Lecture 1 Eric Chung
1 MAT 4250: Lecture 1 Eric Chung 2Chapter 1: Impartial Combinatorial Games 3 Combinatorial games Combinatorial games are two-person games with perfect information and no chance moves, and with a win-or-lose
More informationSublinear Time Algorithms Oct 19, Lecture 1
0368.416701 Sublinear Time Algorithms Oct 19, 2009 Lecturer: Ronitt Rubinfeld Lecture 1 Scribe: Daniel Shahaf 1 Sublinear-time algorithms: motivation Twenty years ago, there was practically no investigation
More informationTheorem 1.3. Every finite lattice has a congruence-preserving embedding to a finite atomistic lattice.
CONGRUENCE-PRESERVING EXTENSIONS OF FINITE LATTICES TO SEMIMODULAR LATTICES G. GRÄTZER AND E.T. SCHMIDT Abstract. We prove that every finite lattice hasa congruence-preserving extension to a finite semimodular
More informationSatisfaction in outer models
Satisfaction in outer models Radek Honzik joint with Sy Friedman Department of Logic Charles University logika.ff.cuni.cz/radek CL Hamburg September 11, 2016 Basic notions: Let M be a transitive model
More informationCollinear Triple Hypergraphs and the Finite Plane Kakeya Problem
Collinear Triple Hypergraphs and the Finite Plane Kakeya Problem Joshua Cooper August 14, 006 Abstract We show that the problem of counting collinear points in a permutation (previously considered by the
More informationAsynchronous Announcements in a Public Channel
Asynchronous Announcements in a Public Channel Sophia Knight 1, Bastien Maubert 1, and François Schwarzentruber 2 1 LORIA - CNRS / Université de Lorraine, sophia.knight@gmail.com, bastien.maubert@gmail.com
More informationPrinciples of Program Analysis: Algorithms
Principles of Program Analysis: Algorithms Transparencies based on Chapter 6 of the book: Flemming Nielson, Hanne Riis Nielson and Chris Hankin: Principles of Program Analysis. Springer Verlag 2005. c
More informationTug of War Game. William Gasarch and Nick Sovich and Paul Zimand. October 6, Abstract
Tug of War Game William Gasarch and ick Sovich and Paul Zimand October 6, 2009 To be written later Abstract Introduction Combinatorial games under auction play, introduced by Lazarus, Loeb, Propp, Stromquist,
More informationFundamental Algorithms - Surprise Test
Technische Universität München Fakultät für Informatik Lehrstuhl für Effiziente Algorithmen Dmytro Chibisov Sandeep Sadanandan Winter Semester 007/08 Sheet Model Test January 16, 008 Fundamental Algorithms
More informationChapter 5: Algorithms
Chapter 5: Algorithms Computer Science: An Overview Tenth Edition by J. Glenn Brookshear Presentation files modified by Farn Wang Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley
More informationGenerating all nite modular lattices of a given size
Generating all nite modular lattices of a given size Peter Jipsen and Nathan Lawless Dedicated to Brian Davey on the occasion of his 65th birthday Abstract. Modular lattices, introduced by R. Dedekind,
More informationCONSTRUCTION OF CODES BY LATTICE VALUED FUZZY SETS. 1. Introduction. Novi Sad J. Math. Vol. 35, No. 2, 2005,
Novi Sad J. Math. Vol. 35, No. 2, 2005, 155-160 CONSTRUCTION OF CODES BY LATTICE VALUED FUZZY SETS Mališa Žižović 1, Vera Lazarević 2 Abstract. To every finite lattice L, one can associate a binary blockcode,
More informationHyperidentities in (xx)y xy Graph Algebras of Type (2,0)
Int. Journal of Math. Analysis, Vol. 8, 2014, no. 9, 415-426 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ijma.2014.312299 Hyperidentities in (xx)y xy Graph Algebras of Type (2,0) W. Puninagool
More informationOptimal Satisficing Tree Searches
Optimal Satisficing Tree Searches Dan Geiger and Jeffrey A. Barnett Northrop Research and Technology Center One Research Park Palos Verdes, CA 90274 Abstract We provide an algorithm that finds optimal
More informationMATH3075/3975 FINANCIAL MATHEMATICS TUTORIAL PROBLEMS
MATH307/37 FINANCIAL MATHEMATICS TUTORIAL PROBLEMS School of Mathematics and Statistics Semester, 04 Tutorial problems should be used to test your mathematical skills and understanding of the lecture material.
More informationCONGRUENCES AND IDEALS IN A DISTRIBUTIVE LATTICE WITH RESPECT TO A DERIVATION
Bulletin of the Section of Logic Volume 42:1/2 (2013), pp. 1 10 M. Sambasiva Rao CONGRUENCES AND IDEALS IN A DISTRIBUTIVE LATTICE WITH RESPECT TO A DERIVATION Abstract Two types of congruences are introduced
More informationComputing Unsatisfiable k-sat Instances with Few Occurrences per Variable
Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Shlomo Hoory and Stefan Szeider Department of Computer Science, University of Toronto, shlomoh,szeider@cs.toronto.edu Abstract.
More informationLecture 2: Making Good Sequences of Decisions Given a Model of World. CS234: RL Emma Brunskill Winter 2018
Lecture 2: Making Good Sequences of Decisions Given a Model of World CS234: RL Emma Brunskill Winter 218 Human in the loop exoskeleton work from Steve Collins lab Class Structure Last Time: Introduction
More informationOn Existence of Equilibria. Bayesian Allocation-Mechanisms
On Existence of Equilibria in Bayesian Allocation Mechanisms Northwestern University April 23, 2014 Bayesian Allocation Mechanisms In allocation mechanisms, agents choose messages. The messages determine
More informationLevin Reduction and Parsimonious Reductions
Levin Reduction and Parsimonious Reductions The reduction R in Cook s theorem (p. 266) is such that Each satisfying truth assignment for circuit R(x) corresponds to an accepting computation path for M(x).
More informationPURITY IN IDEAL LATTICES. Abstract.
ANALELE ŞTIINŢIFICE ALE UNIVERSITĂŢII AL.I.CUZA IAŞI Tomul XLV, s.i a, Matematică, 1999, f.1. PURITY IN IDEAL LATTICES BY GRIGORE CĂLUGĂREANU Abstract. In [4] T. HEAD gave a general definition of purity
More informationProblems from 9th edition of Probability and Statistical Inference by Hogg, Tanis and Zimmerman:
Math 224 Fall 207 Homework 5 Drew Armstrong Problems from 9th edition of Probability and Statistical Inference by Hogg, Tanis and Zimmerman: Section 3., Exercises 3, 0. Section 3.3, Exercises 2, 3, 0,.
More information1 Overview. 2 The Gradient Descent Algorithm. AM 221: Advanced Optimization Spring 2016
AM 22: Advanced Optimization Spring 206 Prof. Yaron Singer Lecture 9 February 24th Overview In the previous lecture we reviewed results from multivariate calculus in preparation for our journey into convex
More informationLong-Term Values in MDPs, Corecursively
Long-Term Values in MDPs, Corecursively Applied Category Theory, 15-16 March 2018, NIST Helle Hvid Hansen Delft University of Technology Helle Hvid Hansen (TU Delft) MDPs, Corecursively NIST, 15/Mar/2018
More informationStrong normalisation and the typed lambda calculus
CHAPTER 9 Strong normalisation and the typed lambda calculus In the previous chapter we looked at some reduction rules for intuitionistic natural deduction proofs and we have seen that by applying these
More informationComputational Intelligence Winter Term 2009/10
Computational Intelligence Winter Term 2009/10 Prof. Dr. Günter Rudolph Lehrstuhl für Algorithm Engineering (LS 11) Fakultät für Informatik TU Dortmund Plan for Today Fuzzy Sets Basic Definitionsand ResultsforStandard
More informationConstructing Markov models for barrier options
Constructing Markov models for barrier options Gerard Brunick joint work with Steven Shreve Department of Mathematics University of Texas at Austin Nov. 14 th, 2009 3 rd Western Conference on Mathematical
More informationGame Theory: Normal Form Games
Game Theory: Normal Form Games Michael Levet June 23, 2016 1 Introduction Game Theory is a mathematical field that studies how rational agents make decisions in both competitive and cooperative situations.
More informationQuadrant marked mesh patterns in 123-avoiding permutations
Quadrant marked mesh patterns in 23-avoiding permutations Dun Qiu Department of Mathematics University of California, San Diego La Jolla, CA 92093-02. USA duqiu@math.ucsd.edu Jeffrey Remmel Department
More information1 Shapley-Shubik Model
1 Shapley-Shubik Model There is a set of buyers B and a set of sellers S each selling one unit of a good (could be divisible or not). Let v ij 0 be the monetary value that buyer j B assigns to seller i
More informationModular and Distributive Lattices
CHAPTER 4 Modular and Distributive Lattices Background R. P. DILWORTH Imbedding problems and the gluing construction. One of the most powerful tools in the study of modular lattices is the notion of the
More informationCharacterization of the Optimum
ECO 317 Economics of Uncertainty Fall Term 2009 Notes for lectures 5. Portfolio Allocation with One Riskless, One Risky Asset Characterization of the Optimum Consider a risk-averse, expected-utility-maximizing
More informationAdvanced Numerical Methods
Advanced Numerical Methods Solution to Homework One Course instructor: Prof. Y.K. Kwok. When the asset pays continuous dividend yield at the rate q the expected rate of return of the asset is r q under
More informationSMT and POR beat Counter Abstraction
SMT and POR beat Counter Abstraction Parameterized Model Checking of Threshold-Based Distributed Algorithms Igor Konnov Helmut Veith Josef Widder Alpine Verification Meeting May 4-6, 2015 Igor Konnov 2/64
More informationVersion A. Problem 1. Let X be the continuous random variable defined by the following pdf: 1 x/2 when 0 x 2, f(x) = 0 otherwise.
Math 224 Q Exam 3A Fall 217 Tues Dec 12 Version A Problem 1. Let X be the continuous random variable defined by the following pdf: { 1 x/2 when x 2, f(x) otherwise. (a) Compute the mean µ E[X]. E[X] x
More informationBidding Languages. Chapter Introduction. Noam Nisan
Chapter 1 Bidding Languages Noam Nisan 1.1 Introduction This chapter concerns the issue of the representation of bids in combinatorial auctions. Theoretically speaking, bids are simply abstract elements
More informationDecidability and Recursive Languages
Decidability and Recursive Languages Let L (Σ { }) be a language, i.e., a set of strings of symbols with a finite length. For example, {0, 01, 10, 210, 1010,...}. Let M be a TM such that for any string
More informationOutline Introduction Game Representations Reductions Solution Concepts. Game Theory. Enrico Franchi. May 19, 2010
May 19, 2010 1 Introduction Scope of Agent preferences Utility Functions 2 Game Representations Example: Game-1 Extended Form Strategic Form Equivalences 3 Reductions Best Response Domination 4 Solution
More informationBROWNIAN MOTION Antonella Basso, Martina Nardon
BROWNIAN MOTION Antonella Basso, Martina Nardon basso@unive.it, mnardon@unive.it Department of Applied Mathematics University Ca Foscari Venice Brownian motion p. 1 Brownian motion Brownian motion plays
More informationFirst-Order Logic in Standard Notation Basics
1 VOCABULARY First-Order Logic in Standard Notation Basics http://mathvault.ca April 21, 2017 1 Vocabulary Just as a natural language is formed with letters as its building blocks, the First- Order Logic
More informationLie Algebras and Representation Theory Homework 7
Lie Algebras and Representation Theory Homework 7 Debbie Matthews 2015-05-19 Problem 10.5 If σ W can be written as a product of t simple reflections, prove that t has the same parity as l(σ). Let = {α
More informationLecture Notes on Type Checking
Lecture Notes on Type Checking 15-312: Foundations of Programming Languages Frank Pfenning Lecture 17 October 23, 2003 At the beginning of this class we were quite careful to guarantee that every well-typed
More informationMaking Decisions. CS 3793 Artificial Intelligence Making Decisions 1
Making Decisions CS 3793 Artificial Intelligence Making Decisions 1 Planning under uncertainty should address: The world is nondeterministic. Actions are not certain to succeed. Many events are outside
More informationRealizability of n-vertex Graphs with Prescribed Vertex Connectivity, Edge Connectivity, Minimum Degree, and Maximum Degree
Realizability of n-vertex Graphs with Prescribed Vertex Connectivity, Edge Connectivity, Minimum Degree, and Maximum Degree Lewis Sears IV Washington and Lee University 1 Introduction The study of graph
More information2 Deduction in Sentential Logic
2 Deduction in Sentential Logic Though we have not yet introduced any formal notion of deductions (i.e., of derivations or proofs), we can easily give a formal method for showing that formulas are tautologies:
More informationMATH 121 GAME THEORY REVIEW
MATH 121 GAME THEORY REVIEW ERIN PEARSE Contents 1. Definitions 2 1.1. Non-cooperative Games 2 1.2. Cooperative 2-person Games 4 1.3. Cooperative n-person Games (in coalitional form) 6 2. Theorems and
More informationCS792 Notes Henkin Models, Soundness and Completeness
CS792 Notes Henkin Models, Soundness and Completeness Arranged by Alexandra Stefan March 24, 2005 These notes are a summary of chapters 4.5.1-4.5.5 from [1]. 1 Review indexed family of sets: A s, where
More informationIntroduction to Probability Theory and Stochastic Processes for Finance Lecture Notes
Introduction to Probability Theory and Stochastic Processes for Finance Lecture Notes Fabio Trojani Department of Economics, University of St. Gallen, Switzerland Correspondence address: Fabio Trojani,
More informationForecast Horizons for Production Planning with Stochastic Demand
Forecast Horizons for Production Planning with Stochastic Demand Alfredo Garcia and Robert L. Smith Department of Industrial and Operations Engineering Universityof Michigan, Ann Arbor MI 48109 December
More information