CTL Model Checking. Goal Method for proving M sat σ, where M is a Kripke structure and σ is a CTL formula. Approach Model checking!

Size: px
Start display at page:

Download "CTL Model Checking. Goal Method for proving M sat σ, where M is a Kripke structure and σ is a CTL formula. Approach Model checking!"

Transcription

1 CMSC 630 March 13, CTL Model Checking Goal Method for proving M sat σ, where M is a Kripke structure and σ is a CTL formula. Approach Model checking! Mathematically, M is a model of σ if s I = M σ. So determining if M sat σ amounts means checking whether M is a model of σ

2 CMSC 630 March 13, Recall the CTL Fragment of CTL... every path modality (i.e. F, G, U) must be preceded by a path quantifier A, E. The syntax can also be given directly as follows. σ ::= a σ σ σ EXσ E(σ U σ) E(σ R σ) Other operators (AX, AU, AR, EF, AF, EG, AG, etc.) can be defined in terms of these.

3 CMSC 630 March 13, So What s the Big Deal About CTL? Formulas are like those in LTL, but more complex. + Model-checking problem easier to solve in CTL.

4 CMSC 630 March 13, Properties in CTL Expressiveness of CTL, LTL are incomparable. One can reasonably argue that LTL is easier to understand. However, one can turn LTL system specs into CTL formulas that are at least as strong, provided LTL formulas are in positive normal form (i.e. negations only applied to atomic propositions). E.g. PNF: Not PNF: GF executed GF executed

5 CMSC 630 March 13, LTL, CTL and PNF Any LTL formula can be put in PNF provided logic is extended with the necessary duals (i.e., R). (φ 1 φ 2 ) ( φ 1 ) ( φ 2 ) (Xφ) X( φ) (φ 1 U φ 2 ) ( φ 1 ) R ( φ 2 )

6 CMSC 630 March 13, Generating CTL Approximations to LTL So how do we generate CTL formulas at least as strong as LTL system specs? 1. Put LTL formula in PNF. 2. Insert A path quantifier in front of each path modality. LTL G (send F receive) (GF enabled) (GF executed) CTL AG (send AF receive) (AFAG enabled) (AGAF executed)

7 CMSC 630 March 13, PNF CTL σ ::= a a σ σ σ σ EXσ AXσ E(σ U σ) A(σ U σ) E(σ R σ) A(σ R σ)

8 CMSC 630 March 13, The CTL Model-Checking Problem Given Kripke structure M = S, A, R, l, s I CTL formula (in PNF) σ Determine Does s I = M σ? One approach 1. Define proof rules for CTL correctness assertions s M σ. 2. Use rules to develop proofs.

9 CMSC 630 March 13, Sample Proof Rules Recall M = S, A, R, l, s I. A a l(s) s M a A a l(s) s M a 1 s M σ 1 s M σ 1 σ 2 2 s M σ 2 s M σ 1 σ 2 s M σ 1, s M σ 2 s M σ 1 σ 2 Are these rules sound? Complete?

10 CMSC 630 March 13, Proof Rules for CTL Next-Step Modalities How can we prove assertions of form s M EX σ? s M AX σ? M contains information about transitions from states. Proof rules should use this information. EX AX s M σ, s, s R s M EX σ s 1 M σ,...,s n M σ, {s 1,...,s n } = { s s, s R } s M AX σ

11 CMSC 630 March 13, Proof Rules for U, R Modalities Idea Use recursive characterizations of modalities. Notation σ 1 σ 2 means: for all M, s, s = M σ 1 iff s = M σ 2. Then: AF σ σ AX(AF σ). AF σ σ AX (AF σ) σ AF σ σ σ σ σ σ σ

12 CMSC 630 March 13, Other Recursive Characterizations EFσ AGσ E(σ 1 U σ 2 ) E(σ 1 R σ 2 )

13 CMSC 630 March 13, Turning Recursion into Proof Rules: U EU 1 s M σ 2 s M E(σ 1 U σ 2 ) AU 1 s M σ 2 s M A(σ 1 U σ 2 ) EU 2 AU 2 s M σ 1, s M E(σ 1 U σ 2 ), s, s R s M E(σ 1 U σ 2 ) s M σ 1, s 1 M A(σ 1 U σ 2 ),..., s n M A(σ 1 U σ 2 ), {s 1,...,s n } = { s s, s R } s M A(σ 1 U σ 2 )

14 CMSC 630 March 13, Turning Recursion into Proof Rules: R ER 1 s M σ 1, s M σ 2 s M E(σ 1 R σ 2 ) AR 1 s M σ 1, s M σ 2 s M A(σ 1 R σ 2 ) ER 2 AR 2 s M σ 2, s M E(σ 1 R σ 2 ), s, s R s M E(σ 1 R σ 2 ) s M σ 2, s 1 M A(σ 1 R σ 2 ),..., s n M A(σ 1 R σ 2 ), {s 1,...,s n } = { s s, s R } s M A(σ 1 R σ 2 )

15 CMSC 630 March 13, But What about Circular Proofs? Consider proof of E(a U b) for Kripke structure below. s 0 : {a,c} a l(s 1 ) a l(s 0 ) s 1 M a s 0 M E(a U b) s 1 : {a} s 0 M a s 1 M E(a U b) s 0 M E(a U b) Circularity is bad!

16 CMSC 630 March 13, But What about Circular Proofs (cont.)? Consider proof of EG a for Kripke structure below. s 0 : {a,c} a l(s 1 ) a l(s 0 ) s 1 M a s 0 M EGa s 1 : {a} s 0 M a s 0 M EGa s 1 M EGa Circularity is good!

17 CMSC 630 March 13, Is Circularity Bad Or Good? It depends on the modality... but how? And why? Precise answers depend on understanding fixpoint characterizations of the CTL operators. These characterizations will also lead to model-checking algorithms for finite-state Kripke structures.

18 CMSC 630 March 13, CTL Formulas and Fixpoints Recall: AFσ σ AX(AF σ) Equivalently, AFσ may be seen as: a solution to the equation a fixpoint of the function w σ AX w, f(w) = σ AX w Is the solution to the above equation unique? No! Consider the formula tt: tt σ AX tt (why?).

19 CMSC 630 March 13, So What? AF σ is a solution to an equation, but not a unique solution. How does this help us with circularity? Answer Tarski!... Polish emigré mathematician... Active in early to mid 1900 s... Well-known for work in logic, algebra, lattice theory In 1950 s, Tarski and Knaster proved: Theorem (Tarski-Knaster Fixpoint Theorem) Every monotonic function over a complete lattice has a complete lattice of fixpoints.

20 CMSC 630 March 13, Complete Lattice? A complete lattice consists of: a set E of elements a partial ordering ( less than or equal to ) E E a least upper-bound operator 2 E E a greatest lower-bound operator 2 E E Example Let S be a set. Then take: E = 2 S = = = This is a complete lattice!

21 CMSC 630 March 13, Facts about Lattices Theorem Let E,,, be a complete lattice. Then: 1. E has a greatest element =. 2. E has a least element =. 3. (Tarski-Knaster). Let f E E be monotonic, i.e. if e 1 e 2 then f(e 1 ) f(e 2 ). Then the structure { e e = f(e) },,, is also a complete lattice ( complete lattice of fixpoints ).

22 CMSC 630 March 13, How Can This Possibly Help? All the equations describing CTL operators have unique least and greatest solutions! Let M = S, A, l, R, s I be a Kripke structure. 2 S,,, forms a complete lattice. Each equation has equivalent form w = f(w) where f maps sets of states (meanings of formulas) to sets of states. Each of the f turns out to be monotonic over the lattice. Any complete lattice has a unique greatest and least element.

23 CMSC 630 March 13, Example AF σ is the unique least solution to w f(w), where f(w) σ AXx. (More precisely, the set of states satisfying AFσ is the smallest set satisfying the equation.) That is, any other solution is implied by AF σ. What is the largest?

24 CMSC 630 March 13, Another Example Consider: f(w) = σ EX w What is the least fixpoint? Greatest fixpoint?

25 CMSC 630 March 13, One More Example Consider: f(w) = σ 1 (σ 2 AX w) What is the least fixpoint? Greatest fixpoint?

26 CMSC 630 March 13, Recall Motivation: Circular Reasoning Least fixpoint CTL operator: Circularity bad! Greatest fixpoint CTL operator: Circularity good!

27 CMSC 630 March 13, Circularity Example #1 s 0 : {a,c} a l(s 1 ) a l(s 0 ) s 1 M a s 0 M E(a U b) s 1 : {a} s 0 M a s 1 M E(a U b) s 0 M E(a U b) Circularity involves least-fixpoint operator (EU) This proof is therefore invalid.

28 CMSC 630 March 13, Circularity Example #2 s 0 : {a,c} a l(s 1 ) a l(s 0 ) s 1 M a s 0 M EGa s 1 : {a} s 0 M a s 0 M EGa s 1 M EGa Circularity involves greatest-fixpoint operator (EG) This proof is therefore valid.

29 CMSC 630 March 13, Constructing Proofs for s M σ Use proof rules A, A, 1, 2,, EX, AX, EU 1, EU 2, AU 1, AU 2, ER 1, ER 2, AR 1, AR 2 Proofs are valid if they end in leaves or circularities only involve maximum fixpoint formulas.

30 CMSC 630 March 13, Example (Invalid) Proof: AFAGa s 0 : {a} s 1 : { }... s 2 : {a} s 0 M AFAGa s 0 M AFAGa s 1 M AFAGa

31 CMSC 630 March 13, Soundness and Completeness Proof construction is sound. Proof construction is complete for finite-state Kripke structures. Rules can be modified to be complete for arbitrary Kripke structures (sets of states rather than single states on the left of M ).

32 CMSC 630 March 13, Algorithmic Model Checking We have talked about model-checking in terms of proof. For certain kinds of Kripke structures (i.e. finite-state), model-checking can be performed automatically. Model-checking algorithms may be seen as conducting proof search.

33 CMSC 630 March 13, The Finite-State Model-Checking Problem for CTL Given Kripke structure M = S, A, R, l, s I with S < CTL formula σ Compute Does s I = M σ?

34 CMSC 630 March 13, Traditional CTL Model-Checking Algorithms Compute all states in S satisfying σ. See if s I is in this set. Why is the calculation of these sets of states be possible? Because of Kleene and the recursive characterizations of operators!

35 CMSC 630 March 13, Continuous Functions on Lattices Definition Let E,,, be a lattice. Then f E E is continuous if for every chain e 0 e 1, f( e i ) = f(e i ) i=0 i=0 Lemma 1. Every continuous function is monotonic. 2. If E < then every monotonic function is continous.

36 CMSC 630 March 13, Kleene s Fixpoint Theorem Let E,,, be a complete lattice, and let f E E be continuous. Then µf E and νf E, the least and greatest fixpoints of f, respectively, can be given as follows. µf = i=0 f 0 = f i+1 = f(f i ) f i, where νf = i=0 ˆf 0 = ˆf i, where ˆf i+1 = f( ˆf i )

37 CMSC 630 March 13, How Does This Help? For a finite-state Kripke structure S, A, R, l, s I, complete lattice 2 S,,, is finite. CTL operators are least / greatest fixpoints of functions f(w) over this lattice. All functions for PNF CTL are monotonic, hence continuous over this lattice.

38 CMSC 630 March 13, Calculating the Least Solution to an Equation Assume equation is x f(x). Set x = (i.e. ff). Compute f(x). If x = f(x) we re done; otherwise set x to f(x) and repeat. E.g. x a AXx. (In other words, which states satisfy AF a?) x f(x) {1} = a AX {1} {1, 2} = a AX{1} {1, 2} {1, 2} = a AX{1, 2} 0 a 1 2 3

39 CMSC 630 March 13, Another Example: E(a U b) We need to calculate the least solution to x b (a EXx). x f(x) a 0 a 3 a b 1 2

40 CMSC 630 March 13, Calculating the Largest Solution to an Equation Set x = S (i.e. tt) Compute f(x). If x = f(x), we re done; otherwise, set x to f(x) and repeat. E.g. x a EXx. (In other words, which states satisfy EGa?) x f(x) {0, 1} {0} = a EX{0, 1} {0} {0} = a EX{0} a 0 1

41 CMSC 630 March 13, Least vs. Greatest: An Example Consider the equation x b (a AXx). Least solution: x f(x) a 0 a 3 Greatest solution: x f(x) b 1 2

42 CMSC 630 March 13, Classical CTL Model Checking Recall that traditional CTL model checkers: Calculate all states that satisfy a given formula... Then ask if the start state is in this set. So how is the set of states calculated? By processing the formula from the inside out!

43 CMSC 630 March 13, Example: AFAGa First: For AG a, calculate largest solution to x = a AX x. a 0 x f(x) 1 a 2 Second: For AF x, compute least solution to y = x AX y. y g(y)

44 CMSC 630 March 13, Pragmatics I: Solving Equations Efficiently Let M = S, A, R, l, s I be a Kripke structure. Define: M = S + R. Claim: Equations defining CTL operators can be solved in M time. How? Counters

45 CMSC 630 March 13, Huh? E.g. to get least solution to x = σ AXx (assuming σ already known): Associate counter to each state. Counter reflects number of transitions leading to states not in current approximation to solution. When a state moves into solution, counters of states with transitions leading to state must be updated.

46 CMSC 630 March 13, Example: AF a Must calculate smallest solution to x = a AX x x = { } 0 2 a a 1

47 CMSC 630 March 13, Complexity Best classical algorithms process each state/transition once per subformula. How many subformulas are there in formula σ? σ! ( σ is number of operators in σ). So for Kripke structure M, CTL formula σ, model checking takes: O( M σ ) time.

48 CMSC 630 March 13, Pragmatics II: Short-circuiting... stop computation once status of start state is known. E.g. If least solution is being calculated, and start state added to intermediate approximation, can stop.... does not affect complexity, but can improve practical performance.

49 CMSC 630 March 13, Pragmatics III: On-the-fly Model Checking... short-circuiting taken to the extreme.... takes a top-down view ( what is the minimal information I need to compute to check if s I = M σ ). Approaches can be formulated in terms of proof search involving proof rules like the ones we have studied. Subtlety: circularity.

50 CMSC 630 March 13, Pragmatics IV: Efficient Data Structures Classical algorithms require manipulations of sets of states: Unions, intersections Equality checking Transitions from/to sets of states The right data structure can yield dramatic time/space improvement!

51 CMSC 630 March 13, Example: (Ordered) Binary Decision Diagrams In some applications states are fixed-width bit vectors (e.g. Murϕ with only boolean variables). OBDDs are data structures for representing sets of bit vectors compactly. Union, intersection, equality all supported efficiently. In hardware community, most successful model checkers use OBDDs.

52 CMSC 630 March 13, OBDDs and Sets of Fixed-Width Bit Vectors An OBDD is... a directed acyclic graph, with a leaf labeled 0 and a leaf labeled 1, and each internal node labeled by a variable, and each node having two edges, one labeled 0 and one 1. In addition, OBDDs satisfy: 1. No isomorphic subgraphs 2. No don t cares

53 CMSC 630 March 13, Example An OBDD for the set {000, 001, 011} with ordering v 1 v 2 v 3. 0 v1 1 0 v2 1 v

54 CMSC 630 March 13, Example An OBDD for the set {000, 001, 011} with ordering v 3 v 1 v 2. 0 v3 1 v v v2 0 1

55 CMSC 630 March 13, Facts about OBDDs 1. Variable ordering influences size of OBDDs. 2. Given a fixed variable ordering, set representation is canonical (equal sets have isomorphic OBDDs). 3. Efficient implementations exist for union, intersection, complementation, projection,...

56 CMSC 630 March 13, How Are OBDDs Used in Model Checking?... To represent Kripke structures States represented as bit-vectors of length n Transitions represented as bit-vectors of length 2n... To represent approximate solutions during equation solving If x = f(x) is an equation, process of applying f to get new approximations can be given as function on OBDDs!

Lecture 14: Basic Fixpoint Theorems (cont.)

Lecture 14: Basic Fixpoint Theorems (cont.) Lecture 14: Basic Fixpoint Theorems (cont) Predicate Transformers Monotonicity and Continuity Existence of Fixpoints Computing Fixpoints Fixpoint Characterization of CTL Operators 1 2 E M Clarke and E

More information

Lattices and the Knaster-Tarski Theorem

Lattices and the Knaster-Tarski Theorem Lattices and the Knaster-Tarski Theorem Deepak D Souza Department of Computer Science and Automation Indian Institute of Science, Bangalore. 8 August 27 Outline 1 Why study lattices 2 Partial Orders 3

More information

Binary Decision Diagrams

Binary Decision Diagrams Binary Decision Diagrams Hao Zheng Department of Computer Science and Engineering University of South Florida Tampa, FL 33620 Email: zheng@cse.usf.edu Phone: (813)974-4757 Fax: (813)974-5456 Hao Zheng

More information

Binary Decision Diagrams

Binary Decision Diagrams Binary Decision Diagrams Hao Zheng Department of Computer Science and Engineering University of South Florida Tampa, FL 33620 Email: zheng@cse.usf.edu Phone: (813)974-4757 Fax: (813)974-5456 Hao Zheng

More information

The illustrated zoo of order-preserving functions

The illustrated zoo of order-preserving functions The illustrated zoo of order-preserving functions David Wilding, February 2013 http://dpw.me/mathematics/ Posets (partially ordered sets) underlie much of mathematics, but we often don t give them a second

More information

Cut-free sequent calculi for algebras with adjoint modalities

Cut-free sequent calculi for algebras with adjoint modalities Cut-free sequent calculi for algebras with adjoint modalities Roy Dyckhoff (University of St Andrews) and Mehrnoosh Sadrzadeh (Universities of Oxford & Southampton) TANCL Conference, Oxford, 8 August 2007

More information

Tableau Theorem Prover for Intuitionistic Propositional Logic

Tableau Theorem Prover for Intuitionistic Propositional Logic Tableau Theorem Prover for Intuitionistic Propositional Logic Portland State University CS 510 - Mathematical Logic and Programming Languages Motivation Tableau for Classical Logic If A is contradictory

More information

Tableau Theorem Prover for Intuitionistic Propositional Logic

Tableau Theorem Prover for Intuitionistic Propositional Logic Tableau Theorem Prover for Intuitionistic Propositional Logic Portland State University CS 510 - Mathematical Logic and Programming Languages Motivation Tableau for Classical Logic If A is contradictory

More information

Recall: Data Flow Analysis. Data Flow Analysis Recall: Data Flow Equations. Forward Data Flow, Again

Recall: Data Flow Analysis. Data Flow Analysis Recall: Data Flow Equations. Forward Data Flow, Again Data Flow Analysis 15-745 3/24/09 Recall: Data Flow Analysis A framework for proving facts about program Reasons about lots of little facts Little or no interaction between facts Works best on properties

More information

Gödel algebras free over finite distributive lattices

Gödel algebras free over finite distributive lattices TANCL, Oxford, August 4-9, 2007 1 Gödel algebras free over finite distributive lattices Stefano Aguzzoli Brunella Gerla Vincenzo Marra D.S.I. D.I.COM. D.I.C.O. University of Milano University of Insubria

More information

EDA045F: Program Analysis LECTURE 3: DATAFLOW ANALYSIS 2. Christoph Reichenbach

EDA045F: Program Analysis LECTURE 3: DATAFLOW ANALYSIS 2. Christoph Reichenbach EDA045F: Program Analysis LECTURE 3: DATAFLOW ANALYSIS 2 Christoph Reichenbach In the last lecture... Eliminating Nested Expressions (Three-Address Code) Control-Flow Graphs Static Single Assignment Form

More information

Semantics and Verification of Software

Semantics and Verification of Software Semantics and Verification of Software Thomas Noll Software Modeling and Verification Group RWTH Aachen University http://moves.rwth-aachen.de/teaching/ws-1718/sv-sw/ Recap: CCPOs and Continuous Functions

More information

Generating all modular lattices of a given size

Generating all modular lattices of a given size Generating all modular lattices of a given size ADAM 2013 Nathan Lawless Chapman University June 6-8, 2013 Outline Introduction to Lattice Theory: Modular Lattices The Objective: Generating and Counting

More information

Essays on Some Combinatorial Optimization Problems with Interval Data

Essays on Some Combinatorial Optimization Problems with Interval Data Essays on Some Combinatorial Optimization Problems with Interval Data a thesis submitted to the department of industrial engineering and the institute of engineering and sciences of bilkent university

More information

ExpTime Tableau Decision Procedures for Regular Grammar Logics with Converse

ExpTime Tableau Decision Procedures for Regular Grammar Logics with Converse ExpTime Tableau Decision Procedures for Regular Grammar Logics with Converse Linh Anh Nguyen 1 and Andrzej Sza las 1,2 1 Institute of Informatics, University of Warsaw Banacha 2, 02-097 Warsaw, Poland

More information

An orderly algorithm to enumerate finite (semi)modular lattices

An orderly algorithm to enumerate finite (semi)modular lattices An orderly algorithm to enumerate finite (semi)modular lattices BLAST 23 Chapman University October 6, 23 Outline The original algorithm: Generating all finite lattices Generating modular and semimodular

More information

CATEGORICAL SKEW LATTICES

CATEGORICAL SKEW LATTICES CATEGORICAL SKEW LATTICES MICHAEL KINYON AND JONATHAN LEECH Abstract. Categorical skew lattices are a variety of skew lattices on which the natural partial order is especially well behaved. While most

More information

Yao s Minimax Principle

Yao s Minimax Principle Complexity of algorithms The complexity of an algorithm is usually measured with respect to the size of the input, where size may for example refer to the length of a binary word describing the input,

More information

CSE 21 Winter 2016 Homework 6 Due: Wednesday, May 11, 2016 at 11:59pm. Instructions

CSE 21 Winter 2016 Homework 6 Due: Wednesday, May 11, 2016 at 11:59pm. Instructions CSE 1 Winter 016 Homework 6 Due: Wednesday, May 11, 016 at 11:59pm Instructions Homework should be done in groups of one to three people. You are free to change group members at any time throughout the

More information

SAT and DPLL. Introduction. Preliminaries. Normal forms DPLL. Complexity. Espen H. Lian. DPLL Implementation. Bibliography.

SAT and DPLL. Introduction. Preliminaries. Normal forms DPLL. Complexity. Espen H. Lian. DPLL Implementation. Bibliography. SAT and Espen H. Lian Ifi, UiO Implementation May 4, 2010 Espen H. Lian (Ifi, UiO) SAT and May 4, 2010 1 / 59 Espen H. Lian (Ifi, UiO) SAT and May 4, 2010 2 / 59 Introduction Introduction SAT is the problem

More information

Lecture l(x) 1. (1) x X

Lecture l(x) 1. (1) x X Lecture 14 Agenda for the lecture Kraft s inequality Shannon codes The relation H(X) L u (X) = L p (X) H(X) + 1 14.1 Kraft s inequality While the definition of prefix-free codes is intuitively clear, we

More information

GAME THEORY. Department of Economics, MIT, Follow Muhamet s slides. We need the following result for future reference.

GAME THEORY. Department of Economics, MIT, Follow Muhamet s slides. We need the following result for future reference. 14.126 GAME THEORY MIHAI MANEA Department of Economics, MIT, 1. Existence and Continuity of Nash Equilibria Follow Muhamet s slides. We need the following result for future reference. Theorem 1. Suppose

More information

FMCAD 2011 Effective Word-Level Interpolation for Software Verification

FMCAD 2011 Effective Word-Level Interpolation for Software Verification FMCAD 2011 Effective Word-Level Interpolation for Software Verification Alberto Griggio FBK-IRST Motivations Craig interpolation applied succesfully for Formal Verification of both hardware and software

More information

SAT and DPLL. Espen H. Lian. May 4, Ifi, UiO. Espen H. Lian (Ifi, UiO) SAT and DPLL May 4, / 59

SAT and DPLL. Espen H. Lian. May 4, Ifi, UiO. Espen H. Lian (Ifi, UiO) SAT and DPLL May 4, / 59 SAT and DPLL Espen H. Lian Ifi, UiO May 4, 2010 Espen H. Lian (Ifi, UiO) SAT and DPLL May 4, 2010 1 / 59 Normal forms Normal forms DPLL Complexity DPLL Implementation Bibliography Espen H. Lian (Ifi, UiO)

More information

École normale supérieure, MPRI, M2 Year 2007/2008. Course 2-6 Abstract interpretation: application to verification and static analysis P.

École normale supérieure, MPRI, M2 Year 2007/2008. Course 2-6 Abstract interpretation: application to verification and static analysis P. École normale supérieure, MPRI, M2 Year 2007/2008 Course 2-6 Abstract interpretation: application to verification and static analysis P. Cousot Questions and answers of the partial exam of Friday November

More information

Projective Lattices. with applications to isotope maps and databases. Ralph Freese CLA La Rochelle

Projective Lattices. with applications to isotope maps and databases. Ralph Freese CLA La Rochelle Projective Lattices with applications to isotope maps and databases Ralph Freese CLA 2013. La Rochelle Ralph Freese () Projective Lattices Oct 2013 1 / 17 Projective Lattices A lattice L is projective

More information

Dynamic Programming: An overview. 1 Preliminaries: The basic principle underlying dynamic programming

Dynamic Programming: An overview. 1 Preliminaries: The basic principle underlying dynamic programming Dynamic Programming: An overview These notes summarize some key properties of the Dynamic Programming principle to optimize a function or cost that depends on an interval or stages. This plays a key role

More information

Algorithmic Game Theory and Applications. Lecture 11: Games of Perfect Information

Algorithmic Game Theory and Applications. Lecture 11: Games of Perfect Information Algorithmic Game Theory and Applications Lecture 11: Games of Perfect Information Kousha Etessami finite games of perfect information Recall, a perfect information (PI) game has only 1 node per information

More information

A relation on 132-avoiding permutation patterns

A relation on 132-avoiding permutation patterns Discrete Mathematics and Theoretical Computer Science DMTCS vol. VOL, 205, 285 302 A relation on 32-avoiding permutation patterns Natalie Aisbett School of Mathematics and Statistics, University of Sydney,

More information

Lecture 2: The Simple Story of 2-SAT

Lecture 2: The Simple Story of 2-SAT 0510-7410: Topics in Algorithms - Random Satisfiability March 04, 2014 Lecture 2: The Simple Story of 2-SAT Lecturer: Benny Applebaum Scribe(s): Mor Baruch 1 Lecture Outline In this talk we will show that

More information

On the Optimality of a Family of Binary Trees Techical Report TR

On the Optimality of a Family of Binary Trees Techical Report TR On the Optimality of a Family of Binary Trees Techical Report TR-011101-1 Dana Vrajitoru and William Knight Indiana University South Bend Department of Computer and Information Sciences Abstract In this

More information

The finite lattice representation problem and intervals in subgroup lattices of finite groups

The finite lattice representation problem and intervals in subgroup lattices of finite groups The finite lattice representation problem and intervals in subgroup lattices of finite groups William DeMeo Math 613: Group Theory 15 December 2009 Abstract A well-known result of universal algebra states:

More information

arxiv: v1 [math.lo] 24 Feb 2014

arxiv: v1 [math.lo] 24 Feb 2014 Residuated Basic Logic II. Interpolation, Decidability and Embedding Minghui Ma 1 and Zhe Lin 2 arxiv:1404.7401v1 [math.lo] 24 Feb 2014 1 Institute for Logic and Intelligence, Southwest University, Beibei

More information

Rational Behaviour and Strategy Construction in Infinite Multiplayer Games

Rational Behaviour and Strategy Construction in Infinite Multiplayer Games Rational Behaviour and Strategy Construction in Infinite Multiplayer Games Michael Ummels ummels@logic.rwth-aachen.de FSTTCS 2006 Michael Ummels Rational Behaviour and Strategy Construction 1 / 15 Infinite

More information

Introduction to Greedy Algorithms: Huffman Codes

Introduction to Greedy Algorithms: Huffman Codes Introduction to Greedy Algorithms: Huffman Codes Yufei Tao ITEE University of Queensland In computer science, one interesting method to design algorithms is to go greedy, namely, keep doing the thing that

More information

TABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC

TABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC TABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC THOMAS BOLANDER AND TORBEN BRAÜNER Abstract. Hybrid logics are a principled generalization of both modal logics and description logics. It is well-known

More information

Tableau-based Decision Procedures for Hybrid Logic

Tableau-based Decision Procedures for Hybrid Logic Tableau-based Decision Procedures for Hybrid Logic Gert Smolka Saarland University Joint work with Mark Kaminski HyLo 2010 Edinburgh, July 10, 2010 Gert Smolka (Saarland University) Decision Procedures

More information

monotone circuit value

monotone circuit value monotone circuit value A monotone boolean circuit s output cannot change from true to false when one input changes from false to true. Monotone boolean circuits are hence less expressive than general circuits.

More information

0.1 Equivalence between Natural Deduction and Axiomatic Systems

0.1 Equivalence between Natural Deduction and Axiomatic Systems 0.1 Equivalence between Natural Deduction and Axiomatic Systems Theorem 0.1.1. Γ ND P iff Γ AS P ( ) it is enough to prove that all axioms are theorems in ND, as MP corresponds to ( e). ( ) by induction

More information

Logic and Artificial Intelligence Lecture 24

Logic and Artificial Intelligence Lecture 24 Logic and Artificial Intelligence Lecture 24 Eric Pacuit Currently Visiting the Center for Formal Epistemology, CMU Center for Logic and Philosophy of Science Tilburg University ai.stanford.edu/ epacuit

More information

Another Variant of 3sat. 3sat. 3sat Is NP-Complete. The Proof (concluded)

Another Variant of 3sat. 3sat. 3sat Is NP-Complete. The Proof (concluded) 3sat k-sat, where k Z +, is the special case of sat. The formula is in CNF and all clauses have exactly k literals (repetition of literals is allowed). For example, (x 1 x 2 x 3 ) (x 1 x 1 x 2 ) (x 1 x

More information

Notes on the symmetric group

Notes on the symmetric group Notes on the symmetric group 1 Computations in the symmetric group Recall that, given a set X, the set S X of all bijections from X to itself (or, more briefly, permutations of X) is group under function

More information

MAT385 Final (Spring 2009): Boolean Algebras, FSM, and old stuff

MAT385 Final (Spring 2009): Boolean Algebras, FSM, and old stuff MAT385 Final (Spring 2009): Boolean Algebras, FSM, and old stuff Name: Directions: Problems are equally weighted. Show your work! Answers without justification will likely result in few points. Your written

More information

Martingales. by D. Cox December 2, 2009

Martingales. by D. Cox December 2, 2009 Martingales by D. Cox December 2, 2009 1 Stochastic Processes. Definition 1.1 Let T be an arbitrary index set. A stochastic process indexed by T is a family of random variables (X t : t T) defined on a

More information

Virtual Demand and Stable Mechanisms

Virtual Demand and Stable Mechanisms Virtual Demand and Stable Mechanisms Jan Christoph Schlegel Faculty of Business and Economics, University of Lausanne, Switzerland jschlege@unil.ch Abstract We study conditions for the existence of stable

More information

THE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET

THE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET THE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET MICHAEL PINSKER Abstract. We calculate the number of unary clones (submonoids of the full transformation monoid) containing the

More information

5 Deduction in First-Order Logic

5 Deduction in First-Order Logic 5 Deduction in First-Order Logic The system FOL C. Let C be a set of constant symbols. FOL C is a system of deduction for the language L # C. Axioms: The following are axioms of FOL C. (1) All tautologies.

More information

Another Variant of 3sat

Another Variant of 3sat Another Variant of 3sat Proposition 32 3sat is NP-complete for expressions in which each variable is restricted to appear at most three times, and each literal at most twice. (3sat here requires only that

More information

Chair of Communications Theory, Prof. Dr.-Ing. E. Jorswieck. Übung 5: Supermodular Games

Chair of Communications Theory, Prof. Dr.-Ing. E. Jorswieck. Übung 5: Supermodular Games Chair of Communications Theory, Prof. Dr.-Ing. E. Jorswieck Übung 5: Supermodular Games Introduction Supermodular games are a class of non-cooperative games characterized by strategic complemetariteis

More information

Residuated Lattices of Size 12 extended version

Residuated Lattices of Size 12 extended version Residuated Lattices of Size 12 extended version Radim Belohlavek 1,2, Vilem Vychodil 1,2 1 Dept. Computer Science, Palacky University, Olomouc 17. listopadu 12, Olomouc, CZ 771 46, Czech Republic 2 SUNY

More information

Generalising the weak compactness of ω

Generalising the weak compactness of ω Generalising the weak compactness of ω Andrew Brooke-Taylor Generalised Baire Spaces Masterclass Royal Netherlands Academy of Arts and Sciences 22 August 2018 Andrew Brooke-Taylor Generalising the weak

More information

MAT 4250: Lecture 1 Eric Chung

MAT 4250: Lecture 1 Eric Chung 1 MAT 4250: Lecture 1 Eric Chung 2Chapter 1: Impartial Combinatorial Games 3 Combinatorial games Combinatorial games are two-person games with perfect information and no chance moves, and with a win-or-lose

More information

Sublinear Time Algorithms Oct 19, Lecture 1

Sublinear Time Algorithms Oct 19, Lecture 1 0368.416701 Sublinear Time Algorithms Oct 19, 2009 Lecturer: Ronitt Rubinfeld Lecture 1 Scribe: Daniel Shahaf 1 Sublinear-time algorithms: motivation Twenty years ago, there was practically no investigation

More information

Theorem 1.3. Every finite lattice has a congruence-preserving embedding to a finite atomistic lattice.

Theorem 1.3. Every finite lattice has a congruence-preserving embedding to a finite atomistic lattice. CONGRUENCE-PRESERVING EXTENSIONS OF FINITE LATTICES TO SEMIMODULAR LATTICES G. GRÄTZER AND E.T. SCHMIDT Abstract. We prove that every finite lattice hasa congruence-preserving extension to a finite semimodular

More information

Satisfaction in outer models

Satisfaction in outer models Satisfaction in outer models Radek Honzik joint with Sy Friedman Department of Logic Charles University logika.ff.cuni.cz/radek CL Hamburg September 11, 2016 Basic notions: Let M be a transitive model

More information

Collinear Triple Hypergraphs and the Finite Plane Kakeya Problem

Collinear Triple Hypergraphs and the Finite Plane Kakeya Problem Collinear Triple Hypergraphs and the Finite Plane Kakeya Problem Joshua Cooper August 14, 006 Abstract We show that the problem of counting collinear points in a permutation (previously considered by the

More information

Asynchronous Announcements in a Public Channel

Asynchronous Announcements in a Public Channel Asynchronous Announcements in a Public Channel Sophia Knight 1, Bastien Maubert 1, and François Schwarzentruber 2 1 LORIA - CNRS / Université de Lorraine, sophia.knight@gmail.com, bastien.maubert@gmail.com

More information

Principles of Program Analysis: Algorithms

Principles of Program Analysis: Algorithms Principles of Program Analysis: Algorithms Transparencies based on Chapter 6 of the book: Flemming Nielson, Hanne Riis Nielson and Chris Hankin: Principles of Program Analysis. Springer Verlag 2005. c

More information

Tug of War Game. William Gasarch and Nick Sovich and Paul Zimand. October 6, Abstract

Tug of War Game. William Gasarch and Nick Sovich and Paul Zimand. October 6, Abstract Tug of War Game William Gasarch and ick Sovich and Paul Zimand October 6, 2009 To be written later Abstract Introduction Combinatorial games under auction play, introduced by Lazarus, Loeb, Propp, Stromquist,

More information

Fundamental Algorithms - Surprise Test

Fundamental Algorithms - Surprise Test Technische Universität München Fakultät für Informatik Lehrstuhl für Effiziente Algorithmen Dmytro Chibisov Sandeep Sadanandan Winter Semester 007/08 Sheet Model Test January 16, 008 Fundamental Algorithms

More information

Chapter 5: Algorithms

Chapter 5: Algorithms Chapter 5: Algorithms Computer Science: An Overview Tenth Edition by J. Glenn Brookshear Presentation files modified by Farn Wang Copyright 2008 Pearson Education, Inc. Publishing as Pearson Addison-Wesley

More information

Generating all nite modular lattices of a given size

Generating all nite modular lattices of a given size Generating all nite modular lattices of a given size Peter Jipsen and Nathan Lawless Dedicated to Brian Davey on the occasion of his 65th birthday Abstract. Modular lattices, introduced by R. Dedekind,

More information

CONSTRUCTION OF CODES BY LATTICE VALUED FUZZY SETS. 1. Introduction. Novi Sad J. Math. Vol. 35, No. 2, 2005,

CONSTRUCTION OF CODES BY LATTICE VALUED FUZZY SETS. 1. Introduction. Novi Sad J. Math. Vol. 35, No. 2, 2005, Novi Sad J. Math. Vol. 35, No. 2, 2005, 155-160 CONSTRUCTION OF CODES BY LATTICE VALUED FUZZY SETS Mališa Žižović 1, Vera Lazarević 2 Abstract. To every finite lattice L, one can associate a binary blockcode,

More information

Hyperidentities in (xx)y xy Graph Algebras of Type (2,0)

Hyperidentities in (xx)y xy Graph Algebras of Type (2,0) Int. Journal of Math. Analysis, Vol. 8, 2014, no. 9, 415-426 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ijma.2014.312299 Hyperidentities in (xx)y xy Graph Algebras of Type (2,0) W. Puninagool

More information

Optimal Satisficing Tree Searches

Optimal Satisficing Tree Searches Optimal Satisficing Tree Searches Dan Geiger and Jeffrey A. Barnett Northrop Research and Technology Center One Research Park Palos Verdes, CA 90274 Abstract We provide an algorithm that finds optimal

More information

MATH3075/3975 FINANCIAL MATHEMATICS TUTORIAL PROBLEMS

MATH3075/3975 FINANCIAL MATHEMATICS TUTORIAL PROBLEMS MATH307/37 FINANCIAL MATHEMATICS TUTORIAL PROBLEMS School of Mathematics and Statistics Semester, 04 Tutorial problems should be used to test your mathematical skills and understanding of the lecture material.

More information

CONGRUENCES AND IDEALS IN A DISTRIBUTIVE LATTICE WITH RESPECT TO A DERIVATION

CONGRUENCES AND IDEALS IN A DISTRIBUTIVE LATTICE WITH RESPECT TO A DERIVATION Bulletin of the Section of Logic Volume 42:1/2 (2013), pp. 1 10 M. Sambasiva Rao CONGRUENCES AND IDEALS IN A DISTRIBUTIVE LATTICE WITH RESPECT TO A DERIVATION Abstract Two types of congruences are introduced

More information

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Shlomo Hoory and Stefan Szeider Department of Computer Science, University of Toronto, shlomoh,szeider@cs.toronto.edu Abstract.

More information

Lecture 2: Making Good Sequences of Decisions Given a Model of World. CS234: RL Emma Brunskill Winter 2018

Lecture 2: Making Good Sequences of Decisions Given a Model of World. CS234: RL Emma Brunskill Winter 2018 Lecture 2: Making Good Sequences of Decisions Given a Model of World CS234: RL Emma Brunskill Winter 218 Human in the loop exoskeleton work from Steve Collins lab Class Structure Last Time: Introduction

More information

On Existence of Equilibria. Bayesian Allocation-Mechanisms

On Existence of Equilibria. Bayesian Allocation-Mechanisms On Existence of Equilibria in Bayesian Allocation Mechanisms Northwestern University April 23, 2014 Bayesian Allocation Mechanisms In allocation mechanisms, agents choose messages. The messages determine

More information

Levin Reduction and Parsimonious Reductions

Levin Reduction and Parsimonious Reductions Levin Reduction and Parsimonious Reductions The reduction R in Cook s theorem (p. 266) is such that Each satisfying truth assignment for circuit R(x) corresponds to an accepting computation path for M(x).

More information

PURITY IN IDEAL LATTICES. Abstract.

PURITY IN IDEAL LATTICES. Abstract. ANALELE ŞTIINŢIFICE ALE UNIVERSITĂŢII AL.I.CUZA IAŞI Tomul XLV, s.i a, Matematică, 1999, f.1. PURITY IN IDEAL LATTICES BY GRIGORE CĂLUGĂREANU Abstract. In [4] T. HEAD gave a general definition of purity

More information

Problems from 9th edition of Probability and Statistical Inference by Hogg, Tanis and Zimmerman:

Problems from 9th edition of Probability and Statistical Inference by Hogg, Tanis and Zimmerman: Math 224 Fall 207 Homework 5 Drew Armstrong Problems from 9th edition of Probability and Statistical Inference by Hogg, Tanis and Zimmerman: Section 3., Exercises 3, 0. Section 3.3, Exercises 2, 3, 0,.

More information

1 Overview. 2 The Gradient Descent Algorithm. AM 221: Advanced Optimization Spring 2016

1 Overview. 2 The Gradient Descent Algorithm. AM 221: Advanced Optimization Spring 2016 AM 22: Advanced Optimization Spring 206 Prof. Yaron Singer Lecture 9 February 24th Overview In the previous lecture we reviewed results from multivariate calculus in preparation for our journey into convex

More information

Long-Term Values in MDPs, Corecursively

Long-Term Values in MDPs, Corecursively Long-Term Values in MDPs, Corecursively Applied Category Theory, 15-16 March 2018, NIST Helle Hvid Hansen Delft University of Technology Helle Hvid Hansen (TU Delft) MDPs, Corecursively NIST, 15/Mar/2018

More information

Strong normalisation and the typed lambda calculus

Strong normalisation and the typed lambda calculus CHAPTER 9 Strong normalisation and the typed lambda calculus In the previous chapter we looked at some reduction rules for intuitionistic natural deduction proofs and we have seen that by applying these

More information

Computational Intelligence Winter Term 2009/10

Computational Intelligence Winter Term 2009/10 Computational Intelligence Winter Term 2009/10 Prof. Dr. Günter Rudolph Lehrstuhl für Algorithm Engineering (LS 11) Fakultät für Informatik TU Dortmund Plan for Today Fuzzy Sets Basic Definitionsand ResultsforStandard

More information

Constructing Markov models for barrier options

Constructing Markov models for barrier options Constructing Markov models for barrier options Gerard Brunick joint work with Steven Shreve Department of Mathematics University of Texas at Austin Nov. 14 th, 2009 3 rd Western Conference on Mathematical

More information

Game Theory: Normal Form Games

Game Theory: Normal Form Games Game Theory: Normal Form Games Michael Levet June 23, 2016 1 Introduction Game Theory is a mathematical field that studies how rational agents make decisions in both competitive and cooperative situations.

More information

Quadrant marked mesh patterns in 123-avoiding permutations

Quadrant marked mesh patterns in 123-avoiding permutations Quadrant marked mesh patterns in 23-avoiding permutations Dun Qiu Department of Mathematics University of California, San Diego La Jolla, CA 92093-02. USA duqiu@math.ucsd.edu Jeffrey Remmel Department

More information

1 Shapley-Shubik Model

1 Shapley-Shubik Model 1 Shapley-Shubik Model There is a set of buyers B and a set of sellers S each selling one unit of a good (could be divisible or not). Let v ij 0 be the monetary value that buyer j B assigns to seller i

More information

Modular and Distributive Lattices

Modular and Distributive Lattices CHAPTER 4 Modular and Distributive Lattices Background R. P. DILWORTH Imbedding problems and the gluing construction. One of the most powerful tools in the study of modular lattices is the notion of the

More information

Characterization of the Optimum

Characterization of the Optimum ECO 317 Economics of Uncertainty Fall Term 2009 Notes for lectures 5. Portfolio Allocation with One Riskless, One Risky Asset Characterization of the Optimum Consider a risk-averse, expected-utility-maximizing

More information

Advanced Numerical Methods

Advanced Numerical Methods Advanced Numerical Methods Solution to Homework One Course instructor: Prof. Y.K. Kwok. When the asset pays continuous dividend yield at the rate q the expected rate of return of the asset is r q under

More information

SMT and POR beat Counter Abstraction

SMT and POR beat Counter Abstraction SMT and POR beat Counter Abstraction Parameterized Model Checking of Threshold-Based Distributed Algorithms Igor Konnov Helmut Veith Josef Widder Alpine Verification Meeting May 4-6, 2015 Igor Konnov 2/64

More information

Version A. Problem 1. Let X be the continuous random variable defined by the following pdf: 1 x/2 when 0 x 2, f(x) = 0 otherwise.

Version A. Problem 1. Let X be the continuous random variable defined by the following pdf: 1 x/2 when 0 x 2, f(x) = 0 otherwise. Math 224 Q Exam 3A Fall 217 Tues Dec 12 Version A Problem 1. Let X be the continuous random variable defined by the following pdf: { 1 x/2 when x 2, f(x) otherwise. (a) Compute the mean µ E[X]. E[X] x

More information

Bidding Languages. Chapter Introduction. Noam Nisan

Bidding Languages. Chapter Introduction. Noam Nisan Chapter 1 Bidding Languages Noam Nisan 1.1 Introduction This chapter concerns the issue of the representation of bids in combinatorial auctions. Theoretically speaking, bids are simply abstract elements

More information

Decidability and Recursive Languages

Decidability and Recursive Languages Decidability and Recursive Languages Let L (Σ { }) be a language, i.e., a set of strings of symbols with a finite length. For example, {0, 01, 10, 210, 1010,...}. Let M be a TM such that for any string

More information

Outline Introduction Game Representations Reductions Solution Concepts. Game Theory. Enrico Franchi. May 19, 2010

Outline Introduction Game Representations Reductions Solution Concepts. Game Theory. Enrico Franchi. May 19, 2010 May 19, 2010 1 Introduction Scope of Agent preferences Utility Functions 2 Game Representations Example: Game-1 Extended Form Strategic Form Equivalences 3 Reductions Best Response Domination 4 Solution

More information

BROWNIAN MOTION Antonella Basso, Martina Nardon

BROWNIAN MOTION Antonella Basso, Martina Nardon BROWNIAN MOTION Antonella Basso, Martina Nardon basso@unive.it, mnardon@unive.it Department of Applied Mathematics University Ca Foscari Venice Brownian motion p. 1 Brownian motion Brownian motion plays

More information

First-Order Logic in Standard Notation Basics

First-Order Logic in Standard Notation Basics 1 VOCABULARY First-Order Logic in Standard Notation Basics http://mathvault.ca April 21, 2017 1 Vocabulary Just as a natural language is formed with letters as its building blocks, the First- Order Logic

More information

Lie Algebras and Representation Theory Homework 7

Lie Algebras and Representation Theory Homework 7 Lie Algebras and Representation Theory Homework 7 Debbie Matthews 2015-05-19 Problem 10.5 If σ W can be written as a product of t simple reflections, prove that t has the same parity as l(σ). Let = {α

More information

Lecture Notes on Type Checking

Lecture Notes on Type Checking Lecture Notes on Type Checking 15-312: Foundations of Programming Languages Frank Pfenning Lecture 17 October 23, 2003 At the beginning of this class we were quite careful to guarantee that every well-typed

More information

Making Decisions. CS 3793 Artificial Intelligence Making Decisions 1

Making Decisions. CS 3793 Artificial Intelligence Making Decisions 1 Making Decisions CS 3793 Artificial Intelligence Making Decisions 1 Planning under uncertainty should address: The world is nondeterministic. Actions are not certain to succeed. Many events are outside

More information

Realizability of n-vertex Graphs with Prescribed Vertex Connectivity, Edge Connectivity, Minimum Degree, and Maximum Degree

Realizability of n-vertex Graphs with Prescribed Vertex Connectivity, Edge Connectivity, Minimum Degree, and Maximum Degree Realizability of n-vertex Graphs with Prescribed Vertex Connectivity, Edge Connectivity, Minimum Degree, and Maximum Degree Lewis Sears IV Washington and Lee University 1 Introduction The study of graph

More information

2 Deduction in Sentential Logic

2 Deduction in Sentential Logic 2 Deduction in Sentential Logic Though we have not yet introduced any formal notion of deductions (i.e., of derivations or proofs), we can easily give a formal method for showing that formulas are tautologies:

More information

MATH 121 GAME THEORY REVIEW

MATH 121 GAME THEORY REVIEW MATH 121 GAME THEORY REVIEW ERIN PEARSE Contents 1. Definitions 2 1.1. Non-cooperative Games 2 1.2. Cooperative 2-person Games 4 1.3. Cooperative n-person Games (in coalitional form) 6 2. Theorems and

More information

CS792 Notes Henkin Models, Soundness and Completeness

CS792 Notes Henkin Models, Soundness and Completeness CS792 Notes Henkin Models, Soundness and Completeness Arranged by Alexandra Stefan March 24, 2005 These notes are a summary of chapters 4.5.1-4.5.5 from [1]. 1 Review indexed family of sets: A s, where

More information

Introduction to Probability Theory and Stochastic Processes for Finance Lecture Notes

Introduction to Probability Theory and Stochastic Processes for Finance Lecture Notes Introduction to Probability Theory and Stochastic Processes for Finance Lecture Notes Fabio Trojani Department of Economics, University of St. Gallen, Switzerland Correspondence address: Fabio Trojani,

More information

Forecast Horizons for Production Planning with Stochastic Demand

Forecast Horizons for Production Planning with Stochastic Demand Forecast Horizons for Production Planning with Stochastic Demand Alfredo Garcia and Robert L. Smith Department of Industrial and Operations Engineering Universityof Michigan, Ann Arbor MI 48109 December

More information