Tble 1: Syntx of LOTOS/T+ E :: stop (untimed dedlock) j exit (successful termintion) j ; E (ction prex, untimed) j [P (t; x)]; E (ction prex, timed) j

Size: px
Start display at page:

Download "Tble 1: Syntx of LOTOS/T+ E :: stop (untimed dedlock) j exit (successful termintion) j ; E (ction prex, untimed) j [P (t; x)]; E (ction prex, timed) j"

Transcription

1 Protocol Synthesis from Timed nd Structured Specictions Akio Nkt Teruo Higshino Kenichi Tniguchi Dept. of Informtion nd Computer Sciences, Osk University Toyonk, Osk 56, Jpn Abstrct In this pper, we propose method to synthesize protocol specictions utomticlly from service specictions written in time-extended LOTOS clled LOTOS/T+. In LOTOS/T+, structured descriptions, such s prllelism nd interruption re llowed to describe service specictions, nd time-constrints mong non-djcent ctions cn be described using Presburger formuls. Here we ssume tht there is relible communiction chnnel between ny two nodes nd the mximum communiction dely for ech chnnel is bounded by constnt. Moreover we ssume service specictions hve no dedlocks. Under our simultion policy, speciction S is derived from given service speciction S nd given mximum communiction dely of ech chnnel. In S, timeconstrints necessry for exchnging synchroniztion messges re dded. If S nd S cn crry out the sme behviour, i.e., if S nd S re bisimultion equivlent when time is ignored, then correct protocol speciction for simulting S is derived from S utomticlly. 1 Introduction For designing relible distributed systems, protocol synthesis methods re useful [1]. In the recent yers, severl methods for synthesizing correct protocol specictions from given service specictions mechniclly hve been proposed for FSM, EFSM, LOTOS nd Petri Net models [, 3, 4]. However those proposls do not consider quntittive time constrints for the systems. It is highly desirble to synthesize protocol specictions from time-constrined service speci- ctions. Recently, in [5], method to derive protocol specictions from timed service specictions written in FSM model hs been proposed, but in such FSM model we cn not specify complicted order of ctions in structurl wy. In this pper, we propose method for synthesizing correct protocol specictions utomticlly from given service specictions written in sub-clss of LOTOS/T+ (which is modied version of [6]), one of timed extensions of LOTOS [7]. LOTOS/T+ hs n bility to specify complicted ction ordering such s prllel composition nd interruption. Moreover, in LOTOS/T+, time constrints mong ctions cn be specied s formuls using ddition, subtrction nd inequlities on integers. In ddition, using vribles to hold the time when preceding ctions re executed, we cn specify time constrints for succeeding ctions. In our method, we ssume tht () ech communiction chnnel is error-free nd its mximum propgtion dely is bounded by constnt, nd tht (b) ll nodes with their clocks cn strt their executions simultneously nd the clocks lwys synchronize ech other. Under this ssumption, we give simultion policy for ech node to execute ctions in exctly the sme order s specied in given service speciction. Bsiclly, the simultion policy is bsed on the method which we hve proposed in [3, 8]. Tht is, fter executing ech ction, sy, synchroniztion messge is sent to the node which executes succeeding ction, sy b, to inform tht hs been executed. If the execution time of is needed, the time is lso trnsmitted. The ction b must be executed fter the messge is received. We derive protocol specictions under the bove policy. However, if we consider timeconstrints, mny problems rise. For exmple, if service speciction sttes \the ction must be executed before time 3 t node 1, nd then the ction b must be executed before time 5 t node," nd if the mximum communiction dely from node 1 to node is 3 units of time, the synchroniztion messge sent from node 1 fter is executed my not rech node before time 5. To cope with this kind of problem, we restrict, for exmple, the time constrint of the ction to \before time " so tht we cn gurntee the synchroniztion messge reches node in time. As nother exmple, suppose tht service speciction sttes \the ction must be executed between time 1 nd 3 t node 1, nd fter tht the ction b must be executed between time 4 nd 5 t node ". If the mximum communiction dely from node 1 to node is 3 units of time, the sme observtion s the previous exmple holds, i.e., the synchroniztion messge from node 1 to node my not rech in time. But s for the bove cse, dierent solution is possible. Since ech node hs its own clock nd ll clocks synchronize ech other, the ordering of ctions nd b is gurnteed without ny messge exchnge. Tht is, the temporl ordering s the totl system is gurnteed if ech node decides the execution time of its ction (or b) using its own clock. In our derivtion method, rst, from given service speciction S nd given mximum dely of ech chnnel, we derive speciction S where dditionl time constrints re ppended to S so tht the messge exchnges re crried out in time. We mke only the wekest timing restrictions to S so tht ech node cn simulte S under the bove policy. If

2 Tble 1: Syntx of LOTOS/T+ E :: stop (untimed dedlock) j exit (successful termintion) j ; E (ction prex, untimed) j [P (t; x)]; E (ction prex, timed) j E[]E (choice) j EjjjE (synchronous prllel) j EjjE (synchronous prllel) j Ej[A]jE (generic prllel composition) j E[> E (disbling) j E >> E (enbling) j hide A in E (hiding) j sp A in E (\s soon s possible" execution) j P [g 1 ; : : : ; gk](e) (process invoction) S nd S cn execute the sme behviour (note tht the trnsformtion from S to S does not necessrily preserve the equivlence), i.e., if they re observtionlly equivlent (bisimultion equivlent[6]) when we consider sending/receiving ctions of synchroniztion messges nd n ction representing one unit time progress s unobservble, then protocol speciction stisfying S is derived utomticlly from S. The pper is orgnized s follows. Section describes our speciction lnguge LOTOS/T+. In Section 3 we explin the protocol synthesis method. Section 4 concludes this pper. LOTOS/T+ The speciction lnguge we use for describing both service specictions nd protocol specictions is LOTOS/T+, which is slightly modied one from LOTOS/T[6]. The syntx nd informl semntics of LOTOS/T+ re described below. Denition 1 Behviour expressions of LO- TOS/T+ is dened s Tble 1 (the preference of ech opertor is the sme s LOTOS[7]), where Act [ fig( Act stnds for nite set of ll observble ctions, nd i represents n internl (unobservble) ction), A Act, k N(N is set of nturl numbers), nd P (t; x) stnds for Presburger formul[9], tht is, rst order logic formul whose toms re integer liner inequlities, which hs free vrible t nd other free vribles x i. Here x def (x 1 ; x ; : : : ; x k ) for some k. Intuitively, t represents the current time, e stnds for n integer liner expression (ILE for short) nd e def (e 1 ; e ; : : : ; e k ) for some k, where ech e i is n ILE. In LOTOS/T+, time constrints of ctions re described in subclss of Presburger formuls, more speciclly, logicl combintions of the toms ech of which tkes the form of either e l t, t e u or x t. Here, e l (e u ) is n ILE representing the lower bound (upper bound, respectively) of the time n ction is executble. The tomic formul x t mens tht the ction's executed time is ssigned to the vrible x. For simplicity, we use n bbrevition e l t e u for e l t ^ t e u. Other symbols of inequlity such s <,,etc. my lso be used. In our semntics, n upper bound e u specied s time constrint of n ction mens the ction must be executed no lter thn e u. In this cse, we sy tht urgency of the ction t time e u is specied. Note tht in our lnguge, executbility nd urgency of ech ction t ech given time t re decidble[6]. Exmple 1 B [ t 3 ^ x t]; b[t x + 3]; c[t x + 4]; stop The behviour expression B represents the following behviour. The ction must be executed between time nd 3, nd the execution time of is ssigned to the vrible x. Then b must be executed exctly 3 units of time fter the execution of. And then c must be executed exctly 4 units of time fter. Exmple 1. E [x t]; b; c[t x + ]; stop. P [t 5]; stop[]b[t 1]; P The rst behviour expression is n exmple tht n ction without time constrints is inserted between time constrined ctions. b in the rst exmple cn be executed t ny time fter is executed, tht is, we consider tht formul \true" is omitted s time constrint of b. Moreover, n unbounded intervl \t x + " is specied s time constrint of c. The second one is n exmple of recursive processes. A clock is reset to t ech moment P is invoked. Generlly, ech instnce of processes hs its own clock loclly, which is reset to t the beginning of the process's run. If process P hs process prmeter like P (t), however, the clock is not reset to but to the ctul time t, tht is, P (t ) is invoked. The corresponding LTS's re shown in Fig. 1. The dierence between LOTOS/T+ nd LO- TOS/T is n interprettion of the behviour of internl ctions. In the method we propose, the dely of internl messges exchnged mong nodes is ssumed to be uncertin. On the other hnd, in LOTOS/T internl ctions re dened to be executed s soon s possible fter it is enbled, so we cnnot describe uncertin dely of internl ctions in LOTOS/T. Thus, we dene LOTOS/T+ so tht the executble time of internl ctions my be decided nondeterministiclly in the rnge of time constrints. To describe this property, we dene construct \sp A in B," representing the sme behviour B except the ctions in A must be executed s soon s possible they re enbled. The forml denition of the semntics is given s the inference rules in Fig.. From the rules, we cn utomticlly decide whether n ction [P (t; x)] is executble, if stisbility of the corresponding predictes P (; x) nd 9t 9x[t > ^ P (t ; x)] is decidble. P (; x) denotes whether is executble t the current time nd 9t 9x[t > ^ P (t ; x)] denotes whether

3 [t x]; b; c[t x + ]; stop b; c[t ]; stop b; c[t + 1 ]; stop b; c[t + ]; stop b b b c[t ]; stop c[t + 1 ]; stop c[t + ]; stop c stop E stop P Figure 1: The semntics of E nd P b P [t 4]; stop[]b[t ]; P [t 3]; stop [t ]; stop [t 1]; stop [t ]; stop stop?! stop (S1) P (; c) [P (t; x)]; B?! [cx]b (TAP1) ; B?! ; [t + 1t]B (UAP)?! B 1 B?! B exit?! stop (E1) 9t 9x[t > ^ P (t ; x)] [P (t; x)]; B?! [P (t + 1; x)]; [t + 1t]B (TAP) []B?! B 1?! B 1?! B 1 i Act [ f; ig B 6?! (CH1) B []B exit?! exit (E) ; B?! B (UAP1)?! B?! B B?! B i Act [ f; ig 6?! (CH) []B?! B1 []B (CH3)?! B1 B?! B j[a]jb B j[a]jb?! B 1 j[a]jb?! B?! j[a]jb [> B?! B 1 i A [ fg (PA1) i 6 A _ i (PA4)?! B 1 [> B (DI1)?! B1 B?! B [> B?! B 1 [> B (DI4)?! B 1 >> B []B?! B1 (CH4)?! B 1 B?! B j[a]jb?! B1 j[a]jb (PA) B [> B j[;]jb jjjb?! B?! B >> B?! B?! B (PA5)?! B 1 i Act [ f; ig (DI)?! B 1 >> B (EN1) j[a]jb []B?! B (CH5)?! B 1?! B 1 j[a]jb j[act]jb jjb [> B >> B?! B i 6 A _ i (PA3)?! B (PA6)?! B 1?! B 1 B?! B 6?! B?! B i (Act n A) [ f; ig?! B1 >> B hide A in B?! hide A in B (EN3)?! B 1 (DI3) i?! B (EN) (HI1) B?! B i A hide A in B?! i hide A in B (HI)?! B B?! 6 for ll A B sp A in B?! sp A in B (ASAP) B?! B hide A in B?! hide A in B (HI3) B sp A in B?! B?! sp A in B (ASAP1) [ex]bfg 1 g 1; : : : ; g k g kg?! B i P [g P [g1 ; : : : ; ](e) 1 ; : : : ; g k ](x) : B is denition g k?! B (PR1) Figure : The opertionl semntics of LOTOS/T+ my be executble in the future. Since P (t; x), time constrint of the ction, is Presburger formul, ll the predictes bove re lso Presburger formuls, so their stisbility is decidble[9, 6]. Hence, we cn construct mechniclly the corresponding LTS's (possibly, of innite stte spces) from given behviour expressions. Here we give some rules to show how to construct LTS's. Firstly, for the process E in Exmple (see Fig.1): E [t x]; b; c[t x + ]; stop ]; stop [ from the rule (TAP1)],?! b; c[t b; c[t ]; stop?! b; c[(t + 1) ]; stop [ from the rule (TAP)], Secondly, for the process P in Exmple (see Fig.1): P?! [t 4]; stop[]b[t ]; P [from the rules (PR1), (CH3), (TAP)],

4 [t 4]; stop[]b[t ]; P?! [t 3]; stop [from the rules (CH4), (TAP)], 3 Protocol Synthesis 3.1 Protocol Synthesis Problem In this section, we dene protocol synthesis problem from timed service specictions. First we introduce some nottions. Let plce() denote node ssignment for the ction. In the rest of this pper, we ssume tht k stnds for n ction with plce() k. Moreover, we use some nottions SP (B), EP (B), AP (B), whose intuitive menings re the sets of the strting nodes of B, the ending nodes of B, ll the prticipting nodes in B, respectively. For exmple, if B 1 ; b ; exitjjje 3 ; d ; exit, then SP (B) f1; 3g, EP (B) fg nd AP (B) f1; ; 3g. We cn derive them from B nd plce() mechniclly. The forml denitions of these nottions ppered in [3]. [Protocol Synthesis Problem] Assumptions: 1. there exists relible(errorfree), synchronous, full-duplex communiction chnnel between every two nodes.. there's no limittions on contents of messges exchnged mong nodes. 3. ll nodes hve their own clocks nd they lwys synchronize ech other. Inputs: A service speciction S. A node ssignment plce() for ech ction. An upper bound of dely d ij mx for ech chnnel from node i to j, such tht d iimx nd 8k d ij mx d ikmx + d kj mx. Here, we give the following restrictions for simplifying the derivtion. Restriction 1. S does not contin ny dedlock sttes. And S does not contin the synchronous prllel composition (rendezvous). Restriction. If S contins [> B s subexpression, must be nite process, nd there exists constnt t such tht cn execute no ction fter time t nd B cn execute ny ction only fter time t. Restriction 3. If S contins >> B s subexpression, must be nite process. Restriction 4. Every process invoction in S must not hve ny process prmeters, i.e. the behviour of ech invoked process does not depend on the previous behviour. Restriction 5. The context of ech process invoction P must be either ; P or [P (t; x)]; P, so tht just one ction precedes P. Restriction 6. For every subexpression []B of S, there exists node p such tht SP ( ) SP (B ) fpg, nd EP ( ) EP (B )[3]. Restriction 7. For every subexpression [> B of S, EP ( ) EP (B )[3]. Outputs: Protocol entity specictions Node 1, Node, : : :, Node n for ll nodes, which re correct in the following mening: Let I be the composite system which connects Node 1, Node, : : :, Node n together with communiction medium which hs chnnels from node i to j with mximum dely of d ij mx. Intuitively, fn ode i g i1;;:::;n re correct w.r.t. S when S cn strictly simulte I including timing properties, wheres I cn simulte S if time is ignored. In this cse, set of executble time of ech ction in I is nonempty subset of tht of the corresponding ction in S. Formlly, the correctness is dened s follows. Let I hide G in (sp G s in ((Node 1 jjjnode jjj : : : jjjnode n )j[g]jmedium)); where G is set of ll sending/receiving ctions of synchroniztion messges fs ij (m); r ij (m) j i; j f1; ; : : : ; ng; m Mg nd G s is set of ll sending ctions of synchroniztion messges fs ij (m)ji; j f1; ; : : : ; ng; m Mg, nd M edium is speciction of the communiction medium dened s follows: Medium jjji;jf1;;:::;ngchnnel ij Chnnel ij jjjmm (s ij(m)[x t]; r ij(m)[x t x + d ijmx ]; Chnnel ij) Note tht under the synchronous communiction medium, the sending ctions re executed s soon s possible they re enbled, becuse they re spontnous. In contrst, the receiving ctions re not spontnous, so they re not executed s soon s possible. Before dening the correctness, we need some preliminry denitions. Denition Reltions ) t,?! u, ) u re dened s follows: ( B B B ) t B def?! u B def ) u B def 8 < : ( B(?!) i?! (?!) i B ; Act [ f; g B(?!) i B ; B(?!)?! (?!) B ; Act [ f; ig B(?!) B ; B(?! i u)?! u (?! i u) B ; Act [ fg B(?! i u) B ; Denition 3 A binry reltion v t on behviour expressions is dened s mximum one of reltions R stisfying the following condition: If IRS, then for ll Act [ f; g, ll of the following conditions hold: 1. If I ) t I, then there exists some S s.t. S ) t S nd I RS.. If I ) t I, then there exists some S s.t. S ) t S nd I RS. 3. If S ) u S, then there exists some I s.t. I ) u I nd I RS. Here we dene the correctness.

5 Denition 4 We cll derived protocol speci- ction fnode i g i1;;:::;n s v t -correct w.r.t. S if the following reltion holds: hide G in (sp G s in ( (Node 1jjjNode jjj : : : jjjnode n)j[g]jmedium)) vt S 3. Synthesis Method Now we describe our method for synthesizing protocol specictions from timed service specictions. Bsiclly, we follow similr ide to our previous work[3, 8]. Thus, fter ech node executed n ction, it sends messges to the nodes which execute the succeeding ctions, informing them tht it hs nished. We refer this kind of messges s synchroniztion messges. To hndle time constrints between ctions on dierent nodes, we nturlly ssume tht synchroniztion messges my lso contin, if needed, informtion bout the time t which preceding ctions were executed. One mjor problem is tht the communiction dely my mke it impossible to execute n ction in time. In generl, ll relistic communiction medi hve propgtion dely, nd we cnnot neglect uncertinty of such dely in most cses. To overcome this problem, we propose the following method. First, for given service speciction S, we decide where to insert ctions sending or receiving synchroniztion messges to simulte S, ccording to the policy similr to [3, 8]. Then we restrict time-constrints of some ctions in S in order to gurntee the execution of succeeding ctions re possible t the worst cse of communiction dely, keeping the restriction to minimum. We represent the obtined speciction s Restr(S). Finlly, from the restricted speciction S Restr(S), we derive protocol entity specictions for ll nodes. If S nd S re equivlent[6], the derived protocol specictions re gurnteed correct w.r.t. S. In the following subsections, we describe how the simultion of the service speciction S is done, nd how we cn dene the trnsformtion Restr(), for ech construct of LOTOS/T Action Prex We cn simulte Action Prex p [P (t; x)]; B by sending synchroniztion messge from node p to ll the nodes in SP (B). If time constrints re specied by ssignment nd referrence of the vribles, nodes t which such vribles re ssigned to some vlues must propgte the vlues to the succeeding nodes. Exmple 3 Node 1 Node S 1 [x t]; b [t x + 5 ^ y t]; c 3 [t x + 7 ^ t y + 5]; exit d 1mx d 13mx d 3mx [x t]; s 1(m; x); exit r 1(m; x); b[t x + 5 ^ y t]; s 3(m ; x; y); exit Node 3 r 3(m ; x; y); c[t x + 5 ^ t y + 5]; exit Here we cn remove some redundncies in inserting synchroniztion messges when time is considered. Speciclly, if there's no executble time of succeeding ction tht is erlier thn or equl to some executble time of the preceding ction, nd there's no vlues to propgte to succeeding nodes, the synchroniztion messge t this plce is of no need to gurntee ctions' order, i.e., time implicitly gurntees the order (recll Assumption 3 in Section 3.1). For exmple, let S 1 [P (t; x)]; b [Q(t; y)]; exit nd suppose 9t; t ; x; y[p (t; x)^ Q(t ; y)^ t t] is unstisble. Then from the time constrints, is lwys executed before b, so even if we simply execute nd b t dierent plces, the order is still preserved. Therefore, we cn remove the synchroniztion messge from node 1 to node in this cse. Exmple 4 If the input is the following: S 1 [1 t 3]; b [4 t 5]; exit we will simply derive: d 1mx 4, Node 1 [1 t 3]; exit Node b[4 t 5]; exit becuse [(1 t 3) ^ (4 t 5) ^ (t t)] is unstisble. From now, we consider the cse where communiction dely ects the simultion. For ction prex p [P (t; x)]; B, we will derive speciction Restr(S) whose time constrint of p is restricted so tht there exists time to execute the succeeding ctions in B no mtter how lte the messges from the node p rech the nodes in SP (B). Becuse we describe time constrints in Presburger formuls, we cn esily restrict time constrints by logicl conjunction. Exmple 5 If the input is: S 1 [1 t 3]; b [4 t 7]; c 3 [5 t 1]; d [6 t 1]; exit d 1mx 4, d 3mx 4, d 3mx 3, we restrict the time constrint of ech ction s follows: d : 6 t 1 (unmodied) c 3 : 5 t 1^ 9t (t t + d 3mx ^ 6 t 1) ( 5 t 9) b : 4 t 7^ 9t (t t + d 3mx^ 5 t 9 ) ( 4 t 5) 1 : t 4 (unmodied (by Exmple 4)) So the derived protocol entity speciction will be the followings: Node 1 1 [1 t 3]; exit Node b [4 t 5]; s 3 (m1); r 3 (m); d [6 t 1]; exit Node 3 r 3 (m1); c 3 [5 t 9]; s 3 (m); exit

6 Now we cn dene Restr(S) formlly s follows. Denition 5 If S [Q(t; x)]; B, then Restr(S) is dened inductively s follows: Restr(S) def Restr(S; ;) Restr(S; V ) def 8 >< >: S if B exit; B stop or B P (Process invoction), [Q(t; x) ^ Q (t)]; Restr(B; V [ x) otherwise. where, if fb k [Q k (t; y k )] j k Kg is the set of strting ctions of Restr(B; V [ x) with their time constrints, 8 V kk f9t 9y k [t t + d plce();plce(b k )mx ^Q k (t >< ; y k )]g if for some k K s.t. Q(t; x)^ Q (t) def Q k (t ; y k ) ^ t t is stisble, or ny of the vribles in V [ x re >: referenced in B, true otherwise. To summrize this section, our derivtion tkes 3 steps: Step 1 determine t wht position the synchroniztion messges re needed. Step ccording to the results of Step 1 nd d ij mx, construct Restr(S). Step 3 decompose Restr(S) into ech node by the similr method to [3, 8], lredy described bove. 3.. Choice To simulte choice expressions, we must solve the problem bout distributed choice nd empty lterntives[3]. A choice expression []B is clled distributed choice if the strting ctions of nd B my be executed t dierent nodes. And we sy tht node p hs n empty lterntive w.r.t. []B if some ctions in B i my be executed t node p, wheres no ctions in B (imod)+1 re executed t node p. Distributed choice my cuse simultneous execution of the strting ctions of both nd B. Empty lterntives on node p my cuse unconditionl execution of B i even if B (imod)+1 is chosen. As for distributed choice, we void it by putting the sme restriction (Restriction 6) s [3]. We hve proposed method for solving the empty lterntive problem for the untimed cse in [3]. But, here, we will use slightly modied method. Unlike [3], the node where choice ws mde should immeditely sends messges to the nodes tht hve empty lterntives in order not to violte time constrints of succeeding processes. Moreover, to mke sure ech B i would not terminte before the messges sent to the nodes which hs empty lterntives rech the destintions, the ending nodes of the chosen expression will receive cknowledgments from the nodes with empty lterntives before executing the ending ctions (note tht if the strting ction of B i coincides the ending ction of it, i.e., the mximum length of B i 's ction sequences is 1, this simultion method my not be pplicble). Furthermore, to simulte choice expression []B in the bove wy successfully, we must not remove redundnt synchroniztion messges in both nd B, discussed in Section 3..1 (Exmple 4), otherwise the intermedite ctions of ech B i my be executed independently, no mtter which lterntive is chosen. To mke it possible to simulte choice in the wy bove, we must gurntee tht ll the messges rech the destintions in time by restricting the time constrints of some ctions. For choice expression []B, if the messges sent from the node choice ws mde wouldn't hve reched the destintions, or the cknowledgments wouldn't return, before the chosen behviour B i hve been done, extr time would be spent witing for the messges. So we will restrict the time constrints of the strting ctions of nd B so tht the messges cn rech in time. Exmple 6 Consider the following input: S 1 [ t 5 ^ x t]; b [t x + 3]; c 3 [t x + 6]; exit []d 1 [3 t 9]; e 3 [t 1]; exit d 1mx, d 3mx 4, d 13mx 3 We must restrict the time constrint of d 1 in order to mke the messge from node 1 to nd the cknowledgment from node to 3 rech by time 1. Restr(S) 1 [ t 5 ^ x t]; b [t x + ]; c 3 [t x + 6]; exit []d 1 [3 t 4]; e 3 [t 1]; exit Then, the speciction of ech node will be derived s follows: Node 1 Node Node 3 1 [ t 5 ^ x t]; s 1(m1; x); s 13(m3; x); exit []d[3 t 4]; (s 13(m); exitjjjs 1(m4); exit) r 1(m1; x); b [t x + ]; s 3(m5); exit []r 1(m4); s 3(m4); exit r 13(m3; x); r 3(m4); c 3 [t x + 6]; exit [](r 13(m)jjjr 3(m4)) >> e 3 [t 1]; exit For dening Restr(S), we need the uxiliry function Restr (S), which is the sme s Restr(S) except tht no removl of redundnt messges is considered. The forml denition of Restr (S) ppers in [1]. Now we cn dene Restr(S) s follows: Denition 6 If S []B, then Restr(S) is de- ned inductively s follows: Restr(S) def Restr (f( ))[]Restr (f(b )) where, we ssume tht fb k [Q k (t; y k )] j k Kg is the set of the strting ctions of B i with their time constrints, nd tht f(b i ) is n expression B i whose time constrint of ech strting ction Q k (t; y k ) is replced

7 with Q k (t; y k ) ^ R (t). Here k R k (t) is Presburger formul dened ^ s follows. Rk(t) def f9t 9z l [t t + d pqmx + d qrmx ^ R l (t ; z l )]g q AP (B i) n AP (B (imod)+1 ) l L; r EP (B i) where fr l (t; z l )jl Lg denotes the time constrints of EP (B i ) nd SP (B i ) fpg Asynchronous Prllel For ny synchronous prllel expression jjjb, nd B re executed independently. So ny synchroniztion messges re necessry between nd B. Thus, Restr(S) is dened s follows: Denition 7 If S jjjb, then Restr(S) def Restr( ) jjj Restr(B ) 3..4 Enbling For enbling expression >> B, we cn pply essentilly the sme ide s ction prex. Due to the lck of spce, we omit the detils bout Restr() trnsformtion for the enbling expressions. The detils cn be found in [1] Disbling For ech disbling expression [> B, we mke strong restriction, Restriction, for simplicity. Tht is, for some t, ll ctions in re not executble fter time t, nd ll ctions in B re executble only fter time t. From Restriction, there is no cses tht ctions in nd B re simultneously enbled t dierent nodes. So [> B cn be simulted by inserting messges to notify successful termintion of to ll nodes. To mke this simultion method work,the messges notifying 's termintion hve to rech before t. Exmple 7 The input described below stises Restriction (t 11) nd Restriction 7: S 1 [1 t 4]; b [3 t 8]; c 3 [7 t 1]; exit [> d 3 [1 t]; exit d 1mx 3, d 3mx 4, d 31mx 3, d 3mx 4, d ij mx for other i,j. In order to gurntee tht the notiction of successful termintion sent from node 3 to nodes 1 nd cn rech before time t 11, the time constrint of c 3 must be restricted to 7 t 7, becuse the notiction from node 3 to node my tke d 3mx 4 units of time. Then, the restriction discussed in the previous section is pplied for b nd 1. Restr(S) 1 [1 t 1]; b [3 t 4]; c 3 [7 t 7]; exit[> d 3 [1 t]; exit From this, the protocol entity speciction of ech node will be derived s below: Node 1 1 [1 t 1]; r 31 (m1); exit[> i[t 1]; exit Node b [3 t 4]; r 3 (m1); exit[> i[t 1]; exit Node 3 c 3 [7 t 7]; (s 31 (m1)jjjs 3 (m1)) >> exit [> d 3 [1 t]; exit The denition of Restr(S) is s follows: Denition 8 If S [> B, Restr(S) def Restr(g ( ))[> Restr(B ); where g ( ) represents trnsformtion replcing the time constrint P (t; x) of ech ending ction of with P (t; x) ^ P (t). Here P (t) def ^ ft + d pq mx t g: pep ();qall 3..6 Process Invoction In our speciction lnguge, time is reset to t every moment processes re invoked, voiding ccumultion of time constrints. To simulte this in distributed environments, we mke ll nodes to pretend s if they invoke process simultneously. In order to do so, 1. Fix one node for responsible node, which decides the time to invoke process (the time just before invoking process). In this pper, from Restriction 5, the context of ech process invoction must be the form of ; B or [P (t; x)]; B. So we x the node plce() s the responsible node w.r.t. the process P.. The responsible node noties the invoction time of the process to ll nodes, nd immeditely invokes the process loclly. 3. The other nodes except the responsible node receive the notiction, nd invoke the process whose time constrints re modied to mke the invoction time be virtully equl to tht of the responsible node. Recll tht the ctul locl time is reset to just fter the process invoction of ech node. To implement 3., we modify ech process P without prmeters in service specictions to P (e P ) with just one prmeter e P in protocol specictions (Restriction 4), nd replce every occurrence of t in the right hnd of the process denition of P with t + e P. The prmeter e P represents the dierence between the ctul invoction time nd virtul invoction time. For exmple, P (3) mens the process P with replcing its time constrint, for instnce, t 5, with t Corresponding to ech process invoction of P in the service speciction, we derive protocol speciction such tht (1.)the responsible node sends the current time t P to every other node just before invoking P (), nd (.)the other nodes invoke P (t? t P ) fter receiving t P from the responsible node. The time t? t P corresponds to the ctul communiction dely from the responsible node. Note tht the process P my be clled by nother process Q. In such cse, the vrible t in P (t? t P ) should be djusted to represent the virtul time t which Q hd been invoked. So it should be modied to P (t + e Q? e P ) if this process invoction occurs in the right hnd of the denition of process Q, where

8 t + e Q represents the virtul invoction time of Q. Exmple 8 P : 1 [ t 4 ^ x t]; b [t x + 5]; P []c 1 [5 t]; exit d 1mx 4, d 1mx 3 Node 1 P (e P ) : 1 [ t + e P 4 ^ x t + e P ^ 9t (t t + e P + d 1mx ^ t x + 5)]; s 1 (m1; x); r 1 (m3; t P ); P (t + e P? t P ) >> s (m4); exit[]c 1 [5 t + e P ]; exit Node P (e P ) : r 1 (m1; x); b [t + e P x + 5]; s 1 (m; x); s 1 (m3; t + e P ); P () []r 1 (m4); exit To mke this simultion possible, we check whether the strting ction of ech process cnnot be lte if the notiction from the responsible node would rech in mximum dely. For consistency, we include this checking into Restr(). If the checking is flse, the time constrint of the strting ction becomes \flse." Denition 9 If S P where P : B, Restr(S) is dened inductively s follows: Restr(S) def P where P : h(restr(b)) where h(restr(b)) is n expression obtined by replcing the time constrint Q k (t; x k ) of ech strting ction k of Restr(B) with Q k (t; x k ) ^ Q. Here k Q k is Presburger formul dened s follows : Q def ^ k f9t 9x k [t +d p;plce( k )mx ^ Q(t ; x k )]g p1;:::;n 3.3 Synthesis Algorithm The synthesis lgorithm consists of two prts: 1. For given service speciction S, n ssignment of ech ction to node, nd mximum dely d ij mx for ech pir of nodes, construct S Restr(S).. If S u S, i.e., S nd S re bisimultion equivlent when time is ignored[6], derive protocol entity speciction N ode i of ech node i from S. Otherwise, do not derive nd hlt. In [1], we hve dened trnsformtion T p (B) which derives protocol entity speciction of node p from service speciction described by the behviour expression B. Although we omit the precise denition of T p (B) in this pper becuse of the spce limittion, we summrize our result by the following theorem: Theorem 1 For given service speciction S, let S Restr(S). If S u S, the protocol speciction ft i (S )g i1;;:::;n is v t -correct w.r.t. the service speciction S. 4 Concluding Remrks In this pper, we hve proposed method to synthesize protocol specictions from timed service specictions written in LOTOS/T+. The proposed method enbles us to synthesize protocol specictions from both timed nd structured service speci- ctions. In contrst to [5], our method restricts the time constrints of service specictions, not of the communiction medi, becuse the dely of the medi depends on the physicl lines, so it is more dicult to chnge them thn those of the specictions. Moreover, our correctness criterion gurntees tht the control structure of the derived protocol speciction is full, not prtil, implementtion of tht of the service speciction. Using the sme timing extension s ours, our result should esily pply to other process models such s CCS. The future work is to extend the clss of service specictions nd to estblish frmework for evluting performnce spects of the derived protocol entity specictions. References [1] R. L. Probert nd K. Sleh, \Synthesis of communiction protocols: Survey nd ssessment," IEEE Trns. Comput., vol. 4, pp. 468{475, [] P. M. Chu nd M. T. Liu, \Protocol synthesis in stte trnsition model," in Proc. IEEE COMPSAC '88, pp. 55{51, [3] C. Knt, T. Higshino, nd G. v. Bochmnn, \Deriving protocol specictions from service specictions written in LOTOS," in Proc. of 1th Annul Int'l Phoenix Conf. on Computers nd Communictions (IPCCC'93), pp. 31{318, IEEE, [4] H. Ymguchi, K. Okno, T. Higshino, nd K. Tniguchi, \Synthesis of protocol entities' specictions from service specictions in Petri net model with registers," in Proc. of 15th IEEE Int'l Conf. on Distributed Computing Systems, pp.51{517, [5] A. Khoumsi, G. v. Bochmnn, nd R. Dssouli, \On specifying services nd synthesizing protocols for reltime pplictions," in Protocol Speciction, Testing nd Veriction, XIV, pp. 185{, IFIP, Chpmn & Hll, [6] A. Nkt, T. Higshino, nd K. Tniguchi, \LOTOS enhncement to specify time constrints mong nondjcent ctions using rst order logic," in Forml Description Techniques, VI (FORTE'93), pp. 451{466, IFIP, North-Hollnd, [7] ISO, LOTOS { A Forml Description Technique Bsed on the Temporl Ordering of Observtionl Behviour. IS 887, [8] K. Ysumoto, T. Higshino, nd K. Tniguchi, \Softwre process description using LOTOS nd its enction," in Proc. of 16th IEEE Int'l Conf. on Softwre Engineering (ICSE-16), pp. 169{179, [9] J. E. Hopcroft nd J. D. Ullmn, Introduction to Automt Theory, Lnguges nd Computtion. Addison-Wesley, [1] A. Nkt, T. Higshino, nd K. Tniguchi, \Synthesis of protocol entity specictions from timed nd structured service specictions," I.C.S. Reserch Report 95-ICS-5, Dept. of Informtion nd Computer Sciences, Osk University, 1995.

Roadmap of This Lecture

Roadmap of This Lecture Reltionl Model Rodmp of This Lecture Structure of Reltionl Dtbses Fundmentl Reltionl-Algebr-Opertions Additionl Reltionl-Algebr-Opertions Extended Reltionl-Algebr-Opertions Null Vlues Modifiction of the

More information

Addition and Subtraction

Addition and Subtraction Addition nd Subtrction Nme: Dte: Definition: rtionl expression A rtionl expression is n lgebric expression in frction form, with polynomils in the numertor nd denomintor such tht t lest one vrible ppers

More information

9.3. Regular Languages

9.3. Regular Languages 9.3. REGULAR LANGUAGES 139 9.3. Regulr Lnguges 9.3.1. Properties of Regulr Lnguges. Recll tht regulr lnguge is the lnguge ssocited to regulr grmmr, i.e., grmmr G = (N, T, P, σ) in which every production

More information

CH 71 COMPLETING THE SQUARE INTRODUCTION FACTORING PERFECT SQUARE TRINOMIALS

CH 71 COMPLETING THE SQUARE INTRODUCTION FACTORING PERFECT SQUARE TRINOMIALS CH 7 COMPLETING THE SQUARE INTRODUCTION I t s now time to py our dues regrding the Qudrtic Formul. Wht, you my sk, does this men? It mens tht the formul ws merely given to you once or twice in this course,

More information

UNinhabited aerial vehicles (UAVs) are becoming increasingly

UNinhabited aerial vehicles (UAVs) are becoming increasingly A Process Algebr Genetic Algorithm Sertc Krmn Tl Shim Emilio Frzzoli Abstrct A genetic lgorithm tht utilizes process lgebr for coding of solution chromosomes nd for defining evolutionry bsed opertors is

More information

INF 4130 Exercise set 4

INF 4130 Exercise set 4 INF 4130 Exercise set 4 Exercise 1 List the order in which we extrct the nodes from the Live Set queue when we do redth first serch of the following grph (tree) with the Live Set implemented s LIFO queue.

More information

A Fuzzy Inventory Model With Lot Size Dependent Carrying / Holding Cost

A Fuzzy Inventory Model With Lot Size Dependent Carrying / Holding Cost IOSR Journl of Mthemtics (IOSR-JM e-issn: 78-578,p-ISSN: 9-765X, Volume 7, Issue 6 (Sep. - Oct. 0, PP 06-0 www.iosrournls.org A Fuzzy Inventory Model With Lot Size Dependent Crrying / olding Cost P. Prvthi,

More information

3: Inventory management

3: Inventory management INSE6300 Ji Yun Yu 3: Inventory mngement Concordi Februry 9, 2016 Supply chin mngement is bout mking sequence of decisions over sequence of time steps, fter mking observtions t ech of these time steps.

More information

3/1/2016. Intermediate Microeconomics W3211. Lecture 7: The Endowment Economy. Today s Aims. The Story So Far. An Endowment Economy.

3/1/2016. Intermediate Microeconomics W3211. Lecture 7: The Endowment Economy. Today s Aims. The Story So Far. An Endowment Economy. 1 Intermedite Microeconomics W3211 Lecture 7: The Endowment Economy Introduction Columbi University, Spring 2016 Mrk Den: mrk.den@columbi.edu 2 The Story So Fr. 3 Tody s Aims 4 Remember: the course hd

More information

Cache CPI and DFAs and NFAs. CS230 Tutorial 10

Cache CPI and DFAs and NFAs. CS230 Tutorial 10 Cche CPI nd DFAs nd NFAs CS230 Tutoril 10 Multi-Level Cche: Clculting CPI When memory ccess is ttempted, wht re the possible results? ccess miss miss CPU L1 Cche L2 Cche Memory L1 cche hit L2 cche hit

More information

Chapter 2: Relational Model. Chapter 2: Relational Model

Chapter 2: Relational Model. Chapter 2: Relational Model Chpter : Reltionl Model Dtbse System Concepts, 5 th Ed. See www.db-book.com for conditions on re-use Chpter : Reltionl Model Structure of Reltionl Dtbses Fundmentl Reltionl-Algebr-Opertions Additionl Reltionl-Algebr-Opertions

More information

A Closer Look at Bond Risk: Duration

A Closer Look at Bond Risk: Duration W E B E X T E S I O 4C A Closer Look t Bond Risk: Durtion This Extension explins how to mnge the risk of bond portfolio using the concept of durtion. BOD RISK In our discussion of bond vlution in Chpter

More information

Synchronizing Asynchronous IOCO

Synchronizing Asynchronous IOCO Synchronizing Asynchronous IOCO Ned Noroozi 1,2, Rmtin Khosrvi 3, MohmmdRez Mousvi 1, nd Tim Willemse 1 1 Eindhoven University of Technology, Eindhoven, The Netherlnds 2 Fnp Corportion (IT Subsidiry of

More information

A ppendix to. I soquants. Producing at Least Cost. Chapter

A ppendix to. I soquants. Producing at Least Cost. Chapter A ppendix to Chpter 0 Producing t est Cost This ppendix descries set of useful tools for studying firm s long-run production nd costs. The tools re isoqunts nd isocost lines. I soqunts FIGURE A0. SHOWS

More information

164 CHAPTER 2. VECTOR FUNCTIONS

164 CHAPTER 2. VECTOR FUNCTIONS 164 CHAPTER. VECTOR FUNCTIONS.4 Curvture.4.1 Definitions nd Exmples The notion of curvture mesures how shrply curve bends. We would expect the curvture to be 0 for stright line, to be very smll for curves

More information

Arithmetic and Geometric Sequences

Arithmetic and Geometric Sequences Arithmetic nd Geometric Sequences A sequence is list of numbers or objects, clled terms, in certin order. In n rithmetic sequence, the difference between one term nd the next is lwys the sme. This difference

More information

Optimal firm's policy under lead time- and price-dependent demand: interest of customers rejection policy

Optimal firm's policy under lead time- and price-dependent demand: interest of customers rejection policy Optiml firm's policy under led time- nd price-dependent demnd: interest of customers rejection policy Abduh Syid Albn Université Grenoble Alpes, G-SCOP, F-38000 Grenoble, Frnce bduh-syid.lbn@grenoble-inp.org

More information

DYNAMIC PROGRAMMING REINFORCEMENT LEARNING. COGS 202 : Week 7 Presentation

DYNAMIC PROGRAMMING REINFORCEMENT LEARNING. COGS 202 : Week 7 Presentation DYNAMIC PROGRAMMING REINFORCEMENT LEARNING COGS 202 : Week 7 Preenttion OUTLINE Recp (Stte Vlue nd Action Vlue function) Computtion in MDP Dynmic Progrmming (DP) Policy Evlution Policy Improvement Policy

More information

The Okun curve is non-linear

The Okun curve is non-linear Economics Letters 70 (00) 53 57 www.elsevier.com/ locte/ econbse The Okun curve is non-liner Mtti Viren * Deprtment of Economics, 004 University of Turku, Turku, Finlnd Received 5 My 999; ccepted 0 April

More information

What is Monte Carlo Simulation? Monte Carlo Simulation

What is Monte Carlo Simulation? Monte Carlo Simulation Wht is Monte Crlo Simultion? Monte Crlo methods re widely used clss of computtionl lgorithms for simulting the ehvior of vrious physicl nd mthemticl systems, nd for other computtions. Monte Crlo lgorithm

More information

Measuring Search Trees

Measuring Search Trees Mesuring Serch Trees Christin Bessiere 1, Bruno Znuttini 2, nd Cèsr Fernández 3 1 LIRMM-CNRS, Montpellier, Frnce 2 GREYC, Cen, Frnce 3 Univ. de Lleid, Lleid, Spin Astrct. The SAT nd CSP communities mke

More information

(a) by substituting u = x + 10 and applying the result on page 869 on the text, (b) integrating by parts with u = ln(x + 10), dv = dx, v = x, and

(a) by substituting u = x + 10 and applying the result on page 869 on the text, (b) integrating by parts with u = ln(x + 10), dv = dx, v = x, and Supplementry Questions for HP Chpter 5. Derive the formul ln( + 0) d = ( + 0) ln( + 0) + C in three wys: () by substituting u = + 0 nd pplying the result on pge 869 on the tet, (b) integrting by prts with

More information

Chapter 3: The Reinforcement Learning Problem. The Agent'Environment Interface. Getting the Degree of Abstraction Right. The Agent Learns a Policy

Chapter 3: The Reinforcement Learning Problem. The Agent'Environment Interface. Getting the Degree of Abstraction Right. The Agent Learns a Policy Chpter 3: The Reinforcement Lerning Problem The Agent'Environment Interfce Objectives of this chpter: describe the RL problem we will be studying for the reminder of the course present idelized form of

More information

Outline. CSE 326: Data Structures. Priority Queues Leftist Heaps & Skew Heaps. Announcements. New Heap Operation: Merge

Outline. CSE 326: Data Structures. Priority Queues Leftist Heaps & Skew Heaps. Announcements. New Heap Operation: Merge CSE 26: Dt Structures Priority Queues Leftist Heps & Skew Heps Outline Announcements Leftist Heps & Skew Heps Reding: Weiss, Ch. 6 Hl Perkins Spring 2 Lectures 6 & 4//2 4//2 2 Announcements Written HW

More information

UNIVERSITY OF NOTTINGHAM. Discussion Papers in Economics BERTRAND VS. COURNOT COMPETITION IN ASYMMETRIC DUOPOLY: THE ROLE OF LICENSING

UNIVERSITY OF NOTTINGHAM. Discussion Papers in Economics BERTRAND VS. COURNOT COMPETITION IN ASYMMETRIC DUOPOLY: THE ROLE OF LICENSING UNIVERSITY OF NOTTINGHAM Discussion Ppers in Economics Discussion Pper No. 0/0 BERTRAND VS. COURNOT COMPETITION IN ASYMMETRIC DUOPOLY: THE ROLE OF LICENSING by Arijit Mukherjee April 00 DP 0/0 ISSN 160-48

More information

UNIT 7 SINGLE SAMPLING PLANS

UNIT 7 SINGLE SAMPLING PLANS UNIT 7 SINGLE SAMPLING PLANS Structure 7. Introduction Objectives 7. Single Smpling Pln 7.3 Operting Chrcteristics (OC) Curve 7.4 Producer s Risk nd Consumer s Risk 7.5 Averge Outgoing Qulity (AOQ) 7.6

More information

CS 188 Introduction to Artificial Intelligence Fall 2018 Note 4

CS 188 Introduction to Artificial Intelligence Fall 2018 Note 4 CS 188 Introduction to Artificil Intelligence Fll 2018 Note 4 These lecture notes re hevily bsed on notes originlly written by Nikhil Shrm. Non-Deterministic Serch Picture runner, coming to the end of

More information

Behavioural Differential Equations and Coinduction for Binary Trees

Behavioural Differential Equations and Coinduction for Binary Trees Behviourl Differentil Equtions nd Coinduction for Binry Trees Alexndr Silv nd Jn Rutten,2 Centrum voor Wiskunde en Informtic (CWI) 2 Vrije Universiteit Amsterdm (VUA) {ms,jnr}@cwi.nl Abstrct. We study

More information

Research Article Existence of Positive Solution to Second-Order Three-Point BVPs on Time Scales

Research Article Existence of Positive Solution to Second-Order Three-Point BVPs on Time Scales Hindwi Publishing Corportion Boundry Vlue Problems Volume 2009, Article ID 685040, 6 pges doi:10.1155/2009/685040 Reserch Article Existence of Positive Solution to Second-Order hree-point BVPs on ime Scles

More information

MARKET POWER AND MISREPRESENTATION

MARKET POWER AND MISREPRESENTATION MARKET POWER AND MISREPRESENTATION MICROECONOMICS Principles nd Anlysis Frnk Cowell Note: the detil in slides mrked * cn only e seen if you run the slideshow July 2017 1 Introduction Presenttion concerns

More information

Today s Outline. One More Operation. Priority Queues. New Operation: Merge. Leftist Heaps. Priority Queues. Admin: Priority Queues

Today s Outline. One More Operation. Priority Queues. New Operation: Merge. Leftist Heaps. Priority Queues. Admin: Priority Queues Tody s Outline Priority Queues CSE Dt Structures & Algorithms Ruth Anderson Spring 4// Admin: HW # due this Thursdy / t :9pm Printouts due Fridy in lecture. Priority Queues Leftist Heps Skew Heps 4// One

More information

A portfolio approach to the optimal funding of pensions

A portfolio approach to the optimal funding of pensions Economics Letters 69 (000) 01 06 www.elsevier.com/ locte/ econbse A portfolio pproch to the optiml funding of pensions Jysri Dutt, Sndeep Kpur *, J. Michel Orszg b, b Fculty of Economics University of

More information

3. Argumentation Frameworks

3. Argumentation Frameworks 3. Argumenttion Frmeworks Argumenttion current hot topic in AI. Historiclly more recent thn other pproches discussed here. Bsic ide: to construct cceptble set(s) of beliefs from given KB: 1 construct rguments

More information

Continuous Optimal Timing

Continuous Optimal Timing Srlnd University Computer Science, Srbrücken, Germny My 6, 205 Outline Motivtion Preliminries Existing Algorithms Our Algorithm Empiricl Evlution Conclusion Motivtion Probbilistic models unrelible/unpredictble

More information

Chapter55. Algebraic expansion and simplification

Chapter55. Algebraic expansion and simplification Chpter55 Algebric expnsion nd simplifiction Contents: A The distributive lw B The product ( + b)(c + d) C Difference of two squres D Perfect squres expnsion E Further expnsion F The binomil expnsion 88

More information

FINANCIAL ANALYSIS I. INTRODUCTION AND METHODOLOGY

FINANCIAL ANALYSIS I. INTRODUCTION AND METHODOLOGY Dhk Wter Supply Network Improvement Project (RRP BAN 47254003) FINANCIAL ANALYSIS I. INTRODUCTION AND METHODOLOGY A. Introduction 1. The Asin Development Bnk (ADB) finncil nlysis of the proposed Dhk Wter

More information

Problem Set for Chapter 3: Simple Regression Analysis ECO382 Econometrics Queens College K.Matsuda

Problem Set for Chapter 3: Simple Regression Analysis ECO382 Econometrics Queens College K.Matsuda Problem Set for Chpter 3 Simple Regression Anlysis ECO382 Econometrics Queens College K.Mtsud Excel Assignments You re required to hnd in these Excel Assignments by the due Mtsud specifies. Legibility

More information

)''/?\Xck_

)''/?\Xck_ bcbsnc.com Deductible options: $250, $500, $1,000 or $2,500 Deductible options $500, $1,000, $2,500, $3,500 or $5,000 D or (100% coinsurnce is not vilble on the $2,500 deductible option) coinsurnce plns:

More information

MATH 236 ELAC MATH DEPARTMENT FALL 2017 SHORT ANSWER. Write the word or phrase that best completes each statement or answers the question.

MATH 236 ELAC MATH DEPARTMENT FALL 2017 SHORT ANSWER. Write the word or phrase that best completes each statement or answers the question. MATH 236 ELAC MATH DEPARTMENT FALL 2017 TEST 1 REVIEW SHORT ANSWER. Write the word or phrse tht best completes ech sttement or nswers the question. 1) The supply nd demnd equtions for certin product re

More information

Option exercise with temptation

Option exercise with temptation Economic Theory 2008) 34: 473 501 DOI 10.1007/s00199-006-0194-3 RESEARCH ARTICLE Jinjun Mio Option exercise with tempttion Received: 25 Jnury 2006 / Revised: 5 December 2006 / Published online: 10 Jnury

More information

International Budget Partnership OPEN BUDGET QUESTIONNAIRE POLAND

International Budget Partnership OPEN BUDGET QUESTIONNAIRE POLAND Interntionl Budget Prtnership OPEN BUDGET QUESTIONNAIRE POLAND September 28, 2007 Interntionl Budget Prtnership Center on Budget nd Policy Priorities 820 First Street, NE Suite 510 Wshington, DC 20002

More information

checks are tax current income.

checks are tax current income. Humn Short Term Disbility Pln Wht is Disbility Insurnce? An esy explntion is; Disbility Insurnce is protection for your pycheck. Imgine if you were suddenly disbled, unble to work, due to n ccident or

More information

PSAKUIJIR Vol. 4 No. 2 (July-December 2015)

PSAKUIJIR Vol. 4 No. 2 (July-December 2015) Resonble Concession Period for Build Operte Trnsfer Contrct Projects: A Cse Study of Theun-Hiboun Hydropower Dm Project nd Ntionl Rod No. 14 A Project Pnysith Vorsing * nd Dr.Sounthone Phommsone ** Abstrct

More information

JFE Online Appendix: The QUAD Method

JFE Online Appendix: The QUAD Method JFE Online Appendix: The QUAD Method Prt of the QUAD technique is the use of qudrture for numericl solution of option pricing problems. Andricopoulos et l. (00, 007 use qudrture s the only computtionl

More information

Time Scales: From Nabla Calculus to Delta Calculus and Vice Versa via Duality

Time Scales: From Nabla Calculus to Delta Calculus and Vice Versa via Duality Interntionl Journl of Difference Equtions ISSN 0973-6069, Volume 5, Number 1, pp. 25 40 (2010) http://cmpus.mst.edu/ijde Time Scles: From Nbl Clculus to Delt Clculus nd Vice Vers vi Dulity M. Cristin Cputo

More information

Burrows-Wheeler Transform and FM Index

Burrows-Wheeler Transform and FM Index Burrows-Wheeler Trnsform nd M Index Ben ngmed You re free to use these slides. If you do, plese sign the guestbook (www.lngmed-lb.org/teching-mterils), or emil me (ben.lngmed@gmil.com) nd tell me briefly

More information

The Market Approach to Valuing Businesses (Second Edition)

The Market Approach to Valuing Businesses (Second Edition) BV: Cse Anlysis Completed Trnsction & Guideline Public Comprble MARKET APPROACH The Mrket Approch to Vluing Businesses (Second Edition) Shnnon P. Prtt This mteril is reproduced from The Mrket Approch to

More information

Smart Investment Strategies

Smart Investment Strategies Smrt Investment Strtegies Risk-Rewrd Rewrd Strtegy Quntifying Greed How to mke good Portfolio? Entrnce-Exit Exit Strtegy: When to buy? When to sell? 2 Risk vs.. Rewrd Strtegy here is certin mount of risk

More information

Name Date. Find the LCM of the numbers using the two methods shown above.

Name Date. Find the LCM of the numbers using the two methods shown above. Lest Common Multiple Multiples tht re shred by two or more numbers re clled common multiples. The lest of the common multiples is clled the lest common multiple (LCM). There re severl different wys to

More information

Reinforcement Learning. CS 188: Artificial Intelligence Fall Grid World. Markov Decision Processes. What is Markov about MDPs?

Reinforcement Learning. CS 188: Artificial Intelligence Fall Grid World. Markov Decision Processes. What is Markov about MDPs? CS 188: Artificil Intelligence Fll 2010 Lecture 9: MDP 9/2/2010 Reinforcement Lerning [DEMOS] Bic ide: Receive feedbck in the form of rewrd Agent utility i defined by the rewrd function Mut (lern to) ct

More information

Rates of Return of the German PAYG System - How they can be measured and how they will develop

Rates of Return of the German PAYG System - How they can be measured and how they will develop Rtes of Return of the Germn PAYG System - How they cn be mesured nd how they will develop Christin Benit Wilke 97-2005 me Mnnheimer Forschungsinstitut Ökonomie und Demogrphischer Wndel Gebäude L 13, 17_D-68131

More information

Controlling a population of identical MDP

Controlling a population of identical MDP Controlling popultion of identicl MDP Nthlie Bertrnd Inri Rennes ongoing work with Miheer Dewskr (CMI), Blise Genest (IRISA) nd Hugo Gimert (LBRI) Trends nd Chllenges in Quntittive Verifiction Mysore,

More information

Effects of Entry Restriction on Free Entry General Competitive Equilibrium. Mitsuo Takase

Effects of Entry Restriction on Free Entry General Competitive Equilibrium. Mitsuo Takase CAES Working Pper Series Effects of Entry Restriction on Free Entry Generl Competitive Euilirium Mitsuo Tkse Fculty of Economics Fukuok University WP-2018-006 Center for Advnced Economic Study Fukuok University

More information

PSAS: Government transfers what you need to know

PSAS: Government transfers what you need to know PSAS: Government trnsfers wht you need to know Ferury 2018 Overview This summry will provide users with n understnding of the significnt recognition, presenttion nd disclosure requirements of the stndrd.

More information

Chapter 4. Profit and Bayesian Optimality

Chapter 4. Profit and Bayesian Optimality Chpter 4 Profit nd Byesin Optimlity In this chpter we consider the objective of profit. The objective of profit mximiztion dds significnt new chllenge over the previously considered objective of socil

More information

NORTH YORKSHIRE PENSION FUND GOVERNANCE COMPLIANCE STATEMENT

NORTH YORKSHIRE PENSION FUND GOVERNANCE COMPLIANCE STATEMENT NORTH YORKSHIRE PENSION FUND GOVERNANCE COMPLIANCE STATEMENT TABLE OF CONTENTS Section Pge 1 INTRODUCTION 2 2 GOVERNANCE ARRANGEMENTS 2 3 REPRESENTATION AND MEETINGS 4 4 OPERATIONAL PROCEDRES 5 5 KEY POLICY

More information

Autarky more likely than complete specialization

Autarky more likely than complete specialization Autrky more likely thn complete specilition Antonio Quesd Deprtment d Economi, Universitt Rovir i Virgili, Avingud de l Universitt, 4304 Reus, Spin 3th Jnury 00 38.9 Astrct This pper mesures the strength

More information

Exhibit A Covered Employee Notification of Rights Materials Regarding Allied Managed Care Incorporated Allied Managed Care MPN MPN ID # 2360

Exhibit A Covered Employee Notification of Rights Materials Regarding Allied Managed Care Incorporated Allied Managed Care MPN MPN ID # 2360 Covered Notifiction of Rights Mterils Regrding Allied Mnged Cre Incorported Allied Mnged Cre MPN This pmphlet contins importnt informtion bout your medicl cre in cse of workrelted injmy or illness You

More information

OPEN BUDGET QUESTIONNAIRE SOUTH AFRICA

OPEN BUDGET QUESTIONNAIRE SOUTH AFRICA Interntionl Budget Prtnership OPEN BUDGET QUESTIONNAIRE SOUTH AFRICA September 28, 2007 Interntionl Budget Prtnership Center on Budget nd Policy Priorities 820 First Street, NE Suite 510 Wshington, DC

More information

1. Detailed information about the Appellant s and Respondent s personal information including mobile no. and -id are to be furnished.

1. Detailed information about the Appellant s and Respondent s personal information including mobile no. and  -id are to be furnished. Revised Form 36 nd Form 36A for filing ppel nd cross objection respectively before income tx ppellte tribunl (Notifiction No. 72 dted 23.10.2018) Bckground CBDT issued drft notifiction vide press relese

More information

Do We Really Need Gaussian Filters for Feature Detection? (Supplementary Material)

Do We Really Need Gaussian Filters for Feature Detection? (Supplementary Material) Do We Relly Need Gussin Filters for Feture Detection? (Supplementry Mteril) Lee-Kng Liu, Stnley H. Chn nd Truong Nguyen Februry 5, 0 This document is supplementry mteril to the pper submitted to EUSIPCO

More information

OPEN BUDGET QUESTIONNAIRE FRANCE

OPEN BUDGET QUESTIONNAIRE FRANCE Interntionl Budget Project OPEN BUDGET QUESTIONNAIRE FRANCE October 2005 Interntionl Budget Project Center on Budget nd Policy Priorities 820 First Street, NE Suite 510 Wshington, DC 20002 www.interntionlbudget.org

More information

Technical Appendix. The Behavior of Growth Mixture Models Under Nonnormality: A Monte Carlo Analysis

Technical Appendix. The Behavior of Growth Mixture Models Under Nonnormality: A Monte Carlo Analysis Monte Crlo Technicl Appendix 1 Technicl Appendix The Behvior of Growth Mixture Models Under Nonnormlity: A Monte Crlo Anlysis Dniel J. Buer & Ptrick J. Currn 10/11/2002 These results re presented s compnion

More information

Outline. CS 188: Artificial Intelligence Spring Speeding Up Game Tree Search. Minimax Example. Alpha-Beta Pruning. Pruning

Outline. CS 188: Artificial Intelligence Spring Speeding Up Game Tree Search. Minimax Example. Alpha-Beta Pruning. Pruning CS 188: Artificil Intelligence Spring 2011 Lecture 8: Gme, MDP 2/14/2010 Pieter Abbeel UC Berkeley Mny lide dpted from Dn Klein Outline Zero-um determinitic two plyer gme Minimx Evlution function for non-terminl

More information

Asymptotic Stability of a Rate Control System. with Communication Delays

Asymptotic Stability of a Rate Control System. with Communication Delays Asymptotic Stbility of Rte Control System with Communiction Delys Richrd J. L nd Priy Rnjn University of Mrylnd, College Prk {hyongl, priy}@eng.umd.edu 1 Abstrct We study the issue of symptotic stbility

More information

Math F412: Homework 4 Solutions February 20, κ I = s α κ α

Math F412: Homework 4 Solutions February 20, κ I = s α κ α All prts of this homework to be completed in Mple should be done in single worksheet. You cn submit either the worksheet by emil or printout of it with your homework. 1. Opre 1.4.1 Let α be not-necessrily

More information

Database System Concepts, 5 th Ed. Silberschatz, Korth and Sudarshan See for conditions on re-use

Database System Concepts, 5 th Ed. Silberschatz, Korth and Sudarshan See  for conditions on re-use Chpter 2: Reltionl Model Dtbse System Concepts, 5 th Ed. See www.db-book.com for conditions on re-use Bnking Exmple brnch (brnch_nme, brnch_city, ssets) customer (customer_nme, customer_street, customer_city)

More information

Access your online resources today at

Access your online resources today at 978--07-670- - CmbridgeMths: NSW Syllbus for the Austrlin Curriculum: Yer 0: Stte./. Access your online resources tody t www.cmbridge.edu.u/go. Log in to your existing Cmbridge GO user ccount or crete

More information

A Short Introduction to Abstract Argumentation Frameworks

A Short Introduction to Abstract Argumentation Frameworks A Short Introduction to Abstrct Argumenttion Frmeworks Stefn Woltrn Technische Universität Wien Gerhrd Brewk Universität Leipzig November 2009 () Abstrct Argumenttion Frmeworks November 2009 1 / 20 Argumenttion

More information

OPEN BUDGET QUESTIONNAIRE UKRAINE

OPEN BUDGET QUESTIONNAIRE UKRAINE Interntionl Budget Prtnership OPEN BUDGET QUESTIONNAIRE UKRAINE September 28, 2007 Interntionl Budget Prtnership Center on Budget nd Policy Priorities 820 First Street, NE Suite 510 Wshington, DC 20002

More information

Multi-Step Reinforcement Learning: A Unifying Algorithm

Multi-Step Reinforcement Learning: A Unifying Algorithm Multi-Step Reinforcement Lerning: A Unifying Algorithm Kristopher De Asis, 1 J. Fernndo Hernndez-Grci, 1 G. Zchris Hollnd, 1 Richrd S. Sutton Reinforcement Lerning nd Artificil Intelligence Lbortory, University

More information

The Saga of Reduced Factorizations of Elements of the Symmetric Group

The Saga of Reduced Factorizations of Elements of the Symmetric Group Topics in Algebric Combintorics LECTURE NOTES April, 00 The Sg of Reduced Fctoriztions of Elements of the Symmetric Group by A. M. Grsi Abstrct These notes cover the contents of series of lectures in Topics

More information

On-demand, Spot, or Both: Dynamic Resource Allocation for Executing Batch Jobs in the Cloud

On-demand, Spot, or Both: Dynamic Resource Allocation for Executing Batch Jobs in the Cloud On-demnd, Spot, or Both: Dynmic Resource Alloction for Executing Btch Jobs in the Cloud Ishi Menche Microsoft Reserch Ohd Shmir Weizmnn Institute Nvendu Jin Microsoft Reserch Abstrct Cloud computing provides

More information

STAT 472 Fall 2016 Test 2 November 8, 2016

STAT 472 Fall 2016 Test 2 November 8, 2016 STAT 47 Fll 016 Test November 8, 016 1. Anne who is (65) buys whole life policy with deth benefit of 00,000 pyble t the end of the yer of deth. The policy hs nnul premiums pyble for life. The premiums

More information

OPEN BUDGET QUESTIONNAIRE

OPEN BUDGET QUESTIONNAIRE Interntionl Budget Prtnership OPEN BUDGET QUESTIONNAIRE SOUTH KOREA September 28, 2007 Interntionl Budget Prtnership Center on Budget nd Policy Priorities 820 First Street, NE Suite 510 Wshington, DC 20002

More information

BERNARD M.BARUCH 597 MADISON AVENUE NEW YORK 22, N. Y.

BERNARD M.BARUCH 597 MADISON AVENUE NEW YORK 22, N. Y. BERNARD M.BARUCH 597 MADISON AVENUE NEW YORK 22, N. Y. Mrch 11, 1947. Mr. Mrriner S. Eccles, Federl Reserve System, Wshington, D.C. My der Mr. Eccles: Is the enclosed bill stisfctory to you nd hs it ny

More information

Open Space Allocation and Travel Costs

Open Space Allocation and Travel Costs Open Spce Alloction nd Trvel Costs By Kent Kovcs Deprtment of Agriculturl nd Resource Economics University of Cliforni, Dvis kovcs@priml.ucdvis.edu Pper prepred for presenttion t the Americn Agriculturl

More information

First version: September 1997 This version: October On the Relevance of Modeling Volatility for Pricing Purposes

First version: September 1997 This version: October On the Relevance of Modeling Volatility for Pricing Purposes First version: September 1997 This version: October 1999 On the Relevnce of Modeling Voltility for Pricing Purposes Abstrct: Mnuel Moreno 3 Deprtment of Economics nd Business Universitt Pompeu Fbr Crrer

More information

On the Complexity of Computing the Justification Status of an Argument

On the Complexity of Computing the Justification Status of an Argument On the Complexity of Computing the Justifiction Sttus of n Argument dbi Reserch Seminr, Vienn Wolfgng Dvořák Institute of Informtion Systems, Vienn University of Technology Oct 13, 2011 Supported by the

More information

PSJ Model Guidebook. Prepared: March 2011 Revised: April 2016 Japan Securities Dealers Association PSJ Calculation Statistics Council

PSJ Model Guidebook. Prepared: March 2011 Revised: April 2016 Japan Securities Dealers Association PSJ Calculation Statistics Council PJ Model Guidebook Prepred: Mrch 0 Revised: April 06 Jpn ecurities Delers Assocition PJ Clcultion ttistics Council Tble of Contents Forwrd to the English Lnguge Version... Forwrd to the Jpnese Lnguge Version...

More information

CHAPTER-IV PRE-TEST ESTIMATOR OF REGRESSION COEFFICIENTS: PERFORMANCE UNDER LINEX LOSS FUNCTION

CHAPTER-IV PRE-TEST ESTIMATOR OF REGRESSION COEFFICIENTS: PERFORMANCE UNDER LINEX LOSS FUNCTION CHAPTER-IV PRE-TEST ESTIMATOR OF REGRESSION COEFFICIENTS: PERFORMANCE UNDER LINEX LOSS FUNCTION 4.1 INTRODUCTION It hs lredy been demonstrted tht the restricted lest squres estimtor is more efficient thn

More information

OPEN BUDGET QUESTIONNAIRE MACEDONIA

OPEN BUDGET QUESTIONNAIRE MACEDONIA Interntionl Budget Prtnership OPEN BUDGET QUESTIONNAIRE MACEDONIA September 28, 2007 Interntionl Budget Prtnership Center on Budget nd Policy Priorities 820 First Street, NE Suite 510 Wshington, DC 20002

More information

JOURNAL THE ERGODIC TM CANDLESTICK OSCILLATOR ROBERT KRAUSZ'S. Volume 1, Issue 7

JOURNAL THE ERGODIC TM CANDLESTICK OSCILLATOR ROBERT KRAUSZ'S. Volume 1, Issue 7 ROBERT KRUSZ'S JOURNL Volume 1, Issue 7 THE ERGODIC TM CNDLESTICK OSCILLTOR S ometimes we re lucky (due to our diligence) nd we find tool tht is useful nd does the jo etter thn previous tools, or nswers

More information

Pillar 3 Quantitative Disclosure

Pillar 3 Quantitative Disclosure Pillr 3 Quntittive Disclosure In complince with the requirements under Bsel Pillr 3 nd the Monetry Authority of Singpore (MAS) Notice 637 Public Disclosure, vrious dditionl quntittive nd qulittive disclosures

More information

COMPLETE COVER - `ADD ON' TO TRAVEL INSURANCE POLICIES CONFERENCE & EVENT ORGANISERS SCHEDULE

COMPLETE COVER - `ADD ON' TO TRAVEL INSURANCE POLICIES CONFERENCE & EVENT ORGANISERS SCHEDULE SPECIMEN ONLY COMPLETE COVER - `ADD ON' TO TRAVEL INSURANCE POLICIES CONFERENCE & EVENT ORGANISERS SCHEDULE Policy Numer: Policyholder: Certificte of Insurnce: PPIP(E) Period of Insurnce: Finncil Loss:

More information

PRICING CONVERTIBLE BONDS WITH KNOWN INTEREST RATE. Jong Heon Kim

PRICING CONVERTIBLE BONDS WITH KNOWN INTEREST RATE. Jong Heon Kim Kngweon-Kyungki Mth. Jour. 14 2006, No. 2, pp. 185 202 PRICING CONVERTIBLE BONDS WITH KNOWN INTEREST RATE Jong Heon Kim Abstrct. In this pper, using the Blck-Scholes nlysis, we will derive the prtil differentil

More information

THE FINAL PROOF SUPPORTING THE TURNOVER FORMULA.

THE FINAL PROOF SUPPORTING THE TURNOVER FORMULA. THE FINAL PROOF SUPPORTING THE TURNOVER FORMULA. I would like to thnk Aris for his mthemticl contriutions nd his swet which hs enled deeper understnding of the turnover formul to emerge. His contriution

More information

International Budget Partnership OPEN BUDGET QUESTIONNAIRE Sri Lanka, September 2009

International Budget Partnership OPEN BUDGET QUESTIONNAIRE Sri Lanka, September 2009 Interntionl Budget Prtnership OPEN BUDGET QUESTIONNAIRE Sri Lnk, September 2009 Interntionl Budget Prtnership Center on Budget nd Policy Priorities 820 First Street NE, Suite 510 Wshington, DC 20002 www.interntionlbudget.org

More information

ASYMMETRIC SWITCHING COSTS CAN IMPROVE THE PREDICTIVE POWER OF SHY S MODEL

ASYMMETRIC SWITCHING COSTS CAN IMPROVE THE PREDICTIVE POWER OF SHY S MODEL Document de trvil 2012-14 / April 2012 ASYMMETRIC SWITCHIG COSTS CA IMPROVE THE PREDICTIVE POWER OF SHY S MODEL Evens Slies OFCE-Sciences-Po Asymmetric switching costs cn improve the predictive power of

More information

1 Manipulation for binary voters

1 Manipulation for binary voters STAT 206A: Soil Choie nd Networks Fll 2010 Mnipultion nd GS Theorem Otoer 21 Leturer: Elhnn Mossel Srie: Kristen Woyh In this leture we over mnipultion y single voter: whether single voter n lie out his

More information

Complete the table below to show the fixed, variable and total costs. In the final column, calculate the profit or loss made by J Kane.

Complete the table below to show the fixed, variable and total costs. In the final column, calculate the profit or loss made by J Kane. Tsk 1 J Kne sells mchinery to the frm industry. His fixed costs re 10,000 nd ech mchine costs him 400 to buy. He sells them t 600 nd is trying to work out his profit or loss t vrious levels of sles. He

More information

OPEN BUDGET QUESTIONNAIRE

OPEN BUDGET QUESTIONNAIRE Interntionl Budget Project OPEN BUDGET QUESTIONNAIRE UNITED STATES October 2005 Interntionl Budget Project Center on Budget nd Policy Priorities 820 First Street, NE Suite 510 Wshington, DC 20002 www.interntionlbudget.org

More information

Fractal Analysis on the Stock Price of C to C Electronic Commerce Enterprise Ming Chen

Fractal Analysis on the Stock Price of C to C Electronic Commerce Enterprise Ming Chen 6th Interntionl Conference on Electronic, Mechnicl, Informtion nd Mngement (EMIM 2016) Frctl Anlysis on the Stock Price of C to C Electronic Commerce Enterprise Ming Chen Soochow University, Suzhou, Chin

More information

What Makes a Better Annuity?

What Makes a Better Annuity? Wht Mkes Better Annuity? Json S. Scott, John G. Wtson, nd Wei-Yin Hu My 2009 PRC WP2009-03 Pension Reserch Council Working Pper Pension Reserch Council The Whrton School, University of Pennsylvni 3620

More information

Ricardian Model. Mercantilism: 17 th and 18 th Century. Adam Smith s Absolute Income Hypothesis, End of 18 th Century: Major Shift in Paradigm

Ricardian Model. Mercantilism: 17 th and 18 th Century. Adam Smith s Absolute Income Hypothesis, End of 18 th Century: Major Shift in Paradigm Mercntilism: th nd th Century Ricrdin Model lesson in Comprtive dvntge Trde ws considered s Zero-Sum Gme It ws viewed mens to ccumulte Gold & Silver Exports were encourged Imports were discourged End of

More information

OPEN BUDGET QUESTIONNAIRE CZECH REPUBLIC

OPEN BUDGET QUESTIONNAIRE CZECH REPUBLIC Interntionl Budget Project OPEN BUDGET QUESTIONNAIRE CZECH REPUBLIC October 2005 Interntionl Budget Project Center on Budget nd Policy Priorities 820 First Street, NE Suite 510 Wshington, DC 20002 www.interntionlbudget.org

More information

Problem Set 2 Suggested Solutions

Problem Set 2 Suggested Solutions 4.472 Prolem Set 2 Suggested Solutions Reecc Zrutskie Question : First find the chnge in the cpitl stock, k, tht will occur when the OLG economy moves to the new stedy stte fter the government imposes

More information

The Morgan Stanley FTSE Growth Optimiser Plan

The Morgan Stanley FTSE Growth Optimiser Plan The Morgn Stnley FTSE Growth Optimiser Pln Offering choice of two FTSE 100 linked growth plns Choose the growth nd risk profile tht meets your investment needs The Morgn Stnley FTSE 100 Growth Optimiser

More information

Inequality and the GB2 income distribution

Inequality and the GB2 income distribution Working Pper Series Inequlity nd the GB2 income distribution Stephen P. Jenkins ECINEQ WP 2007 73 ECINEC 2007-73 July 2007 www.ecineq.org Inequlity nd the GB2 income distribution Stephen P. Jenkins* University

More information

Pillar 3 Quantitative Disclosure

Pillar 3 Quantitative Disclosure Pillr 3 Quntittive Disclosure In complince with the requirements under Bsel Pillr 3 nd the Monetry Authority of Singpore (MAS) Notice 637 Public Disclosure, vrious dditionl quntittive nd qulittive disclosures

More information