Agenda. Specification models and their analysis. Agenda. Part I. Binary Decision Diagrams. Graph Theory: Some Definitions. Introduction to Petri Nets

Size: px
Start display at page:

Download "Agenda. Specification models and their analysis. Agenda. Part I. Binary Decision Diagrams. Graph Theory: Some Definitions. Introduction to Petri Nets"

Transcription

1 Agenda Specification models and their analysis Kai Lampka November 9, 29 Graph Theory: Some Definitions 2 Introduction to Petri Nets 3 Introduction to Computation Tree Logic and related model checking techniques 4 Introduction to Binary Decision Diagrams Specification models and their analysis: 36 Agenda Part I Binary Decision Diagramms Graph Theoretic Foundations 2 Petri Nets 3 Computation Tree Logic and related model checking techniques 4 Binary Decision Diagrams 5 Timed Automata and timed CTL

2 Binary Decision Diagrams: Zusammenfassung Binary Decision Tree Binäre Entscheidungsdiagramme sind bi-partite, ungewichtete, zyklenfreie Digraphen, in denen ein jeder inneren Knoten jeweils genau 2 Nachfolger hat, naemlich den -Nachfolger und de-nachfolger. Die Shannon-Expansion ordnet jedem Binären Entscheidungsdiagramm genau eine Boolesche Funktion zu. Da sich andersherum jede Boolesche Funktion durch und genau mit einem BDD darstellen lässt, sind BDDs kanonische Darstellung von Booleschen Funktionen. Ihre Verbindung zur Schaltalgebra ist somit evident. In den letzte Dekaden sind BDDs sehr gründlich erforscht worden und es existieren viele abgeleitete Formen, sowie effiziente Algorithmen zu ihrer Manipulierung. Letztendlich bilden BDDs und ihre verwandten Datentypen ein wichtiges Fundament im Very-large-scale integration (VLSI) Design und im Bereich des Model checkings. Da BDDs letztendlich eine Implementierung einer endlichen Booleschen Algebra darstellen spricht man in diesem Zusammenhang oft auch von symbolischen Verfahren, bspw. vom symbolischen Model checking. Specification models and their analysis: Binary Decision Diagramms 5 36 A Binary Decision Tree (BDT) is a bi-partite tree consisting of a set of inner nodes (NNT ) and a set of terminal nodes (NT ) with N := NNT NT. n x 6 2 Nodes are connected via - and -edges: NNT N and NNT N We read the tree from top to bottom, hence we can omitt the arrow heads Each inner node (circle) is asscoiated with a node label ni and a variable xj, e. g. var() = A dashed line leads to the -successor, the solid line to the -successor, e. g. child(n) = n3; child(n) = n2 Each terminal node is associated with a function value from B := {, }, e. g. value(t) = Specification models and their analysis: Binary Decision Diagramms 6 36 Variable Ordering Semantics For algorithmically working with BDDs it turns out that they should be ordered w.r.t. the variables of V. To do so one simply defines a total order V V and requires n NNT : n = child,(m) var(m) var(n) n x 6 3 What is the Boolean function represented by the BDT? What is the space complexity for representing Boolean functions with BDT? Shannon expansion for Boolean functions: f (x,... xn) = x f(x2,..., xn) + ( x) f(x2,..., xn) instead of the Boolean operators (,, ) we employ their arithmetic counterparts, e. g. x ( x), etc.. The recursion tree of a Shannon expansion is exactly what is represented by a BDT. Let BDT-node k be labelled with variable x. According to the Shannon expansion it represents the n-ary Boolean function f (x,..., xn). Its -successor represents than f(x2,..., xn) and its -successor represents function f(x2,..., xn). Function f(x,...,, xi+,..., xn) is denoted -cofactor of function f w. r. t. variable xi. Function f(x,...,, xi+,..., xn) is denoted -cofactor of function f w. r. t. variable xi. For the co-factors we also adapt the notation f x i :=b with b {, } A terminal node represents the -ary, constant or -function. Specification models and their analysis: Binary Decision Diagramms 7 36 Specification models and their analysis: Binary Decision Diagramms 8 36

3 Semantics According to the above discussion each BDT-node represents a Boolean function. We (recursively) define the equivalence relation on the set of BDT-nodes (N = NNT NT ) as follows: for two terminal BDT-nodes t, p NT : t p value(t) = value(p) Let node n represent function f n and let node k represent function f k : for two non-terminal BDT-nodes n, k NNT : Questio.: How can we decide if n k child(n) child(k) child(n) child(k) f n f k holds? equivalent, i. e., p t iff According to the above discussion each BDT-node represents a Boolean function. Questio.2: How does this effect the size of the obtained graphs? Specification models and their analysis: Binary Decision Diagramms 9 36 Specification models and their analysis: Binary Decision Diagramms 36 n x 6 3 n x 6 3 Specification models and their analysis: Binary Decision Diagramms 36 Specification models and their analysis: Binary Decision Diagramms 2 36

4 n x 6 3 n x 6 3 Specification models and their analysis: Binary Decision Diagramms 3 36 Specification models and their analysis: Binary Decision Diagramms 4 36 Specification models and their analysis: Binary Decision Diagramms 5 36 Specification models and their analysis: Binary Decision Diagramms 6 36

5 Specification models and their analysis: Binary Decision Diagramms 7 36 Specification models and their analysis: Binary Decision Diagramms 8 36 Specification models and their analysis: Binary Decision Diagramms 9 36 Specification models and their analysis: Binary Decision Diagramms 2 36

6 The reduction is applied on the fly, i.e., each allocated node is unique. Hence application of an a posteriori reduction not necessary. As we will see later, uniqueness of nodes is not only a key to memory efficiency but also to run-time efficiency w.r.t. the manipulation of Specification models and their analysis: Binary Decision Diagramms 2 36 Specification models and their analysis: Binary Decision Diagramms BDD: Multi-rooted BDDs Binary Decision Diagram: Uniqueness of BDD nodes allows one to share sub-graphs among different BDDs yielding multi-rooted BDDs: f f2 f3 f 4 child(n) = child(n) holds As shown by the example the Shannonexpansion yields, that such nodes can Questio.3: Can we do more, e. g. apply Shannon for function f3? Specification models and their analysis: Binary Decision Diagramms Specification models and their analysis: Binary Decision Diagramms 24 36

7 Binary Decision Diagram: Binary Decision Diagram: child(n) = child(n) holds child(n) = child(n) holds As shown by the example the Shannon- As shown by the example the Shannon- expansion yields, that such nodes can expansion yields, that such nodes can Specification models and their analysis: Binary Decision Diagramms Specification models and their analysis: Binary Decision Diagramms Binary Decision Diagram: Binary Decision Diagram: child(n) = child(n) holds child(n) = child(n) holds As shown by the example the Shannon- As shown by the example the Shannon- expansion yields, that such nodes can expansion yields, that such nodes can n 6 n 6 Specification models and their analysis: Binary Decision Diagramms Specification models and their analysis: Binary Decision Diagramms 28 36

8 Binary Decision Diagrams: Formal Definition Binary Decision Diagrams: Formal Definition A reduced ordered Binary Decision Diagram B < V, > is a 5-tuple {N, value, var, child, child} where V is a finite and non-empty set of boolean variables with the fixed ordering relation V V defined one. 2 N = NT NNT is a finite non-empty set of nodes, consisting of the set of terminal nodes NT and non-terminal nodes NNT, with NT NNT =. 3 The following functions are defined: the value-returning function value : NT B for each terminal node, 2 the variable-returning function var : NNT V for each non-terminal node, 3 the child node-returning functions child, child : NNT N for each non-terminal node, and 4 the root node-returning function getroot : B N. For the BDD to be ordered the following constraint must hold: u NNT : child(u) NNT : var(child(u)) var(u) child(u) NNT : var(child(u)) var(u). 2 A BDD is denoted reduced iff the following conditions apply: (a) Isomorphism rule: No isomorphic nodes; i.e. (i) Non-terminal case: n, m NNT : n m (var(n) var(m) child(n) child(m) child(n) child(m)) (ii) Terminal case: n, m NT : n m (value(n) value(m)) (b) Dnc-rule: No don t care nodes: u NNT : child(u) = child(u). Specification models and their analysis: Binary Decision Diagramms Specification models and their analysis: Binary Decision Diagramms 3 36 Binary Decision Diagrams: Canonicity BDD: Algorithmic manipulation Reduced ordered BDDs are (strongly) canonical representations for Boolean Functions, thus each Boolean function f produces its own BDD Bf. f g Bf Bg Questio.4: Why can equivalenz testing be done in constant time? Consider the following two Boolean functions: f := dab + ad c + abd + a c d g := a cb + cba + b a c + a bc Questio.5: Are f and g equivalent? Please justify by making use of BDDs For making use of BDDs in an algebraic framework it is neccessary to being capable of efficiently applying operators to them, s.t. the obtained BDD represents the resp. function. Hence any n-ary operator applicable to n Boolean functions should be applicable to their n BDD-based representations. In the following we consider -ary and 2-ary (binary) operators, s.t. f Negate(Bf ) f + g Plus(Bf, Bg ) f g Mult(Bf, Bg ) Excursio.: Proof of canonicity (on the black board) Specification models and their analysis: Binary Decision Diagramms 3 36 Specification models and their analysis: Binary Decision Diagramms 32 36

9 BDD-based algorithms: Negation BDD-based algorithms: Apply A binary operator op {+,,...} can be applied to BDDs by means of Bryant s Negate(node n) () IF n NT THEN () ELSE RETURN(makeTerminal( value(n))) (2) node t := Negate(child(n)) (3) node e := Negate(child(n)) (4) IF t = e THEN RETURN(t) (5) ELSE RETURN(makeNode(var(n), t, e)) END Apply algorithm. APPLY(op, node n, node m) () node e, t, res Reached terminal nodes, end of recursion () IF n, m N T THEN (2) int v := value(n) op value(m) (3) RETURN(makeTerminal(v)) Check op cache if result is already known (4) res := cachelookup(op, n, m) (5) IF res ɛ THEN RETURN(res) Depending on the node-labelling variables branch into recursion (6) IF var(n) = var(m) THEN (7) v := var(n) (8) e := APPLY(op, child (n), child (m)) (9) t := APPLY(op, child (n), child (m)) () ELSE IF var(n) var(m) THEN () v := var(n) (2) e := APPLY(op, child (n), m) (3) t := APPLY(op, child (n), m) (4) ELSE (5) v := var(m); (6) e := APPLY(op, n, child (m)) (7) t := APPLY(op, n, child (m)) Questio.6: Construct the recursion tree for Negate and the BDD depicted above Example.: Consider f := and f 2 :=. Please give the BDDs for f and f 2, construct the recursion tree for f f 2 and give the resulting BDD. Allocate new node, unique and non-dnc-node (8) IF t = e THEN RETURN(t) (9) ELSE (2) res := RETURN(makeNode(v, t, e)) Insert result into op cache and terminate recursion (9) cacheinsert(op, n, m, res) (2) RETURN(res) BDD: Specification models and their analysis: Binary Decision Diagramms Algorithmic manipulation Specification models and their analysis: Binary Decision Diagramms BDD-based approaches for the Verification of systems Besides the APPLY-algorithm, which is the most important one other algorithms have been developped. Let f be a n-ary Boolean function and let B f be its BDD, in the following we will employ the following operation and their resp. BDD-based implementations: f (x,..., xn) xi =b RESTRICT(B f, b) with b B Quantification: Existential quantification: xi : f ( x) f x i = f x i = ABSTRACT(B, xi, Mult) 2 Universal quantification: xi : f ( x) f x i = + f x i = ABSTRACT(B, xi, Plus) In total the so far discussed techniques gives us a framework for efficiently representing and manipulating Boolean functions. This is the basis for representing and verifying systems such as Symbolic analysis of switching functions Symbolic rechability set generation, especially in case of Petri nets Symbolic CTL model checking Relabeling: [x y]f B f {y x}, each occurence of variable x is replaced by variable y: (f x= (g(y) = y)) + (f x= (g(y) = y)) Example.2: BDDs Specification models and their analysis: Binary Decision Diagramms Specification models and their analysis: Binary Decision Diagramms 36 36

Binary Decision Diagrams

Binary Decision Diagrams Binary Decision Diagrams Hao Zheng Department of Computer Science and Engineering University of South Florida Tampa, FL 33620 Email: zheng@cse.usf.edu Phone: (813)974-4757 Fax: (813)974-5456 Hao Zheng

More information

Binary Decision Diagrams

Binary Decision Diagrams Binary Decision Diagrams Hao Zheng Department of Computer Science and Engineering University of South Florida Tampa, FL 33620 Email: zheng@cse.usf.edu Phone: (813)974-4757 Fax: (813)974-5456 Hao Zheng

More information

CTL Model Checking. Goal Method for proving M sat σ, where M is a Kripke structure and σ is a CTL formula. Approach Model checking!

CTL Model Checking. Goal Method for proving M sat σ, where M is a Kripke structure and σ is a CTL formula. Approach Model checking! CMSC 630 March 13, 2007 1 CTL Model Checking Goal Method for proving M sat σ, where M is a Kripke structure and σ is a CTL formula. Approach Model checking! Mathematically, M is a model of σ if s I = M

More information

Partial Order Reduction in Symbolic State Space Traversal Using ZBDDs

Partial Order Reduction in Symbolic State Space Traversal Using ZBDDs 704 IEICE TRANS. INF. & SYST., VOL.E82 D, NO.3 MARCH 1999 LETTER Partial Order Reduction in Symbolic State Space Traversal Using ZBDDs Minoru TOMISAKA, Nonmember and Tomohiro YONEDA, Member SUMMARY In

More information

UNIT VI TREES. Marks - 14

UNIT VI TREES. Marks - 14 UNIT VI TREES Marks - 14 SYLLABUS 6.1 Non-linear data structures 6.2 Binary trees : Complete Binary Tree, Basic Terms: level number, degree, in-degree and out-degree, leaf node, directed edge, path, depth,

More information

Fundamental Algorithms - Surprise Test

Fundamental Algorithms - Surprise Test Technische Universität München Fakultät für Informatik Lehrstuhl für Effiziente Algorithmen Dmytro Chibisov Sandeep Sadanandan Winter Semester 007/08 Sheet Model Test January 16, 008 Fundamental Algorithms

More information

MAT385 Final (Spring 2009): Boolean Algebras, FSM, and old stuff

MAT385 Final (Spring 2009): Boolean Algebras, FSM, and old stuff MAT385 Final (Spring 2009): Boolean Algebras, FSM, and old stuff Name: Directions: Problems are equally weighted. Show your work! Answers without justification will likely result in few points. Your written

More information

Algorithmic Game Theory and Applications. Lecture 11: Games of Perfect Information

Algorithmic Game Theory and Applications. Lecture 11: Games of Perfect Information Algorithmic Game Theory and Applications Lecture 11: Games of Perfect Information Kousha Etessami finite games of perfect information Recall, a perfect information (PI) game has only 1 node per information

More information

Gödel algebras free over finite distributive lattices

Gödel algebras free over finite distributive lattices TANCL, Oxford, August 4-9, 2007 1 Gödel algebras free over finite distributive lattices Stefano Aguzzoli Brunella Gerla Vincenzo Marra D.S.I. D.I.COM. D.I.C.O. University of Milano University of Insubria

More information

On the Optimality of a Family of Binary Trees Techical Report TR

On the Optimality of a Family of Binary Trees Techical Report TR On the Optimality of a Family of Binary Trees Techical Report TR-011101-1 Dana Vrajitoru and William Knight Indiana University South Bend Department of Computer and Information Sciences Abstract In this

More information

TABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC

TABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC TABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC THOMAS BOLANDER AND TORBEN BRAÜNER Abstract. Hybrid logics are a principled generalization of both modal logics and description logics. It is well-known

More information

CSE 21 Winter 2016 Homework 6 Due: Wednesday, May 11, 2016 at 11:59pm. Instructions

CSE 21 Winter 2016 Homework 6 Due: Wednesday, May 11, 2016 at 11:59pm. Instructions CSE 1 Winter 016 Homework 6 Due: Wednesday, May 11, 016 at 11:59pm Instructions Homework should be done in groups of one to three people. You are free to change group members at any time throughout the

More information

The Tree Data Model. Laura Kovács

The Tree Data Model. Laura Kovács The Tree Data Model Laura Kovács Trees (Baumstrukturen) Definition Trees are sets of points, called nodes (Knoten) and lines, called edges (Kanten), connecting two distinct nodes, such that: n 2 n 3 n

More information

First-Order Logic in Standard Notation Basics

First-Order Logic in Standard Notation Basics 1 VOCABULARY First-Order Logic in Standard Notation Basics http://mathvault.ca April 21, 2017 1 Vocabulary Just as a natural language is formed with letters as its building blocks, the First- Order Logic

More information

Notes on Natural Logic

Notes on Natural Logic Notes on Natural Logic Notes for PHIL370 Eric Pacuit November 16, 2012 1 Preliminaries: Trees A tree is a structure T = (T, E), where T is a nonempty set whose elements are called nodes and E is a relation

More information

Generating all modular lattices of a given size

Generating all modular lattices of a given size Generating all modular lattices of a given size ADAM 2013 Nathan Lawless Chapman University June 6-8, 2013 Outline Introduction to Lattice Theory: Modular Lattices The Objective: Generating and Counting

More information

COMPUTER SCIENCE 20, SPRING 2014 Homework Problems Recursive Definitions, Structural Induction, States and Invariants

COMPUTER SCIENCE 20, SPRING 2014 Homework Problems Recursive Definitions, Structural Induction, States and Invariants COMPUTER SCIENCE 20, SPRING 2014 Homework Problems Recursive Definitions, Structural Induction, States and Invariants Due Wednesday March 12, 2014. CS 20 students should bring a hard copy to class. CSCI

More information

Lecture l(x) 1. (1) x X

Lecture l(x) 1. (1) x X Lecture 14 Agenda for the lecture Kraft s inequality Shannon codes The relation H(X) L u (X) = L p (X) H(X) + 1 14.1 Kraft s inequality While the definition of prefix-free codes is intuitively clear, we

More information

Heaps. c P. Flener/IT Dept/Uppsala Univ. AD1, FP, PK II Heaps 1

Heaps. c P. Flener/IT Dept/Uppsala Univ. AD1, FP, PK II Heaps 1 Heaps (Version of 21 November 2005) A min-heap (resp. max-heap) is a data structure with fast extraction of the smallest (resp. largest) item (in O(lg n) time), as well as fast insertion (also in O(lg

More information

Harvard School of Engineering and Applied Sciences CS 152: Programming Languages

Harvard School of Engineering and Applied Sciences CS 152: Programming Languages Harvard School of Engineering and Applied Sciences CS 152: Programming Languages Lecture 3 Tuesday, January 30, 2018 1 Inductive sets Induction is an important concept in the theory of programming language.

More information

SET 1C Binary Trees. 2. (i) Define the height of a binary tree or subtree and also define a height balanced (AVL) tree. (2)

SET 1C Binary Trees. 2. (i) Define the height of a binary tree or subtree and also define a height balanced (AVL) tree. (2) SET 1C Binary Trees 1. Construct a binary tree whose preorder traversal is K L N M P R Q S T and inorder traversal is N L K P R M S Q T 2. (i) Define the height of a binary tree or subtree and also define

More information

Hyperidentities in (xx)y xy Graph Algebras of Type (2,0)

Hyperidentities in (xx)y xy Graph Algebras of Type (2,0) Int. Journal of Math. Analysis, Vol. 8, 2014, no. 9, 415-426 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ijma.2014.312299 Hyperidentities in (xx)y xy Graph Algebras of Type (2,0) W. Puninagool

More information

Residuated Lattices of Size 12 extended version

Residuated Lattices of Size 12 extended version Residuated Lattices of Size 12 extended version Radim Belohlavek 1,2, Vilem Vychodil 1,2 1 Dept. Computer Science, Palacky University, Olomouc 17. listopadu 12, Olomouc, CZ 771 46, Czech Republic 2 SUNY

More information

Another Variant of 3sat. 3sat. 3sat Is NP-Complete. The Proof (concluded)

Another Variant of 3sat. 3sat. 3sat Is NP-Complete. The Proof (concluded) 3sat k-sat, where k Z +, is the special case of sat. The formula is in CNF and all clauses have exactly k literals (repetition of literals is allowed). For example, (x 1 x 2 x 3 ) (x 1 x 1 x 2 ) (x 1 x

More information

ExpTime Tableau Decision Procedures for Regular Grammar Logics with Converse

ExpTime Tableau Decision Procedures for Regular Grammar Logics with Converse ExpTime Tableau Decision Procedures for Regular Grammar Logics with Converse Linh Anh Nguyen 1 and Andrzej Sza las 1,2 1 Institute of Informatics, University of Warsaw Banacha 2, 02-097 Warsaw, Poland

More information

MSU CSE Spring 2011 Exam 2-ANSWERS

MSU CSE Spring 2011 Exam 2-ANSWERS MSU CSE 260-001 Spring 2011 Exam 2-NSWERS Name: This is a closed book exam, with 9 problems on 5 pages totaling 100 points. Integer ivision/ Modulo rithmetic 1. We can add two numbers in base 2 by using

More information

The exam is closed book, closed calculator, and closed notes except your three crib sheets.

The exam is closed book, closed calculator, and closed notes except your three crib sheets. CS 188 Spring 2016 Introduction to Artificial Intelligence Final V2 You have approximately 2 hours and 50 minutes. The exam is closed book, closed calculator, and closed notes except your three crib sheets.

More information

Ch 10 Trees. Introduction to Trees. Tree Representations. Binary Tree Nodes. Tree Traversals. Binary Search Trees

Ch 10 Trees. Introduction to Trees. Tree Representations. Binary Tree Nodes. Tree Traversals. Binary Search Trees Ch 10 Trees Introduction to Trees Tree Representations Binary Tree Nodes Tree Traversals Binary Search Trees 1 Binary Trees A binary tree is a finite set of elements called nodes. The set is either empty

More information

Principles of Program Analysis: Algorithms

Principles of Program Analysis: Algorithms Principles of Program Analysis: Algorithms Transparencies based on Chapter 6 of the book: Flemming Nielson, Hanne Riis Nielson and Chris Hankin: Principles of Program Analysis. Springer Verlag 2005. c

More information

Another Variant of 3sat

Another Variant of 3sat Another Variant of 3sat Proposition 32 3sat is NP-complete for expressions in which each variable is restricted to appear at most three times, and each literal at most twice. (3sat here requires only that

More information

discussion papers FS IV 91-4 Trade Performance of the Main EC Economies Relative to the USA and Japan in 1992-Sensitive Sectors Kirsty S.

discussion papers FS IV 91-4 Trade Performance of the Main EC Economies Relative to the USA and Japan in 1992-Sensitive Sectors Kirsty S. discussion papers FS IV 91-4 Trade Performance of the Main EC Economies Relative to the USA and Japan in 1992-Sensitive Sectors Kirsty S. Hughes January 1991 ISSN Nr. 0722-6748 Forschungsschwerpunkt Marktprozeß

More information

Levin Reduction and Parsimonious Reductions

Levin Reduction and Parsimonious Reductions Levin Reduction and Parsimonious Reductions The reduction R in Cook s theorem (p. 266) is such that Each satisfying truth assignment for circuit R(x) corresponds to an accepting computation path for M(x).

More information

Practical SAT Solving

Practical SAT Solving Practical SAT Solving Lecture 1 Carsten Sinz, Tomáš Balyo April 18, 2016 NSTITUTE FOR THEORETICAL COMPUTER SCIENCE KIT University of the State of Baden-Wuerttemberg and National Laboratory of the Helmholtz

More information

Unary PCF is Decidable

Unary PCF is Decidable Unary PCF is Decidable Ralph Loader Merton College, Oxford November 1995, revised October 1996 and September 1997. Abstract We show that unary PCF, a very small fragment of Plotkin s PCF [?], has a decidable

More information

Yao s Minimax Principle

Yao s Minimax Principle Complexity of algorithms The complexity of an algorithm is usually measured with respect to the size of the input, where size may for example refer to the length of a binary word describing the input,

More information

Node betweenness centrality: the definition.

Node betweenness centrality: the definition. Brandes algorithm These notes supplement the notes and slides for Task 11. They do not add any new material, but may be helpful in understanding the Brandes algorithm for calculating node betweenness centrality.

More information

Harvard School of Engineering and Applied Sciences CS 152: Programming Languages

Harvard School of Engineering and Applied Sciences CS 152: Programming Languages Harvard School of Engineering and Applied Sciences CS 152: Programming Languages Lecture 3 Tuesday, February 2, 2016 1 Inductive proofs, continued Last lecture we considered inductively defined sets, and

More information

Harvard School of Engineering and Applied Sciences CS 152: Programming Languages

Harvard School of Engineering and Applied Sciences CS 152: Programming Languages Harvard School of Engineering and Applied Sciences CS 152: Programming Languages Lecture 2 Thursday, January 30, 2014 1 Expressing Program Properties Now that we have defined our small-step operational

More information

Outline Introduction Game Representations Reductions Solution Concepts. Game Theory. Enrico Franchi. May 19, 2010

Outline Introduction Game Representations Reductions Solution Concepts. Game Theory. Enrico Franchi. May 19, 2010 May 19, 2010 1 Introduction Scope of Agent preferences Utility Functions 2 Game Representations Example: Game-1 Extended Form Strategic Form Equivalences 3 Reductions Best Response Domination 4 Solution

More information

Q1. [?? pts] Search Traces

Q1. [?? pts] Search Traces CS 188 Spring 2010 Introduction to Artificial Intelligence Midterm Exam Solutions Q1. [?? pts] Search Traces Each of the trees (G1 through G5) was generated by searching the graph (below, left) with a

More information

EDA045F: Program Analysis LECTURE 3: DATAFLOW ANALYSIS 2. Christoph Reichenbach

EDA045F: Program Analysis LECTURE 3: DATAFLOW ANALYSIS 2. Christoph Reichenbach EDA045F: Program Analysis LECTURE 3: DATAFLOW ANALYSIS 2 Christoph Reichenbach In the last lecture... Eliminating Nested Expressions (Three-Address Code) Control-Flow Graphs Static Single Assignment Form

More information

Syllogistic Logics with Verbs

Syllogistic Logics with Verbs Syllogistic Logics with Verbs Lawrence S Moss Department of Mathematics Indiana University Bloomington, IN 47405 USA lsm@csindianaedu Abstract This paper provides sound and complete logical systems for

More information

The Probabilistic Method - Probabilistic Techniques. Lecture 7: Martingales

The Probabilistic Method - Probabilistic Techniques. Lecture 7: Martingales The Probabilistic Method - Probabilistic Techniques Lecture 7: Martingales Sotiris Nikoletseas Associate Professor Computer Engineering and Informatics Department 2015-2016 Sotiris Nikoletseas, Associate

More information

Keynote speech at Deutscher Bankentag 2017

Keynote speech at Deutscher Bankentag 2017 Keynote speech at Deutscher Bankentag 2017 Session: The single market for financial services: ambition and reality 06.04.2017 Berlin 1 Guten morgen meine sehr geehrten Damen und Herren, Ich danke Herrn

More information

Mechanism Design: An Introduction from an Optimization Perspective

Mechanism Design: An Introduction from an Optimization Perspective Mechanism Design: An Introduction from an Optimization Perspective Mustafa Ç. PINAR Bilkent University Bilkent, December 20, 2013 Basics of Mechanism Design Generalities Selling a Single Indivisible Good

More information

RAIFFEISENLANDESBANK NIEDERÖSTERREICH-WIEN AG

RAIFFEISENLANDESBANK NIEDERÖSTERREICH-WIEN AG Second Supplement dated 5 January 2018 to the Prospectus dated 8 June 2017 RAIFFEISENLANDESBANK NIEDERÖSTERREICH-WIEN AG EUR 5,000,000,000 Debt Issuance Programme (the "Programme") This supplement (the

More information

Collective Profitability and Welfare in Selling-Buying Intermediation Processes

Collective Profitability and Welfare in Selling-Buying Intermediation Processes Collective Profitability and Welfare in Selling-Buying Intermediation Processes Amelia Bădică 1, Costin Bădică 1(B), Mirjana Ivanović 2, and Ionuţ Buligiu 1 1 University of Craiova, A. I. Cuza 13, 200530

More information

Sublinear Time Algorithms Oct 19, Lecture 1

Sublinear Time Algorithms Oct 19, Lecture 1 0368.416701 Sublinear Time Algorithms Oct 19, 2009 Lecturer: Ronitt Rubinfeld Lecture 1 Scribe: Daniel Shahaf 1 Sublinear-time algorithms: motivation Twenty years ago, there was practically no investigation

More information

Lecture 2: The Simple Story of 2-SAT

Lecture 2: The Simple Story of 2-SAT 0510-7410: Topics in Algorithms - Random Satisfiability March 04, 2014 Lecture 2: The Simple Story of 2-SAT Lecturer: Benny Applebaum Scribe(s): Mor Baruch 1 Lecture Outline In this talk we will show that

More information

UNIT 2. Greedy Method GENERAL METHOD

UNIT 2. Greedy Method GENERAL METHOD UNIT 2 GENERAL METHOD Greedy Method Greedy is the most straight forward design technique. Most of the problems have n inputs and require us to obtain a subset that satisfies some constraints. Any subset

More information

1 Solutions to Tute09

1 Solutions to Tute09 s to Tute0 Questions 4. - 4. are straight forward. Q. 4.4 Show that in a binary tree of N nodes, there are N + NULL pointers. Every node has outgoing pointers. Therefore there are N pointers. Each node,

More information

CS792 Notes Henkin Models, Soundness and Completeness

CS792 Notes Henkin Models, Soundness and Completeness CS792 Notes Henkin Models, Soundness and Completeness Arranged by Alexandra Stefan March 24, 2005 These notes are a summary of chapters 4.5.1-4.5.5 from [1]. 1 Review indexed family of sets: A s, where

More information

PARELLIZATION OF DIJKSTRA S ALGORITHM: COMPARISON OF VARIOUS PRIORITY QUEUES

PARELLIZATION OF DIJKSTRA S ALGORITHM: COMPARISON OF VARIOUS PRIORITY QUEUES PARELLIZATION OF DIJKSTRA S ALGORITHM: COMPARISON OF VARIOUS PRIORITY QUEUES WIKTOR JAKUBIUK, KESHAV PURANMALKA 1. Introduction Dijkstra s algorithm solves the single-sourced shorest path problem on a

More information

NOTES ON FIBONACCI TREES AND THEIR OPTIMALITY* YASUICHI HORIBE INTRODUCTION 1. FIBONACCI TREES

NOTES ON FIBONACCI TREES AND THEIR OPTIMALITY* YASUICHI HORIBE INTRODUCTION 1. FIBONACCI TREES 0#0# NOTES ON FIBONACCI TREES AND THEIR OPTIMALITY* YASUICHI HORIBE Shizuoka University, Hamamatsu, 432, Japan (Submitted February 1982) INTRODUCTION Continuing a previous paper [3], some new observations

More information

monotone circuit value

monotone circuit value monotone circuit value A monotone boolean circuit s output cannot change from true to false when one input changes from false to true. Monotone boolean circuits are hence less expressive than general circuits.

More information

Decidability and Recursive Languages

Decidability and Recursive Languages Decidability and Recursive Languages Let L (Σ { }) be a language, i.e., a set of strings of symbols with a finite length. For example, {0, 01, 10, 210, 1010,...}. Let M be a TM such that for any string

More information

0.1 Equivalence between Natural Deduction and Axiomatic Systems

0.1 Equivalence between Natural Deduction and Axiomatic Systems 0.1 Equivalence between Natural Deduction and Axiomatic Systems Theorem 0.1.1. Γ ND P iff Γ AS P ( ) it is enough to prove that all axioms are theorems in ND, as MP corresponds to ( e). ( ) by induction

More information

A Decidable Logic for Time Intervals: Propositional Neighborhood Logic

A Decidable Logic for Time Intervals: Propositional Neighborhood Logic From: AAAI Technical Report WS-02-17 Compilation copyright 2002, AAAI (wwwaaaiorg) All rights reserved A Decidable Logic for Time Intervals: Propositional Neighborhood Logic Angelo Montanari University

More information

Continuous images of closed sets in generalized Baire spaces ESI Workshop: Forcing and Large Cardinals

Continuous images of closed sets in generalized Baire spaces ESI Workshop: Forcing and Large Cardinals Continuous images of closed sets in generalized Baire spaces ESI Workshop: Forcing and Large Cardinals Philipp Moritz Lücke (joint work with Philipp Schlicht) Mathematisches Institut, Rheinische Friedrich-Wilhelms-Universität

More information

Outline for this Week

Outline for this Week Binomial Heaps Outline for this Week Binomial Heaps (Today) A simple, fexible, and versatile priority queue. Lazy Binomial Heaps (Today) A powerful building block for designing advanced data structures.

More information

Markov Decision Processes

Markov Decision Processes Markov Decision Processes Ryan P. Adams COS 324 Elements of Machine Learning Princeton University We now turn to a new aspect of machine learning, in which agents take actions and become active in their

More information

Random Boolean Networks and Evolutionary Game Theory

Random Boolean Networks and Evolutionary Game Theory and based on McKenzie Alexander (2003) Johannes Wahle Seminar für Sprachwissenschaft Universität Tübingen 17. July 2012 Intention Increasing interest in the discussion of evolutionary game-theoretic models

More information

Homework #4. CMSC351 - Spring 2013 PRINT Name : Due: Thu Apr 16 th at the start of class

Homework #4. CMSC351 - Spring 2013 PRINT Name : Due: Thu Apr 16 th at the start of class Homework #4 CMSC351 - Spring 2013 PRINT Name : Due: Thu Apr 16 th at the start of class o Grades depend on neatness and clarity. o Write your answers with enough detail about your approach and concepts

More information

SAT and DPLL. Introduction. Preliminaries. Normal forms DPLL. Complexity. Espen H. Lian. DPLL Implementation. Bibliography.

SAT and DPLL. Introduction. Preliminaries. Normal forms DPLL. Complexity. Espen H. Lian. DPLL Implementation. Bibliography. SAT and Espen H. Lian Ifi, UiO Implementation May 4, 2010 Espen H. Lian (Ifi, UiO) SAT and May 4, 2010 1 / 59 Espen H. Lian (Ifi, UiO) SAT and May 4, 2010 2 / 59 Introduction Introduction SAT is the problem

More information

Structural Induction

Structural Induction Structural Induction Jason Filippou CMSC250 @ UMCP 07-05-2016 Jason Filippou (CMSC250 @ UMCP) Structural Induction 07-05-2016 1 / 26 Outline 1 Recursively defined structures 2 Proofs Binary Trees Jason

More information

In this lecture, we will use the semantics of our simple language of arithmetic expressions,

In this lecture, we will use the semantics of our simple language of arithmetic expressions, CS 4110 Programming Languages and Logics Lecture #3: Inductive definitions and proofs In this lecture, we will use the semantics of our simple language of arithmetic expressions, e ::= x n e 1 + e 2 e

More information

AVL Trees. The height of the left subtree can differ from the height of the right subtree by at most 1.

AVL Trees. The height of the left subtree can differ from the height of the right subtree by at most 1. AVL Trees In order to have a worst case running time for insert and delete operations to be O(log n), we must make it impossible for there to be a very long path in the binary search tree. The first balanced

More information

Outline for this Week

Outline for this Week Binomial Heaps Outline for this Week Binomial Heaps (Today) A simple, flexible, and versatile priority queue. Lazy Binomial Heaps (Today) A powerful building block for designing advanced data structures.

More information

(Incorporated as a stock corporation in the Republic of Austria under registered number FN m)

(Incorporated as a stock corporation in the Republic of Austria under registered number FN m) Prospectus Supplement No. 1 Erste Group Bank AG (Incorporated as a stock corporation in the Republic of Austria under registered number FN 33209 m) EUR 30,000,000,000 Debt Issuance Programme This supplement

More information

6.231 DYNAMIC PROGRAMMING LECTURE 3 LECTURE OUTLINE

6.231 DYNAMIC PROGRAMMING LECTURE 3 LECTURE OUTLINE 6.21 DYNAMIC PROGRAMMING LECTURE LECTURE OUTLINE Deterministic finite-state DP problems Backward shortest path algorithm Forward shortest path algorithm Shortest path examples Alternative shortest path

More information

Game Theory: Normal Form Games

Game Theory: Normal Form Games Game Theory: Normal Form Games Michael Levet June 23, 2016 1 Introduction Game Theory is a mathematical field that studies how rational agents make decisions in both competitive and cooperative situations.

More information

SAT and DPLL. Espen H. Lian. May 4, Ifi, UiO. Espen H. Lian (Ifi, UiO) SAT and DPLL May 4, / 59

SAT and DPLL. Espen H. Lian. May 4, Ifi, UiO. Espen H. Lian (Ifi, UiO) SAT and DPLL May 4, / 59 SAT and DPLL Espen H. Lian Ifi, UiO May 4, 2010 Espen H. Lian (Ifi, UiO) SAT and DPLL May 4, 2010 1 / 59 Normal forms Normal forms DPLL Complexity DPLL Implementation Bibliography Espen H. Lian (Ifi, UiO)

More information

Introduction to Greedy Algorithms: Huffman Codes

Introduction to Greedy Algorithms: Huffman Codes Introduction to Greedy Algorithms: Huffman Codes Yufei Tao ITEE University of Queensland In computer science, one interesting method to design algorithms is to go greedy, namely, keep doing the thing that

More information

3: Balance Equations

3: Balance Equations 3.1 Balance Equations Accounts with Constant Interest Rates 15 3: Balance Equations Investments typically consist of giving up something today in the hope of greater benefits in the future, resulting in

More information

Local monotonicities and lattice derivatives of Boolean and pseudo-boolean functions

Local monotonicities and lattice derivatives of Boolean and pseudo-boolean functions Local monotonicities and lattice derivatives of Boolean and pseudo-boolean functions Tamás Waldhauser joint work with Miguel Couceiro and Jean-Luc Marichal University of Szeged AAA 83 Novi Sad, 16 March

More information

Optimal Satisficing Tree Searches

Optimal Satisficing Tree Searches Optimal Satisficing Tree Searches Dan Geiger and Jeffrey A. Barnett Northrop Research and Technology Center One Research Park Palos Verdes, CA 90274 Abstract We provide an algorithm that finds optimal

More information

CSCE 750, Fall 2009 Quizzes with Answers

CSCE 750, Fall 2009 Quizzes with Answers CSCE 750, Fall 009 Quizzes with Answers Stephen A. Fenner September 4, 011 1. Give an exact closed form for Simplify your answer as much as possible. k 3 k+1. We reduce the expression to a form we ve already

More information

Syllogistic Logics with Verbs

Syllogistic Logics with Verbs Syllogistic Logics with Verbs Lawrence S Moss Department of Mathematics Indiana University Bloomington, IN 47405 USA lsm@csindianaedu Abstract This paper provides sound and complete logical systems for

More information

IB Math Binomial Investigation Alei - Desert Academy

IB Math Binomial Investigation Alei - Desert Academy Patterns in Binomial Expansion 1 Assessment Task: 1) Complete the following tasks and questions looking for any patterns. Show all your work! Write neatly in the space provided. 2) Write a rule or formula

More information

6.231 DYNAMIC PROGRAMMING LECTURE 3 LECTURE OUTLINE

6.231 DYNAMIC PROGRAMMING LECTURE 3 LECTURE OUTLINE 6.21 DYNAMIC PROGRAMMING LECTURE LECTURE OUTLINE Deterministic finite-state DP problems Backward shortest path algorithm Forward shortest path algorithm Shortest path examples Alternative shortest path

More information

Arborescent Architecture for Decentralized Supervisory Control of Discrete Event Systems

Arborescent Architecture for Decentralized Supervisory Control of Discrete Event Systems Arborescent Architecture for Decentralized Supervisory Control of Discrete Event Systems Ahmed Khoumsi and Hicham Chakib Dept. Electrical & Computer Engineering, University of Sherbrooke, Canada Email:

More information

Semantics and Verification of Software

Semantics and Verification of Software Semantics and Verification of Software Thomas Noll Software Modeling and Verification Group RWTH Aachen University http://moves.rwth-aachen.de/teaching/ws-1718/sv-sw/ Recap: CCPOs and Continuous Functions

More information

A relation on 132-avoiding permutation patterns

A relation on 132-avoiding permutation patterns Discrete Mathematics and Theoretical Computer Science DMTCS vol. VOL, 205, 285 302 A relation on 32-avoiding permutation patterns Natalie Aisbett School of Mathematics and Statistics, University of Sydney,

More information

Resource Allocation Algorithms

Resource Allocation Algorithms Resource Allocation Algorithms Haris Aziz 1, 2 1 School of Computer Science and Engineering, UNSW Australia 2 Data61, CSIRO April, 2018 H. Aziz (UNSW) Resource Allocation Algorithms April, 2018 1 / 33

More information

Generating all nite modular lattices of a given size

Generating all nite modular lattices of a given size Generating all nite modular lattices of a given size Peter Jipsen and Nathan Lawless Dedicated to Brian Davey on the occasion of his 65th birthday Abstract. Modular lattices, introduced by R. Dedekind,

More information

Counting Basics. Venn diagrams

Counting Basics. Venn diagrams Counting Basics Sets Ways of specifying sets Union and intersection Universal set and complements Empty set and disjoint sets Venn diagrams Counting Inclusion-exclusion Multiplication principle Addition

More information

GAME THEORY. Department of Economics, MIT, Follow Muhamet s slides. We need the following result for future reference.

GAME THEORY. Department of Economics, MIT, Follow Muhamet s slides. We need the following result for future reference. 14.126 GAME THEORY MIHAI MANEA Department of Economics, MIT, 1. Existence and Continuity of Nash Equilibria Follow Muhamet s slides. We need the following result for future reference. Theorem 1. Suppose

More information

U.S. $4,000,000,000 NOTE ISSUANCE PROGRAMME UNCONDITIONALLY AND IRREVOCABLY GUARANTEED

U.S. $4,000,000,000 NOTE ISSUANCE PROGRAMME UNCONDITIONALLY AND IRREVOCABLY GUARANTEED SUPPLEMENT NO. 2 DATED 6 JUNE 2008 in accordance with 6(2) and 16 of the German Securities Prospectus Act to the published Base Prospectus relating to Principal Protected Notes and Derivative Notes dated

More information

Conditional Rewriting

Conditional Rewriting Conditional Rewriting Bernhard Gramlich ISR 2009, Brasilia, Brazil, June 22-26, 2009 Bernhard Gramlich Conditional Rewriting ISR 2009, July 22-26, 2009 1 Outline Introduction Basics in Conditional Rewriting

More information

On the Optimality of a Family of Binary Trees

On the Optimality of a Family of Binary Trees On the Optimality of a Family of Binary Trees Dana Vrajitoru Computer and Information Sciences Department Indiana University South Bend South Bend, IN 46645 Email: danav@cs.iusb.edu William Knight Computer

More information

(Incorporated as a stock corporation in the Republic of Austria under registered number FN m)

(Incorporated as a stock corporation in the Republic of Austria under registered number FN m) Prospectus Supplement No. 3 Erste Group Bank AG (Incorporated as a stock corporation in the Republic of Austria under registered number FN 33209 m) Equity Linked Notes Programme This supplement (the "Supplement")

More information

The illustrated zoo of order-preserving functions

The illustrated zoo of order-preserving functions The illustrated zoo of order-preserving functions David Wilding, February 2013 http://dpw.me/mathematics/ Posets (partially ordered sets) underlie much of mathematics, but we often don t give them a second

More information

Handout 4: Deterministic Systems and the Shortest Path Problem

Handout 4: Deterministic Systems and the Shortest Path Problem SEEM 3470: Dynamic Optimization and Applications 2013 14 Second Term Handout 4: Deterministic Systems and the Shortest Path Problem Instructor: Shiqian Ma January 27, 2014 Suggested Reading: Bertsekas

More information

Recursive Inspection Games

Recursive Inspection Games Recursive Inspection Games Bernhard von Stengel Informatik 5 Armed Forces University Munich D 8014 Neubiberg, Germany IASFOR-Bericht S 9106 August 1991 Abstract Dresher (1962) described a sequential inspection

More information

CS 188 Fall Introduction to Artificial Intelligence Midterm 1. ˆ You have approximately 2 hours and 50 minutes.

CS 188 Fall Introduction to Artificial Intelligence Midterm 1. ˆ You have approximately 2 hours and 50 minutes. CS 188 Fall 2013 Introduction to Artificial Intelligence Midterm 1 ˆ You have approximately 2 hours and 50 minutes. ˆ The exam is closed book, closed notes except your one-page crib sheet. ˆ Please use

More information

(Incorporated as a stock corporation in the Republic of Austria under registered number FN m)

(Incorporated as a stock corporation in the Republic of Austria under registered number FN m) Prospectus Supplement No. 2 Erste Group Bank AG (Incorporated as a stock corporation in the Republic of Austria under registered number FN 33209 m) Equity Linked Notes Programme This supplement (the "Supplement")

More information

DESCENDANTS IN HEAP ORDERED TREES OR A TRIUMPH OF COMPUTER ALGEBRA

DESCENDANTS IN HEAP ORDERED TREES OR A TRIUMPH OF COMPUTER ALGEBRA DESCENDANTS IN HEAP ORDERED TREES OR A TRIUMPH OF COMPUTER ALGEBRA Helmut Prodinger Institut für Algebra und Diskrete Mathematik Technical University of Vienna Wiedner Hauptstrasse 8 0 A-00 Vienna, Austria

More information

You Have an NP-Complete Problem (for Your Thesis)

You Have an NP-Complete Problem (for Your Thesis) You Have an NP-Complete Problem (for Your Thesis) From Propositions 27 (p. 242) and Proposition 30 (p. 245), it is the least likely to be in P. Your options are: Approximations. Special cases. Average

More information

4 Martingales in Discrete-Time

4 Martingales in Discrete-Time 4 Martingales in Discrete-Time Suppose that (Ω, F, P is a probability space. Definition 4.1. A sequence F = {F n, n = 0, 1,...} is called a filtration if each F n is a sub-σ-algebra of F, and F n F n+1

More information

Approximate Composite Minimization: Convergence Rates and Examples

Approximate Composite Minimization: Convergence Rates and Examples ISMP 2018 - Bordeaux Approximate Composite Minimization: Convergence Rates and S. Praneeth Karimireddy, Sebastian U. Stich, Martin Jaggi MLO Lab, EPFL, Switzerland sebastian.stich@epfl.ch July 4, 2018

More information