Lattice Model of Flow
|
|
- Lynette Murphy
- 5 years ago
- Views:
Transcription
1 Lattice Model of Flow CS4605 George W. Dinolt Taken From Denning s A Lattice Model of Secure Information Flow, Communications of the ACM, Vol 19, #5, May, 1976
2 The Plan The Elements of the Model The Flow What is a Lattice The Labels are a Lattice gwdinolt@nps.edu July 25,
3 Model Elements The model is: F M =< N, P, SC,, > N = {a, b, c,...} storage objects P = {p, q, r,...} Processes SC = {A, B,...} The security classes (labels) lb : N P SC a labeling function : SC SC SC class combining function, associative and commutative, extend to many arguements SC SC a relation on SC, A B implies information can flow from A to B. Flows result from operations that cause information to move from A to B gwdinolt@nps.edu July 25,
4 Security Model F M is secure if and only if execution of a sequence of operations cannot give rise to a flow that violates. If f(a 1, a 2,..., a n ) is a function on objects with results an object b, then lb(a 1 ) lb(a 2 )... lb(a n ) lb(b) gwdinolt@nps.edu July 25,
5 Assumption on the Model is transitivie July 25,
6 What is a lattice A lattice L = (L,, ) where L is a set : L L L (meet) : L L L (join) See notes from course web page for a more complete discussion. See Lattice Theory by Garret Birkhoff gwdinolt@nps.edu July 25,
7 Lattice Properties For all a, b, c L: a a = a a a = a (1) a b = b a a b = b a (2) (a b) c = a (b c) (a b) c = a (b c) (3) (a b) a = a (a b) a = a (4) We can induce an order on L using the following: a b (a b = a or a b = b) (5) gwdinolt@nps.edu July 25,
8 Lattice as a POSET Let S be a set and be a relation on S that satisfies s S : s s (reflexive) s, t S : (s t) (t s) s = t (antisymmetric) s, t, u S : (s t) (t u) s u (transitivity) s, t S : u S, u = lub(s, t) s, t S : w S, w = glb(s, t) (greatest lower bound) From the notes we know that any set that satisfies these properties is a lattice u is a least upper bound of s and t if s u and t u and if s v and t v then u v (u is the smallest upper bound of s and t) gwdinolt@nps.edu July 25,
9 Equivalent Security Classes Two elements A, B SC are equivalent A B and B A. We denote by A = {B : A B and B A} the set of all the elements equivalent to A. It is easy to show that if A B then A = B. We call A the equivalent set of A in SC. We will show that the collection of distinct equivalent sets in SC form a lattice. From here on in, we will assume that we are dealing with the equivalence classes, i.e. that if A B and B A then A = B. gwdinolt@nps.edu July 25,
10 SC is a POSET We show that is reflexive, antisymmetric and transitive: We have reflexivity and transitivity by the definition of. We have anti-symmetry by the previous discussions. We define lub(a, B) = A B and we show that A B has the properties of an upper bound. It is obvious that A A B and B A B so A B is an upper bound of A and B. gwdinolt@nps.edu July 25,
11 Continuing is lub We will consider reasonable semantics for. Consider 5 objects, a, b, c, c 1, c 2 such that lb(a) lb(c), lb(b) lb(c) and lb(c) = lb(c 1 ) = lb(c 2 ). Suppose we have the program segment: c1 := a; c2 := b; c := c1 * c2; We deduce that lb(a) lb(b) lb(c) since it really is formed from the values of a and b. So is a least upper bound (lub) function on the elements of SC. gwdinolt@nps.edu July 25,
12 SC Has a Minimal Element If SC has an element 0 such that A SC, 0 A, and 0 A = A 0 = A then we are done. We do all of our reasoning on this new set. If no such element exists, we can just add a new element to SC that satisfies that property. gwdinolt@nps.edu July 25,
13 The glb function We can easily extend the lub function to sets. lub(a, B, C) = lub(a, lub(b, C)) = A B C Suppose A, B SC. Consider the set X = {C : C A and C B} We know X = since 0 X. We define glb(a, B) = lub(x ). gwdinolt@nps.edu July 25,
14 The glb function continued We need to show that glb(a, B) A, glb(a, B) B and (Z A Z B) Z glb(a, B). Suppose A glb(a, B) and A glb(a, B). But then x X, x A, lub(x) A which contradicts the definition of lub. We can argue similarly for B. We need to show that there isn t any bigger element that could be a glb. Let (Z A) (Z B) (glb(a, B) Z). Clearly Z X, hence Z lub(x ) = glb(a, B) which is a contradiction unless Z = glb(a, B). Actually it is slightly more complicated, and we really need the finiteness of X to ensure that we can do this, but you should be able to see the idea from this argument gwdinolt@nps.edu July 25,
15 SC is a Lattice SC, lub, glb (SC,, ) forms a lattice when the duplicate classifications are removed and the 0 element is added. gwdinolt@nps.edu July 25,
Lattices and the Knaster-Tarski Theorem
Lattices and the Knaster-Tarski Theorem Deepak D Souza Department of Computer Science and Automation Indian Institute of Science, Bangalore. 8 August 27 Outline 1 Why study lattices 2 Partial Orders 3
More informationCSC 474/574 Information Systems Security
CSC 474/574 Information Systems Security Topic 4.2: Lattice Based Access Control Models CSC 474/574 Dr. Peng Ning 1 LATTICE-BASED MODELS Information flow policies Denning s axioms Bell-LaPadula model (BLP)
More informationThe illustrated zoo of order-preserving functions
The illustrated zoo of order-preserving functions David Wilding, February 2013 http://dpw.me/mathematics/ Posets (partially ordered sets) underlie much of mathematics, but we often don t give them a second
More informationRecall: Data Flow Analysis. Data Flow Analysis Recall: Data Flow Equations. Forward Data Flow, Again
Data Flow Analysis 15-745 3/24/09 Recall: Data Flow Analysis A framework for proving facts about program Reasons about lots of little facts Little or no interaction between facts Works best on properties
More informationTOPIC LATTICE-BASED ACCESS-CONTROL MODELS. Ravi Sandhu
1 TOPIC LATTICE-BASED ACCESS-CONTROL MODELS Ravi Sandhu 2 LATTICE-BASED MODELS Denning's axioms Bell-LaPadula model (BLP) Biba model and its duality (or equivalence) to BLP Dynamic labels in BLP 3 DENNING'S
More informationCONSTRUCTION OF CODES BY LATTICE VALUED FUZZY SETS. 1. Introduction. Novi Sad J. Math. Vol. 35, No. 2, 2005,
Novi Sad J. Math. Vol. 35, No. 2, 2005, 155-160 CONSTRUCTION OF CODES BY LATTICE VALUED FUZZY SETS Mališa Žižović 1, Vera Lazarević 2 Abstract. To every finite lattice L, one can associate a binary blockcode,
More informationGenerating all modular lattices of a given size
Generating all modular lattices of a given size ADAM 2013 Nathan Lawless Chapman University June 6-8, 2013 Outline Introduction to Lattice Theory: Modular Lattices The Objective: Generating and Counting
More informationCONGRUENCES AND IDEALS IN A DISTRIBUTIVE LATTICE WITH RESPECT TO A DERIVATION
Bulletin of the Section of Logic Volume 42:1/2 (2013), pp. 1 10 M. Sambasiva Rao CONGRUENCES AND IDEALS IN A DISTRIBUTIVE LATTICE WITH RESPECT TO A DERIVATION Abstract Two types of congruences are introduced
More informationNotes on the symmetric group
Notes on the symmetric group 1 Computations in the symmetric group Recall that, given a set X, the set S X of all bijections from X to itself (or, more briefly, permutations of X) is group under function
More informationCATEGORICAL SKEW LATTICES
CATEGORICAL SKEW LATTICES MICHAEL KINYON AND JONATHAN LEECH Abstract. Categorical skew lattices are a variety of skew lattices on which the natural partial order is especially well behaved. While most
More informationTranslates of (Anti) Fuzzy Submodules
International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn : 2278-800X, www.ijerd.com Volume 5, Issue 2 (December 2012), PP. 27-31 P.K. Sharma Post Graduate Department of Mathematics,
More informationÉcole normale supérieure, MPRI, M2 Year 2007/2008. Course 2-6 Abstract interpretation: application to verification and static analysis P.
École normale supérieure, MPRI, M2 Year 2007/2008 Course 2-6 Abstract interpretation: application to verification and static analysis P. Cousot Questions and answers of the partial exam of Friday November
More informationFilters - Part II. Quotient Lattices Modulo Filters and Direct Product of Two Lattices
FORMALIZED MATHEMATICS Vol2, No3, May August 1991 Université Catholique de Louvain Filters - Part II Quotient Lattices Modulo Filters and Direct Product of Two Lattices Grzegorz Bancerek Warsaw University
More informationChapter 10: Mixed strategies Nash equilibria, reaction curves and the equality of payoffs theorem
Chapter 10: Mixed strategies Nash equilibria reaction curves and the equality of payoffs theorem Nash equilibrium: The concept of Nash equilibrium can be extended in a natural manner to the mixed strategies
More informationChair of Communications Theory, Prof. Dr.-Ing. E. Jorswieck. Übung 5: Supermodular Games
Chair of Communications Theory, Prof. Dr.-Ing. E. Jorswieck Übung 5: Supermodular Games Introduction Supermodular games are a class of non-cooperative games characterized by strategic complemetariteis
More informationINTERVAL DISMANTLABLE LATTICES
INTERVAL DISMANTLABLE LATTICES KIRA ADARICHEVA, JENNIFER HYNDMAN, STEFFEN LEMPP, AND J. B. NATION Abstract. A finite lattice is interval dismantlable if it can be partitioned into an ideal and a filter,
More informationCollinear Triple Hypergraphs and the Finite Plane Kakeya Problem
Collinear Triple Hypergraphs and the Finite Plane Kakeya Problem Joshua Cooper August 14, 006 Abstract We show that the problem of counting collinear points in a permutation (previously considered by the
More information5 Deduction in First-Order Logic
5 Deduction in First-Order Logic The system FOL C. Let C be a set of constant symbols. FOL C is a system of deduction for the language L # C. Axioms: The following are axioms of FOL C. (1) All tautologies.
More informationA relation on 132-avoiding permutation patterns
Discrete Mathematics and Theoretical Computer Science DMTCS vol. VOL, 205, 285 302 A relation on 32-avoiding permutation patterns Natalie Aisbett School of Mathematics and Statistics, University of Sydney,
More informationGUESSING MODELS IMPLY THE SINGULAR CARDINAL HYPOTHESIS arxiv: v1 [math.lo] 25 Mar 2019
GUESSING MODELS IMPLY THE SINGULAR CARDINAL HYPOTHESIS arxiv:1903.10476v1 [math.lo] 25 Mar 2019 Abstract. In this article we prove three main theorems: (1) guessing models are internally unbounded, (2)
More informationCOLLOQUIA MATHEMATICA SOCIETATIS JANOS BOLYAI SZEGED (HUNGARY), 1980.
COLLOQUIA MATHEMATICA SOCIETATIS JANOS BOLYAI 33. CONTRIBUTIONS TO LATTICE THEORY SZEGED (HUNGARY), 1980. A SURVEY OF PRODUCTS OF LATTICE VARIETIES G. GRATZER - D. KELLY Let y and Wbe varieties of lattices.
More informationForecast Horizons for Production Planning with Stochastic Demand
Forecast Horizons for Production Planning with Stochastic Demand Alfredo Garcia and Robert L. Smith Department of Industrial and Operations Engineering Universityof Michigan, Ann Arbor MI 48109 December
More informationThe efficiency of fair division
The efficiency of fair division Ioannis Caragiannis, Christos Kaklamanis, Panagiotis Kanellopoulos, and Maria Kyropoulou Research Academic Computer Technology Institute and Department of Computer Engineering
More informationFinancial Economics. Runs Test
Test A simple statistical test of the random-walk theory is a runs test. For daily data, a run is defined as a sequence of days in which the stock price changes in the same direction. For example, consider
More informationTHE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET
THE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET MICHAEL PINSKER Abstract. We calculate the number of unary clones (submonoids of the full transformation monoid) containing the
More informationStrong normalisation and the typed lambda calculus
CHAPTER 9 Strong normalisation and the typed lambda calculus In the previous chapter we looked at some reduction rules for intuitionistic natural deduction proofs and we have seen that by applying these
More informationFebruary 23, An Application in Industrial Organization
An Application in Industrial Organization February 23, 2015 One form of collusive behavior among firms is to restrict output in order to keep the price of the product high. This is a goal of the OPEC oil
More informationThe finite lattice representation problem and intervals in subgroup lattices of finite groups
The finite lattice representation problem and intervals in subgroup lattices of finite groups William DeMeo Math 613: Group Theory 15 December 2009 Abstract A well-known result of universal algebra states:
More information3 The Model Existence Theorem
3 The Model Existence Theorem Although we don t have compactness or a useful Completeness Theorem, Henkinstyle arguments can still be used in some contexts to build models. In this section we describe
More informationarxiv: v1 [math.lo] 24 Feb 2014
Residuated Basic Logic II. Interpolation, Decidability and Embedding Minghui Ma 1 and Zhe Lin 2 arxiv:1404.7401v1 [math.lo] 24 Feb 2014 1 Institute for Logic and Intelligence, Southwest University, Beibei
More informationECON 803: MICROECONOMIC THEORY II Arthur J. Robson Fall 2016 Assignment 9 (due in class on November 22)
ECON 803: MICROECONOMIC THEORY II Arthur J. Robson all 2016 Assignment 9 (due in class on November 22) 1. Critique of subgame perfection. 1 Consider the following three-player sequential game. In the first
More informationRANDOM POSETS, LATTICES, AND LATTICES TERMS
125 (2000) MATHEMATICA BOHEMICA No. 2, 129 133 RANDOM POSETS, LATTICES, AND LATTICES TERMS Jaroslav Ježek, Václav Slavík, Praha (Received January 6, 1998) Abstract. Algorithms for generating random posets,
More informationGödel algebras free over finite distributive lattices
TANCL, Oxford, August 4-9, 2007 1 Gödel algebras free over finite distributive lattices Stefano Aguzzoli Brunella Gerla Vincenzo Marra D.S.I. D.I.COM. D.I.C.O. University of Milano University of Insubria
More informationDeterministic Dynamic Programming
Deterministic Dynamic Programming Dynamic programming is a technique that can be used to solve many optimization problems. In most applications, dynamic programming obtains solutions by working backward
More informationECE 586GT: Problem Set 1: Problems and Solutions Analysis of static games
University of Illinois Fall 2018 ECE 586GT: Problem Set 1: Problems and Solutions Analysis of static games Due: Tuesday, Sept. 11, at beginning of class Reading: Course notes, Sections 1.1-1.4 1. [A random
More informationEDA045F: Program Analysis LECTURE 3: DATAFLOW ANALYSIS 2. Christoph Reichenbach
EDA045F: Program Analysis LECTURE 3: DATAFLOW ANALYSIS 2 Christoph Reichenbach In the last lecture... Eliminating Nested Expressions (Three-Address Code) Control-Flow Graphs Static Single Assignment Form
More informationMAT25 LECTURE 10 NOTES. = a b. > 0, there exists N N such that if n N, then a n a < ɛ
MAT5 LECTURE 0 NOTES NATHANIEL GALLUP. Algebraic Limit Theorem Theorem : Algebraic Limit Theorem (Abbott Theorem.3.3) Let (a n ) and ( ) be sequences of real numbers such that lim n a n = a and lim n =
More informationLATTICE LAWS FORCING DISTRIBUTIVITY UNDER UNIQUE COMPLEMENTATION
LATTICE LAWS FORCING DISTRIBUTIVITY UNDER UNIQUE COMPLEMENTATION R. PADMANABHAN, W. MCCUNE, AND R. VEROFF Abstract. We give several new lattice identities valid in nonmodular lattices such that a uniquely
More informationPURITY IN IDEAL LATTICES. Abstract.
ANALELE ŞTIINŢIFICE ALE UNIVERSITĂŢII AL.I.CUZA IAŞI Tomul XLV, s.i a, Matematică, 1999, f.1. PURITY IN IDEAL LATTICES BY GRIGORE CĂLUGĂREANU Abstract. In [4] T. HEAD gave a general definition of purity
More informationMITCHELL S THEOREM REVISITED. Contents
MITCHELL S THEOREM REVISITED THOMAS GILTON AND JOHN KRUEGER Abstract. Mitchell s theorem on the approachability ideal states that it is consistent relative to a greatly Mahlo cardinal that there is no
More informationChapter 15: Dynamic Programming
Chapter 15: Dynamic Programming Dynamic programming is a general approach to making a sequence of interrelated decisions in an optimum way. While we can describe the general characteristics, the details
More informationOn Existence of Equilibria. Bayesian Allocation-Mechanisms
On Existence of Equilibria in Bayesian Allocation Mechanisms Northwestern University April 23, 2014 Bayesian Allocation Mechanisms In allocation mechanisms, agents choose messages. The messages determine
More informationOnline Shopping Intermediaries: The Strategic Design of Search Environments
Online Supplemental Appendix to Online Shopping Intermediaries: The Strategic Design of Search Environments Anthony Dukes University of Southern California Lin Liu University of Central Florida February
More informationLecture 14: Basic Fixpoint Theorems (cont.)
Lecture 14: Basic Fixpoint Theorems (cont) Predicate Transformers Monotonicity and Continuity Existence of Fixpoints Computing Fixpoints Fixpoint Characterization of CTL Operators 1 2 E M Clarke and E
More information17 MAKING COMPLEX DECISIONS
267 17 MAKING COMPLEX DECISIONS The agent s utility now depends on a sequence of decisions In the following 4 3grid environment the agent makes a decision to move (U, R, D, L) at each time step When the
More informationHarvard School of Engineering and Applied Sciences CS 152: Programming Languages
Harvard School of Engineering and Applied Sciences CS 152: Programming Languages Lecture 2 Thursday, January 30, 2014 1 Expressing Program Properties Now that we have defined our small-step operational
More informationMixed Strategies. Samuel Alizon and Daniel Cownden February 4, 2009
Mixed Strategies Samuel Alizon and Daniel Cownden February 4, 009 1 What are Mixed Strategies In the previous sections we have looked at games where players face uncertainty, and concluded that they choose
More information6 -AL- ONE MACHINE SEQUENCING TO MINIMIZE MEAN FLOW TIME WITH MINIMUM NUMBER TARDY. Hamilton Emmons \,«* Technical Memorandum No. 2.
li. 1. 6 -AL- ONE MACHINE SEQUENCING TO MINIMIZE MEAN FLOW TIME WITH MINIMUM NUMBER TARDY f \,«* Hamilton Emmons Technical Memorandum No. 2 May, 1973 1 il 1 Abstract The problem of sequencing n jobs on
More informationBest response cycles in perfect information games
P. Jean-Jacques Herings, Arkadi Predtetchinski Best response cycles in perfect information games RM/15/017 Best response cycles in perfect information games P. Jean Jacques Herings and Arkadi Predtetchinski
More informationOrthogonality to the value group is the same as generic stability in C-minimal expansions of ACVF
Orthogonality to the value group is the same as generic stability in C-minimal expansions of ACVF Will Johnson February 18, 2014 1 Introduction Let T be some C-minimal expansion of ACVF. Let U be the monster
More informationA Decentralized Learning Equilibrium
Paper to be presented at the DRUID Society Conference 2014, CBS, Copenhagen, June 16-18 A Decentralized Learning Equilibrium Andreas Blume University of Arizona Economics ablume@email.arizona.edu April
More informationResiduated Lattices of Size 12 extended version
Residuated Lattices of Size 12 extended version Radim Belohlavek 1,2, Vilem Vychodil 1,2 1 Dept. Computer Science, Palacky University, Olomouc 17. listopadu 12, Olomouc, CZ 771 46, Czech Republic 2 SUNY
More informationCS364A: Algorithmic Game Theory Lecture #14: Robust Price-of-Anarchy Bounds in Smooth Games
CS364A: Algorithmic Game Theory Lecture #14: Robust Price-of-Anarchy Bounds in Smooth Games Tim Roughgarden November 6, 013 1 Canonical POA Proofs In Lecture 1 we proved that the price of anarchy (POA)
More informationDerivative Instruments
Derivative Instruments Paris Dauphine University - Master I.E.F. (272) Autumn 2016 Jérôme MATHIS jerome.mathis@dauphine.fr (object: IEF272) http://jerome.mathis.free.fr/ief272 Slides on book: John C. Hull,
More informationSEMICENTRAL IDEMPOTENTS IN A RING
J. Korean Math. Soc. 51 (2014), No. 3, pp. 463 472 http://dx.doi.org/10.4134/jkms.2014.51.3.463 SEMICENTRAL IDEMPOTENTS IN A RING Juncheol Han, Yang Lee, and Sangwon Park Abstract. Let R be a ring with
More informationA Property Equivalent to n-permutability for Infinite Groups
Journal of Algebra 221, 570 578 (1999) Article ID jabr.1999.7996, available online at http://www.idealibrary.com on A Property Equivalent to n-permutability for Infinite Groups Alireza Abdollahi* and Aliakbar
More informationTABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC
TABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC THOMAS BOLANDER AND TORBEN BRAÜNER Abstract. Hybrid logics are a principled generalization of both modal logics and description logics. It is well-known
More informationThe Real Numbers. Here we show one way to explicitly construct the real numbers R. First we need a definition.
The Real Numbers Here we show one way to explicitly construct the real numbers R. First we need a definition. Definitions/Notation: A sequence of rational numbers is a funtion f : N Q. Rather than write
More informationThe Assumption(s) of Normality
The Assumption(s) of Normality Copyright 2000, 2011, 2016, J. Toby Mordkoff This is very complicated, so I ll provide two versions. At a minimum, you should know the short one. It would be great if you
More informationFinite Memory and Imperfect Monitoring
Federal Reserve Bank of Minneapolis Research Department Finite Memory and Imperfect Monitoring Harold L. Cole and Narayana Kocherlakota Working Paper 604 September 2000 Cole: U.C.L.A. and Federal Reserve
More informationLecture l(x) 1. (1) x X
Lecture 14 Agenda for the lecture Kraft s inequality Shannon codes The relation H(X) L u (X) = L p (X) H(X) + 1 14.1 Kraft s inequality While the definition of prefix-free codes is intuitively clear, we
More informationMAT 4250: Lecture 1 Eric Chung
1 MAT 4250: Lecture 1 Eric Chung 2Chapter 1: Impartial Combinatorial Games 3 Combinatorial games Combinatorial games are two-person games with perfect information and no chance moves, and with a win-or-lose
More information2 Deduction in Sentential Logic
2 Deduction in Sentential Logic Though we have not yet introduced any formal notion of deductions (i.e., of derivations or proofs), we can easily give a formal method for showing that formulas are tautologies:
More informationYao s Minimax Principle
Complexity of algorithms The complexity of an algorithm is usually measured with respect to the size of the input, where size may for example refer to the length of a binary word describing the input,
More informationTEST 1 SOLUTIONS MATH 1002
October 17, 2014 1 TEST 1 SOLUTIONS MATH 1002 1. Indicate whether each it below exists or does not exist. If the it exists then write what it is. No proofs are required. For example, 1 n exists and is
More informationANASH EQUILIBRIUM of a strategic game is an action profile in which every. Strategy Equilibrium
Draft chapter from An introduction to game theory by Martin J. Osborne. Version: 2002/7/23. Martin.Osborne@utoronto.ca http://www.economics.utoronto.ca/osborne Copyright 1995 2002 by Martin J. Osborne.
More informationWhile the story has been different in each case, fundamentally, we ve maintained:
Econ 805 Advanced Micro Theory I Dan Quint Fall 2009 Lecture 22 November 20 2008 What the Hatfield and Milgrom paper really served to emphasize: everything we ve done so far in matching has really, fundamentally,
More informationLecture 5 Theory of Finance 1
Lecture 5 Theory of Finance 1 Simon Hubbert s.hubbert@bbk.ac.uk January 24, 2007 1 Introduction In the previous lecture we derived the famous Capital Asset Pricing Model (CAPM) for expected asset returns,
More information4 Martingales in Discrete-Time
4 Martingales in Discrete-Time Suppose that (Ω, F, P is a probability space. Definition 4.1. A sequence F = {F n, n = 0, 1,...} is called a filtration if each F n is a sub-σ-algebra of F, and F n F n+1
More informationCS 4110 Programming Languages and Logics Lecture #2: Introduction to Semantics. 1 Arithmetic Expressions
CS 4110 Programming Languages and Logics Lecture #2: Introduction to Semantics What is the meaning of a program? When we write a program, we represent it using sequences of characters. But these strings
More informationA lower bound on seller revenue in single buyer monopoly auctions
A lower bound on seller revenue in single buyer monopoly auctions Omer Tamuz October 7, 213 Abstract We consider a monopoly seller who optimally auctions a single object to a single potential buyer, with
More information3.1 Measures of Central Tendency
3.1 Measures of Central Tendency n Summation Notation x i or x Sum observation on the variable that appears to the right of the summation symbol. Example 1 Suppose the variable x i is used to represent
More informationCompetition for goods in buyer-seller networks
Rev. Econ. Design 5, 301 331 (2000) c Springer-Verlag 2000 Competition for goods in buyer-seller networks Rachel E. Kranton 1, Deborah F. Minehart 2 1 Department of Economics, University of Maryland, College
More informationNotes on Natural Logic
Notes on Natural Logic Notes for PHIL370 Eric Pacuit November 16, 2012 1 Preliminaries: Trees A tree is a structure T = (T, E), where T is a nonempty set whose elements are called nodes and E is a relation
More informationAdverse Selection: The Market for Lemons
Andrew McLennan September 4, 2014 I. Introduction Economics 6030/8030 Microeconomics B Second Semester 2014 Lecture 6 Adverse Selection: The Market for Lemons A. One of the most famous and influential
More informationLattice Laws Forcing Distributivity Under Unique Complementation
Lattice Laws Forcing Distributivity Under Unique Complementation R. Padmanabhan Department of Mathematics University of Manitoba Winnipeg, Manitoba R3T 2N2 Canada W. McCune Mathematics and Computer Science
More informationOn the 'Lock-In' Effects of Capital Gains Taxation
May 1, 1997 On the 'Lock-In' Effects of Capital Gains Taxation Yoshitsugu Kanemoto 1 Faculty of Economics, University of Tokyo 7-3-1 Hongo, Bunkyo-ku, Tokyo 113 Japan Abstract The most important drawback
More information1 Online Problem Examples
Comp 260: Advanced Algorithms Tufts University, Spring 2018 Prof. Lenore Cowen Scribe: Isaiah Mindich Lecture 9: Online Algorithms All of the algorithms we have studied so far operate on the assumption
More informationEcon 618: Topic 11 Introduction to Coalitional Games
Econ 618: Topic 11 Introduction to Coalitional Games Sunanda Roy 1 Coalitional games with transferable payoffs, the Core Consider a game with a finite set of players. A coalition is a nonempty subset of
More informationCongruence lattices of finite intransitive group acts
Congruence lattices of finite intransitive group acts Steve Seif June 18, 2010 Finite group acts A finite group act is a unary algebra X = X, G, where G is closed under composition, and G consists of permutations
More informationProbability and distributions
2 Probability and distributions The concepts of randomness and probability are central to statistics. It is an empirical fact that most experiments and investigations are not perfectly reproducible. The
More informationCentral limit theorems
Chapter 6 Central limit theorems 6.1 Overview Recall that a random variable Z is said to have a standard normal distribution, denoted by N(0, 1), if it has a continuous distribution with density φ(z) =
More informationChapter 5. Continuous Random Variables and Probability Distributions. 5.1 Continuous Random Variables
Chapter 5 Continuous Random Variables and Probability Distributions 5.1 Continuous Random Variables 1 2CHAPTER 5. CONTINUOUS RANDOM VARIABLES AND PROBABILITY DISTRIBUTIONS Probability Distributions Probability
More informationA precipitous club guessing ideal on ω 1
on ω 1 Tetsuya Ishiu Department of Mathematics and Statistics Miami University June, 2009 ESI workshop on large cardinals and descriptive set theory Tetsuya Ishiu (Miami University) on ω 1 ESI workshop
More informationPure vs. Mixed Motive Games: On the Perception of Payoff-Orders
Pure vs. Mixed Motive Games: On the Perception of Payoff-Orders Burkhard C. Schipper Dept. of Economics, University of Bonn preliminary and incomplete version: June 20, 2001 Abstract I study the payoff
More informationHarvard School of Engineering and Applied Sciences CS 152: Programming Languages
Harvard School of Engineering and Applied Sciences CS 152: Programming Languages Lecture 3 Tuesday, January 30, 2018 1 Inductive sets Induction is an important concept in the theory of programming language.
More informationGenerating all nite modular lattices of a given size
Generating all nite modular lattices of a given size Peter Jipsen and Nathan Lawless Dedicated to Brian Davey on the occasion of his 65th birthday Abstract. Modular lattices, introduced by R. Dedekind,
More informationVirtual Demand and Stable Mechanisms
Virtual Demand and Stable Mechanisms Jan Christoph Schlegel Faculty of Business and Economics, University of Lausanne, Switzerland jschlege@unil.ch Abstract We study conditions for the existence of stable
More informationCHARACTERIZATION OF CLOSED CONVEX SUBSETS OF R n
CHARACTERIZATION OF CLOSED CONVEX SUBSETS OF R n Chebyshev Sets A subset S of a metric space X is said to be a Chebyshev set if, for every x 2 X; there is a unique point in S that is closest to x: Put
More informationModular and Distributive Lattices
CHAPTER 4 Modular and Distributive Lattices Background R. P. DILWORTH Imbedding problems and the gluing construction. One of the most powerful tools in the study of modular lattices is the notion of the
More informationOPTIONS & GREEKS. Study notes. An option results in the right (but not the obligation) to buy or sell an asset, at a predetermined
OPTIONS & GREEKS Study notes 1 Options 1.1 Basic information An option results in the right (but not the obligation) to buy or sell an asset, at a predetermined price, and on or before a predetermined
More informationON THE EQUATIONAL DEFINABILITY OF BROUWER-ZADEH LATTICES
ON THE EQUATIONAL DEFINABILITY OF BROUWER-ZADEH LATTICES M. SPINKS AND R. VEROFF Abstract. We give an axiomatisation of the variety of Brouwer- Zadeh lattices, suitable for applications to quantum theory.
More informationChapter 15: Jump Processes and Incomplete Markets. 1 Jumps as One Explanation of Incomplete Markets
Chapter 5: Jump Processes and Incomplete Markets Jumps as One Explanation of Incomplete Markets It is easy to argue that Brownian motion paths cannot model actual stock price movements properly in reality,
More informationQuadrant marked mesh patterns in 123-avoiding permutations
Quadrant marked mesh patterns in 23-avoiding permutations Dun Qiu Department of Mathematics University of California, San Diego La Jolla, CA 92093-02. USA duqiu@math.ucsd.edu Jeffrey Remmel Department
More informationMaximum Contiguous Subsequences
Chapter 8 Maximum Contiguous Subsequences In this chapter, we consider a well-know problem and apply the algorithm-design techniques that we have learned thus far to this problem. While applying these
More informationPARTIAL EQUILIBRIUM Welfare Analysis
PARTIAL EQUILIBRIUM Welfare Analysis [See Chap 12] Copyright 2005 by South-Western, a division of Thomson Learning. All rights reserved. 1 Welfare Analysis We would like welfare measure. Normative properties
More information6.207/14.15: Networks Lecture 10: Introduction to Game Theory 2
6.207/14.15: Networks Lecture 10: Introduction to Game Theory 2 Daron Acemoglu and Asu Ozdaglar MIT October 14, 2009 1 Introduction Outline Review Examples of Pure Strategy Nash Equilibria Mixed Strategies
More information4: SINGLE-PERIOD MARKET MODELS
4: SINGLE-PERIOD MARKET MODELS Marek Rutkowski School of Mathematics and Statistics University of Sydney Semester 2, 2016 M. Rutkowski (USydney) Slides 4: Single-Period Market Models 1 / 87 General Single-Period
More informationTheorem 1.3. Every finite lattice has a congruence-preserving embedding to a finite atomistic lattice.
CONGRUENCE-PRESERVING EXTENSIONS OF FINITE LATTICES TO SEMIMODULAR LATTICES G. GRÄTZER AND E.T. SCHMIDT Abstract. We prove that every finite lattice hasa congruence-preserving extension to a finite semimodular
More informationPermutation Factorizations and Prime Parking Functions
Permutation Factorizations and Prime Parking Functions Amarpreet Rattan Department of Combinatorics and Optimization University of Waterloo Waterloo, ON, Canada N2L 3G1 arattan@math.uwaterloo.ca June 10,
More information