Arborescent Architecture for Decentralized Supervisory Control of Discrete Event Systems

Size: px
Start display at page:

Download "Arborescent Architecture for Decentralized Supervisory Control of Discrete Event Systems"

Transcription

1 Arborescent Architecture for Decentralized Supervisory Control of Discrete Event Systems Ahmed Khoumsi and Hicham Chakib Dept. Electrical & Computer Engineering, University of Sherbrooke, Canada Abstract Decentralized control of discrete event systems consists in using local supervisors that observe locally the plant and compute local decisions to enable or disable events; those local decisions are transmitted to fusion modules that combine them to generate global enablement/disablement decisions that are actually applied to the plant. C&P and D&A controls are the two simplest systematic decentralized controls. Inference-based control is the most general systematic decentralized control, which generalizes significantly C&P and D&A controls. In this paper, we first propose a method that realizes a control objective C by an arborescent architecture (or tree). Each leaf of the tree is a decentralized control, and each node n is a disjunction or conjunction of the enabling/disabling decisions of the two children of n. We show that if the control objective C is realizable by inference-based control, then every leaf of the obtained tree is a C&P or D&A control. This means that by combining adequately C&P and D&A controls, we can realize every control objective that is realizable by inference-based control. Index Terms Discrete event systems (DES); decentralized supervisory control; C&P control; D&A control; inference-based control; arborescent architecture; multi-decision control. I. INTRODUCTION In decentralized (supervisory) control of discrete event systems (DES), several local supervisors cooperate to restrict the behavior of a plant so that it respects a specification. C&P (for Conjunctive and Permissive) and D&A (for Disjunctive and Anti-permissive) controls are the two simplest language-based decentralized controls [1], [2]. Inference-based control is the most general language-based decentralized control [3]. By language-based, we mean that the control methods depend on the languages used to model the plant and the specification. This is in

2 contrast with automata-based control methods, like multi-decision control [4] and intersectionbased control [5]. In this paper, we propose a method that constructs an arborescent architecture (or tree) which realizes a given control objective C. Each leaf of the tree is a decentralized control and each node n is a disjunction or conjunction of the control decisions of the two children of n. We consider the case where C is realizable by inference-based control and show that in the obtained tree, every leaf is a C&P or D&A control. Therefore, every control realizable by inference-based control is also realizable by disjunctions and conjunctions of C&P and D&A controls. Hence, we show that inference-based control (which is nonintuitive and difficult to apprehend) is equivalent to a combination of intuitive and simple controls. The rest of the paper is organized a follows. In Sect. II, we introduce decentralized control with an emphasis on C&P, D&A and inference-based controls. Sect. III presents the method to construct an arborescent architecture realizing a given control objective C. In Sect. IV, we study the tree construction when C is realizable by inference-based control. Section V concludes our study. For lack of space, the proofs of our results are omitted. A. Generalities II. DECENTRALIZED CONTROL A finite set of events is called alphabet, a finite sequence of events is called trace, and a set of traces is called language. ε denotes an empty trace. Henceforth, λ and σ denote a trace and an event, respectively. A prefix of λ is a trace µ s.t. λ = µα for some trace α. The set of prefixes of a language L is a language denoted L. If L and K are two languages, we denote by L \ K the language consisting of the traces of L from which are removed the traces of K. P i (X) and P 1 i (X) denote the usual projection and inverse projection of a language X. A regular language is modeled by a finite state automaton (FSA) A = (Q, Σ, δ, q 0, Q m ), where Q is a finite set of states, Σ is an alphabet, the transitions are specified by a partial function δ : Q Σ Q, q 0 Q is the initial state, and Q m Q is the set of marked states. The generated language L of A contains the traces leading from q 0 to the states in Q, while the marked language L m of A contains the traces of L leading to the states in Q m. We have L m L. An FSA is said trim if: 1) all its states are reachable from q 0, and 2) from any state in Q\ Q m we can reach a state in Q m. For a trim FSA, L m =L.

3 A discrete event system (DES) is a system whose behavior is described by the possible traces it can execute. We consider DESs modeled by regular languages (hence also by FSA). B. Supervisory Control Consider a plant modeled by an FSA G = (Q, Σ, δ, q 0, Q m ), and let L and L m be its generated and marked languages, respectively. Consider a specification modeled by a trim FSA K = (R, Σ, ξ, r 0, R m ), and let K be its marked language. Since K is trim, its generated language is K. The objective of control is to restrict the behavior of the plant so that it conforms to the specification. Such objective is achieved by using a supervisor S that observes the evolution of the plant and decides to enable or disable events. Let then Sup(λ, σ) {1, 0} (1 for enable, 0 for disable) be the decision made by S on an event σ when the plant has executed a trace λ L. We define the following prefix-closed language L(S/G): - ε L(S/G); - [λ L(S/G) λσ L Sup(λ, σ)=1] λσ L(S/G). We also define the corresponding marked language L m (S/G) = L(S/G) L m. Intuitively, L(S/G) and L m (S/G) consist respectively of the traces of L and L m which are permitted by S. Consider the following languages E σ and D σ : Definition 1: For every event σ Σ, E σ = {λ K λσ K} and D σ = {λ K λσ L \ K}. Intuitively, E σ contains the traces of the specification after which σ is accepted by both the plant and the specification, while D σ contains the traces of the specification after which σ is accepted only by the plant. The alphabet Σ is partitioned into Σ c and Σ uc, the set of controllable and uncontrollable events, respectively. Here are two important notions related to S: Definition 2: S is said feasible if it enables uncontrollable events. Formally: λ L : σ Σ uc Sup(λ, σ) = 1. Definition 3: S is said nonblocking if L m (S/G)=L(S/G). The objective of control is to find a non-blocking feasible supervisor that actuates so that Eqs. (1,2) are satisfied: L(S/G) = K (1) L m (S/G) = K (2)

4 Here are two important notions related to K: Definition 4: K is said L-controllable if D σ = σ Σ uc. Definition 5: K is said L m -closed if K = K L m. We have the following proposition: Proposition 1: If K is L m -closed: Eqs. (1,2) are equivalent to: σ Σ λ E σ Sup(λ, σ) = 1 λ D σ Sup(λ, σ) = 0 (3) C. Decentralized Supervisory Control There exist many studies of decentralized supervisory control, a few examples are [1], [2], [3], [6], [7]. The conventional approach in decentralized control is that n local supervisors (S i ) 1 i n take local decisions which are combined to generate the global decision which is applied to the plant. Each S i has its set of observable events Σ o,i and its set of controllable events Σ c,i. Let Σ o = Σ o,1 Σ o,n, Σ c = Σ c,1 Σ c,n, and I σ {1,, n} be the indexing set of the local supervisors controlling σ Σ c. To every decentralized control architecture is associated a property of coobservability s.t.: a non-blocking feasible supervisor satisfying Eqs. (1,2) exists iff K is L m -closed, L-controllable and coobservable. We are specifically interested by [1], [2], [3], [7]. The authors of [1], [2] propose the two simplest relevant decentralized architectures, which are called C&P (for Conjunctive & Permissive) and D&A (for Disjunctive & Anti-permissive) controls, respectively. The authors of [7] propose conditional C&P and D&A controls that generalize the (unconditional) C&P and D&A controls. The authors of [3] propose inference-based control that generalizes significantly conditional and unconditional C&P and D&A controls. Sects. II-D, II-E and II-F present respectively C&P, D&A and inference-based controls. D. Conjunctive and Permissive (C&P) Control [1], [2] In C&P control, the local supervisors are permissive (i.e. each S i enables an event when it is unsure of the adequate decision), and their local decisions are combined conjunctively to generate the global decision. This can be realized as follows:

5 After the execution of λ L, S i has observed P i (λ) and computes, for every σ Σ c,i, its local decision Sup i (P i (λ), σ): Sup i (P i (λ), σ) = The global decision Sup(λ, σ) is conjunctive, i.e.: Sup(λ, σ) = 1, if P i (λ) P i (E σ ) 0, if P i (λ) P i (E σ ) (4) i I σ Sup i (P i (λ), σ) (5) Let then C&P supervisor denote the feasible supervisor defined by Eqs. (4,5). Coobservability associated to C&P control for σ Σ c is: Definition 6: (E σ, D σ ) is said C&P-coobservable if i I σ P 1 i P i (E σ ) D σ =. The following theorem is an adaptation of results from [2]: Theorem 1: The C&P supervisor is non-blocking and satisfies Eqs. (1,2) iff : (E σ, D σ ) is C&P-coobservable σ Σ c, and K is L-controllable and L m -closed. E. Disjunctive and Anti-permissive (D&A) Control [2] In D&A control, the local supervisors are anti-permissive (i.e. each S i disables an event when it is unsure of the adequate decision), and their local decisions are combined disjunctively to generate the global decision. This can be realized as follows: After the execution of λ L, S i has observed P i (λ) and computes, for every σ Σ c,i, its local decision Sup i (P i (λ), σ): Sup i (P i (λ), σ) = The global decision Sup(λ, σ) is disjunctive, i.e.: Sup(λ, σ) = 0, if P i (λ) P i (D σ ) 1, if P i (λ) P i (D σ ) (6) i I σ Sup i (P i (λ), σ) (7) Let then D&A supervisor denote the feasible supervisor defined by Eqs. (6,7). Coobservability associated to D&A control for σ Σ c is: Definition 7: (E σ, D σ ) is said D&A-coobservable if i I σ P 1 i P i (D σ ) E σ =. The following theorem is an adaptation of results from [2]: Theorem 2: The D&A supervisor is non-blocking and satisfies Eqs. (1,2) iff : (E σ, D σ ) is D&A-coobservable σ Σ c, and K is L-controllable and L m -closed.

6 F. Inference-Based Control [3] After the execution of λ L, every S i has observed P i (λ) and computes, for every σ Σ c,i, a pair Sup i (P i (λ), σ) = (c i (P i (λ), σ), n i (P i (λ), σ)), where c i (P i (λ), σ) {1, 0, ϕ} is a local decision, and n i (P i (λ), σ) is a nonnegative integer representing an ambiguity level. ϕ denotes an unsure decision. The global decision Sup(λ, σ) is obtained by selecting the local decision with the smallest ambiguity level. The computation of c i (P i (λ), σ) and n i (P i (λ), σ) is quite complex and nonintuitive and will not be presented. However, we present the following iterative languages E σ [k] and D σ [k] which are fundamental in inference-based control and in our study: Basis: E σ [0] = E σ and D σ [0] = D σ, Inductive step: for k 0 E σ [k + 1] = E σ [k] [ D σ [k + 1] = D σ [k] [ Pi 1 i I σ Pi 1 i I σ P i (D σ [k])] P i (E σ [k])] Proposition 2: Some properties of E σ [k] and D σ [k]: 1) E σ [k+1] E σ [k] and D σ [k+1] D σ [k] k 0. 2) If E σ [k] = for some k 0, then E σ [i] = D σ [i] = i > k. The property holds if we switch E σ and D σ. 3) If E σ [k + 2] = E σ [k] for some k 0, then E σ [i] = E σ [k] and D σ [i + 1] = D σ [k + 1] i k. The property holds if we switch E σ and D σ. 4) If E σ [k + 1] = E σ [k] and D σ [k + 1] = D σ [k] for some k 0, then E σ [i] = E σ [k] and D σ [i]=d σ [k] i k. The above properties can be easily deduced from [3]. Inference-based control is denoted Inf N -control if N is the maximum ambiguity level which is computed. In [3], it is proved that Inf 0 -control is equivalent to a combination of C&P and D&A controls, and Inf 1 -control is equivalent to a combination of conditional C&P and conditional D&A controls. Coobservability associated to Inf N -control for σ Σ c is: Definition 8: (E σ, D σ ) is said Inf N -coobservable for some nonnegative integer N, if E σ [N+ 1] = or D σ [N +1] =. The following theorem is an adaptation of results from [3]:

7 Theorem 3: The feasible supervisor computed by Inf N -control is non-blocking and satisfies Eqs. (1,2) iff : (E σ, D σ ) is Inf N -coobservable σ Σ c, and K is L-controllable and L m -closed. G. Reformulation of the Control Objective Note that Theorems 1, 2 and 3, are not expressed as usual: instead of writing there exists a supervisor..., we consider a specific supervisor previously defined. The two formulations are equivalent in any architecture, but the advantage of the new formulation is that it is more concrete since it is related to a known supervisor. L-controllability and L m -closure of K are independent of the control architecture, and hence do not influence our study of the following sections which is purely related to control architectures. Therefore, without loss of generality, we will use the following assumption, which allows to consider uniquely coobservability as condition of existence of supervisor. Assumption 1: K is L-controllable and L m -closed. From Assump. 1 and Prop. 1, the control objective to satisfy Eqs. (1,2) is reformulated as the objective to satisfy Eq. (3), σ Σ. The advantage of this reformulation is that Eq. (3) is more concrete than Eqs. (1,2), since Eq. (3) expresses explicitly a constraint on the global decision of the supervisor. III. SYNTHESIS OF AN ARBESCENT ARCHITECTURE For an event σ, let a pair (E, D) s.t. E E σ and D D σ. Controlling (E, D) means applying control decisions to σ that satisfy Eq. (3) w.r.t (E, D). Controlling a plant can hence be defined as controlling (E σ, D σ ) for every σ Σ. As we will explain it later in this section, our arborescent methodology is based on decomposing E σ and D σ, s.t. the control of (E σ, D σ ) is transformed into a composition (by disjunctions and conjunctions) of controls of pairs, where each pair (E, D) is s.t. E E σ and D D σ. For the purpose of our methodology, we generalize the definitions of D&A and C&P controls and their corresponding equations (4,5) and (6,7) for any pair (E, D), instead of only (E σ, D σ ). We also generalize the control objective to satisfy Eq. (3) for any pair (E, D), instead of only (E σ, D σ ). We also define the iterative languages E[k] and D[k] like E σ [k] and D σ [k] have been defined in Sect. II-F. In Sects. III-B and III-C, we show how to decompose the control of (E, D) into a conjunction or disjunction of two controls inspired from the multi-decision control [4]. The cases where E = or

8 D = are trivial. Indeed, controlling (E, ) is achieved by always enabling σ, controlling (, D) is achieved by always disabling σ, and controlling (, ) is achieved by taking any decision. Hence, we assume: Assumption 2: E = and D =. A. Series (r i ) i 1 and (s i ) i 1 We define two series (r i ) i 1 and (s i ) i 1 and their respective indexes ν and µ. They will be useful for presenting our methodology. r 1 = (E σ,d σ ), r 2k+2 = (E σ [2k + 1], D σ [2k]) and r 2k+3 = (E σ [2k + 1], D σ [2k + 2]) for k 0. Let r ν be the first element of (r i ) i 1 that has an empty component, if any. s 1 = (E σ \ E σ [1], D σ ), s 2k+2 = (E σ [2k + 1], D σ [2k] \ D σ [2k + 2]) and s 2k+3 = (E σ [2k + 1] \ E σ [2k + 3], D σ [2k + 2]) for k 0. Let s µ be the first element of (s i ) i 1 that has an empty component, if any. Note that each r i<ν and s i<µ is a pair (E, D) that can be controlled, with the objective to satisfy Eq. (3) w.r.t (E, D). B. Disjunctive Control Based on a Decomposition of E Consider a decomposition of E into E 1 and E 2, i.e. E = E 1 E 2. The disjunctive control of (E 1, D) and (E 2, D) is obtained by combining disjunctively the decisions of the controls of (E 1, D) and (E 2, D). From [4] we have: Proposition 3: The disjunctive control of (E 1, D) and (E 2, D) realizes the control of (E 1 E 2, D). By applying Prop. 3 to r 2k+1 for k 0, we obtain the following proposition: Proposition 4: The disjunctive control of s 1 and r 2 realizes the control of r 1. The disjunctive control of s 2k+3 and r 2k+4 realizes the control of r 2k+3, for k 0. We have the following proposition, which implies that every s 2k+1 can be controlled by a D&A architecture: Proposition 5: Every s 2k+1 for k 0 is D&A-coobservable. Prop. 4 and Prop. 5 are illustrated in Fig. 1.

9 control decision control decision Control of (E, D) (a1) (a2) (E \ E[1], D) Control of (E[1], D) control decision Control of (E[2k+1], D[2k+2]) (b1) (b2) control decision Control of (E[2k+1]\E[2k+3], D[2k+2]) (E[2k+3], D[2k+2]) Fig. 1. (a1) realized by (a2); (b1) realized by (b2). C. Conjunctive Control Based on a Decomposition of D Consider a decomposition of D into D 1 and D 2, i.e. D = D 1 D 2. The conjunctive control of (E, D 1 ) and (E, D 2 ) is obtained by combining conjunctively the decisions of the controls of (E, D 1 ) and (E, D 2 ). From [4]: Proposition 6: The conjunctive control of of (E, D 1 ) and (E, D 2 ) realizes the control of (E, D 1 D 2 ). By applying Prop. 6 to r 2k+2 for k 0, we obtain the following proposition: Proposition 7: The conjunctive control of s 2k+2 and r 2k+3 realizes the control of r 2k+2, for k 0. We have the following proposition, which implies that every s 2k+2 can be controlled by a C&P architecture: Proposition 8: Every s 2k+2 for k 0 is C&P-coobservable. Prop. 7 and Prop. 8 are illustrated in Fig. 2. control decision Control of (E[2k+1], D[2k]) (a1) (a2) (E[2k+1], D[2k]\D[2k+2]) control decision Control of (E[2k+1], D[2k+2]) Fig. 2. (a1) realized by (a2).

10 D. Tree Construction We construct an arborescent architecture to control (E σ, D σ ); the construction method is based on Props. 4, 5, 7 and 8, which are illustrated in Figs. 1 and 2. In a first step the objective of controlling r 1 = (E σ, D σ ) is split disjunctively (as shown in Fig. 1(a1,a2)) into the control of s 1 (left child) and the control of r 2 (right child). The latter control of r 2 is itself split conjunctively (as shown in Fig. 2 for k = 0) into the control of s 2 (left child) and the control of r 3 (right child). The latter control of r 3 is itself split disjunctively (as shown in Fig. 1(b1,b2) for k = 0) into the control of s 3 (left child) and the control of r 4 (right child). And so on, conjunctive and disjunctive decompositions are applied alternately to the successive r i until we obtain a r i whose left child (s i ) or right child (r i+1 ) has an empty component. Such r i is a leaf. Here are necessary notations to define formally the construction of the tree. Notations 1: Let x and y be a pair (E, D) to be controlled: x denotes a leaf representing the control of x; x DA and x CP denote leafs representing the D&A and C&P controls of x, respectively; x DA y is a node with the left child x DA and the right child y ; x CP y is a node with the left child x CP and the right child y. The tree (which we denote T ) is constructed as follows: Initialization: T = r 1 = (E σ, D σ ); i = 1. While s i and r i+1 are without empty component: - if i is odd: replace r i by s i DA r i+1 ; - if i is even: replace r i by s i CP r i+1 ; - i = i + 1. The obtained tree is represented in Fig. 3. Note that in this tree, E σ [i] and D σ [i] have odd and even indexes, respectively. The tree realizes the control of (E σ, D σ ), i.e. the decisions (enable, disable) to control (E σ, D σ ) are provided by the operator of the root of the tree. Each node n of the tree has two children: the left child of n is a leaf which provides the decisions of a C&P or D&A control, and the right child of n is a subtree which provides the decisions of a control. Note that (r i ) i 1 are the pairs written at the upper right sides of the nodes of Fig. 3. The successive r i are controlled by the successive nested subtrees. Note also that (s i ) i 1 are the pairs

11 written in the left leafs of Fig. 3. The successive s i are controlled by the successive left leafs. The fact that each left child (which is a leaf) of a node is a C&P or D&A control is due to Props. 5 and 8. (E \ E[1], D) (E[1], D\D[2]) (E[1]\E[3], D[2]) (E[3], D[2]\D[4]) Control of (E, D) Control of (E[1], D) Control of (E[1], D[2]) Control of (E[3], D[2]) Control of (E[3], D[4])... (E[2k 1]\E[2k+1], D[2k]) (E[2k+1], D[2k]\D[2k+2]) (E[2k+1]\E[2k+3], D[2k+2]) Control of (E[2k 1], D[2k]) Control of (E[2k+1], D[2k]) Control of (E[2k+1], D[2k+2]) Control of (E[2k+3], D[2k+2])... Fig. 3. Tree obtained if we start with a disjunction. The tree of Fig. 3 has been obtained by starting with a disjunction and a decomposition of E σ. If we start with a conjunction and a decomposition of D σ, we obtain a symmetrical tree, in the sense that each of the two trees is obtained from the other tree by making the following switches: E σ [x] D σ [x],, D&A C&P. Consequently, the results obtained from the two trees are symmetrical in the same sense. Therefore, we will consider only the tree of Fig. 3. However, we will explain later that in some examples, only one of the two trees is constructible. We see that in the construction of the tree, the while-loop stops with emptiness of a component of s i or r i+1. Emptiness of a component of r i+1 is studied in Sect. IV, while emptiness of a component of s i is left for a future study. We will use the following definitions of convergence: Definition 9: (E σ [i]) i 0, (D σ [j]) j 0 converge after (u, v) steps, if u and v are the smallest indexes s.t. ( i u, E σ [i] = E σ [u]) and ( j v, D σ [j] = D σ [v]). We specify that the convergence is to when E σ [u] = D σ [v] =. (It is easy to show that 1 u v 1.)

12 E. Some Justifications Let us give justifications to two questions that may arise for readers: Why do we use E σ [j]\e σ [j + 2] and D σ [j]\d σ [j + 2] in the series (s i ) i 1, instead of E σ [j]\e σ [j + 1] and D σ [j]\d σ [j + 1]? This choice is due to Prop. 2(3), which guarantees that E σ [j]\e σ [j + 2] and D σ [j]\ D σ [j +2] before the convergence of (E σ [j]) j 0 and (D σ [j]) j 0, respectively. This result will be useful in Sect. IV. Why do we distinguish even and odd indices? This is due to the fact that the tree is based on the series (r i ) i 1 and (s i ) i 1, which have distinct forms with even and odd indices. IV. ARBESCENT ARCHITECTURE OF C&P D&A CONTROLS TO REALIZE AN INFERENCE-BASED CONTROL We make the following assumption, which implies (from Theorem 3) that inference-based control is applicable to (E σ, D σ ): Assumption 3: N 0 s.t. E σ [N +1]= or D σ [N +1]=. The tree of Fig. 3 is constructible iff E σ E σ [1], because E σ is initially decomposed into E σ \ E σ [1] and E σ [1]. Similarly, its symmetrical tree (introduced above) is constructible iff D σ D σ [1]. The situation where E σ = E σ [1] and D σ = D σ [1] is impossible, because it implies E σ [k] = E σ and D σ [k]=d σ k 0 (from Prop. 2(4)), which contradicts Assump. 3 (assuming Assump. 2). Therefore, in every situation respecting Assump. 3, at least one of the two trees is constructible. Due to the symmetry between the two trees, it is sufficient to present only the study of the tree of Fig. 3. Therefore, we assume E σ E σ [1]. We have the following lemma: Lemma 1: Assump. 3 is equivalent to the existence of ν 2 s.t. r ν is the first element of (r i ) i 1 with an empty component. In the remaining part of this Sect. IV, Assump. 3 is implicit when ν is mentioned. We have the following lemma: Lemma 2: s 1,, s ν 1 do not contain an empty component. From Lemma 2, in the construction of the tree, i = ν 1 is the first index where the while-loop has its condition unsatisfied. Therefore, the last iteration is for i = ν 2, and hence s ν 2 and r ν 1 are the last constructed elements.

13 The cases where ν is even or odd are treated in Sects. IV-A and IV-B, respectively. A. ν = 2k + 2 for k 0 Proposition 9: If ν = 2k + 2 for k 0, then r ν 1 is D&A-coobservable. Proposition 10: If ν = 2, D&A control is applicable to r 1 = (E σ, D σ ), hence the tree that realizes the control of (E σ, D σ ) consists of just one leaf. If ν = 2k + 4 for k 0, the tree of Fig. 4 realizes the control of (E σ, D σ ). (E \ E[1], D) (E[1], D\D[2]) (E[1]\E[3], D[2]) (E[3], D[2]\D[4]) Control of (E, D) Control of (E[1], D) Control of (E[1], D[2]) Control of (E[3], D[2]) Control of (E[3], D[4])... (E[2k 1]\E[2k+1], D[2k]) (E[2k+1], D[2k]\D[2k+2]) Control of (E[2k 1], D[2k]) Control of (E[2k+1], D[2k]) (E[2k+1], D[2k+2]) Fig. 4. Tree of Fig. 3 when ν = 2k + 4 for k 0. B. ν = 2k + 3 for k 0 If we proceed in the same way as in Sect. IV-A, we find the following results: Proposition 11: If ν = 2k + 3 for k 0, then r ν 1 is C&P-coobservable. Proposition 12: If ν = 3, the tree of Fig. 5 realizes the control of (E σ, D σ ). If ν = 2k + 5 for k 0, the tree of Fig. 6 realizes the control of (E σ, D σ ). C. General Result As already explained, the tree of Fig. 3 is constructible iff E σ E σ [1], and a symmetrical tree is constructible iff D σ D σ [1]. We have obtained Props. 10 and 12 from the tree of Fig. 3, and

14 (E \ E[1], D) Control of (E, D) (E[1], D) Fig. 5. Tree of Fig. 3 when ν = 3. (E \ E[1], D) (E[1], D\D[2]) (E[1]\E[3], D[2]) (E[3], D[2]\D[4]) Control of (E, D) Control of (E[1], D) Control of (E[1], D[2]) Control of (E[3], D[2]) Control of (E[3], D[4])... (E[2k+1]\E[2k+3], D[2k+2]) Control of (E[2k+1], D[2k+2]) (E[2k+3], D[2k+2]) Fig. 6. Tree of Fig. 3 when ν = 2k + 5 for k 0. we can obtain similar results from the symmetrical tree. Assump. 3 implies that E σ E σ [1] or D σ D σ [1], hence at least one of the two trees is constructible. Therefore: Theorem 4: Every inference-based control of (E σ, D σ ) is equivalent to an arborescent architecture consisting of disjunctions and conjunctions of C&P and D&A controls. D. Example We illustrate our results of Sect. IV with the example of [3], so that the interested reader can use this example to compare our approach with the inference-based method of [3]. The plant is modeled by the automaton G of Fig. 7, where the initial state is numbered 0 and the marked states are in bold. The specification is modeled by the automaton K which is obtained from G by removing the shaded (grey) states and the (dotted) transitions that lead to them. We have n = 2, I σ = {1, 2}, Σ o,1 = {a, a, d}, Σ o,2 = {b, b, d}, and Σ c,1 = Σ c,2 = {σ}. We compute: E σ = {ε, ab, ba, da, db}, D σ = {a, b, d, dab, dba },

15 σ 0 d b a a σ σ σ b a σ σ b σ σ a σ b σ Fig. 7. G is the whole automaton; K is obtained from G by removing the shaded (grey) states and the (dotted) transitions that lead to them. E σ [1] = {ε, da, db}, D σ [1] = {a, b, d}, E σ [2] = {ε}, D σ [2] = {d}, E σ [3] = D σ [3] =. ν = 4 because r 4 = (E σ [3], D σ [2]) = (, {d}) is the first element of (r i ) i 1 with an empty component. We are in the case ν = 2k + 4 of Prop. 10 with k = 0. We obtain therefore the tree of Fig. 4 for k = 0, which is represented in Fig. 8. (E \ E[1], D) (E[1], D\D[2]) Control of (E, D) Control of (E[1], D) (E[1], D[2]) Fig. 8. Arborescent architecture obtained for the example of Fig. 7. V. CONCLUSION We propose an arborescent architecture for decentralized control of discrete event systems. We show that when inference-based control is applicable to realize a given control objective C, then C is also realizable by an arborescent architecture combining uniquely C&P and D&A controls. This result shows that inference-based control is fundamentally based on C&P and D&A controls. We are now investigating the case where inference-based control is unapplicable to realize C. In this case, we obtain a tree whose leafs are C&P and D&A controls, with the exception of the lower right leaf. The latter corresponds to a control objective C where inference-based control is unapplicable. Therefore, the problem of finding a control architecture for C is reduced into the problem of finding a control architecture for C. The latter can be interpreted as the portion of

16 C which is responsible of the nonapplicability of inference-based control. This fact is relevant for multi-decision control [4] that has to find how to decompose a control objective which is unrealizable by inference-based control, into several control objectives that are realizable by inference-based control. Instead of finding a decomposition of C, now multi-decision control has to find a decomposition of C. REFERENCES [1] K. Rudie and W. Wonham, Think globally, act locally: Decentralized supervisory control, IEEE Transactions on Automatic Control, vol. 37, no. 11, pp , November [2] T.-S. Yoo and S. Lafortune, A general architecture for decentralized supervisory control of discrete-event systems, Discrete Event Dyna. Syst.: Theory Applicat., vol. 12, pp , [3] R. Kumar and S. Takai, Inference-based ambiguity management in decentralized decision-making: Decentralized control of discrete event systems, IEEE Transactions on Automatic Control, vol. 52, no. 10, pp , [4] H. Chakib and A. Khoumsi, Multi-decision supervisory control: Parallel decentralized architectures cooperating for controlling discrete event systems, IEEE Transactions on Automatic Control, vol. 56, no. 11, pp , November [5] X. Yin and S. Lafortune, Decentralized supervisory control with intersection-based architecture, IEEE Transactions on Automatic Control, vol. 61, no. 11, pp , November [6] S. L. Ricker and K. Rudie, Knowledge is a terrible thing to waste: using inference in discrete-event control problems, in American Control Conference (ACC), Denver, CO, USA, [7] T.-S. Yoo and S. Lafortune, Decentralized supervisory control with conditional decisions: Supervisor existence, IEEE Transactions on Automatic Control, vol. 49, no. 11, pp , November 2004.

TABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC

TABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC TABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC THOMAS BOLANDER AND TORBEN BRAÜNER Abstract. Hybrid logics are a principled generalization of both modal logics and description logics. It is well-known

More information

Notes on the symmetric group

Notes on the symmetric group Notes on the symmetric group 1 Computations in the symmetric group Recall that, given a set X, the set S X of all bijections from X to itself (or, more briefly, permutations of X) is group under function

More information

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Shlomo Hoory and Stefan Szeider Department of Computer Science, University of Toronto, shlomoh,szeider@cs.toronto.edu Abstract.

More information

On Existence of Equilibria. Bayesian Allocation-Mechanisms

On Existence of Equilibria. Bayesian Allocation-Mechanisms On Existence of Equilibria in Bayesian Allocation Mechanisms Northwestern University April 23, 2014 Bayesian Allocation Mechanisms In allocation mechanisms, agents choose messages. The messages determine

More information

A relation on 132-avoiding permutation patterns

A relation on 132-avoiding permutation patterns Discrete Mathematics and Theoretical Computer Science DMTCS vol. VOL, 205, 285 302 A relation on 32-avoiding permutation patterns Natalie Aisbett School of Mathematics and Statistics, University of Sydney,

More information

GAME THEORY. Department of Economics, MIT, Follow Muhamet s slides. We need the following result for future reference.

GAME THEORY. Department of Economics, MIT, Follow Muhamet s slides. We need the following result for future reference. 14.126 GAME THEORY MIHAI MANEA Department of Economics, MIT, 1. Existence and Continuity of Nash Equilibria Follow Muhamet s slides. We need the following result for future reference. Theorem 1. Suppose

More information

COMBINATORICS OF REDUCTIONS BETWEEN EQUIVALENCE RELATIONS

COMBINATORICS OF REDUCTIONS BETWEEN EQUIVALENCE RELATIONS COMBINATORICS OF REDUCTIONS BETWEEN EQUIVALENCE RELATIONS DAN HATHAWAY AND SCOTT SCHNEIDER Abstract. We discuss combinatorial conditions for the existence of various types of reductions between equivalence

More information

Interpolation of κ-compactness and PCF

Interpolation of κ-compactness and PCF Comment.Math.Univ.Carolin. 50,2(2009) 315 320 315 Interpolation of κ-compactness and PCF István Juhász, Zoltán Szentmiklóssy Abstract. We call a topological space κ-compact if every subset of size κ has

More information

Algebra homework 8 Homomorphisms, isomorphisms

Algebra homework 8 Homomorphisms, isomorphisms MATH-UA.343.005 T.A. Louis Guigo Algebra homework 8 Homomorphisms, isomorphisms For every n 1 we denote by S n the n-th symmetric group. Exercise 1. Consider the following permutations: ( ) ( 1 2 3 4 5

More information

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Shlomo Hoory and Stefan Szeider Abstract (k, s)-sat is the propositional satisfiability problem restricted to instances where each

More information

Martingales. by D. Cox December 2, 2009

Martingales. by D. Cox December 2, 2009 Martingales by D. Cox December 2, 2009 1 Stochastic Processes. Definition 1.1 Let T be an arbitrary index set. A stochastic process indexed by T is a family of random variables (X t : t T) defined on a

More information

Assets with possibly negative dividends

Assets with possibly negative dividends Assets with possibly negative dividends (Preliminary and incomplete. Comments welcome.) Ngoc-Sang PHAM Montpellier Business School March 12, 2017 Abstract The paper introduces assets whose dividends can

More information

arxiv: v1 [math.co] 31 Mar 2009

arxiv: v1 [math.co] 31 Mar 2009 A BIJECTION BETWEEN WELL-LABELLED POSITIVE PATHS AND MATCHINGS OLIVIER BERNARDI, BERTRAND DUPLANTIER, AND PHILIPPE NADEAU arxiv:0903.539v [math.co] 3 Mar 009 Abstract. A well-labelled positive path of

More information

CATEGORICAL SKEW LATTICES

CATEGORICAL SKEW LATTICES CATEGORICAL SKEW LATTICES MICHAEL KINYON AND JONATHAN LEECH Abstract. Categorical skew lattices are a variety of skew lattices on which the natural partial order is especially well behaved. While most

More information

Notes on Natural Logic

Notes on Natural Logic Notes on Natural Logic Notes for PHIL370 Eric Pacuit November 16, 2012 1 Preliminaries: Trees A tree is a structure T = (T, E), where T is a nonempty set whose elements are called nodes and E is a relation

More information

Semantics with Applications 2b. Structural Operational Semantics

Semantics with Applications 2b. Structural Operational Semantics Semantics with Applications 2b. Structural Operational Semantics Hanne Riis Nielson, Flemming Nielson (thanks to Henrik Pilegaard) [SwA] Hanne Riis Nielson, Flemming Nielson Semantics with Applications:

More information

2 Modeling Credit Risk

2 Modeling Credit Risk 2 Modeling Credit Risk In this chapter we present some simple approaches to measure credit risk. We start in Section 2.1 with a short overview of the standardized approach of the Basel framework for banking

More information

Introduction to Probability Theory and Stochastic Processes for Finance Lecture Notes

Introduction to Probability Theory and Stochastic Processes for Finance Lecture Notes Introduction to Probability Theory and Stochastic Processes for Finance Lecture Notes Fabio Trojani Department of Economics, University of St. Gallen, Switzerland Correspondence address: Fabio Trojani,

More information

arxiv: v1 [math.lo] 24 Feb 2014

arxiv: v1 [math.lo] 24 Feb 2014 Residuated Basic Logic II. Interpolation, Decidability and Embedding Minghui Ma 1 and Zhe Lin 2 arxiv:1404.7401v1 [math.lo] 24 Feb 2014 1 Institute for Logic and Intelligence, Southwest University, Beibei

More information

TR : Knowledge-Based Rational Decisions and Nash Paths

TR : Knowledge-Based Rational Decisions and Nash Paths City University of New York (CUNY) CUNY Academic Works Computer Science Technical Reports Graduate Center 2009 TR-2009015: Knowledge-Based Rational Decisions and Nash Paths Sergei Artemov Follow this and

More information

Structural Induction

Structural Induction Structural Induction Jason Filippou CMSC250 @ UMCP 07-05-2016 Jason Filippou (CMSC250 @ UMCP) Structural Induction 07-05-2016 1 / 26 Outline 1 Recursively defined structures 2 Proofs Binary Trees Jason

More information

Palindromic Permutations and Generalized Smarandache Palindromic Permutations

Palindromic Permutations and Generalized Smarandache Palindromic Permutations arxiv:math/0607742v2 [mathgm] 8 Sep 2007 Palindromic Permutations and Generalized Smarandache Palindromic Permutations Tèmítópé Gbóláhàn Jaíyéọlá Department of Mathematics, Obafemi Awolowo University,

More information

Strong normalisation and the typed lambda calculus

Strong normalisation and the typed lambda calculus CHAPTER 9 Strong normalisation and the typed lambda calculus In the previous chapter we looked at some reduction rules for intuitionistic natural deduction proofs and we have seen that by applying these

More information

Lecture l(x) 1. (1) x X

Lecture l(x) 1. (1) x X Lecture 14 Agenda for the lecture Kraft s inequality Shannon codes The relation H(X) L u (X) = L p (X) H(X) + 1 14.1 Kraft s inequality While the definition of prefix-free codes is intuitively clear, we

More information

A Translation of Intersection and Union Types

A Translation of Intersection and Union Types A Translation of Intersection and Union Types for the λ µ-calculus Kentaro Kikuchi RIEC, Tohoku University kentaro@nue.riec.tohoku.ac.jp Takafumi Sakurai Department of Mathematics and Informatics, Chiba

More information

Optimal Satisficing Tree Searches

Optimal Satisficing Tree Searches Optimal Satisficing Tree Searches Dan Geiger and Jeffrey A. Barnett Northrop Research and Technology Center One Research Park Palos Verdes, CA 90274 Abstract We provide an algorithm that finds optimal

More information

Dynamic tax depreciation strategies

Dynamic tax depreciation strategies OR Spectrum (2011) 33:419 444 DOI 10.1007/s00291-010-0214-3 REGULAR ARTICLE Dynamic tax depreciation strategies Anja De Waegenaere Jacco L. Wielhouwer Published online: 22 May 2010 The Author(s) 2010.

More information

Yao s Minimax Principle

Yao s Minimax Principle Complexity of algorithms The complexity of an algorithm is usually measured with respect to the size of the input, where size may for example refer to the length of a binary word describing the input,

More information

4 Martingales in Discrete-Time

4 Martingales in Discrete-Time 4 Martingales in Discrete-Time Suppose that (Ω, F, P is a probability space. Definition 4.1. A sequence F = {F n, n = 0, 1,...} is called a filtration if each F n is a sub-σ-algebra of F, and F n F n+1

More information

Multirate Multicast Service Provisioning I: An Algorithm for Optimal Price Splitting Along Multicast Trees

Multirate Multicast Service Provisioning I: An Algorithm for Optimal Price Splitting Along Multicast Trees Mathematical Methods of Operations Research manuscript No. (will be inserted by the editor) Multirate Multicast Service Provisioning I: An Algorithm for Optimal Price Splitting Along Multicast Trees Tudor

More information

The Value of Information in Central-Place Foraging. Research Report

The Value of Information in Central-Place Foraging. Research Report The Value of Information in Central-Place Foraging. Research Report E. J. Collins A. I. Houston J. M. McNamara 22 February 2006 Abstract We consider a central place forager with two qualitatively different

More information

Introduction to Greedy Algorithms: Huffman Codes

Introduction to Greedy Algorithms: Huffman Codes Introduction to Greedy Algorithms: Huffman Codes Yufei Tao ITEE University of Queensland In computer science, one interesting method to design algorithms is to go greedy, namely, keep doing the thing that

More information

0.1 Equivalence between Natural Deduction and Axiomatic Systems

0.1 Equivalence between Natural Deduction and Axiomatic Systems 0.1 Equivalence between Natural Deduction and Axiomatic Systems Theorem 0.1.1. Γ ND P iff Γ AS P ( ) it is enough to prove that all axioms are theorems in ND, as MP corresponds to ( e). ( ) by induction

More information

Lecture 5: Iterative Combinatorial Auctions

Lecture 5: Iterative Combinatorial Auctions COMS 6998-3: Algorithmic Game Theory October 6, 2008 Lecture 5: Iterative Combinatorial Auctions Lecturer: Sébastien Lahaie Scribe: Sébastien Lahaie In this lecture we examine a procedure that generalizes

More information

Finding Equilibria in Games of No Chance

Finding Equilibria in Games of No Chance Finding Equilibria in Games of No Chance Kristoffer Arnsfelt Hansen, Peter Bro Miltersen, and Troels Bjerre Sørensen Department of Computer Science, University of Aarhus, Denmark {arnsfelt,bromille,trold}@daimi.au.dk

More information

Value of Flexibility in Managing R&D Projects Revisited

Value of Flexibility in Managing R&D Projects Revisited Value of Flexibility in Managing R&D Projects Revisited Leonardo P. Santiago & Pirooz Vakili November 2004 Abstract In this paper we consider the question of whether an increase in uncertainty increases

More information

UPWARD STABILITY TRANSFER FOR TAME ABSTRACT ELEMENTARY CLASSES

UPWARD STABILITY TRANSFER FOR TAME ABSTRACT ELEMENTARY CLASSES UPWARD STABILITY TRANSFER FOR TAME ABSTRACT ELEMENTARY CLASSES JOHN BALDWIN, DAVID KUEKER, AND MONICA VANDIEREN Abstract. Grossberg and VanDieren have started a program to develop a stability theory for

More information

1 Solutions to Tute09

1 Solutions to Tute09 s to Tute0 Questions 4. - 4. are straight forward. Q. 4.4 Show that in a binary tree of N nodes, there are N + NULL pointers. Every node has outgoing pointers. Therefore there are N pointers. Each node,

More information

R-automata. 1 Introduction. Parosh Aziz Abdulla, Pavel Krcal, and Wang Yi

R-automata. 1 Introduction. Parosh Aziz Abdulla, Pavel Krcal, and Wang Yi R-automata Parosh Aziz Abdulla, Pavel Krcal, and Wang Yi Department of Information Technology, Uppsala University, Sweden Email: {parosh,pavelk,yi}@it.uu.se Abstract. We introduce R-automata a model for

More information

THE TRAVELING SALESMAN PROBLEM FOR MOVING POINTS ON A LINE

THE TRAVELING SALESMAN PROBLEM FOR MOVING POINTS ON A LINE THE TRAVELING SALESMAN PROBLEM FOR MOVING POINTS ON A LINE GÜNTER ROTE Abstract. A salesperson wants to visit each of n objects that move on a line at given constant speeds in the shortest possible time,

More information

Martingale Pricing Theory in Discrete-Time and Discrete-Space Models

Martingale Pricing Theory in Discrete-Time and Discrete-Space Models IEOR E4707: Foundations of Financial Engineering c 206 by Martin Haugh Martingale Pricing Theory in Discrete-Time and Discrete-Space Models These notes develop the theory of martingale pricing in a discrete-time,

More information

Optimal Dividend Policy of A Large Insurance Company with Solvency Constraints. Zongxia Liang

Optimal Dividend Policy of A Large Insurance Company with Solvency Constraints. Zongxia Liang Optimal Dividend Policy of A Large Insurance Company with Solvency Constraints Zongxia Liang Department of Mathematical Sciences Tsinghua University, Beijing 100084, China zliang@math.tsinghua.edu.cn Joint

More information

On the Lower Arbitrage Bound of American Contingent Claims

On the Lower Arbitrage Bound of American Contingent Claims On the Lower Arbitrage Bound of American Contingent Claims Beatrice Acciaio Gregor Svindland December 2011 Abstract We prove that in a discrete-time market model the lower arbitrage bound of an American

More information

Lecture 2: The Simple Story of 2-SAT

Lecture 2: The Simple Story of 2-SAT 0510-7410: Topics in Algorithms - Random Satisfiability March 04, 2014 Lecture 2: The Simple Story of 2-SAT Lecturer: Benny Applebaum Scribe(s): Mor Baruch 1 Lecture Outline In this talk we will show that

More information

Harvard School of Engineering and Applied Sciences CS 152: Programming Languages

Harvard School of Engineering and Applied Sciences CS 152: Programming Languages Harvard School of Engineering and Applied Sciences CS 152: Programming Languages Lecture 3 Tuesday, January 30, 2018 1 Inductive sets Induction is an important concept in the theory of programming language.

More information

1102 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 3, MARCH Genyuan Wang and Xiang-Gen Xia, Senior Member, IEEE

1102 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 3, MARCH Genyuan Wang and Xiang-Gen Xia, Senior Member, IEEE 1102 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 51, NO 3, MARCH 2005 On Optimal Multilayer Cyclotomic Space Time Code Designs Genyuan Wang Xiang-Gen Xia, Senior Member, IEEE Abstract High rate large

More information

THE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET

THE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET THE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET MICHAEL PINSKER Abstract. We calculate the number of unary clones (submonoids of the full transformation monoid) containing the

More information

Antino Kim Kelley School of Business, Indiana University, Bloomington Bloomington, IN 47405, U.S.A.

Antino Kim Kelley School of Business, Indiana University, Bloomington Bloomington, IN 47405, U.S.A. THE INVISIBLE HAND OF PIRACY: AN ECONOMIC ANALYSIS OF THE INFORMATION-GOODS SUPPLY CHAIN Antino Kim Kelley School of Business, Indiana University, Bloomington Bloomington, IN 47405, U.S.A. {antino@iu.edu}

More information

Hierarchical Exchange Rules and the Core in. Indivisible Objects Allocation

Hierarchical Exchange Rules and the Core in. Indivisible Objects Allocation Hierarchical Exchange Rules and the Core in Indivisible Objects Allocation Qianfeng Tang and Yongchao Zhang January 8, 2016 Abstract We study the allocation of indivisible objects under the general endowment

More information

Global Joint Distribution Factorizes into Local Marginal Distributions on Tree-Structured Graphs

Global Joint Distribution Factorizes into Local Marginal Distributions on Tree-Structured Graphs Teaching Note October 26, 2007 Global Joint Distribution Factorizes into Local Marginal Distributions on Tree-Structured Graphs Xinhua Zhang Xinhua.Zhang@anu.edu.au Research School of Information Sciences

More information

LECTURE 2: MULTIPERIOD MODELS AND TREES

LECTURE 2: MULTIPERIOD MODELS AND TREES LECTURE 2: MULTIPERIOD MODELS AND TREES 1. Introduction One-period models, which were the subject of Lecture 1, are of limited usefulness in the pricing and hedging of derivative securities. In real-world

More information

Semantics and Verification of Software

Semantics and Verification of Software Semantics and Verification of Software Thomas Noll Software Modeling and Verification Group RWTH Aachen University http://moves.rwth-aachen.de/teaching/ws-1718/sv-sw/ Recap: CCPOs and Continuous Functions

More information

Permutation Factorizations and Prime Parking Functions

Permutation Factorizations and Prime Parking Functions Permutation Factorizations and Prime Parking Functions Amarpreet Rattan Department of Combinatorics and Optimization University of Waterloo Waterloo, ON, Canada N2L 3G1 arattan@math.uwaterloo.ca June 10,

More information

Sy D. Friedman. August 28, 2001

Sy D. Friedman. August 28, 2001 0 # and Inner Models Sy D. Friedman August 28, 2001 In this paper we examine the cardinal structure of inner models that satisfy GCH but do not contain 0 #. We show, assuming that 0 # exists, that such

More information

Generalising the weak compactness of ω

Generalising the weak compactness of ω Generalising the weak compactness of ω Andrew Brooke-Taylor Generalised Baire Spaces Masterclass Royal Netherlands Academy of Arts and Sciences 22 August 2018 Andrew Brooke-Taylor Generalising the weak

More information

Best-Reply Sets. Jonathan Weinstein Washington University in St. Louis. This version: May 2015

Best-Reply Sets. Jonathan Weinstein Washington University in St. Louis. This version: May 2015 Best-Reply Sets Jonathan Weinstein Washington University in St. Louis This version: May 2015 Introduction The best-reply correspondence of a game the mapping from beliefs over one s opponents actions to

More information

Equivalence between Semimartingales and Itô Processes

Equivalence between Semimartingales and Itô Processes International Journal of Mathematical Analysis Vol. 9, 215, no. 16, 787-791 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/1.12988/ijma.215.411358 Equivalence between Semimartingales and Itô Processes

More information

More On λ κ closed sets in generalized topological spaces

More On λ κ closed sets in generalized topological spaces Journal of Algorithms and Computation journal homepage: http://jac.ut.ac.ir More On λ κ closed sets in generalized topological spaces R. Jamunarani, 1, P. Jeyanthi 2 and M. Velrajan 3 1,2 Research Center,

More information

Topics in Contract Theory Lecture 3

Topics in Contract Theory Lecture 3 Leonardo Felli 9 January, 2002 Topics in Contract Theory Lecture 3 Consider now a different cause for the failure of the Coase Theorem: the presence of transaction costs. Of course for this to be an interesting

More information

Best response cycles in perfect information games

Best response cycles in perfect information games P. Jean-Jacques Herings, Arkadi Predtetchinski Best response cycles in perfect information games RM/15/017 Best response cycles in perfect information games P. Jean Jacques Herings and Arkadi Predtetchinski

More information

3.2 No-arbitrage theory and risk neutral probability measure

3.2 No-arbitrage theory and risk neutral probability measure Mathematical Models in Economics and Finance Topic 3 Fundamental theorem of asset pricing 3.1 Law of one price and Arrow securities 3.2 No-arbitrage theory and risk neutral probability measure 3.3 Valuation

More information

NOTES ON FIBONACCI TREES AND THEIR OPTIMALITY* YASUICHI HORIBE INTRODUCTION 1. FIBONACCI TREES

NOTES ON FIBONACCI TREES AND THEIR OPTIMALITY* YASUICHI HORIBE INTRODUCTION 1. FIBONACCI TREES 0#0# NOTES ON FIBONACCI TREES AND THEIR OPTIMALITY* YASUICHI HORIBE Shizuoka University, Hamamatsu, 432, Japan (Submitted February 1982) INTRODUCTION Continuing a previous paper [3], some new observations

More information

Lattices and the Knaster-Tarski Theorem

Lattices and the Knaster-Tarski Theorem Lattices and the Knaster-Tarski Theorem Deepak D Souza Department of Computer Science and Automation Indian Institute of Science, Bangalore. 8 August 27 Outline 1 Why study lattices 2 Partial Orders 3

More information

The Capital Asset Pricing Model as a corollary of the Black Scholes model

The Capital Asset Pricing Model as a corollary of the Black Scholes model he Capital Asset Pricing Model as a corollary of the Black Scholes model Vladimir Vovk he Game-heoretic Probability and Finance Project Working Paper #39 September 6, 011 Project web site: http://www.probabilityandfinance.com

More information

Log-linear Dynamics and Local Potential

Log-linear Dynamics and Local Potential Log-linear Dynamics and Local Potential Daijiro Okada and Olivier Tercieux [This version: November 28, 2008] Abstract We show that local potential maximizer ([15]) with constant weights is stochastically

More information

Essays on Some Combinatorial Optimization Problems with Interval Data

Essays on Some Combinatorial Optimization Problems with Interval Data Essays on Some Combinatorial Optimization Problems with Interval Data a thesis submitted to the department of industrial engineering and the institute of engineering and sciences of bilkent university

More information

MITCHELL S THEOREM REVISITED. Contents

MITCHELL S THEOREM REVISITED. Contents MITCHELL S THEOREM REVISITED THOMAS GILTON AND JOHN KRUEGER Abstract. Mitchell s theorem on the approachability ideal states that it is consistent relative to a greatly Mahlo cardinal that there is no

More information

Lecture 23: April 10

Lecture 23: April 10 CS271 Randomness & Computation Spring 2018 Instructor: Alistair Sinclair Lecture 23: April 10 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They

More information

10.1 Elimination of strictly dominated strategies

10.1 Elimination of strictly dominated strategies Chapter 10 Elimination by Mixed Strategies The notions of dominance apply in particular to mixed extensions of finite strategic games. But we can also consider dominance of a pure strategy by a mixed strategy.

More information

Lecture Notes on Type Checking

Lecture Notes on Type Checking Lecture Notes on Type Checking 15-312: Foundations of Programming Languages Frank Pfenning Lecture 17 October 23, 2003 At the beginning of this class we were quite careful to guarantee that every well-typed

More information

An effective perfect-set theorem

An effective perfect-set theorem An effective perfect-set theorem David Belanger, joint with Keng Meng (Selwyn) Ng CTFM 2016 at Waseda University, Tokyo Institute for Mathematical Sciences National University of Singapore The perfect

More information

Mathematics Notes for Class 12 chapter 1. Relations and Functions

Mathematics Notes for Class 12 chapter 1. Relations and Functions 1 P a g e Mathematics Notes for Class 12 chapter 1. Relations and Functions Relation If A and B are two non-empty sets, then a relation R from A to B is a subset of A x B. If R A x B and (a, b) R, then

More information

Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets

Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets Unraveling versus Unraveling: A Memo on Competitive Equilibriums and Trade in Insurance Markets Nathaniel Hendren October, 2013 Abstract Both Akerlof (1970) and Rothschild and Stiglitz (1976) show that

More information

Gödel algebras free over finite distributive lattices

Gödel algebras free over finite distributive lattices TANCL, Oxford, August 4-9, 2007 1 Gödel algebras free over finite distributive lattices Stefano Aguzzoli Brunella Gerla Vincenzo Marra D.S.I. D.I.COM. D.I.C.O. University of Milano University of Insubria

More information

Abstract Algebra Solution of Assignment-1

Abstract Algebra Solution of Assignment-1 Abstract Algebra Solution of Assignment-1 P. Kalika & Kri. Munesh [ M.Sc. Tech Mathematics ] 1. Illustrate Cayley s Theorem by calculating the left regular representation for the group V 4 = {e, a, b,

More information

Arbitrage Conditions for Electricity Markets with Production and Storage

Arbitrage Conditions for Electricity Markets with Production and Storage SWM ORCOS Arbitrage Conditions for Electricity Markets with Production and Storage Raimund Kovacevic Research Report 2018-03 March 2018 ISSN 2521-313X Operations Research and Control Systems Institute

More information

Non replication of options

Non replication of options Non replication of options Christos Kountzakis, Ioannis A Polyrakis and Foivos Xanthos June 30, 2008 Abstract In this paper we study the scarcity of replication of options in the two period model of financial

More information

Game Theory: Normal Form Games

Game Theory: Normal Form Games Game Theory: Normal Form Games Michael Levet June 23, 2016 1 Introduction Game Theory is a mathematical field that studies how rational agents make decisions in both competitive and cooperative situations.

More information

Sublinear Time Algorithms Oct 19, Lecture 1

Sublinear Time Algorithms Oct 19, Lecture 1 0368.416701 Sublinear Time Algorithms Oct 19, 2009 Lecturer: Ronitt Rubinfeld Lecture 1 Scribe: Daniel Shahaf 1 Sublinear-time algorithms: motivation Twenty years ago, there was practically no investigation

More information

Level by Level Inequivalence, Strong Compactness, and GCH

Level by Level Inequivalence, Strong Compactness, and GCH Level by Level Inequivalence, Strong Compactness, and GCH Arthur W. Apter Department of Mathematics Baruch College of CUNY New York, New York 10010 USA and The CUNY Graduate Center, Mathematics 365 Fifth

More information

Algorithmic Game Theory and Applications. Lecture 11: Games of Perfect Information

Algorithmic Game Theory and Applications. Lecture 11: Games of Perfect Information Algorithmic Game Theory and Applications Lecture 11: Games of Perfect Information Kousha Etessami finite games of perfect information Recall, a perfect information (PI) game has only 1 node per information

More information

monotone circuit value

monotone circuit value monotone circuit value A monotone boolean circuit s output cannot change from true to false when one input changes from false to true. Monotone boolean circuits are hence less expressive than general circuits.

More information

ECE 586GT: Problem Set 1: Problems and Solutions Analysis of static games

ECE 586GT: Problem Set 1: Problems and Solutions Analysis of static games University of Illinois Fall 2018 ECE 586GT: Problem Set 1: Problems and Solutions Analysis of static games Due: Tuesday, Sept. 11, at beginning of class Reading: Course notes, Sections 1.1-1.4 1. [A random

More information

Game Theory. Lecture Notes By Y. Narahari. Department of Computer Science and Automation Indian Institute of Science Bangalore, India August 2012

Game Theory. Lecture Notes By Y. Narahari. Department of Computer Science and Automation Indian Institute of Science Bangalore, India August 2012 Game Theory Lecture Notes By Y. Narahari Department of Computer Science and Automation Indian Institute of Science Bangalore, India August 2012 Chapter 6: Mixed Strategies and Mixed Strategy Nash Equilibrium

More information

ADDING A LOT OF COHEN REALS BY ADDING A FEW II. 1. Introduction

ADDING A LOT OF COHEN REALS BY ADDING A FEW II. 1. Introduction ADDING A LOT OF COHEN REALS BY ADDING A FEW II MOTI GITIK AND MOHAMMAD GOLSHANI Abstract. We study pairs (V, V 1 ), V V 1, of models of ZF C such that adding κ many Cohen reals over V 1 adds λ many Cohen

More information

Tangent Lévy Models. Sergey Nadtochiy (joint work with René Carmona) Oxford-Man Institute of Quantitative Finance University of Oxford.

Tangent Lévy Models. Sergey Nadtochiy (joint work with René Carmona) Oxford-Man Institute of Quantitative Finance University of Oxford. Tangent Lévy Models Sergey Nadtochiy (joint work with René Carmona) Oxford-Man Institute of Quantitative Finance University of Oxford June 24, 2010 6th World Congress of the Bachelier Finance Society Sergey

More information

6: MULTI-PERIOD MARKET MODELS

6: MULTI-PERIOD MARKET MODELS 6: MULTI-PERIOD MARKET MODELS Marek Rutkowski School of Mathematics and Statistics University of Sydney Semester 2, 2016 M. Rutkowski (USydney) 6: Multi-Period Market Models 1 / 55 Outline We will examine

More information

The Turing Definability of the Relation of Computably Enumerable In. S. Barry Cooper

The Turing Definability of the Relation of Computably Enumerable In. S. Barry Cooper The Turing Definability of the Relation of Computably Enumerable In S. Barry Cooper Computability Theory Seminar University of Leeds Winter, 1999 2000 1. The big picture Turing definability/invariance

More information

Continuous images of closed sets in generalized Baire spaces ESI Workshop: Forcing and Large Cardinals

Continuous images of closed sets in generalized Baire spaces ESI Workshop: Forcing and Large Cardinals Continuous images of closed sets in generalized Baire spaces ESI Workshop: Forcing and Large Cardinals Philipp Moritz Lücke (joint work with Philipp Schlicht) Mathematisches Institut, Rheinische Friedrich-Wilhelms-Universität

More information

Efficiency in Decentralized Markets with Aggregate Uncertainty

Efficiency in Decentralized Markets with Aggregate Uncertainty Efficiency in Decentralized Markets with Aggregate Uncertainty Braz Camargo Dino Gerardi Lucas Maestri December 2015 Abstract We study efficiency in decentralized markets with aggregate uncertainty and

More information

CHOICE THEORY, UTILITY FUNCTIONS AND RISK AVERSION

CHOICE THEORY, UTILITY FUNCTIONS AND RISK AVERSION CHOICE THEORY, UTILITY FUNCTIONS AND RISK AVERSION Szabolcs Sebestyén szabolcs.sebestyen@iscte.pt Master in Finance INVESTMENTS Sebestyén (ISCTE-IUL) Choice Theory Investments 1 / 65 Outline 1 An Introduction

More information

Conditional Rewriting

Conditional Rewriting Conditional Rewriting Bernhard Gramlich ISR 2009, Brasilia, Brazil, June 22-26, 2009 Bernhard Gramlich Conditional Rewriting ISR 2009, July 22-26, 2009 1 Outline Introduction Basics in Conditional Rewriting

More information

Two-Dimensional Bayesian Persuasion

Two-Dimensional Bayesian Persuasion Two-Dimensional Bayesian Persuasion Davit Khantadze September 30, 017 Abstract We are interested in optimal signals for the sender when the decision maker (receiver) has to make two separate decisions.

More information

A Decentralized Learning Equilibrium

A Decentralized Learning Equilibrium Paper to be presented at the DRUID Society Conference 2014, CBS, Copenhagen, June 16-18 A Decentralized Learning Equilibrium Andreas Blume University of Arizona Economics ablume@email.arizona.edu April

More information

Max Registers, Counters and Monotone Circuits

Max Registers, Counters and Monotone Circuits James Aspnes 1 Hagit Attiya 2 Keren Censor 2 1 Yale 2 Technion Counters Model Collects Our goal: build a cheap counter for an asynchronous shared-memory system. Two operations: increment and read. Read

More information

Collective Profitability and Welfare in Selling-Buying Intermediation Processes

Collective Profitability and Welfare in Selling-Buying Intermediation Processes Collective Profitability and Welfare in Selling-Buying Intermediation Processes Amelia Bădică 1, Costin Bădică 1(B), Mirjana Ivanović 2, and Ionuţ Buligiu 1 1 University of Craiova, A. I. Cuza 13, 200530

More information

The Limiting Distribution for the Number of Symbol Comparisons Used by QuickSort is Nondegenerate (Extended Abstract)

The Limiting Distribution for the Number of Symbol Comparisons Used by QuickSort is Nondegenerate (Extended Abstract) The Limiting Distribution for the Number of Symbol Comparisons Used by QuickSort is Nondegenerate (Extended Abstract) Patrick Bindjeme 1 James Allen Fill 1 1 Department of Applied Mathematics Statistics,

More information

1 FUNDAMENTALS OF LOGIC NO.5 SOUNDNESS AND COMPLETENESS Tatsuya Hagino hagino@sfc.keio.ac.jp lecture URL https://vu5.sfc.keio.ac.jp/slide/ 2 So Far Propositional Logic Logical Connectives(,,, ) Truth Table

More information

FDPE Microeconomics 3 Spring 2017 Pauli Murto TA: Tsz-Ning Wong (These solution hints are based on Julia Salmi s solution hints for Spring 2015.

FDPE Microeconomics 3 Spring 2017 Pauli Murto TA: Tsz-Ning Wong (These solution hints are based on Julia Salmi s solution hints for Spring 2015. FDPE Microeconomics 3 Spring 2017 Pauli Murto TA: Tsz-Ning Wong (These solution hints are based on Julia Salmi s solution hints for Spring 2015.) Hints for Problem Set 2 1. Consider a zero-sum game, where

More information

On Packing Densities of Set Partitions

On Packing Densities of Set Partitions On Packing Densities of Set Partitions Adam M.Goyt 1 Department of Mathematics Minnesota State University Moorhead Moorhead, MN 56563, USA goytadam@mnstate.edu Lara K. Pudwell Department of Mathematics

More information