Lecture 14: Basic Fixpoint Theorems (cont.)

Similar documents
Lattices and the Knaster-Tarski Theorem

CTL Model Checking. Goal Method for proving M sat σ, where M is a Kripke structure and σ is a CTL formula. Approach Model checking!

École normale supérieure, MPRI, M2 Year 2007/2008. Course 2-6 Abstract interpretation: application to verification and static analysis P.

Principles of Program Analysis: Abstract Interpretation

Semantics and Verification of Software

Lecture 6. 1 Polynomial-time algorithms for the global min-cut problem

The Real Numbers. Here we show one way to explicitly construct the real numbers R. First we need a definition.

MAT25 LECTURE 10 NOTES. = a b. > 0, there exists N N such that if n N, then a n a < ɛ

Best response cycles in perfect information games

Semantics with Applications 2b. Structural Operational Semantics

Recall: Data Flow Analysis. Data Flow Analysis Recall: Data Flow Equations. Forward Data Flow, Again

Introduction to Greedy Algorithms: Huffman Codes

2 Deduction in Sentential Logic

arxiv: v2 [math.lo] 13 Feb 2014

AVL Trees. The height of the left subtree can differ from the height of the right subtree by at most 1.

Sy D. Friedman. August 28, 2001

TEST 1 SOLUTIONS MATH 1002

Sublinear Time Algorithms Oct 19, Lecture 1

Lecture l(x) 1. (1) x X

Gödel algebras free over finite distributive lattices

Structural Induction

Laurence Boxer and Ismet KARACA

Lecture 2: The Simple Story of 2-SAT

FDPE Microeconomics 3 Spring 2017 Pauli Murto TA: Tsz-Ning Wong (These solution hints are based on Julia Salmi s solution hints for Spring 2015.

4 Martingales in Discrete-Time

CHARACTERIZATION OF CLOSED CONVEX SUBSETS OF R n

Principles of Program Analysis: Algorithms

Notes on Natural Logic

Math 167: Mathematical Game Theory Instructor: Alpár R. Mészáros

Lecture 5: Tuesday, January 27, Peterson s Algorithm satisfies the No Starvation property (Theorem 1)

Lecture 4: Divide and Conquer

ExpTime Tableau Decision Procedures for Regular Grammar Logics with Converse

NOTES ON FIBONACCI TREES AND THEIR OPTIMALITY* YASUICHI HORIBE INTRODUCTION 1. FIBONACCI TREES

Bounds on coloring numbers

Lecture Quantitative Finance Spring Term 2015

Distributed Function Calculation via Linear Iterations in the Presence of Malicious Agents Part I: Attacking the Network

The Probabilistic Method - Probabilistic Techniques. Lecture 7: Martingales

Strong normalisation and the typed lambda calculus

On the Optimality of a Family of Binary Trees Techical Report TR

GUESSING MODELS IMPLY THE SINGULAR CARDINAL HYPOTHESIS arxiv: v1 [math.lo] 25 Mar 2019

Discrete Mathematics for CS Spring 2008 David Wagner Final Exam

CONSTRUCTION OF CODES BY LATTICE VALUED FUZZY SETS. 1. Introduction. Novi Sad J. Math. Vol. 35, No. 2, 2005,

Outline of Lecture 1. Martin-Löf tests and martingales

THE NUMBER OF UNARY CLONES CONTAINING THE PERMUTATIONS ON AN INFINITE SET

Foundations of Economics for International Business Supplementary Exercises 2

Tug of War Game. William Gasarch and Nick Sovich and Paul Zimand. October 6, Abstract

Game Theory: Normal Form Games

Essays on Some Combinatorial Optimization Problems with Interval Data

LARGE CARDINALS AND L-LIKE UNIVERSES

Laurence Boxer and Ismet KARACA

Lattice Properties. Viorel Preoteasa. April 17, 2016

Virtual Demand and Stable Mechanisms

Mechanism Design and Auctions

1 Online Problem Examples

Chapter 3 - Lecture 4 Moments and Moment Generating Funct

3 The Model Existence Theorem

SEMICENTRAL IDEMPOTENTS IN A RING

The illustrated zoo of order-preserving functions

THE TRAVELING SALESMAN PROBLEM FOR MOVING POINTS ON A LINE

Outline Introduction Game Representations Reductions Solution Concepts. Game Theory. Enrico Franchi. May 19, 2010

Cut-free sequent calculi for algebras with adjoint modalities

10.1 Elimination of strictly dominated strategies

6 -AL- ONE MACHINE SEQUENCING TO MINIMIZE MEAN FLOW TIME WITH MINIMUM NUMBER TARDY. Hamilton Emmons \,«* Technical Memorandum No. 2.

Hints on Some of the Exercises

1 Overview. 2 The Gradient Descent Algorithm. AM 221: Advanced Optimization Spring 2016

6. Martingales. = Zn. Think of Z n+1 as being a gambler s earnings after n+1 games. If the game if fair, then E [ Z n+1 Z n

LECTURE 2: MULTIPERIOD MODELS AND TREES

Laws of probabilities in efficient markets

Forecast Horizons for Production Planning with Stochastic Demand

MAT 4250: Lecture 1 Eric Chung

Bargaining and Competition Revisited Takashi Kunimoto and Roberto Serrano

Lecture 7: Bayesian approach to MAB - Gittins index

To Fully Net or Not to Net: Adverse Effects of Partial Multilateral Netting

TABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC

Log-linear Dynamics and Local Potential

Dynamic Admission and Service Rate Control of a Queue

SAT and DPLL. Introduction. Preliminaries. Normal forms DPLL. Complexity. Espen H. Lian. DPLL Implementation. Bibliography.

Blackwell Optimality in Markov Decision Processes with Partial Observation

Lecture 14: Examples of Martingales and Azuma s Inequality. Concentration

Supporting Information

Risk Management for Distributed Authorization

EXTENSIVE AND NORMAL FORM GAMES

Lecture 23: April 10

Maximizing the Spread of Influence through a Social Network Problem/Motivation: Suppose we want to market a product or promote an idea or behavior in

Math-Stat-491-Fall2014-Notes-V

White-Box Testing Techniques I

Web Appendix: Proofs and extensions.

0.1 Equivalence between Natural Deduction and Axiomatic Systems

White-Box Testing Techniques I

SAT and DPLL. Espen H. Lian. May 4, Ifi, UiO. Espen H. Lian (Ifi, UiO) SAT and DPLL May 4, / 59

Online Algorithms SS 2013

GAME THEORY. Department of Economics, MIT, Follow Muhamet s slides. We need the following result for future reference.

E-companion to Coordinating Inventory Control and Pricing Strategies for Perishable Products

Lecture 10: The knapsack problem

IEOR E4004: Introduction to OR: Deterministic Models

Generalising the weak compactness of ω

The ruin probabilities of a multidimensional perturbed risk model

Long Term Values in MDPs Second Workshop on Open Games

A Property Equivalent to n-permutability for Infinite Groups

Comparison of proof techniques in game-theoretic probability and measure-theoretic probability

Transcription:

Lecture 14: Basic Fixpoint Theorems (cont) Predicate Transformers Monotonicity and Continuity Existence of Fixpoints Computing Fixpoints Fixpoint Characterization of CTL Operators 1

2 E M Clarke and E A Emerson Synthesis of synchronization skeletons for branching time temporal logic In Logic of Programs: Workshop, Yorktown Heights, NY, May 1981, volume 131 of Lecture Notes in Computer Science Springer-Verlag, 1981 A functional is called a predicate transformer Thus, the least element in the lattice is the empty set, denoted by the lattice is the set of all states, denoted by, and the greatest element in make it true The ordering is set inclusion is the lattice of predicates over Each predicate is identified with the set of states that Let be an arbitrary finite Kripke structure Predicate Transformers

Let 1 2 3 3 is -continuous provided that implies is -continuous provided that implies ; is monotonic provided that implies ; be a predicate transformer, then Monotonicity and Continuity

gfp gfp lfp lfp If 4 whenever is also -continuous whenever is monotonic whenever is also -continuous; whenever is monotonic is monotonic, then it has a least fixpoint, lfp, and a greatest fixpoint, gfp Basic Fixpoint Theorems

such that lfp such that for every -continuous and 5 There is an integer such that gfp is 4 There is an integer is There is an integer, 3 There is an integer such that for every, 2 For every, and 1 The functional is both -continuous Let be a finite Kripke structure and let be a monotonic predicate transformer on Some seful Lemmas

6 end end; return( ) ; while begin do ; ; functionlfp(tau: PredicateTransformer) begin As a consequence of the preceding lemmas, if the following program is monotonic, its least fixpoint can be computed by Least Fixpoint Algorithm

7 It follows directly that lfp and that the value returned is the least fixpoint When the loop terminates, we have and lfp It is easy to see that at the beginning of the Lemma 2 implies that -th iteration, and So, the number of iterations before the loop terminates is bounded by the cardinality of lfp The invariant for the while loop is given by the assertion Correctness of Algorithm

8 end end; return ( ) ; while begin do ; ; functiongfp(tau: PredicateTransformer) begin The greatest fixpoint of may be computed in a similar manner Essentially the same argument can be used to show that the procedure terminates and that the value it returns is gfp Greatest Fixpoint Algorithm

9 We will only prove the characterization for E EG gfp AG gfp EF lfp AF lfp E EX EX AX lfp AX EX AX A lfp Each CTL operator can be characterized as a least or greatest fixpoint of a predicate transformer: Fixpoint Characterizations for CTL

10 4 Conclude from steps 2 and 3 that E is the least fixpoint of EX 3 Show that E See next page 2 Observe that is -continuous and that lfp 1 Prove that EX is monotonic Additional steps are required to show that E is the least such fixpoint It is straightforward to prove that E is a fixpoint of Proof: E is the least fixpoint of the functional EX Lemma Fixpoint Characterization of E

11 Hint: If, E, then there is a path Show that such that and for all Next, show that E Hint: Prove by induction that for all fixpoint of, E se the fact that E First, show that E Next, we show that E We break this step into two parts: Characterization of E (Cont) is a

12 E since The figures demonstrate that the sequence of approximations EX In this case the functional is given by may be computed for a simple Kripke structure The next four figures show how E Simple Example for E converges to E

E? s 13 0 Simple Example for E (Cont) p

E? s 14 0 Simple Example for E (Cont) p

E? s 15 0 Simple Example for E (Cont) p

E? s 16 0 Simple Example for E (Cont) p