Semantical Characterization of unbounded-nondeterministic ASMs

Size: px
Start display at page:

Download "Semantical Characterization of unbounded-nondeterministic ASMs"

Transcription

1 Semantical Characterization of unbounded-nondeterministic ASMs Berlin, 26/27 Feb 2007 Andreas Glausch Humboldt-Universität zu Berlin Department of Computer Science

2 Abstract State Machines (ASMs) state next-state Σ-structure ASM program Σ-structure syntax Can we do without syntax? 2

3 Semantical Characterization Gurevich 99 sequential ASMs = sequential algorithms 3

4 Semantical Characterization Gurevich 99 sequential ASMs = sequential algorithms Gurevich, Yavorskaya 06 bounded-nondeterministic ASM = bounded-nondeterministic algorithms k 4

5 This Talk Lipari Guide unbounded-nondeterministic ASMs = unbounded-nondeterministic algorithms new 0 nondeterministic = def unbounded-nondeterministic 5

6 Semantical Characterization of Sequential ASMs by Yuri Gurevich

7 Sequential ASMs A sequential ASM consists of a set of Σ-structures, a sequential ASM program: 1. assignment statements 2. conditional statements 3. block statements a := next(a) if (a b) then par endpar 7

8 Characterization sequential ASMs = sequential algorithms 8

9 Sequential Algorithms A sequential algorithm Α satisfies (S1) sequential-time axiom: Α determines a set of states S and a next-state function τ : S S. 9

10 Sequential Algorithms A sequential algorithm Α satisfies (S1) sequential-time axiom, (S2) state axiom: All states are Σ-structures. 10

11 Sequential Algorithms A sequential algorithm Α satisfies (S1) sequential-time axiom, (S2) state axiom, (S3) universe axiom: S and τ(s) have the same universe. 11

12 Sequential Algorithms A sequential algorithm Α satisfies (S1) sequential-time axiom, (S2) state axiom, (S3) universe axiom, (S4) isomorphism axiom: S is closed under isomorphism. τ preserves isomorphisms. 12

13 Sequential Algorithms A sequential algorithm Α satisfies (S1) sequential-time axiom, (S2) state axiom, (S3) universe axiom, (S4) isomorphism axiom, (S5) bounded-exploration axiom: A finite set T of ground terms characterizes τ: S = T R implies (S, τ(s)) = (R, τ(r)). 13

14 Sequential Algorithms A sequential algorithm Α satisfies (S1) sequential-time axiom, (S2) state axiom, (S3) universe axiom, (S4) isomorphism axiom, (S5) bounded-exploration axiom. 14

15 Nondeterministic ASMs

16 Nondeterministic ASMs A nondeterministic ASM consists of a set of Σ-structures, a nondeterministic ASM program: 1. assignment statements a := next(a) 2. conditional statements if (a=b) then 3. block statements par endpar 4. choice statements choose x do 16

17 Example State a() 1 b() 2 universe: N x next(x) signature Σ: a: N b: N next: N N 17

18 Example Program choose x with x a do b:=x x=3 a() b() 1 3 a() b() 1 2 x=4 x=5 a() b() 1 4 a() 1 b() 5 18

19 Semantical Characterization of nondeterministic ASMs

20 Characterization nondeterministic ASMs = nondeterministic algorithms 20

21 Nondeterministic Algorithms A nondeterministic algorithm Ν satisfies (N1) nondeterministic-time axiom, (N2) state axiom, (N3) universe axiom, (N4) isomorphism axiom, (N5)... 21

22 Nondeterministic Algorithms A nondeterministic algorithm Ν satisfies (N1) nondeterministic-time axiom, (N2) state axiom, (N3) universe axiom, (N4) isomorphism axiom, (N5) bounded-work axiom. 22

23 Nondeterministic Algorithms A nondeterministic algorithm Ν satisfies (N1) nondeterministic-time axiom: Ν consists of a set of states S and a next-state relation S S. 23

24 Nondeterministic Algorithms A nondeterministic algorithm Ν satisfies (N1) nondeterministic-time axiom, (N2) state axiom: All states are Σ-structures. 24

25 Nondeterministic Algorithms A nondeterministic algorithm Ν satisfies (N1) nondeterministic-time axiom, (N2) state axiom, (N3) universe axiom: For S S, S and S have the same universe. 25

26 Nondeterministic Algorithms A nondeterministic algorithm Ν satisfies (N1) nondeterministic-time axiom, (N2) state axiom, (N3) universe axiom, (N4) isomorphism axiom: S is closed under isomorphism. Isomorphic states have isomorphic next-states. 26

27 Nondeterministic Algorithms A nondeterministic algorithm Ν satisfies (N1) nondeterministic-time axiom, (N2) state axiom, (N3) universe axiom, (N4) isomorphism axiom, (N5) bounded-work axiom. 27

28 Bounded-Exploration Axiom A finite set T of ground terms characterizes : S S and S = T R imply R R with (S, S ) = (R, R ). bounded-nondeterministic algorithms S k 28

29 (N5) Bounded-Work Axiom Our aim: unbounded nondeterminism Our solution: bounded-work axiom amount of work is bounded in each step S S S S 29

30 (N5) Bounded-Work Axiom Our aim: unbounded nondeterminism Our solution: bounded-work axiom amount of work is bounded in each step S S S S 30

31 (N5) Bounded-Work Axiom S S 1. Decompose S into molecules 2. Each step involves only boundedly many molecules of S 31

32 Molecule of a State (next, [1], 2) molecule a() 1 x b() 2 next(x) Gurevich: Describe changes of a state by molecules. Here: Describe the complete state by molecules. 32

33 Molecule of a State a() 1 x b() 2 next(x) (a, [], 1) (b, [], 2) (next, [1], 2) (next, [2], 3) (next, [3], 4) (next, [4], 5) 33

34 Bounded-Work S S involves boundedly many molecules of S S S 34

35 Bounded-Work S S involves boundedly many molecules of S S (a, [], 1) (b, [], 2) (next, [1], 2) (next, [2], 3) (next, [3], 4) (next, [4], 5) 35

36 Bounded-Work S S involves boundedly many molecules of S S (a, [], 1) (b, [], 2) (next, [1], 2) (next, [2], 3) (next, [3], 4) (next, [4], 5) S (a, [], 1) (b, [], 3) (next, [1], 1) (next, [2], 3) (next, [3], 4) (next, [4], 5) 36

37 Bounded-Work S S involves boundedly many molecules of S Substep S S (a, [], 1) (b, [], 2) (next, [1], 2) (next, [2], 3) (next, [3], 4) (next, [4], 5) (a, [], 1) (b, [], 3) (next, [1], 1) (next, [2], 3) (next, [3], 4) (next, [4], 5) k S S is caused by the substep. 37

38 (N5) Bounded-Work Axiom A set W of bounded substeps characterizes all steps: S S is a step iff S S is caused by a substep in W. 38

39 Nondeterministic Algorithms Any object satisfying (N1) nondeterministic-time axiom, (N2) state axiom, (N3) universe axiom, (N4) isomorphism axiom, (N5) bounded-work axiom, is a nondeterministic algorithm. 39

40 The Theorem nondeterministic ASMs = nondeterministic algorithms 40

41 Applications of the Characterization

42 Reversibility Nondeterministic algorithms are reversible: For a nondeterministic algorithm Ν, Ν -1 is a nondeterministic algorithm, too. Ν Ν -1 42

43 Reversibility: Proof Ν -1 satisfies the axioms (N1) (N5): (N1) Ν -1 determines states and next-state relation -1. (N2) States are Σ-structures. (N3) -1 preserves Universes. (N4) -1 preserves Isomorphisms. (N5) -1 performs bounded substeps: (a, [], 1) (b, [], 2) (next, [1], 2) (next, [2], 3) Ν Ν -1 (a, [], 1) (b, [], 3) (next, [1], 1) (next, [2], 3) k 43

44 Reversibility of ASMs Nondeterministic algorithms are reversible. nondeterministic ASM Theorem Nondeterministic ASMs are reversible. 44

45 Reversibility: Example a() b() 3 2 a:=b a() b() 4 2 a() b() 2 2 a() b()

46 Reversibility: Example a() b() 3 2 choose x with a=b do a:=x a() b() 4 2 a() b() 2 2 a() b()

47 Linear-Speedup Nondeterministic algorithms are linear-speedup: For a nondeterministic algorithm Ν, Ν 2 is a nondeterministic algorithm, too. Ν Ν 2 47

48 Linear-Speedup: Proof Ν 2 satisfies the axioms (N1) (N5): (N1) Ν 2 determines states and next-state relation 2. (N2) States are Σ-structures. (N3) 2 preserves Universes. (N4) 2 preserves Isomorphisms. 48

49 Linear-Speedup: Proof Ν 2 satisfies the axioms (N1) (N5): (N5) 2 performs bounded substeps: (a, [], 1) (b, [], 2) (next, [1], 2) (next, [2], 3) Ν (a, [], 1) (b, [], 3) (next, [1], 1) (next, [2], 3) Ν (a, [], 1) (b, [], 3) (next, [1], 3) (next, [2], 1) k (a, [], 1) (b, [], 2) (next, [1], 2) (next, [2], 3) Ν 2 (a, [], 1) (b, [], 3) (next, [1], 3) (next, [2], 1) 2k 49

50 Linear-Speedup: Example choose x do next(x):=a speedup choose x,y do par next(x):=a next(y):=a endpar 50

51 Summary nondeterministic algorithms generalize sequential algorithms Idea: replace bounded-exploration by bounded-work nondeterministic algorithms = nondeterministic ASMs nondeterministic ASMs are reversible and linear-speedup 51

52 Future Work Check further closure properties: union and intersection of algorithms, generalize nondeterministic algorithms to distributed algorithms Thank you! 52

Negations in Refinement Type Systems

Negations in Refinement Type Systems Negations in Refinement Type Systems T. Tsukada (U. Tokyo) 14th March 2016 Shonan, JAPAN This Talk About refinement intersection type systems that refute judgements of other type systems. Background Refinement

More information

simply ordered sets. We ll state only the result here, since the proof is given in Munkres.

simply ordered sets. We ll state only the result here, since the proof is given in Munkres. p. 1 Math 490 Notes 20 More About Compactness Recall that in Munkres it is proved that a simply (totally) ordered set X with the order topology is connected iff it satisfies: (1) Every subset bounded above

More information

Lecture 15: The subspace topology, Closed sets

Lecture 15: The subspace topology, Closed sets Lecture 15: The subspace topology, Closed sets 1 The Subspace Topology Definition 1.1. Let (X, T) be a topological space with topology T. subset of X, the collection If Y is a T Y = {Y U U T} is a topology

More information

Structural characterizations of schema mapping languages

Structural characterizations of schema mapping languages Structural characterizations of schema mapping languages Balder ten Cate INRIA and ENS Cachan (research done while visiting IBM Almaden and UC Santa Cruz) Joint work with Phokion Kolaitis (ICDT 09) Schema

More information

Finite Math Linear Programming 1 May / 7

Finite Math Linear Programming 1 May / 7 Linear Programming Finite Math 1 May 2017 Finite Math Linear Programming 1 May 2017 1 / 7 General Description of Linear Programming Finite Math Linear Programming 1 May 2017 2 / 7 General Description of

More information

Section 13. Basis for a Topology

Section 13. Basis for a Topology 13. Basis for a Topology 1 Section 13. Basis for a Topology Note. In this section, we consider a basis for a topology on a set which is, in a sense, analogous to the basis for a vector space. Whereas a

More information

On mobile agents verifiable problems

On mobile agents verifiable problems On mobile agents verifiable problems (published in LATIN 16) Evangelos Bampas 1 David Ilcinkas 2 1 Aix-Marseille Univ. (LIF), France 2 CNRS & Univ. Bordeaux (LaBRI), France Micro MAC September 26, 2016

More information

Qualitätssicherung von Software (SWQS)

Qualitätssicherung von Software (SWQS) Qualitätssicherung von Software (SWQS) Prof. Dr. Holger Schlingloff Humboldt-Universität zu Berlin und Fraunhofer FOKUS 28.5.2013: Modellprüfung II - BDDs Folie 2 Existenzgründer gesucht! Folie 3 Fragen

More information

Compact Sets. James K. Peterson. September 15, Department of Biological Sciences and Department of Mathematical Sciences Clemson University

Compact Sets. James K. Peterson. September 15, Department of Biological Sciences and Department of Mathematical Sciences Clemson University Compact Sets James K. Peterson Department of Biological Sciences and Department of Mathematical Sciences Clemson University September 15, 2017 Outline 1 Closed Sets 2 Compactness 3 Homework Closed Sets

More information

As a consequence of the operation, there are new incidences between edges and triangles that did not exist in K; see Figure II.9.

As a consequence of the operation, there are new incidences between edges and triangles that did not exist in K; see Figure II.9. II.4 Surface Simplification 37 II.4 Surface Simplification In applications it is often necessary to simplify the data or its representation. One reason is measurement noise, which we would like to eliminate,

More information

Lecture - 8A: Subbasis of Topology

Lecture - 8A: Subbasis of Topology Lecture - 8A: Dr. Department of Mathematics Lovely Professional University Punjab, India October 18, 2014 Outline 1 Introduction 2 3 4 Introduction I As we know that topology generated by a basis B may

More information

CSE 105 THEORY OF COMPUTATION

CSE 105 THEORY OF COMPUTATION CSE 105 THEORY OF COMPUTATION Spring 2017 http://cseweb.ucsd.edu/classes/sp17/cse105-ab/ Today's learning goals Sipser Ch 1.2, 1.3 Design NFA recognizing a given language Convert an NFA (with or without

More information

A Tour of General Topology Chris Rogers June 29, 2010

A Tour of General Topology Chris Rogers June 29, 2010 A Tour of General Topology Chris Rogers June 29, 2010 1. The laundry list 1.1. Metric and topological spaces, open and closed sets. (1) metric space: open balls N ɛ (x), various metrics e.g. discrete metric,

More information

An introduction to Category Theory for Software Engineers*

An introduction to Category Theory for Software Engineers* An introduction to Category Theory for Software Engineers* Dr Steve Easterbrook Associate Professor, Dept of Computer Science, University of Toronto sme@cs.toronto.edu *slides available at http://www.cs.toronto.edu/~sme/presentations/cat101.pdf

More information

Topology - I. Michael Shulman WOMP 2004

Topology - I. Michael Shulman WOMP 2004 Topology - I Michael Shulman WOMP 2004 1 Topological Spaces There are many different ways to define a topological space; the most common one is as follows: Definition 1.1 A topological space (often just

More information

CSE 105 THEORY OF COMPUTATION

CSE 105 THEORY OF COMPUTATION CSE 105 THEORY OF COMPUTATION Spring 2016 http://cseweb.ucsd.edu/classes/sp16/cse105-ab/ Today's learning goals Sipser Ch 3.2, 3.3 Define variants of TMs Enumerators Multi-tape TMs Nondeterministic TMs

More information

Epimorphisms in the Category of Hausdorff Fuzzy Topological Spaces

Epimorphisms in the Category of Hausdorff Fuzzy Topological Spaces Annals of Pure and Applied Mathematics Vol. 7, No. 1, 2014, 35-40 ISSN: 2279-087X (P), 2279-0888(online) Published on 9 September 2014 www.researchmathsci.org Annals of Epimorphisms in the Category of

More information

Lecture-12: Closed Sets

Lecture-12: Closed Sets and Its Examples Properties of Lecture-12: Dr. Department of Mathematics Lovely Professional University Punjab, India October 18, 2014 Outline Introduction and Its Examples Properties of 1 Introduction

More information

HKN CS 374 Midterm 1 Review. Tim Klem Noah Mathes Mahir Morshed

HKN CS 374 Midterm 1 Review. Tim Klem Noah Mathes Mahir Morshed HKN CS 374 Midterm 1 Review Tim Klem Noah Mathes Mahir Morshed Midterm topics It s all about recognizing sets of strings! 1. String Induction 2. Regular languages a. DFA b. NFA c. Regular expressions 3.

More information

Program verification. Generalities about software Verification Model Checking. September 20, 2016

Program verification. Generalities about software Verification Model Checking. September 20, 2016 Program verification Generalities about software Verification Model Checking Laure Gonnord David Monniaux September 20, 2016 1 / 43 The teaching staff Laure Gonnord, associate professor, LIP laboratory,

More information

From Types to Sets in Isabelle/HOL

From Types to Sets in Isabelle/HOL From Types to Sets in Isabelle/HOL Extented Abstract Ondřej Kunčar 1 and Andrei Popescu 1,2 1 Fakultät für Informatik, Technische Universität München, Germany 2 Institute of Mathematics Simion Stoilow

More information

Communication Complexity and Parallel Computing

Communication Complexity and Parallel Computing Juraj Hromkovic Communication Complexity and Parallel Computing With 40 Figures Springer Table of Contents 1 Introduction 1 1.1 Motivation and Aims 1 1.2 Concept and Organization 4 1.3 How to Read the

More information

Introduction to Algebraic and Geometric Topology Week 5

Introduction to Algebraic and Geometric Topology Week 5 Introduction to Algebraic and Geometric Topology Week 5 Domingo Toledo University of Utah Fall 2017 Topology of Metric Spaces I (X, d) metric space. I Recall the definition of Open sets: Definition U

More information

Provide a drawing. Mark any line with three points in blue color.

Provide a drawing. Mark any line with three points in blue color. Math 3181 Name: Dr. Franz Rothe August 18, 2014 All3181\3181_fall14h1.tex Homework has to be turned in this handout. For extra space, use the back pages, or blank pages between. The homework can be done

More information

Topology 550A Homework 3, Week 3 (Corrections: February 22, 2012)

Topology 550A Homework 3, Week 3 (Corrections: February 22, 2012) Topology 550A Homework 3, Week 3 (Corrections: February 22, 2012) Michael Tagare De Guzman January 31, 2012 4A. The Sorgenfrey Line The following material concerns the Sorgenfrey line, E, introduced in

More information

A Little Point Set Topology

A Little Point Set Topology A Little Point Set Topology A topological space is a generalization of a metric space that allows one to talk about limits, convergence, continuity and so on without requiring the concept of a distance

More information

2. Sets. 2.1&2.2: Sets and Subsets. Combining Sets. c Dr Oksana Shatalov, Fall

2. Sets. 2.1&2.2: Sets and Subsets. Combining Sets. c Dr Oksana Shatalov, Fall c Dr Oksana Shatalov, Fall 2014 1 2. Sets 2.1&2.2: Sets and Subsets. Combining Sets. Set Terminology and Notation DEFINITIONS: Set is well-defined collection of objects. Elements are objects or members

More information

CSE 105 THEORY OF COMPUTATION

CSE 105 THEORY OF COMPUTATION CSE 105 THEORY OF COMPUTATION Spring 2018 http://cseweb.ucsd.edu/classes/sp18/cse105-ab/ Today's learning goals Sipser Section 2.2 Define push-down automata informally and formally Trace the computation

More information

1. Draw the state graphs for the finite automata which accept sets of strings composed of zeros and ones which:

1. Draw the state graphs for the finite automata which accept sets of strings composed of zeros and ones which: P R O B L E M S Finite Autom ata. Draw the state graphs for the finite automata which accept sets of strings composed of zeros and ones which: a) Are a multiple of three in length. b) End with the string

More information

Interpretations and Models. Chapter Axiomatic Systems and Incidence Geometry

Interpretations and Models. Chapter Axiomatic Systems and Incidence Geometry Interpretations and Models Chapter 2.1-2.4 - Axiomatic Systems and Incidence Geometry Axiomatic Systems in Mathematics The gold standard for rigor in an area of mathematics Not fully achieved in most areas

More information

XPath with transitive closure

XPath with transitive closure XPath with transitive closure Logic and Databases Feb 2006 1 XPath with transitive closure Logic and Databases Feb 2006 2 Navigating XML trees XPath with transitive closure Newton Institute: Logic and

More information

Module 6. Knowledge Representation and Logic (First Order Logic) Version 2 CSE IIT, Kharagpur

Module 6. Knowledge Representation and Logic (First Order Logic) Version 2 CSE IIT, Kharagpur Module 6 Knowledge Representation and Logic (First Order Logic) 6.1 Instructional Objective Students should understand the advantages of first order logic as a knowledge representation language Students

More information

Surfaces Beyond Classification

Surfaces Beyond Classification Chapter XII Surfaces Beyond Classification In most of the textbooks which present topological classification of compact surfaces the classification is the top result. However the topology of 2- manifolds

More information

Section 13.2 The Church-Turing Thesis The Church-Turing Thesis: Anything that is intuitively computable can be be computed by a Turing machine.

Section 13.2 The Church-Turing Thesis The Church-Turing Thesis: Anything that is intuitively computable can be be computed by a Turing machine. Section 13.2 The Church-Turing Thesis The Church-Turing Thesis: Anything that is intuitively computable can be be computed by a Turing machine. It is a thesis rather than a theorem because it relates the

More information

Rigidity, connectivity and graph decompositions

Rigidity, connectivity and graph decompositions First Prev Next Last Rigidity, connectivity and graph decompositions Brigitte Servatius Herman Servatius Worcester Polytechnic Institute Page 1 of 100 First Prev Next Last Page 2 of 100 We say that a framework

More information

Johns Hopkins Math Tournament Proof Round: Point Set Topology

Johns Hopkins Math Tournament Proof Round: Point Set Topology Johns Hopkins Math Tournament 2019 Proof Round: Point Set Topology February 9, 2019 Problem Points Score 1 3 2 6 3 6 4 6 5 10 6 6 7 8 8 6 9 8 10 8 11 9 12 10 13 14 Total 100 Instructions The exam is worth

More information

Broy-Lamport Specification Problem: A Gurevich Abstract State Machine Solution

Broy-Lamport Specification Problem: A Gurevich Abstract State Machine Solution Broy-Lamport Specification Problem: A Gurevich Abstract State Machine Solution James K. Huggins EECS Department, University of Michigan, Ann Arbor, MI, 48109-2122, USA. May 21, 2002 Abstract We apply the

More information

Resource-bound process algebras for Schedulability and Performance Analysis of Real-Time and Embedded Systems

Resource-bound process algebras for Schedulability and Performance Analysis of Real-Time and Embedded Systems Resource-bound process algebras for Schedulability and Performance Analysis of Real-Time and Embedded Systems Insup Lee 1, Oleg Sokolsky 1, Anna Philippou 2 1 RTG (Real-Time Systems Group) Department of

More information

Semantic Characterizations of XPath

Semantic Characterizations of XPath Semantic Characterizations of XPath Maarten Marx Informatics Institute, University of Amsterdam, The Netherlands CWI, April, 2004 1 Overview Navigational XPath is a language to specify sets and paths in

More information

Reflection in the Chomsky Hierarchy

Reflection in the Chomsky Hierarchy Reflection in the Chomsky Hierarchy Henk Barendregt Venanzio Capretta Dexter Kozen 1 Introduction We investigate which classes of formal languages in the Chomsky hierarchy are reflexive, that is, contain

More information

Lecture 5: Properties of convex sets

Lecture 5: Properties of convex sets Lecture 5: Properties of convex sets Rajat Mittal IIT Kanpur This week we will see properties of convex sets. These properties make convex sets special and are the reason why convex optimization problems

More information

Saturated Sets in Fuzzy Topological Spaces

Saturated Sets in Fuzzy Topological Spaces Computational and Applied Mathematics Journal 2015; 1(4): 180-185 Published online July 10, 2015 (http://www.aascit.org/journal/camj) Saturated Sets in Fuzzy Topological Spaces K. A. Dib, G. A. Kamel Department

More information

5.2: Closure Properties of Recursive and Recursively Enumerable Languages

5.2: Closure Properties of Recursive and Recursively Enumerable Languages 5.2: Closure Properties of Recursive and Recursively Enumerable Languages In this section, we will see that the recursive and recursively enumerable languages are closed under union, concatenation, closure

More information

Graph algorithms based on infinite automata: logical descriptions and usable constructions

Graph algorithms based on infinite automata: logical descriptions and usable constructions Graph algorithms based on infinite automata: logical descriptions and usable constructions Bruno Courcelle (joint work with Irène Durand) Bordeaux-1 University, LaBRI (CNRS laboratory) 1 Overview Algorithmic

More information

COMP 4161 NICTA Advanced Course. Advanced Topics in Software Verification. Toby Murray, June Andronick, Gerwin Klein

COMP 4161 NICTA Advanced Course. Advanced Topics in Software Verification. Toby Murray, June Andronick, Gerwin Klein COMP 4161 NICTA Advanced Course Advanced Topics in Software Verification Toby Murray, June Andronick, Gerwin Klein λ 1 Last time... λ calculus syntax free variables, substitution β reduction α and η conversion

More information

Finite Model Generation for Isabelle/HOL Using a SAT Solver

Finite Model Generation for Isabelle/HOL Using a SAT Solver Finite Model Generation for / Using a SAT Solver Tjark Weber webertj@in.tum.de Technische Universität München Winterhütte, März 2004 Finite Model Generation for / p.1/21 is a generic proof assistant: Highly

More information

Categorical models of type theory

Categorical models of type theory 1 / 59 Categorical models of type theory Michael Shulman February 28, 2012 2 / 59 Outline 1 Type theory and category theory 2 Categorical type constructors 3 Dependent types and display maps 4 Fibrations

More information

Model checking pushdown systems

Model checking pushdown systems Model checking pushdown systems R. Ramanujam Institute of Mathematical Sciences, Chennai jam@imsc.res.in Update Meeting, IIT-Guwahati, 4 July 2006 p. 1 Sources of unboundedness Data manipulation: integers,

More information

Convex Optimization Lecture 2

Convex Optimization Lecture 2 Convex Optimization Lecture 2 Today: Convex Analysis Center-of-mass Algorithm 1 Convex Analysis Convex Sets Definition: A set C R n is convex if for all x, y C and all 0 λ 1, λx + (1 λ)y C Operations that

More information

FUZZY WEAKLY CLOSED SETS

FUZZY WEAKLY CLOSED SETS Chapter 3 FUZZY WEAKLY CLOSED SETS In this chapter, we introduce another type of fuzzy closed set, called fuzzy weakly closed set in an FTS. Alongwith the study of fundamental results of such closed sets,

More information

EM225 Projective Geometry Part 2

EM225 Projective Geometry Part 2 EM225 Projective Geometry Part 2 eview In projective geometry, we regard figures as being the same if they can be made to appear the same as in the diagram below. In projective geometry: a projective point

More information

Math 414 Lecture 2 Everyone have a laptop?

Math 414 Lecture 2 Everyone have a laptop? Math 44 Lecture 2 Everyone have a laptop? THEOREM. Let v,...,v k be k vectors in an n-dimensional space and A = [v ;...; v k ] v,..., v k independent v,..., v k span the space v,..., v k a basis v,...,

More information

SAMPLING AND THE MOMENT TECHNIQUE. By Sveta Oksen

SAMPLING AND THE MOMENT TECHNIQUE. By Sveta Oksen SAMPLING AND THE MOMENT TECHNIQUE By Sveta Oksen Overview - Vertical decomposition - Construction - Running time analysis - The bounded moments theorem - General settings - The sampling model - The exponential

More information

Lecture 5: Simplicial Complex

Lecture 5: Simplicial Complex Lecture 5: Simplicial Complex 2-Manifolds, Simplex and Simplicial Complex Scribed by: Lei Wang First part of this lecture finishes 2-Manifolds. Rest part of this lecture talks about simplicial complex.

More information

Mechanising a type-safe model of multithreaded Java with a verified compiler

Mechanising a type-safe model of multithreaded Java with a verified compiler Mechanising a type-safe model of multithreaded Java with a verified compiler Andreas Lochbihler Digital Asset (Switzerland) GmbH Andreas Lochbihler 2 = Isabelle λ β HOL α Andreas Lochbihler 3 Timeline

More information

The Dominating Set Problem in Intersection Graphs

The Dominating Set Problem in Intersection Graphs The Dominating Set Problem in Intersection Graphs Mark de Berg Sándor Kisfaludi-Bak Gerhard Woeginger IPEC, 6 September 2017 1 / 17 Dominating Set in intersection graphs Problem (Dominating Set) Given

More information

λ calculus is inconsistent

λ calculus is inconsistent Content Rough timeline COMP 4161 NICTA Advanced Course Advanced Topics in Software Verification Gerwin Klein, June Andronick, Toby Murray λ Intro & motivation, getting started [1] Foundations & Principles

More information

Substitution in Structural Operational Semantics and value-passing process calculi

Substitution in Structural Operational Semantics and value-passing process calculi Substitution in Structural Operational Semantics and value-passing process calculi Sam Staton Computer Laboratory University of Cambridge Abstract Consider a process calculus that allows agents to communicate

More information

CSE 105 THEORY OF COMPUTATION

CSE 105 THEORY OF COMPUTATION CSE 105 THEORY OF COMPUTATION Spring 2017 http://cseweb.ucsd.edu/classes/sp17/cse105-ab/ Today's learning goals Sipser Ch 2, 3.1 State and use the Church-Turing thesis. Describe several variants of Turing

More information

Notes on categories, the subspace topology and the product topology

Notes on categories, the subspace topology and the product topology Notes on categories, the subspace topology and the product topology John Terilla Fall 2014 Contents 1 Introduction 1 2 A little category theory 1 3 The subspace topology 3 3.1 First characterization of

More information

Synchrony Weakened by Message Adversaries vs Asynchrony Enriched with Failure Detectors. Michel Raynal, Julien Stainer

Synchrony Weakened by Message Adversaries vs Asynchrony Enriched with Failure Detectors. Michel Raynal, Julien Stainer Synchrony Weakened by Message Adversaries vs Asynchrony Enriched with Failure Detectors Michel Raynal, Julien Stainer Synchrony Weakened by Message Adversaries vs Asynchrony Enriched with Failure Detectors

More information

Topology Between Two Sets

Topology Between Two Sets Journal of Mathematical Sciences & Computer Applications 1 (3): 95 107, 2011 doi: 10.5147/jmsca.2011.0071 Topology Between Two Sets S. Nithyanantha Jothi 1 and P. Thangavelu 2* 1 Department of Mathematics,

More information

M3P1/M4P1 (2005) Dr M Ruzhansky Metric and Topological Spaces Summary of the course: definitions, examples, statements.

M3P1/M4P1 (2005) Dr M Ruzhansky Metric and Topological Spaces Summary of the course: definitions, examples, statements. M3P1/M4P1 (2005) Dr M Ruzhansky Metric and Topological Spaces Summary of the course: definitions, examples, statements. Chapter 1: Metric spaces and convergence. (1.1) Recall the standard distance function

More information

Inversive Plane Geometry

Inversive Plane Geometry Inversive Plane Geometry An inversive plane is a geometry with three undefined notions: points, circles, and an incidence relation between points and circles, satisfying the following three axioms: (I.1)

More information

Open and Closed Sets

Open and Closed Sets Open and Closed Sets Definition: A subset S of a metric space (X, d) is open if it contains an open ball about each of its points i.e., if x S : ɛ > 0 : B(x, ɛ) S. (1) Theorem: (O1) and X are open sets.

More information

2.8. Connectedness A topological space X is said to be disconnected if X is the disjoint union of two non-empty open subsets. The space X is said to

2.8. Connectedness A topological space X is said to be disconnected if X is the disjoint union of two non-empty open subsets. The space X is said to 2.8. Connectedness A topological space X is said to be disconnected if X is the disjoint union of two non-empty open subsets. The space X is said to be connected if it is not disconnected. A subset of

More information

On the Boolean Algebra of Shape Analysis Constraints

On the Boolean Algebra of Shape Analysis Constraints On the Boolean Algebra of Shape Analysis Constraints Viktor Kuncak and Martin Rinard Computer Science and Artificial Intelligence Laboratory Massachusetts Institute of Technology Cambridge, MA 02139, USA

More information

V :non-empty vertex ornode set E V V :edge set G (V, E) :directed graph on V, or digraph on V

V :non-empty vertex ornode set E V V :edge set G (V, E) :directed graph on V, or digraph on V -93-11. Graph Theory Example: V :non-empty vertex ornode set E V V :edge set G (V, E) :directed graph on V, or digraph on V b e f V={a, b, c, d, e, f, g} a c d f E={(a,b), (b,c), (c,a),... } Note: (a,

More information

Behavioural Equivalences and Abstraction Techniques. Natalia Sidorova

Behavioural Equivalences and Abstraction Techniques. Natalia Sidorova Behavioural Equivalences and Abstraction Techniques Natalia Sidorova Part 1: Behavioural Equivalences p. p. The elevator example once more How to compare this elevator model with some other? The cabin

More information

NOTES ON GENERAL TOPOLOGY

NOTES ON GENERAL TOPOLOGY NOTES ON GENERAL TOPOLOGY PETE L. CLARK 1. The notion of a topological space Part of the rigorization of analysis in the 19th century was the realization that notions like convergence of sequences and

More information

Lecture 1 Discrete Geometric Structures

Lecture 1 Discrete Geometric Structures Lecture 1 Discrete Geometric Structures Jean-Daniel Boissonnat Winter School on Computational Geometry and Topology University of Nice Sophia Antipolis January 23-27, 2017 Computational Geometry and Topology

More information

OOP and S-BPM an analogy observation PowerSpeech

OOP and S-BPM an analogy observation PowerSpeech OOP and an analogy observation PowerSpeech Karlsruhe, October 14th 2010 Hagen Buchwald, KIT, Institute AIFB INSTITUTE AIFB COMPLEXITY MANAGEMENT KIT University of the State of Baden-Wuerttemberg and National

More information

CS154. Streaming Algorithms and Communication Complexity

CS154. Streaming Algorithms and Communication Complexity CS154 Streaming Algorithms and Communication Complexity 1 Streaming Algorithms 2 Streaming Algorithms 01 42 3 L = {x x has more 1 s than 0 s} Initialize: C := 0 and B := 0 When the next symbol x is read,

More information

Closure Properties of CFLs; Introducing TMs. CS154 Chris Pollett Apr 9, 2007.

Closure Properties of CFLs; Introducing TMs. CS154 Chris Pollett Apr 9, 2007. Closure Properties of CFLs; Introducing TMs CS154 Chris Pollett Apr 9, 2007. Outline Closure Properties of Context Free Languages Algorithms for CFLs Introducing Turing Machines Closure Properties of CFL

More information

Abstract Syntax Trees L3 24

Abstract Syntax Trees L3 24 Abstract Syntax Trees L3 24 Formal languages An extensional view of what constitutes a formal language is that it is completely determined by the set of words in the dictionary : Given an alphabet Σ, wecallanysubsetofσ

More information

Midterm Exam II CIS 341: Foundations of Computer Science II Spring 2006, day section Prof. Marvin K. Nakayama

Midterm Exam II CIS 341: Foundations of Computer Science II Spring 2006, day section Prof. Marvin K. Nakayama Midterm Exam II CIS 341: Foundations of Computer Science II Spring 2006, day section Prof. Marvin K. Nakayama Print family (or last) name: Print given (or first) name: I have read and understand all of

More information

Lecture notes for Topology MMA100

Lecture notes for Topology MMA100 Lecture notes for Topology MMA100 J A S, S-11 1 Simplicial Complexes 1.1 Affine independence A collection of points v 0, v 1,..., v n in some Euclidean space R N are affinely independent if the (affine

More information

Formal Languages and Automata

Formal Languages and Automata Mobile Computing and Software Engineering p. 1/3 Formal Languages and Automata Chapter 3 Regular languages and Regular Grammars Chuan-Ming Liu cmliu@csie.ntut.edu.tw Department of Computer Science and

More information

FAdo: Interactive Tools for Learning Formal Computational Models

FAdo: Interactive Tools for Learning Formal Computational Models FAdo: Interactive Tools for Learning Formal Computational Models Rogério Reis Nelma Moreira DCC-FC& LIACC, Universidade do Porto R. do Campo Alegre 823, 4150 Porto, Portugal {rvr,nam}@ncc.up.pt Abstract

More information

Situation Calculus and YAGI

Situation Calculus and YAGI Situation Calculus and YAGI Institute for Software Technology 1 Progression another solution to the projection problem does a sentence hold for a future situation used for automated reasoning and planning

More information

Typed Lambda Calculus

Typed Lambda Calculus Department of Linguistics Ohio State University Sept. 8, 2016 The Two Sides of A typed lambda calculus (TLC) can be viewed in two complementary ways: model-theoretically, as a system of notation for functions

More information

Formal Specification and Verification Techniques

Formal Specification and Verification Techniques Formal Specification and Verification Techniques Prof. Dr. K. Madlener 2. November 2011 Prof. Dr. K. Madlener: Formal Specification and Verification Techniques 1 Introduction Generalities Course of Studies

More information

Mathematical Research Letters 4, (1997) ORDER TREES AND LAMINATIONS OF THE PLANE. David Gabai and William H. Kazez

Mathematical Research Letters 4, (1997) ORDER TREES AND LAMINATIONS OF THE PLANE. David Gabai and William H. Kazez Mathematical Research Letters 4, 603 616 (1997) ORDER TREES AND LAMINATIONS OF THE PLANE David Gabai and William H. Kazez 1 Preliminary definitions A lamination λ of R 2 is a disjoint union of 1-manifolds,

More information

Chapter 1. Preliminaries

Chapter 1. Preliminaries Chapter 1 Preliminaries 1.1 Topological spaces 1.1.1 The notion of topological space The topology on a set X is usually defined by specifying its open subsets of X. However, in dealing with topological

More information

Perfect Matching Conjectures and Their Relationship to P NP

Perfect Matching Conjectures and Their Relationship to P NP Perfect Matching Conjectures and Their Relationship to P NP Timothy Y. Chow* 22 June 2004 (StanleyFest) * Currently working at MIT Lincoln Laboratory Distance Degree Regular Graphs If v is a vertex in

More information

A theory of stream queries

A theory of stream queries A theory of stream queries Yuri Gurevich 1, Dirk Leinders 2, and Jan Van den Bussche 2 1 Microsoft Research gurevich@microsoft.com 2 Hasselt University and Transnational University of Limburg {dirk.leinders,jan.vandenbussche}@uhasselt.be

More information

1. (10 points) Draw the state diagram of the DFA that recognizes the language over Σ = {0, 1}

1. (10 points) Draw the state diagram of the DFA that recognizes the language over Σ = {0, 1} CSE 5 Homework 2 Due: Monday October 6, 27 Instructions Upload a single file to Gradescope for each group. should be on each page of the submission. All group members names and PIDs Your assignments in

More information

COMP-421 Compiler Design. Presented by Dr Ioanna Dionysiou

COMP-421 Compiler Design. Presented by Dr Ioanna Dionysiou COMP-421 Compiler Design Presented by Dr Ioanna Dionysiou Administrative! [ALSU03] Chapter 3 - Lexical Analysis Sections 3.1-3.4, 3.6-3.7! Reading for next time [ALSU03] Chapter 3 Copyright (c) 2010 Ioanna

More information

In class 75min: 2:55-4:10 Thu 9/30.

In class 75min: 2:55-4:10 Thu 9/30. MATH 4530 Topology. In class 75min: 2:55-4:10 Thu 9/30. Prelim I Solutions Problem 1: Consider the following topological spaces: (1) Z as a subspace of R with the finite complement topology (2) [0, π]

More information

Section 17. Closed Sets and Limit Points

Section 17. Closed Sets and Limit Points 17. Closed Sets and Limit Points 1 Section 17. Closed Sets and Limit Points Note. In this section, we finally define a closed set. We also introduce several traditional topological concepts, such as limit

More information

Synthetic Geometry. 1.1 Foundations 1.2 The axioms of projective geometry

Synthetic Geometry. 1.1 Foundations 1.2 The axioms of projective geometry Synthetic Geometry 1.1 Foundations 1.2 The axioms of projective geometry Foundations Def: A geometry is a pair G = (Ω, I), where Ω is a set and I a relation on Ω that is symmetric and reflexive, i.e. 1.

More information

4. Definition: topological space, open set, topology, trivial topology, discrete topology.

4. Definition: topological space, open set, topology, trivial topology, discrete topology. Topology Summary Note to the reader. If a statement is marked with [Not proved in the lecture], then the statement was stated but not proved in the lecture. Of course, you don t need to know the proof.

More information

TOPOLOGY CHECKLIST - SPRING 2010

TOPOLOGY CHECKLIST - SPRING 2010 TOPOLOGY CHECKLIST - SPRING 2010 The list below serves as an indication of what we have covered in our course on topology. (It was written in a hurry, so there is a high risk of some mistake being made

More information

Expansion complexes for finite subdivision rules

Expansion complexes for finite subdivision rules Expansion complexes for finite subdivision rules W. Floyd (joint work with J. Cannon and W. Parry) Department of Mathematics Virginia Tech Spring Topology and Dynamics Conference : March, 2013 Definition

More information

Evolving Algebras and Partial Evaluation

Evolving Algebras and Partial Evaluation Evolving Algebras and Partial Evaluation Yuri Gurevich and James K. Huggins May 21, 2002 Keyword Codes: D.2.2; D.2.m; F.3.2 Keywords: Software Engineering, Tools and Techniques; Software Engineering, Miscellaneous;

More information

Context Free Languages and Pushdown Automata

Context Free Languages and Pushdown Automata Context Free Languages and Pushdown Automata COMP2600 Formal Methods for Software Engineering Ranald Clouston Australian National University Semester 2, 2013 COMP 2600 Context Free Languages and Pushdown

More information

Typed Lambda Calculus for Syntacticians

Typed Lambda Calculus for Syntacticians Department of Linguistics Ohio State University January 12, 2012 The Two Sides of Typed Lambda Calculus A typed lambda calculus (TLC) can be viewed in two complementary ways: model-theoretically, as a

More information

Overview. CS389L: Automated Logical Reasoning. Lecture 6: First Order Logic Syntax and Semantics. Constants in First-Order Logic.

Overview. CS389L: Automated Logical Reasoning. Lecture 6: First Order Logic Syntax and Semantics. Constants in First-Order Logic. Overview CS389L: Automated Logical Reasoning Lecture 6: First Order Logic Syntax and Semantics Işıl Dillig So far: Automated reasoning in propositional logic. Propositional logic is simple and easy to

More information

ACLT: Algebra, Categories, Logic in Topology - Grothendieck's generalized topological spaces (toposes)

ACLT: Algebra, Categories, Logic in Topology - Grothendieck's generalized topological spaces (toposes) ACLT: Algebra, Categories, Logic in Topology - Grothendieck's generalized topological spaces (toposes) Steve Vickers CS Theory Group Birmingham 1. Sheaves "Sheaf = continuous set-valued map" TACL Tutorial

More information

On the Recognizability of Arrow and Graph Languages

On the Recognizability of Arrow and Graph Languages On the Recognizability of Arrow and Graph Languages Christoph Blume Sander Bruggink Barbara König Universität Duisburg-Essen, Germany Background Applications of finite automata and regular (word) languages

More information