Semantical Characterization of unbounded-nondeterministic ASMs
|
|
- Allan Davidson
- 5 years ago
- Views:
Transcription
1 Semantical Characterization of unbounded-nondeterministic ASMs Berlin, 26/27 Feb 2007 Andreas Glausch Humboldt-Universität zu Berlin Department of Computer Science
2 Abstract State Machines (ASMs) state next-state Σ-structure ASM program Σ-structure syntax Can we do without syntax? 2
3 Semantical Characterization Gurevich 99 sequential ASMs = sequential algorithms 3
4 Semantical Characterization Gurevich 99 sequential ASMs = sequential algorithms Gurevich, Yavorskaya 06 bounded-nondeterministic ASM = bounded-nondeterministic algorithms k 4
5 This Talk Lipari Guide unbounded-nondeterministic ASMs = unbounded-nondeterministic algorithms new 0 nondeterministic = def unbounded-nondeterministic 5
6 Semantical Characterization of Sequential ASMs by Yuri Gurevich
7 Sequential ASMs A sequential ASM consists of a set of Σ-structures, a sequential ASM program: 1. assignment statements 2. conditional statements 3. block statements a := next(a) if (a b) then par endpar 7
8 Characterization sequential ASMs = sequential algorithms 8
9 Sequential Algorithms A sequential algorithm Α satisfies (S1) sequential-time axiom: Α determines a set of states S and a next-state function τ : S S. 9
10 Sequential Algorithms A sequential algorithm Α satisfies (S1) sequential-time axiom, (S2) state axiom: All states are Σ-structures. 10
11 Sequential Algorithms A sequential algorithm Α satisfies (S1) sequential-time axiom, (S2) state axiom, (S3) universe axiom: S and τ(s) have the same universe. 11
12 Sequential Algorithms A sequential algorithm Α satisfies (S1) sequential-time axiom, (S2) state axiom, (S3) universe axiom, (S4) isomorphism axiom: S is closed under isomorphism. τ preserves isomorphisms. 12
13 Sequential Algorithms A sequential algorithm Α satisfies (S1) sequential-time axiom, (S2) state axiom, (S3) universe axiom, (S4) isomorphism axiom, (S5) bounded-exploration axiom: A finite set T of ground terms characterizes τ: S = T R implies (S, τ(s)) = (R, τ(r)). 13
14 Sequential Algorithms A sequential algorithm Α satisfies (S1) sequential-time axiom, (S2) state axiom, (S3) universe axiom, (S4) isomorphism axiom, (S5) bounded-exploration axiom. 14
15 Nondeterministic ASMs
16 Nondeterministic ASMs A nondeterministic ASM consists of a set of Σ-structures, a nondeterministic ASM program: 1. assignment statements a := next(a) 2. conditional statements if (a=b) then 3. block statements par endpar 4. choice statements choose x do 16
17 Example State a() 1 b() 2 universe: N x next(x) signature Σ: a: N b: N next: N N 17
18 Example Program choose x with x a do b:=x x=3 a() b() 1 3 a() b() 1 2 x=4 x=5 a() b() 1 4 a() 1 b() 5 18
19 Semantical Characterization of nondeterministic ASMs
20 Characterization nondeterministic ASMs = nondeterministic algorithms 20
21 Nondeterministic Algorithms A nondeterministic algorithm Ν satisfies (N1) nondeterministic-time axiom, (N2) state axiom, (N3) universe axiom, (N4) isomorphism axiom, (N5)... 21
22 Nondeterministic Algorithms A nondeterministic algorithm Ν satisfies (N1) nondeterministic-time axiom, (N2) state axiom, (N3) universe axiom, (N4) isomorphism axiom, (N5) bounded-work axiom. 22
23 Nondeterministic Algorithms A nondeterministic algorithm Ν satisfies (N1) nondeterministic-time axiom: Ν consists of a set of states S and a next-state relation S S. 23
24 Nondeterministic Algorithms A nondeterministic algorithm Ν satisfies (N1) nondeterministic-time axiom, (N2) state axiom: All states are Σ-structures. 24
25 Nondeterministic Algorithms A nondeterministic algorithm Ν satisfies (N1) nondeterministic-time axiom, (N2) state axiom, (N3) universe axiom: For S S, S and S have the same universe. 25
26 Nondeterministic Algorithms A nondeterministic algorithm Ν satisfies (N1) nondeterministic-time axiom, (N2) state axiom, (N3) universe axiom, (N4) isomorphism axiom: S is closed under isomorphism. Isomorphic states have isomorphic next-states. 26
27 Nondeterministic Algorithms A nondeterministic algorithm Ν satisfies (N1) nondeterministic-time axiom, (N2) state axiom, (N3) universe axiom, (N4) isomorphism axiom, (N5) bounded-work axiom. 27
28 Bounded-Exploration Axiom A finite set T of ground terms characterizes : S S and S = T R imply R R with (S, S ) = (R, R ). bounded-nondeterministic algorithms S k 28
29 (N5) Bounded-Work Axiom Our aim: unbounded nondeterminism Our solution: bounded-work axiom amount of work is bounded in each step S S S S 29
30 (N5) Bounded-Work Axiom Our aim: unbounded nondeterminism Our solution: bounded-work axiom amount of work is bounded in each step S S S S 30
31 (N5) Bounded-Work Axiom S S 1. Decompose S into molecules 2. Each step involves only boundedly many molecules of S 31
32 Molecule of a State (next, [1], 2) molecule a() 1 x b() 2 next(x) Gurevich: Describe changes of a state by molecules. Here: Describe the complete state by molecules. 32
33 Molecule of a State a() 1 x b() 2 next(x) (a, [], 1) (b, [], 2) (next, [1], 2) (next, [2], 3) (next, [3], 4) (next, [4], 5) 33
34 Bounded-Work S S involves boundedly many molecules of S S S 34
35 Bounded-Work S S involves boundedly many molecules of S S (a, [], 1) (b, [], 2) (next, [1], 2) (next, [2], 3) (next, [3], 4) (next, [4], 5) 35
36 Bounded-Work S S involves boundedly many molecules of S S (a, [], 1) (b, [], 2) (next, [1], 2) (next, [2], 3) (next, [3], 4) (next, [4], 5) S (a, [], 1) (b, [], 3) (next, [1], 1) (next, [2], 3) (next, [3], 4) (next, [4], 5) 36
37 Bounded-Work S S involves boundedly many molecules of S Substep S S (a, [], 1) (b, [], 2) (next, [1], 2) (next, [2], 3) (next, [3], 4) (next, [4], 5) (a, [], 1) (b, [], 3) (next, [1], 1) (next, [2], 3) (next, [3], 4) (next, [4], 5) k S S is caused by the substep. 37
38 (N5) Bounded-Work Axiom A set W of bounded substeps characterizes all steps: S S is a step iff S S is caused by a substep in W. 38
39 Nondeterministic Algorithms Any object satisfying (N1) nondeterministic-time axiom, (N2) state axiom, (N3) universe axiom, (N4) isomorphism axiom, (N5) bounded-work axiom, is a nondeterministic algorithm. 39
40 The Theorem nondeterministic ASMs = nondeterministic algorithms 40
41 Applications of the Characterization
42 Reversibility Nondeterministic algorithms are reversible: For a nondeterministic algorithm Ν, Ν -1 is a nondeterministic algorithm, too. Ν Ν -1 42
43 Reversibility: Proof Ν -1 satisfies the axioms (N1) (N5): (N1) Ν -1 determines states and next-state relation -1. (N2) States are Σ-structures. (N3) -1 preserves Universes. (N4) -1 preserves Isomorphisms. (N5) -1 performs bounded substeps: (a, [], 1) (b, [], 2) (next, [1], 2) (next, [2], 3) Ν Ν -1 (a, [], 1) (b, [], 3) (next, [1], 1) (next, [2], 3) k 43
44 Reversibility of ASMs Nondeterministic algorithms are reversible. nondeterministic ASM Theorem Nondeterministic ASMs are reversible. 44
45 Reversibility: Example a() b() 3 2 a:=b a() b() 4 2 a() b() 2 2 a() b()
46 Reversibility: Example a() b() 3 2 choose x with a=b do a:=x a() b() 4 2 a() b() 2 2 a() b()
47 Linear-Speedup Nondeterministic algorithms are linear-speedup: For a nondeterministic algorithm Ν, Ν 2 is a nondeterministic algorithm, too. Ν Ν 2 47
48 Linear-Speedup: Proof Ν 2 satisfies the axioms (N1) (N5): (N1) Ν 2 determines states and next-state relation 2. (N2) States are Σ-structures. (N3) 2 preserves Universes. (N4) 2 preserves Isomorphisms. 48
49 Linear-Speedup: Proof Ν 2 satisfies the axioms (N1) (N5): (N5) 2 performs bounded substeps: (a, [], 1) (b, [], 2) (next, [1], 2) (next, [2], 3) Ν (a, [], 1) (b, [], 3) (next, [1], 1) (next, [2], 3) Ν (a, [], 1) (b, [], 3) (next, [1], 3) (next, [2], 1) k (a, [], 1) (b, [], 2) (next, [1], 2) (next, [2], 3) Ν 2 (a, [], 1) (b, [], 3) (next, [1], 3) (next, [2], 1) 2k 49
50 Linear-Speedup: Example choose x do next(x):=a speedup choose x,y do par next(x):=a next(y):=a endpar 50
51 Summary nondeterministic algorithms generalize sequential algorithms Idea: replace bounded-exploration by bounded-work nondeterministic algorithms = nondeterministic ASMs nondeterministic ASMs are reversible and linear-speedup 51
52 Future Work Check further closure properties: union and intersection of algorithms, generalize nondeterministic algorithms to distributed algorithms Thank you! 52
Negations in Refinement Type Systems
Negations in Refinement Type Systems T. Tsukada (U. Tokyo) 14th March 2016 Shonan, JAPAN This Talk About refinement intersection type systems that refute judgements of other type systems. Background Refinement
More informationsimply ordered sets. We ll state only the result here, since the proof is given in Munkres.
p. 1 Math 490 Notes 20 More About Compactness Recall that in Munkres it is proved that a simply (totally) ordered set X with the order topology is connected iff it satisfies: (1) Every subset bounded above
More informationLecture 15: The subspace topology, Closed sets
Lecture 15: The subspace topology, Closed sets 1 The Subspace Topology Definition 1.1. Let (X, T) be a topological space with topology T. subset of X, the collection If Y is a T Y = {Y U U T} is a topology
More informationStructural characterizations of schema mapping languages
Structural characterizations of schema mapping languages Balder ten Cate INRIA and ENS Cachan (research done while visiting IBM Almaden and UC Santa Cruz) Joint work with Phokion Kolaitis (ICDT 09) Schema
More informationFinite Math Linear Programming 1 May / 7
Linear Programming Finite Math 1 May 2017 Finite Math Linear Programming 1 May 2017 1 / 7 General Description of Linear Programming Finite Math Linear Programming 1 May 2017 2 / 7 General Description of
More informationSection 13. Basis for a Topology
13. Basis for a Topology 1 Section 13. Basis for a Topology Note. In this section, we consider a basis for a topology on a set which is, in a sense, analogous to the basis for a vector space. Whereas a
More informationOn mobile agents verifiable problems
On mobile agents verifiable problems (published in LATIN 16) Evangelos Bampas 1 David Ilcinkas 2 1 Aix-Marseille Univ. (LIF), France 2 CNRS & Univ. Bordeaux (LaBRI), France Micro MAC September 26, 2016
More informationQualitätssicherung von Software (SWQS)
Qualitätssicherung von Software (SWQS) Prof. Dr. Holger Schlingloff Humboldt-Universität zu Berlin und Fraunhofer FOKUS 28.5.2013: Modellprüfung II - BDDs Folie 2 Existenzgründer gesucht! Folie 3 Fragen
More informationCompact Sets. James K. Peterson. September 15, Department of Biological Sciences and Department of Mathematical Sciences Clemson University
Compact Sets James K. Peterson Department of Biological Sciences and Department of Mathematical Sciences Clemson University September 15, 2017 Outline 1 Closed Sets 2 Compactness 3 Homework Closed Sets
More informationAs a consequence of the operation, there are new incidences between edges and triangles that did not exist in K; see Figure II.9.
II.4 Surface Simplification 37 II.4 Surface Simplification In applications it is often necessary to simplify the data or its representation. One reason is measurement noise, which we would like to eliminate,
More informationLecture - 8A: Subbasis of Topology
Lecture - 8A: Dr. Department of Mathematics Lovely Professional University Punjab, India October 18, 2014 Outline 1 Introduction 2 3 4 Introduction I As we know that topology generated by a basis B may
More informationCSE 105 THEORY OF COMPUTATION
CSE 105 THEORY OF COMPUTATION Spring 2017 http://cseweb.ucsd.edu/classes/sp17/cse105-ab/ Today's learning goals Sipser Ch 1.2, 1.3 Design NFA recognizing a given language Convert an NFA (with or without
More informationA Tour of General Topology Chris Rogers June 29, 2010
A Tour of General Topology Chris Rogers June 29, 2010 1. The laundry list 1.1. Metric and topological spaces, open and closed sets. (1) metric space: open balls N ɛ (x), various metrics e.g. discrete metric,
More informationAn introduction to Category Theory for Software Engineers*
An introduction to Category Theory for Software Engineers* Dr Steve Easterbrook Associate Professor, Dept of Computer Science, University of Toronto sme@cs.toronto.edu *slides available at http://www.cs.toronto.edu/~sme/presentations/cat101.pdf
More informationTopology - I. Michael Shulman WOMP 2004
Topology - I Michael Shulman WOMP 2004 1 Topological Spaces There are many different ways to define a topological space; the most common one is as follows: Definition 1.1 A topological space (often just
More informationCSE 105 THEORY OF COMPUTATION
CSE 105 THEORY OF COMPUTATION Spring 2016 http://cseweb.ucsd.edu/classes/sp16/cse105-ab/ Today's learning goals Sipser Ch 3.2, 3.3 Define variants of TMs Enumerators Multi-tape TMs Nondeterministic TMs
More informationEpimorphisms in the Category of Hausdorff Fuzzy Topological Spaces
Annals of Pure and Applied Mathematics Vol. 7, No. 1, 2014, 35-40 ISSN: 2279-087X (P), 2279-0888(online) Published on 9 September 2014 www.researchmathsci.org Annals of Epimorphisms in the Category of
More informationLecture-12: Closed Sets
and Its Examples Properties of Lecture-12: Dr. Department of Mathematics Lovely Professional University Punjab, India October 18, 2014 Outline Introduction and Its Examples Properties of 1 Introduction
More informationHKN CS 374 Midterm 1 Review. Tim Klem Noah Mathes Mahir Morshed
HKN CS 374 Midterm 1 Review Tim Klem Noah Mathes Mahir Morshed Midterm topics It s all about recognizing sets of strings! 1. String Induction 2. Regular languages a. DFA b. NFA c. Regular expressions 3.
More informationProgram verification. Generalities about software Verification Model Checking. September 20, 2016
Program verification Generalities about software Verification Model Checking Laure Gonnord David Monniaux September 20, 2016 1 / 43 The teaching staff Laure Gonnord, associate professor, LIP laboratory,
More informationFrom Types to Sets in Isabelle/HOL
From Types to Sets in Isabelle/HOL Extented Abstract Ondřej Kunčar 1 and Andrei Popescu 1,2 1 Fakultät für Informatik, Technische Universität München, Germany 2 Institute of Mathematics Simion Stoilow
More informationCommunication Complexity and Parallel Computing
Juraj Hromkovic Communication Complexity and Parallel Computing With 40 Figures Springer Table of Contents 1 Introduction 1 1.1 Motivation and Aims 1 1.2 Concept and Organization 4 1.3 How to Read the
More informationIntroduction to Algebraic and Geometric Topology Week 5
Introduction to Algebraic and Geometric Topology Week 5 Domingo Toledo University of Utah Fall 2017 Topology of Metric Spaces I (X, d) metric space. I Recall the definition of Open sets: Definition U
More informationProvide a drawing. Mark any line with three points in blue color.
Math 3181 Name: Dr. Franz Rothe August 18, 2014 All3181\3181_fall14h1.tex Homework has to be turned in this handout. For extra space, use the back pages, or blank pages between. The homework can be done
More informationTopology 550A Homework 3, Week 3 (Corrections: February 22, 2012)
Topology 550A Homework 3, Week 3 (Corrections: February 22, 2012) Michael Tagare De Guzman January 31, 2012 4A. The Sorgenfrey Line The following material concerns the Sorgenfrey line, E, introduced in
More informationA Little Point Set Topology
A Little Point Set Topology A topological space is a generalization of a metric space that allows one to talk about limits, convergence, continuity and so on without requiring the concept of a distance
More information2. Sets. 2.1&2.2: Sets and Subsets. Combining Sets. c Dr Oksana Shatalov, Fall
c Dr Oksana Shatalov, Fall 2014 1 2. Sets 2.1&2.2: Sets and Subsets. Combining Sets. Set Terminology and Notation DEFINITIONS: Set is well-defined collection of objects. Elements are objects or members
More informationCSE 105 THEORY OF COMPUTATION
CSE 105 THEORY OF COMPUTATION Spring 2018 http://cseweb.ucsd.edu/classes/sp18/cse105-ab/ Today's learning goals Sipser Section 2.2 Define push-down automata informally and formally Trace the computation
More information1. Draw the state graphs for the finite automata which accept sets of strings composed of zeros and ones which:
P R O B L E M S Finite Autom ata. Draw the state graphs for the finite automata which accept sets of strings composed of zeros and ones which: a) Are a multiple of three in length. b) End with the string
More informationInterpretations and Models. Chapter Axiomatic Systems and Incidence Geometry
Interpretations and Models Chapter 2.1-2.4 - Axiomatic Systems and Incidence Geometry Axiomatic Systems in Mathematics The gold standard for rigor in an area of mathematics Not fully achieved in most areas
More informationXPath with transitive closure
XPath with transitive closure Logic and Databases Feb 2006 1 XPath with transitive closure Logic and Databases Feb 2006 2 Navigating XML trees XPath with transitive closure Newton Institute: Logic and
More informationModule 6. Knowledge Representation and Logic (First Order Logic) Version 2 CSE IIT, Kharagpur
Module 6 Knowledge Representation and Logic (First Order Logic) 6.1 Instructional Objective Students should understand the advantages of first order logic as a knowledge representation language Students
More informationSurfaces Beyond Classification
Chapter XII Surfaces Beyond Classification In most of the textbooks which present topological classification of compact surfaces the classification is the top result. However the topology of 2- manifolds
More informationSection 13.2 The Church-Turing Thesis The Church-Turing Thesis: Anything that is intuitively computable can be be computed by a Turing machine.
Section 13.2 The Church-Turing Thesis The Church-Turing Thesis: Anything that is intuitively computable can be be computed by a Turing machine. It is a thesis rather than a theorem because it relates the
More informationRigidity, connectivity and graph decompositions
First Prev Next Last Rigidity, connectivity and graph decompositions Brigitte Servatius Herman Servatius Worcester Polytechnic Institute Page 1 of 100 First Prev Next Last Page 2 of 100 We say that a framework
More informationJohns Hopkins Math Tournament Proof Round: Point Set Topology
Johns Hopkins Math Tournament 2019 Proof Round: Point Set Topology February 9, 2019 Problem Points Score 1 3 2 6 3 6 4 6 5 10 6 6 7 8 8 6 9 8 10 8 11 9 12 10 13 14 Total 100 Instructions The exam is worth
More informationBroy-Lamport Specification Problem: A Gurevich Abstract State Machine Solution
Broy-Lamport Specification Problem: A Gurevich Abstract State Machine Solution James K. Huggins EECS Department, University of Michigan, Ann Arbor, MI, 48109-2122, USA. May 21, 2002 Abstract We apply the
More informationResource-bound process algebras for Schedulability and Performance Analysis of Real-Time and Embedded Systems
Resource-bound process algebras for Schedulability and Performance Analysis of Real-Time and Embedded Systems Insup Lee 1, Oleg Sokolsky 1, Anna Philippou 2 1 RTG (Real-Time Systems Group) Department of
More informationSemantic Characterizations of XPath
Semantic Characterizations of XPath Maarten Marx Informatics Institute, University of Amsterdam, The Netherlands CWI, April, 2004 1 Overview Navigational XPath is a language to specify sets and paths in
More informationReflection in the Chomsky Hierarchy
Reflection in the Chomsky Hierarchy Henk Barendregt Venanzio Capretta Dexter Kozen 1 Introduction We investigate which classes of formal languages in the Chomsky hierarchy are reflexive, that is, contain
More informationLecture 5: Properties of convex sets
Lecture 5: Properties of convex sets Rajat Mittal IIT Kanpur This week we will see properties of convex sets. These properties make convex sets special and are the reason why convex optimization problems
More informationSaturated Sets in Fuzzy Topological Spaces
Computational and Applied Mathematics Journal 2015; 1(4): 180-185 Published online July 10, 2015 (http://www.aascit.org/journal/camj) Saturated Sets in Fuzzy Topological Spaces K. A. Dib, G. A. Kamel Department
More information5.2: Closure Properties of Recursive and Recursively Enumerable Languages
5.2: Closure Properties of Recursive and Recursively Enumerable Languages In this section, we will see that the recursive and recursively enumerable languages are closed under union, concatenation, closure
More informationGraph algorithms based on infinite automata: logical descriptions and usable constructions
Graph algorithms based on infinite automata: logical descriptions and usable constructions Bruno Courcelle (joint work with Irène Durand) Bordeaux-1 University, LaBRI (CNRS laboratory) 1 Overview Algorithmic
More informationCOMP 4161 NICTA Advanced Course. Advanced Topics in Software Verification. Toby Murray, June Andronick, Gerwin Klein
COMP 4161 NICTA Advanced Course Advanced Topics in Software Verification Toby Murray, June Andronick, Gerwin Klein λ 1 Last time... λ calculus syntax free variables, substitution β reduction α and η conversion
More informationFinite Model Generation for Isabelle/HOL Using a SAT Solver
Finite Model Generation for / Using a SAT Solver Tjark Weber webertj@in.tum.de Technische Universität München Winterhütte, März 2004 Finite Model Generation for / p.1/21 is a generic proof assistant: Highly
More informationCategorical models of type theory
1 / 59 Categorical models of type theory Michael Shulman February 28, 2012 2 / 59 Outline 1 Type theory and category theory 2 Categorical type constructors 3 Dependent types and display maps 4 Fibrations
More informationModel checking pushdown systems
Model checking pushdown systems R. Ramanujam Institute of Mathematical Sciences, Chennai jam@imsc.res.in Update Meeting, IIT-Guwahati, 4 July 2006 p. 1 Sources of unboundedness Data manipulation: integers,
More informationConvex Optimization Lecture 2
Convex Optimization Lecture 2 Today: Convex Analysis Center-of-mass Algorithm 1 Convex Analysis Convex Sets Definition: A set C R n is convex if for all x, y C and all 0 λ 1, λx + (1 λ)y C Operations that
More informationFUZZY WEAKLY CLOSED SETS
Chapter 3 FUZZY WEAKLY CLOSED SETS In this chapter, we introduce another type of fuzzy closed set, called fuzzy weakly closed set in an FTS. Alongwith the study of fundamental results of such closed sets,
More informationEM225 Projective Geometry Part 2
EM225 Projective Geometry Part 2 eview In projective geometry, we regard figures as being the same if they can be made to appear the same as in the diagram below. In projective geometry: a projective point
More informationMath 414 Lecture 2 Everyone have a laptop?
Math 44 Lecture 2 Everyone have a laptop? THEOREM. Let v,...,v k be k vectors in an n-dimensional space and A = [v ;...; v k ] v,..., v k independent v,..., v k span the space v,..., v k a basis v,...,
More informationSAMPLING AND THE MOMENT TECHNIQUE. By Sveta Oksen
SAMPLING AND THE MOMENT TECHNIQUE By Sveta Oksen Overview - Vertical decomposition - Construction - Running time analysis - The bounded moments theorem - General settings - The sampling model - The exponential
More informationLecture 5: Simplicial Complex
Lecture 5: Simplicial Complex 2-Manifolds, Simplex and Simplicial Complex Scribed by: Lei Wang First part of this lecture finishes 2-Manifolds. Rest part of this lecture talks about simplicial complex.
More informationMechanising a type-safe model of multithreaded Java with a verified compiler
Mechanising a type-safe model of multithreaded Java with a verified compiler Andreas Lochbihler Digital Asset (Switzerland) GmbH Andreas Lochbihler 2 = Isabelle λ β HOL α Andreas Lochbihler 3 Timeline
More informationThe Dominating Set Problem in Intersection Graphs
The Dominating Set Problem in Intersection Graphs Mark de Berg Sándor Kisfaludi-Bak Gerhard Woeginger IPEC, 6 September 2017 1 / 17 Dominating Set in intersection graphs Problem (Dominating Set) Given
More informationλ calculus is inconsistent
Content Rough timeline COMP 4161 NICTA Advanced Course Advanced Topics in Software Verification Gerwin Klein, June Andronick, Toby Murray λ Intro & motivation, getting started [1] Foundations & Principles
More informationSubstitution in Structural Operational Semantics and value-passing process calculi
Substitution in Structural Operational Semantics and value-passing process calculi Sam Staton Computer Laboratory University of Cambridge Abstract Consider a process calculus that allows agents to communicate
More informationCSE 105 THEORY OF COMPUTATION
CSE 105 THEORY OF COMPUTATION Spring 2017 http://cseweb.ucsd.edu/classes/sp17/cse105-ab/ Today's learning goals Sipser Ch 2, 3.1 State and use the Church-Turing thesis. Describe several variants of Turing
More informationNotes on categories, the subspace topology and the product topology
Notes on categories, the subspace topology and the product topology John Terilla Fall 2014 Contents 1 Introduction 1 2 A little category theory 1 3 The subspace topology 3 3.1 First characterization of
More informationSynchrony Weakened by Message Adversaries vs Asynchrony Enriched with Failure Detectors. Michel Raynal, Julien Stainer
Synchrony Weakened by Message Adversaries vs Asynchrony Enriched with Failure Detectors Michel Raynal, Julien Stainer Synchrony Weakened by Message Adversaries vs Asynchrony Enriched with Failure Detectors
More informationTopology Between Two Sets
Journal of Mathematical Sciences & Computer Applications 1 (3): 95 107, 2011 doi: 10.5147/jmsca.2011.0071 Topology Between Two Sets S. Nithyanantha Jothi 1 and P. Thangavelu 2* 1 Department of Mathematics,
More informationM3P1/M4P1 (2005) Dr M Ruzhansky Metric and Topological Spaces Summary of the course: definitions, examples, statements.
M3P1/M4P1 (2005) Dr M Ruzhansky Metric and Topological Spaces Summary of the course: definitions, examples, statements. Chapter 1: Metric spaces and convergence. (1.1) Recall the standard distance function
More informationInversive Plane Geometry
Inversive Plane Geometry An inversive plane is a geometry with three undefined notions: points, circles, and an incidence relation between points and circles, satisfying the following three axioms: (I.1)
More informationOpen and Closed Sets
Open and Closed Sets Definition: A subset S of a metric space (X, d) is open if it contains an open ball about each of its points i.e., if x S : ɛ > 0 : B(x, ɛ) S. (1) Theorem: (O1) and X are open sets.
More information2.8. Connectedness A topological space X is said to be disconnected if X is the disjoint union of two non-empty open subsets. The space X is said to
2.8. Connectedness A topological space X is said to be disconnected if X is the disjoint union of two non-empty open subsets. The space X is said to be connected if it is not disconnected. A subset of
More informationOn the Boolean Algebra of Shape Analysis Constraints
On the Boolean Algebra of Shape Analysis Constraints Viktor Kuncak and Martin Rinard Computer Science and Artificial Intelligence Laboratory Massachusetts Institute of Technology Cambridge, MA 02139, USA
More informationV :non-empty vertex ornode set E V V :edge set G (V, E) :directed graph on V, or digraph on V
-93-11. Graph Theory Example: V :non-empty vertex ornode set E V V :edge set G (V, E) :directed graph on V, or digraph on V b e f V={a, b, c, d, e, f, g} a c d f E={(a,b), (b,c), (c,a),... } Note: (a,
More informationBehavioural Equivalences and Abstraction Techniques. Natalia Sidorova
Behavioural Equivalences and Abstraction Techniques Natalia Sidorova Part 1: Behavioural Equivalences p. p. The elevator example once more How to compare this elevator model with some other? The cabin
More informationNOTES ON GENERAL TOPOLOGY
NOTES ON GENERAL TOPOLOGY PETE L. CLARK 1. The notion of a topological space Part of the rigorization of analysis in the 19th century was the realization that notions like convergence of sequences and
More informationLecture 1 Discrete Geometric Structures
Lecture 1 Discrete Geometric Structures Jean-Daniel Boissonnat Winter School on Computational Geometry and Topology University of Nice Sophia Antipolis January 23-27, 2017 Computational Geometry and Topology
More informationOOP and S-BPM an analogy observation PowerSpeech
OOP and an analogy observation PowerSpeech Karlsruhe, October 14th 2010 Hagen Buchwald, KIT, Institute AIFB INSTITUTE AIFB COMPLEXITY MANAGEMENT KIT University of the State of Baden-Wuerttemberg and National
More informationCS154. Streaming Algorithms and Communication Complexity
CS154 Streaming Algorithms and Communication Complexity 1 Streaming Algorithms 2 Streaming Algorithms 01 42 3 L = {x x has more 1 s than 0 s} Initialize: C := 0 and B := 0 When the next symbol x is read,
More informationClosure Properties of CFLs; Introducing TMs. CS154 Chris Pollett Apr 9, 2007.
Closure Properties of CFLs; Introducing TMs CS154 Chris Pollett Apr 9, 2007. Outline Closure Properties of Context Free Languages Algorithms for CFLs Introducing Turing Machines Closure Properties of CFL
More informationAbstract Syntax Trees L3 24
Abstract Syntax Trees L3 24 Formal languages An extensional view of what constitutes a formal language is that it is completely determined by the set of words in the dictionary : Given an alphabet Σ, wecallanysubsetofσ
More informationMidterm Exam II CIS 341: Foundations of Computer Science II Spring 2006, day section Prof. Marvin K. Nakayama
Midterm Exam II CIS 341: Foundations of Computer Science II Spring 2006, day section Prof. Marvin K. Nakayama Print family (or last) name: Print given (or first) name: I have read and understand all of
More informationLecture notes for Topology MMA100
Lecture notes for Topology MMA100 J A S, S-11 1 Simplicial Complexes 1.1 Affine independence A collection of points v 0, v 1,..., v n in some Euclidean space R N are affinely independent if the (affine
More informationFormal Languages and Automata
Mobile Computing and Software Engineering p. 1/3 Formal Languages and Automata Chapter 3 Regular languages and Regular Grammars Chuan-Ming Liu cmliu@csie.ntut.edu.tw Department of Computer Science and
More informationFAdo: Interactive Tools for Learning Formal Computational Models
FAdo: Interactive Tools for Learning Formal Computational Models Rogério Reis Nelma Moreira DCC-FC& LIACC, Universidade do Porto R. do Campo Alegre 823, 4150 Porto, Portugal {rvr,nam}@ncc.up.pt Abstract
More informationSituation Calculus and YAGI
Situation Calculus and YAGI Institute for Software Technology 1 Progression another solution to the projection problem does a sentence hold for a future situation used for automated reasoning and planning
More informationTyped Lambda Calculus
Department of Linguistics Ohio State University Sept. 8, 2016 The Two Sides of A typed lambda calculus (TLC) can be viewed in two complementary ways: model-theoretically, as a system of notation for functions
More informationFormal Specification and Verification Techniques
Formal Specification and Verification Techniques Prof. Dr. K. Madlener 2. November 2011 Prof. Dr. K. Madlener: Formal Specification and Verification Techniques 1 Introduction Generalities Course of Studies
More informationMathematical Research Letters 4, (1997) ORDER TREES AND LAMINATIONS OF THE PLANE. David Gabai and William H. Kazez
Mathematical Research Letters 4, 603 616 (1997) ORDER TREES AND LAMINATIONS OF THE PLANE David Gabai and William H. Kazez 1 Preliminary definitions A lamination λ of R 2 is a disjoint union of 1-manifolds,
More informationChapter 1. Preliminaries
Chapter 1 Preliminaries 1.1 Topological spaces 1.1.1 The notion of topological space The topology on a set X is usually defined by specifying its open subsets of X. However, in dealing with topological
More informationPerfect Matching Conjectures and Their Relationship to P NP
Perfect Matching Conjectures and Their Relationship to P NP Timothy Y. Chow* 22 June 2004 (StanleyFest) * Currently working at MIT Lincoln Laboratory Distance Degree Regular Graphs If v is a vertex in
More informationA theory of stream queries
A theory of stream queries Yuri Gurevich 1, Dirk Leinders 2, and Jan Van den Bussche 2 1 Microsoft Research gurevich@microsoft.com 2 Hasselt University and Transnational University of Limburg {dirk.leinders,jan.vandenbussche}@uhasselt.be
More information1. (10 points) Draw the state diagram of the DFA that recognizes the language over Σ = {0, 1}
CSE 5 Homework 2 Due: Monday October 6, 27 Instructions Upload a single file to Gradescope for each group. should be on each page of the submission. All group members names and PIDs Your assignments in
More informationCOMP-421 Compiler Design. Presented by Dr Ioanna Dionysiou
COMP-421 Compiler Design Presented by Dr Ioanna Dionysiou Administrative! [ALSU03] Chapter 3 - Lexical Analysis Sections 3.1-3.4, 3.6-3.7! Reading for next time [ALSU03] Chapter 3 Copyright (c) 2010 Ioanna
More informationIn class 75min: 2:55-4:10 Thu 9/30.
MATH 4530 Topology. In class 75min: 2:55-4:10 Thu 9/30. Prelim I Solutions Problem 1: Consider the following topological spaces: (1) Z as a subspace of R with the finite complement topology (2) [0, π]
More informationSection 17. Closed Sets and Limit Points
17. Closed Sets and Limit Points 1 Section 17. Closed Sets and Limit Points Note. In this section, we finally define a closed set. We also introduce several traditional topological concepts, such as limit
More informationSynthetic Geometry. 1.1 Foundations 1.2 The axioms of projective geometry
Synthetic Geometry 1.1 Foundations 1.2 The axioms of projective geometry Foundations Def: A geometry is a pair G = (Ω, I), where Ω is a set and I a relation on Ω that is symmetric and reflexive, i.e. 1.
More information4. Definition: topological space, open set, topology, trivial topology, discrete topology.
Topology Summary Note to the reader. If a statement is marked with [Not proved in the lecture], then the statement was stated but not proved in the lecture. Of course, you don t need to know the proof.
More informationTOPOLOGY CHECKLIST - SPRING 2010
TOPOLOGY CHECKLIST - SPRING 2010 The list below serves as an indication of what we have covered in our course on topology. (It was written in a hurry, so there is a high risk of some mistake being made
More informationExpansion complexes for finite subdivision rules
Expansion complexes for finite subdivision rules W. Floyd (joint work with J. Cannon and W. Parry) Department of Mathematics Virginia Tech Spring Topology and Dynamics Conference : March, 2013 Definition
More informationEvolving Algebras and Partial Evaluation
Evolving Algebras and Partial Evaluation Yuri Gurevich and James K. Huggins May 21, 2002 Keyword Codes: D.2.2; D.2.m; F.3.2 Keywords: Software Engineering, Tools and Techniques; Software Engineering, Miscellaneous;
More informationContext Free Languages and Pushdown Automata
Context Free Languages and Pushdown Automata COMP2600 Formal Methods for Software Engineering Ranald Clouston Australian National University Semester 2, 2013 COMP 2600 Context Free Languages and Pushdown
More informationTyped Lambda Calculus for Syntacticians
Department of Linguistics Ohio State University January 12, 2012 The Two Sides of Typed Lambda Calculus A typed lambda calculus (TLC) can be viewed in two complementary ways: model-theoretically, as a
More informationOverview. CS389L: Automated Logical Reasoning. Lecture 6: First Order Logic Syntax and Semantics. Constants in First-Order Logic.
Overview CS389L: Automated Logical Reasoning Lecture 6: First Order Logic Syntax and Semantics Işıl Dillig So far: Automated reasoning in propositional logic. Propositional logic is simple and easy to
More informationACLT: Algebra, Categories, Logic in Topology - Grothendieck's generalized topological spaces (toposes)
ACLT: Algebra, Categories, Logic in Topology - Grothendieck's generalized topological spaces (toposes) Steve Vickers CS Theory Group Birmingham 1. Sheaves "Sheaf = continuous set-valued map" TACL Tutorial
More informationOn the Recognizability of Arrow and Graph Languages
On the Recognizability of Arrow and Graph Languages Christoph Blume Sander Bruggink Barbara König Universität Duisburg-Essen, Germany Background Applications of finite automata and regular (word) languages
More information