Boolean Functional Synthesis via Self-Substitution

Size: px
Start display at page:

Download "Boolean Functional Synthesis via Self-Substitution"

Transcription

1 Boolean Functional Synthesis via Self-Substitution Lucas M. Tabajara Rice University May 9, 2016 Joint work with Dror Fried and Moshe Vardi Lucas M. Tabajara (Rice University) Boolean Functional Synthesis May 9, / 14

2 Motivation x 1 y 1. g : Bm Bn. x m y n Lucas M. Tabajara (Rice University) Boolean Functional Synthesis May 9, / 14

3 Motivation x 1 y 1. g : Bm Bn. x m y n f : B m B n f ( x, y) Lucas M. Tabajara (Rice University) Boolean Functional Synthesis May 9, / 14

4 Motivation x 1 y 1. g : Bm Bn. x m y n f : B m B n f ( x, y) g : B m B n y = g( x) Lucas M. Tabajara (Rice University) Boolean Functional Synthesis May 9, / 14

5 Motivation x 1 y 1. g : Bm Bn. x m y n f : B m B n f ( x, y) g : B m B n y = g( x) Given f ( x, y), how to obtain g( x)? Lucas M. Tabajara (Rice University) Boolean Functional Synthesis May 9, / 14

6 Motivation x 1 y 1. g : Bm Bn. x m y n f : B m B n f ( x, y) g : B m B n y = g( x) Given f ( x, y), how to obtain g( x)? How to identify when an input x has no corresponding output? Lucas M. Tabajara (Rice University) Boolean Functional Synthesis May 9, / 14

7 Overview 1 Problem formulation 2 Framework Introducing Self-Substitution Synthesis in two phases 3 Experimental evaluation Lucas M. Tabajara (Rice University) Boolean Functional Synthesis May 9, / 14

8 Problem formulation Given: Specification: Boolean formula f ( x, y) Input variables: x 1,..., x m Output variables: y 1,..., y n Lucas M. Tabajara (Rice University) Boolean Functional Synthesis May 9, / 14

9 Problem formulation Given: Specification: Boolean formula f ( x, y) Input variables: x 1,..., x m Output variables: y 1,..., y n Obtain: Precondition: Boolean formula p( x) p( x) is true exactly for those inputs for which there is a valid output Formally, p( x) y.f ( x, y) Lucas M. Tabajara (Rice University) Boolean Functional Synthesis May 9, / 14

10 Problem formulation Given: Specification: Boolean formula f ( x, y) Input variables: x 1,..., x m Output variables: y 1,..., y n Obtain: Precondition: Boolean formula p( x) p( x) is true exactly for those inputs for which there is a valid output Formally, p( x) y.f ( x, y) Implementation: Boolean function g( x) = (g 1 ( x),..., g n ( x)) for every input that satisfies the precondition, g satisfies f Formally, p( x) f ( x, g( x)) Lucas M. Tabajara (Rice University) Boolean Functional Synthesis May 9, / 14

11 Self-Substitution Lemma (Self-Substitution) Let f ( x, y) be a Boolean formula. Then, y.f ( x, y) f ( x, f ( x, 1)) y.f ( x, y) f ( x, f ( x, 0)) Lucas M. Tabajara (Rice University) Boolean Functional Synthesis May 9, / 14

12 Self-Substitution Lemma (Self-Substitution) Let f ( x, y) be a Boolean formula. Then, y.f ( x, y) f ( x, f ( x, 1)) y.f ( x, y) f ( x, f ( x, 0)) Self-Substitution provides a novel way to perform Quantifier Elimination. Lucas M. Tabajara (Rice University) Boolean Functional Synthesis May 9, / 14

13 Self-Substitution for Synthesis For a specification f ( x, y) of a single output variable, Self-Substitution directly defines an implementation for y: Lucas M. Tabajara (Rice University) Boolean Functional Synthesis May 9, / 14

14 Self-Substitution for Synthesis For a specification f ( x, y) of a single output variable, Self-Substitution directly defines an implementation for y: y.f ( x, y) f ( x, f ( x, 1)) Lucas M. Tabajara (Rice University) Boolean Functional Synthesis May 9, / 14

15 Self-Substitution for Synthesis For a specification f ( x, y) of a single output variable, Self-Substitution directly defines an implementation for y: y.f ( x, y) f ( x, f ( x, 1)) g( x) = f ( x, 1) Lucas M. Tabajara (Rice University) Boolean Functional Synthesis May 9, / 14

16 Self-Substitution for Synthesis For a specification f ( x, y) of a single output variable, Self-Substitution directly defines an implementation for y: y.f ( x, y) f ( x, f ( x, 1)) g( x) = f ( x, 1) f ( x, 1) is a default 1 implementation of y. Lucas M. Tabajara (Rice University) Boolean Functional Synthesis May 9, / 14

17 General framework Given a specification f ( x, y), we perform synthesis in two phases: Phase 1: Quantifier elimination Phase 2: Function construction Lucas M. Tabajara (Rice University) Boolean Functional Synthesis May 9, / 14

18 Phase 1: Quantifier Elimination Using Self-Substitution, eliminate each y i in sequence. At each step of this process we obtain: f i ( x, y 1,..., y i ) y i+1... y n.f ( x, y 1,..., y n ) Lucas M. Tabajara (Rice University) Boolean Functional Synthesis May 9, / 14

19 Phase 1: Quantifier Elimination Using Self-Substitution, eliminate each y i in sequence. At each step of this process we obtain: f i ( x, y 1,..., y i ) y i+1... y n.f ( x, y 1,..., y n ) In the final step, we have: f 0 ( x) y 1... y n.f ( x, y 1,..., y n ) Lucas M. Tabajara (Rice University) Boolean Functional Synthesis May 9, / 14

20 Phase 1: Quantifier Elimination Using Self-Substitution, eliminate each y i in sequence. At each step of this process we obtain: f i ( x, y 1,..., y i ) y i+1... y n.f ( x, y 1,..., y n ) In the final step, we have: f 0 ( x) y 1... y n.f ( x, y 1,..., y n ) f 0 ( x) is exactly the precondition p( x). Lucas M. Tabajara (Rice University) Boolean Functional Synthesis May 9, / 14

21 Phase 2: Function construction For each output y i, use f i ( x, y 1,..., y i ) to construct g i ( x). Lucas M. Tabajara (Rice University) Boolean Functional Synthesis May 9, / 14

22 Phase 2: Function construction For each output y i, use f i ( x, y 1,..., y i ) to construct g i ( x). Base case: f 1 ( x, y 1 ) Lucas M. Tabajara (Rice University) Boolean Functional Synthesis May 9, / 14

23 Phase 2: Function construction For each output y i, use f i ( x, y 1,..., y i ) to construct g i ( x). Base case: f 1 ( x, y 1 ) g 1 ( x) = f 1 ( x, 1) Lucas M. Tabajara (Rice University) Boolean Functional Synthesis May 9, / 14

24 Phase 2: Function construction For each output y i, use f i ( x, y 1,..., y i ) to construct g i ( x). Base case: f 1 ( x, y 1 ) g 1 ( x) = f 1 ( x, 1) Induction step: f i ( x, y 1,..., y i 1, y i ) Lucas M. Tabajara (Rice University) Boolean Functional Synthesis May 9, / 14

25 Phase 2: Function construction For each output y i, use f i ( x, y 1,..., y i ) to construct g i ( x). Base case: f 1 ( x, y 1 ) g 1 ( x) = f 1 ( x, 1) Induction step: f i ( x, y 1,..., y i 1, y i ) g i ( x) = f i ( x, g 1 ( x),..., g i 1 ( x), 1) Lucas M. Tabajara (Rice University) Boolean Functional Synthesis May 9, / 14

26 Phase 2: Function construction For each output y i, use f i ( x, y 1,..., y i ) to construct g i ( x). Base case: f 1 ( x, y 1 ) g 1 ( x) = f 1 ( x, 1) Induction step: f i ( x, y 1,..., y i 1, y i ) g i ( x) = f i ( x, g 1 ( x),..., g i 1 ( x), 1) g( x) = (g 1 ( x),..., g n ( x)) is a correct implementation of f ( x, y). Lucas M. Tabajara (Rice University) Boolean Functional Synthesis May 9, / 14

27 Experiments RSynth: implementation of the framework using Binary Decision Diagrams Comparison with MonoSkolem tool based on (Jiang et al., 2009) Evaluation on scalable benchmarks Function Specification Subtraction y = x x y + x = x Maximum y = max( x, x ) ( y x) ( y x ) (( y = x) ( y = x )) Ceiling of Average x + x y = 2 (2 y = x + x ) (2 y + 1 = x + x ) Lucas M. Tabajara (Rice University) Boolean Functional Synthesis May 9, / 14

28 Results T (s) 10 1 Subtraction (RSynth) 0.1 Maximum (RSynth) Ceiling of Average (RSynth) 0.01 Subtraction (MonoSkolem) Maximum (MonoSkolem) Ceiling of Average (MonoSkolem) n Lucas M. Tabajara (Rice University) Boolean Functional Synthesis May 9, / 14

29 Conclusions When problem has an efficient variable ordering, performance scales well even for a large number of variables. RSynth outperforms previous approaches, even using a naive strategy for selecting implementations. Lucas M. Tabajara (Rice University) Boolean Functional Synthesis May 9, / 14

30 Future work Factored representation as a way to control formula size. More elaborate strategies for selecting the implementation for each variable. Alternative representations Lucas M. Tabajara (Rice University) Boolean Functional Synthesis May 9, / 14

31 Thank you! Questions? Lucas M. Tabajara (Rice University) Boolean Functional Synthesis May 9, / 14

Factored Boolean Functional Synthesis

Factored Boolean Functional Synthesis Factored Boolean Functional Synthesis Lucas M. Tabajara Department of Computer Science, Rice University Houston, USA lucasmt@rice.edu Moshe Y. Vardi Department of Computer Science, Rice University Houston,

More information

BDD-Based Boolean Functional Synthesis

BDD-Based Boolean Functional Synthesis BDD-Based Boolean Functional Synthesis Dror Fried, Lucas M. Tabajara, and Moshe Y. Vardi Department of Computer Science, Rice University Abstract. Boolean functional synthesis is the process of automatically

More information

A Scalable and Nearly Uniform Generator of SAT Witnesses

A Scalable and Nearly Uniform Generator of SAT Witnesses 1 A Scalable and Nearly Uniform Generator of SAT Witnesses Supratik Chakraborty 1, Kuldeep S Meel 2, Moshe Y Vardi 2 1 Indian Institute of Technology Bombay, India 2 Department of Computer Science, Rice

More information

Case-Analysis for Rippling and Inductive Proof

Case-Analysis for Rippling and Inductive Proof Case-Analysis for Rippling and Inductive Proof Moa Johansson 1 Joint work with Lucas Dixon 2 and Alan Bundy 2 Dipartimento di Informatica, Università degli Studi di Verona, Italy. 1 School of Informatics,

More information

Warm-Up Problem. Let L be the language consisting of as constant symbols, as a function symbol and as a predicate symbol. Give an interpretation where

Warm-Up Problem. Let L be the language consisting of as constant symbols, as a function symbol and as a predicate symbol. Give an interpretation where Warm-Up Problem Let L be the language consisting of as constant symbols, as a function symbol and as a predicate symbol Give an interpretation where is false Use a finite domain in your interpretation

More information

Small Formulas for Large Programs: On-line Constraint Simplification In Scalable Static Analysis

Small Formulas for Large Programs: On-line Constraint Simplification In Scalable Static Analysis Small Formulas for Large Programs: On-line Constraint Simplification In Scalable Static Analysis Isil Dillig, Thomas Dillig, Alex Aiken Stanford University Scalability and Formula Size Many program analysis

More information

Network Verification: Reflections from Electronic Design Automation (EDA)

Network Verification: Reflections from Electronic Design Automation (EDA) Network Verification: Reflections from Electronic Design Automation (EDA) Sharad Malik Princeton University MSR Faculty Summit: 7/8/2015 $4 Billion EDA industry EDA Consortium $350 Billion Semiconductor

More information

Chapter 1 Divide and Conquer Algorithm Theory WS 2014/15 Fabian Kuhn

Chapter 1 Divide and Conquer Algorithm Theory WS 2014/15 Fabian Kuhn Chapter 1 Divide and Conquer Algorithm Theory WS 2014/15 Fabian Kuhn Divide And Conquer Principle Important algorithm design method Examples from Informatik 2: Sorting: Mergesort, Quicksort Binary search

More information

Provably Optimal Test Cube Generation using Quantified Boolean Formula Solving

Provably Optimal Test Cube Generation using Quantified Boolean Formula Solving Provably Optimal Test Cube Generation using Quantified Boolean Formula Solving ASP-DAC 2013 Albert-Ludwigs-Universität Freiburg Matthias Sauer, Sven Reimer, Ilia Polian, Tobias Schubert, Bernd Becker Chair

More information

Section 1.5. Finding Linear Equations

Section 1.5. Finding Linear Equations Section 1.5 Finding Linear Equations Using Slope and a Point to Find an Equation of a Line Example Find an equation of a line that has slope m = 3 and contains the point (2, 5). Solution Substitute m =

More information

An Annotated Language

An Annotated Language Hoare Logic An Annotated Language State and Semantics Expressions are interpreted as functions from states to the corresponding domain of interpretation Operators have the obvious interpretation Free of

More information

Mathematically Rigorous Software Design Review of mathematical prerequisites

Mathematically Rigorous Software Design Review of mathematical prerequisites Mathematically Rigorous Software Design 2002 September 27 Part 1: Boolean algebra 1. Define the Boolean functions and, or, not, implication ( ), equivalence ( ) and equals (=) by truth tables. 2. In an

More information

Local Two-Level And-Inverter Graph Minimization without Blowup

Local Two-Level And-Inverter Graph Minimization without Blowup Local Two-Level And-Inverter Graph Minimization without Blowup Robert Brummayer and Armin Biere Institute for Formal Models and Verification Johannes Kepler University Linz, Austria {robert.brummayer,

More information

4 Generating functions in two variables

4 Generating functions in two variables 4 Generating functions in two variables (Wilf, sections.5.6 and 3.4 3.7) Definition. Let a(n, m) (n, m 0) be a function of two integer variables. The 2-variable generating function of a(n, m) is F (x,

More information

CIS 1.5 Course Objectives. a. Understand the concept of a program (i.e., a computer following a series of instructions)

CIS 1.5 Course Objectives. a. Understand the concept of a program (i.e., a computer following a series of instructions) By the end of this course, students should CIS 1.5 Course Objectives a. Understand the concept of a program (i.e., a computer following a series of instructions) b. Understand the concept of a variable

More information

COUNTEREXAMPLE-GUIDED MODEL SYNTHESIS

COUNTEREXAMPLE-GUIDED MODEL SYNTHESIS COUNTEREXAMPLE-GUIDED MODEL SYNTHESIS Mathias Preiner, Aina Niemetz and Armin Biere Institute for Formal Models and Verification (FMV) Johannes Kepler University, Linz, Austria http://fmv.jku.at/ TACAS

More information

Chapter 1 Divide and Conquer Algorithm Theory WS 2013/14 Fabian Kuhn

Chapter 1 Divide and Conquer Algorithm Theory WS 2013/14 Fabian Kuhn Chapter 1 Divide and Conquer Algorithm Theory WS 2013/14 Fabian Kuhn Divide And Conquer Principle Important algorithm design method Examples from Informatik 2: Sorting: Mergesort, Quicksort Binary search

More information

Part II. Hoare Logic and Program Verification. Why specify programs? Specification and Verification. Code Verification. Why verify programs?

Part II. Hoare Logic and Program Verification. Why specify programs? Specification and Verification. Code Verification. Why verify programs? Part II. Hoare Logic and Program Verification Part II. Hoare Logic and Program Verification Dilian Gurov Props: Models: Specs: Method: Tool: safety of data manipulation source code logic assertions Hoare

More information

Satisfiability Modulo Theories: ABsolver

Satisfiability Modulo Theories: ABsolver Satisfiability Modulo Theories: ABsolver Michael Tautschnig Joint work with: Andreas Bauer Martin Leucker Christian Schallhart Michael Tautschnig 1 Outline 1. Introduction Michael Tautschnig 2 Outline

More information

Abstract Path Planning for Multiple Robots: An Empirical Study

Abstract Path Planning for Multiple Robots: An Empirical Study Abstract Path Planning for Multiple Robots: An Empirical Study Charles University in Prague Faculty of Mathematics and Physics Department of Theoretical Computer Science and Mathematical Logic Malostranské

More information

Introduction to Linear-Time Temporal Logic. CSE 814 Introduction to LTL

Introduction to Linear-Time Temporal Logic. CSE 814 Introduction to LTL Introduction to Linear-Time Temporal Logic CSE 814 Introduction to LTL 1 Outline Motivation for TL in general Types of properties to be expressed in TL Structures on which LTL formulas are evaluated Syntax

More information

Chapter 1 Divide and Conquer Algorithm Theory WS 2015/16 Fabian Kuhn

Chapter 1 Divide and Conquer Algorithm Theory WS 2015/16 Fabian Kuhn Chapter 1 Divide and Conquer Algorithm Theory WS 2015/16 Fabian Kuhn Divide And Conquer Principle Important algorithm design method Examples from Informatik 2: Sorting: Mergesort, Quicksort Binary search

More information

LEARNING TO INSTANTIATE QUANTIFIERS

LEARNING TO INSTANTIATE QUANTIFIERS LEARNING TO INSTANTIATE QUANTIFIERS Armin Biere 1 joint work with Mathias Preiner 1,2, Aina Niemetz 1,2 TACAS 17, SMT 17, PhD Thesis Mathias Preiner in 2017 1 Johannes Kepler University Linz 2 Stanford

More information

VS 3 : SMT Solvers for Program Verification

VS 3 : SMT Solvers for Program Verification VS 3 : SMT Solvers for Program Verification Saurabh Srivastava 1,, Sumit Gulwani 2, and Jeffrey S. Foster 1 1 University of Maryland, College Park, {saurabhs,jfoster}@cs.umd.edu 2 Microsoft Research, Redmond,

More information

Scaling Up DPLL(T) String Solvers Using Context-Dependent Simplification

Scaling Up DPLL(T) String Solvers Using Context-Dependent Simplification Scaling Up DPLL(T) String s Using Context-Dependent Simplification Andrew Reynolds, Maverick Woo, Clark Barrett, David Brumley, Tianyi Liang, Cesare Tinelli CAV 2017 1 Importance of String s Automated

More information

Lesson 4 Typed Arithmetic Typed Lambda Calculus

Lesson 4 Typed Arithmetic Typed Lambda Calculus Lesson 4 Typed Arithmetic Typed Lambda 1/28/03 Chapters 8, 9, 10 Outline Types for Arithmetic types the typing relation safety = progress + preservation The simply typed lambda calculus Function types

More information

The Complexity of Relational Queries: A Personal Perspective

The Complexity of Relational Queries: A Personal Perspective The Complexity of Relational Queries: A Personal Perspective Moshe Y. Vardi Rice University http://www.cs.rice.edu/ vardi Relational Query Theory in 1980 Codd, 1972: FO=RA Chandra&Merlin, 1977: basic theory

More information

Semantic Subtyping. Alain Frisch (ENS Paris) Giuseppe Castagna (ENS Paris) Véronique Benzaken (LRI U Paris Sud)

Semantic Subtyping.  Alain Frisch (ENS Paris) Giuseppe Castagna (ENS Paris) Véronique Benzaken (LRI U Paris Sud) Semantic Subtyping Alain Frisch (ENS Paris) Giuseppe Castagna (ENS Paris) Véronique Benzaken (LRI U Paris Sud) http://www.cduce.org/ Semantic Subtyping - Groupe de travail BD LRI p.1/28 CDuce A functional

More information

Today. Types of graphs. Complete Graphs. Trees. Hypercubes.

Today. Types of graphs. Complete Graphs. Trees. Hypercubes. Today. Types of graphs. Complete Graphs. Trees. Hypercubes. Complete Graph. K n complete graph on n vertices. All edges are present. Everyone is my neighbor. Each vertex is adjacent to every other vertex.

More information

CSE 20 DISCRETE MATH. Fall

CSE 20 DISCRETE MATH. Fall CSE 20 DISCRETE MATH Fall 2017 http://cseweb.ucsd.edu/classes/fa17/cse20-ab/ Final exam The final exam is Saturday December 16 11:30am-2:30pm. Lecture A will take the exam in Lecture B will take the exam

More information

Proof-Pattern Recognition and Lemma Discovery in ACL2

Proof-Pattern Recognition and Lemma Discovery in ACL2 Proof-Pattern Recognition and Lemma Discovery in ACL2 Jónathan Heras (joint work with K. Komendantskaya, M. Johansson and E. Maclean) University of Dundee http://staff.computing.dundee.ac.uk/jheras/acl2ml/

More information

From Hoare Logic to Matching Logic Reachability. Grigore Rosu and Andrei Stefanescu University of Illinois, USA

From Hoare Logic to Matching Logic Reachability. Grigore Rosu and Andrei Stefanescu University of Illinois, USA From Hoare Logic to Matching Logic Reachability Grigore Rosu and Andrei Stefanescu University of Illinois, USA Matching Logic Reachability - Goal - Language independent program verification framework Derives

More information

The Formal Semantics of Programming Languages An Introduction. Glynn Winskel. The MIT Press Cambridge, Massachusetts London, England

The Formal Semantics of Programming Languages An Introduction. Glynn Winskel. The MIT Press Cambridge, Massachusetts London, England The Formal Semantics of Programming Languages An Introduction Glynn Winskel The MIT Press Cambridge, Massachusetts London, England Series foreword Preface xiii xv 1 Basic set theory 1 1.1 Logical notation

More information

Lecture 6: Arithmetic and Threshold Circuits

Lecture 6: Arithmetic and Threshold Circuits IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Advanced Course on Computational Complexity Lecture 6: Arithmetic and Threshold Circuits David Mix Barrington and Alexis Maciel July

More information

Preprocessing in Pseudo-Boolean Optimization: An Experimental Evaluation

Preprocessing in Pseudo-Boolean Optimization: An Experimental Evaluation Preprocessing in Pseudo-Boolean Optimization: An Experimental Evaluation Ruben Martins Inês Lynce Vasco Manquinho IST/INESC-ID, Technical University of Lisbon, Portugal 20/09/2009 Lisbon, Portugal Motivation

More information

Chapter 3: Propositional Languages

Chapter 3: Propositional Languages Chapter 3: Propositional Languages We define here a general notion of a propositional language. We show how to obtain, as specific cases, various languages for propositional classical logic and some non-classical

More information

An Evolution of Mathematical Tools

An Evolution of Mathematical Tools An Evolution of Mathematical Tools From Conceptualization to Formalization Here's what we do when we build a formal model (or do a computation): 0. Identify a collection of objects/events in the real world.

More information

LOGIC SYNTHESIS AND VERIFICATION ALGORITHMS. Gary D. Hachtel University of Colorado. Fabio Somenzi University of Colorado.

LOGIC SYNTHESIS AND VERIFICATION ALGORITHMS. Gary D. Hachtel University of Colorado. Fabio Somenzi University of Colorado. LOGIC SYNTHESIS AND VERIFICATION ALGORITHMS by Gary D. Hachtel University of Colorado Fabio Somenzi University of Colorado Springer Contents I Introduction 1 1 Introduction 5 1.1 VLSI: Opportunity and

More information

Analyzing Complexity of Lists

Analyzing Complexity of Lists Analyzing Complexity of Lists Operation Sorted Array Sorted Linked List Unsorted Array Unsorted Linked List Search( L, x ) O(logn) O( n ) O( n ) O( n ) Insert( L, x ) O(logn) O( n ) + O( 1 ) O( 1 ) + O(

More information

Chapter 1 Divide and Conquer Algorithm Theory WS 2013/14 Fabian Kuhn

Chapter 1 Divide and Conquer Algorithm Theory WS 2013/14 Fabian Kuhn Chapter 1 Divide and Conquer Algorithm Theory WS 2013/14 Fabian Kuhn Number of Inversions Formal problem: Given: array,,,, of distinct elements Objective: Compute number of inversions 0 Example: 4, 1,

More information

Joint Shape Segmentation

Joint Shape Segmentation Joint Shape Segmentation Motivations Structural similarity of segmentations Extraneous geometric clues Single shape segmentation [Chen et al. 09] Joint shape segmentation [Huang et al. 11] Motivations

More information

COUNTEREXAMPLE-GUIDED MODEL SYNTHESIS

COUNTEREXAMPLE-GUIDED MODEL SYNTHESIS COUNTEREXAMPLE-GUIDED MODEL SYNTHESIS Mathias Preiner?y, Aina Niemetz?y and Armin Biere?? Johannes Kepler University y Stanford University SMT Workshop July 22-23, 2017 Heidelberg, Germany Introduction

More information

CSE 20 DISCRETE MATH. Winter

CSE 20 DISCRETE MATH. Winter CSE 20 DISCRETE MATH Winter 2017 http://cseweb.ucsd.edu/classes/wi17/cse20-ab/ Final exam The final exam is Saturday March 18 8am-11am. Lecture A will take the exam in GH 242 Lecture B will take the exam

More information

This chapter covers recursive definition, including finding closed forms.

This chapter covers recursive definition, including finding closed forms. Chapter 12 Recursive Definition This chapter covers recursive definition, including finding closed forms. 12.1 Recursive definitions Thus far, we have defined objects of variable length using semi-formal

More information

COUNTEREXAMPLE-GUIDED MODEL SYNTHESIS

COUNTEREXAMPLE-GUIDED MODEL SYNTHESIS COUNTEREXAMPLE-GUIDED MODEL SYNTHESIS Mathias Preiner, Aina Niemetz and Armin Biere Johannes Kepler University Stanford University SMT Workshop July 22-23, 2017 Heidelberg, Germany Introduction Counterexample-Guided

More information

Logic synthesis and verification on fixed topology

Logic synthesis and verification on fixed topology Logic synthesis and verification on fixed topology Masahiro Fujita University of Tokyo lan Mishchenko University of California, erkeley bstract We discuss ab logic synthesis and formal verification of

More information

Formal Verification of a Floating-Point Elementary Function

Formal Verification of a Floating-Point Elementary Function Introduction Coq & Flocq Coq.Interval Gappa Conclusion Formal Verification of a Floating-Point Elementary Function Inria Saclay Île-de-France & LRI, Université Paris Sud, CNRS 2015-06-25 Introduction Coq

More information

From Z3 to Lean, Efficient Verification

From Z3 to Lean, Efficient Verification From Z3 to Lean, Efficient Verification Turing Gateway to Mathematics, 19 July 2017 Leonardo de Moura, Microsoft Research Joint work with Nikolaj Bjorner and Christoph Wintersteiger Satisfiability Solution/Model

More information

A Type System for Checking Applet Isolation in Java Card

A Type System for Checking Applet Isolation in Java Card A Type System for Checking Applet Isolation in Java Card Peter Müller ETH Zürich Joint work with Werner Dietl and Arnd Poetzsch-Heffter Applet Isolation 2 Applet Context 1 Firewall Applet Context 2 SIO

More information

Type Assisted Synthesis of Programs with Algebraic Data Types

Type Assisted Synthesis of Programs with Algebraic Data Types Type Assisted Synthesis of Programs with Algebraic Data Types Jeevana Priya Inala MIT Collaborators: Xiaokang Qiu (MIT), Ben Lerner (Brown), Armando Solar-Lezama (MIT) Example - Desugaring a simple language

More information

Ensemble methods in machine learning. Example. Neural networks. Neural networks

Ensemble methods in machine learning. Example. Neural networks. Neural networks Ensemble methods in machine learning Bootstrap aggregating (bagging) train an ensemble of models based on randomly resampled versions of the training set, then take a majority vote Example What if you

More information

DISCRETE MATHEMATICS

DISCRETE MATHEMATICS DISCRETE MATHEMATICS WITH APPLICATIONS THIRD EDITION SUSANNA S. EPP DePaul University THOIVISON * BROOKS/COLE Australia Canada Mexico Singapore Spain United Kingdom United States CONTENTS Chapter 1 The

More information

Summary of Course Coverage

Summary of Course Coverage CS-227, Discrete Structures I Spring 2006 Semester Summary of Course Coverage 1) Propositional Calculus a) Negation (logical NOT) b) Conjunction (logical AND) c) Disjunction (logical inclusive-or) d) Inequalities

More information

Harvard School of Engineering and Applied Sciences CS 152: Programming Languages

Harvard School of Engineering and Applied Sciences CS 152: Programming Languages Harvard School of Engineering and Applied Sciences CS 152: Programming Languages Lecture 19 Tuesday, April 3, 2018 1 Introduction to axiomatic semantics The idea in axiomatic semantics is to give specifications

More information

Magiclock: Scalable Detection of Potential Deadlocks in Large-Scale Multithreaded Programs

Magiclock: Scalable Detection of Potential Deadlocks in Large-Scale Multithreaded Programs Magiclock: Scalable Detection of Potential Deadlocks in Large-Scale Multithreaded Programs Yan Cai and W.K. Chan Abstract We present Magiclock, a novel potential deadlock detection technique by analyzing

More information

38050 Povo (Trento), Italy Tel.: Fax: e mail: url:

38050 Povo (Trento), Italy Tel.: Fax: e mail: url: CENTRO PER LA RICERCA SCIENTIFICA E TECNOLOGICA 38050 Povo (Trento), Italy Tel.: +39 0461 314312 Fax: +39 0461 302040 e mail: prdoc@itc.it url: http://www.itc.it PLANNING AS MODEL CHECKING FOR EXTENDED

More information

Formal Verification using Probabilistic Techniques

Formal Verification using Probabilistic Techniques Formal Verification using Probabilistic Techniques René Krenz Elena Dubrova Department of Microelectronic and Information Technology Royal Institute of Technology Stockholm, Sweden rene,elena @ele.kth.se

More information

NO WARRANTY. Use of any trademarks in this presentation is not intended in any way to infringe on the rights of the trademark holder.

NO WARRANTY. Use of any trademarks in this presentation is not intended in any way to infringe on the rights of the trademark holder. NO WARRANTY THIS MATERIAL OF CARNEGIE MELLON UNIVERSITY AND ITS SOFTWARE ENGINEERING INSTITUTE IS FURNISHED ON AN AS-IS" BASIS. CARNEGIE MELLON UNIVERSITY MAKES NO WARRANTIES OF ANY KIND, EITHER EXPRESSED

More information

About the Author. Dependency Chart. Chapter 1: Logic and Sets 1. Chapter 2: Relations and Functions, Boolean Algebra, and Circuit Design

About the Author. Dependency Chart. Chapter 1: Logic and Sets 1. Chapter 2: Relations and Functions, Boolean Algebra, and Circuit Design Preface About the Author Dependency Chart xiii xix xxi Chapter 1: Logic and Sets 1 1.1: Logical Operators: Statements and Truth Values, Negations, Conjunctions, and Disjunctions, Truth Tables, Conditional

More information

Introduction to Axiomatic Semantics

Introduction to Axiomatic Semantics Introduction to Axiomatic Semantics Meeting 10, CSCI 5535, Spring 2009 Announcements Homework 3 due tonight Homework 2 is graded 13 (mean), 14 (median), out of 21 total, but Graduate class: final project

More information

Database Theory VU , SS Codd s Theorem. Reinhard Pichler

Database Theory VU , SS Codd s Theorem. Reinhard Pichler Database Theory Database Theory VU 181.140, SS 2011 3. Codd s Theorem Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien 29 March, 2011 Pichler 29 March,

More information

Jaykov Foukzon. Israel Institute of Technology, Haifa, Israel.

Jaykov Foukzon. Israel Institute of Technology, Haifa, Israel. Inconsistent countable set Jaykov Foukzon Israel Institute of Technology, Haifa, Israel jaykovfoukzon@list.ru Abstract In this article we derived an importent example of the inconsistent countable set.

More information

EXTENSIONS OF FIRST ORDER LOGIC

EXTENSIONS OF FIRST ORDER LOGIC EXTENSIONS OF FIRST ORDER LOGIC Maria Manzano University of Barcelona CAMBRIDGE UNIVERSITY PRESS Table of contents PREFACE xv CHAPTER I: STANDARD SECOND ORDER LOGIC. 1 1.- Introduction. 1 1.1. General

More information

WORKBOOK 10 ACTION GEOMETRY SQUARE AND PENTAGON

WORKBOOK 10 ACTION GEOMETRY SQUARE AND PENTAGON UCL/CAS Training for Teachers Algorithms and Programming Module 1 WORKBOOK 10 ACTION GEOMETRY SQUARE AND PENTAGON Action Geometry Unplugged: starting with the square, we explore the properties of simple

More information

AXIOMS FOR THE INTEGERS

AXIOMS FOR THE INTEGERS AXIOMS FOR THE INTEGERS BRIAN OSSERMAN We describe the set of axioms for the integers which we will use in the class. The axioms are almost the same as what is presented in Appendix A of the textbook,

More information

Bounded Model Checking with Parametric Data Structures

Bounded Model Checking with Parametric Data Structures Bounded Model Checking with Marc Herbstritt (joint work with Erika Ábrahám, Bernd Becker, Martin Steffen) www.avacs.org August 15 2006 4th International Workshop on Bounded Model Checking Context Automated

More information

Sequential Dependency and Reliability Analysis of Embedded Systems. Yu Jiang Tsinghua university, Beijing, China

Sequential Dependency and Reliability Analysis of Embedded Systems. Yu Jiang Tsinghua university, Beijing, China Sequential Dependency and Reliability Analysis of Embedded Systems Yu Jiang Tsinghua university, Beijing, China outline Motivation Background Reliability Block Diagram, Fault Tree Bayesian Network, Dynamic

More information

Modular Synthesis of Sketches Using Models

Modular Synthesis of Sketches Using Models Modular Synthesis of Sketches Using Models Rohit Singh, Rishabh Singh, Zhilei Xu, Rebecca Krosnick and Armando Solar-Lezama March 10-11, 2014 Berkeley, CA, USA Rohit Singh., Rishabh Singh, Zhilei Xu, Armando

More information

Covered Clause Elimination

Covered Clause Elimination Covered Clause Elimination Marijn Heule TU Delft, The Netherlands Matti Järvisalo Univ. Helsinki, Finland Armin Biere JKU Linz, Austria Abstract Generalizing the novel clause elimination procedures developed

More information

Spark verification features

Spark verification features Spark verification features Paul Jackson School of Informatics University of Edinburgh Formal Verification Spring 2018 Adding specification information to programs Verification concerns checking whether

More information

Structural characterizations of schema mapping languages

Structural characterizations of schema mapping languages Structural characterizations of schema mapping languages Balder ten Cate INRIA and ENS Cachan (research done while visiting IBM Almaden and UC Santa Cruz) Joint work with Phokion Kolaitis (ICDT 09) Schema

More information

Efficiently Solving Bit-Vector Problems Using Model Checkers

Efficiently Solving Bit-Vector Problems Using Model Checkers Efficiently Solving Bit-Vector Problems Using Model Checkers Institute for Formal Models and Verification Johannes Kepler University, Linz, Austria http://fmv.jku.at SMT 2013 July 8 - July 9, 2013 Helsinki,

More information

arxiv: v1 [math.co] 20 Aug 2012

arxiv: v1 [math.co] 20 Aug 2012 ENUMERATING TRIANGULATIONS BY PARALLEL DIAGONALS Alon Regev Department of Mathematical Sciences, Northern Illinois University, DeKalb, Illinois regev@math.niu.edu arxiv:108.91v1 [math.co] 0 Aug 01 1 Introduction

More information

Towards More Effective Unsatisfiability-Based Maximum Satisfiability Algorithms

Towards More Effective Unsatisfiability-Based Maximum Satisfiability Algorithms Towards More Effective Unsatisfiability-Based Maximum Satisfiability Algorithms Joao Marques-Silva and Vasco Manquinho School of Electronics and Computer Science, University of Southampton, UK IST/INESC-ID,

More information

ENEE x Digital Logic Design. Lecture 3

ENEE x Digital Logic Design. Lecture 3 ENEE244-x Digital Logic Design Lecture 3 Announcements Homework due today. Homework 2 will be posted by tonight, due Monday, 9/2. First recitation quiz will be tomorrow on the material from Lectures and

More information

In = number of words appearing exactly n times N = number of words in the collection of words A = a constant. For example, if N=100 and the most

In = number of words appearing exactly n times N = number of words in the collection of words A = a constant. For example, if N=100 and the most In = number of words appearing exactly n times N = number of words in the collection of words A = a constant. For example, if N=100 and the most common word appears 10 times then A = rn*n/n = 1*10/100

More information

Pouya Kousha Fall 2018 CSE 5194 Prof. DK Panda

Pouya Kousha Fall 2018 CSE 5194 Prof. DK Panda Pouya Kousha Fall 2018 CSE 5194 Prof. DK Panda 1 Observe novel applicability of DL techniques in Big Data Analytics. Applications of DL techniques for common Big Data Analytics problems. Semantic indexing

More information

Overview. CS389L: Automated Logical Reasoning. Lecture 6: First Order Logic Syntax and Semantics. Constants in First-Order Logic.

Overview. CS389L: Automated Logical Reasoning. Lecture 6: First Order Logic Syntax and Semantics. Constants in First-Order Logic. Overview CS389L: Automated Logical Reasoning Lecture 6: First Order Logic Syntax and Semantics Işıl Dillig So far: Automated reasoning in propositional logic. Propositional logic is simple and easy to

More information

Formal study of plane Delaunay triangulation

Formal study of plane Delaunay triangulation Formal study of plane Delaunay triangulation Jean-François Dufourd 1 Yves Bertot 2 1 LSIIT, UMR CNRS 7005, Université de Strasbourg, France 2 INRIA, Centre de Sophia-Antipolis Méditerranée, France (Thanks:

More information

Relational Algebra 1

Relational Algebra 1 Relational Algebra 1 Relational Query Languages v Query languages: Allow manipulation and retrieval of data from a database. v Relational model supports simple, powerful QLs: Strong formal foundation based

More information

Counterexample Guided Inductive Optimization Applied to Mobile Robot Path Planning SBR/LARS 2017

Counterexample Guided Inductive Optimization Applied to Mobile Robot Path Planning SBR/LARS 2017 Cnterexample Guided Inductive Optimization Applied to Mobile Robot Path Planning SBR/LARS 2017 Rodrigo Araújo, Alexandre Ribeiro, Iury Bessa, Lucas Cordeiro, and João Edgar Chaves Filho Federal University

More information

Chapter 1 An Introduction to Computer Science. INVITATION TO Computer Science 1

Chapter 1 An Introduction to Computer Science. INVITATION TO Computer Science 1 Chapter 1 An Introduction to Computer Science INVITATION TO Computer Science 1 Q8. Under what conditions would the well-known quadratic formula not be effectively computable? (Assume that you are working

More information

Did you ever think that a four hundred year-old spider may be why we study linear relationships today?

Did you ever think that a four hundred year-old spider may be why we study linear relationships today? Show Me: Determine if a Function is Linear M8221 Did you ever think that a four hundred year-old spider may be why we study linear relationships today? Supposedly, while lying in bed Rene Descartes noticed

More information

Counting the number of spanning tree. Pied Piper Department of Computer Science and Engineering Shanghai Jiao Tong University

Counting the number of spanning tree. Pied Piper Department of Computer Science and Engineering Shanghai Jiao Tong University Counting the number of spanning tree Pied Piper Department of Computer Science and Engineering Shanghai Jiao Tong University 目录 Contents 1 Complete Graph 2 Proof of the Lemma 3 Arbitrary Graph 4 Proof

More information

SECTION 5.1. Sequences

SECTION 5.1. Sequences SECTION 5.1 Sequences Sequences Problem: count number of ancestors one has 2 parents, 4 grandparents, 8 greatgrandparents,, written in a row as 2, 4, 8, 16, 32, 64, 128, To look for pattern of the numbers,

More information

Graph Algorithms. Chromatic Polynomials. Graph Algorithms

Graph Algorithms. Chromatic Polynomials. Graph Algorithms Graph Algorithms Chromatic Polynomials Graph Algorithms Chromatic Polynomials Definition G a simple labelled graph with n vertices and m edges. k a positive integer. P G (k) number of different ways of

More information

Use of Symbolic Performance Models in Layout-Inclusive Synthesis of RF Low-Noise Amplifiers

Use of Symbolic Performance Models in Layout-Inclusive Synthesis of RF Low-Noise Amplifiers Use of Symbolic Performance Models in Layout-Inclusive Synthesis of RF Low-Noise Amplifiers Mukesh Ranjan, Amitava Bhaduri, Ranga Vemuri University of Cincinnati, Cincinnati, Ohio, USA. Wim Verhaegen,

More information

What does this print?

What does this print? public class Test_Static { int a; static int b; public Test_Static(int av, int bv) { a= av; b= bv; } public void print() { System.out.println ("a= " + a + " b= " + b); } public static void main (String

More information

Handling Loops in Bounded Model Checking of C Programs via k-induction

Handling Loops in Bounded Model Checking of C Programs via k-induction Software Tools for Technology Transfer manuscript No. (will be inserted by the editor) Handling Loops in Bounded Model Checking of C Programs via k-induction Mikhail Y. R. Gadelha, Hussama I. Ismail, and

More information

Binary Decision Diagrams

Binary Decision Diagrams Logic and roof Hilary 2016 James Worrell Binary Decision Diagrams A propositional formula is determined up to logical equivalence by its truth table. If the formula has n variables then its truth table

More information

Chapter 3. Describing Syntax and Semantics ISBN

Chapter 3. Describing Syntax and Semantics ISBN Chapter 3 Describing Syntax and Semantics ISBN 0-321-49362-1 Chapter 3 Topics Describing the Meanings of Programs: Dynamic Semantics Copyright 2015 Pearson. All rights reserved. 2 Semantics There is no

More information

Short-Term Audio-Visual Atoms for Generic Video Concept Classification

Short-Term Audio-Visual Atoms for Generic Video Concept Classification Short-Term Audio-Visual Atoms for Generic Video Concept Classification Authors Wei Jiang Courtenay Cotton Shih-Fu Chang Dan Ellis Alexander C. Loui Presenters Armin Samii Images from the interwebs, 2009

More information

Optimal Partition with Block-Level Parallelization in C-to-RTL Synthesis for Streaming Applications

Optimal Partition with Block-Level Parallelization in C-to-RTL Synthesis for Streaming Applications Optimal Partition with Block-Level Parallelization in C-to-RTL Synthesis for Streaming Applications Authors: Shuangchen Li, Yongpan Liu, X.Sharon Hu, Xinyu He, Pei Zhang, and Huazhong Yang 2013/01/23 Outline

More information

Giovanni De Micheli. Integrated Systems Centre EPF Lausanne

Giovanni De Micheli. Integrated Systems Centre EPF Lausanne Two-level Logic Synthesis and Optimization Giovanni De Micheli Integrated Systems Centre EPF Lausanne This presentation can be used for non-commercial purposes as long as this note and the copyright footers

More information

Formal Verification. Lecture 7: Introduction to Binary Decision Diagrams (BDDs)

Formal Verification. Lecture 7: Introduction to Binary Decision Diagrams (BDDs) Formal Verification Lecture 7: Introduction to Binary Decision Diagrams (BDDs) Jacques Fleuriot jdf@inf.ac.uk Diagrams from Huth & Ryan, 2nd Ed. Recap Previously: CTL and LTL Model Checking algorithms

More information

An Algorithm for Face-Constrained Encoding of Symbols Using Minimum Code Length

An Algorithm for Face-Constrained Encoding of Symbols Using Minimum Code Length An Algorithm for Face-Constrained Encoding of Symbols Using Minimum Code Length Manuel Martínez, María J. Avedillo, José M. Quintana and José L. Huertas Instituto de Microelectrónica de Sevilla - Centro

More information

Disjoint Support Decompositions

Disjoint Support Decompositions Chapter 4 Disjoint Support Decompositions We introduce now a new property of logic functions which will be useful to further improve the quality of parameterizations in symbolic simulation. In informal

More information

Connecting Statements. Today. First there was logic jumping forward.. ..and then proofs and then induction...

Connecting Statements. Today. First there was logic jumping forward.. ..and then proofs and then induction... Today Review for Midterm. First there was logic... A statement is a true or false. Statements? 3 = 4 1? Statement! 3 = 5? Statement! 3? Not a statement! n = 3? Not a statement...but a predicate. Predicate:

More information

Iterative Learning of Single Individual Haplotypes from High-Throughput DNA Sequencing Data

Iterative Learning of Single Individual Haplotypes from High-Throughput DNA Sequencing Data Iterative Learning of Single Individual Haplotypes from High-Throughput DNA Sequencing Data Zrinka Puljiz and Haris Vikalo Electrical and Computer Engineering Department The University of Texas at Austin

More information

CHAPTER 4 OPTIMIZATION OF WEB CACHING PERFORMANCE BY CLUSTERING-BASED PRE-FETCHING TECHNIQUE USING MODIFIED ART1 (MART1)

CHAPTER 4 OPTIMIZATION OF WEB CACHING PERFORMANCE BY CLUSTERING-BASED PRE-FETCHING TECHNIQUE USING MODIFIED ART1 (MART1) 71 CHAPTER 4 OPTIMIZATION OF WEB CACHING PERFORMANCE BY CLUSTERING-BASED PRE-FETCHING TECHNIQUE USING MODIFIED ART1 (MART1) 4.1 INTRODUCTION One of the prime research objectives of this thesis is to optimize

More information