Efficient Bounded Reachability Computation for Rectangular Automata

Size: px
Start display at page:

Download "Efficient Bounded Reachability Computation for Rectangular Automata"

Transcription

1 Efficient Bounded Reachability Computation for Rectangular Automata Xin Chen, Erika Ábrahám, and Goran Frehse RWTH Aachen University, Germany Université Grenoble Joseph Fourier - Verimag, France Abstract. We present a new approach to compute the reachable set with a bounded number of jumps for a rectangular automaton. The reachable set under a flow transition is computed as a polyhedron which is represented by a conjunction of finitely many linear constraints. If the bound is viewed as a constant, the computation time is polynomial in the number of variables. Introduction Hybrid systems are systems equipped with both continuous dynamics and discrete behavior. A popular modeling formalism for hybrid systems are hybrid automata. In this paper, we consider a special class of hybrid automata, called rectangular automata []. The main restriction is that the derivatives, invariants and guards are defined by lower and upper bounds in each dimension, forming rectangles or boxes in the value domain. Rectangular automata can be used to model not only simple timed systems but also asymptotically approximate hybrid systems with nonlinear behaviors [ 5]. Since hybrid automata often model safety-critical systems, their reachability analysis builds an active research area. The reachability problem is decidable only for initialized rectangular automata [], which can be reduced to timed automata [6]. The main merit of rectangular automata is that the reachable set under a flow is always a (convex) polyhedron. It means that the reachable set in a bounded number of jumps can be exactly computed as a set of polyhedra, unlike for general hybrid automata which need approximative methods such as [7 9]. In the past, some geometric methods are proposed for exactly or approximately computing the reachable sets in a bounded number of jumps (see, e.g., [4, ]). There are also tools like HyTech [0] and PHAVer[] which can compute bounded reachability for rectangular automata in a geometric way. However, nearly all of the proposed methods compute the exact reachable set under a flow based on the vertices of the initial set and the derivative rectangle. Since a d-dimensional rectangle has d many vertices, those methods are not able to handle high-dimensional cases. In [], an approximative method is proposed to over-approximate the reachable set by polyhedra which are represented by conjunctions of linear constraints. Since only d linear constraints are needed to

2 define a d-dimensional rectangle, the computation time of the method is polynomial in d. However, the accuracy degenerates dramatically when d increases. In this paper, we compute the reachable set as polyhedra which are represented by finite linear constraint sets [], where we need only d linear constraints to define a d-dimensional rectangle. We show that when the number of jumps is bounded by a constant, the computational complexity of our approach is polynomial in d. We also include the cases that some of the rectangles in the definition of a rectangular automaton are not full-dimensional. The paper is organized as follows. After introducing some basic definitions in Section, we describe our efficient approach for computing the bounded reachable set in Section. In Section 4, we compare our approach and PHAVer based on a scalable example. Missing proofs can be found in []. Preliminaries. Polyhedra and their computation For a point (or column vector) v R d in the d-dimensional Euclidean space R d we use v[i] to denote its ith component, i d, and v T for the row vector being its transpose. In the following we call linear inequalities c T x z for some c R d, z R and x a variable, also constraints. Given a finite set L of linear equalities and linear inequalities, we write S : L for S = {x R d x satisfies L L L}, and also write S : L instead of S : {L}. We say that L L is redundant in L if S : L = S : L\{L}. Redundant (in)equalities can be detected using linear programming [4]. A finite set {v,..., v d } R d of linearly independent vectors span an (d )- dimensional affine subspace Π of R d by the affine combinations of v,..., v d : Π = { i d λ i v i i n λ i =, λ i R} The affine hull aff(s) of a set S R d is the smallest affine subspace Π R d containing S, and we have that dim(s) = dim(aff(s)). We call a subset of a vector space full-dimensional if its affine hull is the whole space. A ((d )-dimensional) hyperplane in R d is a (d )-dimensional affine subspace of R d. Each hyperplane H can be defined as H : c T x = z for some c R d and z R. For d < d, a d -dimensional affine subspace H of R d is called a lower- or d -dimensional hyperplane and can be defined as an intersection of d d many hyperplanes (see []), i.e., as H : i d d ct i x = z i. Since every linear equation c T x = z can be expressed by c T x z c T x z, for d d, a d -dimensional hyperplane can be defined by a set of (d d ) constraints. A (d-dimensional) halfspace S in R d is a d-dimensional set S : c T x z for some c R d and z R. For d < d, a d -dimensional set S R d is a lower- or d -dimensional halfspace if it is the intersection of a (d-dimensional) halfspace S

3 and a d -dimensional hyperplane H S. Note that for d d, a d -dimensional halfspace can be defined by a set of (d d )+ constraints. Given a constraint c T x z, its corresponding equation is c T x = z. The corresponding hyperplane of a d -dimensional halfspace S with d d is the (d )-dimensional hyperplane defined by the set of the corresponding equations of the constraints that define S. For a finite set L of constraints we call P : L a polyhedron. Polyhedra can also be understood as the intersection of finitely many halfspaces. Polytopes are bounded polyhedra. A constraint c T x z is valid for a polyhedron P if all x P satisfy it. For c T x z valid for P and for H F : c T x = z, the set F : P H F is a face of P. If F then we call H F a support hyperplane of P, and the vectors λc for λ > 0 are the normal vectors of H F. The hyperplane H : c T x = z is a support hyperplane of a polyhedron P if and only if for the support function ρ P : R d R { }, ρ P (v) = sup v T x s.t. x P, we have that ρ P (c) = z. We call a face F of a polyhedron P facet if dim(f ) = dim(p ), and vertex if dim(f ) = 0. For d -dimensional faces we simply write d -faces. We use NF(P ) to denote the number of P s facets. Given a face F of P, the outer normals of F are the vectors v F R d such that ρ P (v F ) = sup vf T x for any x F. We also define N (F, P ) as the set of the outer normals of F in P. For a d -dimensional polyhedron P : L P, every facet F P of P can be determined by some L FP L P, that is L FP defines a d -dimensional halfspace which contains P and the corresponding hyperplane is the affine hull of F P (see []). Lemma. If a constraint set L defines a d -dimensional polyhedron P R d and there is no redundant constraint in L, then the set L contains NF(P )+(d d ) constraints. Proof. We need a set L of (d d ) constraints to define aff(p ). For every facet F P of P, we need a constraint L FP such that L {L FP } determines F P. For a polyhedron P : i n {ct i x z i} and a scalar λ 0, the scaled polyhedron λp can be computed by λp : i n {ct i x λz i}. The conical hull of P is the polyhedral cone cone(p ) = λ 0 λp. If the conical hull of P is d -dimensional, then P is at least (d )-dimensional (see []). Example. Figure (a) shows a polyhedron P : x x x x with three irredundant constraints. The support hyperplanes H, H, H intersect P at its facets. The fourth hyperplane H 4 is also a support hyperplane of P, but it only intersects P at a vertex, and the related constraint x is redundant. The conical hull of P is shown in Figure (b). Given two polyhedra P : L P and Q : L Q, their intersection P Q can be defined by the union of their constraints P Q : L P L Q. The Minkowski sum P Q of P and Q is defined by P Q = {p+q p P, q Q}. It is still a polyhedron, as illustrated in Figure. We have the following important theorem for the faces of P Q.

4 x H : x x = x P H : x = H 4 : x = H : x = P 0 (a) x 0 (b) Fig.. A -dimensional polytope and its conical hull x x P x Q = x P Q 0 x 0 x 0 x Fig.. An example of P Q Theorem ([5, 6]). For any polytopes P and Q, each face F of P Q can be decomposed by F = F P F Q for some faces F P and F Q of P and Q respectively. Moreover, this decomposition is unique.. Rectangular automata A box B R d is an axis-aligned rectangle which can be defined by a set of constraints of the form x a or x a where x is a variable, and a, a are rationals. A box B : L B is bounded if for every variable x there are constraints x a and x a in L B for some rationals a, a, otherwise B is unbounded. Let B d be the set of all boxes in R d. Rectangular automata [] are a special class of hybrid automata [7]. Definition. A d-dimensional rectangular automaton is a tuple A = (Loc, Var, Flow, Jump, Inv, Init, Guard, ResetVar, Reset) where Loc is a finite set of locations, also called discrete states. Var = {x,..., x d } is a set of d ordered real-valued variables. We denote the variables as a column vector x = (x,..., x d ) T. Flow : Loc B d assigns each location a flow condition which is a box in R d. Jump : Loc Loc is a set of jumps (or discrete transitions). Inv : Loc B d maps to each location an invariant which is a bounded box. Init:Loc B d maps to each location a bounded box as initial variable values. Guard : Jump B d assigns to each jump a guard which is a box. ResetVar : Jump Var assigns to each jump a set of reset variables.

5 x := 0 x := 0 l 0 ẋ [, ] ẋ [, ] x [ 5, 5] x [0, 0] e : x = 5 x := 0 e : x 5 x := [0, ] l ẋ [, ] ẋ [, ] x [ 5, 5] x [0, 5] Fig.. A rectangular hybrid automaton A F P F Q F F P F P Q P Fig. 4. A D example of R Reset : Jump B d maps to each jump a reset box such that for all e Jump and x i ResetVar(e) the box Reset(e) is bounded in dimension i. Example. Figure shows an example rectangular automaton. For brevity, we specify boxes by their defining intervals. The location set is Loc = {l 0, l }. The initial states are Init(l 0 ) = [0, 0] [0, 0] and Init(l ) =. The flows are defined by Flow(l 0 ) = [, ] [, ] and Flow(l ) = [, ] [, ], and the invariants by Inv(l 0 ) = [ 5, 5] [0, 0] and Inv(l ) = [ 5, 5] [0, 5]. There are two jumps Jump = {e, e } with e = (l 0, l ) and e = (l, l 0 ). The guards are Guard(e ) = [5, 5] (, + ) and Guard(e ) = (, + ) (, 5], the reset variable sets ResetVar(e ) = {x } and ResetVar(e ) = {x }, and the reset boxes Reset(e ) = [0, 0] (, + ) and Reset(e ) = (, + ) [0, ]. A configuration of A is a pair (l, u) such that l Loc is a location and u Inv(l) a vector assigning the value u[i] to x i for i =,..., d. There are two kinds of transitions between configurations: Flow: A transition (l, u) t (l, u ) where t 0, such that there exists b Flow(l) such that u = u+tb and for all 0 t t we have u+t b Inv(l). Jump: A transition (l, u) e (l, u ) such that e=(l, l ) Jump, u Guard(e), u Inv(l ) Reset(e), and u[i]=u [i] for all x i Var\ResetVar(e). An execution of A is a sequence (l 0, u 0 ) α0 (l, u ) α where αi is either a flow or a jump for all i. A configuration is reachable if it can be visited by some execution. The reachability computation is the task to compute the set of the reachable configurations. In this paper we consider bounded reachability with the number of jumps in the considered executions bounded by a positive integer. A New Approach for Reachability Computation In this section, we present a new approach to compute the reachable set for a rectangular automaton where the number of jumps is bounded.

6 . Facets of the reachable set under flow transitions For a location l of a rectangular automaton with Flow(l) = Q and Init(l) = P, the states reachable from P via the flow can be computed in a geometric way: R l (P ) = (P cone(q)) Inv(l). () As already mentioned, previously proposed methods compute R l (P ) by considering the evolutions of all vertices of P under the flow condition Q. That means, also all vertices of Q must be considered. Since Q is a bounded box, it has d vertices which make the computation intractable for large d. We present an approach to compute R l (P ) exactly based on three constraint sets which define P, Q and Inv(l) respectively. We show that if we are able to compute a constraint set that defines P Q in PTIME, then a constraint set which defines R l (P ) can also be computed in PTIME. We firstly investigate the faces of the set R = P cone(q) in the general case that P and Q are polytopes in R d. From the following two lemmata we derive that the number of R s facets is bounded by (n P +n P Q ) where n P is the number of the facets of P and n P Q is the number of the faces from dimension (dim(r) ) to (dim(r) ) in P Q. Lemma. Given a polytope Q R d and a positive integer d, a d -face F cone(q) of the polyhedron cone(q) can be expressed by cone(f Q ) where F Q is a nonempty face of Q and it is at least (d )-dimensional. Proof. The polyhedron cone(q) can be expressed by cone(v Q ) where V Q is the vertex set of Q. Then a nonempty face F cone(q) of cone(q) can be expressed by cone(v Q ) where V Q V Q is nonempty. Assume S is the halfspace whose corresponding hyperplane is H = aff(f cone(q) ). Since cone(q) S, we also have that Q S, moreover, we can infer that H is a support hyperplane of Q and F Q = H Q is a nonempty face of Q whose vertex set is V Q. Therefore, the face F cone(q) can be expressed by cone(f Q ). From the definition of conical hull, if F cone(q) is d -dimensional then F Q is at least (d )-dimensional. Lemma. Given two polytopes P, Q R d, any d -face F R of the polytope R = P cone(q) is either a d -face of P, or the decomposition F R = λ 0 (F P λf Q ) where F P, F Q are some nonempty faces of P, Q respectively and F P F Q is a face of P Q which is at least (d )-dimensional. Proof. We have two cases for a face F R of R, () F R is a face of P ; () F R can be expressed by F P cone(f Q ) where F Q is a nonempty face of Q (from Theorem and Lemma ). In the case (), we rewrite R and F R by R = P cone(q) = λ 0 (P λq) and F R = F P cone(f Q ) = λ 0(F P λf Q ) Since F R is a face of R, i.e., it is on the boundary of R, we infer that for all λ 0 the set F P λf Q is a face of P λq. Thus F P F Q is a face of P Q. Since F R is d -dimensional, the set F P F Q is at least (d )-dimensional.

7 Example. In Figure 4 on page 5, the set F is a facet of both P and R. In contrast, the facet F can be expressed by λ 0 (F P λf Q ). The facets of R can be found by enumerating all the facets of P, and all the faces from dimension (dim(r) ) to (dim(r) ) in P Q. Lemma 4. Let P : L P and P Q : L P Q be some polytopes with L P Q = {g j T x h j j m} irredundant. We define the constraint set L = i<j m L i,j such that for each i < j m, L i,j = {L i,j } if the intersection of H i : gi T x = h i, H j : gj T x = h j and P Q is nonempty, and L i,j is a constraint whose corresponding hyperplane H i,j satisfies () H i,j is a support hyperplane of P, () H i,j is a support hyperplane of P Q and () H i H j H i,j. Otherwise L i,j =. Suppose that L is the set of all constraints in L P and L P Q that are valid for R. Then the polytope R can be defined by L L. Note that L i,j is not unique for each i < j m, but we only need one of them. Intuitively, for any facet F R of R, if F R is also a facet of P then it can be determined by a subset L P of L P. Since the constraints in L P are also valid for R, we also have that L P L. Otherwise F R = λ 0 (F P λf Q ) for some nonempty faces F P, F Q of P, Q respectively. There are two cases, (a) if F P F Q is (dim(r) )-dimensional, then F R can be determined by a subset L P Q of L P Q, it is also included by L ; (b) if F P F Q is (dim(r) )-dimensional, the facet F R is determined by a subset of L. Hence, L L defines R.. Compute the reachable set under flow transitions In order to compute the constraint set that defines R, we need to find the hyperplanes H i,j stated in Lemma 4. We determine the H i,j : c T x = z by solving a feasibility problem for the normal vector c R d and the value z R as follows. Assume dim(r) = d R, P : L P and P Q is defined by the irredundant set L P Q = {g T j x h j j m}. Firstly, we check if the set H i H j (P Q) with H i : g T i x = h i and H j : g T j x = h j is nonempty by solving the following linear program: Find x I R d s.t. g T i x I = h i g T j x I = h j x I P Q. If such an x I is found, then the intersection is nonempty, and there must be a (d R )-face F P Q of P Q contained in it since L P Q is irredundant. We require that H i,j is a support hyperplane of P Q and contains F P Q. This can be ensured by finding c in the set C i,j = {αg i +βg j α, β 0, α+β > 0} and demanding c T x I = z. An example is shown in Figure 5. We also require that H i,j is a support hyperplane of P. This can be guaranteed by demanding ρ P (c) = z and c = αg i +βg j. In order to replace ρ P (αg i +βg j ) by αρ P (g i ) + βρ P (g j ), we need to ensure their equivalence. This can be done by finding at least one point p P such that gi T p = ρ P (g i ) and gj T p = ρ P (g j ). Since the (d R )-face F P Q is contained in H i H j, we have that gi T x = ρ P Q(g i )

8 g i H c H i,j H H H H i x I g j F R P Q H, H j Fig. 5. A -dimensional example of the vector c P Fig. 6. An example of H i,j and gj T x = ρ P Q(g j ) for all x F P Q. From Theorem, F P Q can be decomposed by F P F Q for some faces F P, F Q of P, Q respectively, and we can infer that for all x F P it holds that gi T x = ρ P (g i ) and gj T x = ρ P (g j ). Hence we can replace ρ P (αg i +βg j ) by αρ P (g i ) + βρ P (g j ). Then the vector c can be computed by solving the following problem: Find c R d s.t. { c = αgi +βg j α+β > 0 α 0 β 0 c T x I = αρ P (g i )+βρ P (g j ) () We set z = ρ P (c). An example of H i,j is given in Figure 6. We also need to find the valid constraints for R in L P and L P Q. Given a constraint L : c T x z, L is valid for R if and only if ρ R (c) z. Since ρ R (c) = ρ P (c)+λρ Q (c) = sup c T x+λ sup c T y s.t. x P, y Q, λ 0, we compute ρ P (c) and ρ Q (c) by linear programming. If ρ Q (c) 0 then ρ R (c) = ρ P (c), otherwise ρ R (c) =. If we have the constraints for P Q then Problem () is linear. Algorithm shows the computation of the irredundant constraints of R. Finally, the polytope L Rl (X) can be defined by the set L R L Inv(l) where L Inv(l) defines Inv(l).. Compute the reachable set after a jump A jump e = (l, l ) of a rectangular automaton can update a variable by a value in an interval [a, a]. If the set of the reachable states in l is computed as (l, R l (X)), then the set of states at which e is enabled can be computed by (l, R l (X) Guard(e)). Thus the reachable set after the jump e is (l, R e (R l (X))) where R e (R l (X)) ={u Inv(l ) Reset(e) u R l (X) Guard(e). x i Var\ResetVar(e).u [i] = u[i]} () The set R e (R l (X)) can also be computed in a geometric way. The guard can be considered by defining R l (X) Guard(e) : L Rl (X) L Guard(e). The polytope R e (R l (X)) can be defined by L e L Reset(e) where L e is the set of the constraints computed from L Rl (X) L Guard(e) by eliminating all reset variables by Fourier- Motzkin elimination [], and L Reset(e) defines the box Reset(e).

9 Algorithm Algorithm to compute R Input: P : L P, Q : L Q Output: An irredundant constraint set L R of R : Compute an irredundant constraint set L P Q of P Q; L R := ; : for all constraints c T x z in L P L P Q do : if c T x z is valid to R then 4: Add the constraint c T x z into L R; 5: end if 6: end for 7: for all constraints g T i x = h i and g T j x = h j in L P Q do 8: Find a hyperplane H i,j : c T x = z by solving Problem (); 9: if H i,j exists then 0: Add the constraint c T x z to L R; : end if : end for : Remove the redundant constraints from L R; 4: return L R x Guard(e) x x Reset(e) 4 P R l (X) 4 4 R e(r l (X)) 0 4 (a) The set P x x x (b) After eliminating x (c) The set R e(r l (X)) Fig. 7. A -dimensional example of resetting x to [, ] Example 4. We show an example in Figure 7, where R l (X) Guard(e) is given by the polytope P : x +x 0 x x 0 x x. The reset box is Reset(e) : x x, and Inv(l ) is the box [0, 5] [0, 5]. Firstly, we compute the maximum and minimum value of the variable x, and we obtain x and x. By using the constraint x, we eliminate the variable x from x +x 0 and obtain a new constraint x 4. Similarly, we use x to eliminate the variable x from x x 0 and get x 0.5. At last, the set R e (R l (X)) is the polytope R e (R l (X)) : x 4 x 0.5 x x Algorithm shows the computation of the reachable set after a jump. Although the Fourier-Motzkin elimination is double-exponential in general, in the next section we show that it is efficient on the reachable sets..4 Complexity of the reachability computation

10 Algorithm Algorithm to compute the constraints of R e (R l (X)) Input: The jump e = (l, l ), the constraints of R l (X) : L Output: The constraints of R e(r l (X)) : Compute the constraint set L P of P = R l (X) Guard(e); S L P ; : for all x i ResetVar(e) do : Eliminate x i from the constraints in S by Fourier-Motzkin elimination; 4: end for 5: return S L Reset(e) Algorithm Reachability computation for a rectangular automaton Input: A rectangular hybrid automaton A Output: The reachable set of A : R A {(l, Init(l)) l Loc}; : Define a queue Q with elements (l, X) R A; : while Q is not empty do 4: Get (l, X) from Q; Y R l (X); R A R A {(l, Y )}; 5: for all e = (l, l ) Jump do 6: Z R e(y ); 7: if (l, Z) / R A then 8: Insert (l, Z) into Q; R A R A {(l, Z)}; 9: end if 0: end for : end while : return R A The reachable set of a rectangular automaton A can be computed by Algorithm. Any reachable set R l (X) in Algorithm is computed by a sequence X 0 R l0 (X 0 ) X R l (X ) X k R lk (X k ) where X j = R ej (R lj (X j )) for j k, and X 0 = Init(l 0 ). Although the termination of Algorithm is not guaranteed, if we lay an upper bound k on k then it always stops. We prove that if k is viewed as a constant, then the computation is polynomial in the number of the variables of A. We prove it by showing that an irredundant constraint set of X j can be computed from an irredundant constraint set of X j in PTIME. Notice that this property is not possessed by any of the methods proposed in the past. Lemma 5. For j k, both NF(X j ) and NF(X j B j ) are polynomial in NF(X j ). Proof. By Lemma, the size of the irredundant constraint set of X j is proportional to NF(X j ), then we consider the facets of X j. We define G j = Inv(l j ) Guard(e j+ ) and B j = Flow(l j ). If the whole space is R d, in order to maximize the number of X j s facets, we assume B i, G i for 0 i j are full-dimensional

11 boxes, and X j is also full-dimensional. Since X j can be expressed by R ej (( R e ((X 0 λ 0 B 0 ) G 0 ) λ j B j ) G j ) a j λ j b j a 0 λ 0 b 0 a facet F Xj of it can be uniquely expressed by F (λ 0,..., λ j ) (4) a j λj b j a 0 λ0 b 0 where a i a i and b i b i for 0 i j, such that (i) F (λ 0,..., λ j ) is a face of the box Φ(λ 0,..., λ j ) = R ej (( R e ((X 0 λ 0 B 0 ) G 0 ) λ j B j ) G j ) and there is no higher dimensional face of Φ(λ 0,..., λ j ) can be used to express F Xj ; (ii) if the maximum dimension of all those faces F (λ 0,..., λ j ) is d where d d j, then there are exactly (d d ) many λ i where 0 i j such that these parameters help to determine N (F Xj, X j ); (iii) for any 0 i j, if λ i helps to determine N (F Xj, X j ), then the box G i could also help to determine N (F Xj, X j ); (iv) for any 0 i j, any γ i, γ i where { a i < γ i, γ i < b i, if a i < b i γ i = γ i = a i, otherwise we have that F (γ 0,..., γ j ), F (γ 0,..., γ j ) have the maximum dimension among all the faces F (λ 0,..., λ j ), and N (F (γ 0,..., γ j ), Φ(γ 0,..., γ j )) = N (F (γ 0,..., γ j ), Φ(γ 0,..., γ j )). In brief, the above properties tell that N (F Xj, X j ) depends on (a) the set N (F (γ 0,..., γ j ), Φ(γ 0,..., γ j )) in the property (iv), i.e., the outer normals of a bounded box face (we call those faces related), (b) the (d d ) parameters in the property (ii), and (c) the dependence of N (F Xj, X j ) and G i for every 0 i j such that λ i helps to determine N (F Xj, X j ). Thereby if F B is a d -face of a bounded box, it has at most ( d d j d d ) related facets in Xj. Given a dimension d where d d j, as we said, if a d -face F B of a bounded box B is related to some facet F Xj then there are exactly (d d ) many λ i s help to determine the outer normals of F Xj. Thus there are (d d ) steps to determine N (F Xj, X j ). We define P i as the set of the d -faces in B which possibly have related facets in X j after the ith step. Obviously, P 0 contains all the d -faces in B. In every (i + )th step, at least half of the faces in P i lose the possibility to have related facets in X j since X i is a union of boxes and every box is centrally symmetric. Hence, there are at most ( )) ( ) (d d ) Fd d = ) dd d ( (d d d d = d -faces of B could have related facets in X j, where Fd d is the number of the d - ( faces in B. Therefore, there are at most d d j d ) d d )( d facets in Xj which are d

12 related to some d -faces of B. By considering all max(d j, 0) d d, we can conclude that NF(X j ) is polynomial in NF(X j ) for j. Similarly, we can also prove that NF(X j B j ) is polynomial in NF(X j ) for j. Now we give our method to compute X j from X j. The most expensive part in the computation is computing X j B j. We decompose B j by B j = [a, a ] [a, a ] [a d, a d ] d, such that for i d, x[i] a i, x[i] a i are irredundant constraints for B j and [a i, a i ] i is a line segment (-dimensional box) defined by the following constraint set: {x[i] a i, x[i] a i } {x[i ] 0 i i} { x[i ] 0 i i} We denote the polytope resulting from adding the first m line segments onto X j by Xj m, then for all m d, NF(Xm j ) is polynomial in NF(X j ). Since an irredundant constraint set for Xj m can be computed in PTIME based on an irredundant constraint set of X m j, we conclude that an irredundant constraint set which defines X j B j can be computed in a time polynomial in d if j is viewed as a constant. Next we consider the complexity of the Fourier-Motzkin elimination on the set R lj (X j ). Since NF(X j+ ) is polynomial in NF(X j ), the polyhedron resulting from the elimination of each reset variable has a number of facets which is polynomial in NF(X j ). Since eliminating one variable is PTIME, we conclude that the Fourier-Motzkin elimination on R lj (X j ) is polynomial in d if j is viewed as a constant. If we use interior point methods [4] to solve linear programs then the bounded reachability computation is polynomial in d. Theorem. The computational complexity of R lj (X j ) is polynomial in d if j is viewed as a constant. Theorem. The computational complexity of the reachable set with a bounded number of jumps is polynomial in d if the bound is viewed as a constant. Unfortunately, the worst-case complexity is exponential in j. However, it only happens in extreme cases. The exact complexity of our approach mainly depends on the complexity of solving linear programs. 4 Experimental Results We implemented our method in MATLAB using the CDD tool [8] for linear programming. We compared our implementation with PHAVer (embedded in SpaceEx [9]) on a scalable artificial example. Since there are rare high dimensional examples published, we design a scalable example which is given in Figure 8, where d is the (user-defined) dimension of the automaton and i denotes all the integers from to d. The automaton A d helps to generate reachable sets with large numbers of vertices and facets, and for each jump, nearly half of the variables are reset.

13 x d 5d x i [0, ] l 0 ẋ i [i, i ] x j := [, ] where d/ + j d l ẋ i [ i, i + ] x i [ 0d, 0d] x i [ 0d, 0d] x d 8d x j := [0, ] where j d/ Fig. 8. Rectangular automaton A d Dimension MaxJmp PHAVer Our method Memory Time Memory Time ToLP LPs Constraints < < < n.a. t.o. < n.a. t.o. < n.a. t.o. < < < < n.a. t.o. < n.a. t.o. < n.a. t.o. < Table. Experimental results. Time is in seconds, memory in MBs. MaxJmp is the bound on the number of jumps, ToLP is the total linear programming time, LPs is the number of linear programs solved (including the detection of redundant constraints), Constraints is the number of irredundant constraints computed, n.a. means not available, t.o. means that the running time was greater than one hour. The experiments were run on a computer with a.8 GHz CPU and 4GB memory, the operating system is Linux. The experimental results are given by Table. Since MATLAB does not provide a build-in function to monitor the memory usage of its programs on Linux, the listed memory usage is the total memory usage minus MATLAB memory usage before the experiment. Our method can handle A 0 efficiently, however PHAVer stops at A 7. Our implementation is a prototype and the running times can even be improved by a C++ implementation and a faster LP solver. 5 Conclusion We introduced our efficient approach for the bounded reachability computation of rectangular automata. However, the method of computing the reachable set under a flow transition can also be applied to linear hybrid automata. With some

14 more effort this approach can also be adapted for the approximative analysis of hybrid systems with nonlinear behavior. References. T. A. Henzinger, P. W. Kopke, A. Puri, and P. Varaiya. What s decidable about hybrid automata? J. Comput. Syst. Sci., 57():94 4, T.A. Henzinger, P. Ho, and H. Wong-Toi. Algorithmic analysis of nonlinear hybrid systems. Automatic Control, IEEE Transactions on, 4(4): , apr J. Preußig, S. Kowalewski, H. Wong-Toi, and T. A. Henzinger. An algorithm for the approximative analysis of rectangular automata. In Proc. of FTRTFT 98, volume 486 of LNCS, pages Springer, H. Wong-Toi and J. Preußig. A procedure for reachability analysis of rectangular automata. In Proc. of American Control Conference, volume, pages vol., L. Doyen, T. A. Henzinger, and J. Raskin. Automatic rectangular refinement of affine hybrid systems. In Proc. of FORMATS 05, volume 89 of LNCS, pages Springer, R. Alur and D. L. Dill. A theory of timed automata. Theor. Comput. Sci., 6():8 5, A. Chutinan and B. H. Krogh. Computing polyhedral approximations to flow pipes for dynamic systems. In Proc. of CDC 98. IEEE Press, O. Stursberg and B. H. Krogh. Efficient representation and computation of reachable sets for hybrid systems. In Proc. of HSCC 0, volume 6 of LNCS, pages Springer, A. Girard. Reachability of uncertain linear systems using zonotopes. In Proc. of HSCC 05, volume 44 of LNCS, pages Springer, T. A. Henzinger, P.-H. Ho, and H. Wong-Toi. Hytech: A model checker for hybrid systems. Software Tools for Technology Transfer, ():0, G. Frehse. Phaver: Algorithmic verification of hybrid systems past hytech. In Proc. of HSCC 05, volume 44 of LNCS, pages Springer, G. M. Ziegler. Lectures on Polytopes, volume 5 of Graduate Texts in Mathematics. Springer, X. Chen, E. Abraham, and G. Frehse. Efficient bounded reachability computation for rectangular automata. Technical report, RWTH Aachen University, 0. http: //www-i.informatik.rwth-aachen.de/i/hybrid_research_pub0/. 4. S. Boyd and L. Vandenberghe. Convex Optimization. Cambridge University Press, K. Fukuda. From the zonotope construction to the minkowski addition of convex polytopes. J. Symb. Comput., 8(4):6 7, C. Weibel and K. Fukuda. Computing faces up to k dimensions of a minkowski sum of polytopes. In Proc. of CCCG 05, pages 56 59, T. A. Henzinger. The theory of hybrid automata. In Proc. of LICS 96, pages 78 9, K. Fukuda. cdd, cddplus and cddlib homepage. ~fukuda/cdd_home/. 9. G. Frehse, C. Le Guernic, A. Donzé, R. Ray, O. Lebeltel, R. Ripado, A. Girard, T. Dang, and O. Maler. Spaceex: Scalable verification of hybrid systems. In Proc. of CAV, LNCS. Springer, 0.

Modeling and Analysis of Hybrid Systems

Modeling and Analysis of Hybrid Systems Modeling and Analysis of Hybrid Systems Convex polyhedra Prof. Dr. Erika Ábrahám Informatik 2 - LuFG Theory of Hybrid Systems RWTH Aachen University Szeged, Hungary, 27 September - 06 October 2017 Ábrahám

More information

Modeling and Analysis of Hybrid Systems

Modeling and Analysis of Hybrid Systems Modeling and Analysis of Hybrid Systems 6. Convex polyhedra Prof. Dr. Erika Ábrahám Informatik 2 - LuFG Theory of Hybrid Systems RWTH Aachen University Szeged, Hungary, 27 September - 06 October 2017 Ábrahám

More information

Automatic synthesis of switching controllers for linear hybrid systems: Reachability control

Automatic synthesis of switching controllers for linear hybrid systems: Reachability control Automatic synthesis of switching controllers for linear hybrid systems: Reachability control Massimo Benerecetti and Marco Faella Università di Napoli Federico II, Italy Abstract. We consider the problem

More information

Convex Geometry arising in Optimization

Convex Geometry arising in Optimization Convex Geometry arising in Optimization Jesús A. De Loera University of California, Davis Berlin Mathematical School Summer 2015 WHAT IS THIS COURSE ABOUT? Combinatorial Convexity and Optimization PLAN

More information

Reachability of Hybrid Systems using Support Functions over Continuous Time

Reachability of Hybrid Systems using Support Functions over Continuous Time Reachability of Hybrid Systems using Support Functions over Continuous Time Goran Frehse, Alexandre Donzé, Scott Cotton, Rajarshi Ray, Olivier Lebeltel, Rajat Kateja, Manish Goyal, Rodolfo Ripado, Thao

More information

Combinatorial Geometry & Topology arising in Game Theory and Optimization

Combinatorial Geometry & Topology arising in Game Theory and Optimization Combinatorial Geometry & Topology arising in Game Theory and Optimization Jesús A. De Loera University of California, Davis LAST EPISODE... We discuss the content of the course... Convex Sets A set is

More information

FACES OF CONVEX SETS

FACES OF CONVEX SETS FACES OF CONVEX SETS VERA ROSHCHINA Abstract. We remind the basic definitions of faces of convex sets and their basic properties. For more details see the classic references [1, 2] and [4] for polytopes.

More information

Lecture 2 - Introduction to Polytopes

Lecture 2 - Introduction to Polytopes Lecture 2 - Introduction to Polytopes Optimization and Approximation - ENS M1 Nicolas Bousquet 1 Reminder of Linear Algebra definitions Let x 1,..., x m be points in R n and λ 1,..., λ m be real numbers.

More information

Linear Programming in Small Dimensions

Linear Programming in Small Dimensions Linear Programming in Small Dimensions Lekcija 7 sergio.cabello@fmf.uni-lj.si FMF Univerza v Ljubljani Edited from slides by Antoine Vigneron Outline linear programming, motivation and definition one dimensional

More information

DM545 Linear and Integer Programming. Lecture 2. The Simplex Method. Marco Chiarandini

DM545 Linear and Integer Programming. Lecture 2. The Simplex Method. Marco Chiarandini DM545 Linear and Integer Programming Lecture 2 The Marco Chiarandini Department of Mathematics & Computer Science University of Southern Denmark Outline 1. 2. 3. 4. Standard Form Basic Feasible Solutions

More information

Applied Integer Programming

Applied Integer Programming Applied Integer Programming D.S. Chen; R.G. Batson; Y. Dang Fahimeh 8.2 8.7 April 21, 2015 Context 8.2. Convex sets 8.3. Describing a bounded polyhedron 8.4. Describing unbounded polyhedron 8.5. Faces,

More information

MA4254: Discrete Optimization. Defeng Sun. Department of Mathematics National University of Singapore Office: S Telephone:

MA4254: Discrete Optimization. Defeng Sun. Department of Mathematics National University of Singapore Office: S Telephone: MA4254: Discrete Optimization Defeng Sun Department of Mathematics National University of Singapore Office: S14-04-25 Telephone: 6516 3343 Aims/Objectives: Discrete optimization deals with problems of

More information

Advanced Operations Research Techniques IE316. Quiz 1 Review. Dr. Ted Ralphs

Advanced Operations Research Techniques IE316. Quiz 1 Review. Dr. Ted Ralphs Advanced Operations Research Techniques IE316 Quiz 1 Review Dr. Ted Ralphs IE316 Quiz 1 Review 1 Reading for The Quiz Material covered in detail in lecture. 1.1, 1.4, 2.1-2.6, 3.1-3.3, 3.5 Background material

More information

CS 372: Computational Geometry Lecture 10 Linear Programming in Fixed Dimension

CS 372: Computational Geometry Lecture 10 Linear Programming in Fixed Dimension CS 372: Computational Geometry Lecture 10 Linear Programming in Fixed Dimension Antoine Vigneron King Abdullah University of Science and Technology November 7, 2012 Antoine Vigneron (KAUST) CS 372 Lecture

More information

POLYHEDRAL GEOMETRY. Convex functions and sets. Mathematical Programming Niels Lauritzen Recall that a subset C R n is convex if

POLYHEDRAL GEOMETRY. Convex functions and sets. Mathematical Programming Niels Lauritzen Recall that a subset C R n is convex if POLYHEDRAL GEOMETRY Mathematical Programming Niels Lauritzen 7.9.2007 Convex functions and sets Recall that a subset C R n is convex if {λx + (1 λ)y 0 λ 1} C for every x, y C and 0 λ 1. A function f :

More information

Zonotope/Hyperplane Intersection for Hybrid Systems Reachability Analysis

Zonotope/Hyperplane Intersection for Hybrid Systems Reachability Analysis Zonotope/Hyperplane Intersection for Hybrid Systems Reachability Analysis Antoine Girard 1 and Colas Le Guernic 2 1 Laboratoire Jean Kuntzmann, Université Joseph Fourier Antoine.Girard@imag.fr, 2 VERIMAG,

More information

Integer Programming Theory

Integer Programming Theory Integer Programming Theory Laura Galli October 24, 2016 In the following we assume all functions are linear, hence we often drop the term linear. In discrete optimization, we seek to find a solution x

More information

Lecture 6: Faces, Facets

Lecture 6: Faces, Facets IE 511: Integer Programming, Spring 2019 31 Jan, 2019 Lecturer: Karthik Chandrasekaran Lecture 6: Faces, Facets Scribe: Setareh Taki Disclaimer: These notes have not been subjected to the usual scrutiny

More information

arxiv: v1 [cs.cc] 30 Jun 2017

arxiv: v1 [cs.cc] 30 Jun 2017 On the Complexity of Polytopes in LI( Komei Fuuda May Szedlá July, 018 arxiv:170610114v1 [cscc] 30 Jun 017 Abstract In this paper we consider polytopes given by systems of n inequalities in d variables,

More information

Lecture 3: Convex sets

Lecture 3: Convex sets Lecture 3: Convex sets Rajat Mittal IIT Kanpur We denote the set of real numbers as R. Most of the time we will be working with space R n and its elements will be called vectors. Remember that a subspace

More information

Convexity: an introduction

Convexity: an introduction Convexity: an introduction Geir Dahl CMA, Dept. of Mathematics and Dept. of Informatics University of Oslo 1 / 74 1. Introduction 1. Introduction what is convexity where does it arise main concepts and

More information

maximize c, x subject to Ax b,

maximize c, x subject to Ax b, Lecture 8 Linear programming is about problems of the form maximize c, x subject to Ax b, where A R m n, x R n, c R n, and b R m, and the inequality sign means inequality in each row. The feasible set

More information

Math 414 Lecture 2 Everyone have a laptop?

Math 414 Lecture 2 Everyone have a laptop? Math 44 Lecture 2 Everyone have a laptop? THEOREM. Let v,...,v k be k vectors in an n-dimensional space and A = [v ;...; v k ] v,..., v k independent v,..., v k span the space v,..., v k a basis v,...,

More information

On the Hardness of Computing Intersection, Union and Minkowski Sum of Polytopes

On the Hardness of Computing Intersection, Union and Minkowski Sum of Polytopes On the Hardness of Computing Intersection, Union and Minkowski Sum of Polytopes Hans Raj Tiwary hansraj@cs.uni-sb.de FR Informatik Universität des Saarlandes D-66123 Saarbrücken, Germany Tel: +49 681 3023235

More information

ORIE 6300 Mathematical Programming I September 2, Lecture 3

ORIE 6300 Mathematical Programming I September 2, Lecture 3 ORIE 6300 Mathematical Programming I September 2, 2014 Lecturer: David P. Williamson Lecture 3 Scribe: Divya Singhvi Last time we discussed how to take dual of an LP in two different ways. Today we will

More information

Polyhedral Computation Today s Topic: The Double Description Algorithm. Komei Fukuda Swiss Federal Institute of Technology Zurich October 29, 2010

Polyhedral Computation Today s Topic: The Double Description Algorithm. Komei Fukuda Swiss Federal Institute of Technology Zurich October 29, 2010 Polyhedral Computation Today s Topic: The Double Description Algorithm Komei Fukuda Swiss Federal Institute of Technology Zurich October 29, 2010 1 Convexity Review: Farkas-Type Alternative Theorems Gale

More information

Polytopes Course Notes

Polytopes Course Notes Polytopes Course Notes Carl W. Lee Department of Mathematics University of Kentucky Lexington, KY 40506 lee@ms.uky.edu Fall 2013 i Contents 1 Polytopes 1 1.1 Convex Combinations and V-Polytopes.....................

More information

MATH 890 HOMEWORK 2 DAVID MEREDITH

MATH 890 HOMEWORK 2 DAVID MEREDITH MATH 890 HOMEWORK 2 DAVID MEREDITH (1) Suppose P and Q are polyhedra. Then P Q is a polyhedron. Moreover if P and Q are polytopes then P Q is a polytope. The facets of P Q are either F Q where F is a facet

More information

arxiv: v1 [math.co] 15 Dec 2009

arxiv: v1 [math.co] 15 Dec 2009 ANOTHER PROOF OF THE FACT THAT POLYHEDRAL CONES ARE FINITELY GENERATED arxiv:092.2927v [math.co] 5 Dec 2009 VOLKER KAIBEL Abstract. In this note, we work out a simple inductive proof showing that every

More information

Techniques and Tools for Hybrid Systems Reachability Analysis

Techniques and Tools for Hybrid Systems Reachability Analysis which is funded by the German Research Council (DFG). Techniques and Tools for Hybrid Systems Reachability Analysis Stefan Schupp Johanna Nellen Erika Ábrahám RiSE4CPS, Heidelberg, Germany April 23, 2017

More information

Lecture 9: Reachability

Lecture 9: Reachability Lecture 9: Reachability Outline of Lecture Reachability General Transition Systems Algorithms for Reachability Safety through Reachability Backward Reachability Algorithm Given hybrid automaton H : set

More information

Lecture 3. Corner Polyhedron, Intersection Cuts, Maximal Lattice-Free Convex Sets. Tepper School of Business Carnegie Mellon University, Pittsburgh

Lecture 3. Corner Polyhedron, Intersection Cuts, Maximal Lattice-Free Convex Sets. Tepper School of Business Carnegie Mellon University, Pittsburgh Lecture 3 Corner Polyhedron, Intersection Cuts, Maximal Lattice-Free Convex Sets Gérard Cornuéjols Tepper School of Business Carnegie Mellon University, Pittsburgh January 2016 Mixed Integer Linear Programming

More information

Chapter 4 Concepts from Geometry

Chapter 4 Concepts from Geometry Chapter 4 Concepts from Geometry An Introduction to Optimization Spring, 2014 Wei-Ta Chu 1 Line Segments The line segment between two points and in R n is the set of points on the straight line joining

More information

Conic Duality. yyye

Conic Duality.  yyye Conic Linear Optimization and Appl. MS&E314 Lecture Note #02 1 Conic Duality Yinyu Ye Department of Management Science and Engineering Stanford University Stanford, CA 94305, U.S.A. http://www.stanford.edu/

More information

Verification of Uncertain Embedded Systems by Computing Reachable Sets based on Zonotopes

Verification of Uncertain Embedded Systems by Computing Reachable Sets based on Zonotopes Proceedings of the 7th World Congress The International Federation of Automatic Control Verification of Uncertain Embedded Systems by Computing Reachable Sets based on Zonotopes Matthias Althoff Olaf Stursberg

More information

Linear programming and duality theory

Linear programming and duality theory Linear programming and duality theory Complements of Operations Research Giovanni Righini Linear Programming (LP) A linear program is defined by linear constraints, a linear objective function. Its variables

More information

Lecture 4: Rational IPs, Polyhedron, Decomposition Theorem

Lecture 4: Rational IPs, Polyhedron, Decomposition Theorem IE 5: Integer Programming, Spring 29 24 Jan, 29 Lecture 4: Rational IPs, Polyhedron, Decomposition Theorem Lecturer: Karthik Chandrasekaran Scribe: Setareh Taki Disclaimer: These notes have not been subjected

More information

Model Checking for Hybrid Systems

Model Checking for Hybrid Systems Model Checking for Hybrid Systems Bruce H. Krogh Carnegie Mellon University Hybrid Dynamic Systems Models Dynamic systems with both continuous & discrete state variables Continuous-State Systems differential

More information

What is a cone? Anastasia Chavez. Field of Dreams Conference President s Postdoctoral Fellow NSF Postdoctoral Fellow UC Davis

What is a cone? Anastasia Chavez. Field of Dreams Conference President s Postdoctoral Fellow NSF Postdoctoral Fellow UC Davis What is a cone? Anastasia Chavez President s Postdoctoral Fellow NSF Postdoctoral Fellow UC Davis Field of Dreams Conference 2018 Roadmap for today 1 Cones 2 Vertex/Ray Description 3 Hyperplane Description

More information

Math 5593 Linear Programming Lecture Notes

Math 5593 Linear Programming Lecture Notes Math 5593 Linear Programming Lecture Notes Unit II: Theory & Foundations (Convex Analysis) University of Colorado Denver, Fall 2013 Topics 1 Convex Sets 1 1.1 Basic Properties (Luenberger-Ye Appendix B.1).........................

More information

AVERIST: An Algorithmic Verifier for Stability

AVERIST: An Algorithmic Verifier for Stability Available online at www.sciencedirect.com Electronic Notes in Theoretical Computer Science 317 (2015) 133 139 www.elsevier.com/locate/entcs AVERIST: An Algorithmic Verifier for Stability Pavithra Prabhakar

More information

Using Facets of a MILP Model for solving a Job Shop Scheduling Problem

Using Facets of a MILP Model for solving a Job Shop Scheduling Problem Using Facets of a MILP Model for solving a Job Shop Scheduling Problem Master s Thesis in Complex Adaptive Systems VIKTOR FORSMAN Department of Mathematical Sciences Gothenburg University Gothenburg, Sweden

More information

Convex Hull Representation Conversion (cddlib, lrslib)

Convex Hull Representation Conversion (cddlib, lrslib) Convex Hull Representation Conversion (cddlib, lrslib) Student Seminar in Combinatorics: Mathematical Software Niklas Pfister October 31, 2014 1 Introduction In this report we try to give a short overview

More information

COMP331/557. Chapter 2: The Geometry of Linear Programming. (Bertsimas & Tsitsiklis, Chapter 2)

COMP331/557. Chapter 2: The Geometry of Linear Programming. (Bertsimas & Tsitsiklis, Chapter 2) COMP331/557 Chapter 2: The Geometry of Linear Programming (Bertsimas & Tsitsiklis, Chapter 2) 49 Polyhedra and Polytopes Definition 2.1. Let A 2 R m n and b 2 R m. a set {x 2 R n A x b} is called polyhedron

More information

Efficient Representation and Computation of Reachable Sets for Hybrid Systems

Efficient Representation and Computation of Reachable Sets for Hybrid Systems Efficient Representation and Computation of Reachable Sets for Hybrid Systems Olaf Stursberg 1 and Bruce H. Krogh 2 1 University of Dortmund Germany olaf.stursberg@uni-dortmund.de 2 Dept. of Electrical

More information

However, this is not always true! For example, this fails if both A and B are closed and unbounded (find an example).

However, this is not always true! For example, this fails if both A and B are closed and unbounded (find an example). 98 CHAPTER 3. PROPERTIES OF CONVEX SETS: A GLIMPSE 3.2 Separation Theorems It seems intuitively rather obvious that if A and B are two nonempty disjoint convex sets in A 2, then there is a line, H, separating

More information

3. The Simplex algorithmn The Simplex algorithmn 3.1 Forms of linear programs

3. The Simplex algorithmn The Simplex algorithmn 3.1 Forms of linear programs 11 3.1 Forms of linear programs... 12 3.2 Basic feasible solutions... 13 3.3 The geometry of linear programs... 14 3.4 Local search among basic feasible solutions... 15 3.5 Organization in tableaus...

More information

Mathematical Programming and Research Methods (Part II)

Mathematical Programming and Research Methods (Part II) Mathematical Programming and Research Methods (Part II) 4. Convexity and Optimization Massimiliano Pontil (based on previous lecture by Andreas Argyriou) 1 Today s Plan Convex sets and functions Types

More information

On Unbounded Tolerable Solution Sets

On Unbounded Tolerable Solution Sets Reliable Computing (2005) 11: 425 432 DOI: 10.1007/s11155-005-0049-9 c Springer 2005 On Unbounded Tolerable Solution Sets IRENE A. SHARAYA Institute of Computational Technologies, 6, Acad. Lavrentiev av.,

More information

2. Convex sets. x 1. x 2. affine set: contains the line through any two distinct points in the set

2. Convex sets. x 1. x 2. affine set: contains the line through any two distinct points in the set 2. Convex sets Convex Optimization Boyd & Vandenberghe affine and convex sets some important examples operations that preserve convexity generalized inequalities separating and supporting hyperplanes dual

More information

Polar Duality and Farkas Lemma

Polar Duality and Farkas Lemma Lecture 3 Polar Duality and Farkas Lemma October 8th, 2004 Lecturer: Kamal Jain Notes: Daniel Lowd 3.1 Polytope = bounded polyhedron Last lecture, we were attempting to prove the Minkowsky-Weyl Theorem:

More information

Language Overview for PHAVer version 0.35

Language Overview for PHAVer version 0.35 Language Overview for PHAVer version 0.35 Goran Frehse June 22, 2006 We have tried to construct a textual input language that is as user friendly as possible, while keeping the parser simple. In the syntax,

More information

Lecture 5: Properties of convex sets

Lecture 5: Properties of convex sets Lecture 5: Properties of convex sets Rajat Mittal IIT Kanpur This week we will see properties of convex sets. These properties make convex sets special and are the reason why convex optimization problems

More information

Lecture notes on the simplex method September We will present an algorithm to solve linear programs of the form. maximize.

Lecture notes on the simplex method September We will present an algorithm to solve linear programs of the form. maximize. Cornell University, Fall 2017 CS 6820: Algorithms Lecture notes on the simplex method September 2017 1 The Simplex Method We will present an algorithm to solve linear programs of the form maximize subject

More information

CS671 Parallel Programming in the Many-Core Era

CS671 Parallel Programming in the Many-Core Era 1 CS671 Parallel Programming in the Many-Core Era Polyhedral Framework for Compilation: Polyhedral Model Representation, Data Dependence Analysis, Scheduling and Data Locality Optimizations December 3,

More information

Lecture 15: The subspace topology, Closed sets

Lecture 15: The subspace topology, Closed sets Lecture 15: The subspace topology, Closed sets 1 The Subspace Topology Definition 1.1. Let (X, T) be a topological space with topology T. subset of X, the collection If Y is a T Y = {Y U U T} is a topology

More information

Discrete Optimization. Lecture Notes 2

Discrete Optimization. Lecture Notes 2 Discrete Optimization. Lecture Notes 2 Disjunctive Constraints Defining variables and formulating linear constraints can be straightforward or more sophisticated, depending on the problem structure. The

More information

Lecture 2. Topology of Sets in R n. August 27, 2008

Lecture 2. Topology of Sets in R n. August 27, 2008 Lecture 2 Topology of Sets in R n August 27, 2008 Outline Vectors, Matrices, Norms, Convergence Open and Closed Sets Special Sets: Subspace, Affine Set, Cone, Convex Set Special Convex Sets: Hyperplane,

More information

This lecture: Convex optimization Convex sets Convex functions Convex optimization problems Why convex optimization? Why so early in the course?

This lecture: Convex optimization Convex sets Convex functions Convex optimization problems Why convex optimization? Why so early in the course? Lec4 Page 1 Lec4p1, ORF363/COS323 This lecture: Convex optimization Convex sets Convex functions Convex optimization problems Why convex optimization? Why so early in the course? Instructor: Amir Ali Ahmadi

More information

Mathematical and Algorithmic Foundations Linear Programming and Matchings

Mathematical and Algorithmic Foundations Linear Programming and Matchings Adavnced Algorithms Lectures Mathematical and Algorithmic Foundations Linear Programming and Matchings Paul G. Spirakis Department of Computer Science University of Patras and Liverpool Paul G. Spirakis

More information

Interval-Vector Polytopes

Interval-Vector Polytopes Interval-Vector Polytopes Jessica De Silva Gabriel Dorfsman-Hopkins California State University, Stanislaus Dartmouth College Joseph Pruitt California State University, Long Beach July 28, 2012 Abstract

More information

Efficient Symbolic Representation of Convex Polyhedra in High-Dimensional Spaces

Efficient Symbolic Representation of Convex Polyhedra in High-Dimensional Spaces Efficient Symbolic Representation of Convex Polyhedra in High-Dimensional Spaces Bernard Boigelot and Isabelle Mainz Institut Montefiore, B28, Université de Liège, B-4000 Liège, Belgium {Bernard.Boigelot,

More information

3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times 3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

More information

/ Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang

/ Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang 600.469 / 600.669 Approximation Algorithms Lecturer: Michael Dinitz Topic: Linear Programming Date: 2/24/15 Scribe: Runze Tang 9.1 Linear Programming Suppose we are trying to approximate a minimization

More information

Computing Reachable Sets : An Introduction

Computing Reachable Sets : An Introduction 1 Computing Reachable Sets : An Introduction Oded Maler Abstract This paper provides a tutorial introduction to reachability computation, a new class of computational techniques developed in order to export

More information

In this chapter we introduce some of the basic concepts that will be useful for the study of integer programming problems.

In this chapter we introduce some of the basic concepts that will be useful for the study of integer programming problems. 2 Basics In this chapter we introduce some of the basic concepts that will be useful for the study of integer programming problems. 2.1 Notation Let A R m n be a matrix with row index set M = {1,...,m}

More information

Polyhedral Computation and their Applications. Jesús A. De Loera Univ. of California, Davis

Polyhedral Computation and their Applications. Jesús A. De Loera Univ. of California, Davis Polyhedral Computation and their Applications Jesús A. De Loera Univ. of California, Davis 1 1 Introduction It is indeniable that convex polyhedral geometry is an important tool of modern mathematics.

More information

Convex Optimization M2

Convex Optimization M2 Convex Optimization M2 Lecture 1 A. d Aspremont. Convex Optimization M2. 1/49 Today Convex optimization: introduction Course organization and other gory details... Convex sets, basic definitions. A. d

More information

Verification of Infinite-State Dynamic Systems Using Approximate Quotient Transition Systems

Verification of Infinite-State Dynamic Systems Using Approximate Quotient Transition Systems IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL 46, NO 9, SEPTEMBER 2001 1401 Verification of Infinite-State Dynamic Systems Using Approximate Quotient Transition Systems Alongkrit Chutinan and Bruce H Krogh,

More information

Simplex Algorithm in 1 Slide

Simplex Algorithm in 1 Slide Administrivia 1 Canonical form: Simplex Algorithm in 1 Slide If we do pivot in A r,s >0, where c s

More information

Chapter 15 Introduction to Linear Programming

Chapter 15 Introduction to Linear Programming Chapter 15 Introduction to Linear Programming An Introduction to Optimization Spring, 2015 Wei-Ta Chu 1 Brief History of Linear Programming The goal of linear programming is to determine the values of

More information

arxiv: v1 [math.co] 12 Dec 2017

arxiv: v1 [math.co] 12 Dec 2017 arxiv:1712.04381v1 [math.co] 12 Dec 2017 Semi-reflexive polytopes Tiago Royer Abstract The Ehrhart function L P(t) of a polytope P is usually defined only for integer dilation arguments t. By allowing

More information

Equality Set Projection: A new algorithm for the projection of polytopes in halfspace representation Colin N. Jones, Eric C. Kerrigan and Jan M.

Equality Set Projection: A new algorithm for the projection of polytopes in halfspace representation Colin N. Jones, Eric C. Kerrigan and Jan M. Equality Set Projection: A new algorithm for the projection of polytopes in halfspace representation Colin N. Jones, Eric C. Kerrigan and Jan M. Maciejowski CUED/F-INFENG/TR.463 June 8, 2004 Equality Set

More information

LP Geometry: outline. A general LP. minimize x c T x s.t. a T i. x b i, i 2 M 1 a T i x = b i, i 2 M 3 x j 0, j 2 N 1. where

LP Geometry: outline. A general LP. minimize x c T x s.t. a T i. x b i, i 2 M 1 a T i x = b i, i 2 M 3 x j 0, j 2 N 1. where LP Geometry: outline I Polyhedra I Extreme points, vertices, basic feasible solutions I Degeneracy I Existence of extreme points I Optimality of extreme points IOE 610: LP II, Fall 2013 Geometry of Linear

More information

Lecture 5: Duality Theory

Lecture 5: Duality Theory Lecture 5: Duality Theory Rajat Mittal IIT Kanpur The objective of this lecture note will be to learn duality theory of linear programming. We are planning to answer following questions. What are hyperplane

More information

Reducing Clocks in Timed Automata while Preserving Bisimulation

Reducing Clocks in Timed Automata while Preserving Bisimulation Reducing Clocks in Timed Automata while Preserving Bisimulation Shibashis Guha Chinmay Narayan S. Arun-Kumar Indian Institute of Technology Delhi {shibashis, chinmay, sak}@cse.iitd.ac.in arxiv:1404.6613v2

More information

Algebraic Geometry of Segmentation and Tracking

Algebraic Geometry of Segmentation and Tracking Ma191b Winter 2017 Geometry of Neuroscience Geometry of lines in 3-space and Segmentation and Tracking This lecture is based on the papers: Reference: Marco Pellegrini, Ray shooting and lines in space.

More information

Convex Sets. Pontus Giselsson

Convex Sets. Pontus Giselsson Convex Sets Pontus Giselsson 1 Today s lecture convex sets convex, affine, conical hulls closure, interior, relative interior, boundary, relative boundary separating and supporting hyperplane theorems

More information

Division of the Humanities and Social Sciences. Convex Analysis and Economic Theory Winter Separation theorems

Division of the Humanities and Social Sciences. Convex Analysis and Economic Theory Winter Separation theorems Division of the Humanities and Social Sciences Ec 181 KC Border Convex Analysis and Economic Theory Winter 2018 Topic 8: Separation theorems 8.1 Hyperplanes and half spaces Recall that a hyperplane in

More information

Lecture 4: Linear Programming

Lecture 4: Linear Programming COMP36111: Advanced Algorithms I Lecture 4: Linear Programming Ian Pratt-Hartmann Room KB2.38: email: ipratt@cs.man.ac.uk 2017 18 Outline The Linear Programming Problem Geometrical analysis The Simplex

More information

Convex Optimization - Chapter 1-2. Xiangru Lian August 28, 2015

Convex Optimization - Chapter 1-2. Xiangru Lian August 28, 2015 Convex Optimization - Chapter 1-2 Xiangru Lian August 28, 2015 1 Mathematical optimization minimize f 0 (x) s.t. f j (x) 0, j=1,,m, (1) x S x. (x 1,,x n ). optimization variable. f 0. R n R. objective

More information

Introduction to Modern Control Systems

Introduction to Modern Control Systems Introduction to Modern Control Systems Convex Optimization, Duality and Linear Matrix Inequalities Kostas Margellos University of Oxford AIMS CDT 2016-17 Introduction to Modern Control Systems November

More information

2. Convex sets. affine and convex sets. some important examples. operations that preserve convexity. generalized inequalities

2. Convex sets. affine and convex sets. some important examples. operations that preserve convexity. generalized inequalities 2. Convex sets Convex Optimization Boyd & Vandenberghe affine and convex sets some important examples operations that preserve convexity generalized inequalities separating and supporting hyperplanes dual

More information

Numerical Optimization

Numerical Optimization Convex Sets Computer Science and Automation Indian Institute of Science Bangalore 560 012, India. NPTEL Course on Let x 1, x 2 R n, x 1 x 2. Line and line segment Line passing through x 1 and x 2 : {y

More information

Monotone Paths in Geometric Triangulations

Monotone Paths in Geometric Triangulations Monotone Paths in Geometric Triangulations Adrian Dumitrescu Ritankar Mandal Csaba D. Tóth November 19, 2017 Abstract (I) We prove that the (maximum) number of monotone paths in a geometric triangulation

More information

IE 5531: Engineering Optimization I

IE 5531: Engineering Optimization I IE 5531: Engineering Optimization I Lecture 3: Linear Programming, Continued Prof. John Gunnar Carlsson September 15, 2010 Prof. John Gunnar Carlsson IE 5531: Engineering Optimization I September 15, 2010

More information

A mini-introduction to convexity

A mini-introduction to convexity A mini-introduction to convexity Geir Dahl March 14, 2017 1 Introduction Convexity, or convex analysis, is an area of mathematics where one studies questions related to two basic objects, namely convex

More information

4 LINEAR PROGRAMMING (LP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1

4 LINEAR PROGRAMMING (LP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 4 LINEAR PROGRAMMING (LP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 Mathematical programming (optimization) problem: min f (x) s.t. x X R n set of feasible solutions with linear objective function

More information

Discrete Optimization 2010 Lecture 5 Min-Cost Flows & Total Unimodularity

Discrete Optimization 2010 Lecture 5 Min-Cost Flows & Total Unimodularity Discrete Optimization 2010 Lecture 5 Min-Cost Flows & Total Unimodularity Marc Uetz University of Twente m.uetz@utwente.nl Lecture 5: sheet 1 / 26 Marc Uetz Discrete Optimization Outline 1 Min-Cost Flows

More information

CS 473: Algorithms. Ruta Mehta. Spring University of Illinois, Urbana-Champaign. Ruta (UIUC) CS473 1 Spring / 29

CS 473: Algorithms. Ruta Mehta. Spring University of Illinois, Urbana-Champaign. Ruta (UIUC) CS473 1 Spring / 29 CS 473: Algorithms Ruta Mehta University of Illinois, Urbana-Champaign Spring 2018 Ruta (UIUC) CS473 1 Spring 2018 1 / 29 CS 473: Algorithms, Spring 2018 Simplex and LP Duality Lecture 19 March 29, 2018

More information

Lecture 12 March 4th

Lecture 12 March 4th Math 239: Discrete Mathematics for the Life Sciences Spring 2008 Lecture 12 March 4th Lecturer: Lior Pachter Scribe/ Editor: Wenjing Zheng/ Shaowei Lin 12.1 Alignment Polytopes Recall that the alignment

More information

Investigating Mixed-Integer Hulls using a MIP-Solver

Investigating Mixed-Integer Hulls using a MIP-Solver Investigating Mixed-Integer Hulls using a MIP-Solver Matthias Walter Otto-von-Guericke Universität Magdeburg Joint work with Volker Kaibel (OvGU) Aussois Combinatorial Optimization Workshop 2015 Outline

More information

Convex Optimization. Convex Sets. ENSAE: Optimisation 1/24

Convex Optimization. Convex Sets. ENSAE: Optimisation 1/24 Convex Optimization Convex Sets ENSAE: Optimisation 1/24 Today affine and convex sets some important examples operations that preserve convexity generalized inequalities separating and supporting hyperplanes

More information

Gram s relation for cone valuations

Gram s relation for cone valuations Gram s relation for cone valuations Sebastian Manecke Goethe Universität Frankfurt joint work with Spencer Backman and Raman Sanyal July 31, 2018 Gram s relation for cone valuations Sebastian Manecke 1

More information

Linear Programming Duality and Algorithms

Linear Programming Duality and Algorithms COMPSCI 330: Design and Analysis of Algorithms 4/5/2016 and 4/7/2016 Linear Programming Duality and Algorithms Lecturer: Debmalya Panigrahi Scribe: Tianqi Song 1 Overview In this lecture, we will cover

More information

Alternating Projections

Alternating Projections Alternating Projections Stephen Boyd and Jon Dattorro EE392o, Stanford University Autumn, 2003 1 Alternating projection algorithm Alternating projections is a very simple algorithm for computing a point

More information

60 2 Convex sets. {x a T x b} {x ã T x b}

60 2 Convex sets. {x a T x b} {x ã T x b} 60 2 Convex sets Exercises Definition of convexity 21 Let C R n be a convex set, with x 1,, x k C, and let θ 1,, θ k R satisfy θ i 0, θ 1 + + θ k = 1 Show that θ 1x 1 + + θ k x k C (The definition of convexity

More information

Cuts from Proofs: A Complete and Practical Technique for Solving Linear Inequalities over Integers

Cuts from Proofs: A Complete and Practical Technique for Solving Linear Inequalities over Integers Cuts from Proofs: A Complete and Practical Technique for Solving Linear Inequalities over Integers Isil Dillig, Thomas Dillig, and Alex Aiken Computer Science Department Stanford University Linear Arithmetic

More information

Target Cuts from Relaxed Decision Diagrams

Target Cuts from Relaxed Decision Diagrams Target Cuts from Relaxed Decision Diagrams Christian Tjandraatmadja 1, Willem-Jan van Hoeve 1 1 Tepper School of Business, Carnegie Mellon University, Pittsburgh, PA {ctjandra,vanhoeve}@andrew.cmu.edu

More information

Decision Aid Methodologies In Transportation Lecture 1: Polyhedra and Simplex method

Decision Aid Methodologies In Transportation Lecture 1: Polyhedra and Simplex method Decision Aid Methodologies In Transportation Lecture 1: Polyhedra and Simplex method Chen Jiang Hang Transportation and Mobility Laboratory April 15, 2013 Chen Jiang Hang (Transportation and Mobility Decision

More information