13. The Leader Election Protocol (IEEE 1394) Jean-Raymond Abrial
|
|
- Reynold Rodgers
- 5 years ago
- Views:
Transcription
1 13. The Leader Election Protocol (IEEE 1394) Jean-Raymond Abrial 2009
2 Outline of Lecture 1 - Background :-) - An informal presentation of the protocol :-) - Step by step formal design :- - Short Conclusion. :-)
3 IEEE 1394 High Performance Serial Bus (FireWire) 2 - It is an international standard - There exists a widespread commercial interest in its correctness - Sun, Apple, Philips, Microsoft, Sony, etc involved in its development - Made of three layers (physical, link, transaction) - The protocol under study is the Tree Identify Protocol - Situated in the Bus Reset phase of the physical layer
4 The Problem (1) 3 - The bus is used to transport digitized video and audio signals - It is hot-pluggable - Devices and peripherals can be added and removed at any time - Such changes are followed by a bus reset - The leader election takes place after a bus reset in the network - A leader needs to be chosen to act as the manager of the bus
5 The Problem (2) 4 - After a bus reset: all nodes in the network have equal status - A node only knows to which nodes it is directly connected - The network is connected - The network is acyclic
6 References (1) 5 BASIC - IEEE. IEEE Standard for a High Performance Serial Bus. Std IEEE. IEEE Standard for a High Performance Serial Bus (supplement). Std 1394a
7 References (2) 6 GENERAL - N. Lynch. Distributed Algorithms. Morgan Kaufmann R. G. Gallager et al. A Distributed Algorithm for Minimum Weight Spanning Trees. IEEE Trans. on Prog. Lang. and Systems
8 References (3) 7 MODEL CHECKING - D.P.L. Simons et al. Mechanical Verification of the IEE 1394a Root Contention Protocol using Uppaal2 Springer International Journal of Software Tools for Technology Transfer H. Toetenel et al. Parametric verification of the IEEE 1394a Root Contention Protocol using LPMC Proceedings of the 7th International Conference on Real-time Computing Systems and Applications. IEEE Computer Society Press. 2000
9 References (4) 8 THEOREM PROVING - M. Devillers et al. Verification of the Leader Election: Formal Method Applied to IEEE Formal Methods in System Design J.R. Abrial et al. A Mechanically Proved and Incremental Development of IEEE Formal Aspects of Computing. 2003
10 Informal Abstract Properties of the Protocol 9 - We are given a connected and acyclic network of nodes - Nodes are linked by bidirectional channels - We want to have one node being elected the leader in a finite time - This is to be done in a distributed and non-deterministic way - Next are two distinct abstract animations of the protocol
11
12
13
14
15
16
17
18
19
20 Development Strategy 10 - Formal definition and properties of the network - A one-shot abstract model of the protocol - Presenting a (still abstract) loop-like centralized solution - Introducing message passing between the nodes (delays) - Modifying the data structure in order to distribute the protocol
21 Initial Model 11 sets: N axm0 1: finite(n) variables: l inv0 1: l N init l : N elect any x where x N then l := x end
22 First Refinement: Defining the Free Tree 12 axm1 1: constant: g g N N axm1 2: g = g 1 axm 5: h, S h h 1 = g h h 1 = S h[s] S = axm1 3: g id(n) = axm1 4: s S N S g[s] S N S - axm1 4 expresses that g is a strongly connected graph - axm1 5 expresses that any partition of g has no cycle
23 First Refinement: Extending the State 13 inv1 1: n N variable: l n inv1 2: s S n S (n g n)[s] S n S - Variable n is a subset of N - The graph reduced to n is still connected
24 First Refinement: the Events 14 init l : N n := N elect any x where n = {x} then l := x end progress status convergent any x, y where x n g[{x}] n = {y} then n := n \ {x} end - A leaf x of the reduced graph is removed from n - The remaining unique element of n is elected variant1: n
25
26 Second Refinement: Extending the State with Messages 15 variables: l, n, m inv2 1: inv2 2: inv2 3: m g m n n x, y x y m g[{x}] n = {y}
27 Second Refinement: the Events 16 send msg any x, y where x n g[{x}] n = {y} x / dom(m) then m := m {x y} end progress any x, y where x y m y / dom(m) then n := n \ {x} m := m \ {x y} end
28 Third Refinement: the Problem of Contention 17
29 Third Refinement: the State 18 inv3 1: c g variables: l, n, m, c, bm inv3 2: inv3 3: m c n n m c = inv3 4: bm = dom(m c)
30 Third Refinement: the Events (1) 19 send msg any x, y where x n g[{x}] n = {y} x / bm then m := m {x y} bm := bm {x} end progress any x, y where x y m y / bm then n := n \ {x} m := m \ {x y} end
31 Third Refinement: the Events (2) 20 discover contention any x, y where x y m y bm then c := c {x y} m := m \ {x y} end solve contention any x, y where c = {x y, y x} then c := bm := bm \ {x, y} end
32 Fourth Refinement: Simplification 21 variables: l, d, m, c, bm inv4 1: inv4 2: d n P(n) x x n d(x) = g[{x}] n
33 Fourth Refinement: the Events (1) 22 init l : ( N d N P(N) d : x ( x N d (x) = g[{x}] ) m := c := bm := ) elect any x where x dom(d) d(x) = then l := x end send msg any x, y where x dom(d) d(x) = {y} x / bm then m := m {x y} bm := bm {x} end progress any x, y where x y m y / bm then d := ({x} d) {y d(y) \ {x}} m := m \ {x y} bm := bm \ {x} end
34 Fifth Refinement: Introducing Cardinality 23 variables: l, d, m, c, bm, r inv5 1: r N N inv5 2: x ( x N r(x) = card(d(x)) )
35 Fifth Refinement: the Events(1) 24 init l : N ( d ) N P(N) d : x ( x N d (x) = g[{x}] ) m := c := bm := ( r ) N N r : x ( x N r (x) = card(g[{x}]) )
36 Fifth Refinement: the Events(2) 25 elect any x where x N r(x) = 0 then l := x end
37 Fifth Refinement: the Events(3) 26 send msg any x, y where x N r(x) = 1 y d(x) x / bm then m := m {x y} bm := bm {x} end
38 Fifth Refinement: the Events(4) 27 progress any x, y where x y m y / bm then d := ({x} d) {y d(y) \ {x}} r := ({x} r) {y r(y) 1} m := m \ {x y} end
6. The Bounded Re-transmission Protocol. Jean-Raymond Abrial
6. The Bounded Re-transmission Protocol Jean-Raymond Abrial 2009 Purpose of this Lecture 1 - The Bounded Re-transmission Protocol is a file transfer protocol - This is a problem dealing with fault tolerance
More informationEvent-B Course. 11. Formal Development of a Security Protocol (the Needham-Schroeder protocol)
Event-B Course 11. Formal Development of a Security Protocol (the Needham-Schroeder protocol) Jean-Raymond Abrial September-October-November 2011 Outline 1 - Requirement Document - Refinement Strategy
More information6.852 Lecture 10. Minimum spanning tree. Reading: Chapter 15.5, Gallager-Humblet-Spira paper. Gallager-Humblet-Spira algorithm
6.852 Lecture 10 Gallager-Humblet-Spira algorithm Reading: Chapter 15.5, Gallager-Humblet-Spira paper Assume undirected graph (i.e., bidirectional communication) distinct edge weights size and diameter
More informationarxiv: v2 [cs.ds] 25 Jan 2017
d-hop Dominating Set for Directed Graph with in-degree Bounded by One arxiv:1404.6890v2 [cs.ds] 25 Jan 2017 Joydeep Banerjee, Arun Das, and Arunabha Sen School of Computing, Informatics and Decision System
More informationThe Event-B Modelling Notation
The Event-B Modelling Notation J.-R. Abrial October 2007 Version 1.5 The Event-B Modelling Notation Contents 1 Machines and Contexts 1 2 Events 2 3 Variant 3 4 Actions 3 5 Witnesses 4 6 Syntax of the Event-B
More informationLecture 1: Introduction to distributed Algorithms
Distributed Algorithms M.Tech., CSE, 2016 Lecture 1: Introduction to distributed Algorithms Faculty: K.R. Chowdhary : Professor of CS Disclaimer: These notes have not been subjected to the usual scrutiny
More informationTHE FIRST APPROXIMATED DISTRIBUTED ALGORITHM FOR THE MINIMUM DEGREE SPANNING TREE PROBLEM ON GENERAL GRAPHS. and
International Journal of Foundations of Computer Science c World Scientific Publishing Company THE FIRST APPROXIMATED DISTRIBUTED ALGORITHM FOR THE MINIMUM DEGREE SPANNING TREE PROBLEM ON GENERAL GRAPHS
More information4. (a) Draw the Petersen graph. (b) Use Kuratowski s teorem to prove that the Petersen graph is non-planar.
UPPSALA UNIVERSITET Matematiska institutionen Anders Johansson Graph Theory Frist, KandMa, IT 010 10 1 Problem sheet 4 Exam questions Solve a subset of, say, four questions to the problem session on friday.
More informationDistributed minimum spanning tree problem
Distributed minimum spanning tree problem Juho-Kustaa Kangas 24th November 2012 Abstract Given a connected weighted undirected graph, the minimum spanning tree problem asks for a spanning subtree with
More informationFoundations of Computer Science Spring Mathematical Preliminaries
Foundations of Computer Science Spring 2017 Equivalence Relation, Recursive Definition, and Mathematical Induction Mathematical Preliminaries Mohammad Ashiqur Rahman Department of Computer Science College
More informationDistributed Information System as a System of Asynchronous Concurrent Processes
Distributed Information System as a System of Asynchronous Concurrent Processes Marek Rychlý Jaroslav Zendulka Department of Information Systems Faculty of Information Technology Brno University of Technology
More informationFormal specification in Event-B
2IW80 Software specification and architecture Formal specification in Event-B Alexander Serebrenik, Ulyana Tikhonova Outline Introduction into formal specification Mathematical notation of Event-B Event-B
More informationA DISTRIBUTED SYNCHRONOUS ALGORITHM FOR MINIMUM-WEIGHT SPANNING TREES
ISSN: 2778-5795 A DISTRIBUTED SYNCHRONOUS ALGORITHM FOR MINIMUM-WEIGHT SPANNING TREES Md. Mohsin Ali 1, Mst. Shakila Khan Rumi 2 1 Department of Computer Science, The University of Western Ontario, Canada
More informationDistributed Systems COMP 212. Lecture 1 Othon Michail
Distributed Systems COMP 212 Lecture 1 Othon Michail Course Information Lecturer: Othon Michail Office 2.14 Holt Building Module Website: http://csc.liv.ac.uk/~michailo/teaching/comp212 VITAL may be used
More informationNondeterministic Query Algorithms
Journal of Universal Computer Science, vol. 17, no. 6 (2011), 859-873 submitted: 30/7/10, accepted: 17/2/11, appeared: 28/3/11 J.UCS Nondeterministic Query Algorithms Alina Vasilieva (Faculty of Computing,
More informationSoftware development using B method. Julien Cervelle LACL - UPEC
Software development using B method Julien Cervelle LACL - UPEC Outline Introduction B abstract machine First order logic of set theory Substitutions Proof obligations Refinement Introduction B method
More informationThese notes present some properties of chordal graphs, a set of undirected graphs that are important for undirected graphical models.
Undirected Graphical Models: Chordal Graphs, Decomposable Graphs, Junction Trees, and Factorizations Peter Bartlett. October 2003. These notes present some properties of chordal graphs, a set of undirected
More informationVerification of a Leader Election Protocol. M.C.A. Devillers, W.O.D. Griffioen, J.M.T. Romijn, F.W. Vaandrager. Computing Science Institute/
Verification of a Leader Election Protocol M.C.A. Devillers, W.O.D. Griffioen, J.M.T. Romijn, F.W. Vaandrager Computing Science Institute/ CSI-R9728 December 1997 Computing Science Institute Nijmegen Faculty
More informationCS 6783 (Applied Algorithms) Lecture 5
CS 6783 (Applied Algorithms) Lecture 5 Antonina Kolokolova January 19, 2012 1 Minimum Spanning Trees An undirected graph G is a pair (V, E); V is a set (of vertices or nodes); E is a set of (undirected)
More informationThe Needham-Schroeder-Lowe Protocol with Event-B
The Needham-Schroeder-Lowe Protocol with Event-B J.R. Abrial 1 1 Introduction This text contains the formal development (with proofs) of the Needham-Schroeder-Lowe Protocol [1] [2] using Event-B [3] and
More informationTriple Connected Domination Number of a Graph
International J.Math. Combin. Vol.3(2012), 93-104 Triple Connected Domination Number of a Graph G.Mahadevan, Selvam Avadayappan, J.Paulraj Joseph and T.Subramanian Department of Mathematics Anna University:
More informationByzantine Consensus in Directed Graphs
Byzantine Consensus in Directed Graphs Lewis Tseng 1,3, and Nitin Vaidya 2,3 1 Department of Computer Science, 2 Department of Electrical and Computer Engineering, and 3 Coordinated Science Laboratory
More informationThe Dynamic Hungarian Algorithm for the Assignment Problem with Changing Costs
The Dynamic Hungarian Algorithm for the Assignment Problem with Changing Costs G. Ayorkor Mills-Tettey Anthony Stentz M. Bernardine Dias CMU-RI-TR-07-7 July 007 Robotics Institute Carnegie Mellon University
More informationM. De Wulf, L. Doyen,J.-F. Raskin Université Libre de Bruxelles Centre Fédéré en Vérification
Systematic Implementation of Real-Time Models M. De Wulf, L. Doyen,J.-F. Raskin Université Libre de Bruxelles Centre Fédéré en Vérification Model-based Development for Controllers Make a model of the environment
More informationLecture-12: Closed Sets
and Its Examples Properties of Lecture-12: Dr. Department of Mathematics Lovely Professional University Punjab, India October 18, 2014 Outline Introduction and Its Examples Properties of 1 Introduction
More informationChapter 4. Relations & Graphs. 4.1 Relations. Exercises For each of the relations specified below:
Chapter 4 Relations & Graphs 4.1 Relations Definition: Let A and B be sets. A relation from A to B is a subset of A B. When we have a relation from A to A we often call it a relation on A. When we have
More informationGraphs and Network Flows IE411. Lecture 13. Dr. Ted Ralphs
Graphs and Network Flows IE411 Lecture 13 Dr. Ted Ralphs IE411 Lecture 13 1 References for Today s Lecture IE411 Lecture 13 2 References for Today s Lecture Required reading Sections 21.1 21.2 References
More informationCSE101: Design and Analysis of Algorithms. Ragesh Jaiswal, CSE, UCSD
Recap. Growth rates: Arrange the following functions in ascending order of growth rate: n 2 log n n log n 2 log n n/ log n n n Introduction Algorithm: A step-by-step way of solving a problem. Design of
More informationDesign and Analysis of Algorithms
Design and Analysis of Algorithms CS 5311 Lecture 19 Topological Sort Junzhou Huang, Ph.D. Department of Computer Science and ngineering CS5311 Design and Analysis of Algorithms 1 Topological Sort Want
More informationFormal Model. Figure 1: The target concept T is a subset of the concept S = [0, 1]. The search agent needs to search S for a point in T.
Although this paper analyzes shaping with respect to its benefits on search problems, the reader should recognize that shaping is often intimately related to reinforcement learning. The objective in reinforcement
More informationDecision Procedures for Recursive Data Structures with Integer Constraints
Decision Procedures for Recursive Data Structures with Ting Zhang, Henny B Sipma, Zohar Manna Stanford University tingz,sipma,zm@csstanfordedu STeP Group, June 29, 2004 IJCAR 2004 - p 1/31 Outline Outline
More informationSoftware Testing IV. Prof. Dr. Holger Schlingloff. Humboldt-Universität zu Berlin
Software Testing IV Prof. Dr. Holger Schlingloff Humboldt-Universität zu Berlin and Fraunhofer Institute of Computer Architecture and Software Technology FIRST Outline of this Lecture Series 2006/11/24:
More informationDegree Equitable Domination Number and Independent Domination Number of a Graph
Degree Equitable Domination Number and Independent Domination Number of a Graph A.Nellai Murugan 1, G.Victor Emmanuel 2 Assoc. Prof. of Mathematics, V.O. Chidambaram College, Thuthukudi-628 008, Tamilnadu,
More informationEvent B Development of a Synchronous AADL Scheduler
Available online at www.sciencedirect.com Electronic Notes in Theoretical Computer Science 280 (2011) 23 33 www.elsevier.com/locate/entcs Event B Development of a Synchronous AADL Scheduler Jean-Paul Bodeveix
More informationLecture 1: Examples, connectedness, paths and cycles
Lecture 1: Examples, connectedness, paths and cycles Anders Johansson 2011-10-22 lör Outline The course plan Examples and applications of graphs Relations The definition of graphs as relations Connectedness,
More informationA Test Case Generation Algorithm for Real-Time Systems
A Test Case Generation Algorithm for Real-Time Systems Anders Hessel and Paul Pettersson Department of Information Technology Uppsala University, P.O. Box 337 SE-751 05 Uppsala, Sweden {hessel,paupet}@it.uu.se
More informationLearning Automata Based Algorithms for Finding Minimum Weakly Connected Dominating Set in Stochastic Graphs
Learning Automata Based Algorithms for Finding Minimum Weakly Connected Dominating Set in Stochastic Graphs Javad Akbari Torkestani Department of Computer Engineering, Islamic Azad University, Arak Branch,
More informationIntroduction to Mathematical Programming IE406. Lecture 16. Dr. Ted Ralphs
Introduction to Mathematical Programming IE406 Lecture 16 Dr. Ted Ralphs IE406 Lecture 16 1 Reading for This Lecture Bertsimas 7.1-7.3 IE406 Lecture 16 2 Network Flow Problems Networks are used to model
More informationSelf Stabilization. CS553 Distributed Algorithms Prof. Ajay Kshemkalyani. by Islam Ismailov & Mohamed M. Ali
Self Stabilization CS553 Distributed Algorithms Prof. Ajay Kshemkalyani by Islam Ismailov & Mohamed M. Ali Introduction There is a possibility for a distributed system to go into an illegitimate state,
More informationSERGEI OBIEDKOV LEARNING HORN FORMULAS WITH QUERIES
SERGEI OBIEDKOV LEARNING HORN FORMULAS WITH QUERIES SUPERVISED LEARNING Input: a training set divided into (for example) two classes w.r.t. a certain target property. positive examples negative examples
More informationReconstruction of Filament Structure
Reconstruction of Filament Structure Ruqi HUANG INRIA-Geometrica Joint work with Frédéric CHAZAL and Jian SUN 27/10/2014 Outline 1 Problem Statement Characterization of Dataset Formulation 2 Our Approaches
More information(1) fî fî = 0. If the vector (tpx,...,tpk) is nonzero then it gives the homogeneous coordinates
transactions of the american mathematical society Volume 314, Number 2, August 1989 A PICARD THEOREM WITH AN APPLICATION TO MINIMAL SURFACES PETER HALL Abstract. We prove a Picard theorem for holomorphic
More informationLecture 2. Decidability and Verification
Lecture 2. Decidability and Verification model temporal property Model Checker yes error-trace Advantages Automated formal verification, Effective debugging tool Moderate industrial success In-house groups:
More informationDistributed Systems COMP 212. Lecture 1 Othon Michail
Distributed Systems COMP 212 Lecture 1 Othon Michail Course Information Lecturer: Othon Michail Office 2.14 Holt Building http://csc.liv.ac.uk/~michailo/teaching/comp2 12 Structure 30 Lectures + 10 lab
More informationData Analytics and Boolean Algebras
Data Analytics and Boolean Algebras Hans van Thiel November 28, 2012 c Muitovar 2012 KvK Amsterdam 34350608 Passeerdersstraat 76 1016 XZ Amsterdam The Netherlands T: + 31 20 6247137 E: hthiel@muitovar.com
More informationNetwork Design and Optimization course
Effective maximum flow algorithms Modeling with flows Network Design and Optimization course Lecture 5 Alberto Ceselli alberto.ceselli@unimi.it Dipartimento di Tecnologie dell Informazione Università degli
More informationRange Reporting. Range Reporting. Range Reporting Problem. Applications
Philip Bille Problem problem. Preprocess at set of points P R 2 to support report(x1, y1, x2, y2): Return the set of points in R P, where R is rectangle given by (x1, y1) and (x2, y2). Applications Relational
More informationGenerating edge covers of path graphs
Generating edge covers of path graphs J. Raymundo Marcial-Romero, J. A. Hernández, Vianney Muñoz-Jiménez and Héctor A. Montes-Venegas Facultad de Ingeniería, Universidad Autónoma del Estado de México,
More informationINTEGRATION OF AUTOMATIC THEOREM PROVERS IN EVENT-B PATTERNS
INTEGRATION OF AUTOMATIC THEOREM PROVERS IN EVENT-B PATTERNS Eman Elsayed 1, Gaber El-Sharawy 2 and Enas El-Sharawy 3 123 Faculty of Science(girls), Al-Azhar University, Cairo, Egypt emankaram10@azhar.ed.eg,
More informationLecture 19 Thursday, March 29. Examples of isomorphic, and non-isomorphic graphs will be given in class.
CIS 160 - Spring 2018 (instructor Val Tannen) Lecture 19 Thursday, March 29 GRAPH THEORY Graph isomorphism Definition 19.1 Two graphs G 1 = (V 1, E 1 ) and G 2 = (V 2, E 2 ) are isomorphic, write G 1 G
More informationUser Manual of the RODIN Platform
User Manual of the RODIN Platform October 2007 Version 2.3 User Manual of the RODIN Platform Contents 1 Project 1 1.1 Project Constituents and Relationships........................... 1 1.2 The Project
More informationAbstract. 1 Introduction
Designing Efficient Distributed Algorithms Using Sampling Techniques S. Rajasekaran and D.S.L. Wei University of Florida and University of Aizu Abstract In this paper we show the power of sampling techniques
More informationFinding Deadlocks of Event-B Models by Constraint Solving
B 2011 June 21st, 2011, Limerick, Ireland Finding Deadlocks of Event-B Models by Constraint Solving Stefan Hallerstede, Michael Leuschel Institut für Informatik, Universität Düsseldorf Universitätsstr.
More informationThe Needham-Schroeder-Lowe Protocol with Event-B
The Needham-Schroeder-Lowe Protocol with Event-B (February 2011) (version 4) J.R. Abrial 1 1 Introduction This text contains the formal development (with proofs) of the Needham-Schroeder-Lowe Protocol
More informationAMS /672: Graph Theory Homework Problems - Week V. Problems to be handed in on Wednesday, March 2: 6, 8, 9, 11, 12.
AMS 550.47/67: Graph Theory Homework Problems - Week V Problems to be handed in on Wednesday, March : 6, 8, 9,,.. Assignment Problem. Suppose we have a set {J, J,..., J r } of r jobs to be filled by a
More informationReview of Sets. Review. Philippe B. Laval. Current Semester. Kennesaw State University. Philippe B. Laval (KSU) Sets Current Semester 1 / 16
Review of Sets Review Philippe B. Laval Kennesaw State University Current Semester Philippe B. Laval (KSU) Sets Current Semester 1 / 16 Outline 1 Introduction 2 Definitions, Notations and Examples 3 Special
More information1. Lecture notes on bipartite matching
Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans February 5, 2017 1. Lecture notes on bipartite matching Matching problems are among the fundamental problems in
More informationA Note On The Sparing Number Of The Sieve Graphs Of Certain Graphs
Applied Mathematics E-Notes, 15(015), 9-37 c ISSN 1607-510 Available free at mirror sites of http://www.math.nthu.edu.tw/ amen/ A Note On The Sparing Number Of The Sieve Graphs Of Certain Graphs Naduvath
More informationGraphs and Network Flows IE411. Lecture 21. Dr. Ted Ralphs
Graphs and Network Flows IE411 Lecture 21 Dr. Ted Ralphs IE411 Lecture 21 1 Combinatorial Optimization and Network Flows In general, most combinatorial optimization and integer programming problems are
More informationReasoning about modules: data refinement and simulation
Reasoning about modules: data refinement and simulation David Naumann naumann@cs.stevens-tech.edu Stevens Institute of Technology Naumann - POPL 02 Java Verification Workshop p.1/17 Objectives of talk
More informationModule 14: Approaches to Control Flow Analysis Lecture 27: Algorithm and Interval. The Lecture Contains: Algorithm to Find Dominators.
The Lecture Contains: Algorithm to Find Dominators Loop Detection Algorithm to Detect Loops Extended Basic Block Pre-Header Loops With Common eaders Reducible Flow Graphs Node Splitting Interval Analysis
More informationSection 3.1: Nonseparable Graphs Cut vertex of a connected graph G: A vertex x G such that G x is not connected. Theorem 3.1, p. 57: Every connected
Section 3.1: Nonseparable Graphs Cut vertex of a connected graph G: A vertex x G such that G x is not connected. Theorem 3.1, p. 57: Every connected graph G with at least 2 vertices contains at least 2
More informationOn the construction of convergent transfer subgraphs in general labeled directed graphs
On the construction of convergent transfer subgraphs in general labeled directed graphs 38th CGTC 7 March 2007 Christopher League * Mohammed Ghriga First, I ll explain what we mean by Convergent Transfer
More informationDeterministic Communication
University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Rebecca Hicks Date: January 9, 2012 LECTURE 1 Deterministic Communication This lecture is a
More informationStrong I/O Lower Bounds for Binomial and FFT Computation Graphs
Strong I/O Lower Bounds for Binomial and FFT Computation Graphs Desh Ranjan Old Dominion University, Norfolk, Virginia 23529 Email: dranjan@cs.odu.edu John Savage Brown University,Providence, Rhode Island
More information1. Lecture notes on bipartite matching February 4th,
1. Lecture notes on bipartite matching February 4th, 2015 6 1.1.1 Hall s Theorem Hall s theorem gives a necessary and sufficient condition for a bipartite graph to have a matching which saturates (or matches)
More informationTheoretical Foundations of Clustering. Margareta Ackerman
Theoretical Foundations of Clustering Margareta Ackerman The Theory-Practice Gap Clustering is one of the most widely used tools for exploratory data analysis. Identifying target markets Constructing phylogenetic
More informationMATH 54 - LECTURE 10
MATH 54 - LECTURE 10 DAN CRYTSER The Universal Mapping Property First we note that each of the projection mappings π i : j X j X i is continuous when i X i is given the product topology (also if the product
More informationTexture Similarity Measure. Pavel Vácha. Institute of Information Theory and Automation, AS CR Faculty of Mathematics and Physics, Charles University
Texture Similarity Measure Pavel Vácha Institute of Information Theory and Automation, AS CR Faculty of Mathematics and Physics, Charles University What is texture similarity? Outline 1. Introduction Julesz
More information5. Lecture notes on matroid intersection
Massachusetts Institute of Technology Handout 14 18.433: Combinatorial Optimization April 1st, 2009 Michel X. Goemans 5. Lecture notes on matroid intersection One nice feature about matroids is that a
More informationCost distribution of the Chang Roberts leader election algorithm and related problems
Theoretical Computer Science 369 (2006) 442 447 www.elsevier.com/locate/tcs Note Cost distribution of the Chang Roberts leader election algorithm and related problems Wei-Mei Chen,1 Department of Electronic
More informationT Seminar on Theoretical Computer Science Spring 2007 Distributed Computation. Constructing a spanning tree Toni Kylmälä
T-79.4001 Seminar on Theoretical Computer Science Spring 2007 Distributed Computation Constructing a spanning tree Toni Kylmälä toni.kylmala@tkk.fi 1 Spanning tree To construct a spanning tree we must
More informationLower bound for comparison-based sorting
COMP3600/6466 Algorithms 2018 Lecture 8 1 Lower bound for comparison-based sorting Reading: Cormen et al, Section 8.1 and 8.2 Different sorting algorithms may have different running-time complexities.
More informationConnecting face hitting sets in planar graphs
Connecting face hitting sets in planar graphs Pascal Schweitzer and Patrick Schweitzer Max-Planck-Institute for Computer Science Campus E1 4, D-66123 Saarbrücken, Germany pascal@mpi-inf.mpg.de University
More informationHave we Learned from the Vasa Disaster?
Have we Learned from the Vasa Disaster? Jean-Raymond Abrial ETH Zurich September 19th 2006 The Vasa Disaster 1 The Story 2 - August 10, 1628: The Swedish warship Vasa sank. - This was her maiden voyage.
More informationGraph Algorithms Using Depth First Search
Graph Algorithms Using Depth First Search Analysis of Algorithms Week 8, Lecture 1 Prepared by John Reif, Ph.D. Distinguished Professor of Computer Science Duke University Graph Algorithms Using Depth
More informationSoftware Engineering of Robots
Software Engineering of Robots Ana Cavalcanti Jon Timmis, Jim Woodcock Wei Li, Alvaro Miyazawa, Pedro Ribeiro University of York December 2015 Overview One of UK eight great technologies: robotics and
More informationAn Efficient Silent Self-Stabilizing Algorithm for 1-Maximal Matching in Anonymous Network
An Efficient Silent Self-Stabilizing Algorithm for 1-Maximal Matching in Anonymous Network Yuma Asada and Michiko Inoue Nara Institute of Science and Technology, 8916-5 Takayama, Ikoma, NARA 630-0192 JAPAN,
More informationConstraint Programming. Global Constraints. Amira Zaki Prof. Dr. Thom Frühwirth. University of Ulm WS 2012/2013
Global Constraints Amira Zaki Prof. Dr. Thom Frühwirth University of Ulm WS 2012/2013 Amira Zaki & Thom Frühwirth University of Ulm Page 1 WS 2012/2013 Overview Classes of Constraints Global Constraints
More informationThe self-minor conjecture for infinite trees
The self-minor conjecture for infinite trees Julian Pott Abstract We prove Seymour s self-minor conjecture for infinite trees. 1. Introduction P. D. Seymour conjectured that every infinite graph is a proper
More informationSelf-Recovering Sensor-Actor Networks
Self-Recovering Sensor-Actor Networks Maryam Kamali, Linas Laibinis, Luigia Petre, Kaisa Sere IT-Department, Åbo Akademi University, Turku, Finland {maryam.kamali,linas.laibinis,luigia.petre,kaisa.sere}@abo.fi
More informationTowards A Formal Theory of On Chip Communications in the ACL2 Logic
(c) Julien Schmaltz, ACL2 2006, San José August 15-16 p. 1/37 Towards A Formal Theory of On Chip Communications in the ACL2 Logic Julien Schmaltz Saarland University - Computer Science Department Saarbrücken,
More informationA Mechanism for Sequential Consistency in a Distributed Objects System
A Mechanism for Sequential Consistency in a Distributed Objects System Cristian Ţăpuş, Aleksey Nogin, Jason Hickey, and Jerome White California Institute of Technology Computer Science Department MC 256-80,
More informationDistributed Leader Election Algorithms in Synchronous Networks
Distributed Leader Election Algorithms in Synchronous Networks Mitsou Valia National Technical University of Athens School of Applied Mathematics and Physics 1/66 Distributed Computing Distributed computing
More informationPetri Nets ee249 Fall 2000
Petri Nets ee249 Fall 2000 Marco Sgroi Most slides borrowed from Luciano Lavagno s lecture ee249 (1998) 1 Models Of Computation for reactive systems Main MOCs: Communicating Finite State Machines Dataflow
More informationA Mechanically and Incremental Development of the Remote Authentication Dial-In User Service Protocol
A Mechanically and Incremental Development of the Remote Authentication Dial-In User Service Protocol Sanae El Mimouni, Rajaa Filali, Anas Amamou, Bahija Boulamaat and Mohamed Bouhdadi Abstract The Remote
More informationLoopy Belief Propagation
Loopy Belief Propagation Research Exam Kristin Branson September 29, 2003 Loopy Belief Propagation p.1/73 Problem Formalization Reasoning about any real-world problem requires assumptions about the structure
More informationImplementing I/O-Automaton Specifications on Erlang
SCIS & ISIS 2010, Dec. 8-12, 2010, Okayama Convention Center, Okayama, Japan Implementing I/O-Automaton Specifications on Erlang Yoshinobu Kawabe and Jun Zhao Department of Information Science Aichi Institute
More informationFormal Verification of Distributed Transaction Execution in Replicated Database System using Event - B
Formal Verification of Distributed Transaction Execution in Replicated Database System using Event - B Pooja Sharma Pranveer Singh Institute of Technology, Kanpur, U.P. (208020) U.P.T.U., Lucknow Raghuraj
More informationChapter 9 Graph Algorithms
Chapter 9 Graph Algorithms 2 Introduction graph theory useful in practice represent many real-life problems can be if not careful with data structures 3 Definitions an undirected graph G = (V, E) is a
More informationCSc Leader Election
CSc72010 Leader Election Reading Skim 3.5 Read 3.6, General synchronous networks Read 4.1 Leader election algorithms Lelann/Chang/Roberts: O(n) time complexity O(n 2 ) message complexity Hirschberg/Sinclair
More informationarxiv: v1 [math.co] 30 Nov 2015
On connected degree sequences arxiv:1511.09321v1 [math.co] 30 Nov 2015 Jonathan McLaughlin Department of Mathematics, St. Patrick s College, Dublin City University, Dublin 9, Ireland Abstract This note
More informationTowards A Formally Verified Network-on-Chip
Towards A Formally Verified Network-on-Chip Tom van den Broek 1 Julien Schmaltz 12 1 Institute for Computing and Information Sciences Radboud University Nijmegen The Netherlands 2 School of Computer Science
More informationInteger Programming ISE 418. Lecture 7. Dr. Ted Ralphs
Integer Programming ISE 418 Lecture 7 Dr. Ted Ralphs ISE 418 Lecture 7 1 Reading for This Lecture Nemhauser and Wolsey Sections II.3.1, II.3.6, II.4.1, II.4.2, II.5.4 Wolsey Chapter 7 CCZ Chapter 1 Constraint
More informationGreedy Algorithms 1. For large values of d, brute force search is not feasible because there are 2 d
Greedy Algorithms 1 Simple Knapsack Problem Greedy Algorithms form an important class of algorithmic techniques. We illustrate the idea by applying it to a simplified version of the Knapsack Problem. Informally,
More information5 MST and Greedy Algorithms
5 MST and Greedy Algorithms One of the traditional and practically motivated problems of discrete optimization asks for a minimal interconnection of a given set of terminals (meaning that every pair will
More informationDistributed Minimum Spanning Tree
Distributed Minimum Spanning Tree Outline I. Introduction II. GHS algorithm (1983) III. Awerbuch algorithm (1987) IV. Other results Introduction Problem and Model Undirected G(N,E) asynchronous algorithm
More informationClearly there is a close relation between the radius R and the diameter D of a graph, such as R D 2R.
Chapter 2 Tree Algorithms In this chapter we learn a few basic algorithms on trees, and how to construct trees in the first place so that we can run these (and other) algorithms. The good news is that
More informationOutline. Computer Science 331. Heap Shape. Binary Heaps. Heap Sort. Insertion Deletion. Mike Jacobson. HeapSort Priority Queues.
Outline Computer Science 33 Heap Sort Mike Jacobson Department of Computer Science University of Calgary Lectures #5- Definition Representation 3 5 References Mike Jacobson (University of Calgary) Computer
More informationMulticasting in the Hypercube, Chord and Binomial Graphs
Multicasting in the Hypercube, Chord and Binomial Graphs Christopher C. Cipriano and Teofilo F. Gonzalez Department of Computer Science University of California, Santa Barbara, CA, 93106 E-mail: {ccc,teo}@cs.ucsb.edu
More information