13. The Leader Election Protocol (IEEE 1394) Jean-Raymond Abrial

Size: px
Start display at page:

Download "13. The Leader Election Protocol (IEEE 1394) Jean-Raymond Abrial"

Transcription

1 13. The Leader Election Protocol (IEEE 1394) Jean-Raymond Abrial 2009

2 Outline of Lecture 1 - Background :-) - An informal presentation of the protocol :-) - Step by step formal design :- - Short Conclusion. :-)

3 IEEE 1394 High Performance Serial Bus (FireWire) 2 - It is an international standard - There exists a widespread commercial interest in its correctness - Sun, Apple, Philips, Microsoft, Sony, etc involved in its development - Made of three layers (physical, link, transaction) - The protocol under study is the Tree Identify Protocol - Situated in the Bus Reset phase of the physical layer

4 The Problem (1) 3 - The bus is used to transport digitized video and audio signals - It is hot-pluggable - Devices and peripherals can be added and removed at any time - Such changes are followed by a bus reset - The leader election takes place after a bus reset in the network - A leader needs to be chosen to act as the manager of the bus

5 The Problem (2) 4 - After a bus reset: all nodes in the network have equal status - A node only knows to which nodes it is directly connected - The network is connected - The network is acyclic

6 References (1) 5 BASIC - IEEE. IEEE Standard for a High Performance Serial Bus. Std IEEE. IEEE Standard for a High Performance Serial Bus (supplement). Std 1394a

7 References (2) 6 GENERAL - N. Lynch. Distributed Algorithms. Morgan Kaufmann R. G. Gallager et al. A Distributed Algorithm for Minimum Weight Spanning Trees. IEEE Trans. on Prog. Lang. and Systems

8 References (3) 7 MODEL CHECKING - D.P.L. Simons et al. Mechanical Verification of the IEE 1394a Root Contention Protocol using Uppaal2 Springer International Journal of Software Tools for Technology Transfer H. Toetenel et al. Parametric verification of the IEEE 1394a Root Contention Protocol using LPMC Proceedings of the 7th International Conference on Real-time Computing Systems and Applications. IEEE Computer Society Press. 2000

9 References (4) 8 THEOREM PROVING - M. Devillers et al. Verification of the Leader Election: Formal Method Applied to IEEE Formal Methods in System Design J.R. Abrial et al. A Mechanically Proved and Incremental Development of IEEE Formal Aspects of Computing. 2003

10 Informal Abstract Properties of the Protocol 9 - We are given a connected and acyclic network of nodes - Nodes are linked by bidirectional channels - We want to have one node being elected the leader in a finite time - This is to be done in a distributed and non-deterministic way - Next are two distinct abstract animations of the protocol

11

12

13

14

15

16

17

18

19

20 Development Strategy 10 - Formal definition and properties of the network - A one-shot abstract model of the protocol - Presenting a (still abstract) loop-like centralized solution - Introducing message passing between the nodes (delays) - Modifying the data structure in order to distribute the protocol

21 Initial Model 11 sets: N axm0 1: finite(n) variables: l inv0 1: l N init l : N elect any x where x N then l := x end

22 First Refinement: Defining the Free Tree 12 axm1 1: constant: g g N N axm1 2: g = g 1 axm 5: h, S h h 1 = g h h 1 = S h[s] S = axm1 3: g id(n) = axm1 4: s S N S g[s] S N S - axm1 4 expresses that g is a strongly connected graph - axm1 5 expresses that any partition of g has no cycle

23 First Refinement: Extending the State 13 inv1 1: n N variable: l n inv1 2: s S n S (n g n)[s] S n S - Variable n is a subset of N - The graph reduced to n is still connected

24 First Refinement: the Events 14 init l : N n := N elect any x where n = {x} then l := x end progress status convergent any x, y where x n g[{x}] n = {y} then n := n \ {x} end - A leaf x of the reduced graph is removed from n - The remaining unique element of n is elected variant1: n

25

26 Second Refinement: Extending the State with Messages 15 variables: l, n, m inv2 1: inv2 2: inv2 3: m g m n n x, y x y m g[{x}] n = {y}

27 Second Refinement: the Events 16 send msg any x, y where x n g[{x}] n = {y} x / dom(m) then m := m {x y} end progress any x, y where x y m y / dom(m) then n := n \ {x} m := m \ {x y} end

28 Third Refinement: the Problem of Contention 17

29 Third Refinement: the State 18 inv3 1: c g variables: l, n, m, c, bm inv3 2: inv3 3: m c n n m c = inv3 4: bm = dom(m c)

30 Third Refinement: the Events (1) 19 send msg any x, y where x n g[{x}] n = {y} x / bm then m := m {x y} bm := bm {x} end progress any x, y where x y m y / bm then n := n \ {x} m := m \ {x y} end

31 Third Refinement: the Events (2) 20 discover contention any x, y where x y m y bm then c := c {x y} m := m \ {x y} end solve contention any x, y where c = {x y, y x} then c := bm := bm \ {x, y} end

32 Fourth Refinement: Simplification 21 variables: l, d, m, c, bm inv4 1: inv4 2: d n P(n) x x n d(x) = g[{x}] n

33 Fourth Refinement: the Events (1) 22 init l : ( N d N P(N) d : x ( x N d (x) = g[{x}] ) m := c := bm := ) elect any x where x dom(d) d(x) = then l := x end send msg any x, y where x dom(d) d(x) = {y} x / bm then m := m {x y} bm := bm {x} end progress any x, y where x y m y / bm then d := ({x} d) {y d(y) \ {x}} m := m \ {x y} bm := bm \ {x} end

34 Fifth Refinement: Introducing Cardinality 23 variables: l, d, m, c, bm, r inv5 1: r N N inv5 2: x ( x N r(x) = card(d(x)) )

35 Fifth Refinement: the Events(1) 24 init l : N ( d ) N P(N) d : x ( x N d (x) = g[{x}] ) m := c := bm := ( r ) N N r : x ( x N r (x) = card(g[{x}]) )

36 Fifth Refinement: the Events(2) 25 elect any x where x N r(x) = 0 then l := x end

37 Fifth Refinement: the Events(3) 26 send msg any x, y where x N r(x) = 1 y d(x) x / bm then m := m {x y} bm := bm {x} end

38 Fifth Refinement: the Events(4) 27 progress any x, y where x y m y / bm then d := ({x} d) {y d(y) \ {x}} r := ({x} r) {y r(y) 1} m := m \ {x y} end

6. The Bounded Re-transmission Protocol. Jean-Raymond Abrial

6. The Bounded Re-transmission Protocol. Jean-Raymond Abrial 6. The Bounded Re-transmission Protocol Jean-Raymond Abrial 2009 Purpose of this Lecture 1 - The Bounded Re-transmission Protocol is a file transfer protocol - This is a problem dealing with fault tolerance

More information

Event-B Course. 11. Formal Development of a Security Protocol (the Needham-Schroeder protocol)

Event-B Course. 11. Formal Development of a Security Protocol (the Needham-Schroeder protocol) Event-B Course 11. Formal Development of a Security Protocol (the Needham-Schroeder protocol) Jean-Raymond Abrial September-October-November 2011 Outline 1 - Requirement Document - Refinement Strategy

More information

6.852 Lecture 10. Minimum spanning tree. Reading: Chapter 15.5, Gallager-Humblet-Spira paper. Gallager-Humblet-Spira algorithm

6.852 Lecture 10. Minimum spanning tree. Reading: Chapter 15.5, Gallager-Humblet-Spira paper. Gallager-Humblet-Spira algorithm 6.852 Lecture 10 Gallager-Humblet-Spira algorithm Reading: Chapter 15.5, Gallager-Humblet-Spira paper Assume undirected graph (i.e., bidirectional communication) distinct edge weights size and diameter

More information

arxiv: v2 [cs.ds] 25 Jan 2017

arxiv: v2 [cs.ds] 25 Jan 2017 d-hop Dominating Set for Directed Graph with in-degree Bounded by One arxiv:1404.6890v2 [cs.ds] 25 Jan 2017 Joydeep Banerjee, Arun Das, and Arunabha Sen School of Computing, Informatics and Decision System

More information

The Event-B Modelling Notation

The Event-B Modelling Notation The Event-B Modelling Notation J.-R. Abrial October 2007 Version 1.5 The Event-B Modelling Notation Contents 1 Machines and Contexts 1 2 Events 2 3 Variant 3 4 Actions 3 5 Witnesses 4 6 Syntax of the Event-B

More information

Lecture 1: Introduction to distributed Algorithms

Lecture 1: Introduction to distributed Algorithms Distributed Algorithms M.Tech., CSE, 2016 Lecture 1: Introduction to distributed Algorithms Faculty: K.R. Chowdhary : Professor of CS Disclaimer: These notes have not been subjected to the usual scrutiny

More information

THE FIRST APPROXIMATED DISTRIBUTED ALGORITHM FOR THE MINIMUM DEGREE SPANNING TREE PROBLEM ON GENERAL GRAPHS. and

THE FIRST APPROXIMATED DISTRIBUTED ALGORITHM FOR THE MINIMUM DEGREE SPANNING TREE PROBLEM ON GENERAL GRAPHS. and International Journal of Foundations of Computer Science c World Scientific Publishing Company THE FIRST APPROXIMATED DISTRIBUTED ALGORITHM FOR THE MINIMUM DEGREE SPANNING TREE PROBLEM ON GENERAL GRAPHS

More information

4. (a) Draw the Petersen graph. (b) Use Kuratowski s teorem to prove that the Petersen graph is non-planar.

4. (a) Draw the Petersen graph. (b) Use Kuratowski s teorem to prove that the Petersen graph is non-planar. UPPSALA UNIVERSITET Matematiska institutionen Anders Johansson Graph Theory Frist, KandMa, IT 010 10 1 Problem sheet 4 Exam questions Solve a subset of, say, four questions to the problem session on friday.

More information

Distributed minimum spanning tree problem

Distributed minimum spanning tree problem Distributed minimum spanning tree problem Juho-Kustaa Kangas 24th November 2012 Abstract Given a connected weighted undirected graph, the minimum spanning tree problem asks for a spanning subtree with

More information

Foundations of Computer Science Spring Mathematical Preliminaries

Foundations of Computer Science Spring Mathematical Preliminaries Foundations of Computer Science Spring 2017 Equivalence Relation, Recursive Definition, and Mathematical Induction Mathematical Preliminaries Mohammad Ashiqur Rahman Department of Computer Science College

More information

Distributed Information System as a System of Asynchronous Concurrent Processes

Distributed Information System as a System of Asynchronous Concurrent Processes Distributed Information System as a System of Asynchronous Concurrent Processes Marek Rychlý Jaroslav Zendulka Department of Information Systems Faculty of Information Technology Brno University of Technology

More information

Formal specification in Event-B

Formal specification in Event-B 2IW80 Software specification and architecture Formal specification in Event-B Alexander Serebrenik, Ulyana Tikhonova Outline Introduction into formal specification Mathematical notation of Event-B Event-B

More information

A DISTRIBUTED SYNCHRONOUS ALGORITHM FOR MINIMUM-WEIGHT SPANNING TREES

A DISTRIBUTED SYNCHRONOUS ALGORITHM FOR MINIMUM-WEIGHT SPANNING TREES ISSN: 2778-5795 A DISTRIBUTED SYNCHRONOUS ALGORITHM FOR MINIMUM-WEIGHT SPANNING TREES Md. Mohsin Ali 1, Mst. Shakila Khan Rumi 2 1 Department of Computer Science, The University of Western Ontario, Canada

More information

Distributed Systems COMP 212. Lecture 1 Othon Michail

Distributed Systems COMP 212. Lecture 1 Othon Michail Distributed Systems COMP 212 Lecture 1 Othon Michail Course Information Lecturer: Othon Michail Office 2.14 Holt Building Module Website: http://csc.liv.ac.uk/~michailo/teaching/comp212 VITAL may be used

More information

Nondeterministic Query Algorithms

Nondeterministic Query Algorithms Journal of Universal Computer Science, vol. 17, no. 6 (2011), 859-873 submitted: 30/7/10, accepted: 17/2/11, appeared: 28/3/11 J.UCS Nondeterministic Query Algorithms Alina Vasilieva (Faculty of Computing,

More information

Software development using B method. Julien Cervelle LACL - UPEC

Software development using B method. Julien Cervelle LACL - UPEC Software development using B method Julien Cervelle LACL - UPEC Outline Introduction B abstract machine First order logic of set theory Substitutions Proof obligations Refinement Introduction B method

More information

These notes present some properties of chordal graphs, a set of undirected graphs that are important for undirected graphical models.

These notes present some properties of chordal graphs, a set of undirected graphs that are important for undirected graphical models. Undirected Graphical Models: Chordal Graphs, Decomposable Graphs, Junction Trees, and Factorizations Peter Bartlett. October 2003. These notes present some properties of chordal graphs, a set of undirected

More information

Verification of a Leader Election Protocol. M.C.A. Devillers, W.O.D. Griffioen, J.M.T. Romijn, F.W. Vaandrager. Computing Science Institute/

Verification of a Leader Election Protocol. M.C.A. Devillers, W.O.D. Griffioen, J.M.T. Romijn, F.W. Vaandrager. Computing Science Institute/ Verification of a Leader Election Protocol M.C.A. Devillers, W.O.D. Griffioen, J.M.T. Romijn, F.W. Vaandrager Computing Science Institute/ CSI-R9728 December 1997 Computing Science Institute Nijmegen Faculty

More information

CS 6783 (Applied Algorithms) Lecture 5

CS 6783 (Applied Algorithms) Lecture 5 CS 6783 (Applied Algorithms) Lecture 5 Antonina Kolokolova January 19, 2012 1 Minimum Spanning Trees An undirected graph G is a pair (V, E); V is a set (of vertices or nodes); E is a set of (undirected)

More information

The Needham-Schroeder-Lowe Protocol with Event-B

The Needham-Schroeder-Lowe Protocol with Event-B The Needham-Schroeder-Lowe Protocol with Event-B J.R. Abrial 1 1 Introduction This text contains the formal development (with proofs) of the Needham-Schroeder-Lowe Protocol [1] [2] using Event-B [3] and

More information

Triple Connected Domination Number of a Graph

Triple Connected Domination Number of a Graph International J.Math. Combin. Vol.3(2012), 93-104 Triple Connected Domination Number of a Graph G.Mahadevan, Selvam Avadayappan, J.Paulraj Joseph and T.Subramanian Department of Mathematics Anna University:

More information

Byzantine Consensus in Directed Graphs

Byzantine Consensus in Directed Graphs Byzantine Consensus in Directed Graphs Lewis Tseng 1,3, and Nitin Vaidya 2,3 1 Department of Computer Science, 2 Department of Electrical and Computer Engineering, and 3 Coordinated Science Laboratory

More information

The Dynamic Hungarian Algorithm for the Assignment Problem with Changing Costs

The Dynamic Hungarian Algorithm for the Assignment Problem with Changing Costs The Dynamic Hungarian Algorithm for the Assignment Problem with Changing Costs G. Ayorkor Mills-Tettey Anthony Stentz M. Bernardine Dias CMU-RI-TR-07-7 July 007 Robotics Institute Carnegie Mellon University

More information

M. De Wulf, L. Doyen,J.-F. Raskin Université Libre de Bruxelles Centre Fédéré en Vérification

M. De Wulf, L. Doyen,J.-F. Raskin Université Libre de Bruxelles Centre Fédéré en Vérification Systematic Implementation of Real-Time Models M. De Wulf, L. Doyen,J.-F. Raskin Université Libre de Bruxelles Centre Fédéré en Vérification Model-based Development for Controllers Make a model of the environment

More information

Lecture-12: Closed Sets

Lecture-12: Closed Sets and Its Examples Properties of Lecture-12: Dr. Department of Mathematics Lovely Professional University Punjab, India October 18, 2014 Outline Introduction and Its Examples Properties of 1 Introduction

More information

Chapter 4. Relations & Graphs. 4.1 Relations. Exercises For each of the relations specified below:

Chapter 4. Relations & Graphs. 4.1 Relations. Exercises For each of the relations specified below: Chapter 4 Relations & Graphs 4.1 Relations Definition: Let A and B be sets. A relation from A to B is a subset of A B. When we have a relation from A to A we often call it a relation on A. When we have

More information

Graphs and Network Flows IE411. Lecture 13. Dr. Ted Ralphs

Graphs and Network Flows IE411. Lecture 13. Dr. Ted Ralphs Graphs and Network Flows IE411 Lecture 13 Dr. Ted Ralphs IE411 Lecture 13 1 References for Today s Lecture IE411 Lecture 13 2 References for Today s Lecture Required reading Sections 21.1 21.2 References

More information

CSE101: Design and Analysis of Algorithms. Ragesh Jaiswal, CSE, UCSD

CSE101: Design and Analysis of Algorithms. Ragesh Jaiswal, CSE, UCSD Recap. Growth rates: Arrange the following functions in ascending order of growth rate: n 2 log n n log n 2 log n n/ log n n n Introduction Algorithm: A step-by-step way of solving a problem. Design of

More information

Design and Analysis of Algorithms

Design and Analysis of Algorithms Design and Analysis of Algorithms CS 5311 Lecture 19 Topological Sort Junzhou Huang, Ph.D. Department of Computer Science and ngineering CS5311 Design and Analysis of Algorithms 1 Topological Sort Want

More information

Formal Model. Figure 1: The target concept T is a subset of the concept S = [0, 1]. The search agent needs to search S for a point in T.

Formal Model. Figure 1: The target concept T is a subset of the concept S = [0, 1]. The search agent needs to search S for a point in T. Although this paper analyzes shaping with respect to its benefits on search problems, the reader should recognize that shaping is often intimately related to reinforcement learning. The objective in reinforcement

More information

Decision Procedures for Recursive Data Structures with Integer Constraints

Decision Procedures for Recursive Data Structures with Integer Constraints Decision Procedures for Recursive Data Structures with Ting Zhang, Henny B Sipma, Zohar Manna Stanford University tingz,sipma,zm@csstanfordedu STeP Group, June 29, 2004 IJCAR 2004 - p 1/31 Outline Outline

More information

Software Testing IV. Prof. Dr. Holger Schlingloff. Humboldt-Universität zu Berlin

Software Testing IV. Prof. Dr. Holger Schlingloff. Humboldt-Universität zu Berlin Software Testing IV Prof. Dr. Holger Schlingloff Humboldt-Universität zu Berlin and Fraunhofer Institute of Computer Architecture and Software Technology FIRST Outline of this Lecture Series 2006/11/24:

More information

Degree Equitable Domination Number and Independent Domination Number of a Graph

Degree Equitable Domination Number and Independent Domination Number of a Graph Degree Equitable Domination Number and Independent Domination Number of a Graph A.Nellai Murugan 1, G.Victor Emmanuel 2 Assoc. Prof. of Mathematics, V.O. Chidambaram College, Thuthukudi-628 008, Tamilnadu,

More information

Event B Development of a Synchronous AADL Scheduler

Event B Development of a Synchronous AADL Scheduler Available online at www.sciencedirect.com Electronic Notes in Theoretical Computer Science 280 (2011) 23 33 www.elsevier.com/locate/entcs Event B Development of a Synchronous AADL Scheduler Jean-Paul Bodeveix

More information

Lecture 1: Examples, connectedness, paths and cycles

Lecture 1: Examples, connectedness, paths and cycles Lecture 1: Examples, connectedness, paths and cycles Anders Johansson 2011-10-22 lör Outline The course plan Examples and applications of graphs Relations The definition of graphs as relations Connectedness,

More information

A Test Case Generation Algorithm for Real-Time Systems

A Test Case Generation Algorithm for Real-Time Systems A Test Case Generation Algorithm for Real-Time Systems Anders Hessel and Paul Pettersson Department of Information Technology Uppsala University, P.O. Box 337 SE-751 05 Uppsala, Sweden {hessel,paupet}@it.uu.se

More information

Learning Automata Based Algorithms for Finding Minimum Weakly Connected Dominating Set in Stochastic Graphs

Learning Automata Based Algorithms for Finding Minimum Weakly Connected Dominating Set in Stochastic Graphs Learning Automata Based Algorithms for Finding Minimum Weakly Connected Dominating Set in Stochastic Graphs Javad Akbari Torkestani Department of Computer Engineering, Islamic Azad University, Arak Branch,

More information

Introduction to Mathematical Programming IE406. Lecture 16. Dr. Ted Ralphs

Introduction to Mathematical Programming IE406. Lecture 16. Dr. Ted Ralphs Introduction to Mathematical Programming IE406 Lecture 16 Dr. Ted Ralphs IE406 Lecture 16 1 Reading for This Lecture Bertsimas 7.1-7.3 IE406 Lecture 16 2 Network Flow Problems Networks are used to model

More information

Self Stabilization. CS553 Distributed Algorithms Prof. Ajay Kshemkalyani. by Islam Ismailov & Mohamed M. Ali

Self Stabilization. CS553 Distributed Algorithms Prof. Ajay Kshemkalyani. by Islam Ismailov & Mohamed M. Ali Self Stabilization CS553 Distributed Algorithms Prof. Ajay Kshemkalyani by Islam Ismailov & Mohamed M. Ali Introduction There is a possibility for a distributed system to go into an illegitimate state,

More information

SERGEI OBIEDKOV LEARNING HORN FORMULAS WITH QUERIES

SERGEI OBIEDKOV LEARNING HORN FORMULAS WITH QUERIES SERGEI OBIEDKOV LEARNING HORN FORMULAS WITH QUERIES SUPERVISED LEARNING Input: a training set divided into (for example) two classes w.r.t. a certain target property. positive examples negative examples

More information

Reconstruction of Filament Structure

Reconstruction of Filament Structure Reconstruction of Filament Structure Ruqi HUANG INRIA-Geometrica Joint work with Frédéric CHAZAL and Jian SUN 27/10/2014 Outline 1 Problem Statement Characterization of Dataset Formulation 2 Our Approaches

More information

(1) fî fî = 0. If the vector (tpx,...,tpk) is nonzero then it gives the homogeneous coordinates

(1) fî fî = 0. If the vector (tpx,...,tpk) is nonzero then it gives the homogeneous coordinates transactions of the american mathematical society Volume 314, Number 2, August 1989 A PICARD THEOREM WITH AN APPLICATION TO MINIMAL SURFACES PETER HALL Abstract. We prove a Picard theorem for holomorphic

More information

Lecture 2. Decidability and Verification

Lecture 2. Decidability and Verification Lecture 2. Decidability and Verification model temporal property Model Checker yes error-trace Advantages Automated formal verification, Effective debugging tool Moderate industrial success In-house groups:

More information

Distributed Systems COMP 212. Lecture 1 Othon Michail

Distributed Systems COMP 212. Lecture 1 Othon Michail Distributed Systems COMP 212 Lecture 1 Othon Michail Course Information Lecturer: Othon Michail Office 2.14 Holt Building http://csc.liv.ac.uk/~michailo/teaching/comp2 12 Structure 30 Lectures + 10 lab

More information

Data Analytics and Boolean Algebras

Data Analytics and Boolean Algebras Data Analytics and Boolean Algebras Hans van Thiel November 28, 2012 c Muitovar 2012 KvK Amsterdam 34350608 Passeerdersstraat 76 1016 XZ Amsterdam The Netherlands T: + 31 20 6247137 E: hthiel@muitovar.com

More information

Network Design and Optimization course

Network Design and Optimization course Effective maximum flow algorithms Modeling with flows Network Design and Optimization course Lecture 5 Alberto Ceselli alberto.ceselli@unimi.it Dipartimento di Tecnologie dell Informazione Università degli

More information

Range Reporting. Range Reporting. Range Reporting Problem. Applications

Range Reporting. Range Reporting. Range Reporting Problem. Applications Philip Bille Problem problem. Preprocess at set of points P R 2 to support report(x1, y1, x2, y2): Return the set of points in R P, where R is rectangle given by (x1, y1) and (x2, y2). Applications Relational

More information

Generating edge covers of path graphs

Generating edge covers of path graphs Generating edge covers of path graphs J. Raymundo Marcial-Romero, J. A. Hernández, Vianney Muñoz-Jiménez and Héctor A. Montes-Venegas Facultad de Ingeniería, Universidad Autónoma del Estado de México,

More information

INTEGRATION OF AUTOMATIC THEOREM PROVERS IN EVENT-B PATTERNS

INTEGRATION OF AUTOMATIC THEOREM PROVERS IN EVENT-B PATTERNS INTEGRATION OF AUTOMATIC THEOREM PROVERS IN EVENT-B PATTERNS Eman Elsayed 1, Gaber El-Sharawy 2 and Enas El-Sharawy 3 123 Faculty of Science(girls), Al-Azhar University, Cairo, Egypt emankaram10@azhar.ed.eg,

More information

Lecture 19 Thursday, March 29. Examples of isomorphic, and non-isomorphic graphs will be given in class.

Lecture 19 Thursday, March 29. Examples of isomorphic, and non-isomorphic graphs will be given in class. CIS 160 - Spring 2018 (instructor Val Tannen) Lecture 19 Thursday, March 29 GRAPH THEORY Graph isomorphism Definition 19.1 Two graphs G 1 = (V 1, E 1 ) and G 2 = (V 2, E 2 ) are isomorphic, write G 1 G

More information

User Manual of the RODIN Platform

User Manual of the RODIN Platform User Manual of the RODIN Platform October 2007 Version 2.3 User Manual of the RODIN Platform Contents 1 Project 1 1.1 Project Constituents and Relationships........................... 1 1.2 The Project

More information

Abstract. 1 Introduction

Abstract. 1 Introduction Designing Efficient Distributed Algorithms Using Sampling Techniques S. Rajasekaran and D.S.L. Wei University of Florida and University of Aizu Abstract In this paper we show the power of sampling techniques

More information

Finding Deadlocks of Event-B Models by Constraint Solving

Finding Deadlocks of Event-B Models by Constraint Solving B 2011 June 21st, 2011, Limerick, Ireland Finding Deadlocks of Event-B Models by Constraint Solving Stefan Hallerstede, Michael Leuschel Institut für Informatik, Universität Düsseldorf Universitätsstr.

More information

The Needham-Schroeder-Lowe Protocol with Event-B

The Needham-Schroeder-Lowe Protocol with Event-B The Needham-Schroeder-Lowe Protocol with Event-B (February 2011) (version 4) J.R. Abrial 1 1 Introduction This text contains the formal development (with proofs) of the Needham-Schroeder-Lowe Protocol

More information

AMS /672: Graph Theory Homework Problems - Week V. Problems to be handed in on Wednesday, March 2: 6, 8, 9, 11, 12.

AMS /672: Graph Theory Homework Problems - Week V. Problems to be handed in on Wednesday, March 2: 6, 8, 9, 11, 12. AMS 550.47/67: Graph Theory Homework Problems - Week V Problems to be handed in on Wednesday, March : 6, 8, 9,,.. Assignment Problem. Suppose we have a set {J, J,..., J r } of r jobs to be filled by a

More information

Review of Sets. Review. Philippe B. Laval. Current Semester. Kennesaw State University. Philippe B. Laval (KSU) Sets Current Semester 1 / 16

Review of Sets. Review. Philippe B. Laval. Current Semester. Kennesaw State University. Philippe B. Laval (KSU) Sets Current Semester 1 / 16 Review of Sets Review Philippe B. Laval Kennesaw State University Current Semester Philippe B. Laval (KSU) Sets Current Semester 1 / 16 Outline 1 Introduction 2 Definitions, Notations and Examples 3 Special

More information

1. Lecture notes on bipartite matching

1. Lecture notes on bipartite matching Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans February 5, 2017 1. Lecture notes on bipartite matching Matching problems are among the fundamental problems in

More information

A Note On The Sparing Number Of The Sieve Graphs Of Certain Graphs

A Note On The Sparing Number Of The Sieve Graphs Of Certain Graphs Applied Mathematics E-Notes, 15(015), 9-37 c ISSN 1607-510 Available free at mirror sites of http://www.math.nthu.edu.tw/ amen/ A Note On The Sparing Number Of The Sieve Graphs Of Certain Graphs Naduvath

More information

Graphs and Network Flows IE411. Lecture 21. Dr. Ted Ralphs

Graphs and Network Flows IE411. Lecture 21. Dr. Ted Ralphs Graphs and Network Flows IE411 Lecture 21 Dr. Ted Ralphs IE411 Lecture 21 1 Combinatorial Optimization and Network Flows In general, most combinatorial optimization and integer programming problems are

More information

Reasoning about modules: data refinement and simulation

Reasoning about modules: data refinement and simulation Reasoning about modules: data refinement and simulation David Naumann naumann@cs.stevens-tech.edu Stevens Institute of Technology Naumann - POPL 02 Java Verification Workshop p.1/17 Objectives of talk

More information

Module 14: Approaches to Control Flow Analysis Lecture 27: Algorithm and Interval. The Lecture Contains: Algorithm to Find Dominators.

Module 14: Approaches to Control Flow Analysis Lecture 27: Algorithm and Interval. The Lecture Contains: Algorithm to Find Dominators. The Lecture Contains: Algorithm to Find Dominators Loop Detection Algorithm to Detect Loops Extended Basic Block Pre-Header Loops With Common eaders Reducible Flow Graphs Node Splitting Interval Analysis

More information

Section 3.1: Nonseparable Graphs Cut vertex of a connected graph G: A vertex x G such that G x is not connected. Theorem 3.1, p. 57: Every connected

Section 3.1: Nonseparable Graphs Cut vertex of a connected graph G: A vertex x G such that G x is not connected. Theorem 3.1, p. 57: Every connected Section 3.1: Nonseparable Graphs Cut vertex of a connected graph G: A vertex x G such that G x is not connected. Theorem 3.1, p. 57: Every connected graph G with at least 2 vertices contains at least 2

More information

On the construction of convergent transfer subgraphs in general labeled directed graphs

On the construction of convergent transfer subgraphs in general labeled directed graphs On the construction of convergent transfer subgraphs in general labeled directed graphs 38th CGTC 7 March 2007 Christopher League * Mohammed Ghriga First, I ll explain what we mean by Convergent Transfer

More information

Deterministic Communication

Deterministic Communication University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Rebecca Hicks Date: January 9, 2012 LECTURE 1 Deterministic Communication This lecture is a

More information

Strong I/O Lower Bounds for Binomial and FFT Computation Graphs

Strong I/O Lower Bounds for Binomial and FFT Computation Graphs Strong I/O Lower Bounds for Binomial and FFT Computation Graphs Desh Ranjan Old Dominion University, Norfolk, Virginia 23529 Email: dranjan@cs.odu.edu John Savage Brown University,Providence, Rhode Island

More information

1. Lecture notes on bipartite matching February 4th,

1. Lecture notes on bipartite matching February 4th, 1. Lecture notes on bipartite matching February 4th, 2015 6 1.1.1 Hall s Theorem Hall s theorem gives a necessary and sufficient condition for a bipartite graph to have a matching which saturates (or matches)

More information

Theoretical Foundations of Clustering. Margareta Ackerman

Theoretical Foundations of Clustering. Margareta Ackerman Theoretical Foundations of Clustering Margareta Ackerman The Theory-Practice Gap Clustering is one of the most widely used tools for exploratory data analysis. Identifying target markets Constructing phylogenetic

More information

MATH 54 - LECTURE 10

MATH 54 - LECTURE 10 MATH 54 - LECTURE 10 DAN CRYTSER The Universal Mapping Property First we note that each of the projection mappings π i : j X j X i is continuous when i X i is given the product topology (also if the product

More information

Texture Similarity Measure. Pavel Vácha. Institute of Information Theory and Automation, AS CR Faculty of Mathematics and Physics, Charles University

Texture Similarity Measure. Pavel Vácha. Institute of Information Theory and Automation, AS CR Faculty of Mathematics and Physics, Charles University Texture Similarity Measure Pavel Vácha Institute of Information Theory and Automation, AS CR Faculty of Mathematics and Physics, Charles University What is texture similarity? Outline 1. Introduction Julesz

More information

5. Lecture notes on matroid intersection

5. Lecture notes on matroid intersection Massachusetts Institute of Technology Handout 14 18.433: Combinatorial Optimization April 1st, 2009 Michel X. Goemans 5. Lecture notes on matroid intersection One nice feature about matroids is that a

More information

Cost distribution of the Chang Roberts leader election algorithm and related problems

Cost distribution of the Chang Roberts leader election algorithm and related problems Theoretical Computer Science 369 (2006) 442 447 www.elsevier.com/locate/tcs Note Cost distribution of the Chang Roberts leader election algorithm and related problems Wei-Mei Chen,1 Department of Electronic

More information

T Seminar on Theoretical Computer Science Spring 2007 Distributed Computation. Constructing a spanning tree Toni Kylmälä

T Seminar on Theoretical Computer Science Spring 2007 Distributed Computation. Constructing a spanning tree Toni Kylmälä T-79.4001 Seminar on Theoretical Computer Science Spring 2007 Distributed Computation Constructing a spanning tree Toni Kylmälä toni.kylmala@tkk.fi 1 Spanning tree To construct a spanning tree we must

More information

Lower bound for comparison-based sorting

Lower bound for comparison-based sorting COMP3600/6466 Algorithms 2018 Lecture 8 1 Lower bound for comparison-based sorting Reading: Cormen et al, Section 8.1 and 8.2 Different sorting algorithms may have different running-time complexities.

More information

Connecting face hitting sets in planar graphs

Connecting face hitting sets in planar graphs Connecting face hitting sets in planar graphs Pascal Schweitzer and Patrick Schweitzer Max-Planck-Institute for Computer Science Campus E1 4, D-66123 Saarbrücken, Germany pascal@mpi-inf.mpg.de University

More information

Have we Learned from the Vasa Disaster?

Have we Learned from the Vasa Disaster? Have we Learned from the Vasa Disaster? Jean-Raymond Abrial ETH Zurich September 19th 2006 The Vasa Disaster 1 The Story 2 - August 10, 1628: The Swedish warship Vasa sank. - This was her maiden voyage.

More information

Graph Algorithms Using Depth First Search

Graph Algorithms Using Depth First Search Graph Algorithms Using Depth First Search Analysis of Algorithms Week 8, Lecture 1 Prepared by John Reif, Ph.D. Distinguished Professor of Computer Science Duke University Graph Algorithms Using Depth

More information

Software Engineering of Robots

Software Engineering of Robots Software Engineering of Robots Ana Cavalcanti Jon Timmis, Jim Woodcock Wei Li, Alvaro Miyazawa, Pedro Ribeiro University of York December 2015 Overview One of UK eight great technologies: robotics and

More information

An Efficient Silent Self-Stabilizing Algorithm for 1-Maximal Matching in Anonymous Network

An Efficient Silent Self-Stabilizing Algorithm for 1-Maximal Matching in Anonymous Network An Efficient Silent Self-Stabilizing Algorithm for 1-Maximal Matching in Anonymous Network Yuma Asada and Michiko Inoue Nara Institute of Science and Technology, 8916-5 Takayama, Ikoma, NARA 630-0192 JAPAN,

More information

Constraint Programming. Global Constraints. Amira Zaki Prof. Dr. Thom Frühwirth. University of Ulm WS 2012/2013

Constraint Programming. Global Constraints. Amira Zaki Prof. Dr. Thom Frühwirth. University of Ulm WS 2012/2013 Global Constraints Amira Zaki Prof. Dr. Thom Frühwirth University of Ulm WS 2012/2013 Amira Zaki & Thom Frühwirth University of Ulm Page 1 WS 2012/2013 Overview Classes of Constraints Global Constraints

More information

The self-minor conjecture for infinite trees

The self-minor conjecture for infinite trees The self-minor conjecture for infinite trees Julian Pott Abstract We prove Seymour s self-minor conjecture for infinite trees. 1. Introduction P. D. Seymour conjectured that every infinite graph is a proper

More information

Self-Recovering Sensor-Actor Networks

Self-Recovering Sensor-Actor Networks Self-Recovering Sensor-Actor Networks Maryam Kamali, Linas Laibinis, Luigia Petre, Kaisa Sere IT-Department, Åbo Akademi University, Turku, Finland {maryam.kamali,linas.laibinis,luigia.petre,kaisa.sere}@abo.fi

More information

Towards A Formal Theory of On Chip Communications in the ACL2 Logic

Towards A Formal Theory of On Chip Communications in the ACL2 Logic (c) Julien Schmaltz, ACL2 2006, San José August 15-16 p. 1/37 Towards A Formal Theory of On Chip Communications in the ACL2 Logic Julien Schmaltz Saarland University - Computer Science Department Saarbrücken,

More information

A Mechanism for Sequential Consistency in a Distributed Objects System

A Mechanism for Sequential Consistency in a Distributed Objects System A Mechanism for Sequential Consistency in a Distributed Objects System Cristian Ţăpuş, Aleksey Nogin, Jason Hickey, and Jerome White California Institute of Technology Computer Science Department MC 256-80,

More information

Distributed Leader Election Algorithms in Synchronous Networks

Distributed Leader Election Algorithms in Synchronous Networks Distributed Leader Election Algorithms in Synchronous Networks Mitsou Valia National Technical University of Athens School of Applied Mathematics and Physics 1/66 Distributed Computing Distributed computing

More information

Petri Nets ee249 Fall 2000

Petri Nets ee249 Fall 2000 Petri Nets ee249 Fall 2000 Marco Sgroi Most slides borrowed from Luciano Lavagno s lecture ee249 (1998) 1 Models Of Computation for reactive systems Main MOCs: Communicating Finite State Machines Dataflow

More information

A Mechanically and Incremental Development of the Remote Authentication Dial-In User Service Protocol

A Mechanically and Incremental Development of the Remote Authentication Dial-In User Service Protocol A Mechanically and Incremental Development of the Remote Authentication Dial-In User Service Protocol Sanae El Mimouni, Rajaa Filali, Anas Amamou, Bahija Boulamaat and Mohamed Bouhdadi Abstract The Remote

More information

Loopy Belief Propagation

Loopy Belief Propagation Loopy Belief Propagation Research Exam Kristin Branson September 29, 2003 Loopy Belief Propagation p.1/73 Problem Formalization Reasoning about any real-world problem requires assumptions about the structure

More information

Implementing I/O-Automaton Specifications on Erlang

Implementing I/O-Automaton Specifications on Erlang SCIS & ISIS 2010, Dec. 8-12, 2010, Okayama Convention Center, Okayama, Japan Implementing I/O-Automaton Specifications on Erlang Yoshinobu Kawabe and Jun Zhao Department of Information Science Aichi Institute

More information

Formal Verification of Distributed Transaction Execution in Replicated Database System using Event - B

Formal Verification of Distributed Transaction Execution in Replicated Database System using Event - B Formal Verification of Distributed Transaction Execution in Replicated Database System using Event - B Pooja Sharma Pranveer Singh Institute of Technology, Kanpur, U.P. (208020) U.P.T.U., Lucknow Raghuraj

More information

Chapter 9 Graph Algorithms

Chapter 9 Graph Algorithms Chapter 9 Graph Algorithms 2 Introduction graph theory useful in practice represent many real-life problems can be if not careful with data structures 3 Definitions an undirected graph G = (V, E) is a

More information

CSc Leader Election

CSc Leader Election CSc72010 Leader Election Reading Skim 3.5 Read 3.6, General synchronous networks Read 4.1 Leader election algorithms Lelann/Chang/Roberts: O(n) time complexity O(n 2 ) message complexity Hirschberg/Sinclair

More information

arxiv: v1 [math.co] 30 Nov 2015

arxiv: v1 [math.co] 30 Nov 2015 On connected degree sequences arxiv:1511.09321v1 [math.co] 30 Nov 2015 Jonathan McLaughlin Department of Mathematics, St. Patrick s College, Dublin City University, Dublin 9, Ireland Abstract This note

More information

Towards A Formally Verified Network-on-Chip

Towards A Formally Verified Network-on-Chip Towards A Formally Verified Network-on-Chip Tom van den Broek 1 Julien Schmaltz 12 1 Institute for Computing and Information Sciences Radboud University Nijmegen The Netherlands 2 School of Computer Science

More information

Integer Programming ISE 418. Lecture 7. Dr. Ted Ralphs

Integer Programming ISE 418. Lecture 7. Dr. Ted Ralphs Integer Programming ISE 418 Lecture 7 Dr. Ted Ralphs ISE 418 Lecture 7 1 Reading for This Lecture Nemhauser and Wolsey Sections II.3.1, II.3.6, II.4.1, II.4.2, II.5.4 Wolsey Chapter 7 CCZ Chapter 1 Constraint

More information

Greedy Algorithms 1. For large values of d, brute force search is not feasible because there are 2 d

Greedy Algorithms 1. For large values of d, brute force search is not feasible because there are 2 d Greedy Algorithms 1 Simple Knapsack Problem Greedy Algorithms form an important class of algorithmic techniques. We illustrate the idea by applying it to a simplified version of the Knapsack Problem. Informally,

More information

5 MST and Greedy Algorithms

5 MST and Greedy Algorithms 5 MST and Greedy Algorithms One of the traditional and practically motivated problems of discrete optimization asks for a minimal interconnection of a given set of terminals (meaning that every pair will

More information

Distributed Minimum Spanning Tree

Distributed Minimum Spanning Tree Distributed Minimum Spanning Tree Outline I. Introduction II. GHS algorithm (1983) III. Awerbuch algorithm (1987) IV. Other results Introduction Problem and Model Undirected G(N,E) asynchronous algorithm

More information

Clearly there is a close relation between the radius R and the diameter D of a graph, such as R D 2R.

Clearly there is a close relation between the radius R and the diameter D of a graph, such as R D 2R. Chapter 2 Tree Algorithms In this chapter we learn a few basic algorithms on trees, and how to construct trees in the first place so that we can run these (and other) algorithms. The good news is that

More information

Outline. Computer Science 331. Heap Shape. Binary Heaps. Heap Sort. Insertion Deletion. Mike Jacobson. HeapSort Priority Queues.

Outline. Computer Science 331. Heap Shape. Binary Heaps. Heap Sort. Insertion Deletion. Mike Jacobson. HeapSort Priority Queues. Outline Computer Science 33 Heap Sort Mike Jacobson Department of Computer Science University of Calgary Lectures #5- Definition Representation 3 5 References Mike Jacobson (University of Calgary) Computer

More information

Multicasting in the Hypercube, Chord and Binomial Graphs

Multicasting in the Hypercube, Chord and Binomial Graphs Multicasting in the Hypercube, Chord and Binomial Graphs Christopher C. Cipriano and Teofilo F. Gonzalez Department of Computer Science University of California, Santa Barbara, CA, 93106 E-mail: {ccc,teo}@cs.ucsb.edu

More information