# A CAL"CULUS OF FUNCTIONS FOR PROGRAM DERIVATION

Save this PDF as:

Size: px
Start display at page:

## Transcription

1 A CAL"CULUS OF FUNCTIONS FOR PROGRAM DERIVATION by Richard Bird Oxforo university Compullng Laboratory Programming Research Group-Library 8-11 Keble Road Oxford OX1 3QD Oxford (O~R Technical Monograph PRG-64 December 1987 Oxford University Computing Laboratory Programming Research Group 8-11 Keble Road Oxford OXI 3QD England

2 Rkhard Bird Oxford Uciversity Computing Laboratory Programming Research Group 8-11 Keble Road Oxford OX13QD England

3 A Calculus of Functions for Program Derivation R.S. Bird Programming Research Group, Oxford University.! 1. Introduction. This paper is about how to calculate programs. We introduce a n~ tation for describing functions, outline a calculus for manipulating functiondescriptions, and prove two general theorems for implementing certain functions efficiently. Like useful calculi in other branches of mathematicb, tbe calculus offunctions consists of a body of knowledge expre88ed as basic algebraic identities, technical lemmas and more general theorems. We illustrate the calculational approach to program construction by posing and Bolving a simple problem about coding sequences. In presenting this work we wish to argue: (i) that Borne, perhapb many, algorithma <:an be derived by procebb of systematic calculation from their specifications; (ii) that an appropriate framework for this activity can be baaed on notation for describing functions, notation that is wide enough to express both specifications and implementationsj (iii) that an effective calculus of program derivation must be built upon useful general theorems relating certain forolfl of expression to common patterns of computation, theorems that-in the main-we still lack. By way of motivation, we start in Section 2 by posing the problem we want to solve. The notational framework is introduced in Section 3. In that section we also state (mostly without proof) a number of simple algebraic laws about functions. In Section 4 we apply these laws to our example problem until we arrive at a point where a more substantial theorem is required. This theorem is stated, together with a second theorem, in Section 5. We believe that these two theorema are of the kind that will eventually prove important in establishing a useful calculus for program derivation. 2. Run-length encoding. The problem we will use to illustrate our approach is that of run-length encoding. The idea behind run-jength encoding is to represent a sequence of values (usually characters) in a compact form by coding each "run" of equal values by a pair consisting of the common value and the length of the 1 Addreu: 11 Keble Roa.d, Oxford, OXl 3QD, U.K. 1

4 run. For example, code "AABCCAAA" = [('A', 2), ('B', 1), ('C', 2), ('A', 3)1 The algorithm for computing code contains no surprises or subtleties. Our objective, however, is to derive the algorithm from its specification, using essentially the same kind of reasoning that a mathematician might employ in solving a problem in, say, formal integration. To specify code, consider the inverse function, decode. A sequence of pairs can be decoded by "expanding" each pair to a sequence of values, and concatenating the results. Given decode, we can specify (code z) as the shortest sequence of pairs that decodes to z. To make this idea precise, suppose we define the generalised inverse I-I of a function f by the equation r'z={wlfw=z} Using notation from [IJ (discussed further in the next section) we can now specify cod, as follows: code.. [0]... [(0, N+)J code =!II /. decode-' decode = */. ezpo ezp(a,n) = K. 0[1.. n] The first line of the specification gives the type of code as a function from lists of o:-values to lists of pairs, each pair consisting of an o:-value and a positive integer. The second line says that code is the functional composition of a function (!II /) that select. the shortest in a set of sequences, and the generalised inverse of decode. The third line defines decode as the composition ofa function (*/) that concatenates a list of lists together, and a function (<<po) that applies ezp to every element of a list. Finally, ezp (a, n) is obtained for a positive integer n by applying the constant-value function K. to each element of the list [1.. n], thereby giving a list of n copies of a. We shall return to this specification in Section 4. First we need to discuss notation in more detail, as well as introduce some of basic algebraic identities employed in the derivation. 3. Notation. Our notation i. basically that of [IJ (see also [4], [5] and 16]) with some additions and modifications. In particular, functions are curried, so function 2

5 application associates to the left, and simple function arguments are written without brackets. Lists and sets. We shall use square brackets "[" and "I" to denote lists, and braces "{" and "}" for sets. The symbol * denotes list concatenation and U denotes set union. The functions [.] and {o} return singleton lists and sets, respectively. Thus [,1 a = [a] {.}a = {a} To avoid clumsy subscripts, we shall use ao rather than Kg to describe the function that always returns the value a. In particular, []O denotes the function defined by the equation [J"a = [J A similar function for sets is used below. We use #z to denote the length of the list z (or the size of the set z). Selection. Suppose f is a numeric-valued function. The binary operator 1, selects its left or right argument, depending on which has the smaller I-value: z 1, II = z, If I z < I II = II, if I II < I z Unless f is an injective function on the domain of values of interest, the operator 1, is under-specified: if z # II but I z = I II, then the value of z 1, II is not specified (beyond the fact that it is one of z or II). example, the value "bye" 1* "all" is under-specified since both arguments have the same length. In order to reason about 1/ for arbitrary f, it is abbumed only that l, is associative, idempotent, commutative, selective, and minimising in the sense that l(zl,ii)=/ z 1l11 Here, 1 is used as an abbreviation for lid, where id is the identity function, and so selects the smaller of its two numeric arguments. The under-definedn... of 1, can be very useful in specifying problems in computation. If necebbary, Uties" can be resolved by imposing extra condi~ tions on I. By definition, a refinement of I is a function 9 that r.spects the For 3

6 ordering on values given by /, in the sense that Ix</y=?gx<gy but 9 may introduce further distinctions. (Here, =? denotes logical implication), Such refinements can always be introduced into a specification in order to ease the task of calculation, the only requirement being that the refinement must be recorded and must be consistent with all previous refinements, if any. (In both [lj and [6J, re5nements were recorded by uaing a special Bymbol, either... or ~. In the present paper, use of such signs is avoided; instead we stay strictly in the framework of equational reasoning, and make refinements explicit.) Conditionals. We shall use the McCarthy conditional form (p -+ I, g) to describe the function (p-+i,g)x = Ix, Ifpx = 9 x, otherwise For total predicates p we have the following well-known identity: h'(p-+i,g) = (p-+h'l,h'g) (1) Equation (1) is referred to 88 the "dot-condo law. Map. The operator 0 (pronounced "map") takes a function on its left and a list (or set) on its right. Informally, we have 1 0 [a" a2,..., an] = [I alol a2,".'/ an] with an analogous equation holding Cor sets. We can specify * over lists by the three equations 1 0 [J = [] 10 [a] =!f a] lo(x*y) Uox)*Uoy) These equations can also be expressed as identities between functions: 1 0 [)" = [J" (2) 10.[.J = [']'1 (3) 1 0 '*/ = */'Uo)o (4) 4

7 We will refer to (2) as the "map-empty law, to (3) as the "map-single" law, and to (4) as the "map-concat" law. Equstion (4) makes use of the reduetion operator I discussed helow. Similar equations hold for the definition of over sets. In particular, the analogue of (4) (in which -tt is replaced by u) is called the "map-union" law. [Note 0" sy"ta". In [IJ laws like the above were written with more brackets. For example, the map-concat law---called "'map promotion" in [I)-was written (t.). (-ttl) = (*I)' ((t.).) In the present paper we avoid these additional brackets hy assuming functional composition (.) has lowest precedence.i Another useful identity is provided by the fact that. distributes over functional composition-the "dot.map" law: (t.g). = f g (5) Reduce. The reduction operator I takes a binary operator (Il on its left, and a list (or set) on its right. Informally, we have (Il/[a., ""...,...1= a. (Il a. (Il... (Il an More formally, we can specify (ilion non-empty lists by the equations (Il/la] = a (Il/(z * y) = ((Il/z) (Il ((Illy) For the second equation to be unambiguous we require that EEl be an associative operator (because * is). These equations can also be expressed as functional identities (the "reduce-single" and "reduce--concat" Jaws): (Ill [,1 = id (6) (Il/ *I = (Il/'(Il/' (7) Similarly, we can define EB/ over non-empty sets by the equations (Il/{a} = a (Il/(z U y) = ((Il/z)(Il ((Illy) 5

8 In particular, the function level equivalent of the second equation is the "reduce-union" law: ffj/ ul = ffj/ ffji (8) In order for the application of e/ to a set to be unambiguous, we require EB to be an associative, commutative and idempotent operator (because u is). For example, ffj/z =ffj/(z u z) =(ffj/z) ffj (ffj/z) and so e must be idempotent. Since!! has these three properties, we can reduce with it over both sets and lists. In particular, we have the "shortestmap" law: L* I.(J.). = f L* I (9) Identity elements. If EB has an identity element e, then we can also define ffj/[j= ffj/{} = e Equivalently, the "reduce-empty" laws says ffj/ [I' = e' (10) It is often useful to invent "fictitious" identity elements for operators that do not possess them. For example, we introduce w as the fictitious identity element of L*: thus L*IO = w Provided certain care is taken, fictitious identity elements can always be adjoined to a domain (oee [IJ for a more complete discussion). HOInomorphlsms. Functions of the form ffji.f. describe homomorphisms over lists (or sets), and are discu..ed in [11 (s.. also [3]). There are three particular homomorphisms that will be needed below: generalised conjunction, filter, and cartesian prcxluct. (i) Generalised conjunction. For a boolean-va.iued function p we define all p by the equation all p = /\1. p' 6

9 where 1\ denotes logical conjunction. Thus (all p x) returns true if every element of the list (or set) z satisfies p, and false otherwise. One simple law ("all-and") is all (p 1\ q) = all p 1\ all q (11) (ii) Filter. The operator ~ (pronounced "filter") is defined for sets by the equation p~=u/.(p~ {-},{}O)' Thus, (p <l) is a homomorphism on sets. A similar equation holds for lists. In effect, (p ~ z) returns the subset of elements of z that satisfy p. This subset is obtained by replacing each element a of z by {a} if p a holds, or { } if p a does not hold, and taking the union of the resulting set of sets. The "filter-union" law says that p ~.u/ = u;'(p~). (12) The following proof of this result shows the way we shall layout the steps of a calculation: as required. D p ~.u/ =: definition of <l u/. (p ~ {-},{}O). u/ map-union (4) u/.u/. ((p ~ {.), { }O).). reduce-union (8) u/.u/.((p ~ {-}, { }O).). dot-map (5) u/. (u/. ((p ~ {-}, { }O).). definition of <l u/ (p~). For total predicates p and q, we have the "and-filter" law: (pl\q)~ = P~'q~ (13) Another identity ("reduce-cond") involving <l is as follows. Suppose ED has identity elemen t e, then (fj/ (p~f,eo). = (fj/'f"p~ (14) 1

10 Here is the proof: fij/'/"p<j definition of <J fiji /. * I. (p --+ ['), []O). = map-concat (4) fiji *1 (I.). (p --+ [.J, [JO). = reduce-concat (7) fiji fiji'.(1.). (p --+ [.J, [)O). dot-map (5) fiji (fiji (I.). (p --+ [.), [JO)). dot-cond (1) fiji (p --+ fiji /. [.J, fiji /.[)0)* Now we argue that and also that fij/ /, [.) = map-single (3) fiji [.)./ = reduce-single (6) / fiji /. [Jo map-empty (2) fiji. []O reduce-empty (10) eo completing the calculation. 0 (iii) Cart,";an product. The third homomorphism is a function cp (short for ucartesian product") with type cp:: [{a}) --+ {[an Thus, the cartesian product of a list of sets is a set of lists. Informally we have cp [S" S"...,S.I = {[ai, a"...,..) I aj f Sj} Formally we can define cp as the homomorphism cp = * 1 ([.J.). 8

11 S*OT= {z*y I z es; yet} Note that *0 is an a.ssociative operator. For example, we can calculate cp [{a,6},{e},{d,e}] *o/[{[a], [6]}, {Ie]}, {[d], [e]}] = {[a],lb]} *O{[e]} *0 {[dj, [e]} = {[a, e, d], [a, e, e], [6, e, d], [6, e, d]} Two identities involving cp are the "cp-single" and "cp-cond" laws: ep Oo = {.} (15) ep' (p --+ /, no)o = (all p --+ ep '/0, no) (16) In effect, the first law says that the cartesian product of a list of singleton sets is a singleton set, while the second law says-in part-that if any set in the argument list is empty, then so is the cartesian product. Generalised inverse. by The generalised inverse of a function I is defined ria = {61/6 = a} The "dot-inverse" and.<imap-inverse" laws are We give a proof of (17): as required. 0 (/. g)-i u/ go -I /-1 (17) (/0)-1 ep./-1 0 (18) (/. g)-i a definition of inverse {6 I/(g 6) = a} == set theory u/{{6 I 9 6 = e} 1/ c = a} definition of inverse U/{g-I e 1/ e = a} == definition of * u/g-io{e 1/ e= a} definition of inverse U/g-I o/-ia 9

12 Partitions. Finally, we introduce a special case of generalised inverse. By definition, a partition of a list % is a decomposition of z into contiguous segments. A proper partition is a decomposition into non-empty segments. The (infinite) set of partitions of % is just (*/)-1%. The function parta, where paris = all (# []). (*/)-1 returns the (finite) set of proper partitions of a sequence. Two theorems about parts are given in Section Calculation of code. Using the identities given in the previous section, we can now begin to calculate an algorithm for lode. The derivation is almost entirely mechanical: at each step--with one or two minor exceptions-there is only one law that can be applied. where lode = definition of code!"1. decode- 1 = definition of decode!"i' (*1' e%p.)-1 = dot-inverse (17)!"I _ul _(e%p.)-i. _(*/)-1 = reduce-union (8)!,,;.!"I' _(e%p.)-i. _(*/)-1 = dot-map (5)!"I U"I' (e%p.)-i) "(*/)-1 introduction of /!"1-I. _(*/)-1 / =!"I. (e%p.)-1 The purpose of this last step is just to name the subexpression that will he the focus of future manipulation. Before calculating I, we first consider the function e%p-1 that will arise during the calculation. This function has values given by e%p-l%={(a,n)le%p(a,n)=%) For the set on the right to be non~emptyi we require that z is a non-empty list of duplicated values (Recall that n must he a positive integer). Suppose 10

13 we define (x 'I []) 1\ dup x nedup z dup x = all(=headx)x rep z (head x, #x) where head x returns the first element of the non-empty list x. It then follows that exp-1x = (nedup x --+ {repx},{}) or l expressed at the function level, that This equation is needed below. Now we return to calculating f: exp-l = (nedup --+ {-}. rep, {}O) f definition of f L# /. (exp_)-l map-inverse (18) L# /. cp exp-l_ definition of exp-l L# /. cp (nedup --+ {.}. rep, { }O)_ cp-cond (16) L# /. (all nedup --+ cp (0. rep)_, { }O) dot-cond (1) (all nedup --+L*/' cp (0 rep)_,)*/' {}O) = dot-map (5), and introducing w as the identity of)* (all nedup --+L*/ cp' {.} _.rep.,wo) = cp-single (15) (all nedup --+h/' {.}. rep_,wo) reduce-single (6) (all nedup --+ rep_, WO) 11

14 HavinR calculated I, we continue with the calculation of code: code = calculation so far L* /-/< _(*/)-1 = calculation of / L* /- (all n.dup ---> rep<,w") < _(*/)-1 = reduce-cond (14) L* /- (rep<) < -all n.dup <1_(*/)-1 shortest-map (9) rep < - L* / -all n.dup <I _( */)-1 definition of n.dup; all-and (ll); and-filter (13) rep < - L* /- all dup <1'011 (# []) <1.(*/)-1 = definition of parts rep < L* /. all dup. parts We ha.ve shown that cod. % = rep < L* / all dup <I parts % In worda l code % can be obtained by taking the shortest partition of % into non-empty segments of duplicated values, and representing each segment by its common value and its length. Expressed this way, the derived equation seems entirely reasonable, and might even have served as the specification of the problem. Unlike the original specification, the new definition of cod. is executable. The set parts % contains a finite number of elements (in fact, 2 n - 1 elements, if n > 0 is the length of %), and these can be enumerated, filtered, and the shortest taken. What we now need is a faster method for computing expressions of the above form, and for this we need to consider various algorithms for computing partititons. 5. Algorithms for partititons. Expressions of the form Ltlall p <I parts % arise in a number of applications. For example, in Borting by naturalmerging, the input is first divided into runs of non-decreasing values. The fudction runs which does this division can be expressed in the form runs % =L* / all nond«<l parts % 12

15 This reads: the shortest partititon of z, all of whose components are nondecreasing sequences. Similarly, the problem of filling a paragraph (see [2]) can b. expressed as a problem about partitions: fill m ws =L w jail (fits m) ~ parts ws This reads: the least wasteful (according to the waste function W) partition of a sequence of words ws, all of whose component segments (or Cllines") will fit on a line of given width m. There are numerous other examples (including, of course, code). This leads to the question: can we find ways of computing solutions to problems of the form LI fall p ~ parts z efficiently? The Greedy algorithm. partititon: Here is a "greedy algorithm for computing a greedy p z [), If z = [] [y] * greedy p (z ~ y), otherwise where y =i#jp~inits+z In this algorithm, the expression inits+ z denotes the list of non-empty initial segments of z, in increasing order of length, and (z ---,. y) is the sequence that remains when the initial segment y of z is deleted from z. The operator ----r is specified by the equation (u*.)~u=. for all sequences u and v. It is easy to see that, at each step, the greedy algorithm chooses the longest non-empty initial segment y of the remaining input z that satisfies the predicate p. In order for greedy to make progress, it is necessary to suppoee that p holds for [] and every singleton sequence at least. In this way a non-empty portion of the input is "consumed" at each step. There is a useful condition on p which enables the next segment y to be computed efficiently. Say p is prefix-closed if p(z*y) => pz 13

16 In words, if p holds for a sequence, then it holds for every initial segment of the sequence (including [D. Ifp is prefix-closed, then there exists a derivative function 6 such that For example, with p = dup we have and with p = non dec we have P (% * [all = p %/18 a % 8 a %= (% = [IlV(a = head%) 8 0%= (% = [Il V (labt %<:; a) where last x returns the last element of a non-empty sequence x. If p is prefix-closed, we can formulate the following version of the greedy algorithm: greedy p % = Bhunt [] % Bhunt y [] Bhunt y ([a] * %) = [] Bhunt (y * [an %, [y] * shunt [al %, if <5 a y otherwise This version is linear in the number of S-calculations. A related condition on p is that of being sutjix-closed, Le. p(%*y)*py If p is both prefix- and suffix-closed, then p is said to be segment-closed. For example, both dup and nondup are segment-closed. The suffix-closed condition arises in one of the theorems discussed below. Here is another algorithm for computing parti The Leory algorltjun. tions: leery f p % = I], if % = [] = if j{[yl * leery f p (% ~ y) I y f P ~ initb+%} otherwise This algorithm is a little more "careful" than the greedy algorithm (whence the name «leery"). At each stage, some initial segment y of x is chosen so that (i) y satisfies p; and (ii) f ([y] * yb) is as small as possihle, where yb is the result of adopting the same strategy on the rest of the input. Unlike the 14

17 greedy algorithm, the leery algorithm will not necessarily chao.. the longest initial segment of z satisfying p at each stage. The direct recursive implementation of leery is inefficient, since values of leery on tail segments of % will be recomputed many times. Instead, leery is better implemented by a dynamic-programming scheme that computes and stores the results of applying leery to all tsil segments of the input. In making a decision about the next component of the partition, these subsidiary results are then available without recomputation. We shall not, however, formulate the efficient version of leery here. We now state two theorems about the greedy and leery algorithms. For the first, we need the following definition. Definition 1 A function f, from sequences to numbers, is said to be prefixstable if f z ~ f V {} f ([a] * z) ~ f ([oj * V) for all a, z, and y. Equivalentlv, f is prefix-stable if for all a. 1/ /. ([01*)' = ([aj*) l/ / Theore= 1 (The Leery Theore=) Iff is prefix-stable, then 1/ / all p <1 parts z = leery f p z, provided p holds for [I and all singleton sequences. Proof. We shall need the following recursive definition of parts: parts [] = {[I} parts % u/subpart inits+ z if x 'I [I where subparts V = ([V]*). parts (z - V) We omit the proof that this definition of parts satisfies the specification Let 9 be defined by parts = all ('I [ll. (*/)-1 9z =1t1 all p <1 parts % The theorem is proved by showing that (J satisfies the recursive definition of leery. There are two cases to consider: 15

18 Case % = []. The derivation of 8[] = [J is straightforward and is omitted. Case % i [I. In the csse % f. [], we argue where Lr I all p " p.rts % definition of p.rts Lr I all p" U/subparts inits+ % = filter-union (12); reduce-union (8) Lr I Lr I' (.11 p") subparts. inits+ % dot-map (5) Lr!Ur!.1I p".subp.rts). inits+% = introduction of h Lr Ih. inits+% h y = Lr!.11 p" subp.rts y We continue by calculating h (note that h depends on %): Lr 1.11 p" subp.rts y = definition of subp.rts Lr I all p" ([y]*). p.rts (% - y) = property of all Lr I(p y ---> ([yl*) 11 p "p.rts (% ~ y), { }} = dot-cond (1) (p y --olr l([y]*) 11 p "p.rts (% ~ y), Lf I{}) prefix-stability (p y ---> [yj* Lr!.11 p" p.rts (% ~ y), LII{ }) = definition of 8 (py---> [y)*8(z-y),lr!{}) Finally, if we substitute the derived definition of h into the derived equation for 8 and apply the reduce-cond law, we obtain 8% = Lr!4>.p"inits+% where 4>y = [yj * 8(% ~ y) In other words, 8 satisfies the recursive definition of leery, completing the proof of the theorem. 0 16

19 Perhaps the simplest useful example of a prefix-stable function is the length function #. Another example is the function +/ that sums a list of numbers. However, prefix-stability is too strong a condition to be satsfied by commonly useful optimisation functions. Fortunately there is a weaker condition that can be artificially strengthened to give prefix-stability. Definition 2 A function f I prefix-stable if from sequences to numbers, 's said to be weakly for all x, yond a. f x ~ f y '* f ([a] * x) ~ f ([oj * y) For example, the function (t /) (where i selects the greater of its two numeric arguments) is weakly prefix-stable, but not prefix-stable. The proof of the following lemma, due to A.W. Roscoe, is given in an Appendix. Lemma 1 Suppa.. f :: [a] --+ Q is weakly prefix stable, where a contains a countable number 0/ elements} and Q denotes the rationals. Then there exists a prefix-stable function g :: [a) --+ Q that refines f. By using Lemma 1t we can therefore apply the Leery theorem in the case of a weakly prefix-stable function f. For the second theorem we need the following definition. Definition 3 A function f, from sequences (of seqences) to numbers, is greedy if both the following conditions hold for all z, y. z and s: f ([x * yj * s) < f ([z] * [y] * s) f Uz*yJ*[zJ*s) <f([zj*[y*zj*s) The first greedy condition says that shorter partitions have a smaller f value than longer ones; the second condition says that, for partitions of equal length, the longer the first component, tbe smaller is its f-value. Theore:rn 2 (The Greedy Theore:rn) If f is prefix-stable and greedy, and p is sutfiz-closed, then!// all p ~ parts z = greedy p x provided p holds for all singleton sequences. 17

20 ProDI. We show leery 1 p = greedy p. Abbreviating leery 1 p by 8, it suffices to prove that 1 (I:r * yl * 8z):s 1 ([:r] * 8(y * z)) for all:r, y and z, with equality only in the esse y = I]. In words, the longer the next component of the partition, the smaller is its I-va)ue. The proof is by induction on the length of y. The base case, #y = 0, is immediate. For the induction step, consider the value of 8(y * z). There are two possibilities: either 8(y*z) = [y*zd*8(z,) (case A) for some ZI I' [] and z" such that z = ZI * Z, and p (y * zil holds; or 8(y * z) = [y,] * 8(1h * z) (case B) for some Yl I' [] and Y2, such that y = Yl * 1h and p Yl holds; (This case includes the possibility that 1h = [].) In case A, we reason that p ZI holds, since P is suflix-closed, and so by definition of 8, 1 (8z) :s 1 ([ZI] * 8z,) Hence as required. In case B, we reason 1([:r*y)*8z) :s prefix-stability 1 ([z * yj * [zd * 6z,) < second greedy condition 1 ([:r] * Iy * ZI] * 6z,) case A 1 ([:r] * 8(y * z)) 1 ([:r * yj * 8z) case B: 1([:r*y'*1hJ*8z) :s induction hypothesis, as #1h < #!I 1 ([:r * y,] * 6(1h * z)) < first greedy condition 1 ([:r] * [VI] * 8(1h * z)) case B 1 ([:r] * 8(y * z)) 18

21 The length function # satisfies the first greedy condition, but not tbe second. AB with prefix-stability, there is a weaker version of the greedy condition that is sufficient to enable the Greedy theorem to be used. Definition <& Say / i8 weakly greedy i/ the greedy eondition8 hall when < is replaced by ~. Le=a 2 A weakly greedy /unctionhu a greedy refinement: Proof. Let / be weakly greedy. Define g by the rule g %8 < g Y8 if (J %8 < / Y8) V (J %8 = / Y811 #head %8> #head Y8) It is clear that g respects the ordering of / and is greedy Application. We give one application of the Greedy theorem. Since dup is suffix-closed (in fact, segment-closed), and # is weakly greedy, we bave that code = rep * greedy dup is a solution to the problem of run-length encoding. Acknowledgement8 Much of the calculus presented above was developed in collaboration with Lambert Meertens of the CWI, Amsterdam! to whom I am grateful for both support and friendship. I would like to thank Bill Roscoe, of the PRG, Oxford, who supplied the proof of Lemma 1 at a moment's notice. I am also grateful to Carroll Morgan and Tony Hoare for many enjoyable discussions on the proper role of refinement in a purely functional calculus. Reference. 1. Bird, R.S. An introduction to the theory oflists. Logic 0/ Programming and Calculi 0/ Di8crete Design, (edited by M. Broy), Springer-Verlag, (1981) Bird, R.S. Transformational programming and the paragraph problem. Science 0/ Computer Programming 6 (1986) lss

22 3. Bird, RS. and Hughes, RJ.M. The alpha-beta algorithm: an exercise in program transformation. Inf. Proc. Letter. 24 (1987) Bird, RS. and Meertens L.G.L.T Two exercises found in a book on algorithmics. Program SpeciMation and Transformation (edited by L.G.L.T Meertens), Nortb-Holland, (1987), Bird, RS. and WadIer, P. An Introduction to Functional Programming Prentice-Hall (to be published Spring-1988). 6. Meertens, L.G.L.T Algorithmics - towards programming... a mathematical activity. Prot. OWl Symp. on Mathematics and Computer Science, CWI Monographs, North-Holland, 1 (1986) Appendix: Proof of Lemma 1 The proofof Lemma 1 is by constructing an injective weakly prefix-stable function g. Such a function must also be prefix-stable. We argue this by contradiction. Suppose the implication fails to hold. In such a case 9 ([al* 0) ~ g([al*y) => gx ~ gy 9 ([al * 0) \$ 9 ([a] * y) 1\ go> 9 Y for Borne a, z and y. By assumption, 9 is weakly prefix-stable, 80 the above assertion implies g([al*x) ~ g([al*y)l\g([a)*y) ~ g([a}*x) However, since 9 is injective, it rohows that % = Y which contradicts the hypothesis. To construct 9, we suppose the finite sequences of [a] are enumerated in such a way that z precedes [a1* % for all a and z. Let this enumeration be denoted by {:to, x"...}. Furthermore, to avoid a subsequent appea to the Axiom of Choice, let {I'o, q"...} be some fixed enumeration of the (positive and negative) rationals Q. For the base case in the inductive construction of g) arbitrarily define 9 :to "" O. Note that :to "" []. Assume, by way of induction, that 9 %0,9 %1,,9 2;"-1

23 have so far been defined and that these distinct values satisfy all that is required of g. To determine 9 Z;, we partition {:r; I i < i} into three sets, any of which may be empty: A = {:r;jj<i/\!:r;<!z;} B = {zjli<i/\!:r;=!z;} C = {:r;li<i/\!zj>!z;} Because 9 preserves the ordering of!, the rational values assigned to 9 for arguments in A must precede those assigned to 9 for arguments in B, which must in turn precede those for arguments in C. Suppose Xi = [4] * %Jr:. By the given enumeration of sequences, we have k < i. Define the following two subsets of B: B, = {I a] * z/ I g:q < 9 Z.} B. = {I al * Z/ I 9 Z/ > 9 Z.} For Z f HI and Yl B: we have 9 z < 9 y, since--by induetion-g is injective and weakly prefix-stable on the values already defined. We now cboose 9 Z; to be the rational q, of least index in the given enumeration of QI such that q is greater than every element of g. (A U B,) and less than every element of 9 (C U B,). By construction we have, for i < i, that!zj<!z;~gzj<9z;!zj>!z;~gzj>gz; so the extended definition of 9 respects the ordering of!. We must also show that the extension of 9 maintains weak prefix-stablility. Supposing Z; = lal * z. and Zj = [a] *:q, where i < i, we need to show g:q<gz. ~ gzj>gz. ~ g:r;<9z; gzj>9z; Since! is weakly prefix-stable, and 9 respects!, we have Thus,! Z; <! Zj ~! z. <! z/ ~ 9 z. < 9 Z/ gz/<gz. ~ gz/<gz.ii!z;?'!zj => g%j < gx" by definition of 9 z;. The proof of the second part is similar. This completes the induction, and the proof of the lemma. 0 21

### Complexity Theory. Compiled By : Hari Prasad Pokhrel Page 1 of 20. ioenotes.edu.np

Chapter 1: Introduction Introduction Purpose of the Theory of Computation: Develop formal mathematical models of computation that reflect real-world computers. Nowadays, the Theory of Computation can be

### Natural Numbers. We will use natural numbers to illustrate several ideas that will apply to Haskell data types in general.

Natural Numbers We will use natural numbers to illustrate several ideas that will apply to Haskell data types in general. For the moment we will ignore that fact that each type in Haskell includes possible

### 3 No-Wait Job Shops with Variable Processing Times

3 No-Wait Job Shops with Variable Processing Times In this chapter we assume that, on top of the classical no-wait job shop setting, we are given a set of processing times for each operation. We may select

### Relational Database: The Relational Data Model; Operations on Database Relations

Relational Database: The Relational Data Model; Operations on Database Relations Greg Plaxton Theory in Programming Practice, Spring 2005 Department of Computer Science University of Texas at Austin Overview

### On Meaning Preservation of a Calculus of Records

On Meaning Preservation of a Calculus of Records Emily Christiansen and Elena Machkasova Computer Science Discipline University of Minnesota, Morris Morris, MN 56267 chri1101, elenam@morris.umn.edu Abstract

### Chapter 3. Set Theory. 3.1 What is a Set?

Chapter 3 Set Theory 3.1 What is a Set? A set is a well-defined collection of objects called elements or members of the set. Here, well-defined means accurately and unambiguously stated or described. Any

### The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

### Chapter 18 out of 37 from Discrete Mathematics for Neophytes: Number Theory, Probability, Algorithms, and Other Stuff by J. M. Cargal.

Chapter 8 out of 7 from Discrete Mathematics for Neophytes: Number Theory, Probability, Algorithms, and Other Stuff by J. M. Cargal 8 Matrices Definitions and Basic Operations Matrix algebra is also known

### Introductory logic and sets for Computer scientists

Introductory logic and sets for Computer scientists Nimal Nissanke University of Reading ADDISON WESLEY LONGMAN Harlow, England II Reading, Massachusetts Menlo Park, California New York Don Mills, Ontario

### Complete Variable-Length "Fix-Free" Codes

Designs, Codes and Cryptography, 5, 109-114 (1995) 9 1995 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. Complete Variable-Length "Fix-Free" Codes DAVID GILLMAN* gillman @ es.toronto.edu

### 9.5 Equivalence Relations

9.5 Equivalence Relations You know from your early study of fractions that each fraction has many equivalent forms. For example, 2, 2 4, 3 6, 2, 3 6, 5 30,... are all different ways to represent the same

### CS Bootcamp Boolean Logic Autumn 2015 A B A B T T T T F F F T F F F F T T T T F T F T T F F F

1 Logical Operations 1.1 And The and operator is a binary operator, denoted as, &,, or sometimes by just concatenating symbols, is true only if both parameters are true. A B A B F T F F F F The expression

### Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 11 Coding Strategies and Introduction to Huffman Coding The Fundamental

### Lecture 5. Logic I. Statement Logic

Ling 726: Mathematical Linguistics, Logic. Statement Logic V. Borschev and B. Partee, September 27, 2 p. Lecture 5. Logic I. Statement Logic. Statement Logic...... Goals..... Syntax of Statement Logic....2.

### IS BINARY ENCODING APPROPRIATE FOR THE PROBLEM-LANGUAGE RELATIONSHIP?

Theoretical Computer Science 19 (1982) 337-341 North-Holland Publishing Company NOTE IS BINARY ENCODING APPROPRIATE FOR THE PROBLEM-LANGUAGE RELATIONSHIP? Nimrod MEGIDDO Statistics Department, Tel Aviv

### THE ISOMORPHISM PROBLEM FOR SOME CLASSES OF MULTIPLICATIVE SYSTEMS

THE ISOMORPHISM PROBLEM FOR SOME CLASSES OF MULTIPLICATIVE SYSTEMS BY TREVOR EVANS 1. Introduction. We give here a solution of the isomorphism problem for finitely presented algebras in various classes

### Infinite locally random graphs

Infinite locally random graphs Pierre Charbit and Alex D. Scott Abstract Motivated by copying models of the web graph, Bonato and Janssen [3] introduced the following simple construction: given a graph

### How invariants help writing loops Author: Sander Kooijmans Document version: 1.0

How invariants help writing loops Author: Sander Kooijmans Document version: 1.0 Why this document? Did you ever feel frustrated because of a nasty bug in your code? Did you spend hours looking at the

### Fundamental Concepts. Chapter 1

Chapter 1 Fundamental Concepts This book is about the mathematical foundations of programming, with a special attention on computing with infinite objects. How can mathematics help in programming? There

### Basic Graph Theory with Applications to Economics

Basic Graph Theory with Applications to Economics Debasis Mishra February, 0 What is a Graph? Let N = {,..., n} be a finite set. Let E be a collection of ordered or unordered pairs of distinct elements

### Comparing sizes of sets

Comparing sizes of sets Sets A and B are the same size if there is a bijection from A to B. (That was a definition!) For finite sets A, B, it is not difficult to verify that there is a bijection from A

### Rigidity, connectivity and graph decompositions

First Prev Next Last Rigidity, connectivity and graph decompositions Brigitte Servatius Herman Servatius Worcester Polytechnic Institute Page 1 of 100 First Prev Next Last Page 2 of 100 We say that a framework

### 15 150: Principles of Functional Programming Some Notes on Regular Expression Matching

15 150: Principles of Functional Programming Some Notes on Regular Expression Matching Michael Erdmann Spring 2018 1 Introduction Regular expression matching is a very useful technique for describing commonly-occurring

### Propositional Calculus. Math Foundations of Computer Science

Propositional Calculus Math Foundations of Computer Science Propositional Calculus Objective: To provide students with the concepts and techniques from propositional calculus so that they can use it to

### To prove something about all Boolean expressions, we will need the following induction principle: Axiom 7.1 (Induction over Boolean expressions):

CS 70 Discrete Mathematics for CS Fall 2003 Wagner Lecture 7 This lecture returns to the topic of propositional logic. Whereas in Lecture 1 we studied this topic as a way of understanding proper reasoning

### Software Engineering Lecture Notes

Software Engineering Lecture Notes Paul C. Attie August 30, 2013 c Paul C. Attie. All rights reserved. 2 Contents I Hoare Logic 11 1 Propositional Logic 13 1.1 Introduction and Overview..............................

### The External Network Problem

The External Network Problem Jan van den Heuvel and Matthew Johnson CDAM Research Report LSE-CDAM-2004-15 December 2004 Abstract The connectivity of a communications network can often be enhanced if the

### Generalized alternative and Malcev algebras

Mathematics Publications Mathematics 1982 Generalized alternative and Malcev algebras Irvin R. Hentzel Iowa State University, hentzel@iastate.edu H.F. Smith Iowa State University Follow this and additional

### A MODEL CATEGORY STRUCTURE ON THE CATEGORY OF SIMPLICIAL CATEGORIES

A MODEL CATEGORY STRUCTURE ON THE CATEGORY OF SIMPLICIAL CATEGORIES JULIA E. BERGNER Abstract. In this paper we put a cofibrantly generated model category structure on the category of small simplicial

### MA651 Topology. Lecture 4. Topological spaces 2

MA651 Topology. Lecture 4. Topological spaces 2 This text is based on the following books: Linear Algebra and Analysis by Marc Zamansky Topology by James Dugundgji Fundamental concepts of topology by Peter

### Definition For vertices u, v V (G), the distance from u to v, denoted d(u, v), in G is the length of a shortest u, v-path. 1

Graph fundamentals Bipartite graph characterization Lemma. If a graph contains an odd closed walk, then it contains an odd cycle. Proof strategy: Consider a shortest closed odd walk W. If W is not a cycle,

### Isometric Cycles, Cutsets, and Crowning of Bridged Graphs

Isometric Cycles, Cutsets, and Crowning of Bridged Graphs Tao Jiang, 1 Seog-Jin Kim, 2 and Douglas B. West 3 1 DEPARTMENT OF MATHEMATICS AND STATISTICS MIAMI UNIVERSITY OXFORD, OHIO 45056 E-mail: jiangt@muohio.edu

### Appendix Set Notation and Concepts

Appendix Set Notation and Concepts In mathematics you don t understand things. You just get used to them. John von Neumann (1903 1957) This appendix is primarily a brief run-through of basic concepts from

### Propositional Calculus: Boolean Algebra and Simplification. CS 270: Mathematical Foundations of Computer Science Jeremy Johnson

Propositional Calculus: Boolean Algebra and Simplification CS 270: Mathematical Foundations of Computer Science Jeremy Johnson Propositional Calculus Topics Motivation: Simplifying Conditional Expressions

### 1 Problem Description

Tree Isomorphism: An Exercise in Functional Programming Jayadev Misra 9/10/01 1 Problem Description The problem is to decide if two unordered trees are the same. More precisely, define a binary relation

### Basic Elements of Computer Algebra in MIZAR

Basic Elements of Computer Algebra in MIZAR Adam Naumowicz Czeslaw Bylinski Institute of Computer Science University of Bialystok, Poland adamn@math.uwb.edu.pl Section of Computer Networks University of

### Computer Science 236 Fall Nov. 11, 2010

Computer Science 26 Fall Nov 11, 2010 St George Campus University of Toronto Assignment Due Date: 2nd December, 2010 1 (10 marks) Assume that you are given a file of arbitrary length that contains student

### Lecture 15: The subspace topology, Closed sets

Lecture 15: The subspace topology, Closed sets 1 The Subspace Topology Definition 1.1. Let (X, T) be a topological space with topology T. subset of X, the collection If Y is a T Y = {Y U U T} is a topology

### INDEPENDENT POSTULATES FOR THE "INFORMAL" PART OF PRINCIPIA MATHEMATICA*

9- "INFORMAL" PART OF PRINCIPIA 7 INDEPENDENT POSTULATES FOR THE "INFORMAL" PART OF PRINCIPIA MATHEMATICA* BY E. V. HUNTINGTON. Introduction. It has long been recognized that Section A of Whitehead and

### Topology and Topological Spaces

Topology and Topological Spaces Mathematical spaces such as vector spaces, normed vector spaces (Banach spaces), and metric spaces are generalizations of ideas that are familiar in R or in R n. For example,

### Lecture 5: The Halting Problem. Michael Beeson

Lecture 5: The Halting Problem Michael Beeson Historical situation in 1930 The diagonal method appears to offer a way to extend just about any definition of computable. It appeared in the 1920s that it

### Fundamental mathematical techniques reviewed: Mathematical induction Recursion. Typically taught in courses such as Calculus and Discrete Mathematics.

Fundamental mathematical techniques reviewed: Mathematical induction Recursion Typically taught in courses such as Calculus and Discrete Mathematics. Techniques introduced: Divide-and-Conquer Algorithms

### Dynamic Programming Algorithms

CSC 364S Notes University of Toronto, Fall 2003 Dynamic Programming Algorithms The setting is as follows. We wish to find a solution to a given problem which optimizes some quantity Q of interest; for

### Reasoning About Programs Panagiotis Manolios

Reasoning About Programs Panagiotis Manolios Northeastern University March 22, 2012 Version: 58 Copyright c 2012 by Panagiotis Manolios All rights reserved. We hereby grant permission for this publication

### Designing Views to Answer Queries under Set, Bag,and BagSet Semantics

Designing Views to Answer Queries under Set, Bag,and BagSet Semantics Rada Chirkova Department of Computer Science, North Carolina State University Raleigh, NC 27695-7535 chirkova@csc.ncsu.edu Foto Afrati

### Lecture 11 COVERING SPACES

Lecture 11 COVERING SPACES A covering space (or covering) is not a space, but a mapping of spaces (usually manifolds) which, locally, is a homeomorphism, but globally may be quite complicated. The simplest

### 5 MST and Greedy Algorithms

5 MST and Greedy Algorithms One of the traditional and practically motivated problems of discrete optimization asks for a minimal interconnection of a given set of terminals (meaning that every pair will

### Sources for this lecture. 3. Matching in bipartite and general graphs. Symmetric difference

S-72.2420 / T-79.5203 Matching in bipartite and general graphs 1 3. Matching in bipartite and general graphs Let G be a graph. A matching M in G is a set of nonloop edges with no shared endpoints. Let

### THE FOUNDATIONS OF MATHEMATICS

THE FOUNDATIONS OF MATHEMATICS By: Sterling McKay APRIL 21, 2014 LONE STAR - MONTGOMERY Mentor: William R. Brown, MBA Mckay 1 In mathematics, truth is arguably the most essential of its components. Suppose

### REGULAR GRAPHS OF GIVEN GIRTH. Contents

REGULAR GRAPHS OF GIVEN GIRTH BROOKE ULLERY Contents 1. Introduction This paper gives an introduction to the area of graph theory dealing with properties of regular graphs of given girth. A large portion

### Topology Homework 3. Section Section 3.3. Samuel Otten

Topology Homework 3 Section 3.1 - Section 3.3 Samuel Otten 3.1 (1) Proposition. The intersection of finitely many open sets is open and the union of finitely many closed sets is closed. Proof. Note that

### RATIONAL CURVES ON SMOOTH CUBIC HYPERSURFACES. Contents 1. Introduction 1 2. The proof of Theorem References 9

RATIONAL CURVES ON SMOOTH CUBIC HYPERSURFACES IZZET COSKUN AND JASON STARR Abstract. We prove that the space of rational curves of a fixed degree on any smooth cubic hypersurface of dimension at least

### A Theory of Parallel Computation The π-calculus

A Theory of Parallel Computation The π-calculus Background DFAs, NFAs, pushdown automata, Turing machines... All are mathematical entities that model computation. These abstract systems have concrete,

### A Correctness Proof for a Practical Byzantine-Fault-Tolerant Replication Algorithm

Appears as Technical Memo MIT/LCS/TM-590, MIT Laboratory for Computer Science, June 1999 A Correctness Proof for a Practical Byzantine-Fault-Tolerant Replication Algorithm Miguel Castro and Barbara Liskov

### An introduction to simplicial sets

An introduction to simplicial sets 25 Apr 2010 1 Introduction This is an elementary introduction to simplicial sets, which are generalizations of -complexes from algebraic topology. The theory of simplicial

### Coloring edges and vertices of graphs without short or long cycles

Coloring edges and vertices of graphs without short or long cycles Marcin Kamiński and Vadim Lozin Abstract Vertex and edge colorability are two graph problems that are NPhard in general. We show that

### 5 MST and Greedy Algorithms

5 MST and Greedy Algorithms One of the traditional and practically motivated problems of discrete optimization asks for a minimal interconnection of a given set of terminals (meaning that every pair will

### SPERNER S LEMMA MOOR XU

SPERNER S LEMMA MOOR XU Abstract. Is it possible to dissect a square into an odd number of triangles of equal area? This question was first answered by Paul Monsky in 970, and the solution requires elements

### Division of the Humanities and Social Sciences. Convex Analysis and Economic Theory Winter Separation theorems

Division of the Humanities and Social Sciences Ec 181 KC Border Convex Analysis and Economic Theory Winter 2018 Topic 8: Separation theorems 8.1 Hyperplanes and half spaces Recall that a hyperplane in

### Crown-free highly arc-transitive digraphs

Crown-free highly arc-transitive digraphs Daniela Amato and John K Truss University of Leeds 1. Abstract We construct a family of infinite, non-locally finite highly arc-transitive digraphs which do not

### Open and Closed Sets

Open and Closed Sets Definition: A subset S of a metric space (X, d) is open if it contains an open ball about each of its points i.e., if x S : ɛ > 0 : B(x, ɛ) S. (1) Theorem: (O1) and X are open sets.

### CS3102 Theory of Computation Solutions to Problem Set 1, Spring 2012 Department of Computer Science, University of Virginia

CS3102 Theory of Computation Solutions to Problem Set 1, Spring 2012 Department of Computer Science, University of Virginia Gabriel Robins Please start solving these problems immediately, and work in study

### Caveat lector: This is the first edition of this lecture note. Please send bug reports and suggestions to

Caveat lector: This is the first edition of this lecture note. Please send bug reports and suggestions to jeffe@illinois.edu. But the Lord came down to see the city and the tower the people were building.

### CS 3512, Spring Instructor: Doug Dunham. Textbook: James L. Hein, Discrete Structures, Logic, and Computability, 3rd Ed. Jones and Barlett, 2010

CS 3512, Spring 2011 Instructor: Doug Dunham Textbook: James L. Hein, Discrete Structures, Logic, and Computability, 3rd Ed. Jones and Barlett, 2010 Prerequisites: Calc I, CS2511 Rough course outline:

### Multi-Cluster Interleaving on Paths and Cycles

Multi-Cluster Interleaving on Paths and Cycles Anxiao (Andrew) Jiang, Member, IEEE, Jehoshua Bruck, Fellow, IEEE Abstract Interleaving codewords is an important method not only for combatting burst-errors,

### CHAPTER 4. COMPUTABILITY AND DECIDABILITY

CHAPTER 4. COMPUTABILITY AND DECIDABILITY 1. Introduction By definition, an n-ary function F on N assigns to every n-tuple k 1,...,k n of elements of N a unique l N which is the value of F at k 1,...,k

### 4 Mathematical Data Types

mcs 2015/5/18 1:43 page 81 #89 4 Mathematical Data Types We have assumed that you ve already been introduced to the concepts of sets, sequences, and functions, and we ve used them informally several times

### Notes on point set topology, Fall 2010

Notes on point set topology, Fall 2010 Stephan Stolz September 3, 2010 Contents 1 Pointset Topology 1 1.1 Metric spaces and topological spaces...................... 1 1.2 Constructions with topological

### Problem Set 4: Streams and Lazy Evaluation

Due Friday, March 24 Computer Science (1)21b (Spring Term, 2017) Structure and Interpretation of Computer Programs Problem Set 4: Streams and Lazy Evaluation Reading Assignment: Chapter 3, Section 3.5.

### REPRESENTATION OF DISTRIBUTIVE LATTICES BY MEANS OF ORDERED STONE SPACES

REPRESENTATION OF DISTRIBUTIVE LATTICES BY MEANS OF ORDERED STONE SPACES H. A. PRIESTLEY 1. Introduction Stone, in [8], developed for distributive lattices a representation theory generalizing that for

### THE GROUP OF SYMMETRIES OF THE TOWER OF HANOI GRAPH

THE GROUP OF SYMMETRIES OF THE TOWER OF HANOI GRAPH SOEUN PARK arxiv:0809.1179v1 [math.co] 7 Sep 2008 Abstract. The Tower of Hanoi problem with k pegs and n disks has been much studied via its associated

### SUMS OF SETS OF CONTINUED FRACTIONS

proceedings of the american mathematical society Volume 30, Number 2. October 1971 SUMS OF SETS OF NTINUED FRACTIONS T. W. CUSICK AND R. A. LEE Abstract. For each integer k jjj 2, let S(k) denote the set

### Linear Algebra Part I - Linear Spaces

Linear Algebra Part I - Linear Spaces Simon Julier Department of Computer Science, UCL S.Julier@cs.ucl.ac.uk http://moodle.ucl.ac.uk/course/view.php?id=11547 GV01 - Mathematical Methods, Algorithms and

### The NP-Completeness of Some Edge-Partition Problems

The NP-Completeness of Some Edge-Partition Problems Ian Holyer y SIAM J. COMPUT, Vol. 10, No. 4, November 1981 (pp. 713-717) c1981 Society for Industrial and Applied Mathematics 0097-5397/81/1004-0006

### XI International PhD Workshop OWD 2009, October Fuzzy Sets as Metasets

XI International PhD Workshop OWD 2009, 17 20 October 2009 Fuzzy Sets as Metasets Bartłomiej Starosta, Polsko-Japońska WyŜsza Szkoła Technik Komputerowych (24.01.2008, prof. Witold Kosiński, Polsko-Japońska

### The Structure of Bull-Free Perfect Graphs

The Structure of Bull-Free Perfect Graphs Maria Chudnovsky and Irena Penev Columbia University, New York, NY 10027 USA May 18, 2012 Abstract The bull is a graph consisting of a triangle and two vertex-disjoint

### Chapter 2 The Language PCF

Chapter 2 The Language PCF We will illustrate the various styles of semantics of programming languages with an example: the language PCF Programming language for computable functions, also called Mini-ML.

### Cardinality of Sets. Washington University Math Circle 10/30/2016

Cardinality of Sets Washington University Math Circle 0/0/06 The cardinality of a finite set A is just the number of elements of A, denoted by A. For example, A = {a, b, c, d}, B = {n Z : n } = {,,, 0,,,

### Matrices. Chapter Matrix A Mathematical Definition Matrix Dimensions and Notation

Chapter 7 Introduction to Matrices This chapter introduces the theory and application of matrices. It is divided into two main sections. Section 7.1 discusses some of the basic properties and operations

### Jaykov Foukzon. Israel Institute of Technology, Haifa, Israel.

Inconsistent countable set Jaykov Foukzon Israel Institute of Technology, Haifa, Israel jaykovfoukzon@list.ru Abstract In this article we derived an importent example of the inconsistent countable set.

### Denotational Semantics. Domain Theory

Denotational Semantics and Domain Theory 1 / 51 Outline Denotational Semantics Basic Domain Theory Introduction and history Primitive and lifted domains Sum and product domains Function domains Meaning

### 1.7 The Heine-Borel Covering Theorem; open sets, compact sets

1.7 The Heine-Borel Covering Theorem; open sets, compact sets This section gives another application of the interval halving method, this time to a particularly famous theorem of analysis, the Heine Borel

### On the null space of a Colin de Verdière matrix

On the null space of a Colin de Verdière matrix László Lovász 1 and Alexander Schrijver 2 Dedicated to the memory of François Jaeger Abstract. Let G = (V, E) be a 3-connected planar graph, with V = {1,...,

### (d) If the moon shares nothing and the sun does not share our works, then the earth is alive with creeping men.

Math 15 - Spring 17 Chapters 1 and 2 Test Solutions 1. Consider the declaratives statements, P : The moon shares nothing. Q: It is the sun that shares our works. R: The earth is alive with creeping men.

### Graph Theory. Part of Texas Counties.

Graph Theory Part of Texas Counties. We would like to visit each of the above counties, crossing each county only once, starting from Harris county. Is this possible? This problem can be modeled as a graph.

### arxiv: v2 [math.co] 13 Aug 2013

Orthogonality and minimality in the homology of locally finite graphs Reinhard Diestel Julian Pott arxiv:1307.0728v2 [math.co] 13 Aug 2013 August 14, 2013 Abstract Given a finite set E, a subset D E (viewed

### Algorithms for Data Science

Algorithms for Data Science CSOR W4246 Eleni Drinea Computer Science Department Columbia University Thursday, October 1, 2015 Outline 1 Recap 2 Shortest paths in graphs with non-negative edge weights (Dijkstra

### Discrete Mathematics and Probability Theory Fall 2009 Satish Rao,David Tse Note 8

CS 70 Discrete Mathematics and Probability Theory Fall 2009 Satish Rao,David Tse Note 8 An Introduction to Graphs Formulating a simple, precise specification of a computational problem is often a prerequisite

### Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret

Advanced Algorithms Class Notes for Monday, October 23, 2012 Min Ye, Mingfu Shao, and Bernard Moret Greedy Algorithms (continued) The best known application where the greedy algorithm is optimal is surely

### Chordal Graphs and Minimal Free Resolutions

Chordal Graphs and Minimal Free Resolutions David J. Marchette David A. Johannsen Abstract The problem of computing the minimal free resolution of the edge ideal of a graph has attracted quite a bit of

### A Database of Categories

A Database of Categories Michael Fleming Department of Computer Science University of Waterloo Waterloo, Ont, Canada Ryan Gunther Department of Computer Science University of Waterloo Waterloo, Ont, Canada

### Integrating SysML and OWL

Integrating SysML and OWL Henson Graves Lockheed Martin Aeronautics Company Fort Worth Texas, USA henson.graves@lmco.com Abstract. To use OWL2 for modeling a system design one must be able to construct

### Diagonalization. The cardinality of a finite set is easy to grasp: {1,3,4} = 3. But what about infinite sets?

Diagonalization Cardinalities The cardinality of a finite set is easy to grasp: {1,3,4} = 3. But what about infinite sets? We say that a set S has at least as great cardinality as set T, written S T, if

### NEW STABILITY RESULTS FOR ADVERSARIAL QUEUING

NEW STABILITY RESULTS FOR ADVERSARIAL QUEUING ZVI LOTKER, BOAZ PATT-SHAMIR, AND ADI ROSÉN Abstract. We consider the model of adversarial queuing theory for packet networks introduced by Borodin et al.

### Predicate Logic CHAPTER What This Chapter Is About

CHAPTER 14 Predicate Logic We now turn our attention to a generalization of propositional logic, called predicate, or first-order, logic. Predicates are functions of zero or more variables that return

### Chapter 3: Propositional Languages

Chapter 3: Propositional Languages We define here a general notion of a propositional language. We show how to obtain, as specific cases, various languages for propositional classical logic and some non-classical

### Introduction to Computer Architecture

Boolean Operators The Boolean operators AND and OR are binary infix operators (that is, they take two arguments, and the operator appears between them.) A AND B D OR E We will form Boolean Functions of

### CSE 20 DISCRETE MATH WINTER

CSE 20 DISCRETE MATH WINTER 2016 http://cseweb.ucsd.edu/classes/wi16/cse20-ab/ Today's learning goals Explain the steps in a proof by (strong) mathematical induction Use (strong) mathematical induction