KAOS: a KLAIM Extension for Reasoning on Programmable QoS

Size: px
Start display at page:

Download "KAOS: a KLAIM Extension for Reasoning on Programmable QoS"

Transcription

1 KAOS: a KLAIM Extension for Reasoning on Programmable QoS Emilio Tuosto etuosto@di.unipi.it Dipartimento di Informatica Universitá di Pisa In cooperation with: R. De Nicola, G. Ferrari, U. Montanari and R. Pugliese KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.1/15

2 Plan of the talk KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.2/15

3 Plan of the talk WAN Programming with QoS KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.2/15

4 Plan of the talk WAN Programming with QoS A representation of QoS parameters KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.2/15

5 Plan of the talk WAN Programming with QoS A representation of QoS parameters KAOS KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.2/15

6 Plan of the talk WAN Programming with QoS A representation of QoS parameters KAOS KAOS & Hypergraphs: reasoning on QoS issues KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.2/15

7 Plan of the talk WAN Programming with QoS A representation of QoS parameters KAOS KAOS & Hypergraphs: reasoning on QoS issues Details in International Symposium on Verification - Theory and Practice (LNCS) KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.2/15

8 Wide Area Network Programming Issues Absence of centralised control Administrative domains Interoperability Mobility (of resources and computation) Network Awareness Applications are location dependent Locations have different features and allow multiple (security) policies Independently programmed in a distributed environment Service Level Agreement Security... KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.3/15

9 Klaim KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.4/15

10 Klaim Multiple TS KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.4/15

11 Klaim Multiple TS Localities: first class citizens KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.4/15

12 Klaim Multiple TS Localities: first class citizens Process migration KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.4/15

13 Klaim Multiple TS Localities: first class citizens Process migration Q Q a(t)@s R P eval(p )@s R P site s site s KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.4/15

14 Klaim Multiple TS Localities: first class citizens Process migration Q Q a(t)@s R P eval(p )@s R P site s site s KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.4/15

15 Klaim Multiple TS Localities: first class citizens Process migration R Q P a(t)@s eval(p )@s R Q P P ::= nil α.p P 1 P 2 α ::= a@s a ::=... // Klaim actions site s site s ε(p ) KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.4/15

16 KAOS: Gateways KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.5/15

17 KAOS: Gateways Coordinators (super processes) KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.5/15

18 KAOS: Gateways Coordinators (super processes) Dynamic creation of sites KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.5/15

19 KAOS: Gateways Coordinators (super processes) Dynamic creation of sites Gateway connection management KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.5/15

20 KAOS: Gateways Coordinators (super processes) Dynamic creation of sites Gateway connection management Q Q P P R P R site s site s KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.5/15

21 KAOS: Gateways Coordinators (super processes) Dynamic creation of sites Gateway connection management Q Q new(s, P ) P P R P R site s site s KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.5/15

22 KAOS: Gateways Coordinators (super processes) Dynamic creation of sites Gateway connection management Q Q P P R P R site s site s KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.5/15

23 KAOS: Gateways Coordinators (super processes) Dynamic creation of sites Gateway connection management Q Q P ::= γ.p P 1 P 2 γ ::= α κ ν(s κ) κ s R site s P R site s s κ δ l Cost κ abstracts characteristics of connections according to many dimensions (bandwidth, latency, distance, access rights...) KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.5/15

24 Connection costs Algebra on costs: c-semiring. A, +,, 0, 1 is a constraint semiring if A is a set (0, 1 A), and + and are binary operations on A that satisfy the following properties: + is commutative, associative, idempotent, 0 is its unit element and 1 is its absorbing element; is commutative, associative, distributes over +, 1 is its unit element, and 0 is its absorbing element. The additive operation of a c-semiring induces a partial order on A defined as a A b c : a + c = b. The minimal element is thus 0 and the maximal 1 KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.6/15

25 Examples of connection costs N, min, +, +, 0, the c-semiring of natural numbers N where the additive operation is min the multiplicative operation is the sum over natural numbers ({A}),,, A, A}, c-semiring of capabilities A where the additive operation is the multiplicative operation is KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.7/15

26 KAOS: Example 1. message on s t 2. check message s Send msg to t 3. download message KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.8/15

27 KAOS: Example 1. message on s <10,{i,o},2> x <100,{i,o,n},2> t 2. check message s t z <300,{i,o},60> s 3. download message Send msg to t <10,{i},20> y <150,{i,o},2> KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.8/15

28 KAOS: Example 1. message on s <10,{i,o},2> x <100,{i,o,n},2> t 2. check message s t z <300,{i,o},60> s 3. download message Send msg to t Costs are triples κ = d, C, p where <10,{i},20> 1. d is the geographical distance (in Km); y <150,{i,o},2> 2. C {i, o, n} are the capabilities, where i, o and n stand for input, output and creation of new nodes, respectively; 3. p is the price (in euros). KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.8/15

29 KAOS: Example Costs are elements of the cartesian product of 1. (N, min, +, +, 0), 2. ( ({i, o, n}), glb,, {i, o, n}, {i, o, n}), 3. (Q, min, +, +, 0). proved to be a c-semiring [BMR97] Operations and + are d, C, p d, C, p = d + d, C C, p + p d, C, p + d, C, p = min{d, d }, glb{c, C }, min{p, p }. Accordingly, the neutral elements of and +, respectively are defined as 1 = 0, {i, o, n}, 0 and 0 = +,, +. KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.9/15

30 Hypergraphs Programming model 2 Tackling new non-functional computational phenomena of systems using SHR. The metaphor is WAN systems as Hypergraphs WAN computations as SHR In other words: Components are represented by hyperedges Systems are bunches of (connected) hyperedges Computing means to rewrite hyperedge......according to a synchronisation policy KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.10/15

31 Hyperedges and Hypergraphs Syntax A hyperedge generalises edges: It connects more than two nodes L : 3, L(y, z, x), y x 3 L 1 2 z KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.11/15

32 Hyperedges and Hypergraphs Syntax A hyperedge generalises edges: It connects more than two nodes L : 3, L(y, z, x), y x 3 L 1 2 z G ::= nil ν y.g L( x) G G KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.11/15

33 Hyperedges and Hypergraphs Syntax A hyperedge generalises edges: It connects more than two nodes L : 3, L(y, z, x), y x 3 L 1 2 z G ::= nil ν y.g L( x) G G Syntactic Judgement Γ G, fn(g) Γ KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.11/15

34 Hyperedges and Hypergraphs Syntax A hyperedge generalises edges: It connects more than two nodes L : 3, L(y, z, x), y x 3 L 1 2 z G ::= nil ν y.g L( x) G G Syntactic Judgement Γ G, fn(g) Γ An example: L : 3, M : 2 x, y ν z.(l(y, z, x) M(y, z)) KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.11/15

35 Hyperedges and Hypergraphs Syntax A hyperedge generalises edges: It connects more than two nodes L : 3, L(y, z, x), y x 3 L 1 2 z G ::= nil ν y.g L( x) G G Syntactic Judgement Γ G, fn(g) Γ An example: y L : 3, M : 2 x, y ν z.(l(y, z, x) M(y, z)) x L M z KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.11/15

36 Replacement of Hyperedges L G KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.12/15

37 Replacement of Hyperedges L G G G L 3 G2 G2 KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.12/15

38 Replacement of Hyperedges L G G2 G1 G L KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.12/15

39 Replacement of Hyperedges L G G2 G1 G L Edge replacement: local Synchronisation as distributed constraint solving New node creation Node fusion: mobility model KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.12/15

40 Replacement of Hyperedges L G Edge replacement: local G1 1 2 G L G2 Synchronisation as distributed constraint solving New node creation Node fusion: mobility model Benefits: Powerful model of system composition (π, π-i, fusion) LTS for Ambient......and for Klaim and path reservation for KAOS KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.12/15

41 KAOS & Hypergraphs [[ s :: L P ]] = Γ (ν x, p)([[ P ]] p s m,n ( u, x, p) n j=1 G κ j t j (x j, v j )) ζ ζ G G ζ P... G G KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.13/15

42 KAOS & Hypergraphs [[ s :: L P ]] = Γ (ν x, p)([[ P ]] p s m,n ( u, x, p) n j=1 G κ j t j (x j, v j )) ζ ζ... G G [ nil ] p = nil [ o t ] p = L o t (p) [ γ.p ] p = L γ.p (p) ζ [ ε(p )@s ] p = (ν u)(ε T s (P ) (u, p) S P (u)) P G G [ P 1 P 2 ] p = [ P 1 ] p [ P 2 ] p [ rec X. P ] p = [ P [ rec X. P / X ] ] p.... KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.13/15

43 Graph for the message example t G κ tx x x x G κ zx x G κ xz t G κ xt t G κ ty ε T s S Ff,t z G κzs z G κ sz y y y G κ yz z z z s s s L bigfile,file KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.14/15

44 KAOS Graph semantics: pros & cons KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.15/15

45 KAOS Graph semantics: pros & cons Many productions (recently reduced :-) KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.15/15

46 KAOS Graph semantics: pros & cons Many productions (recently reduced :-) + Determines the optimal path (also KAOS) KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.15/15

47 KAOS Graph semantics: pros & cons Many productions (recently reduced :-) + Determines the optimal path (also KAOS) + Path reservation KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.15/15

48 KAOS Graph semantics: pros & cons Many productions (recently reduced :-) + Determines the optimal path (also KAOS) + Path reservation + Path routing KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.15/15

49 KAOS Graph semantics: pros & cons Many productions (recently reduced :-) + Determines the optimal path (also KAOS) + Path reservation + Path routing Theorem KAOS remote actions are routed on paths with minimal cost (wrt the c-semiring operations) KAOS: a KLAIM ExtensionforReasoning on Programmable QoS p.15/15

A Soft Constraint-Based Approach to QoS-Aware Service Selection

A Soft Constraint-Based Approach to QoS-Aware Service Selection A Soft Constraint-Based Approach to QoS-Aware Service Selection Mohamed Anis Zemni 1, Salima Benbernou 1, Manuel Carro 2 1 LIPADE, Université Paris Descartes, France 2 Facultad de Informática, Universidad

More information

Resource Access and Mobility Control with Dynamic Privileges Acquisition

Resource Access and Mobility Control with Dynamic Privileges Acquisition Resource Access and Mobility Control with Dynamic Privileges Acquisition Daniele Gorla Rosario Pugliese Dipartimento di Sistemi e Informatica, Università di Firenze e-mail: {gorla,pugliese}@dsi.unifi.it

More information

Types for access control

Types for access control Theoretical Computer Science 240 (2000) 215 254 www.elsevier.com/locate/tcs Types for access control Rocco De Nicola a;, GianLuigi Ferrari b, Rosario Pugliese a, Betti Venneri a a Dipartimento di Sistemi

More information

Semantic Optimization of Preference Queries

Semantic Optimization of Preference Queries Semantic Optimization of Preference Queries Jan Chomicki University at Buffalo http://www.cse.buffalo.edu/ chomicki 1 Querying with Preferences Find the best answers to a query, instead of all the answers.

More information

The Klaim Project: Theory and Practice

The Klaim Project: Theory and Practice The Klaim Project: Theory and Practice Lorenzo Bettini 1, Viviana Bono 2, Rocco De Nicola 1, Gianluigi Ferrari 3, Daniele Gorla 1, Michele Loreti 1, Eugenio Moggi 4, Rosario Pugliese 1, Emilio Tuosto 3,

More information

Foundational Calculi for Network Aware Programming

Foundational Calculi for Network Aware Programming Foundational Calculi for Network Aware Programming An Assessment from a Programming Perspective GIANLUIGI FERRARI Dipartimento di Informatica, Università di Pisa ROSARIO PUGLIESE Dipartimento di Sistemi

More information

Graphs and Graph Transformations for Object-Oriented and Service-Oriented Systems

Graphs and Graph Transformations for Object-Oriented and Service-Oriented Systems Università degli Studi di Pisa Dipartimento di Informatica Dottorato di Ricerca in Informatica Ph.D. Thesis Graphs and Graph Transformations for Object-Oriented and Service-Oriented Systems Liang Zhao

More information

Static Analysis by A. I. of Embedded Critical Software

Static Analysis by A. I. of Embedded Critical Software Static Analysis by Abstract Interpretation of Embedded Critical Software Julien Bertrane ENS, Julien.bertrane@ens.fr Patrick Cousot ENS & CIMS, Patrick.Cousot@ens.fr Radhia Cousot CNRS & ENS, Radhia.Cousot@ens.fr

More information

CS131 Typed Lambda Calculus Worksheet Due Thursday, April 19th

CS131 Typed Lambda Calculus Worksheet Due Thursday, April 19th CS131 Typed Lambda Calculus Worksheet Due Thursday, April 19th Name: CAS ID (e.g., abc01234@pomona.edu): I encourage you to collaborate. collaborations below. Please record your Each question is worth

More information

Dealing with Incomplete Preferences in Soft Constraint Problems

Dealing with Incomplete Preferences in Soft Constraint Problems Dealing with Incomplete Preferences in Soft Constraint Problems Mirco Gelain, Maria Silvia Pini, Francesca Rossi, and K. Brent Venable Dipartimento di Matematica Pura ed Applicata, Università di Padova,

More information

Complex Systems Design &DistributedCalculusandCoordination

Complex Systems Design &DistributedCalculusandCoordination Complex Systems Design &DistributedCalculusandCoordination Concurrency and Process Algebras: Theory and Practice - Klaim Francesco Tiezzi University of Camerino francesco.tiezzi@unicam.it A.A. 2014/2015

More information

Section 1.8. Simplifying Expressions

Section 1.8. Simplifying Expressions Section 1.8 Simplifying Expressions But, first Commutative property: a + b = b + a; a * b = b * a Associative property: (a + b) + c = a + (b + c) (a * b) * c = a * (b * c) Distributive property: a * (b

More information

Network models and graph theory

Network models and graph theory Network models and graph theory G. Ferrari Trecate Dipartimento di Ingegneria Industriale e dell Informazione (DIII) Università degli Studi di Pavia Industrial Automation Ferrari Trecate (DII) Network

More information

A General Method for Assessment of Security in Complex Services

A General Method for Assessment of Security in Complex Services A General Method for Assessment of Security in Complex Services Leanid Krautsevich 1, Fabio Martinelli 2, and Artsiom Yautsiukhin 2 1 Department of Computer Science, University of Pisa, Pisa, Italy krautsev@di.unipi.it

More information

AGILE: Software Architecture for Mobility

AGILE: Software Architecture for Mobility AGILE: Software Architecture for Mobility L. Andrade 6, P. Baldan 8, H. Baumeister 1, R. Bruni 2, A. Corradini 2, R. De Nicola 3, J. L. Fiadeiro 6, F. Gadducci 2, S. Gnesi 4, P. Hoffman 7, N. Koch 1, P.

More information

Gram s relation for cone valuations

Gram s relation for cone valuations Gram s relation for cone valuations Sebastian Manecke Goethe Universität Frankfurt joint work with Spencer Backman and Raman Sanyal July 31, 2018 Gram s relation for cone valuations Sebastian Manecke 1

More information

The Klaim Project: Theory and Practice

The Klaim Project: Theory and Practice The Klaim Project: Theory and Practice Lorenzo Bettini 1, Viviana Bono 2, Rocco De Nicola 1, Gianluigi Ferrari 3, Daniele Gorla 1, Michele Loreti 1, Eugenio Moggi 4, Rosario Pugliese 1, Emilio Tuosto 3,

More information

Categorical models of type theory

Categorical models of type theory 1 / 59 Categorical models of type theory Michael Shulman February 28, 2012 2 / 59 Outline 1 Type theory and category theory 2 Categorical type constructors 3 Dependent types and display maps 4 Fibrations

More information

Expressiveness and Complexity of a Graph Logic

Expressiveness and Complexity of a Graph Logic 1 Expressiveness and Complexity of a Graph Logic (Cambridge) joint work with Philippa Gardner (Imperial College) and Giorgio Ghelli (Pisa) 2 A View of Process Algebras A term algebra T given by a functional

More information

Type Soundness and Race Freedom for Mezzo

Type Soundness and Race Freedom for Mezzo Type Soundness and Race Freedom for Mezzo Thibaut Balabonski François Pottier Jonathan Protzenko INRIA FLOPS 2014 1 / 42 Mezzo in a few words Mezzo is a high-level programming language, equipped with:

More information

3. According to universal addressing, what is the address of vertex d? 4. According to universal addressing, what is the address of vertex f?

3. According to universal addressing, what is the address of vertex d? 4. According to universal addressing, what is the address of vertex f? 1. Prove: A full m-ary tree with i internal vertices contains n = mi + 1 vertices. 2. For a full m-ary tree with n vertices, i internal vertices, and l leaves, prove: (i) i = (n 1)/m and l = [(m 1)n +

More information

Hw 4 Due Feb 22. D(fg) x y z (

Hw 4 Due Feb 22. D(fg) x y z ( Hw 4 Due Feb 22 2.2 Exercise 7,8,10,12,15,18,28,35,36,46 2.3 Exercise 3,11,39,40,47(b) 2.4 Exercise 6,7 Use both the direct method and product rule to calculate where f(x, y, z) = 3x, g(x, y, z) = ( 1

More information

Computing Aggregate Functions in Sensor Networks

Computing Aggregate Functions in Sensor Networks Computing Aggregate Functions in Sensor Networks Antonio Fernández Anta 1 Miguel A. Mosteiro 1,2 Christopher Thraves 3 1 LADyR, GSyC,Universidad Rey Juan Carlos 2 Dept. of Computer Science, Rutgers University

More information

A fuzzy constraint assigns every possible tuple in a relation a membership degree. The function

A fuzzy constraint assigns every possible tuple in a relation a membership degree. The function Scribe Notes: 2/13/2013 Presenter: Tony Schnider Scribe: Nate Stender Topic: Soft Constraints (Ch. 9 of CP handbook) Soft Constraints Motivation Soft constraints are used: 1. When we seek to find the best

More information

Pure Lambda Calculus. Lecture 17

Pure Lambda Calculus. Lecture 17 Pure Lambda Calculus Lecture 17 Lambda Calculus Lambda Calculus (λ-calculus) is a functional notation introduced by Alonzo Church in the early 1930s to formalize the notion of computability. Pure λ-calculus

More information

Chapter 2 The Operation of Fuzzy Set

Chapter 2 The Operation of Fuzzy Set Chapter 2 The Operation of Fuzzy Set Standard operations of Fuzzy Set! Complement set! Union Ma[, ]! Intersection Min[, ]! difference between characteristics of crisp fuzzy set operator n law of contradiction

More information

Simulation and Analysis of Distributed Systems in Klaim

Simulation and Analysis of Distributed Systems in Klaim Simulation and Analysis of Distributed Systems in Klaim Francesco Calzolai and Michele Loreti Dipartimento di Sistemi e Informatica Università di Firenze Abstract. Network and distributed systems typically

More information

O Klaim: a coordination language with mobile mixins

O Klaim: a coordination language with mobile mixins O Klaim: a coordination language with mobile mixins Lorenzo Bettini 1 Viviana Bono 2 Betti Venneri 1 1 Dipartimento di Sistemi e Informatica, Università di Firenze, {bettini,venneri}@dsi.unifi.it 2 Dipartimento

More information

LANGUAGE PROCESSORS. Presented By: Prof. S.J. Soni, SPCE Visnagar.

LANGUAGE PROCESSORS. Presented By: Prof. S.J. Soni, SPCE Visnagar. LANGUAGE PROCESSORS Presented By: Prof. S.J. Soni, SPCE Visnagar. Introduction Language Processing activities arise due to the differences between the manner in which a software designer describes the

More information

Computational problems. Lecture 2: Combinatorial search and optimisation problems. Computational problems. Examples. Example

Computational problems. Lecture 2: Combinatorial search and optimisation problems. Computational problems. Examples. Example Lecture 2: Combinatorial search and optimisation problems Different types of computational problems Examples of computational problems Relationships between problems Computational properties of different

More information

Course on Probabilistic Methods in Concurrency. (Concurrent Languages for Probabilistic Asynchronous Communication) Lecture 1

Course on Probabilistic Methods in Concurrency. (Concurrent Languages for Probabilistic Asynchronous Communication) Lecture 1 Course on Probabilistic Methods in Concurrency (Concurrent Languages for Probabilistic Asynchronous Communication) Lecture 1 The pi-calculus and the asynchronous pi-calculus. Catuscia Palamidessi INRIA

More information

On the Computation of Local Interchangeability in Soft Constraint Satisfaction Problems

On the Computation of Local Interchangeability in Soft Constraint Satisfaction Problems On the Computation of Local Interchangeability in Soft Constraint Satisfaction Problems Nicoleta Neagu and Stefano Bistarelli 2,3 and Boi Faltings Artificial Intelligence Laboratory (LIA), Computer Science

More information

The Extended Algebra. Duplicate Elimination. Sorting. Example: Duplicate Elimination

The Extended Algebra. Duplicate Elimination. Sorting. Example: Duplicate Elimination The Extended Algebra Duplicate Elimination 2 δ = eliminate duplicates from bags. τ = sort tuples. γ = grouping and aggregation. Outerjoin : avoids dangling tuples = tuples that do not join with anything.

More information

Calculus of Inductive Constructions

Calculus of Inductive Constructions Calculus of Inductive Constructions Software Formal Verification Maria João Frade Departmento de Informática Universidade do Minho 2008/2009 Maria João Frade (DI-UM) Calculus of Inductive Constructions

More information

UNIVERSIDAD CARLOS III DE MADRID MATHEMATICS II EXERCISES (SOLUTIONS ) CHAPTER 3: Partial derivatives and differentiation

UNIVERSIDAD CARLOS III DE MADRID MATHEMATICS II EXERCISES (SOLUTIONS ) CHAPTER 3: Partial derivatives and differentiation UNIVERSIDAD CARLOS III DE MADRID MATHEMATICS II EXERCISES SOLUTIONS ) 3-1. Find, for the following functions: a) fx, y) x cos x sin y. b) fx, y) e xy. c) fx, y) x + y ) lnx + y ). CHAPTER 3: Partial derivatives

More information

DSAS Laboratory no 4. Laboratory 4. Logic forms

DSAS Laboratory no 4. Laboratory 4. Logic forms Laboratory 4 Logic forms 4.1 Laboratory work goals Going from Boolean functions to Boolean forms. Logic forms equivalence. Boolean forms simplification. Shannon s theorems. Representation in NAND and NOR

More information

CS 6110 S14 Lecture 38 Abstract Interpretation 30 April 2014

CS 6110 S14 Lecture 38 Abstract Interpretation 30 April 2014 CS 6110 S14 Lecture 38 Abstract Interpretation 30 April 2014 1 Introduction to Abstract Interpretation At this point in the course, we have looked at several aspects of programming languages: operational

More information

Program Calculus Calculational Programming

Program Calculus Calculational Programming Program Calculus Calculational Programming National Institute of Informatics June 21 / June 28 / July 5, 2010 Program Calculus Calculational Programming What we will learn? Discussing the mathematical

More information

Deadlock Avoidance in SCC

Deadlock Avoidance in SCC Deadlock Avoidance in SCC based on the AMAST 2008 paper Types and deadlock freedom in a calculus of services, sessions and pipelines Roberto Bruni 1 Leonardo Gaetano Mezzina 2 1 Dipartimento di Informatica

More information

On the Expressiveness of Polyadicity in Higher-Order Process Calculi

On the Expressiveness of Polyadicity in Higher-Order Process Calculi On the Expressiveness of Polyadicity in Higher-Order Process Calculi Ivan Lanese, Jorge A. Pérez, Davide Sangiorgi (Univ. di Bologna) Alan Schmitt (INRIA Grenoble - Rhône Alpes) ICTCS 09 Cremona, September

More information

Implementation of transducers in Vaucanson

Implementation of transducers in Vaucanson Implementation of transducers in Vaucanson Sarah O Connor LRDE seminar, June 23, 2004 http://vaucanson.lrde.epita.fr/ Copying this document Copying this document Copyright

More information

Type Inference with Recursive Type Equations

Type Inference with Recursive Type Equations Type Inference with Recursive Type Equations Mario Coppo Dipartimento di Informatica, Università di Torino, Corso Svizzera 185, 10149 Torino, Italy coppo@di.unito.it http://www.di.unito.it/ coppo Abstract.

More information

Hiding local state in direct style: a higher-order anti-frame rule

Hiding local state in direct style: a higher-order anti-frame rule 1 / 65 Hiding local state in direct style: a higher-order anti-frame rule François Pottier January 28th, 2008 2 / 65 Contents Introduction Basics of the type system A higher-order anti-frame rule Applications

More information

Improving Query Plans. CS157B Chris Pollett Mar. 21, 2005.

Improving Query Plans. CS157B Chris Pollett Mar. 21, 2005. Improving Query Plans CS157B Chris Pollett Mar. 21, 2005. Outline Parse Trees and Grammars Algebraic Laws for Improving Query Plans From Parse Trees To Logical Query Plans Syntax Analysis and Parse Trees

More information

(Pre-)Algebras for Linguistics

(Pre-)Algebras for Linguistics 2. Introducing Preordered Algebras Linguistics 680: Formal Foundations Autumn 2010 Algebras A (one-sorted) algebra is a set with one or more operations (where special elements are thought of as nullary

More information

Flexible Coloring. Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a. Abstract

Flexible Coloring. Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a. Abstract Flexible Coloring Xiaozhou Li a, Atri Rudra b, Ram Swaminathan a a firstname.lastname@hp.com, HP Labs, 1501 Page Mill Road, Palo Alto, CA 94304 b atri@buffalo.edu, Computer Sc. & Engg. dept., SUNY Buffalo,

More information

Theorem Proving Principles, Techniques, Applications Recursion

Theorem Proving Principles, Techniques, Applications Recursion NICTA Advanced Course Theorem Proving Principles, Techniques, Applications Recursion 1 CONTENT Intro & motivation, getting started with Isabelle Foundations & Principles Lambda Calculus Higher Order Logic,

More information

Connectivity of the zero-divisor graph for finite rings

Connectivity of the zero-divisor graph for finite rings Connectivity of the zero-divisor graph for finite rings Reza Akhtar and Lucas Lee Abstract The vertex-connectivity and edge-connectivity of the zero-divisor graph associated to a finite commutative ring

More information

Randomized rounding of semidefinite programs and primal-dual method for integer linear programming. Reza Moosavi Dr. Saeedeh Parsaeefard Dec.

Randomized rounding of semidefinite programs and primal-dual method for integer linear programming. Reza Moosavi Dr. Saeedeh Parsaeefard Dec. Randomized rounding of semidefinite programs and primal-dual method for integer linear programming Dr. Saeedeh Parsaeefard 1 2 3 4 Semidefinite Programming () 1 Integer Programming integer programming

More information

Mobile Applications in X-KLAIM

Mobile Applications in X-KLAIM Mobile Applications in X-KLAIM Lorenzo Bettini 1 Rocco De Nicola 1 GianLuigi Ferrari 2 Rosario Pugliese 1 1 Dipartimento di Sistemi e Informatica, Università di Firenze e-mail: fbettini,denicola,puglieseg@dsi.unifi.it

More information

Programming Languages Lecture 14: Sum, Product, Recursive Types

Programming Languages Lecture 14: Sum, Product, Recursive Types CSE 230: Winter 200 Principles of Programming Languages Lecture 4: Sum, Product, Recursive Types The end is nigh HW 3 No HW 4 (= Final) Project (Meeting + Talk) Ranjit Jhala UC San Diego Recap Goal: Relate

More information

CS 671, Automated Reasoning

CS 671, Automated Reasoning CS 671, Automated Reasoning Lesson 20: Type Constructs based on Intersection (II): dependent records, abstract data types, basic algebra April 3, 2001 Last time we discussed record types and their representation

More information

Relational Algebra. B term 2004: lecture 10, 11

Relational Algebra. B term 2004: lecture 10, 11 Relational lgebra term 00: lecture 0, Nov, 00 asics Relational lgebra is defined on bags, rather than relations. ag or multiset allows duplicate values; but order is not significant. We can write an expression

More information

Graph based codes for distributed storage systems

Graph based codes for distributed storage systems /23 Graph based codes for distributed storage systems July 2, 25 Christine Kelley University of Nebraska-Lincoln Joint work with Allison Beemer and Carolyn Mayer Combinatorics and Computer Algebra, COCOA

More information

Weakly Relational Domains for Floating-Point Computation Analysis

Weakly Relational Domains for Floating-Point Computation Analysis Weakly Relational Domains for Floating-Point Computation Analysis Eric Goubault, Sylvie Putot CEA Saclay, F91191 Gif-sur-Yvette Cedex, France {eric.goubault,sylvie.putot}@cea.fr 1 Introduction We present

More information

Data integration lecture 3

Data integration lecture 3 PhD course on View-based query processing Data integration lecture 3 Riccardo Rosati Dipartimento di Informatica e Sistemistica Università di Roma La Sapienza {rosati}@dis.uniroma1.it Corso di Dottorato

More information

Advanced Query Processing

Advanced Query Processing Advanced Query Processing CSEP544 Nov. 2015 CSEP544 Optimal Sequential Algorithms Nov. 2015 1 / 28 Lecture 9: Advanced Query Processing Optimal Sequential Algorithms. Semijoin Reduction Optimal Parallel

More information

MetaKlaim: A Type Safe Multi-stage Language for Global Computing

MetaKlaim: A Type Safe Multi-stage Language for Global Computing Under consideration for publication in Math. Struct. in Comp. Science MetaKlaim: A Type Safe Multi-stage Language for Global Computing G I A N L U I G I F E R R A R I 1 and E U G E N I O M O G G I 2 and

More information

COT 6405 Introduction to Theory of Algorithms

COT 6405 Introduction to Theory of Algorithms COT 6405 Introduction to Theory of Algorithms Topic 16. Single source shortest path 11/18/2015 1 Problem definition Problem: given a weighted directed graph G, find the minimum-weight path from a given

More information

Application Provisioning in Fog Computingenabled Internet-of-Things: A Network Perspective

Application Provisioning in Fog Computingenabled Internet-of-Things: A Network Perspective Application Provisioning in Fog Computingenabled Internet-of-Things: A Network Perspective Ruozhou Yu, Guoliang Xue, and Xiang Zhang Arizona State University Outlines Background and Motivation System Modeling

More information

Formal Systems II: Applications

Formal Systems II: Applications Formal Systems II: Applications Functional Verification of Java Programs: Java Dynamic Logic Bernhard Beckert Mattias Ulbrich SS 2017 KIT INSTITUT FÜR THEORETISCHE INFORMATIK KIT University of the State

More information

f (Pijk ) V. may form the Riemann sum: . Definition. The triple integral of f over the rectangular box B is defined to f (x, y, z) dv = lim

f (Pijk ) V. may form the Riemann sum: . Definition. The triple integral of f over the rectangular box B is defined to f (x, y, z) dv = lim Chapter 14 Multiple Integrals..1 Double Integrals, Iterated Integrals, Cross-sections.2 Double Integrals over more general regions, Definition, Evaluation of Double Integrals, Properties of Double Integrals.3

More information

The 2-core of a Non-homogeneous Hypergraph

The 2-core of a Non-homogeneous Hypergraph July 16, 2012 k-cores A Hypergraph G on vertex set V is a collection E of subsets of V. E is the set of hyperedges. For ordinary graphs, e = 2 for all e E. The k-core of a (hyper)graph is the maximal subgraph

More information

CSC 501 Semantics of Programming Languages

CSC 501 Semantics of Programming Languages CSC 501 Semantics of Programming Languages Subtitle: An Introduction to Formal Methods. Instructor: Dr. Lutz Hamel Email: hamel@cs.uri.edu Office: Tyler, Rm 251 Books There are no required books in this

More information

UNIT-II NUMBER THEORY

UNIT-II NUMBER THEORY UNIT-II NUMBER THEORY An integer n is even if, and only if, n equals twice some integer. i.e. if n is an integer, then n is even an integer k such that n =2k An integer n is odd if, and only if, n equals

More information

Red-Black Trees (2) Antonio Carzaniga. April 23, Faculty of Informatics Università della Svizzera italiana Antonio Carzaniga

Red-Black Trees (2) Antonio Carzaniga. April 23, Faculty of Informatics Università della Svizzera italiana Antonio Carzaniga Red-Black Trees (2) Antonio Carzaniga Faculty of Informatics Università della Svizzera italiana April 23, 2013 Recap on Red-Black Trees 2006 Antonio Carzaniga Recap on Red-Black Trees 12 5 18 2 9 15 19

More information

Modelling Downgrading in Information Flow Security. A. Bossi, C. Piazza, and S. Rossi. Dipartimento di Informatica Università Ca Foscari di Venezia

Modelling Downgrading in Information Flow Security. A. Bossi, C. Piazza, and S. Rossi. Dipartimento di Informatica Università Ca Foscari di Venezia Modelling Downgrading in Information Flow Security A. Bossi, C. Piazza, and S. Rossi Dipartimento di Informatica Università Ca Foscari di Venezia bossi, piazza, srossi @dsi.unive.it Joint Meeting MYTHS/MIKADO/DART,

More information

DYNAMIC ADAPTATION OF ACCESS CONTROL POLICIES

DYNAMIC ADAPTATION OF ACCESS CONTROL POLICIES DYNAMIC ADAPTATION OF ACCESS CONTROL POLICIES Vijay Bharadwaj and John Baras Institute for Systems Research University of Maryland College Park MD 20742 ABSTRACT We describe an architecture and algorithms

More information

SYNERGY INSTITUTE OF ENGINEERING & TECHNOLOGY,DHENKANAL LECTURE NOTES ON DIGITAL ELECTRONICS CIRCUIT(SUBJECT CODE:PCEC4202)

SYNERGY INSTITUTE OF ENGINEERING & TECHNOLOGY,DHENKANAL LECTURE NOTES ON DIGITAL ELECTRONICS CIRCUIT(SUBJECT CODE:PCEC4202) Lecture No:5 Boolean Expressions and Definitions Boolean Algebra Boolean Algebra is used to analyze and simplify the digital (logic) circuits. It uses only the binary numbers i.e. 0 and 1. It is also called

More information

Module 6. Knowledge Representation and Logic (First Order Logic) Version 2 CSE IIT, Kharagpur

Module 6. Knowledge Representation and Logic (First Order Logic) Version 2 CSE IIT, Kharagpur Module 6 Knowledge Representation and Logic (First Order Logic) 6.1 Instructional Objective Students should understand the advantages of first order logic as a knowledge representation language Students

More information

Dependent Object Types - A foundation for Scala's type system

Dependent Object Types - A foundation for Scala's type system Dependent Object Types - A foundation for Scala's type system Draft of January 14, 2010 Do Not Distrubute Martin Odersky, Georey Alan Washburn EPFL Abstract. 1 Introduction This paper presents a proposal

More information

Interaction Nets vs. the ρ-calculus: Introducing Bigraphical Nets

Interaction Nets vs. the ρ-calculus: Introducing Bigraphical Nets Interaction Nets vs. the ρ-calculus: Introducing Bigraphical Nets Maribel Fernández 1 Ian Mackie 1 François-Régis Sinot 2 1 DCS, King s College London 2 LIX, École Polytechnique Rho-Calculus Workshop,

More information

Hoare logic. A proof system for separation logic. Introduction. Separation logic

Hoare logic. A proof system for separation logic. Introduction. Separation logic Introduction Hoare logic Lecture 6: Examples in separation logic In the previous lecture, we saw how reasoning about pointers in Hoare logic was problematic, which motivated introducing separation logic.

More information

Negations in Refinement Type Systems

Negations in Refinement Type Systems Negations in Refinement Type Systems T. Tsukada (U. Tokyo) 14th March 2016 Shonan, JAPAN This Talk About refinement intersection type systems that refute judgements of other type systems. Background Refinement

More information

Graph Theory and Optimization Approximation Algorithms

Graph Theory and Optimization Approximation Algorithms Graph Theory and Optimization Approximation Algorithms Nicolas Nisse Université Côte d Azur, Inria, CNRS, I3S, France October 2018 Thank you to F. Giroire for some of the slides N. Nisse Graph Theory and

More information

Inductive datatypes in HOL. lessons learned in Formal-Logic Engineering

Inductive datatypes in HOL. lessons learned in Formal-Logic Engineering Inductive datatypes in HOL lessons learned in Formal-Logic Engineering Stefan Berghofer and Markus Wenzel Institut für Informatik TU München = Isabelle λ β HOL α 1 Introduction Applications of inductive

More information

Topology basics. Constraints and measures. Butterfly networks.

Topology basics. Constraints and measures. Butterfly networks. EE48: Advanced Computer Organization Lecture # Interconnection Networks Architecture and Design Stanford University Topology basics. Constraints and measures. Butterfly networks. Lecture #: Monday, 7 April

More information

Predictive Bandwidth Control for GEO Satellite Networks

Predictive Bandwidth Control for GEO Satellite Networks Outline Predictive Bandwidth Control for GEO Satellite Networks L. Chisci 1 R. Fantacci 2 T. Pecorella 3 1 Dpt. di Sistemi e Informatica Università di Firenze, Italy. 2 Dpt. di Elettronica e Telecomunicazioni

More information

Dependent Object Types - A foundation for Scala s type system

Dependent Object Types - A foundation for Scala s type system Dependent Object Types - A foundation for Scala s type system Draft of September 9, 2012 Do Not Distrubute Martin Odersky, Geoffrey Alan Washburn EPFL Abstract. 1 Introduction This paper presents a proposal

More information

Circuit analysis summary

Circuit analysis summary Boolean Algebra Circuit analysis summary After finding the circuit inputs and outputs, you can come up with either an expression or a truth table to describe what the circuit does. You can easily convert

More information

Coordination Languages

Coordination Languages c.hankin@imperial.ac.uk Department of Computing, BCS Advanced Programming Group Lecture, December 2008 Outline 1 Introduction 2 Linda 3 JavaSpaces 4 KLAIM 5 AspectK 6 Example Programs 7 Conclusions Outline

More information

Soft constraints: Polynomial classes, Applications

Soft constraints: Polynomial classes, Applications Soft constraints: Polynomial classes, Applications T. Schiex INRA - Toulouse, France Padova 2004 - Soft constraints p. 1 Polynomial classes structural classes: when the constraint (hyper)-graph has good

More information

Lecture 5 - Axiomatic semantics

Lecture 5 - Axiomatic semantics Program Verification March 2014 Lecture 5 - Axiomatic semantics Lecturer: Noam Rinetzky Scribes by: Nir Hemed 1.1 Axiomatic semantics The development of the theory is contributed to Robert Floyd, C.A.R

More information

Grad operator, triple and line integrals. Notice: this material must not be used as a substitute for attending the lectures

Grad operator, triple and line integrals. Notice: this material must not be used as a substitute for attending the lectures Grad operator, triple and line integrals Notice: this material must not be used as a substitute for attending the lectures 1 .1 The grad operator Let f(x 1, x,..., x n ) be a function of the n variables

More information

Boolean Algebra. P1. The OR operation is closed for all x, y B x + y B

Boolean Algebra. P1. The OR operation is closed for all x, y B x + y B Boolean Algebra A Boolean Algebra is a mathematical system consisting of a set of elements B, two binary operations OR (+) and AND ( ), a unary operation NOT ('), an equality sign (=) to indicate equivalence

More information

On Covering a Graph Optimally with Induced Subgraphs

On Covering a Graph Optimally with Induced Subgraphs On Covering a Graph Optimally with Induced Subgraphs Shripad Thite April 1, 006 Abstract We consider the problem of covering a graph with a given number of induced subgraphs so that the maximum number

More information

Towards a Notion of Transaction in Graph Rewriting 1

Towards a Notion of Transaction in Graph Rewriting 1 GT-VMT Towards a Notion of Transaction in Graph Rewriting P. Baldan a, A. Corradini b, F.L. Dotti c, L. Foss b,d, F. Gadducci b, L. Ribeiro d a Università Ca Foscari di Venezia, Italy b Università di Pisa,

More information

Self-Controlling Architecture Structured Agents

Self-Controlling Architecture Structured Agents Self-Controlling Architecture Structured Agents Mieczyslaw M. Kokar (contact author) Department of Electrical and Computer Engineering 360 Huntington Avenue, Boston, MA 02115 ph: (617) 373-4849, fax: (617)

More information

Communication in Distributed Systems

Communication in Distributed Systems Communication in Distributed Systems Distributed Systems Sistemi Distribuiti Andrea Omicini andrea.omicini@unibo.it Dipartimento di Informatica Scienza e Ingegneria (DISI) Alma Mater Studiorum Università

More information

THE -COMPOSITION OF INTUITIONISTIC FUZZY IMPLICATIONS: AN ALGEBRAIC STUDY OF POWERS AND FAMILIES

THE -COMPOSITION OF INTUITIONISTIC FUZZY IMPLICATIONS: AN ALGEBRAIC STUDY OF POWERS AND FAMILIES Volume 9, No. 1, Jan. - 2018 (Special ssue) nternational Journal of Mathematical Archive-9(1), 2018, 71-77 Available online through www.ijma.info SSN 2229 5046 THE -COMPOSTON OF NTUTONSTC FUZZY MPLCATONS:

More information

Computing the Minimum Hamming Distance for Z 2 Z 4 -Linear Codes

Computing the Minimum Hamming Distance for Z 2 Z 4 -Linear Codes Computing the Minimum Hamming Distance for Z 2 Z 4 -Linear Codes Marta Pujol and Mercè Villanueva Combinatorics, Coding and Security Group (CCSG) Universitat Autònoma de Barcelona (UAB) VIII JMDA, Almería

More information

Combinatorics of free product graphs

Combinatorics of free product graphs Combinatorics of free product graphs Gregory Quenell March 8, 994 Abstract We define the return generating function on an abstract graph, and develop tools for computing such functions. The relation between

More information

Embedding logics in Dedukti

Embedding logics in Dedukti 1 INRIA, 2 Ecole Polytechnique, 3 ENSIIE/Cedric Embedding logics in Dedukti Ali Assaf 12, Guillaume Burel 3 April 12, 2013 Ali Assaf, Guillaume Burel: Embedding logics in Dedukti, 1 Outline Introduction

More information

Block Crossings in Storyline Visualizations

Block Crossings in Storyline Visualizations Block Crossings in Storyline Visualizations Thomas van Dijk, Martin Fink, Norbert Fischer, Fabian Lipp, Peter Markfelder, Alexander Ravsky, Subhash Suri, and Alexander Wolff 3/15 3/15 block crossing 3/15

More information

CS415 Compilers. Syntax Analysis. These slides are based on slides copyrighted by Keith Cooper, Ken Kennedy & Linda Torczon at Rice University

CS415 Compilers. Syntax Analysis. These slides are based on slides copyrighted by Keith Cooper, Ken Kennedy & Linda Torczon at Rice University CS415 Compilers Syntax Analysis These slides are based on slides copyrighted by Keith Cooper, Ken Kennedy & Linda Torczon at Rice University Limits of Regular Languages Advantages of Regular Expressions

More information

Generalized alternative and Malcev algebras

Generalized alternative and Malcev algebras Mathematics Publications Mathematics 1982 Generalized alternative and Malcev algebras Irvin R. Hentzel Iowa State University, hentzel@iastate.edu H.F. Smith Iowa State University Follow this and additional

More information

On the Recognizability of Arrow and Graph Languages

On the Recognizability of Arrow and Graph Languages On the Recognizability of Arrow and Graph Languages Christoph Blume Sander Bruggink Barbara König Universität Duisburg-Essen, Germany Background Applications of finite automata and regular (word) languages

More information

Synchronous Specification

Synchronous Specification Translation Validation for Synchronous Specification in the Signal Compiler Van-Chan Ngo Jean-Pierre Talpin Thierry Gautier INRIA Rennes, France FORTE 2015 Construct a modular translation validationbased

More information

Security Protocol Deployment Risk

Security Protocol Deployment Risk Security Protocol Deployment Risk Simon N. Foley 1, Giampaolo Bella 2,3, and Stefano Bistarelli 4,5 1 Department of Computer Science, University College Cork, Ireland 2 SAP Research, Mougins, France 3

More information

A soft constraint-based approach to the cascade vulnerability problem

A soft constraint-based approach to the cascade vulnerability problem Journal of Computer Security 13 (2005) 699 720 699 IOS Press A soft constraint-based approach to the cascade vulnerability problem Stefano Bistarelli a,b, Simon N. Foley c and Barry O Sullivan d a Istituto

More information