A Complete Approximation Theory for Weighted Transition Systems

Size: px
Start display at page:

Download "A Complete Approximation Theory for Weighted Transition Systems"

Transcription

1 A Complete Approximation Theory for Weighted Transition Systems December 1, 2015 Peter Christoffersen Mikkel Hansen Mathias R. Pedersen Radu Mardare Kim G. Larsen Department of Computer Science Aalborg University Denmark

2 Agenda 1 Introduction Logic Axiomatization Canonical model construction Weak completeness Conclusion

3 Motivation 2 Today microchips are used nearly everywhere we look. Cyber-physical systems The idea of combining computation and the physical world. Use sensors and input devices for humans to affect the computation. Motors, actuators and other mechanics can alter and affect the world.

4 Motivation 2 Today microchips are used nearly everywhere we look. Cyber-physical systems The idea of combining computation and the physical world. Use sensors and input devices for humans to affect the computation. Motors, actuators and other mechanics can alter and affect the world. When dealing with real-world processes you often rely on resources such as: Energy, money, distances etc.

5 Motivation Resource modeling 3 Weighted Transition Systems (WTS) can encode this quantitative behaviour, though in a strictly precise fashion. WTS example: Robot vacuum cleaner Clean? Yes. Room is Cleaned. The room takes 20 units, e.g. time or energy, to clean. Y 20 0 C

6 Motivation Resource modeling 3 Weighted Transition Systems (WTS) can encode this quantitative behaviour, though in a strictly precise fashion. WTS example: Robot vacuum cleaner Clean? Yes. Room is Cleaned. The room takes 20 units, e.g. time or energy, to clean. Y 20 0 C What if the room had a very varying degree of dirtiness?

7 Motivation Resource modeling 4 Cyber-physical systems Sensors and inputs from the world affects computations, likewise mechanical output affects the world. The settings these systems operate in are often unpredictable, and the inputs are always with some imprecision. Problems Tolerance of sensors. Unpredictable environment. We can only reason about what is encoded in the model.

8 Motivation Resource modeling 5 Solution Let the model account for the imprecision so we can reason about it. We extend the notion of WTS with bounds x, y on transitions. This captures the imprecision in the modeling domain by denoting a whole range of values. WTS example: Robot vacuum cleaner Clean? Yes. Room is Cleaned. The room takes 5 to 20 units, e.g. time or energy, to clean. Y 5, 20 0 C

9 Contribution 6 An extension of Weighted Transition Systems with bounds, as well as a suitable notion of bisimulation. Logic to reason with bounds that has the Hennessy-Milner property. Weak-complete axiomatization of the logic.

10 Bounds 7 Bounds A bound B R 2 0 is either the empty set or a tuple x, y where x y. Denote the set of all bounds by B. A B iff B A and A + B + B A A + B + A B = min{a, B }, max{a +, B + } B B + A A + + A B = max{a, B }, min{a +, B + } B A B + A + +

11 Generalized Weighted Transition Systems 8 A Generalized Weighted Transition System (GTS) is a tuple G = (S, θ, l), where Transition function θ : S (2 S B) is a transition function satisfying the following conditions: θ (s) ( ) =, ( ) θ (s) S i = θ (s) (S i ), and i i ( ) ( ) θ (s) S i = θ (s) S i = i i i θ (s) (S i ). (I) (II) (III)

12 GTS: Transition function Property II 9 ( ) θ (s) S i = i i θ (s) (S i ) θ (s) ({t 1 } {t 3 } {t 4 }) = min{1, 3, 6}, max{1, 4, 6} = 1, 6 1, 1 t 1 s 3, 4 6, 6 t 4 t 1 s 1, 6 t 4 t3 t3 t 2 t 2

13 Logic Syntax 10 Syntax L : ϕ, ψ ::= p ϕ ϕ ψ L r ϕ M r ϕ where r Q 0 and p AP. Semantics G, s = L r ϕ iff can reach a state satisfying ϕ with weight at least r G, s = M r ϕ iff can reach a state satisfying ϕ with weight at most r

14 Logic Syntax 10 Syntax L : ϕ, ψ ::= p ϕ ϕ ψ L r ϕ M r ϕ where r Q 0 and p AP. Semantics G, s = L r ϕ iff θ (s) ( ϕ ) and θ (s) ( ϕ ) r G, s = M r ϕ iff θ (s) ( ϕ ) and θ + (s) ( ϕ ) r where ϕ is the set of all GTS states with the property ϕ, i.e. ϕ = {s (S, θ, l) G : s S and G, s = ϕ}

15 Logic Example 11 Example s 2, 4 s ϕ s +

16 Logic Example 12 Example s 2 2, 4 s ϕ G, s = L 2 ϕ s +

17 Logic Example 13 Example s 2, 4 s ϕ G, s = L 2 ϕ G, s = M 4 ϕ s 4

18 Logic Example 14 Example s G, s = L 2 ϕ 2, 4 s ϕ 3 G, s = M 4 ϕ G, s = L 3 ϕ s +

19 Logic Example 15 Example s G, s = L 2 ϕ 2, 4 G, s = M 4 ϕ s ϕ 3 G, s = L 3 ϕ s + G, s = M 3 ϕ

20 Logic Derived operators 16 In addition to the operators defined by the syntax, we have the following derived operators Derived operators ϕ ψ def = ϕ ϕ def = def = ( ϕ ψ) ϕ ψ def = ϕ ψ

21 Logic Derived operators 16 In addition to the operators defined by the syntax, we have the following derived operators Derived operators ϕ ψ def = ϕ ϕ def = def = ( ϕ ψ) ϕ ψ def = ϕ ψ We can encode and with their usual semantics, semantics ϕ ϕ def = L 0 ϕ def = ϕ = L 0 ϕ

22 Bisimulation 17 Bisimulation Given GTS G = (S, θ, l), an equivalence relation R on S is a bisimulation relation iff srt implies l(s) = l(t) and θ(s)(t ) = θ(t)(t ) for all equivalence classes T S/R. Bisimulation invariance (Hennessy-Milner property) s t iff [ ϕ L : G, s = ϕ G, t = ϕ].

23 Filters 18 Filter A non-empty subset F of L is called a filter iff / F, ϕ F and ϕ ψ implies ψ F, and ϕ F and ψ F implies ϕ ψ F. Ultrafilter A filter F is called an ultrafilter iff for every ϕ L either ϕ F or ϕ F, but not both.

24 Axioms 19 (A1): L 0 (A2): L r+s ϕ L r ϕ, s > 0 (A2 ): M r ϕ M r+s ϕ, s > 0 (A3): L r ϕ L s ψ L min{r,s} (ϕ ψ) (A3 ): M r ϕ M s ψ M max{r,s} (ϕ ψ) (A4): ((L r ϕ) (L s ψ)) ( L 0 (ϕ ψ) L max{r,s} (ϕ ψ) ) (A4 ): ((M r ϕ) (M s ψ)) ( L 0 (ϕ ψ) M min{r,s} (ϕ ψ) ) (A5): ((L 0 ϕ) ( L r ϕ) (L 0 ψ) ( L s ψ)) L max{r,s} (ϕ ψ) (A5 ): ((L 0 ϕ) ( M r ϕ) (L 0 ψ) ( M s ψ)) M min{r,s} (ϕ ψ) (A6): L r (ϕ ψ) L r ϕ L r ψ (A6 ): M r (ϕ ψ) M r ϕ M r ψ (A7): L 0 ψ (L r ϕ L r (ϕ ψ)) (A7 ): L 0 ψ (M r ϕ M r (ϕ ψ)) (A8): L r+s ϕ M r ϕ, s > 0 (A9): M r ϕ L 0 ϕ

25 Axioms A2 and A2 20 (A2) L r+s ϕ L r ϕ, s > 0 (A2 ) M t ϕ M t+q ϕ, q > 0 + r + s t ϕ

26 Axioms A3 21 (A3) L r ϕ L s ψ L min{r,s} (ϕ ψ) r s + ϕ ϕ ψ ψ

27 Axioms A3 22 (A3 ) M r ϕ M s ψ M max{r,s} (ϕ ψ) r s + ϕ ϕ ψ ψ

28 Axioms A8 23 (A8) L r+s ϕ M r ϕ, s > 0 + r + s r ϕ

29 Axioms A9 24 (A9) M r ϕ L 0 ϕ 0 r + ϕ

30 Axioms 25 (R1): {L s ϕ s < r} L r ϕ (R1 ): {M s ϕ s > r} M r ϕ (R2): ϕ ψ = ((L r ψ) (L 0 ϕ)) L r ϕ (R2 ): ϕ ψ = ((M s ψ) (L 0 ϕ)) M s ϕ (R3): ϕ ψ = L 0 ϕ L 0 ψ (R4): { M r ϕ r Q 0 } L 0 ϕ (R5): (R5 ): {ϕ i i N} ϕ ϕ i+1 ϕ i ϕ ϕ i i N, s > 0 { L r ϕ i i N} L r+s ϕ {ϕ i i N} ϕ ϕ i+1 ϕ i ϕ ϕ i i N, s > 0 { M r+s ϕ i i N} M r ϕ (R6): {L r+s ϕ ϕ F } { L r ψ F ψ} (R6 ): {M r+s ϕ ϕ F } { M r ψ F ψ}

31 Axioms R2 and R2 26 (R2) ϕ ψ = ((L r ψ) (L 0 ϕ)) L r ϕ (R2 ) ϕ ψ = ((M s ψ) (L 0 ϕ)) M s ϕ r s + ψ ϕ

32 Axioms R5 27 (R5) {ϕ i i N} ϕ ϕ i+1 ϕ i ϕ ϕ i i N, s > 0 { L r ϕ i i N} L r+s ϕ + r ϕ 1 ϕ 2 ϕ 3 ϕ

33 Axioms R5 28 (R5 ) {ϕ i i N} ϕ ϕ i+1 ϕ i ϕ ϕ i i N, s > 0 { M r+s ϕ i i N} M r ϕ + r ϕ 1 ϕ 2 ϕ 3 ϕ

34 Axioms Soundness 29 Lemma (Soundness) ϕ implies = ϕ.

35 Canonical model construction 30 GTS with ultrafilters as states. Transition function must satisfy conditions I-III. θl : U [L B] θf : U [F { } B] θu : U [2 U B] Labeling function l U : U 2 AP. lu(u) = {p AP p u}

36 Formulae 31 Transition function to formulae { θ L (u)(ϕ) = sup{r L r ϕ u}, inf{s M s ϕ u} if L 0 ϕ / u otherwise. The function θ L assigns a bound to each transition from an ultrafilter to a formula. Lemma L 0 ϕ u implies sup{r L r ϕ u} inf{s M s ϕ u}. This means that the definition for θ L does not give ill-formed bounds.

37 Filters 32 Transition function to filters θ F (u)(f) = ϕ F θ L (u)(ϕ), Φ = { { } if Φ = {ϕ L ϕ ψ for all ψ Φ} otherwise.

38 Ultrafilters 33 f 2 U F θ F (u) f θ F (u) B f is an isomorphism between 2 U and F given by f (U) = u. u U

39 Ultrafilters 34 Transition function to sets of ultrafilters θ U (u)(u) = θ F (u)(f (U)). Theorem The canonical model G U = (U, θ U, l U ) is a GTS.

40 Truth Lemma 35 Truth lemma For consistent ϕ L, G U, u = ϕ iff ϕ u.

41 Weak completeness 36 Weak completeness = ϕ implies ϕ. Proof = ϕ implies ϕ iff ϕ implies = ϕ iff the consistency of ϕ implies the existences of a model for ϕ and this is true because of Lindenbaum s lemma and the truth lemma.

42 Conclusion 37 Contribution New modelling formalism and logic with bounds to encode imprecisions. Logic has the Hennessy-Milner property. Weak-complete axiomization.

43 Conclusion 37 Contribution New modelling formalism and logic with bounds to encode imprecisions. Logic has the Hennessy-Milner property. Weak-complete axiomization. Future work Strong completeness. Dependent axioms. Remove axioms with uncountably many instances. Relationship between WTS and GTS.

44 Thank you 38 Thank you!

Modal logic. Benzmüller/Rojas, 2014 Artificial Intelligence 2

Modal logic. Benzmüller/Rojas, 2014 Artificial Intelligence 2 Modal logic Benzmüller/Rojas, 2014 Artificial Intelligence 2 What is Modal Logic? Narrowly, traditionally: modal logic studies reasoning that involves the use of the expressions necessarily and possibly.

More information

Formal Verification. Lecture 5: Computation Tree Logic (CTL)

Formal Verification. Lecture 5: Computation Tree Logic (CTL) Formal Verification Lecture 5: Computation Tree Logic (CTL) Jacques Fleuriot 1 jdf@inf.ac.uk 1 With thanks to Bob Atkey for some of the diagrams. Recap Previously: Linear-time Temporal Logic This time:

More information

A Fractal which violates the Axiom of Determinacy

A Fractal which violates the Axiom of Determinacy BRICS RS-94-4 S. Riis: A Fractal which violates the Axiom of Determinacy BRICS Basic Research in Computer Science A Fractal which violates the Axiom of Determinacy Søren Riis BRICS Report Series RS-94-4

More information

22c181: Formal Methods in Software Engineering. The University of Iowa Spring Propositional Logic

22c181: Formal Methods in Software Engineering. The University of Iowa Spring Propositional Logic 22c181: Formal Methods in Software Engineering The University of Iowa Spring 2010 Propositional Logic Copyright 2010 Cesare Tinelli. These notes are copyrighted materials and may not be used in other course

More information

Bisimulation and Modal Logic in Distributed Computing

Bisimulation and Modal Logic in Distributed Computing Bisimulation and Modal Logic in Distributed Computing Tuomo Lempiäinen Distributed Algorithms group, Department of Computer Science, Aalto University (joint work with Lauri Hella, Matti Järvisalo, Antti

More information

A Model for Broadcast, Unicast and Multicast Communications of Mobile Ad Hoc Networks

A Model for Broadcast, Unicast and Multicast Communications of Mobile Ad Hoc Networks A Model for Broadcast, Unicast and Multicast Communications of Mobile Ad Hoc Networks Lucia Gallina and Sabina Rossi Dipartimento di Informatica, Università Ca Foscari Venezia, Italy e-mail: {lgallina,srossi}@dsi.unive.it

More information

Stanford University CS261: Optimization Handout 9 Luca Trevisan February 1, 2011

Stanford University CS261: Optimization Handout 9 Luca Trevisan February 1, 2011 Stanford University CS261: Optimization Handout 9 Luca Trevisan February 1, 2011 Lecture 9 In which we introduce the maximum flow problem. 1 Flows in Networks Today we start talking about the Maximum Flow

More information

Logical Agents (AIMA - Chapter 7)

Logical Agents (AIMA - Chapter 7) Logical Agents (AIMA - Chapter 7) CIS 391 - Intro to AI 1 Outline 1. Wumpus world 2. Logic-based agents 3. Propositional logic Syntax, semantics, inference, validity, equivalence and satifiability Next

More information

11/18/2015. Outline. Logical Agents. The Wumpus World. 1. Automating Hunt the Wumpus : A different kind of problem

11/18/2015. Outline. Logical Agents. The Wumpus World. 1. Automating Hunt the Wumpus : A different kind of problem Outline Logical Agents (AIMA - Chapter 7) 1. Wumpus world 2. Logic-based agents 3. Propositional logic Syntax, semantics, inference, validity, equivalence and satifiability Next Time: Automated Propositional

More information

KARO logic (Van Linder et al.) Epistemic logic. Dynamic Logic. Dynamic Logic KARO. Dynamic Logic. knowledge. belief. Interpretation formulas

KARO logic (Van Linder et al.) Epistemic logic. Dynamic Logic. Dynamic Logic KARO. Dynamic Logic. knowledge. belief. Interpretation formulas KARO logic (Van Linder et al.) Knowledge & Belief: epistemic logic Abilities, Results & Opportunities: dynamic logic Modalities for Desires & Goals Epistemic logic Kϕ ϕ Kϕ KKϕ Kϕ K Kϕ B Bϕ BBϕ Bϕ B Bϕ

More information

CIS/CSE 774 Principles of Distributed Access Control Exam 1 October 3, Points Possible. Total 60

CIS/CSE 774 Principles of Distributed Access Control Exam 1 October 3, Points Possible. Total 60 Name: CIS/CSE 774 Principles of Distributed Access Control Exam 1 October 3, 2013 Question Points Possible Points Received 1 24 2 12 3 12 4 12 Total 60 Instructions: 1. This exam is a closed-book, closed-notes

More information

Outline. Sets of Gluing Data. Constructing Manifolds. Lecture 3 - February 3, PM

Outline. Sets of Gluing Data. Constructing Manifolds. Lecture 3 - February 3, PM Constructing Manifolds Lecture 3 - February 3, 2009-1-2 PM Outline Sets of gluing data The cocycle condition Parametric pseudo-manifolds (PPM s) Conclusions 2 Let n and k be integers such that n 1 and

More information

Axiom A-1: To every angle there corresponds a unique, real number, 0 < < 180.

Axiom A-1: To every angle there corresponds a unique, real number, 0 < < 180. Axiom A-1: To every angle there corresponds a unique, real number, 0 < < 180. We denote the measure of ABC by m ABC. (Temporary Definition): A point D lies in the interior of ABC iff there exists a segment

More information

Awareness in Games, Awareness in Logic

Awareness in Games, Awareness in Logic Awareness in Games, Awareness in Logic Joseph Halpern Leandro Rêgo Cornell University Awareness in Games, Awareness in Logic p 1/37 Game Theory Standard game theory models assume that the structure of

More information

Two Perspectives on Logic

Two Perspectives on Logic LOGIC IN PLAY Two Perspectives on Logic World description: tracing the structure of reality. Structured social activity: conversation, argumentation,...!!! Compatible and Interacting Views Process Product

More information

International Journal of Mathematical Archive-5(6), 2014, Available online through ISSN

International Journal of Mathematical Archive-5(6), 2014, Available online through  ISSN International Journal of Mathematical Archive-5(6), 2014, 119-124 Available online through www.ijma.info ISSN 2229 5046 CLOSURE OPERATORS ON COMPLETE ALMOST DISTRIBUTIVE LATTICES-I G. C. Rao Department

More information

5.4 Imperfect, Real-Time Decisions

5.4 Imperfect, Real-Time Decisions 5.4 Imperfect, Real-Time Decisions Searching through the whole (pruned) game tree is too inefficient for any realistic game Moves must be made in a reasonable amount of time One has to cut off the generation

More information

Part 2. Cooperative Game Theory

Part 2. Cooperative Game Theory Part 2 Cooperative Game Theory CHAPTER 3 Coalitional games A coalitional game is a model of interacting decision makers that focuses on the behaviour of groups of players. Each group of players is called

More information

Business Process Management

Business Process Management Business Process Management Orchestrations, Choreographies, and Verification Frank Puhlmann Business Process Technology Group Hasso Plattner Institut Potsdam, Germany 1 Mapping Graphical Notations The

More information

Reasoning About Strategies

Reasoning About Strategies Reasoning About Strategies Johan van Benthem 1 University of Amsterdam and Stanford University Abstract. Samson Abramsky has placed landmarks in the world of logic and games that I have long admired. In

More information

The tenure game. The tenure game. Winning strategies for the tenure game. Winning condition for the tenure game

The tenure game. The tenure game. Winning strategies for the tenure game. Winning condition for the tenure game The tenure game The tenure game is played by two players Alice and Bob. Initially, finitely many tokens are placed at positions that are nonzero natural numbers. Then Alice and Bob alternate in their moves

More information

18 Completeness and Compactness of First-Order Tableaux

18 Completeness and Compactness of First-Order Tableaux CS 486: Applied Logic Lecture 18, March 27, 2003 18 Completeness and Compactness of First-Order Tableaux 18.1 Completeness Proving the completeness of a first-order calculus gives us Gödel s famous completeness

More information

On Comparing the Power of Robots

On Comparing the Power of Robots On Comparing the Power of Robots Jason M. O Kane and Steven M. LaValle Abstract Robots must complete their tasks in spite of unreliable actuators and limited, noisy sensing. In this paper, we consider

More information

PATTERN AVOIDANCE IN PERMUTATIONS ON THE BOOLEAN LATTICE

PATTERN AVOIDANCE IN PERMUTATIONS ON THE BOOLEAN LATTICE PATTERN AVOIDANCE IN PERMUTATIONS ON THE BOOLEAN LATTICE SAM HOPKINS AND MORGAN WEILER Abstract. We extend the concept of pattern avoidance in permutations on a totally ordered set to pattern avoidance

More information

Final exam. Question Points Score. Total: 150

Final exam. Question Points Score. Total: 150 MATH 11200/20 Final exam DECEMBER 9, 2016 ALAN CHANG Please present your solutions clearly and in an organized way Answer the questions in the space provided on the question sheets If you run out of room

More information

Lecture 3 - Regression

Lecture 3 - Regression Lecture 3 - Regression Instructor: Prof Ganesh Ramakrishnan July 25, 2016 1 / 30 The Simplest ML Problem: Least Square Regression Curve Fitting: Motivation Error measurement Minimizing Error Method of

More information

A State Equivalence and Confluence Checker for CHR

A State Equivalence and Confluence Checker for CHR A State Equivalence and Confluence Checker for CHR Johannes Langbein, Frank Raiser, and Thom Frühwirth Faculty of Engineering and Computer Science, Ulm University, Germany firstname.lastname@uni-ulm.de

More information

The Hex game and its mathematical side

The Hex game and its mathematical side The Hex game and its mathematical side Antonín Procházka Laboratoire de Mathématiques de Besançon Université Franche-Comté Lycée Jules Haag, 19 mars 2013 Brief history : HEX was invented in 1942

More information

Introduction to Computational Manifolds and Applications

Introduction to Computational Manifolds and Applications IMPA - Instituto de Matemática Pura e Aplicada, Rio de Janeiro, RJ, Brazil Introduction to Computational Manifolds and Applications Part 1 - Foundations Prof. Jean Gallier jean@cis.upenn.edu Department

More information

Game Description Logic and Game Playing

Game Description Logic and Game Playing Game Description Logic and Game Playing Laurent Perrussel November 29 - Planning and Games workshop IRIT Université Toulouse Capitole 1 Motivation Motivation(1/2) Game: describe and justify actions in

More information

Sets. Gazihan Alankuş (Based on original slides by Brahim Hnich et al.) August 6, Outline Sets Equality Subset Empty Set Cardinality Power Set

Sets. Gazihan Alankuş (Based on original slides by Brahim Hnich et al.) August 6, Outline Sets Equality Subset Empty Set Cardinality Power Set Gazihan Alankuş (Based on original slides by Brahim Hnich et al.) August 6, 2012 Gazihan Alankuş (Based on original slides by Brahim Hnich et al.) Gazihan Alankuş (Based on original slides by Brahim Hnich

More information

Pattern Avoidance in Poset Permutations

Pattern Avoidance in Poset Permutations Pattern Avoidance in Poset Permutations Sam Hopkins and Morgan Weiler Massachusetts Institute of Technology and University of California, Berkeley Permutation Patterns, Paris; July 5th, 2013 1 Definitions

More information

On Comparing the Power of Robots

On Comparing the Power of Robots On Comparing the Power of Robots Jason M. O Kane and Steven M. LaValle Abstract Robots must complete their tasks in spite of unreliable actuators and limited, noisy sensing. In this paper, we consider

More information

Decidability of the PAL Substitution Core

Decidability of the PAL Substitution Core Decidability of the PAL Substitution Core LORI Workshop, ESSLLI 2010 Wes Holliday, Tomohiro Hoshi, and Thomas Icard Logical Dynamics Lab, CSLI Department of Philosophy, Stanford University August 20, 2010

More information

Dynamic epistemic logic and lying

Dynamic epistemic logic and lying Dynamic epistemic logic and lying Hans van Ditmarsch LORIA CNRS / Univ. de Lorraine & (associate) IMSc, Chennai hans.van-ditmarsch@loria.fr http://personal.us.es/hvd/ The Ditmarsch Tale of Wonders I will

More information

RMT 2015 Power Round Solutions February 14, 2015

RMT 2015 Power Round Solutions February 14, 2015 Introduction Fair division is the process of dividing a set of goods among several people in a way that is fair. However, as alluded to in the comic above, what exactly we mean by fairness is deceptively

More information

DVA325 Formal Languages, Automata and Models of Computation (FABER)

DVA325 Formal Languages, Automata and Models of Computation (FABER) DVA325 Formal Languages, Automata and Models of Computation (FABER) Lecture 1 - Introduction School of Innovation, Design and Engineering Mälardalen University 11 November 2014 Abu Naser Masud FABER November

More information

arxiv: v1 [math.co] 16 Aug 2018

arxiv: v1 [math.co] 16 Aug 2018 Two first-order logics of permutations arxiv:1808.05459v1 [math.co] 16 Aug 2018 Michael Albert, Mathilde Bouvel, Valentin Féray August 17, 2018 Abstract We consider two orthogonal points of view on finite

More information

From a Ball Game to Incompleteness

From a Ball Game to Incompleteness From a Ball Game to Incompleteness Arindama Singh We present a ball game that can be continued as long as we wish. It looks as though the game would never end. But by applying a result on trees, we show

More information

Logic and Artificial Intelligence Lecture 18

Logic and Artificial Intelligence Lecture 18 Logic and Artificial Intelligence Lecture 18 Eric Pacuit Currently Visiting the Center for Formal Epistemology, CMU Center for Logic and Philosophy of Science Tilburg University ai.stanford.edu/ epacuit

More information

Strongly nonlinear elliptic problem without growth condition

Strongly nonlinear elliptic problem without growth condition 2002-Fez conference on Partial Differential Equations, Electronic Journal of Differential Equations, Conference 09, 2002, pp 41 47. http://ejde.math.swt.edu or http://ejde.math.unt.edu ftp ejde.math.swt.edu

More information

Principle of Inclusion-Exclusion Notes

Principle of Inclusion-Exclusion Notes Principle of Inclusion-Exclusion Notes The Principle of Inclusion-Exclusion (often abbreviated PIE is the following general formula used for finding the cardinality of a union of finite sets. Theorem 0.1.

More information

Synthesizing Interpretable Strategies for Solving Puzzle Games

Synthesizing Interpretable Strategies for Solving Puzzle Games Synthesizing Interpretable Strategies for Solving Puzzle Games Eric Butler edbutler@cs.washington.edu Paul G. Allen School of Computer Science and Engineering University of Washington Emina Torlak emina@cs.washington.edu

More information

Goal-Directed Tableaux

Goal-Directed Tableaux Goal-Directed Tableaux Joke Meheus and Kristof De Clercq Centre for Logic and Philosophy of Science University of Ghent, Belgium Joke.Meheus,Kristof.DeClercq@UGent.be October 21, 2008 Abstract This paper

More information

arxiv: v1 [cs.cc] 21 Jun 2017

arxiv: v1 [cs.cc] 21 Jun 2017 Solving the Rubik s Cube Optimally is NP-complete Erik D. Demaine Sarah Eisenstat Mikhail Rudoy arxiv:1706.06708v1 [cs.cc] 21 Jun 2017 Abstract In this paper, we prove that optimally solving an n n n Rubik

More information

Pattern Avoidance in Unimodal and V-unimodal Permutations

Pattern Avoidance in Unimodal and V-unimodal Permutations Pattern Avoidance in Unimodal and V-unimodal Permutations Dido Salazar-Torres May 16, 2009 Abstract A characterization of unimodal, [321]-avoiding permutations and an enumeration shall be given.there is

More information

HIROIMONO is N P-complete

HIROIMONO is N P-complete m HIROIMONO is N P-complete Daniel Andersson December 11, 2006 Abstract In a Hiroimono puzzle, one must collect a set of stones from a square grid, moving along grid lines, picking up stones as one encounters

More information

Noisy Index Coding with Quadrature Amplitude Modulation (QAM)

Noisy Index Coding with Quadrature Amplitude Modulation (QAM) Noisy Index Coding with Quadrature Amplitude Modulation (QAM) Anjana A. Mahesh and B Sundar Rajan, arxiv:1510.08803v1 [cs.it] 29 Oct 2015 Abstract This paper discusses noisy index coding problem over Gaussian

More information

Intensionalisation of Logical Operators

Intensionalisation of Logical Operators Intensionalisation of Logical Operators Vít Punčochář Institute of Philosophy Academy of Sciences Czech Republic Vít Punčochář (AS CR) Intensionalisation 2013 1 / 29 A nonstandard representation of classical

More information

On first and second countable spaces and the axiom of choice

On first and second countable spaces and the axiom of choice Topology and its Applications 143 (2004) 93 103 www.elsevier.com/locate/topol On first and second countable spaces and the axiom of choice Gonçalo Gutierres 1 Departamento de Matemática da Universidade

More information

Sets. Definition A set is an unordered collection of objects called elements or members of the set.

Sets. Definition A set is an unordered collection of objects called elements or members of the set. Sets Definition A set is an unordered collection of objects called elements or members of the set. Sets Definition A set is an unordered collection of objects called elements or members of the set. Examples:

More information

On the Benefits of Enhancing Optimization Modulo Theories with Sorting Jul 1, Networks 2016 for 1 / MAXS 31

On the Benefits of Enhancing Optimization Modulo Theories with Sorting Jul 1, Networks 2016 for 1 / MAXS 31 On the Benefits of Enhancing Optimization Modulo Theories with Sorting Networks for MAXSMT Roberto Sebastiani, Patrick Trentin roberto.sebastiani@unitn.it trentin@disi.unitn.it DISI, University of Trento

More information

A Process Calculus for Energy-Aware Multicast Communications of Mobile Ad-Hoc Networks

A Process Calculus for Energy-Aware Multicast Communications of Mobile Ad-Hoc Networks WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2011; 00:1 16 RESEARCH ARTICLE A Process Calculus for Energy-Aware Multicast Communications of Mobile Ad-Hoc Networks L. Gallina

More information

Game Theory and Randomized Algorithms

Game Theory and Randomized Algorithms Game Theory and Randomized Algorithms Guy Aridor Game theory is a set of tools that allow us to understand how decisionmakers interact with each other. It has practical applications in economics, international

More information

Lecture 20 November 13, 2014

Lecture 20 November 13, 2014 6.890: Algorithmic Lower Bounds: Fun With Hardness Proofs Fall 2014 Prof. Erik Demaine Lecture 20 November 13, 2014 Scribes: Chennah Heroor 1 Overview This lecture completes our lectures on game characterization.

More information

An Erdős-Lovász-Spencer Theorem for permutations and its. testing

An Erdős-Lovász-Spencer Theorem for permutations and its. testing An Erdős-Lovász-Spencer Theorem for permutations and its consequences for parameter testing Carlos Hoppen (UFRGS, Porto Alegre, Brazil) This is joint work with Roman Glebov (ETH Zürich, Switzerland) Tereza

More information

Transferable Utility Planning Games

Transferable Utility Planning Games Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence (AAAI-10) Transferable Utility Planning Games Ronen I. Brafman Computer Science Dept. Ben-Gurion Univ., Israel brafman@cs.bgu.ac.il

More information

Computational aspects of two-player zero-sum games Course notes for Computational Game Theory Section 3 Fall 2010

Computational aspects of two-player zero-sum games Course notes for Computational Game Theory Section 3 Fall 2010 Computational aspects of two-player zero-sum games Course notes for Computational Game Theory Section 3 Fall 21 Peter Bro Miltersen November 1, 21 Version 1.3 3 Extensive form games (Game Trees, Kuhn Trees)

More information

STRATEGY AND COMPLEXITY OF THE GAME OF SQUARES

STRATEGY AND COMPLEXITY OF THE GAME OF SQUARES STRATEGY AND COMPLEXITY OF THE GAME OF SQUARES FLORIAN BREUER and JOHN MICHAEL ROBSON Abstract We introduce a game called Squares where the single player is presented with a pattern of black and white

More information

University of Portland EE 271 Electrical Circuits Laboratory. Experiment: Digital-to-Analog Converter

University of Portland EE 271 Electrical Circuits Laboratory. Experiment: Digital-to-Analog Converter University of Portland EE 271 Electrical Circuits Laboratory Experiment: Digital-to-Analog Converter I. Objective The objective of this experiment is to build and test a circuit that can convert a binary

More information

An Enhanced Fast Multi-Radio Rendezvous Algorithm in Heterogeneous Cognitive Radio Networks

An Enhanced Fast Multi-Radio Rendezvous Algorithm in Heterogeneous Cognitive Radio Networks 1 An Enhanced Fast Multi-Radio Rendezvous Algorithm in Heterogeneous Cognitive Radio Networks Yeh-Cheng Chang, Cheng-Shang Chang and Jang-Ping Sheu Department of Computer Science and Institute of Communications

More information

Multi-Agent Negotiation: Logical Foundations and Computational Complexity

Multi-Agent Negotiation: Logical Foundations and Computational Complexity Multi-Agent Negotiation: Logical Foundations and Computational Complexity P. Panzarasa University of London p.panzarasa@qmul.ac.uk K. M. Carley Carnegie Mellon University Kathleen.Carley@cmu.edu Abstract

More information

A new approach to termination analysis of CHR

A new approach to termination analysis of CHR A new approach to termination analysis of CHR Dean Voets Paolo Pilozzi Danny De Schreye Report CW 506, January 2008 n Katholieke Universiteit Leuven Department of Computer Science Celestijnenlaan 200A

More information

Universiteit Leiden Opleiding Informatica

Universiteit Leiden Opleiding Informatica Universiteit Leiden Opleiding Informatica An Analysis of Dominion Name: Roelof van der Heijden Date: 29/08/2014 Supervisors: Dr. W.A. Kosters (LIACS), Dr. F.M. Spieksma (MI) BACHELOR THESIS Leiden Institute

More information

NON-OVERLAPPING PERMUTATION PATTERNS. To Doron Zeilberger, for his Sixtieth Birthday

NON-OVERLAPPING PERMUTATION PATTERNS. To Doron Zeilberger, for his Sixtieth Birthday NON-OVERLAPPING PERMUTATION PATTERNS MIKLÓS BÓNA Abstract. We show a way to compute, to a high level of precision, the probability that a randomly selected permutation of length n is nonoverlapping. As

More information

CITS2211 Discrete Structures Turing Machines

CITS2211 Discrete Structures Turing Machines CITS2211 Discrete Structures Turing Machines October 23, 2017 Highlights We have seen that FSMs and PDAs are surprisingly powerful But there are some languages they can not recognise We will study a new

More information

LECTURE 3: CONGRUENCES. 1. Basic properties of congruences We begin by introducing some definitions and elementary properties.

LECTURE 3: CONGRUENCES. 1. Basic properties of congruences We begin by introducing some definitions and elementary properties. LECTURE 3: CONGRUENCES 1. Basic properties of congruences We begin by introducing some definitions and elementary properties. Definition 1.1. Suppose that a, b Z and m N. We say that a is congruent to

More information

How hard are computer games? Graham Cormode, DIMACS

How hard are computer games? Graham Cormode, DIMACS How hard are computer games? Graham Cormode, DIMACS graham@dimacs.rutgers.edu 1 Introduction Computer scientists have been playing computer games for a long time Think of a game as a sequence of Levels,

More information

Domination Rationalizability Correlated Equilibrium Computing CE Computational problems in domination. Game Theory Week 3. Kevin Leyton-Brown

Domination Rationalizability Correlated Equilibrium Computing CE Computational problems in domination. Game Theory Week 3. Kevin Leyton-Brown Game Theory Week 3 Kevin Leyton-Brown Game Theory Week 3 Kevin Leyton-Brown, Slide 1 Lecture Overview 1 Domination 2 Rationalizability 3 Correlated Equilibrium 4 Computing CE 5 Computational problems in

More information

Game Theory and Algorithms Lecture 19: Nim & Impartial Combinatorial Games

Game Theory and Algorithms Lecture 19: Nim & Impartial Combinatorial Games Game Theory and Algorithms Lecture 19: Nim & Impartial Combinatorial Games May 17, 2011 Summary: We give a winning strategy for the counter-taking game called Nim; surprisingly, it involves computations

More information

Tetsuo JAIST EikD Erik D. Martin L. MIT

Tetsuo JAIST EikD Erik D. Martin L. MIT Tetsuo Asano @ JAIST EikD Erik D. Demaine @MIT Martin L. Demaine @ MIT Ryuhei Uehara @ JAIST Short History: 2010/1/9: At Boston Museum we met Kaboozle! 2010/2/21 accepted by 5 th International Conference

More information

Wilson s Theorem and Fermat s Theorem

Wilson s Theorem and Fermat s Theorem Wilson s Theorem and Fermat s Theorem 7-27-2006 Wilson s theorem says that p is prime if and only if (p 1)! = 1 (mod p). Fermat s theorem says that if p is prime and p a, then a p 1 = 1 (mod p). Wilson

More information

arxiv: v1 [math.co] 7 Aug 2012

arxiv: v1 [math.co] 7 Aug 2012 arxiv:1208.1532v1 [math.co] 7 Aug 2012 Methods of computing deque sortable permutations given complete and incomplete information Dan Denton Version 1.04 dated 3 June 2012 (with additional figures dated

More information

Class 8 - Sets (Lecture Notes)

Class 8 - Sets (Lecture Notes) Class 8 - Sets (Lecture Notes) What is a Set? A set is a well-defined collection of distinct objects. Example: A = {1, 2, 3, 4, 5} What is an element of a Set? The objects in a set are called its elements.

More information

5.4 Imperfect, Real-Time Decisions

5.4 Imperfect, Real-Time Decisions 116 5.4 Imperfect, Real-Time Decisions Searching through the whole (pruned) game tree is too inefficient for any realistic game Moves must be made in a reasonable amount of time One has to cut off the

More information

A Course in Model Theory I:

A Course in Model Theory I: A Course in Model Theory I: Introduction 1 Rami Grossberg DEPARTMENT OFMATHEMATICAL SCIENCES, CARNEGIE MELLON UNI- VERSITY, PITTSBURGH, PA15213 1 This preliminary draft is dated from August 15, 2017. The

More information

Spatial Vagueness and Second-Order Vagueness

Spatial Vagueness and Second-Order Vagueness Spatial Vagueness and Second-Order Vagueness Lars Kulik National Center for Geographic Information and Analysis Department of Spatial Information Science and Engineering 348 Boardman Hall, University of

More information

On game semantics of the affine and intuitionistic logics (Extended abstract)

On game semantics of the affine and intuitionistic logics (Extended abstract) On game semantics of the affine and intuitionistic logics (Extended abstract) Ilya Mezhirov 1 and Nikolay Vereshchagin 2 1 The German Research Center for Artificial Intelligence, TU Kaiserslautern, ilya.mezhirov@dfki.uni-kl.de

More information

Dynamic Games: Backward Induction and Subgame Perfection

Dynamic Games: Backward Induction and Subgame Perfection Dynamic Games: Backward Induction and Subgame Perfection Carlos Hurtado Department of Economics University of Illinois at Urbana-Champaign hrtdmrt2@illinois.edu Jun 22th, 2017 C. Hurtado (UIUC - Economics)

More information

Remember that represents the set of all permutations of {1, 2,... n}

Remember that represents the set of all permutations of {1, 2,... n} 20180918 Remember that represents the set of all permutations of {1, 2,... n} There are some basic facts about that we need to have in hand: 1. Closure: If and then 2. Associativity: If and and then 3.

More information

Combinatorics: The Fine Art of Counting

Combinatorics: The Fine Art of Counting Combinatorics: The Fine Art of Counting Week 6 Lecture Notes Discrete Probability Note Binomial coefficients are written horizontally. The symbol ~ is used to mean approximately equal. Introduction and

More information

3.1 Agents. Foundations of Artificial Intelligence. 3.1 Agents. 3.2 Rationality. 3.3 Summary. Introduction: Overview. 3. Introduction: Rational Agents

3.1 Agents. Foundations of Artificial Intelligence. 3.1 Agents. 3.2 Rationality. 3.3 Summary. Introduction: Overview. 3. Introduction: Rational Agents Foundations of Artificial Intelligence February 26, 2016 3. Introduction: Rational Agents Foundations of Artificial Intelligence 3. Introduction: Rational Agents 3.1 Agents Malte Helmert Universität Basel

More information

Where s Waldo? Sensor-Based Temporal Logic Motion Planning

Where s Waldo? Sensor-Based Temporal Logic Motion Planning Where s Waldo? Sensor-Based Temporal Logic Motion Planning Hadas Kress-Gazit, Georgios E. Fainekos and George J. Pappas GRASP Laboratory, University of Pennsylvania Philadelphia, PA 19104, USA {hadaskg,fainekos,pappasg}@grasp.upenn.edu

More information

Algorithms and Data Structures: Network Flows. 24th & 28th Oct, 2014

Algorithms and Data Structures: Network Flows. 24th & 28th Oct, 2014 Algorithms and Data Structures: Network Flows 24th & 28th Oct, 2014 ADS: lects & 11 slide 1 24th & 28th Oct, 2014 Definition 1 A flow network consists of A directed graph G = (V, E). Flow Networks A capacity

More information

Equivalence classes of length-changing replacements of size-3 patterns

Equivalence classes of length-changing replacements of size-3 patterns Equivalence classes of length-changing replacements of size-3 patterns Vahid Fazel-Rezai Mentor: Tanya Khovanova 2013 MIT-PRIMES Conference May 18, 2013 Vahid Fazel-Rezai Length-Changing Pattern Replacements

More information

Two-person symmetric whist

Two-person symmetric whist Two-person symmetric whist Johan Wästlund Linköping studies in Mathematics, No. 4, February 21, 2005 Series editor: Bengt Ove Turesson The publishers will keep this document on-line on the Internet (or

More information

Math 127: Equivalence Relations

Math 127: Equivalence Relations Math 127: Equivalence Relations Mary Radcliffe 1 Equivalence Relations Relations can take many forms in mathematics. In these notes, we focus especially on equivalence relations, but there are many other

More information

Wireless Network Coding with Local Network Views: Coded Layer Scheduling

Wireless Network Coding with Local Network Views: Coded Layer Scheduling Wireless Network Coding with Local Network Views: Coded Layer Scheduling Alireza Vahid, Vaneet Aggarwal, A. Salman Avestimehr, and Ashutosh Sabharwal arxiv:06.574v3 [cs.it] 4 Apr 07 Abstract One of the

More information

Antlab: a Multi-Robot Task Server

Antlab: a Multi-Robot Task Server Antlab: a Multi-Robot Task Server IVAN GAVRAN, MPI-SWS RUPAK MAJUMDAR, MPI-SWS INDRANIL SAHA, IIT Kanpur We present Antlab, an end-to-end system that takes streams of user task requests and executes them

More information

Hamming Codes as Error-Reducing Codes

Hamming Codes as Error-Reducing Codes Hamming Codes as Error-Reducing Codes William Rurik Arya Mazumdar Abstract Hamming codes are the first nontrivial family of error-correcting codes that can correct one error in a block of binary symbols.

More information

Game Solution, Epistemic Dynamics and Fixed-Point Logics

Game Solution, Epistemic Dynamics and Fixed-Point Logics Fundamenta Informaticae XXI (2010) 1001 1023 1001 IOS Press Game Solution, pistemic Dynamics and Fixed-Point Logics Johan van Benthem ILLC, University of msterdam johan@science.uva.nl mélie Gheerbrant

More information

Theory of Probability - Brett Bernstein

Theory of Probability - Brett Bernstein Theory of Probability - Brett Bernstein Lecture 3 Finishing Basic Probability Review Exercises 1. Model flipping two fair coins using a sample space and a probability measure. Compute the probability of

More information

IEEE TRANSACTIONS ON ROBOTICS 1. IQ-ASyMTRe: Forming Executable Coalitions for Tightly Coupled Multirobot Tasks

IEEE TRANSACTIONS ON ROBOTICS 1. IQ-ASyMTRe: Forming Executable Coalitions for Tightly Coupled Multirobot Tasks IEEE TRANSACTIONS ON ROBOTICS 1 IQ-ASyMTRe: Forming Executable Coalitions for Tightly Coupled Multirobot Tasks Yu Zhang, Member, IEEE, and Lynne E. Parker, Fellow, IEEE Abstract While most previous research

More information

Probability (Devore Chapter Two)

Probability (Devore Chapter Two) Probability (Devore Chapter Two) 1016-351-01 Probability Winter 2011-2012 Contents 1 Axiomatic Probability 2 1.1 Outcomes and Events............................... 2 1.2 Rules of Probability................................

More information

Permutation Tableaux and the Dashed Permutation Pattern 32 1

Permutation Tableaux and the Dashed Permutation Pattern 32 1 Permutation Tableaux and the Dashed Permutation Pattern William Y.C. Chen, Lewis H. Liu, Center for Combinatorics, LPMC-TJKLC Nankai University, Tianjin 7, P.R. China chen@nankai.edu.cn, lewis@cfc.nankai.edu.cn

More information

Symmetric Decentralized Interference Channels with Noisy Feedback

Symmetric Decentralized Interference Channels with Noisy Feedback 4 IEEE International Symposium on Information Theory Symmetric Decentralized Interference Channels with Noisy Feedback Samir M. Perlaza Ravi Tandon and H. Vincent Poor Institut National de Recherche en

More information

arxiv: v2 [cs.lo] 13 Oct 2015

arxiv: v2 [cs.lo] 13 Oct 2015 Equational reasoning with context-free families of string diagrams Aleks Kissinger and Vladimir Zamdzhiev ariv:1504.02716v2 [cs.lo] 13 Oct 2015 University of Oxford {aleks.kissinger vladimir.zamdzhiev}@cs.ox.ac.uk

More information

Lecture for January 25, 2016

Lecture for January 25, 2016 Lecture for January 25, 2016 ECS 235A UC Davis Matt Bishop January 25, 2016 ECS 235A, Matt Bishop Slide #1 Example English Policy Computer security policy for academic institution Institution has multiple

More information

Intelligent Agents & Search Problem Formulation. AIMA, Chapters 2,

Intelligent Agents & Search Problem Formulation. AIMA, Chapters 2, Intelligent Agents & Search Problem Formulation AIMA, Chapters 2, 3.1-3.2 Outline for today s lecture Intelligent Agents (AIMA 2.1-2) Task Environments Formulating Search Problems CIS 421/521 - Intro to

More information

Modeling, Analysis and Optimization of Networks. Alberto Ceselli

Modeling, Analysis and Optimization of Networks. Alberto Ceselli Modeling, Analysis and Optimization of Networks Alberto Ceselli alberto.ceselli@unimi.it Università degli Studi di Milano Dipartimento di Informatica Doctoral School in Computer Science A.A. 2015/2016

More information