A Complete Approximation Theory for Weighted Transition Systems
|
|
- Anne Franklin
- 5 years ago
- Views:
Transcription
1 A Complete Approximation Theory for Weighted Transition Systems December 1, 2015 Peter Christoffersen Mikkel Hansen Mathias R. Pedersen Radu Mardare Kim G. Larsen Department of Computer Science Aalborg University Denmark
2 Agenda 1 Introduction Logic Axiomatization Canonical model construction Weak completeness Conclusion
3 Motivation 2 Today microchips are used nearly everywhere we look. Cyber-physical systems The idea of combining computation and the physical world. Use sensors and input devices for humans to affect the computation. Motors, actuators and other mechanics can alter and affect the world.
4 Motivation 2 Today microchips are used nearly everywhere we look. Cyber-physical systems The idea of combining computation and the physical world. Use sensors and input devices for humans to affect the computation. Motors, actuators and other mechanics can alter and affect the world. When dealing with real-world processes you often rely on resources such as: Energy, money, distances etc.
5 Motivation Resource modeling 3 Weighted Transition Systems (WTS) can encode this quantitative behaviour, though in a strictly precise fashion. WTS example: Robot vacuum cleaner Clean? Yes. Room is Cleaned. The room takes 20 units, e.g. time or energy, to clean. Y 20 0 C
6 Motivation Resource modeling 3 Weighted Transition Systems (WTS) can encode this quantitative behaviour, though in a strictly precise fashion. WTS example: Robot vacuum cleaner Clean? Yes. Room is Cleaned. The room takes 20 units, e.g. time or energy, to clean. Y 20 0 C What if the room had a very varying degree of dirtiness?
7 Motivation Resource modeling 4 Cyber-physical systems Sensors and inputs from the world affects computations, likewise mechanical output affects the world. The settings these systems operate in are often unpredictable, and the inputs are always with some imprecision. Problems Tolerance of sensors. Unpredictable environment. We can only reason about what is encoded in the model.
8 Motivation Resource modeling 5 Solution Let the model account for the imprecision so we can reason about it. We extend the notion of WTS with bounds x, y on transitions. This captures the imprecision in the modeling domain by denoting a whole range of values. WTS example: Robot vacuum cleaner Clean? Yes. Room is Cleaned. The room takes 5 to 20 units, e.g. time or energy, to clean. Y 5, 20 0 C
9 Contribution 6 An extension of Weighted Transition Systems with bounds, as well as a suitable notion of bisimulation. Logic to reason with bounds that has the Hennessy-Milner property. Weak-complete axiomatization of the logic.
10 Bounds 7 Bounds A bound B R 2 0 is either the empty set or a tuple x, y where x y. Denote the set of all bounds by B. A B iff B A and A + B + B A A + B + A B = min{a, B }, max{a +, B + } B B + A A + + A B = max{a, B }, min{a +, B + } B A B + A + +
11 Generalized Weighted Transition Systems 8 A Generalized Weighted Transition System (GTS) is a tuple G = (S, θ, l), where Transition function θ : S (2 S B) is a transition function satisfying the following conditions: θ (s) ( ) =, ( ) θ (s) S i = θ (s) (S i ), and i i ( ) ( ) θ (s) S i = θ (s) S i = i i i θ (s) (S i ). (I) (II) (III)
12 GTS: Transition function Property II 9 ( ) θ (s) S i = i i θ (s) (S i ) θ (s) ({t 1 } {t 3 } {t 4 }) = min{1, 3, 6}, max{1, 4, 6} = 1, 6 1, 1 t 1 s 3, 4 6, 6 t 4 t 1 s 1, 6 t 4 t3 t3 t 2 t 2
13 Logic Syntax 10 Syntax L : ϕ, ψ ::= p ϕ ϕ ψ L r ϕ M r ϕ where r Q 0 and p AP. Semantics G, s = L r ϕ iff can reach a state satisfying ϕ with weight at least r G, s = M r ϕ iff can reach a state satisfying ϕ with weight at most r
14 Logic Syntax 10 Syntax L : ϕ, ψ ::= p ϕ ϕ ψ L r ϕ M r ϕ where r Q 0 and p AP. Semantics G, s = L r ϕ iff θ (s) ( ϕ ) and θ (s) ( ϕ ) r G, s = M r ϕ iff θ (s) ( ϕ ) and θ + (s) ( ϕ ) r where ϕ is the set of all GTS states with the property ϕ, i.e. ϕ = {s (S, θ, l) G : s S and G, s = ϕ}
15 Logic Example 11 Example s 2, 4 s ϕ s +
16 Logic Example 12 Example s 2 2, 4 s ϕ G, s = L 2 ϕ s +
17 Logic Example 13 Example s 2, 4 s ϕ G, s = L 2 ϕ G, s = M 4 ϕ s 4
18 Logic Example 14 Example s G, s = L 2 ϕ 2, 4 s ϕ 3 G, s = M 4 ϕ G, s = L 3 ϕ s +
19 Logic Example 15 Example s G, s = L 2 ϕ 2, 4 G, s = M 4 ϕ s ϕ 3 G, s = L 3 ϕ s + G, s = M 3 ϕ
20 Logic Derived operators 16 In addition to the operators defined by the syntax, we have the following derived operators Derived operators ϕ ψ def = ϕ ϕ def = def = ( ϕ ψ) ϕ ψ def = ϕ ψ
21 Logic Derived operators 16 In addition to the operators defined by the syntax, we have the following derived operators Derived operators ϕ ψ def = ϕ ϕ def = def = ( ϕ ψ) ϕ ψ def = ϕ ψ We can encode and with their usual semantics, semantics ϕ ϕ def = L 0 ϕ def = ϕ = L 0 ϕ
22 Bisimulation 17 Bisimulation Given GTS G = (S, θ, l), an equivalence relation R on S is a bisimulation relation iff srt implies l(s) = l(t) and θ(s)(t ) = θ(t)(t ) for all equivalence classes T S/R. Bisimulation invariance (Hennessy-Milner property) s t iff [ ϕ L : G, s = ϕ G, t = ϕ].
23 Filters 18 Filter A non-empty subset F of L is called a filter iff / F, ϕ F and ϕ ψ implies ψ F, and ϕ F and ψ F implies ϕ ψ F. Ultrafilter A filter F is called an ultrafilter iff for every ϕ L either ϕ F or ϕ F, but not both.
24 Axioms 19 (A1): L 0 (A2): L r+s ϕ L r ϕ, s > 0 (A2 ): M r ϕ M r+s ϕ, s > 0 (A3): L r ϕ L s ψ L min{r,s} (ϕ ψ) (A3 ): M r ϕ M s ψ M max{r,s} (ϕ ψ) (A4): ((L r ϕ) (L s ψ)) ( L 0 (ϕ ψ) L max{r,s} (ϕ ψ) ) (A4 ): ((M r ϕ) (M s ψ)) ( L 0 (ϕ ψ) M min{r,s} (ϕ ψ) ) (A5): ((L 0 ϕ) ( L r ϕ) (L 0 ψ) ( L s ψ)) L max{r,s} (ϕ ψ) (A5 ): ((L 0 ϕ) ( M r ϕ) (L 0 ψ) ( M s ψ)) M min{r,s} (ϕ ψ) (A6): L r (ϕ ψ) L r ϕ L r ψ (A6 ): M r (ϕ ψ) M r ϕ M r ψ (A7): L 0 ψ (L r ϕ L r (ϕ ψ)) (A7 ): L 0 ψ (M r ϕ M r (ϕ ψ)) (A8): L r+s ϕ M r ϕ, s > 0 (A9): M r ϕ L 0 ϕ
25 Axioms A2 and A2 20 (A2) L r+s ϕ L r ϕ, s > 0 (A2 ) M t ϕ M t+q ϕ, q > 0 + r + s t ϕ
26 Axioms A3 21 (A3) L r ϕ L s ψ L min{r,s} (ϕ ψ) r s + ϕ ϕ ψ ψ
27 Axioms A3 22 (A3 ) M r ϕ M s ψ M max{r,s} (ϕ ψ) r s + ϕ ϕ ψ ψ
28 Axioms A8 23 (A8) L r+s ϕ M r ϕ, s > 0 + r + s r ϕ
29 Axioms A9 24 (A9) M r ϕ L 0 ϕ 0 r + ϕ
30 Axioms 25 (R1): {L s ϕ s < r} L r ϕ (R1 ): {M s ϕ s > r} M r ϕ (R2): ϕ ψ = ((L r ψ) (L 0 ϕ)) L r ϕ (R2 ): ϕ ψ = ((M s ψ) (L 0 ϕ)) M s ϕ (R3): ϕ ψ = L 0 ϕ L 0 ψ (R4): { M r ϕ r Q 0 } L 0 ϕ (R5): (R5 ): {ϕ i i N} ϕ ϕ i+1 ϕ i ϕ ϕ i i N, s > 0 { L r ϕ i i N} L r+s ϕ {ϕ i i N} ϕ ϕ i+1 ϕ i ϕ ϕ i i N, s > 0 { M r+s ϕ i i N} M r ϕ (R6): {L r+s ϕ ϕ F } { L r ψ F ψ} (R6 ): {M r+s ϕ ϕ F } { M r ψ F ψ}
31 Axioms R2 and R2 26 (R2) ϕ ψ = ((L r ψ) (L 0 ϕ)) L r ϕ (R2 ) ϕ ψ = ((M s ψ) (L 0 ϕ)) M s ϕ r s + ψ ϕ
32 Axioms R5 27 (R5) {ϕ i i N} ϕ ϕ i+1 ϕ i ϕ ϕ i i N, s > 0 { L r ϕ i i N} L r+s ϕ + r ϕ 1 ϕ 2 ϕ 3 ϕ
33 Axioms R5 28 (R5 ) {ϕ i i N} ϕ ϕ i+1 ϕ i ϕ ϕ i i N, s > 0 { M r+s ϕ i i N} M r ϕ + r ϕ 1 ϕ 2 ϕ 3 ϕ
34 Axioms Soundness 29 Lemma (Soundness) ϕ implies = ϕ.
35 Canonical model construction 30 GTS with ultrafilters as states. Transition function must satisfy conditions I-III. θl : U [L B] θf : U [F { } B] θu : U [2 U B] Labeling function l U : U 2 AP. lu(u) = {p AP p u}
36 Formulae 31 Transition function to formulae { θ L (u)(ϕ) = sup{r L r ϕ u}, inf{s M s ϕ u} if L 0 ϕ / u otherwise. The function θ L assigns a bound to each transition from an ultrafilter to a formula. Lemma L 0 ϕ u implies sup{r L r ϕ u} inf{s M s ϕ u}. This means that the definition for θ L does not give ill-formed bounds.
37 Filters 32 Transition function to filters θ F (u)(f) = ϕ F θ L (u)(ϕ), Φ = { { } if Φ = {ϕ L ϕ ψ for all ψ Φ} otherwise.
38 Ultrafilters 33 f 2 U F θ F (u) f θ F (u) B f is an isomorphism between 2 U and F given by f (U) = u. u U
39 Ultrafilters 34 Transition function to sets of ultrafilters θ U (u)(u) = θ F (u)(f (U)). Theorem The canonical model G U = (U, θ U, l U ) is a GTS.
40 Truth Lemma 35 Truth lemma For consistent ϕ L, G U, u = ϕ iff ϕ u.
41 Weak completeness 36 Weak completeness = ϕ implies ϕ. Proof = ϕ implies ϕ iff ϕ implies = ϕ iff the consistency of ϕ implies the existences of a model for ϕ and this is true because of Lindenbaum s lemma and the truth lemma.
42 Conclusion 37 Contribution New modelling formalism and logic with bounds to encode imprecisions. Logic has the Hennessy-Milner property. Weak-complete axiomization.
43 Conclusion 37 Contribution New modelling formalism and logic with bounds to encode imprecisions. Logic has the Hennessy-Milner property. Weak-complete axiomization. Future work Strong completeness. Dependent axioms. Remove axioms with uncountably many instances. Relationship between WTS and GTS.
44 Thank you 38 Thank you!
Modal logic. Benzmüller/Rojas, 2014 Artificial Intelligence 2
Modal logic Benzmüller/Rojas, 2014 Artificial Intelligence 2 What is Modal Logic? Narrowly, traditionally: modal logic studies reasoning that involves the use of the expressions necessarily and possibly.
More informationFormal Verification. Lecture 5: Computation Tree Logic (CTL)
Formal Verification Lecture 5: Computation Tree Logic (CTL) Jacques Fleuriot 1 jdf@inf.ac.uk 1 With thanks to Bob Atkey for some of the diagrams. Recap Previously: Linear-time Temporal Logic This time:
More informationA Fractal which violates the Axiom of Determinacy
BRICS RS-94-4 S. Riis: A Fractal which violates the Axiom of Determinacy BRICS Basic Research in Computer Science A Fractal which violates the Axiom of Determinacy Søren Riis BRICS Report Series RS-94-4
More information22c181: Formal Methods in Software Engineering. The University of Iowa Spring Propositional Logic
22c181: Formal Methods in Software Engineering The University of Iowa Spring 2010 Propositional Logic Copyright 2010 Cesare Tinelli. These notes are copyrighted materials and may not be used in other course
More informationBisimulation and Modal Logic in Distributed Computing
Bisimulation and Modal Logic in Distributed Computing Tuomo Lempiäinen Distributed Algorithms group, Department of Computer Science, Aalto University (joint work with Lauri Hella, Matti Järvisalo, Antti
More informationA Model for Broadcast, Unicast and Multicast Communications of Mobile Ad Hoc Networks
A Model for Broadcast, Unicast and Multicast Communications of Mobile Ad Hoc Networks Lucia Gallina and Sabina Rossi Dipartimento di Informatica, Università Ca Foscari Venezia, Italy e-mail: {lgallina,srossi}@dsi.unive.it
More informationStanford University CS261: Optimization Handout 9 Luca Trevisan February 1, 2011
Stanford University CS261: Optimization Handout 9 Luca Trevisan February 1, 2011 Lecture 9 In which we introduce the maximum flow problem. 1 Flows in Networks Today we start talking about the Maximum Flow
More informationLogical Agents (AIMA - Chapter 7)
Logical Agents (AIMA - Chapter 7) CIS 391 - Intro to AI 1 Outline 1. Wumpus world 2. Logic-based agents 3. Propositional logic Syntax, semantics, inference, validity, equivalence and satifiability Next
More information11/18/2015. Outline. Logical Agents. The Wumpus World. 1. Automating Hunt the Wumpus : A different kind of problem
Outline Logical Agents (AIMA - Chapter 7) 1. Wumpus world 2. Logic-based agents 3. Propositional logic Syntax, semantics, inference, validity, equivalence and satifiability Next Time: Automated Propositional
More informationKARO logic (Van Linder et al.) Epistemic logic. Dynamic Logic. Dynamic Logic KARO. Dynamic Logic. knowledge. belief. Interpretation formulas
KARO logic (Van Linder et al.) Knowledge & Belief: epistemic logic Abilities, Results & Opportunities: dynamic logic Modalities for Desires & Goals Epistemic logic Kϕ ϕ Kϕ KKϕ Kϕ K Kϕ B Bϕ BBϕ Bϕ B Bϕ
More informationCIS/CSE 774 Principles of Distributed Access Control Exam 1 October 3, Points Possible. Total 60
Name: CIS/CSE 774 Principles of Distributed Access Control Exam 1 October 3, 2013 Question Points Possible Points Received 1 24 2 12 3 12 4 12 Total 60 Instructions: 1. This exam is a closed-book, closed-notes
More informationOutline. Sets of Gluing Data. Constructing Manifolds. Lecture 3 - February 3, PM
Constructing Manifolds Lecture 3 - February 3, 2009-1-2 PM Outline Sets of gluing data The cocycle condition Parametric pseudo-manifolds (PPM s) Conclusions 2 Let n and k be integers such that n 1 and
More informationAxiom A-1: To every angle there corresponds a unique, real number, 0 < < 180.
Axiom A-1: To every angle there corresponds a unique, real number, 0 < < 180. We denote the measure of ABC by m ABC. (Temporary Definition): A point D lies in the interior of ABC iff there exists a segment
More informationAwareness in Games, Awareness in Logic
Awareness in Games, Awareness in Logic Joseph Halpern Leandro Rêgo Cornell University Awareness in Games, Awareness in Logic p 1/37 Game Theory Standard game theory models assume that the structure of
More informationTwo Perspectives on Logic
LOGIC IN PLAY Two Perspectives on Logic World description: tracing the structure of reality. Structured social activity: conversation, argumentation,...!!! Compatible and Interacting Views Process Product
More informationInternational Journal of Mathematical Archive-5(6), 2014, Available online through ISSN
International Journal of Mathematical Archive-5(6), 2014, 119-124 Available online through www.ijma.info ISSN 2229 5046 CLOSURE OPERATORS ON COMPLETE ALMOST DISTRIBUTIVE LATTICES-I G. C. Rao Department
More information5.4 Imperfect, Real-Time Decisions
5.4 Imperfect, Real-Time Decisions Searching through the whole (pruned) game tree is too inefficient for any realistic game Moves must be made in a reasonable amount of time One has to cut off the generation
More informationPart 2. Cooperative Game Theory
Part 2 Cooperative Game Theory CHAPTER 3 Coalitional games A coalitional game is a model of interacting decision makers that focuses on the behaviour of groups of players. Each group of players is called
More informationBusiness Process Management
Business Process Management Orchestrations, Choreographies, and Verification Frank Puhlmann Business Process Technology Group Hasso Plattner Institut Potsdam, Germany 1 Mapping Graphical Notations The
More informationReasoning About Strategies
Reasoning About Strategies Johan van Benthem 1 University of Amsterdam and Stanford University Abstract. Samson Abramsky has placed landmarks in the world of logic and games that I have long admired. In
More informationThe tenure game. The tenure game. Winning strategies for the tenure game. Winning condition for the tenure game
The tenure game The tenure game is played by two players Alice and Bob. Initially, finitely many tokens are placed at positions that are nonzero natural numbers. Then Alice and Bob alternate in their moves
More information18 Completeness and Compactness of First-Order Tableaux
CS 486: Applied Logic Lecture 18, March 27, 2003 18 Completeness and Compactness of First-Order Tableaux 18.1 Completeness Proving the completeness of a first-order calculus gives us Gödel s famous completeness
More informationOn Comparing the Power of Robots
On Comparing the Power of Robots Jason M. O Kane and Steven M. LaValle Abstract Robots must complete their tasks in spite of unreliable actuators and limited, noisy sensing. In this paper, we consider
More informationPATTERN AVOIDANCE IN PERMUTATIONS ON THE BOOLEAN LATTICE
PATTERN AVOIDANCE IN PERMUTATIONS ON THE BOOLEAN LATTICE SAM HOPKINS AND MORGAN WEILER Abstract. We extend the concept of pattern avoidance in permutations on a totally ordered set to pattern avoidance
More informationFinal exam. Question Points Score. Total: 150
MATH 11200/20 Final exam DECEMBER 9, 2016 ALAN CHANG Please present your solutions clearly and in an organized way Answer the questions in the space provided on the question sheets If you run out of room
More informationLecture 3 - Regression
Lecture 3 - Regression Instructor: Prof Ganesh Ramakrishnan July 25, 2016 1 / 30 The Simplest ML Problem: Least Square Regression Curve Fitting: Motivation Error measurement Minimizing Error Method of
More informationA State Equivalence and Confluence Checker for CHR
A State Equivalence and Confluence Checker for CHR Johannes Langbein, Frank Raiser, and Thom Frühwirth Faculty of Engineering and Computer Science, Ulm University, Germany firstname.lastname@uni-ulm.de
More informationThe Hex game and its mathematical side
The Hex game and its mathematical side Antonín Procházka Laboratoire de Mathématiques de Besançon Université Franche-Comté Lycée Jules Haag, 19 mars 2013 Brief history : HEX was invented in 1942
More informationIntroduction to Computational Manifolds and Applications
IMPA - Instituto de Matemática Pura e Aplicada, Rio de Janeiro, RJ, Brazil Introduction to Computational Manifolds and Applications Part 1 - Foundations Prof. Jean Gallier jean@cis.upenn.edu Department
More informationGame Description Logic and Game Playing
Game Description Logic and Game Playing Laurent Perrussel November 29 - Planning and Games workshop IRIT Université Toulouse Capitole 1 Motivation Motivation(1/2) Game: describe and justify actions in
More informationSets. Gazihan Alankuş (Based on original slides by Brahim Hnich et al.) August 6, Outline Sets Equality Subset Empty Set Cardinality Power Set
Gazihan Alankuş (Based on original slides by Brahim Hnich et al.) August 6, 2012 Gazihan Alankuş (Based on original slides by Brahim Hnich et al.) Gazihan Alankuş (Based on original slides by Brahim Hnich
More informationPattern Avoidance in Poset Permutations
Pattern Avoidance in Poset Permutations Sam Hopkins and Morgan Weiler Massachusetts Institute of Technology and University of California, Berkeley Permutation Patterns, Paris; July 5th, 2013 1 Definitions
More informationOn Comparing the Power of Robots
On Comparing the Power of Robots Jason M. O Kane and Steven M. LaValle Abstract Robots must complete their tasks in spite of unreliable actuators and limited, noisy sensing. In this paper, we consider
More informationDecidability of the PAL Substitution Core
Decidability of the PAL Substitution Core LORI Workshop, ESSLLI 2010 Wes Holliday, Tomohiro Hoshi, and Thomas Icard Logical Dynamics Lab, CSLI Department of Philosophy, Stanford University August 20, 2010
More informationDynamic epistemic logic and lying
Dynamic epistemic logic and lying Hans van Ditmarsch LORIA CNRS / Univ. de Lorraine & (associate) IMSc, Chennai hans.van-ditmarsch@loria.fr http://personal.us.es/hvd/ The Ditmarsch Tale of Wonders I will
More informationRMT 2015 Power Round Solutions February 14, 2015
Introduction Fair division is the process of dividing a set of goods among several people in a way that is fair. However, as alluded to in the comic above, what exactly we mean by fairness is deceptively
More informationDVA325 Formal Languages, Automata and Models of Computation (FABER)
DVA325 Formal Languages, Automata and Models of Computation (FABER) Lecture 1 - Introduction School of Innovation, Design and Engineering Mälardalen University 11 November 2014 Abu Naser Masud FABER November
More informationarxiv: v1 [math.co] 16 Aug 2018
Two first-order logics of permutations arxiv:1808.05459v1 [math.co] 16 Aug 2018 Michael Albert, Mathilde Bouvel, Valentin Féray August 17, 2018 Abstract We consider two orthogonal points of view on finite
More informationFrom a Ball Game to Incompleteness
From a Ball Game to Incompleteness Arindama Singh We present a ball game that can be continued as long as we wish. It looks as though the game would never end. But by applying a result on trees, we show
More informationLogic and Artificial Intelligence Lecture 18
Logic and Artificial Intelligence Lecture 18 Eric Pacuit Currently Visiting the Center for Formal Epistemology, CMU Center for Logic and Philosophy of Science Tilburg University ai.stanford.edu/ epacuit
More informationStrongly nonlinear elliptic problem without growth condition
2002-Fez conference on Partial Differential Equations, Electronic Journal of Differential Equations, Conference 09, 2002, pp 41 47. http://ejde.math.swt.edu or http://ejde.math.unt.edu ftp ejde.math.swt.edu
More informationPrinciple of Inclusion-Exclusion Notes
Principle of Inclusion-Exclusion Notes The Principle of Inclusion-Exclusion (often abbreviated PIE is the following general formula used for finding the cardinality of a union of finite sets. Theorem 0.1.
More informationSynthesizing Interpretable Strategies for Solving Puzzle Games
Synthesizing Interpretable Strategies for Solving Puzzle Games Eric Butler edbutler@cs.washington.edu Paul G. Allen School of Computer Science and Engineering University of Washington Emina Torlak emina@cs.washington.edu
More informationGoal-Directed Tableaux
Goal-Directed Tableaux Joke Meheus and Kristof De Clercq Centre for Logic and Philosophy of Science University of Ghent, Belgium Joke.Meheus,Kristof.DeClercq@UGent.be October 21, 2008 Abstract This paper
More informationarxiv: v1 [cs.cc] 21 Jun 2017
Solving the Rubik s Cube Optimally is NP-complete Erik D. Demaine Sarah Eisenstat Mikhail Rudoy arxiv:1706.06708v1 [cs.cc] 21 Jun 2017 Abstract In this paper, we prove that optimally solving an n n n Rubik
More informationPattern Avoidance in Unimodal and V-unimodal Permutations
Pattern Avoidance in Unimodal and V-unimodal Permutations Dido Salazar-Torres May 16, 2009 Abstract A characterization of unimodal, [321]-avoiding permutations and an enumeration shall be given.there is
More informationHIROIMONO is N P-complete
m HIROIMONO is N P-complete Daniel Andersson December 11, 2006 Abstract In a Hiroimono puzzle, one must collect a set of stones from a square grid, moving along grid lines, picking up stones as one encounters
More informationNoisy Index Coding with Quadrature Amplitude Modulation (QAM)
Noisy Index Coding with Quadrature Amplitude Modulation (QAM) Anjana A. Mahesh and B Sundar Rajan, arxiv:1510.08803v1 [cs.it] 29 Oct 2015 Abstract This paper discusses noisy index coding problem over Gaussian
More informationIntensionalisation of Logical Operators
Intensionalisation of Logical Operators Vít Punčochář Institute of Philosophy Academy of Sciences Czech Republic Vít Punčochář (AS CR) Intensionalisation 2013 1 / 29 A nonstandard representation of classical
More informationOn first and second countable spaces and the axiom of choice
Topology and its Applications 143 (2004) 93 103 www.elsevier.com/locate/topol On first and second countable spaces and the axiom of choice Gonçalo Gutierres 1 Departamento de Matemática da Universidade
More informationSets. Definition A set is an unordered collection of objects called elements or members of the set.
Sets Definition A set is an unordered collection of objects called elements or members of the set. Sets Definition A set is an unordered collection of objects called elements or members of the set. Examples:
More informationOn the Benefits of Enhancing Optimization Modulo Theories with Sorting Jul 1, Networks 2016 for 1 / MAXS 31
On the Benefits of Enhancing Optimization Modulo Theories with Sorting Networks for MAXSMT Roberto Sebastiani, Patrick Trentin roberto.sebastiani@unitn.it trentin@disi.unitn.it DISI, University of Trento
More informationA Process Calculus for Energy-Aware Multicast Communications of Mobile Ad-Hoc Networks
WIRELESS COMMUNICATIONS AND MOBILE COMPUTING Wirel. Commun. Mob. Comput. 2011; 00:1 16 RESEARCH ARTICLE A Process Calculus for Energy-Aware Multicast Communications of Mobile Ad-Hoc Networks L. Gallina
More informationGame Theory and Randomized Algorithms
Game Theory and Randomized Algorithms Guy Aridor Game theory is a set of tools that allow us to understand how decisionmakers interact with each other. It has practical applications in economics, international
More informationLecture 20 November 13, 2014
6.890: Algorithmic Lower Bounds: Fun With Hardness Proofs Fall 2014 Prof. Erik Demaine Lecture 20 November 13, 2014 Scribes: Chennah Heroor 1 Overview This lecture completes our lectures on game characterization.
More informationAn Erdős-Lovász-Spencer Theorem for permutations and its. testing
An Erdős-Lovász-Spencer Theorem for permutations and its consequences for parameter testing Carlos Hoppen (UFRGS, Porto Alegre, Brazil) This is joint work with Roman Glebov (ETH Zürich, Switzerland) Tereza
More informationTransferable Utility Planning Games
Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence (AAAI-10) Transferable Utility Planning Games Ronen I. Brafman Computer Science Dept. Ben-Gurion Univ., Israel brafman@cs.bgu.ac.il
More informationComputational aspects of two-player zero-sum games Course notes for Computational Game Theory Section 3 Fall 2010
Computational aspects of two-player zero-sum games Course notes for Computational Game Theory Section 3 Fall 21 Peter Bro Miltersen November 1, 21 Version 1.3 3 Extensive form games (Game Trees, Kuhn Trees)
More informationSTRATEGY AND COMPLEXITY OF THE GAME OF SQUARES
STRATEGY AND COMPLEXITY OF THE GAME OF SQUARES FLORIAN BREUER and JOHN MICHAEL ROBSON Abstract We introduce a game called Squares where the single player is presented with a pattern of black and white
More informationUniversity of Portland EE 271 Electrical Circuits Laboratory. Experiment: Digital-to-Analog Converter
University of Portland EE 271 Electrical Circuits Laboratory Experiment: Digital-to-Analog Converter I. Objective The objective of this experiment is to build and test a circuit that can convert a binary
More informationAn Enhanced Fast Multi-Radio Rendezvous Algorithm in Heterogeneous Cognitive Radio Networks
1 An Enhanced Fast Multi-Radio Rendezvous Algorithm in Heterogeneous Cognitive Radio Networks Yeh-Cheng Chang, Cheng-Shang Chang and Jang-Ping Sheu Department of Computer Science and Institute of Communications
More informationMulti-Agent Negotiation: Logical Foundations and Computational Complexity
Multi-Agent Negotiation: Logical Foundations and Computational Complexity P. Panzarasa University of London p.panzarasa@qmul.ac.uk K. M. Carley Carnegie Mellon University Kathleen.Carley@cmu.edu Abstract
More informationA new approach to termination analysis of CHR
A new approach to termination analysis of CHR Dean Voets Paolo Pilozzi Danny De Schreye Report CW 506, January 2008 n Katholieke Universiteit Leuven Department of Computer Science Celestijnenlaan 200A
More informationUniversiteit Leiden Opleiding Informatica
Universiteit Leiden Opleiding Informatica An Analysis of Dominion Name: Roelof van der Heijden Date: 29/08/2014 Supervisors: Dr. W.A. Kosters (LIACS), Dr. F.M. Spieksma (MI) BACHELOR THESIS Leiden Institute
More informationNON-OVERLAPPING PERMUTATION PATTERNS. To Doron Zeilberger, for his Sixtieth Birthday
NON-OVERLAPPING PERMUTATION PATTERNS MIKLÓS BÓNA Abstract. We show a way to compute, to a high level of precision, the probability that a randomly selected permutation of length n is nonoverlapping. As
More informationCITS2211 Discrete Structures Turing Machines
CITS2211 Discrete Structures Turing Machines October 23, 2017 Highlights We have seen that FSMs and PDAs are surprisingly powerful But there are some languages they can not recognise We will study a new
More informationLECTURE 3: CONGRUENCES. 1. Basic properties of congruences We begin by introducing some definitions and elementary properties.
LECTURE 3: CONGRUENCES 1. Basic properties of congruences We begin by introducing some definitions and elementary properties. Definition 1.1. Suppose that a, b Z and m N. We say that a is congruent to
More informationHow hard are computer games? Graham Cormode, DIMACS
How hard are computer games? Graham Cormode, DIMACS graham@dimacs.rutgers.edu 1 Introduction Computer scientists have been playing computer games for a long time Think of a game as a sequence of Levels,
More informationDomination Rationalizability Correlated Equilibrium Computing CE Computational problems in domination. Game Theory Week 3. Kevin Leyton-Brown
Game Theory Week 3 Kevin Leyton-Brown Game Theory Week 3 Kevin Leyton-Brown, Slide 1 Lecture Overview 1 Domination 2 Rationalizability 3 Correlated Equilibrium 4 Computing CE 5 Computational problems in
More informationGame Theory and Algorithms Lecture 19: Nim & Impartial Combinatorial Games
Game Theory and Algorithms Lecture 19: Nim & Impartial Combinatorial Games May 17, 2011 Summary: We give a winning strategy for the counter-taking game called Nim; surprisingly, it involves computations
More informationTetsuo JAIST EikD Erik D. Martin L. MIT
Tetsuo Asano @ JAIST EikD Erik D. Demaine @MIT Martin L. Demaine @ MIT Ryuhei Uehara @ JAIST Short History: 2010/1/9: At Boston Museum we met Kaboozle! 2010/2/21 accepted by 5 th International Conference
More informationWilson s Theorem and Fermat s Theorem
Wilson s Theorem and Fermat s Theorem 7-27-2006 Wilson s theorem says that p is prime if and only if (p 1)! = 1 (mod p). Fermat s theorem says that if p is prime and p a, then a p 1 = 1 (mod p). Wilson
More informationarxiv: v1 [math.co] 7 Aug 2012
arxiv:1208.1532v1 [math.co] 7 Aug 2012 Methods of computing deque sortable permutations given complete and incomplete information Dan Denton Version 1.04 dated 3 June 2012 (with additional figures dated
More informationClass 8 - Sets (Lecture Notes)
Class 8 - Sets (Lecture Notes) What is a Set? A set is a well-defined collection of distinct objects. Example: A = {1, 2, 3, 4, 5} What is an element of a Set? The objects in a set are called its elements.
More information5.4 Imperfect, Real-Time Decisions
116 5.4 Imperfect, Real-Time Decisions Searching through the whole (pruned) game tree is too inefficient for any realistic game Moves must be made in a reasonable amount of time One has to cut off the
More informationA Course in Model Theory I:
A Course in Model Theory I: Introduction 1 Rami Grossberg DEPARTMENT OFMATHEMATICAL SCIENCES, CARNEGIE MELLON UNI- VERSITY, PITTSBURGH, PA15213 1 This preliminary draft is dated from August 15, 2017. The
More informationSpatial Vagueness and Second-Order Vagueness
Spatial Vagueness and Second-Order Vagueness Lars Kulik National Center for Geographic Information and Analysis Department of Spatial Information Science and Engineering 348 Boardman Hall, University of
More informationOn game semantics of the affine and intuitionistic logics (Extended abstract)
On game semantics of the affine and intuitionistic logics (Extended abstract) Ilya Mezhirov 1 and Nikolay Vereshchagin 2 1 The German Research Center for Artificial Intelligence, TU Kaiserslautern, ilya.mezhirov@dfki.uni-kl.de
More informationDynamic Games: Backward Induction and Subgame Perfection
Dynamic Games: Backward Induction and Subgame Perfection Carlos Hurtado Department of Economics University of Illinois at Urbana-Champaign hrtdmrt2@illinois.edu Jun 22th, 2017 C. Hurtado (UIUC - Economics)
More informationRemember that represents the set of all permutations of {1, 2,... n}
20180918 Remember that represents the set of all permutations of {1, 2,... n} There are some basic facts about that we need to have in hand: 1. Closure: If and then 2. Associativity: If and and then 3.
More informationCombinatorics: The Fine Art of Counting
Combinatorics: The Fine Art of Counting Week 6 Lecture Notes Discrete Probability Note Binomial coefficients are written horizontally. The symbol ~ is used to mean approximately equal. Introduction and
More information3.1 Agents. Foundations of Artificial Intelligence. 3.1 Agents. 3.2 Rationality. 3.3 Summary. Introduction: Overview. 3. Introduction: Rational Agents
Foundations of Artificial Intelligence February 26, 2016 3. Introduction: Rational Agents Foundations of Artificial Intelligence 3. Introduction: Rational Agents 3.1 Agents Malte Helmert Universität Basel
More informationWhere s Waldo? Sensor-Based Temporal Logic Motion Planning
Where s Waldo? Sensor-Based Temporal Logic Motion Planning Hadas Kress-Gazit, Georgios E. Fainekos and George J. Pappas GRASP Laboratory, University of Pennsylvania Philadelphia, PA 19104, USA {hadaskg,fainekos,pappasg}@grasp.upenn.edu
More informationAlgorithms and Data Structures: Network Flows. 24th & 28th Oct, 2014
Algorithms and Data Structures: Network Flows 24th & 28th Oct, 2014 ADS: lects & 11 slide 1 24th & 28th Oct, 2014 Definition 1 A flow network consists of A directed graph G = (V, E). Flow Networks A capacity
More informationEquivalence classes of length-changing replacements of size-3 patterns
Equivalence classes of length-changing replacements of size-3 patterns Vahid Fazel-Rezai Mentor: Tanya Khovanova 2013 MIT-PRIMES Conference May 18, 2013 Vahid Fazel-Rezai Length-Changing Pattern Replacements
More informationTwo-person symmetric whist
Two-person symmetric whist Johan Wästlund Linköping studies in Mathematics, No. 4, February 21, 2005 Series editor: Bengt Ove Turesson The publishers will keep this document on-line on the Internet (or
More informationMath 127: Equivalence Relations
Math 127: Equivalence Relations Mary Radcliffe 1 Equivalence Relations Relations can take many forms in mathematics. In these notes, we focus especially on equivalence relations, but there are many other
More informationWireless Network Coding with Local Network Views: Coded Layer Scheduling
Wireless Network Coding with Local Network Views: Coded Layer Scheduling Alireza Vahid, Vaneet Aggarwal, A. Salman Avestimehr, and Ashutosh Sabharwal arxiv:06.574v3 [cs.it] 4 Apr 07 Abstract One of the
More informationAntlab: a Multi-Robot Task Server
Antlab: a Multi-Robot Task Server IVAN GAVRAN, MPI-SWS RUPAK MAJUMDAR, MPI-SWS INDRANIL SAHA, IIT Kanpur We present Antlab, an end-to-end system that takes streams of user task requests and executes them
More informationHamming Codes as Error-Reducing Codes
Hamming Codes as Error-Reducing Codes William Rurik Arya Mazumdar Abstract Hamming codes are the first nontrivial family of error-correcting codes that can correct one error in a block of binary symbols.
More informationGame Solution, Epistemic Dynamics and Fixed-Point Logics
Fundamenta Informaticae XXI (2010) 1001 1023 1001 IOS Press Game Solution, pistemic Dynamics and Fixed-Point Logics Johan van Benthem ILLC, University of msterdam johan@science.uva.nl mélie Gheerbrant
More informationTheory of Probability - Brett Bernstein
Theory of Probability - Brett Bernstein Lecture 3 Finishing Basic Probability Review Exercises 1. Model flipping two fair coins using a sample space and a probability measure. Compute the probability of
More informationIEEE TRANSACTIONS ON ROBOTICS 1. IQ-ASyMTRe: Forming Executable Coalitions for Tightly Coupled Multirobot Tasks
IEEE TRANSACTIONS ON ROBOTICS 1 IQ-ASyMTRe: Forming Executable Coalitions for Tightly Coupled Multirobot Tasks Yu Zhang, Member, IEEE, and Lynne E. Parker, Fellow, IEEE Abstract While most previous research
More informationProbability (Devore Chapter Two)
Probability (Devore Chapter Two) 1016-351-01 Probability Winter 2011-2012 Contents 1 Axiomatic Probability 2 1.1 Outcomes and Events............................... 2 1.2 Rules of Probability................................
More informationPermutation Tableaux and the Dashed Permutation Pattern 32 1
Permutation Tableaux and the Dashed Permutation Pattern William Y.C. Chen, Lewis H. Liu, Center for Combinatorics, LPMC-TJKLC Nankai University, Tianjin 7, P.R. China chen@nankai.edu.cn, lewis@cfc.nankai.edu.cn
More informationSymmetric Decentralized Interference Channels with Noisy Feedback
4 IEEE International Symposium on Information Theory Symmetric Decentralized Interference Channels with Noisy Feedback Samir M. Perlaza Ravi Tandon and H. Vincent Poor Institut National de Recherche en
More informationarxiv: v2 [cs.lo] 13 Oct 2015
Equational reasoning with context-free families of string diagrams Aleks Kissinger and Vladimir Zamdzhiev ariv:1504.02716v2 [cs.lo] 13 Oct 2015 University of Oxford {aleks.kissinger vladimir.zamdzhiev}@cs.ox.ac.uk
More informationLecture for January 25, 2016
Lecture for January 25, 2016 ECS 235A UC Davis Matt Bishop January 25, 2016 ECS 235A, Matt Bishop Slide #1 Example English Policy Computer security policy for academic institution Institution has multiple
More informationIntelligent Agents & Search Problem Formulation. AIMA, Chapters 2,
Intelligent Agents & Search Problem Formulation AIMA, Chapters 2, 3.1-3.2 Outline for today s lecture Intelligent Agents (AIMA 2.1-2) Task Environments Formulating Search Problems CIS 421/521 - Intro to
More informationModeling, Analysis and Optimization of Networks. Alberto Ceselli
Modeling, Analysis and Optimization of Networks Alberto Ceselli alberto.ceselli@unimi.it Università degli Studi di Milano Dipartimento di Informatica Doctoral School in Computer Science A.A. 2015/2016
More information