Decomposition and Complexity of Hereditary History Preserving Bisimulation on BPP

Size: px
Start display at page:

Download "Decomposition and Complexity of Hereditary History Preserving Bisimulation on BPP"

Transcription

1 Decomposition and Complexity of Hereditary History Preserving Bisimulation on BPP Sibylle Fröschle and Sławomir Lasota Institute of Informatics, Warsaw University Warszawa, Banacha 2, Poland Abstract. We propose a polynomial-time decision procedure for hereditary history preserving bisimilarity (hhp-b) on Basic Parallel Processes (BPP). Furthermore, we give a sound and complete equational axiomatization for the equivalence. Both results are derived from a decomposition property of hhp-b, which is the main technical contribution of the paper. Altogether, our results complement previous work on complexity and decomposition of classical and historypreserving bisimilarity on BPP. 1 Introduction The success of automatic verification in the finite-state world is contrasted by the reality that in practice most processes have either an infinite or an extremely large state space. Thus, it is important to clarify: how far can the automatic methods of the finitestate world be extended to infinite-state processes? It is folklore that full process calculi such as CCS are too expressive to allow for a decidable theory. However, there is now a standard hierarchy of restricted processes, the Process Rewrite Systems (PRS) hierarchy, along which the borderlines of decidability and complexity with respect to the major verification problems are well-investigated [19]. One central category of the PRS-hierarchy is Basic Parallel Processes (BPP): it can be seen as an extension of finite automata by a parallel composition operator. One of the major verification problems is to check whether two processes are equivalent under a given bisimulation equivalence. With the recent addition of two more results our understanding of the computational power of bisimulation equivalences on BPP is now almost complete. On the one hand, the complexity of classical bisimilarity on BPP has finally been settled to be PSPACEcomplete [18, 11]. On the other hand, [16] has established that truly-concurrent bisimulation equivalences, such as history preserving bisimilarity (hp-b), are P-complete for this class; in [12] the upper bound has been improved to Ç Ò µ, building on the technique of [11]. Together, these results indicate the following trend: while in the finitestate world truly-concurrent verification problems are at least as hard as their interleaving counterparts (e.g. [13, 15]), in the infinite-state world this effect seems reversed. The same trend has also been revealed in model-checking [4], and linear-time equivalence checking [20]. This work is supported by the European Community Research Training Network GAMES. Partially supported by Polish KBN grant No. 4 T11C

2 One gap remains in our understanding of bisimilarities on BPP: the complexity of hereditary history preserving bisimilarity (hhp-b) [2, 14]. Hhp-b is known to coincide with hp-b for simple BPP (SBPP) [6], and is thus polynomial-time decidable here. For full BPP it was shown to be decidable [5], but the proof left the complexity open. This paper fills this gap: we establish that hhp-b is polynomial-time decidable on BPP. Thereby we settle that hhp-b conforms to the positive trend for true-concurrency in the infinite-state world. This is particularly interesting since hhp-b takes a special position among bisimilarities: it is often considered to be the bisimulation equivalence for trueconcurrency [14, 8]. Unlike all the other equivalences it is undecidable for finite-state systems [15]; only a few positive results could be achieved for restricted classes [7]. The reason behind the positive trend for true-concurrency in the infinite-state world seems to be the following: BPP processes have natural decomposition characteristics; these may translate into decomposition results for truly-concurrent equivalences, and allow us to decide the respective concept by a divide and conquer approach. There are two kinds of decomposition results that one can consider. The classical question is [17]: given a process class and an equivalence, is each process term uniquely, up to the equivalence, represented as a parallel composition of prime processes? A process is prime if it cannot be expressed, up to the equivalence, as a non-trivial parallel composition. This type of decomposition stands behind the polynomial-time algorithm for bisimilarity on normed BPP by Hirshfeld et. al. [10]. Unique decomposition has also been shown for BPP with respect to distributed bisimilarity [3] (which coincides with hp-b for BPP). As recently advocated in [6], in a truly-concurrent framework one can also consider whether a given equivalence is decomposable with respect to the independent components of the processes to be compared. If two processes È and É are equivalent then we ask whether there is a one-to-one correspondence between the components of È and those of É such that related components are equivalent. This kind of decomposition stands behind the coincidence of hhp-b with hp-b on SBPP: decomposition was proved for hp-b and hhp-b for a class that subsumes SBPP (and incomparable to BPP) [6]. Hp-b is not decomposable in general, and, as we will see later, neither is it for BPP. As our core result, we will resolve that, modulo hhp-bisimilar choices (a concept to be explained later), hhp-b on BPP is indeed decomposable in the second sense. We will also show that an analogue for the choice operator holds. Building on our decomposition theory we will design a decision procedure for hhp-b on BPP, running in Ç Ò ¾ ÐÓ Òµ time. Further, we will give a complete equational theory for hhp-b. The latter connects to work of Christensen, who presented equational theories for classical and distributed bisimilarity for BPP [3]. We proceed as follows. Section 2 contains the necessary definitions. In particular, we define hhp-b in terms of a step game. In Section 3 we prove our decomposition results. In Section 4 we present the algorithm and in Section 5 the equational theory. In Section 6 we discuss the consequences of our results, and highlight some further directions. Some proofs, missing here, can be found in [9]. 2 Preliminaries BPP. In the following assume a countably infinite set of actions Ø and a countably infinite set of process variables Î Ö ½. BPP expressions are

3 given by the following grammar: ¼ where ¼ is the empty process, is a process variable, is action prefix, denotes nondeterministic choice, and parallel composition. We usually consider BPP expressions modulo associativity and commutativity of choice and parallel composition, and ¼ as unit for these operators. A BPP definition is a finite family of recursive equations, where the are distinct variables, and each is a BPP expression that only contains variables defined by and where each variable occurrence is guarded, i.e., within the scope of action prefix. (This ensures that recursive definitions yield unique solutions.) The set of variables occurring in is denoted by Î Ö. A BPP process is a pair µ, where is a BPP definition, and is an expression that only contains variables of Î Ö. If is clear from the context, we denote µ simply by. Execution Normal Form. We will mainly work with BPP in Execution Normal Form (ENF). BPP expressions in ENF (ENF expressions) are defined by: ¼ Each BPP process µ can easily be transformed into a process in ENF, Ò µ. During the transformation, always work modulo ¼ as unit for and : remove all superfluous occurrences of ¼ in the expressions. Translate and all defining expressions of into ENF expressions by replacing each subexpression ¼ by ¼. Add new equations ¼ ¼ to. ¼ is possibly unguarded. Therefore, replace each unguarded occurrence of a variable by. Treat such newly created defining expressions as the original ones, until finally all defining expressions will be in ENF. Note that this transformation only makes use of operations such as unfolding of variables and introduction of new variables for subexpressions, which will be respected by any behavioural equivalence. Transition-based ENF. For our definition of hhp-b, given a BPP, we need to be able to uniquely identify each occurrence of an action prefix within. A convenient way to do so is to work with labelled transitions rather than actions. In the following, for each ¾ Ø, assume a countably infinite set of transitions labelled by, Ì Ø Ø ½. Let Ì Ì Ì be the set of all transitions. Let Ø Ø ½ range over Ì, and set Рص if Ø ¾ Ì. Transition-based ENF (T-ENF) expressions are defined as follows: ¼ Ø where Ø is transition prefix. We denote the set of transitions occurring in by Ì. We only consider T-ENF expressions that are transition-genuine in that every Ø ¾ Ì appears syntactically only once in. Given Ø ¾ Ì, there will be exactly one such that Ø is a subexpression of ; denote by Ø. Given a definition, by Ì - Æ we denote all T-ENF expressions such that only contains variables of Î Ö.

4 Proviso. In the following, we mainly work with T-ENF processes. We allow us to assume that all defining expressions in a definition are in T-ENF, and that Ò µ is in T-ENF as well. Clearly, whatever we state for T-ENF processes can be carried over to ENF processes obtained by replacing all transitions with their labels. Steps of T-ENF Processes. Rather than providing an operational semantics for T-ENF processes we prefer to capture the concurrent steps of a T-ENF expression, i.e., the sequences of pairwise concurrent transitions initially enabled at. This will be sufficient for our definition of hhp-b. We say a transition Ø is enabled at, written Ø, iff Ø ¾ Ì. If Ø then the parallel remainder of wrt. Ø, written ÔÊ Øµ, is inductively defined as follows, where we work modulo ¼ as unit for and : ÔÊ Ø Øµ ¼ ÔÊ Øµ if Ø ¾ Ì then ÔÊ Øµ else ÔÊ Øµ ÔÊ Øµ if Ø ¾ Ì then ÔÊ Øµ else ÔÊ Øµ We say Ö Ø ½ Ø Ò ¾ Ì is a concurrent step of, denoted by Ö ¾ Ø Ô µ, iff Ø there is a sequence ½ Ò such that ½, and ¾ ½ Ò, and ½ ÔÊ Ø µ. We generalize ÔÊ Øµ to steps in the obvious way. Given Ö ¾ Ø Ô µ and Ø ¾ Ì, we say Ø is enabled at Ö, written Ö, Ø iff ¼ Ø, where ¼ ÔÊ Öµ. ¼ is a parallel remainder of, written ¼ ¾ ÔÊ µ, iff ¼ ÔÊ Öµ for some Ö ¾ Ø Ô µ. Step Game and Hhp-b. The usual way to define hhp-b for BPP would be to proceed as follows: first, give the standard definition of hhp-b for, say, 1-safe Petri nets; second, define true-concurrency semantics for BPP so that each BPP is interpreted as a (typically infinite) 1-safe Petri net; and third, define two BPP to be hhp-bisimilar iff their interpretations as 1-safe Petri nets are hhp-bisimilar ([5]). To avoid the bulk of definitions this would require, we define hhp-b in a non-standard way, making use of a characterization of [5]: two T-ENF processes and are hhp-bisimilar iff: (1) Duplicator has a winning strategy À in a bisimulation game with backtracking, which is only played in the scope of the concurrent steps of and ; and (2) whenever two transitions Ø and Ø are related by À then Ø and Ø are hhp-bisimilar. Let be a T-ENF expression, and Ö Ø ½ Ø ¾ Ø Ò ¾ Ø Ô µ. Write Ö for the length of Ö, that is Ö Ò. Given ¾ ½ Ö, we define Æ Ö µ to be the result of backtracking the th transition in Ö, that is Æ Ö µ Ø ½ Ø ½ Ø ½ Ø Ò. Observe that we have Æ Ö µ ¾ Ø Ô µ. Given À Ø Ô µ Ø Ô µ, we define Å Ø Àµ to be the set Ø Ø µ Ö Ø Ö ¼ Ö Ø Ö ¼ µ ¾ À where Ö Ö. Let and be T-ENF expressions. The µ Ø Ô -game between Spoiler and Duplicator is played as follows. Configurations are pairs Ö Ö µ ¾ Ø Ô µ Ø Ô µ with Ö Ö. The initial configuration is µ. A play proceeds from Ö Ö µ by the following rules: 1. Spoiler chooses one of or, say, and picks a transition Ø ¾ Ì that is enabled at Ö. Duplicator has to respond by executing a transition Ø in that is enabled at Ö and satisfies Ð Ø µ Ð Ø µ. Play continues at Ö Ø Ö Ø µ.

5 2. Alternatively, Spoiler chooses one of or, say ; he picks ¾ ½ Ö, and backtracks the th transition in Ö. Duplicator has to backtrack the corresponding transition in Ö. Play resumes at Æ Ö µ Æ Ö µµ. 3. The play continues like this forever, in which case Duplicator wins, or until either Spoiler or Duplicator is unable to move, in which case the other participant wins. Note that a play can continue indefinitely only because of repeated backward and forward steps which may undo each other. A winning strategy for Duplicator in the µ Ø Ô -game is a set of configurations À such that µ ¾ À and whenever Spoiler has a move at some Ö Ö µ ¾ À then Duplicator has a response and the accordingly updated configuration is in À. Let be a BPP definition in T-ENF. We map a relation Ì - Æ Ì - Æ to a relation Ì - Æ Ì - Æ as follows: iff Duplicator has a winning strategy À in the µ Ø Ô -game such that for all Ø Ø µ ¾ Å Ø Àµ, Ø Ø (by convention, for variables and we write if ). In [9] it is proved that the standard definition of hhp-b on BPP (e.g. [5]) is equivalent to: Definition 1. Hhp-b, denoted by Ô, is the greatest relation such that. We carry over Ô to all BPP processes: Ô iff Ò µ Ô Ò µ. 3 Decomposition Let be a BPP definition in T-ENF. All processes that appear in this section are assumed to be in Ì - Æ. We define the summands and factors of a process inductively as follows: ÙÑÑ Ò ½ ¾ µ ÙÑÑ Ò ½ µ ÙÑÑ Ò ¾ µ ÙÑÑ Ò ½ ¾ µ ½ ¾ ØÓÖ ½ ¾ µ ½ ¾ ØÓÖ ½ ¾ µ ØÓÖ ½ µ ØÓÖ ¾ µ ÙÑÑ Ò Ø µ Ø ÙÑÑ Ò ¼µ ØÓÖ Ø µ Ø ØÓÖ ¼µ We investigate whether hhp-b is decomposable wrt. parallel composition in the following sense: whenever and are hhp-bisimilar is there a bijection between the factors of and those of such that related factors are hhp-bisimilar? We also ask whether hhp-b is decomposable wrt. choice in the analogous sense. In view of Section 4 we prove our decomposition results in a more general formulation: we work with rather than Ô, where we assume Ì - Æ Ì - Æ to be an arbitrary equivalence. A first observation is that we will have to work modulo choices that are trivial wrt. : let È and É È ¼ È ¼¼ such that È È ¼ È ¼¼ ; clearly È is equivalent to É under any reasonable behavioural equivalence, but there is no bijection between the factors of È and those of É. Formally, we capture trivial choices as follows. Definition 2. We say that contains a trivial choice wrt. if it contains, up to associativity and commutativity of, a subexpression ½ ¾ with ½ ¾. When Ô, we say that contains a hhp-bisimilar choice.

6 We will prove that, modulo trivial choices, is indeed decomposable wrt. both operators. The proof of decomposition wrt. parallel composition relies on three lemmas. The first is a cancellation lemma, which holds in general. Lemma 1. µ. Proof. For shorter notation we set Ä and Ê. Assume a winning strategy À for Duplicator in the Ä Êµ Ø Ô -game such that for all Ø Ä Ø Ê µ ¾ Å Ø Àµ, ØÄ ØÊ. Based on À we exhibit a winning strategy À ¼ for Duplicator in the µ Ø Ô -game. The idea behind the construction of À ¼ is as follows. Assume, in the µ Ø Ô -game, Spoiler picks a transition in, say Ø, as his first move. This move can be copied to the Ä Êµ Ø Ô -game. According to À, Duplicator has a reply, say Ø Ñ, either in or in. If the latter holds then Duplicator can copy Ø Ñ straight to the µ-game. But what to do if Ø Ñ is in? Then Duplicator can obtain her answer to Ø by the following zig-zag -strategy. Spoiler can choose Ø Ñ in Ä as his next move in the Ä Êµ Ø Ô -game. If, according to À, Duplicator s answer, say Ø ¼ Ñ, is in, take ؼ Ñ to be her reply to Ø in the µ Ø Ô -game. Otherwise, let Spoiler perform Ø ¼ Ñ in Ä as his next move in the Ä Êµ Ø Ô -game, and check whether this time Duplicator s answer is in. We repeat this procedure, until, finally, we hit a match in. In this manner, we will exhibit answers for Duplicator not only to Spoiler s first moves but to all of his moves. We will make use of the following two observations, where Ö Ä ¾ Ø Ô Äµ, Ö Ê ¾ Ø Ô Êµ, Ö ¾ Ø Ô µ, and Ö ¾ Ø Ô µ. We use a notation Ö Ì for projection of a concurrent step Ö on a set of transitions Ì, i.e., Ö Ì is a concurrent step obtained by dropping all transitions of Ö that are not in Ì. 1. If Ö Ä Ì Ö Ê Ì then Ø ¾ Ì, Ö Ä Ø µ Ö Ê Ø. 2. If Ö Ä Ì Ö then Ø ¾ Ì, Ö Ä Ø µ Ö Ø. And, in analogy: If Ö Ê Ì Ö then Ø ¾ Ì, Ö Ê Ø µ Ö Ø. Formally, we construct À ¼ inductively from the initial configuration while preserving the following property: Property P. Let Ö Ö µ ¾ À ¼ ; Ö Ö µ is of the form Ø ½ ØÑ Ø½ ØÑ µ, where Ñ ¼ and ¾ ½ Ñ, Ø ¾ Ì, Ø ¾ Ì. Then there is Ö Ä Ö Ê µ ¾ À such that Ö Ä ÛÄ ½ ÛÑ Ä, Ö Ê ÛÊ ½ ÛÑ Ê, and ¾ ½ Ñ, Û Ä and Û Ê are of the form ÛÄ Ø Ø½ ØÒ or Û Ä Ø½ ØÒ Ø ÛÊ Ø½ ØÒ Ø Û Ê Ø Ø½ ØÒ where Ò ¼ and ¾ ½ Ò, Ø ¾ Ì. Base case. We start with µ ¾ À ¼. Property (P) trivially holds since µ ¾ À. Inductive case. Let Ö Ö µ ¾ À ¼. Spoiler chooses his next move according to rule (1) or (2) of the game. Assume Ö Ä Ö Ê µ ¾ À as given by (P). In either case, we construct a response for Duplicator such that (P) is preserved.

7 (1) Spoiler chooses one of or, say, and performs a transition Ø of that is enabled at Ö. Consider the Ä Êµ Ø Ô -game. Let Spoiler perform Ø at Ö Ä Ö Ê µ; this is possible by Observation (2). Say Duplicator s response according to À is Ø Ñ. We obtain a match for Ø in the µ Ø Ô -game by the following zig-zag algorithm: Ö Ä Ö Ä Ø ; Ö Ê Ö Ê Ø Ñ ; -- update the configuration while Ø Ñ ¾ Ì do let Spoiler perform Ø Ñ in Ä; set Ø ¼ Ñ to be Duplicator s response according to À; Ö Ä Ö Ä Ø Ñ ; Ö Ê Ö Ê Ø ¼ Ñ ; -- update the configuration Ø Ñ Ø ¼ Ñ; -- update the match return Ø Ñ ; The following is an invariant of the while-loop: let ÖÊ ¼ be given by Ö Ê minus Duplicator s last match; (a) Ö Ä Ì ÖÊ ¼ Ì, and (b) ÖÊ ¼ Ì Ö. By (a) and Observation (1), the first instruction of the while-loop is indeed a valid move in the Ä Êµ Ø Ô -game. The algorithm clearly terminates: there is only a finite number of transitions in Ì. We take Ø Ñ to be Duplicator s response to Ø in the µ Ø Ô -game; by (b) and Observation (2) this is a legal move. Thus, we extend À ¼ by Ö Ø Ö Ø Ñ µ. Property (P) will be preserved: at the last stage of the algorithm Ö Ä Ö Ê µ is a configuration as required. (2) Spoiler chooses one of or, say ; he picks ¾ ½ Ö, and backtracks the th transition in Ö. Duplicator must backtrack the th transition in Ö. We add Æ Ö µ Æ Ö µµ to À ¼. Property (P) will be preserved by this addition. In the Ä Êµ Ø Ô -game, at Ö Ä Ö Ê µ, let Spoiler backtrack all the ÛÄ -transitions. Then ÛÄ ½ Û ½ Û ½ Ä Ä ÛÄ Ñ Û½ Ê Û ½ Û ½ Ê Ê ÛÑ Ê µ ¾ À; but this is exactly a configuration as required. It remains to check whether for all Ø Ø µ ¾ Å Ø À ¼ µ, Ø Ø. Let Ø Ø µ ¾ Å Ø À ¼ µ. If Ø Ø µ ¾ Å Ø Àµ then Ø Ø is immediate. Otherwise, wlog. assume (P) gives us Ø Ø ½ µ, ؽ ؾ µ,..., ØÒ Ø µ ¾ Å Ø Àµ, where Ò ¼, and ¾ ½ Ò, Ø ¾ Ì. We know that Ø Ø ½, ¾ ½ Ò ½, Ø Ø ½, and Ø Ò Ø. But then Ø Ø follows by transitivity of. ÙØ Relation is a congruence with respect to parallel composition; hence we also obtain: Corollary 1. ( ¼ µ ² ¼ ¼ µ µ ¼. The second lemma implies: if a choice and a parallel composition are related by then the choice must be trivial wrt.. Lemma 2. If. and ØÓÖ µ ¾ then for each ¾ ÙÑÑ Ò µ, Proof. Let and be given as above. If ÙÑÑ Ò µ ¾ then the lemma is immediate. Otherwise, let À be a winning strategy for Duplicator in the µ Ø Ô -game such that for all Ø Ø µ ¾ Å Ø Àµ, Ø Ø. Choose any ¾ ÙÑÑ Ò µ. We will exhibit a winning strategy À ¼ for Duplicator in the µ Ø Ô -game such that

8 Ø Ø µ ¾ Å Ø À ¼ µ only if Ø Ø µ ¾ Å Ø Àµ. This will clearly yield. If Spoiler picks a transition in as his first move then Duplicator can copy her response and all subsequent moves straight from À. This is so because: once we have decided for, the other -summands become disabled, and, from this point onwards, the µ Ø Ô -game corresponds exactly to the µ Ø Ô -game. Similarly, if Spoiler picks a transition in as his first move, and, according to À, Duplicator responds with a -transition then she can copy this response and all subsequent moves from À. The difficult case is when Spoiler performs his first move in, say he executes Ø, and À prescribes a match in a -summand other than. We show that, in this case, Duplicator has an alternative match in : we exhibit Ø ¾ such that Ø Ø µ ¾ À. Consider the µ Ø Ô -game. At µ, let Spoiler perform a transition in, say Ø ; this is clearly possible. Assume, according to À, Duplicator answers this move by Ø ¼. There are three cases: (a) Ø ¼ Ø, (b) Ø ¼ and Ø are concurrent in, (c) Ø ¼ and Ø are in conflict in. (Given an expression, two distinct transitions Ø, Ø ¼ ¾ Ì are in conflict in if there is a subexpression ½ ¾ of with Ø ¾ Ì ½ and Ø ¼ ¾ Ì ¾ ; otherwise Ø, Ø ¼ are concurrent in.) If (a) holds then Ø is a match as required. In case (b) Spoiler can perform Ø as his next move. Duplicator must match Ø by a transition in, say Ø ¼. Let Spoiler backtrack Ø ¼. Duplicator must backtrack Ø. We arrive at Ø ¼ Ø µ ¾ À, and thus Ø ¼ is a match as required. Finally, assume (c) holds. Ø and Ø ¼ must belong to the same factor of, say À. There must be a further factor of, say À ¼. Spoiler can perform a transition in À ¼, say Ø ¼¼, as his next move. Duplicator must match ؼ¼ by a -transition, say ؼ. Let Spoiler backtrack Ø ¼. Duplicator must backtrack Ø. We arrive at Ø ¼ ؼ¼ µ ¾ À; but from here we can proceed exactly as in (b). ÙØ With the help of the previous lemma we will show: given, where and are non-zero and contain no trivial choice, we can always find a factor of and a factor À of such that À. This will ensure that we can apply Corollary 1 consecutively to obtain our decomposition result. Lemma 3. Assume that and contain no trivial choice wrt., and ¼ or ¼. If then there exist ¾ ØÓÖ µ and À ¾ ØÓÖ µ such that À. Proof. Wlog. assume ¼. Let À be a winning strategy for Duplicator in the µ Ø Ô -game such that for all Ø Ø µ ¾ Å Ø Àµ, Ø Ø. Choose any ¾ ØÓÖ µ, and consider Ö ¾ Ø Ô µ such that ÔÊ Ö µ ; this is clearly possible. There must be Ö ¾ Ø Ô µ such that Ö Ö µ ¾ À. Set ¼ ÔÊ Ö µ. It is straightforward to derive ¼. One of the following three cases will hold: 1. ¼ ¾ ØÓÖ µ. 2. ¼ ¾ ÔÊ Àµ and ¼ À for some À ¾ ØÓÖ µ.

9 3. ¼ À ¼ ½ À Ò ¼, where Ò ¾ and ¾ ½ Ò, À ¼ ¼ and À ¼ ¾ ÔÊ Àµ for some À ¾ ØÓÖ µ. If (1) holds then and ¼ are factors as required. If (2) applies, at Ö Ö µ, let Spoiler backtrack all the À-transitions in Ö. Duplicator must backtrack the corresponding transitions. The new configuration, say Ö ¼ Ö¼ µ, satisfies: ÔÊ Ö¼ µ À and ÔÊ Ö ¼ µ ¼ ½ ¼ Ò, where Ò ½ and ¾ ½ Ò, ¼ ¼ and ¼ ¾ ÔÊ ¼ µ for some ¼ ¾ ØÓÖ µ. But this means (2) reduces to (3): wlog. we can exchange by À. Finally, assume (3) holds. cannot be of the form Ø : we have ¼ but there are at least two concurrent transitions in ¼ for Duplicator to match. Since cannot be a parallel composition either, we conclude ÙÑÑ Ò µ ¾. But then we can apply Lemma 2 to obtain a contradiction with our assumption that does not contain any trivial choice wrt.. ÙØ Now, we are ready to prove decomposition wrt. parallel composition. Theorem 1. Assume and contain no trivial choice wrt.. If then there exists a bijection ØÓÖ µ ØÓÖ µ such that µ for each ¾ ØÓÖ µ. Proof. Set Ñ ØÓÖ µ. The proof is by induction on Ñ. If Ñ ¼ then we must also have ØÓÖ µ ¼, and a bijection as required is trivially given. If Ñ ¼, we can apply Lemma 3 to obtain ¾ ØÓÖ µ and À ¾ ØÓÖ µ such that À. Let ¼ be given by ¼, and ¼ by ¼ À. Corollary 1 gives us ¼ ¼, and, applying the induction hypothesis, we easily obtain a bijection as required. ÙØ Decomposition wrt. choice is not as involved to prove. It is a consequence of the following theorem. Theorem 2. If then for each ¾ ÙÑÑ Ò µ there is À ¾ ÙÑÑ Ò µ such that À, for each À ¾ ÙÑÑ Ò µ there is ¾ ÙÑÑ Ò µ such that À. Corollary 2. Assume and contain no trivial choice wrt.. If then there exists a bijection ÙÑÑ Ò µ ÙÑÑ Ò µ such that µ for each ¾ ÙÑÑ Ò µ. Although we will build on Theorem 1 and Corollary 2 it is worth spelling them out for the special case Ô. By definition of hhp-b all the previous results carry over, and we obtain decomposition of hhp-b wrt. all BPP operators. Corollary 3. Assume and contain no hhp-bisimilar choice. If Ô then there exists a bijection ØÓÖ µ ØÓÖ µ such that Ô µ for each ¾ ØÓÖ µ; there exists a bijection ÙÑÑ Ò µ ÙÑÑ Ò µ such that Ô µ for each ¾ ÙÑÑ Ò µ. Note that, including Ô, is clearly compositional, i.e., preserved by and ; hence the opposite directions of Theorems 1, 2 and Corollaries 2, 3 hold as well.

10 4 Algorithm Let be a BPP definition in T-ENF. By convention, let denote the defining expression of a variable. Let Ò be the size of, i.e., the sum of lengths of all. We will concentrate on relations Î Ö Î Ö between variables in this section. Hence, in the following, symbol Ô is used to denote hhp-b restricted to variables. We will show that Ô can be computed in time polynomial wrt. Ò. Define an operator that given Î Ö Î Ö yields a relation µ Î Ö Î Ö, defined by: ¾ µ iff. can be seen as the restriction of the mapping to variables. In particular, is monotonic: if ½ ¾ then ½ µ ¾ µ. By Definition 1 we get: Proposition 1. Ô is the greatest fixed point of. Hence, Ô Î Ö Î Ö : is the limit of the following sequence of approximants, where ¼ ¼ ¼ µ ¾ ¼ µ In other words, Ô equals the first ¼ µ with ¼ µ ½ ¼ µ. It can easily be shown, by induction on, that all the approximants are equivalence relations; hence the number of iterations is not greater than the number of variables. We only need to show that computing ½ ¼ µ from ¼ µ can be done in polynomial time. We will prove: Lemma 4. Given an equivalence Î Ö Î Ö, relation µ can be computed in time Ç Ò ÐÓ Òµ. We will also show that checking whether the limit has been reached can be done without any extra cost. Thus, altogether we obtain: Theorem 3. Relation Ô can be computed in time Ç Ò ¾ ÐÓ Òµ. In the rest of this section we describe the algorithm announced in Lemma 4. It is inspired by the standard algorithm solving tree isomorphism (e.g. [1]). Our algorithm assigns an integer Úµ to each node Ú of the syntactic trees corresponding to the defining expressions of such that for any two nodes Ú ½, Ú ¾ we have: Ú ½ µ Ú ¾ µ iff the expressions represented by Ú ½ and Ú ¾ are related by. The nodes of the syntactic trees are of three types: prefix, and ; the leaves are precisely the nodes of type prefix. We assume that the trees are constructed up to associativity and commutativity of and. In particular, if a node has type, its parent has type, and vice versa. The trees can be constructed in time Ç Òµ. The algorithm works in bottom-up manner, visiting each of the nodes once. It starts in the leaves and each non-leaf is processed after all its children have been visited. In each node Ú, a sorted list Ð Ú is computed. To start off with, Ð Ú exactly contains the child nodes of Ú. To notionally remove trivial choices from the trees, Ð Ú is processed such that: (1) if Ú is of type then, for any integer, Ð Ú will contain at most one node Ú ¼ with Ú ¼ µ ; (2) if Ú is of type and some child Ú ¼ of Ú has been identified as a trivial choice, i.e., Ú ¼ is of type and Ð Ú ¼ contains only one node, say Ú ¼¼, then the nodes of

11 Ð Ú ¼¼ will be inserted into Ð Ú in place of Ú ¼. For convenience, we assume Ð Ú Ú at each leaf Ú. A table Ì is used to store triples Ü Øµ, where is an integer assigned to some non-leaf node Ú, Ü is the type of Ú, and Ø Ð Ú µ is the sorted tuple of integers assigned to the nodes of Ð Ú. The table Ì is initially empty. Assign integers to all leaves such that two leaves Ø and Ø ¼ ¼ have the same integer iff Рص Ð Ø ¼ µ and ¼. This can clearly be done in time Ç Òµ. The processing of a non-leaf Ú depends on its type. First, we do the following: let Ð Ú be a tuple containing all child nodes of Ú if Ú is of type sort Ð Ú wrt. the integers assigned to the nodes remove duplicates from Ð Ú : µ as long as Ú ½ Ú ¾ ¾ Ð Ú, Ú ½ Ú ¾ and Ú ½ µ Ú ¾ µ, remove one of Ú ½ Ú ¾ if Ð Ú contains only one node, mark node Ú trivial choice else -- i.e., Ú is of type for each node Ú ¼ ¾ Ð Ú marked trivial choice replace Ú ¼ by the elements of Ð Ú ¼¼, where Ú ¼¼ Ð Ú ¼ µ sort Ð Ú wrt. the integers assigned to the nodes. If Ú is marked trivial choice then we assign to Ú the integer that has been given to the unique element of Ð Ú. Otherwise, we perform a look-up in Ì. If a triple Ü Øµ is found with Ø Ð Ú µ and Ü the type of Ú, assign to Ú. Otherwise, assign to Ú a fresh number ¼ and update Ì by inserting ¼ Ü ¼ Ð Ú µµ into Ì, where Ü ¼ is the type of Ú. After all nodes have been processed we assign to each variable of the integer assigned to the root of the tree that represents. This yields a representation of µ. The correctness of the algorithm follows from Lemma 5 below. For its formulation and proof we adopt some conventions. Given an expression, define the children of, denoted by Ð Ö Ò µ, as follows: if is a choice then set Ð Ö Ò µ ÙÑÑ Ò µ, otherwise define Ð Ö Ò µ ØÓÖ µ. (If is a prefix this implies Ð Ö Ò µ.) Given a processed node Ú, let ÐÚ Ö be the real tuple of Ú: if Ú is marked trivial choice set ÐÚ Ö to be Ð Ú where ¼ Ú¼ Ð Ú, otherwise set ÐÚ Ö to be Ð Ú. We carry over to nodes in the obvious way: e.g., given a node Ú, we write Ú iff and the expression represented by Ú are related by. Lemma 5. Let Ú, Ú ½, Ú ¾ be nodes of the trees after termination of the algorithm. 1. Ú for some process such that (a) does not contain any trivial choice; (b) there exists a bijection ÐÚ Ö Ð Ö Ò µ such that Ú ¼ Ú ¼ µ for each Ú ¼ ¾ ÐÚ Ö; (c) if there is no entry for Úµ in Ì then is a prefix, otherwise is of type Ü, where Ü is given by Úµ Ü ÐÚ Ö µµ ¾ Ì. 2. Ú ½ Ú ¾ iff Ú ½ µ Ú ¾ µ. Proof (Sketch). The lemma follows by induction on the number of nodes that have already been processed. (1) If Ú is a prefix then take to be Ú. Otherwise, for each Ú ¾ ÐÚ Ö assume such that Ú as given by the induction hypothesis. Let Ü be

12 defined by Úµ Ü ÐÚ Ö µµ ¾ Ì. If Ü then take to be the parallel composition of the, otherwise take to be the choice of the. Using the induction hypothesis of (2) it is routine to check that Ú and that conditions (a) (c) are satisfied. (2)(µ) Assume ½ and ¾ such that ½ Ú ½ and ¾ Ú ¾ as given by (1). Since ½ and ¾ do not contain any trivial choice we can apply Theorem 1 and Corollary 2 to obtain: ½ and ¾ must be of the same type, and there is a bijection between the children of ½ and those of ¾ such that related children are in. If ½ and ¾ are of type prefix then Ú ½ µ Ú ¾ µ can be derived immediately. Otherwise, using the induction hypothesis, we first obtain ÐÚ Ö ½ µ ÐÚ Ö ¾ µ, and then conclude Ú ½ µ Ú ¾ µ. ( ) By a converse argument using congruence rather than decomposition. ÙØ Finally, we provide a cost estimation of the algorithm. Claim. The algorithm runs in time Ç Ä ÐÓ Òµ, where Ä È Ú Ð Ú is the sum of lengths of all tuples Ð Ú. (When Ú is a node, we consider the length of Ð Ú before removing duplicates in µ.) Indeed: sorting Ð Ú requires Ç Ð Ú ÐÓ Ð Ú µ time; each look-up and update can be done in time Ç Ð Ú ÐÓ Òµ by bisection: Ì never contains more than Ò entries, and equality test for Ð Ú requires at most time Ð Ú since all tuples are sorted. The crucial observation for the total cost estimation is the following: Claim. L is Ç Òµ. Each node Û belongs to a tuple Ð Ú of its parent Ú (before Û may be removed from Ð Ú during µ). Moreover, a node can belong to several other tuples Ð Ú ¼, due to the replacement µ in the algorithm. Obviously, Ä is equal to the total number of pairs Û Úµ Û ¾ Ð Ú. There are at most Ò such pairs with Ú being the parent of Û. We will show that there are also at most Ò pairs with Ú not the parent of Û. Concretely, we will injectively assign to each such pair a node in the tree. Consider stage µ of the algorithm: assume a node Ú with one of its children Ú ¼ marked trivial choice ; let Ð Ú ¼ Ú ¼¼, and assume Û ¾ Ð Ú ¼¼. Node Ú ¼ has type and Ú ¼¼ can either be of type prefix or of type. We will assign to the pair Û Úµ a node as follows. There must be a second child Ú ¼¼ of Ú ¼ which satisfies Ú ¼¼ µ Ú ¼¼ µ; Ú ¼¼ must have been removed from Ð Ú ¼ at an earlier stage of the algorithm. We have Ð Ú ¼¼ µ Ð Ú ¼¼ µ. Assign to Û Úµ a corresponding node Û in Ð Ú ¼¼. (Note that Û is not necessarily a child of Ú ¼¼.) In total, all pairs Û Úµ with Û ¾ Ð Ú ¼¼ can be assigned injectively to the nodes of Ð Ú ¼¼. The crucial observation is that a node from Ð Ú ¼¼ will not be assigned to any other pair again later, since Ú ¼¼ has been removed from Ð Ú ¼. This implies that the mapping is injective. To complete the cost estimation, we note that checking whether µ can be done without any extra cost. It can be shown that, as long as the limit has not been reached, in each iteration of the algorithm the set of nodes marked trivial choice is a strict subset of the nodes thus marked in the previous iteration. Hence, let the overall algorithm terminate when no node is unmarked during the current iteration.

13 5 Equational Theory In this section we work with general BPP expressions. We give a complete equational theory for hhp-b. That is to say, Ô if and only if can be derived within the theory. Our approach is sequent-based (similarly to [3]), i.e., we provide a set of axioms of the form, to be read as is provable under assumption, where is a finite set of equations. We write when is empty. Interestingly, our axiomatization is essentially the same as that given by [3] for hp-b on SBPP, a subclass for which hhp-b and hp-b coincide [6]. We work relative to a BPP definition. Summation (S1) (S2) µ µ (S3) ¼ (S4) Composition (P1) (P2) µ µ (P3) ¼ Recursion (R1) (R2) µ¾ Axioms (S1)-(S3) and (P1)-(P3) are the commutative monoid laws for summation and parallel composition. Axiom (S4) is idempotency for summation. Rules (R1)-(R2) are laws for recursion and can be seen as an instance of fixed-point induction. In particular, Rule (R2) says that in order to prove a goal under assumption, one is allowed to replace by its defining expression. Moreover, the additional assumption is added to, which guarantees immediate termination of the proof, by (R1), whenever a subgoal is to be proved again. In addition, we need standard equivalence rules (E1)-(E3) and substitutivity rules (C1)-(C3): Equivalence (E1) Congruence (C1) (E2) (E3) (C2) (C3) A proof of is in the form of a finite tree, whose root is labelled by, leaves are instances of axioms and the children of each non-leaf are determined by an instance of some rule (in fact, only (E3) admits more than one child). We write when such a proof exists. (It would be more precise to write ; however, we assume that is clear from the context.) Soundness of the theory for hhp-b is intuitively clear: one would expect each rule to be respected by any behavioural equivalence. Completeness follows from the strong

14 decomposition characteristics of hhp-b on BPP. A formal proof of soundness and completeness is provided in [9]. Theorem 4 (soundness, completeness). if and only if Ô. 6 Conclusions We have provided a polynomial-time procedure (working in time Ç Ò ¾ ÐÓ Òµ) to compute hhp-b on BPP. Our algorithm takes a BPP definition in T-ENF as input. Transformation to T-ENF can easily be done in time quadratic wrt. the size of the input; the size of the definition may also grow by that factor during the transformation. Furthermore, we have proposed a sound and complete equational axiomatization of the equivalence. The crucial insight behind both of these results is that, modulo hhp-bisimilar choices, hhp-b is decomposable wrt. parallel composition and choice. Our results highlight that, modulo trivial choices, hhp-b fully reflects the structure of BPP expressions. One could argue that this is what one would intuitively expect of a truly-concurrent bisimulation equivalence. In particular, it does not imply that hhp-b is trivial on BPP: hhp-bisimilar choices may be hidden deeply within the process definition. One could ask whether hhp-b also satisfies the unique decomposition property usually investigated in the interleaving setting: is each BPP process uniquely, up to hhp-b, represented as a parallel composition of primes? A process is prime if it cannot be expressed, up to hhp-b, as a non-trivial parallel composition. Indeed, from our results it is straightforward to derive that hhp-b does satisfy unique decomposition in this sense: Lemma 2 ensures that there is a one-to-one correspondence between prime factors wrt. hhp-b and factors that do not contain any hhp-bisimilar choices. As mentioned in the introduction, unique decomposition with respect to distributed bisimilarity, and hence with respect to hp-b, has been established for BPP [3]. It has also been proved that cancellation (c.f. Lemma 1) does hold for distributed bisimilarity [3]. However, the following example of [3] shows that hp-b is not decomposable wrt. or, in the sense of Section 3. ¼ ¼µ ¼ ¼ ¼ ¼ ¼µ ¼ Both and have no hp-bisimilar choices, and Ô. But ÙÑÑ Ò µ and ØÓÖ µ have two elements while ÙÑÑ Ò µ and ØÓÖ µ are singletons. In particular, the example illustrates that Lemma 2 fails for hp-b. An interesting question that remains open is whether, modulo hhp-bisimilar choices, hhp-b is decomposable with respect to prime decompositions of labelled asynchronous transition systems (c.f. [6]). Our algorithm is a natural complement of the polynomial-time procedures for hp-b on BPP [16, 12]. However, in the case of hhp-b the good complexity is due to its very strong decomposition properties; the technique of [11] seems not to be applicable here. Both algorithms can be carried over to CPP, an extension of BPP that allows for synchronization between processes in CCS style but disallows a silent action to appear explicitly inside expressions. It is not clear whether a polynomial-time procedure exists

15 for hhp-b or hp-b on BPP, which extends CPP by allowing explicit -actions. Preliminary investigations give hope that polynomial-time complexity of hhp-b on BPP can indeed be achieved; this issue will be treated in detail in a full version of this paper. References 1. A.V. Aho, J.E. Hopcroft, and J.D. Ullman. The Design and Analysis of Computer Algorithms. Addison-Wesley Publishing Co., M. Bednarczyk. Hereditary history preserving bisimulation or what is the power of the future perfect in program logics. Technical report, Polish Academy of Sciences, Gdansk, S. Christensen. Decidability and Decomposition in process algebras. PhD thesis, Dept. of Computer Science, University of Edinburgh, UK, J. Esparza and A. Kiehn. On the model checking problem for branching time logics and basic parallel processes. In CAV 95, volume 939 of LNCS, pages Springer-Verlag, S. Fröschle. Decidability of plain and hereditary history-preserving bisimulation for BPP. In Proc. EXPRESS 99, volume 27 of ENTCS, S. Fröschle. Composition and decomposition in true-concurrency. In Proc. FOSSACS 05, LNSC. Springer-Verlag, to appear, S. Fröschle. The decidability border of hereditary history preserving bisimilarity. Information Processing Letters, to appear, S. Fröschle and T. Hildebrandt. On plain and hereditary history-preserving bisimulation. In MFCS 99, volume 1672 of LNCS, pages Springer-Verlag, S. Fröschle and S. Lasota. Decomposition and complexity of hereditary history preserving bisimulation on BPP. Technical Report 280, Institute of Informatics, Warsaw University, Poland, Y. Hirshfeld, M. Jerrum, and F. Moller. A polynomial time algorithm for deciding bisimulation equivalence of normed basic parallel processes. Mathematical Structures in Computer Science, 6: , P. Jančar. Bisimilarity of basic parallel processes is PSPACE-complete. In Proc. LICS 03, pages , P. Jančar and Z. Sawa. On distributed bisimilarity over Basic Parallel Processes. In Proc. AVIS2 05, L Jategaonkar and A. R. Meyer. Deciding true concurrency equivalences on safe, finite nets. Theoretical Computer Science, 154: , A. Joyal, M. Nielsen, and G. Winskel. Bisimulation from open maps. Information and Computation, 127: , Marcin Jurdziński, Mogens Nielsen, and J. Srba. Undecidability of domino games and hhpbisimilarity. Inform. and Comput., 184: , S. Lasota. A polynomial-time algorithm for deciding true concurrency equivalences of Basic Parallel Processes. In Proc. MFCS 03, LNCS 2747, pages Springer-Verlag, R. Milner and F. Moller. Unique decomposition of processes. TCS, 107(2): , J. Srba. Strong bisimilarity and regularity of Basic Parallel Processes is PSPACE-hard. In Proc. STACS 02, LNCS 2285, J. Srba. Roadmap of Infinite Results, volume 2: Formal Models and Semantics. World Scientific Publishing Co., K. Sunesen and M. Nielsen. Behavioural equivalence for infinite systems partially decidable! In ICATPN 96, volume 1091 of LNCS, pages Springer-Verlag, 1996.

Extensional Equality in Intensional Type Theory

Extensional Equality in Intensional Type Theory Extensional Equality in Intensional Type Theory Thorsten Altenkirch Department of Informatics University of Munich Oettingenstr. 67, 80538 München, Germany, alti@informatik.uni-muenchen.de Abstract We

More information

38050 Povo (Trento), Italy Tel.: Fax: e mail: url:

38050 Povo (Trento), Italy Tel.: Fax: e mail: url: CENTRO PER LA RICERCA SCIENTIFICA E TECNOLOGICA 38050 Povo (Trento), Italy Tel.: +39 0461 314312 Fax: +39 0461 302040 e mail: prdoc@itc.it url: http://www.itc.it HISTORY DEPENDENT AUTOMATA Montanari U.,

More information

Nominal Techniques in Isabelle/HOL

Nominal Techniques in Isabelle/HOL Noname manuscript No. (will be inserted by the editor) Nominal Techniques in Isabelle/HOL Christian Urban Received: date / Accepted: date Abstract This paper describes a formalisation of the lambda-calculus

More information

Two-Way Equational Tree Automata for AC-like Theories: Decidability and Closure Properties

Two-Way Equational Tree Automata for AC-like Theories: Decidability and Closure Properties Two-Way Equational Tree Automata for AC-like Theories: Decidability and Closure Properties Kumar Neeraj Verma LSV/CNRS UMR 8643 & INRIA Futurs projet SECSI & ENS Cachan, France verma@lsv.ens-cachan.fr

More information

Solutions of Implication Constraints yield Type Inference for More General Algebraic Data Types

Solutions of Implication Constraints yield Type Inference for More General Algebraic Data Types Solutions of Implication Constraints yield Type Inference for More General Algebraic Data Types Peter J. Stuckey NICTA Victoria Laboratory Department of Computer Science and Software Engineering The University

More information

Event Based Sequential Program Development: Application to Constructing a Pointer Program

Event Based Sequential Program Development: Application to Constructing a Pointer Program Event Based Sequential Program Development: Application to Constructing a Pointer Program Jean-Raymond Abrial Consultant, Marseille, France jr@abrial.org Abstract. In this article, I present an event approach

More information

ÈÖÓÚ Ò Ò ÁÑÔÐ Ø ÓÒ È É Ï Ö Ø ÐÓÓ Ø Û Ý ØÓ ÔÖÓÚ Ø Ø Ñ ÒØ Ó Ø ÓÖÑ Á È Ø Ò É ÓÖ È É Ì ÓÐÐÓÛ Ò ÔÖÓÓ ØÝÔ Ò Ð Ó Ù ØÓ ÔÖÓÚ Ø Ø Ñ ÒØ Ó Ø ÓÖÑ Ü È Üµ É Üµµ Ý ÔÔ

ÈÖÓÚ Ò Ò ÁÑÔÐ Ø ÓÒ È É Ï Ö Ø ÐÓÓ Ø Û Ý ØÓ ÔÖÓÚ Ø Ø Ñ ÒØ Ó Ø ÓÖÑ Á È Ø Ò É ÓÖ È É Ì ÓÐÐÓÛ Ò ÔÖÓÓ ØÝÔ Ò Ð Ó Ù ØÓ ÔÖÓÚ Ø Ø Ñ ÒØ Ó Ø ÓÖÑ Ü È Üµ É Üµµ Ý ÔÔ Å Ø Ó Ó ÈÖÓÓ ÊÙÐ Ó ÁÒ Ö Ò ¹ Ø ØÖÙØÙÖ Ó ÔÖÓÓ ÆÓÛ ËØÖ Ø ÓÖ ÓÒ ØÖÙØ Ò ÔÖÓÓ ÁÒØÖÓ ÙØ ÓÒ ØÓ ÓÑÑÓÒ ÔÖÓÓ Ø Ò ÕÙ Ê ÐÐ Ø Ø Ñ ÒØ ÒØ Ò Ø Ø Ø Ö ØÖÙ ÓÖ Ð º Ò Ø ÓÒ ÔÖÓÓ ÓÒÚ Ò Ò Ö ÙÑ ÒØ Ø Ø Ø Ø Ñ ÒØ ØÖÙ º ÆÓØ Ï ÒÒÓØ

More information

Refinement in Requirements Specification and Analysis: a Case Study

Refinement in Requirements Specification and Analysis: a Case Study Refinement in Requirements Specification and Analysis: a Case Study Edwin de Jong Hollandse Signaalapparaten P.O. Box 42 7550 GD Hengelo The Netherlands edejong@signaal.nl Jaco van de Pol CWI P.O. Box

More information

A Calculus for End-to-end Statistical Service Guarantees

A Calculus for End-to-end Statistical Service Guarantees A Calculus for End-to-end Statistical Service Guarantees Technical Report: University of Virginia, CS-2001-19 (2nd revised version) Almut Burchard Ý Jörg Liebeherr Stephen Patek Ý Department of Mathematics

More information

How hard is it to control sequential elections via the agenda?

How hard is it to control sequential elections via the agenda? How hard is it to control sequential elections via the agenda? Vincent Conitzer Department of Computer Science Duke University Durham, NC 27708, USA conitzer@cs.duke.edu Jérôme Lang LAMSADE Université

More information

solutions:, and it cannot be the case that a supersolution is always greater than or equal to a subsolution.

solutions:, and it cannot be the case that a supersolution is always greater than or equal to a subsolution. Chapter 4 Comparison The basic problem to be considered here is the question when one can say that a supersolution is always greater than or equal to a subsolution of a problem, where one in most cases

More information

LET Õ Ò µ denote the maximum size of a Õ-ary code

LET Õ Ò µ denote the maximum size of a Õ-ary code 1 Long Nonbinary Codes Exceeding the Gilbert-Varshamov bound for Any Fixed Distance Sergey Yekhanin Ilya Dumer Abstract Let Õ µ denote the maximum size of a Õ- ary code of length and distance We study

More information

From Argument Games to Persuasion Dialogues

From Argument Games to Persuasion Dialogues From Argument Games to Persuasion Dialogues Nicolas Maudet (aka Nicholas of Paris) 08/02/10 (DGHRCM workshop) LAMSADE Université Paris-Dauphine 1 / 33 Introduction Main sources of inspiration for this

More information

ishares Core Composite Bond ETF

ishares Core Composite Bond ETF ishares Core Composite Bond ETF ARSN 154 626 767 ANNUAL FINANCIAL REPORT 30 June 2017 BlackRock Investment Management (Australia) Limited 13 006 165 975 Australian Financial Services Licence No 230523

More information

A Formal Architecture for the 3APL Agent Programming Language

A Formal Architecture for the 3APL Agent Programming Language A Formal Architecture for the 3APL Agent Programming Language Mark d Inverno, Koen Hindriks Ý, and Michael Luck Þ Ý Þ Cavendish School of Computer Science, 115 New Cavendish Street, University of Westminster,

More information

Randomized Pursuit-Evasion in Graphs

Randomized Pursuit-Evasion in Graphs Randomized Pursuit-Evasion in Graphs Micah Adler Harald Räcke Ý Naveen Sivadasan Þ Christian Sohler Ý Berthold Vöcking Þ Abstract We analyze a randomized pursuit-evasion game on graphs. This game is played

More information

Implementing Domain Specific Languages using Dependent Types and Partial Evaluation

Implementing Domain Specific Languages using Dependent Types and Partial Evaluation Implementing Domain Specific Languages using Dependent Types and Partial Evaluation Edwin Brady eb@cs.st-andrews.ac.uk University of St Andrews EE-PigWeek, January 7th 2010 EE-PigWeek, January 7th 2010

More information

ÔÖ Î µ ÛÖ Î Ø Ø Ó ÚÖØ ÖÔ Ø Ø Ó º ØØ Û Ö ÚÒ Ø Ò Ú ¼ ½ Ú ½ ¾ Ú ¾ Ú Ú ½ ÒÒ ÙÒØÓÒ Eº ÏÐ Ò Ø ÖÔ ÕÙÒ Ú ÛÖ Ú ¼ Ú ¾ Î ½ ¾ Ò E µ Ú ½ Ú º Ì ÛÐ ÐÓ Ø Ö Ø Ò Ð Ø ÚÖ

ÔÖ Î µ ÛÖ Î Ø Ø Ó ÚÖØ ÖÔ Ø Ø Ó º ØØ Û Ö ÚÒ Ø Ò Ú ¼ ½ Ú ½ ¾ Ú ¾ Ú Ú ½ ÒÒ ÙÒØÓÒ Eº ÏÐ Ò Ø ÖÔ ÕÙÒ Ú ÛÖ Ú ¼ Ú ¾ Î ½ ¾ Ò E µ Ú ½ Ú º Ì ÛÐ ÐÓ Ø Ö Ø Ò Ð Ø ÚÖ ÙÐÖÒ ÖÔ ÔÖ Î µ ÛÖ Î Ø Ø Ó ÚÖØ ÖÔ Ø Ø Ó º ØØ Û Ö ÚÒ Ø Ò Ú ¼ ½ Ú ½ ¾ Ú ¾ Ú Ú ½ ÒÒ ÙÒØÓÒ Eº ÏÐ Ò Ø ÖÔ ÕÙÒ Ú ÛÖ Ú ¼ Ú ¾ Î ½ ¾ Ò E µ Ú ½ Ú º Ì ÛÐ ÐÓ Ø Ö Ø Ò Ð Ø ÚÖØ ÓÒº ÈØ ÛÐ ÛÖ ÚÖÝ ÚÖØÜ ÓÙÖ Ø ÑÓ Ø ÓÒº ÝÐ ÐÓ

More information

Randomized Pursuit-Evasion in Graphs

Randomized Pursuit-Evasion in Graphs Randomized Pursuit-Evasion in Graphs Micah Adler, Harald Räcke ¾, Naveen Sivadasan, Christian Sohler ¾, and Berthold Vöcking ¾ Department of Computer Science University of Massachusetts, Amherst, micah@cs.umass.edu

More information

MSR, Access Control, and the Most Powerful Attacker

MSR, Access Control, and the Most Powerful Attacker MSR, Access Control, and the Most Powerful Attacker Iliano Cervesato Advanced Engineering and Sciences Division ITT Industries, Inc. 2560 Huntington Avenue, Alexandria, VA 22303-1410 USA Tel.: +1-202-404-4909,

More information

Mathematics and Social Choice Theory. Topic 4 Voting methods with more than 2 alternatives. 4.1 Social choice procedures

Mathematics and Social Choice Theory. Topic 4 Voting methods with more than 2 alternatives. 4.1 Social choice procedures Mathematics and Social Choice Theory Topic 4 Voting methods with more than 2 alternatives 4.1 Social choice procedures 4.2 Analysis of voting methods 4.3 Arrow s Impossibility Theorem 4.4 Cumulative voting

More information

The Nominal Datatype Package in Isabelle/HOL

The Nominal Datatype Package in Isabelle/HOL The Nominal Datatype Package in Isabelle/HOL Christian Urban University of Munich joint work with Stefan Berghofer, Markus Wenzel, Alexander Krauss... Notingham, 18. April 2006 p.1 (1/1) The POPLmark-Challenge

More information

Hoboken Public Schools. Algebra II Honors Curriculum

Hoboken Public Schools. Algebra II Honors Curriculum Hoboken Public Schools Algebra II Honors Curriculum Algebra Two Honors HOBOKEN PUBLIC SCHOOLS Course Description Algebra II Honors continues to build students understanding of the concepts that provide

More information

function GENERAL-SEARCH( problem, strategy) returns a solution, or failure initialize the search tree using the initial state of problem loop do if

function GENERAL-SEARCH( problem, strategy) returns a solution, or failure initialize the search tree using the initial state of problem loop do if ØÓ ÖØ Ð ÁÒØ ÐÐ Ò ÁÒØÖÓ ÙØ ÓÒ ¹ ËÔÖ Ò ¾¼½ Ë º ÓÙ ÖÝ Ë Ù¹Û ¹Ö µ ÖØ ¼¾µ ¾¹ ÓÙ ÖÝ ºÙÒк Ù º º ÓÙ ÖÝ ½ ÁÒ ØÖÙØÓÖ³ ÒÓØ ËÓÐÚ Ò ÈÖÓ Ð Ñ Ý Ë Ö Ò Ì ØÐ ÔØ Ö Ë Ø ÓÒ º µ ÁÅ ÛÛÛº ºÙÒк Ù» ÍÊÄ ÍÊÄ ÛÛÛº ºÙÒк Ù» ÓÙ Öݻ˽

More information

Improved Boosting Algorithms Using Confidence-rated Predictions

Improved Boosting Algorithms Using Confidence-rated Predictions Improved Boosting Algorithms Using Confidence-rated Predictions ÊÇÊÌ º ËÀÈÁÊ schapire@research.att.com AT&T Labs, Shannon Laboratory, 18 Park Avenue, Room A279, Florham Park, NJ 7932-971 ÇÊÅ ËÁÆÊ singer@research.att.com

More information

É ÀÓÛ Ó Ý Ò ² Ö Ò ÁÒ Ö Ò «Ö ÓØ ÑÔ Ù ÔÖÓ Ð ØÝ ØÓ Ö ÙÒ ÖØ ÒØÝ ÙØ Ø Ý ÓÒ Ø ÓÒ ÓÒ «Ö ÒØ Ø Ò º Ü ÑÔÐ ÁÑ Ò Ð Ò Ð ØÖ Ð Û Ø Ò ½ Ñ Ø Ô Ö Ó Ù Ø º ÁÒ Ô Ö ÓÒ Ù Ø

É ÀÓÛ Ó Ý Ò ² Ö Ò ÁÒ Ö Ò «Ö ÓØ ÑÔ Ù ÔÖÓ Ð ØÝ ØÓ Ö ÙÒ ÖØ ÒØÝ ÙØ Ø Ý ÓÒ Ø ÓÒ ÓÒ «Ö ÒØ Ø Ò º Ü ÑÔÐ ÁÑ Ò Ð Ò Ð ØÖ Ð Û Ø Ò ½ Ñ Ø Ô Ö Ó Ù Ø º ÁÒ Ô Ö ÓÒ Ù Ø ËØ Ø Ø Ð È Ö Ñ Ý Ò ² Ö ÕÙ ÒØ Ø ÊÓ ÖØ Ä ÏÓÐÔ ÖØ Ù ÍÒ Ú Ö ØÝ Ô ÖØÑ ÒØ Ó ËØ Ø Ø Ð Ë Ò ¾¼½ Ë Ô ½¼ ÈÖÓ Ñ Ò Ö É ÀÓÛ Ó Ý Ò ² Ö Ò ÁÒ Ö Ò «Ö ÓØ ÑÔ Ù ÔÖÓ Ð ØÝ ØÓ Ö ÙÒ ÖØ ÒØÝ ÙØ Ø Ý ÓÒ Ø ÓÒ ÓÒ «Ö ÒØ Ø Ò º Ü ÑÔÐ ÁÑ

More information

Verification. Lecture 3. Bernd Finkbeiner

Verification. Lecture 3. Bernd Finkbeiner Verification Lecture 3 Bernd Finkbeiner Plan for today CTL model checking Thebasicalgorithm Fairness Counterexamplesandwitnesses Review: Computation tree logic modal logic over infinite trees[clarke& Emerson

More information

Manipulating Two Stage Voting Rules

Manipulating Two Stage Voting Rules Manipulating Two Stage Voting Rules Nina Narodytska and Toby Walsh Abstract We study the computational complexity of computing a manipulation of a two stage voting rule. An example of a two stage voting

More information

Arrow s Impossibility Theorem on Social Choice Systems

Arrow s Impossibility Theorem on Social Choice Systems Arrow s Impossibility Theorem on Social Choice Systems Ashvin A. Swaminathan January 11, 2013 Abstract Social choice theory is a field that concerns methods of aggregating individual interests to determine

More information

Ë ÁÌÇ ÌÓ Ó ÍÒ Ú Ö Øݵ Ç ¼ Ô Û Ö ÙÒÓ Ø Ò Ð Ä Ò ÙÖ ÖÝ ÓÒ ÒÓØ Ý ÛÓÖ Û Ø Ã ÞÙ ÖÓ Á Ö Ó ÒØ Ë Ò ÝÓ ÍÒ Ú Ö Øݵ Ç

Ë ÁÌÇ ÌÓ Ó ÍÒ Ú Ö Øݵ Ç ¼ Ô Û Ö ÙÒÓ Ø Ò Ð Ä Ò ÙÖ ÖÝ ÓÒ ÒÓØ Ý ÛÓÖ Û Ø Ã ÞÙ ÖÓ Á Ö Ó ÒØ Ë Ò ÝÓ ÍÒ Ú Ö Øݵ Ç Ë ÁÌÇ ÌÓ Ó ÍÒ Ú Ö Øݵ Ç ¼ Ô Û Ö ÙÒÓ Ø Ò Ð Ä Ò ÙÖ ÖÝ ÓÒ ÒÓØ Ý ÛÓÖ Û Ø Ã ÞÙ ÖÓ Á Ö Ó ÒØ Ë Ò ÝÓ ÍÒ Ú Ö Øݵ Ç ½ Ä Ò Ô Ô Ä Ô Õµ Ø ¹Ñ Ò ÓÐ Ó Ø Ò Ý Ä Ò ÓÒ Ø ØÖ Ú Ð ÒÓØ Ò Ë º Ô Õ¹ ÙÖ ÖÝ Ô Õµ¹ÙÖÚ ¾ ÈÖÓ Ð Ñ Ø Ð

More information

Ò ÓÛ Æ ØÛÓÖ Ð ÓÖ Ø Ñ ÓÖ ¹ ÙÐ Ö ÓÒ

Ò ÓÛ Æ ØÛÓÖ Ð ÓÖ Ø Ñ ÓÖ ¹ ÙÐ Ö ÓÒ Ò ÓÛ ÆØÛÓÖ ÐÓÖØÑ ÓÖ¹ÙÐÖ ÓÒ ÚÐÙÒ Øµ E µ ÙÚµ Ò Úµ µ E µ ÚÙµ ÐÐ ¹ÒÖ Ò ¹ÓÙØÖ Ó ÚÖØÜ Ú Î Ö Ö ÔØÚÐݺ ÄØ Î µ ÖØ ÖÔº ÓÖ ÚÖØÜ Ú Î Û Ò ÓÙØÖ Úµ Ò Ò Ø ÒÖ Ò Øµ Úµº ÓÖ Úµ Ø ÚÖØÜ Ú ÐÐ ÓÙÖ Úµ Á е ÓÖ Ò ÙÙµ Ó ÖÔ Ö ÔØÚÐݺ

More information

Contact 3-Manifolds, Holomorphic Curves and Intersection Theory

Contact 3-Manifolds, Holomorphic Curves and Intersection Theory Contact 3-Manifolds, Holomorphic Curves and Intersection Theory (Durham University, August 2013) Chris Wendl University College London These slides plus detailed lecture notes (in progress) available at:

More information

Manipulating Two Stage Voting Rules

Manipulating Two Stage Voting Rules Manipulating Two Stage Voting Rules Nina Narodytska NICTA and UNSW Sydney, Australia nina.narodytska@nicta.com.au Toby Walsh NICTA and UNSW Sydney, Australia toby.walsh@nicta.com.au ABSTRACT We study the

More information

NEW YORK CITY COLLEGE OF TECHNOLOGY The City University of New York

NEW YORK CITY COLLEGE OF TECHNOLOGY The City University of New York NEW YORK CITY COLLEGE OF TECHNOLOGY The City University of New York DEPARTMENT: Mathematics COURSE: MAT 2440/ MA 440 TITLE: DESCRIPTION: TEXTS: Discrete Structures and Algorithms I This course introduces

More information

Constraint satisfaction problems. Lirong Xia

Constraint satisfaction problems. Lirong Xia Constraint satisfaction problems Lirong Xia Spring, 2017 Project 1 Ø You can use Windows Ø Read the instruction carefully, make sure you understand the goal search for YOUR CODE HERE Ø Ask and answer questions

More information

CSCI211: Intro Objectives

CSCI211: Intro Objectives CSCI211: Intro Objectives Introduction to Algorithms, Analysis Course summary Reviewing proof techniques Jan 7, 2019 Sprenkle CSCI211 1 My Bio From Dallastown, PA B.S., Gettysburg College M.S., Duke University

More information

function GENERAL-SEARCH( problem, strategy) returns a solution, or failure initialize the search tree using the initial state of problem loop do if

function GENERAL-SEARCH( problem, strategy) returns a solution, or failure initialize the search tree using the initial state of problem loop do if ÓÙ ÖÝ ½ ÁÒ ØÖÙØÓÖ³ ÒÓØ ÓÙ ÖÝ ¾ ÁÒ ØÖÙØÓÖ³ ÒÓØ ØÓ ÖØ Ð ÁÒØ ÐÐ Ò ÁÒØÖÓ ÙØ ÓÒ ¹ ËÔÖ Ò ¾¼¼ Ë ÍÊÄ ÛÛÛº ºÙÒк Ù» ÓÙ Öݻ˼ ¹ ¹ º ÓÙ ÖÝ Ë Ù¹Û ¹Ö µ ÖØ ¼¾µ ¾¹ ÓÙ ÖÝ ºÙÒк Ù ØÖ Ø Ý Ò Ý Ô Ò Ø ÓÖ Ö Ó ÒÓ ÜÔ Ò ÓÒ Ì ØÐ

More information

Approval Voting Theory with Multiple Levels of Approval

Approval Voting Theory with Multiple Levels of Approval Claremont Colleges Scholarship @ Claremont HMC Senior Theses HMC Student Scholarship 2012 Approval Voting Theory with Multiple Levels of Approval Craig Burkhart Harvey Mudd College Recommended Citation

More information

Deadlock. deadlock analysis - primitive processes, parallel composition, avoidance

Deadlock. deadlock analysis - primitive processes, parallel composition, avoidance Deadlock CDS News: Brainy IBM Chip Packs One Million Neuron Punch Overview: ideas, 4 four necessary and sufficient conditions deadlock analysis - primitive processes, parallel composition, avoidance the

More information

A constraint based dependancy parser for Sanskrit

A constraint based dependancy parser for Sanskrit A constraint based dependancy parser for Sanskrit Amba Kulkarni apksh@uohyd.ernet.in Department of Sanskrit Studies University of Hyderabad Hyderabad 19 Feb 2010 Calicut University Page 1 Æ Ó - Ý Ý Ñ ÚÝ

More information

x = x 1x 2 x (p-1)x x = 3 x = 3 x = 3 x = 3 0 x 1 x 2 x... (p-1)x

x = x 1x 2 x (p-1)x x = 3 x = 3 x = 3 x = 3 0 x 1 x 2 x... (p-1)x ÌÖ Ò ÓÖÑ Ø ÓÒ Ô Ö ÐÐ Ð ÔÖÓ Ö ÑÑ Ò ÈÖÓ Ö Ñ Ô Ö ÐÐ Ð Þ Ø ÓÒ Ø Ò ÕÙ º ½º ÈÖÓ Ö Ñ Å ÔÔ Ò ÈÖÓ Ö Ñ È ÖØ Ø ÓÒ Ò º Ô Ò Ò Ò ÐÝ º Ë ÙÐ Ò ÄÓ Ð Ò Ò º Ó ØÖ ÙØ ÓÒº ¾º Ø Å ÔÔ Ò º Ø Ô ÖØ Ø ÓÒ Ò º ÓÑÑÙÒ Ø ÓÒ ØÛ Ò ÔÖÓ ÓÖ

More information

Backoff DOP: Parameter Estimation by Backoff

Backoff DOP: Parameter Estimation by Backoff Backoff DOP: Parameter Estimation by Backoff Luciano Buratto and Khalil ima an Institute for Logic, Language and Computation (ILLC) University of Amsterdam, Amsterdam, The Netherlands simaan@science.uva.nl;

More information

Regression. Linear least squares. Support vector regression. increasing the dimensionality fitting polynomials to data over fitting regularization

Regression. Linear least squares. Support vector regression. increasing the dimensionality fitting polynomials to data over fitting regularization Regression Linear least squares increasing the dimensionality fitting polynomials to data over fitting regularization Support vector regression Fitting a degree 1 polynomial Fitting a degree 2 polynomial

More information

½º»¾¼ º»¾¼ ¾º»¾¼ º»¾¼ º»¾¼ º»¾¼ º»¾¼ º»¾¼» ¼» ¼ ÌÓØ Ð»½ ¼

½º»¾¼ º»¾¼ ¾º»¾¼ º»¾¼ º»¾¼ º»¾¼ º»¾¼ º»¾¼» ¼» ¼ ÌÓØ Ð»½ ¼ Ò Ð Ü Ñ Ò Ø ÓÒ ËÌ ½½ ÈÖÓ Ð ØÝ ² Å ÙÖ Ì ÓÖÝ ÌÙ Ý ¾¼½ ½¼ ¼¼ Ñ ß ½¾ ¼¼Ò Ì ÐÓ ¹ ÓÓ Ü Ñ Ò Ø ÓÒº ÓÙ Ñ Ý Ù Ø Ó ÔÖ Ô Ö ÒÓØ ÝÓÙ Û ÙØ ÝÓÙ Ñ Ý ÒÓØ Ö Ñ Ø Ö Ð º Á ÕÙ Ø ÓÒ Ñ Ñ ÙÓÙ ÓÖ ÓÒ Ù Ò ÔÐ Ñ ØÓ Ð Ö Ý Øº ÍÒÐ ÔÖÓ

More information

Ì ÄÈ Ë ÈÖÓ Ð Ñ Ì ÄÈ Ë ÐÓÒ Ø Ô Ö Ñ Ø Ö Þ ÓÑÑÓÒ Ù ÕÙ Ò µ ÔÖÓ Ð Ñ Ò Ö Ð Þ Ø ÓÒ Ó Û ÐÐ ÒÓÛÒ Ä Ë ÔÖÓ Ð Ñ ÓÒØ Ò Ò Ô¹ÓÒ ØÖ ÒØ º Ò Ø ÓÒ ÁÒ ÄÈ Ë(,, Ã ½, Ã ¾, )

Ì ÄÈ Ë ÈÖÓ Ð Ñ Ì ÄÈ Ë ÐÓÒ Ø Ô Ö Ñ Ø Ö Þ ÓÑÑÓÒ Ù ÕÙ Ò µ ÔÖÓ Ð Ñ Ò Ö Ð Þ Ø ÓÒ Ó Û ÐÐ ÒÓÛÒ Ä Ë ÔÖÓ Ð Ñ ÓÒØ Ò Ò Ô¹ÓÒ ØÖ ÒØ º Ò Ø ÓÒ ÁÒ ÄÈ Ë(,, à ½, à ¾, ) Ð ÓÖ Ø Ñ ÓÖ ÓÑÔÙØ Ò Ø ÄÓÒ Ø È Ö Ñ Ø Ö Þ ÓÑÑÓÒ ËÙ ÕÙ Ò Ó Ø Ëº ÁÐ ÓÔÓÙÐÓ ½ Å Ö Ò ÃÙ ¾ ź ËÓ Ð Ê Ñ Ò ½ Ò ÌÓÑ Þ Ï Ð ¾ ½ Ð ÓÖ Ø Ñ Ò ÖÓÙÔ Ô ÖØÑ ÒØ Ó ÓÑÔÙØ Ö Ë Ò Ã Ò ÓÐÐ ÄÓÒ ÓÒ ¾ ÙÐØÝ Ó Å Ø Ñ Ø ÁÒ ÓÖÑ Ø Ò ÔÔÐ

More information

Hoboken Public Schools. College Algebra Curriculum

Hoboken Public Schools. College Algebra Curriculum Hoboken Public Schools College Algebra Curriculum College Algebra HOBOKEN PUBLIC SCHOOLS Course Description College Algebra reflects the New Jersey learning standards at the high school level and is designed

More information

Essential Questions Content Skills Assessments Standards/PIs. Identify prime and composite numbers, GCF, and prime factorization.

Essential Questions Content Skills Assessments Standards/PIs. Identify prime and composite numbers, GCF, and prime factorization. Map: MVMS Math 7 Type: Consensus Grade Level: 7 School Year: 2007-2008 Author: Paula Barnes District/Building: Minisink Valley CSD/Middle School Created: 10/19/2007 Last Updated: 11/06/2007 How does the

More information

Tensor. Field. Vector 2D Length. SI BG cgs. Tensor. Units. Template. DOFs u v. Distribution Functions. Domain

Tensor. Field. Vector 2D Length. SI BG cgs. Tensor. Units. Template. DOFs u v. Distribution Functions. Domain ÁÒØÖÓ ÙØ ÓÒ ØÓ Ø ÁÌ ÈË Ð ÁÒØ Ö ÖÐ ÇÐÐ Ú Ö¹ ÓÓ Ì ÍÒ Ú Ö ØÝ Ó Ö Ø ÓÐÙÑ Å Ö Å ÐÐ Ö Ä ÛÖ Ò Ä Ú ÖÑÓÖ Æ Ø ÓÒ Ð Ä ÓÖ ØÓÖÝ Ò Ð ÐÓÒ Ö Ê Ò Ð Ö ÈÓÐÝØ Ò ÁÒ Ø ØÙØ ¾¼½½ ËÁ Å Ë ÓÒ Ö Ò Ê ÒÓ Æ Ú Å Ö ¾¼½½ ÇÐÐ Ú Ö¹ ÓÓ Å

More information

Sequential Voting with Externalities: Herding in Social Networks

Sequential Voting with Externalities: Herding in Social Networks Sequential Voting with Externalities: Herding in Social Networks Noga Alon Moshe Babaioff Ron Karidi Ron Lavi Moshe Tennenholtz February 7, 01 Abstract We study sequential voting with two alternatives,

More information

Domain, Range, Inverse

Domain, Range, Inverse Ê Ð Ø ÓÒ Ò Ø ÓÒ Ò ÖÝ Ö Ð Ø ÓÒ ÓÒ Ø Ò Ù Ø Ó Ü º Ì Ø ÒÝ Ê Ò ÖÝ Ö Ð Ø ÓÒº Ù Ø Ó ¾ Ü Ò ÖÝ Ö Ð Ø ÓÒ ÓÒ º ÆÓØ Ø ÓÒ Á µ ¾ Ê Û Ó Ø Ò ÛÖ Ø Ê º Ü ÑÔÐ Ò Ò ÖÝ Ö Ð Ø ÓÒ È ÓÒ ÓÖ ÐÐ Ñ Òµ ¾ ÑÈÒ Ñ Ò Ú Òº ËÓ È¾ È ¹ µ Ƚº

More information

Contents. Bibliography 121. Index 123

Contents. Bibliography 121. Index 123 Contents 5 Advanced Data Types page 2 5.1 Sparse Arrays: Dictionary Arrays, Hashing Arrays, and Maps 2 5.2 The Implementation of the Data Type Map 14 5.3 Dictionaries and Sets 27 5.4 Priority Queues 28

More information

A denotational semantics for deliberation dialogues

A denotational semantics for deliberation dialogues A denotational semantics for deliberation dialogues Peter McBurney Department of Computer Science University of Liverpool Liverpool L69 3BX UK pjmcburney@csclivacuk Simon Parsons Department of Computer

More information

Comparison Sorts. EECS 2011 Prof. J. Elder - 1 -

Comparison Sorts. EECS 2011 Prof. J. Elder - 1 - Comparison Sorts - 1 - Sorting Ø We have seen the advantage of sorted data representations for a number of applications q Sparse vectors q Maps q Dictionaries Ø Here we consider the problem of how to efficiently

More information

On Axiomatization of Power Index of Veto

On Axiomatization of Power Index of Veto On Axiomatization of Power Index of Veto Jacek Mercik Wroclaw University of Technology, Wroclaw, Poland jacek.mercik@pwr.wroc.pl Abstract. Relations between all constitutional and government organs must

More information

Cloning in Elections 1

Cloning in Elections 1 Cloning in Elections 1 Edith Elkind, Piotr Faliszewski, and Arkadii Slinko Abstract We consider the problem of manipulating elections via cloning candidates. In our model, a manipulator can replace each

More information

½ Ê Ú Û Ó ÆÒ ÕÙÓØ ÒØ ¾ ÇÖØ Ó ÓÒ Ð ÒÚ Ö ÒØ ÓÙ Ð Ö Ø ÓÒ Ý ÕÙÓØ ÒØ Ñ Ô ÇÖ Ø ÓÖÖ ÔÓÒ Ò Ü ÑÔÐ Ó ÓÖ Ø ÓÖÖ ÔÓÒ Ò Ü ÑÔÐ Ø Ò ÓÖ ÔÖÓ ÙØ Ü ÑÔÐ ÓÒØÖ Ø ÓÒ Ñ Ô ÇÔ Ò

½ Ê Ú Û Ó ÆÒ ÕÙÓØ ÒØ ¾ ÇÖØ Ó ÓÒ Ð ÒÚ Ö ÒØ ÓÙ Ð Ö Ø ÓÒ Ý ÕÙÓØ ÒØ Ñ Ô ÇÖ Ø ÓÖÖ ÔÓÒ Ò Ü ÑÔÐ Ó ÓÖ Ø ÓÖÖ ÔÓÒ Ò Ü ÑÔÐ Ø Ò ÓÖ ÔÖÓ ÙØ Ü ÑÔÐ ÓÒØÖ Ø ÓÒ Ñ Ô ÇÔ Ò ÆÒ ÕÙÓØ ÒØ Ò Ø ÓÖÖ ÔÓÒ Ò Ó ÓÖ Ø ÃÝÓ Æ Ý Ñ Ö Ù Ø Ë ÓÓÐ Ó Ë Ò ÃÝÓØÓ ÍÒ Ú Ö ØÝ ÁÒØ ÖÒ Ø ÓÒ Ð ÓÒ Ö Ò ÓÒ Ê ÒØ Ú Ò Ò Å Ø Ñ Ø Ò Ø ÔÔÐ Ø ÓÒ º Ë ÔØ Ñ Ö ¾ ß ¼ ¾¼¼ µ Ô ÖØÑ ÒØ Ó Å Ø Ñ Ø ÃÍ ÈÓ Ø Ö Ù Ø ÒØ Ö Ð ÙÑ Ã ÖÒ

More information

The Integer Arithmetic of Legislative Dynamics

The Integer Arithmetic of Legislative Dynamics The Integer Arithmetic of Legislative Dynamics Kenneth Benoit Trinity College Dublin Michael Laver New York University July 8, 2005 Abstract Every legislature may be defined by a finite integer partition

More information

Infinite-Horizon Policy-Gradient Estimation

Infinite-Horizon Policy-Gradient Estimation Journal of Artificial Intelligence Research 15 (2001) 319-350 Submitted 9/00; published 11/01 Infinite-Horizon Policy-Gradient Estimation Jonathan Baxter WhizBang! Labs. 4616 Henry Street Pittsburgh, PA

More information

Complexity of Manipulating Elections with Few Candidates

Complexity of Manipulating Elections with Few Candidates Complexity of Manipulating Elections with Few Candidates Vincent Conitzer and Tuomas Sandholm Computer Science Department Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213 {conitzer, sandholm}@cs.cmu.edu

More information

Ó ÔÔÐ Å Ø Ñ Ø ÔÐ Ò Ó Å Ø Ñ Ø Ð Ë Ò Ë ÓÓÐ Ð ØÙÖ ÒØÖÓ Ù Ø ÖÓÙØ Ò ÔÖÓ Ð Ñ Ò Ö ÓÑÑÓÒ ÔÔÖÓ ØÓ Ø ÓÐÙØ ÓÒ Ì Ð ÓÖ Ø Ñµ ÓÖ ÓÖØ Ø¹Ô Ø ÖÓÙØ Ò º ØÖ ³ ÓÑÑÙÒ Ø ÓÒ Æ ØÛÓÖ Ò Ð ØÙÖ ¼ ÊÓÙØ Ò Å ØØ Û ÊÓÙ Ò

More information

Computational Social Choice: Spring 2007

Computational Social Choice: Spring 2007 Computational Social Choice: Spring 2007 Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam Ulle Endriss 1 Plan for Today This lecture will be an introduction to voting

More information

Accept() Reject() Connect() Connect() Above Threshold. Threshold. Below Threshold. Connection A. Connection B. Time. Activity (cells/unit time) CAC

Accept() Reject() Connect() Connect() Above Threshold. Threshold. Below Threshold. Connection A. Connection B. Time. Activity (cells/unit time) CAC Ú ÐÙ Ø Ò Å ÙÖ Ñ Òع Ñ ÓÒ ÓÒØÖÓÐ Ò Ö Û ÅÓÓÖ Å Ú ÐÙ Ø ÓÒ Ò Ö Û ÅÓÓÖ ½ ÐÐ Ñ ÓÒ ÓÒØÖÓÐ ÅÓ Ð ß Ö Ø ÓÖ ÙÒ Ö ØÓÓ ØÖ Æ ÓÙÖ ß ÒÓØ Ö Ø ÓÖ «Ö ÒØ ØÖ Æ ÓÙÖ Å ÙÖ Ñ ÒØ ß ÛÓÖ ÓÖ ÒÝ ØÖ Æ ÓÙÖ ß ÙØ Û Å ØÓ Ù Ç Ø Ú Ú ÐÙ Ø

More information

M 1 M 2 M 3 M 1 M 1 M 1 M 2 M 3 M 3

M 1 M 2 M 3 M 1 M 1 M 1 M 2 M 3 M 3 ÅË ØÖ ÙØ ÔØ Ú Å Ø ÙÖ Ø Ë Ð Ø ÓÒ Ç ¾¼½½ Ù Ð Ò Ð Ð Ö Ð ½ Ë Ø Ò Î Ö Ð ½,¾ ½ ÁÆÊÁ Ä ÐÐ ¹ÆÓÖ ÙÖÓÔ ÍÒ Ú Ö Ø Ä ÐÐ ½ ¾ ÍÒ Ú Ö Ø Æ ËÓÔ ÒØ ÔÓÐ Ö Ò ØØÔ»»ÛÛÛº ºÙÒ º Ö» Ú Ö Ð ÂÙÐÝ ½ ¾¼½½ ½»½ ÈÓ Ø ÓÒ Ó Ø ÛÓÖ ÇÒ Ý ÔÓ

More information

Hat problem on a graph

Hat problem on a graph Hat problem on a graph Submitted by Marcin Piotr Krzywkowski to the University of Exeter as a thesis for the degree of Doctor of Philosophy by Publication in Mathematics In April 2012 This thesis is available

More information

ÙÒØ ÓÒ Ò Ø ÓÒ ÙÒØ ÓÒ ÖÓÑ ØÓ ÒÓØ Ö Ð Ø ÓÒ ÖÓÑ ØÓ Ù Ø Ø ÓÖ Ú ÖÝ Ü ¾ Ø Ö ÓÑ Ý ¾ Ù Ø Ø Ü Ýµ Ò Ø Ö Ð Ø ÓÒ Ò Ü Ýµ Ò Ü Þµ Ö Ò Ø Ö Ð Ø ÓÒ Ø Ò Ý Þº ÆÓØ Ø ÓÒ Á

ÙÒØ ÓÒ Ò Ø ÓÒ ÙÒØ ÓÒ ÖÓÑ ØÓ ÒÓØ Ö Ð Ø ÓÒ ÖÓÑ ØÓ Ù Ø Ø ÓÖ Ú ÖÝ Ü ¾ Ø Ö ÓÑ Ý ¾ Ù Ø Ø Ü Ýµ Ò Ø Ö Ð Ø ÓÒ Ò Ü Ýµ Ò Ü Þµ Ö Ò Ø Ö Ð Ø ÓÒ Ø Ò Ý Þº ÆÓØ Ø ÓÒ Á ÙÒØ ÓÒ Ò Ø ÓÒ ÙÒØ ÓÒ ÖÓÑ ØÓ ÒÓØ Ö Ð Ø ÓÒ ÖÓÑ ØÓ Ù Ø Ø ÓÖ Ú ÖÝ Ü ¾ Ø Ö ÓÑ Ý ¾ Ù Ø Ø Ü Ýµ Ò Ø Ö Ð Ø ÓÒ Ò Ü Ýµ Ò Ü Þµ Ö Ò Ø Ö Ð Ø ÓÒ Ø Ò Ý Þº ÆÓØ Ø ÓÒ Á Ü Ýµ Ò Ø Ö Ð Ø ÓÒ Û ÛÖ Ø Üµ ݺ Ì Ø Ø ÓÑ Ò Ó Ø ÙÒØ ÓÒ

More information

MATH4999 Capstone Projects in Mathematics and Economics Topic 3 Voting methods and social choice theory

MATH4999 Capstone Projects in Mathematics and Economics Topic 3 Voting methods and social choice theory MATH4999 Capstone Projects in Mathematics and Economics Topic 3 Voting methods and social choice theory 3.1 Social choice procedures Plurality voting Borda count Elimination procedures Sequential pairwise

More information

ÝØ Ð Ö Ø ÓÒ Ó ÝÒ Ñ ØÖ ÑÙÐ Ø ÓÒ Ó Ø Ú Ñ Ò Ð Ö Ø ÓÒ ÖÓÑ ØÖ ÓÙÒØ Ð Ð Ô Ö Ô Ø Ú Ø Ñ Ø ÓÒ Ó Ô Ø ÓÛ Ø ÛÓÖ Ø Ñ Ø ÓÒ Ó Ñ ÖÓ¹ ÑÙÐ Ø Ú ÓÖ ¾» ¾¾

ÝØ Ð Ö Ø ÓÒ Ó ÝÒ Ñ ØÖ ÑÙÐ Ø ÓÒ Ó Ø Ú Ñ Ò Ð Ö Ø ÓÒ ÖÓÑ ØÖ ÓÙÒØ Ð Ð Ô Ö Ô Ø Ú Ø Ñ Ø ÓÒ Ó Ô Ø ÓÛ Ø ÛÓÖ Ø Ñ Ø ÓÒ Ó Ñ ÖÓ¹ ÑÙÐ Ø Ú ÓÖ ¾» ¾¾ ÝØ Ö Ð Ö Ø ÓÒ ØÓÓÐ ÓÖ ÝÒ Ñ ØÖ ÑÙÐ Ø ÓÒ ÙÒÒ Ö Ð ØØ Ö ½ Ë ÔØ Ñ Ö ½¼ ¾¼¼ ½ Ñ ÒÝ Ø Ò ØÓ Ù Ò ÓÖ ÐÔ Ò Û Ø Ø ÑÙÐ Ø ÓÒ ½» ¾¾ ÝØ Ð Ö Ø ÓÒ Ó ÝÒ Ñ ØÖ ÑÙÐ Ø ÓÒ Ó Ø Ú Ñ Ò Ð Ö Ø ÓÒ ÖÓÑ ØÖ ÓÙÒØ Ð Ð Ô Ö Ô Ø Ú Ø Ñ Ø ÓÒ

More information

Proof a n d Com p uta tion in Coq Maxime Dénès, Benjamin Grégoire, Chantal Keller, Pierre Yves Strub, Laurent Théry Map 16 p.1

Proof a n d Com p uta tion in Coq Maxime Dénès, Benjamin Grégoire, Chantal Keller, Pierre Yves Strub, Laurent Théry Map 16 p.1 ÈÖÓÓ Ò ÓÑÔÙØ Ø ÓÒ Ò ÓÕ Å Ü Ñ Ò Ò Ñ Ò Ö Ó Ö ÒØ Ð Ã ÐÐ Ö È ÖÖ Ú ËØÖÙ Ä ÙÖ ÒØ Ì ÖÝ Map 16 p.1 ÅÓØ Ú Ø ÓÒ ÔÖÓ Ö ÑÑ Ò Ð Ò Ù ÙÒØ ÓÒ Ð Compute prime 31. = true ÔÖÓÚ Ö Ì ÓÖ Ñ Check Euclid_dvdX. forall m n p :

More information

Computational Inelasticity FHLN05. Assignment A non-linear elasto-plastic problem

Computational Inelasticity FHLN05. Assignment A non-linear elasto-plastic problem Computational Inelasticity FHLN05 Assignment 2016 A non-linear elasto-plastic problem General instructions A written report should be submitted to the Division of Solid Mechanics no later than 1 November

More information

Strong normalization of lambda-bar-mu-mu-tilde-calculus with explicit substitutions

Strong normalization of lambda-bar-mu-mu-tilde-calculus with explicit substitutions Strong normalization of lambda-bar-mu-mu-tilde-calculus with explicit substitutions Emmanuel Polonovski To cite this version: Emmanuel Polonovski. Strong normalization of lambda-bar-mu-mu-tilde-calculus

More information

DYNAMIC RISK MANAGEMENT IN ELECTRICITY PORTFOLIO OPTIMIZATION VIA POLYHEDRAL RISK FUNCTIONALS

DYNAMIC RISK MANAGEMENT IN ELECTRICITY PORTFOLIO OPTIMIZATION VIA POLYHEDRAL RISK FUNCTIONALS DYNAMIC RISK MANAGEMENT IN ELECTRICITY PORTFOLIO OPTIMIZATION VIA POLYHEDRAL RISK FUNCTIONALS Andreas Eichhorn Department of Mathematics Humboldt University 199 Berlin, Germany Email eichhorn@math.hu-berlin.de

More information

Computational Social Choice: Spring 2017

Computational Social Choice: Spring 2017 Computational Social Choice: Spring 2017 Ulle Endriss Institute for Logic, Language and Computation University of Amsterdam Ulle Endriss 1 Plan for Today So far we saw three voting rules: plurality, plurality

More information

Analyzing proofs Introduction to problem solving. Wiki: Everyone log in okay? Decide on either using a blog or wiki-style journal?

Analyzing proofs Introduction to problem solving. Wiki: Everyone log in okay? Decide on either using a blog or wiki-style journal? Objectives Analyzing proofs Introduction to problem solving Ø Our process, through an example Wiki: Everyone log in okay? Decide on either using a blog or wiki-style journal? 1 Review What are our goals

More information

Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case

Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case Exposure-Resilience for Free: The Hierarchical ID-based Encryption Case Yevgeniy Dodis Department of Computer Science New York University Email: dodis@cs.nyu.edu Moti Yung Department of Computer Science

More information

Coalitional Game Theory

Coalitional Game Theory Coalitional Game Theory Game Theory Algorithmic Game Theory 1 TOC Coalitional Games Fair Division and Shapley Value Stable Division and the Core Concept ε-core, Least core & Nucleolus Reading: Chapter

More information

Metadata Stat-ahead DLD

Metadata Stat-ahead DLD Metadata Stat-ahead DLD Lai Siyao 2007.03.26 1 Introduction This document describes metadata stat-ahead, which is a part of metadata improvements. The client will perform metadata stat-ahead

More information

Æ ÛØÓÒ³ Å Ø Ó ÐÓ Ì ÓÖÝ Ò ËÓÑ Ø Ò ÓÙ ÈÖÓ ÐÝ Ò³Ø ÃÒÓÛ ÓÙØ Ú º ÓÜ Ñ Ö Ø ÓÐÐ

Æ ÛØÓÒ³ Å Ø Ó ÐÓ Ì ÓÖÝ Ò ËÓÑ Ø Ò ÓÙ ÈÖÓ ÐÝ Ò³Ø ÃÒÓÛ ÓÙØ Ú º ÓÜ Ñ Ö Ø ÓÐÐ Æ ÛØÓÒ³ Å Ø Ó ÐÓ Ì ÓÖÝ Ò ËÓÑ Ø Ò ÓÙ ÈÖÓ ÐÝ Ò³Ø ÃÒÓÛ ÓÙØ Ú º ÓÜ Ñ Ö Ø ÓÐÐ Ê Ö Ò ÃÐ Ò Ä ØÙÖ ÓÒ Ø ÁÓ ÖÓÒ Ì Ù Ò Ö ½ ËÑ Ð ÇÒ Ø Æ ÒÝ Ó Ð ÓÖ Ø Ñ Ò ÐÝ ÙÐк ÅË ½ ÅÅÙÐÐ Ò Ñ Ð Ó Ö Ø ÓÒ Ð Ñ Ô Ò Ø Ö Ø Ú ÖÓÓع Ò Ò Ð

More information

ÇÙØÐ Ò Ó Ø Ø Ð ÅÓØ Ú Ø ÓÒ = ¾ ÙÔ Ö ÝÑÑ ØÖ Ò ¹Å ÐÐ ÕÙ ÒØÙÑ Ñ Ò ÆÙÑ Ö Ð Ð ÓÖ Ø Ñ Ò ÒÙÑ Ö Ð Ö ÙÐØ Ü Ø ÓÐÙØ ÓÒ ÙÖØ Ö Ô Ö Ô Ø Ú

ÇÙØÐ Ò Ó Ø Ø Ð ÅÓØ Ú Ø ÓÒ = ¾ ÙÔ Ö ÝÑÑ ØÖ Ò ¹Å ÐÐ ÕÙ ÒØÙÑ Ñ Ò ÆÙÑ Ö Ð Ð ÓÖ Ø Ñ Ò ÒÙÑ Ö Ð Ö ÙÐØ Ü Ø ÓÐÙØ ÓÒ ÙÖØ Ö Ô Ö Ô Ø Ú Ü Ø ÓÐÙØ ÓÒ Ò = ¾ ÙÔ Ö ÝÑÑ ØÖ Ò ¹Å ÐÐ ÕÙ ÒØÙÑ Ñ Ò Û Ø ËÍ( ) Ù ÖÓÙÔ Ò Ö Åº ËÑÓÐÙ ÓÛ ÁÒ Ø ØÙØ Ó È Ý Â ÐÐÓÒ Ò ÍÒ Ú Ö ØÝ ÄÁ Ö ÓÛ Ë ÓÓÐ Ó Ì ÓÖ Ø Ð È Ý ÇÙØÐ Ò Ó Ø Ø Ð ÅÓØ Ú Ø ÓÒ = ¾ ÙÔ Ö ÝÑÑ ØÖ Ò ¹Å ÐÐ ÕÙ ÒØÙÑ

More information

Maps and Hash Tables. EECS 2011 Prof. J. Elder - 1 -

Maps and Hash Tables. EECS 2011 Prof. J. Elder - 1 - Maps and Hash Tables - 1 - Outline Ø Maps Ø Hashing Ø Multimaps Ø Ordered Maps - 2 - Learning Outcomes Ø By understanding this lecture, you should be able to: Ø Outline the ADT for a map and a multimap

More information

Topics on the Border of Economics and Computation December 18, Lecture 8

Topics on the Border of Economics and Computation December 18, Lecture 8 Topics on the Border of Economics and Computation December 18, 2005 Lecturer: Noam Nisan Lecture 8 Scribe: Ofer Dekel 1 Correlated Equilibrium In the previous lecture, we introduced the concept of correlated

More information

Charm Physics at the Tevatron

Charm Physics at the Tevatron Charm Physics at the Tevatron Ò Ö ÃÓÖÒ ÁÒ Ø ØÙØ Ó Ì ÒÓÐÓ Ý Å Ù ØØ ÓÖÒÑ Øº Ù ÓÖ Ø Ò ÓÐÐ ÓÖ Ø ÓÒ Ê ÒÓÒØÖ ÅÓÖ ÓÒ ÎÁÁÁØ ¾ Ö ¹¾ Ø ¾¼¼ Å Ö Ô Ô ÓÐÐ Ö Ø Ô ½ Ì Î ¾ Ò Ö Ð ÔÙÖÔÓ Ø ØÓÖ Ò Ö ÓÖ ½ ¼ Ô ½ ½¼¼ Ô ½ Ì Ú ØÖÓÒ

More information

Estimating the Margin of Victory for Instant-Runoff Voting

Estimating the Margin of Victory for Instant-Runoff Voting Estimating the Margin of Victory for Instant-Runoff Voting David Cary Abstract A general definition is proposed for the margin of victory of an election contest. That definition is applied to Instant Runoff

More information

Reputation-Based Trust Management (extended abstract)

Reputation-Based Trust Management (extended abstract) Reputation-Based Trust Management (extended abstract) Vitaly Shmatikov and Carolyn Talcott Computer Science Laboratory, SRI International, Menlo Park, CA 94025 USA shmat,clt @csl.sri.com Abstract. We propose

More information

Cloning in Elections

Cloning in Elections Proceedings of the Twenty-Fourth AAAI Conference on Artificial Intelligence (AAAI-10) Cloning in Elections Edith Elkind School of Physical and Mathematical Sciences Nanyang Technological University Singapore

More information

Politics between Philosophy and Democracy

Politics between Philosophy and Democracy Leopold Hess Politics between Philosophy and Democracy In the present paper I would like to make some comments on a classic essay of Michael Walzer Philosophy and Democracy. The main purpose of Walzer

More information

ËØÖÙØÙÖ ½ Î Ö ÐÙ Ø Ö ¹ Ò ÒØÖÓ ÙØ ÓÒ ¾ Ì Ø Ì ÈÙÞÞÐ Ì Á ÓÒÐÙ ÓÒ ÈÖÓ Ð Ñ Å Ö ¹ÄÙ ÈÓÔÔ ÍÒ Ä ÔÞ µ È Ö Ø È ÖØ ÔÐ ¾¼º¼ º½ ¾» ¾

ËØÖÙØÙÖ ½ Î Ö ÐÙ Ø Ö ¹ Ò ÒØÖÓ ÙØ ÓÒ ¾ Ì Ø Ì ÈÙÞÞÐ Ì Á ÓÒÐÙ ÓÒ ÈÖÓ Ð Ñ Å Ö ¹ÄÙ ÈÓÔÔ ÍÒ Ä ÔÞ µ È Ö Ø È ÖØ ÔÐ ¾¼º¼ º½ ¾» ¾ È Ö Ø È ÖØ ÔÐ Å Ö Ð Ò Ò ² Ö ÀÓ ØÖ Å Ö ¹ÄÙ ÈÓÔÔ ÍÒ Ú Ö ØØ Ä ÔÞ Ñ Ö ÐÙ ÔÓÔÔ ÓØÑ Ðº ¾¼º¼ º½ Å Ö ¹ÄÙ ÈÓÔÔ ÍÒ Ä ÔÞ µ È Ö Ø È ÖØ ÔÐ ¾¼º¼ º½ ½» ¾ ËØÖÙØÙÖ ½ Î Ö ÐÙ Ø Ö ¹ Ò ÒØÖÓ ÙØ ÓÒ ¾ Ì Ø Ì ÈÙÞÞÐ Ì Á ÓÒÐÙ ÓÒ

More information

ØÑ Ì¹ ÓÐÐ ÓÖ Ø ÓÒ º ź ÁÐ Ò Ö ØÞ ÂÓ ÒØ ÁÒ Ø ØÙØ ÓÖ ÆÙÐ Ö Ê Ö Ù Ò µ ź Ã Ö Ò Ö Åº Å ÐÐ Ö¹ÈÖ Ù Ö ÀÍ ÖÐ Òµ ź Ⱥ ÄÓÑ Ö Ó ÁÆ Æ Ö Ø µ º ÍÖ ÍÒ ÓÒÒµ Ǻ È Ð Ô

ØÑ Ì¹ ÓÐÐ ÓÖ Ø ÓÒ º ź ÁÐ Ò Ö ØÞ ÂÓ ÒØ ÁÒ Ø ØÙØ ÓÖ ÆÙÐ Ö Ê Ö Ù Ò µ ź Ã Ö Ò Ö Åº Å ÐÐ Ö¹ÈÖ Ù Ö ÀÍ ÖÐ Òµ ź Ⱥ ÄÓÑ Ö Ó ÁÆ Æ Ö Ø µ º ÍÖ ÍÒ ÓÒÒµ Ǻ È Ð Ô È Ù ÓÖ Ø Ð Ø ÑÔ Ö ØÙÖ Ò ÕÙ Ø ÓÒ Ó Ø Ø ÖÓÑ Æ = ¾ ØÛ Ø Ñ Ð ØØ É ÐÓÖ Ò ÙÖ Ö ÀÙÑ ÓРعÍÒ Ú Ö ØØ ÞÙ ÖÐ Ò Ëغ Ó Ö Å Ö ¾¼½ ØÑ Ì¹ ÓÐÐ ÓÖ Ø ÓÒ º ź ÁÐ Ò Ö ØÞ ÂÓ ÒØ ÁÒ Ø ØÙØ ÓÖ ÆÙÐ Ö Ê Ö Ù Ò µ ź Ã Ö Ò Ö Åº Å ÐÐ

More information

ÇÙØÐ Ò

ÇÙØÐ Ò ÀÓÛ ÑÙ ÒØ Ö Ò Ö Ø ÓÒ Ð Ö Ö Ò Ó Ø ÍºËº Ó Ð ÙÖ ØÝ Ý Ø Ñ Ö ÐÐÝ ÔÖÓÚ ½ ½ Ê ¹ Á ÈÖ Ù Å Ý ¾¼½½ ÇÙØÐ Ò ÅÓØ Ú Ø ÓÒ ÓÒÓÑ Ó Ø Ö ÒØ Ò Ö Ø ÓÒ Ö ÒØÐÝ Ä Ñ Ø Ð ØÝ ØÓ Ò ÙÖ Ü¹ ÒØ Ú ¹ ¹Ú ÓØ Ö Ò Ö Ø ÓÒ È Ý¹ ¹ÝÓÙ¹ Ó Ô Ò ÓÒ

More information

Chapter 9. Trapezoidal Maps. 9.1 The Trapezoidal Map

Chapter 9. Trapezoidal Maps. 9.1 The Trapezoidal Map Chapter 9 Trapezoidal Maps ÁÒ Ø Ø ÓÒ Û Û ÐÐ ÒÓØ Ö ÔÔÐ Ø ÓÒ Ó Ö Ò ÓÑ Þ ÒÖ Ñ ÒØ Ð ÓÒ ØÖÙØ ÓÒ Ò Ø ØÖ Ø ÓÒ ÙÖ Ø ÓÒ Ô Ö Ñ ÛÓÖ º Ø Ø Ñ Ø Ñ Ø Û ÐÐ Ú Ù Ò Æ ÒØ Ð ÓÖ Ø Ñ ÓÖ ÓÐÚ Ò Ø Ò Ö Ð ÔÖÓ Ð Ñ Ó ÔÓ ÒØ ÐÓ Ø ÓÒ

More information

CMD MDS Recovery DLD

CMD MDS Recovery DLD CMD MDS Recovery DLD Mike Pershin February 6, 2008 1 Introduction This document describes recovery changes in CMD. 2 Requirements The CMD environment requires the reviewed recovery due to major changes

More information

VOTING SYSTEMS AND ARROW S THEOREM

VOTING SYSTEMS AND ARROW S THEOREM VOTING SYSTEMS AND ARROW S THEOREM AKHIL MATHEW Abstract. The following is a brief discussion of Arrow s theorem in economics. I wrote it for an economics class in high school. 1. Background Arrow s theorem

More information

COMPARATIVE EVALUATION OF WEATHER FORECASTS FROM THE COSMO, ALARO AND ECMWF NUMERICAL MODELS FOR ROMANIAN TERRITORY

COMPARATIVE EVALUATION OF WEATHER FORECASTS FROM THE COSMO, ALARO AND ECMWF NUMERICAL MODELS FOR ROMANIAN TERRITORY COMPARATIVE EVALUATION OF WEATHER FORECASTS FROM THE COSMO, ALARO AND ECMWF NUMERICAL MODELS FOR ROMANIAN TERRITORY ÊÓ Ð Ù ÍÅÁÌÊ À ½ Ë ÑÓÒ Ì ã ͽ Ñ Ð ÁÊÁ ½ Å Ö Ð ÈÁ ÌÊÁãÁ½ ¾ Å Ð Ç Æ½ Ð Ü Ò Ö Ê ÁÍƽ Ó Ò

More information

arxiv: v25 [math.ca] 21 Nov 2008

arxiv: v25 [math.ca] 21 Nov 2008 ËÓÑ ÓÒ ØÙÖ ÓÒ Ø ÓÒ Ò ÑÙÐØ ÔÐ Ø ÓÒ Ó ÓÑÔÐ Ü Ö Ðµ ÒÙÑ Ö ÔÓÐÓÒ Ù Þ ÌÝ Þ arxiv:0807.3010v25 [math.ca] 21 Nov 2008 ØÖ Øº Ï Ù ÓÒ ØÙÖ Ö Ð Ø ØÓ Ø ÓÐÐÓÛ Ò ØÛÓ ÓÒ ØÙÖ Áµ µ ÓÖ ÓÑÔÐ Ü ÒÙÑ Ö x 1,...,x n Ø Ö Ü Ø Ö Ø

More information

Many-Valued Logics. A Mathematical and Computational Introduction. Luis M. Augusto

Many-Valued Logics. A Mathematical and Computational Introduction. Luis M. Augusto Many-Valued Logics A Mathematical and Computational Introduction Luis M. Augusto Individual author and College Publications 2017 All rights reserved. ISBN 978-1-84890-250-3 College Publications Scientific

More information

Ä ÖÒ Ò ÖÓÑ Ø Ö Ëº Ù¹ÅÓ Ø Ð ÓÖÒ ÁÒ Ø ØÙØ Ó Ì ÒÓÐÓ Ý Ä ØÙÖ ½ Ì Ä ÖÒ Ò ÈÖÓ Ð Ñ ËÔÓÒ ÓÖ Ý ÐØ ³ ÈÖÓÚÓ Ø Ç ² Ë Ú ÓÒ Ò ÁËÌ ÌÙ Ý ÔÖ Ð ¾¼½¾

Ä ÖÒ Ò ÖÓÑ Ø Ö Ëº Ù¹ÅÓ Ø Ð ÓÖÒ ÁÒ Ø ØÙØ Ó Ì ÒÓÐÓ Ý Ä ØÙÖ ½ Ì Ä ÖÒ Ò ÈÖÓ Ð Ñ ËÔÓÒ ÓÖ Ý ÐØ ³ ÈÖÓÚÓ Ø Ç ² Ë Ú ÓÒ Ò ÁËÌ ÌÙ Ý ÔÖ Ð ¾¼½¾ ÇÙØÐ Ò Ó Ø ÓÙÖ ½½º ÇÚ Ö ØØ Ò Å Ý µ ½¾º Ê ÙÐ Ö Þ Ø ÓÒ Å Ý ½¼ µ ½º Ì Ä ÖÒ Ò ÈÖÓ Ð Ñ ÔÖ Ð µ ½ º Î Ð Ø ÓÒ Å Ý ½ µ ¾º Á Ä ÖÒ Ò Ð ÔÖ Ð µ º Ì Ä Ò Ö ÅÓ Ð Á ÔÖ Ð ½¼ µ º ÖÖÓÖ Ò ÆÓ ÔÖ Ð ½¾ µ º ÌÖ Ò Ò Ú Ö Ù Ì Ø Ò

More information

Universality of election statistics and a way to use it to detect election fraud.

Universality of election statistics and a way to use it to detect election fraud. Universality of election statistics and a way to use it to detect election fraud. Peter Klimek http://www.complex-systems.meduniwien.ac.at P. Klimek (COSY @ CeMSIIS) Election statistics 26. 2. 2013 1 /

More information

Specifying and Analysing Agent-based Social Institutions using Answer Set Programming. Owen Cliffe, Marina De Vos, Julian Padget

Specifying and Analysing Agent-based Social Institutions using Answer Set Programming. Owen Cliffe, Marina De Vos, Julian Padget Department of Computer Science Technical Report Specifying and Analysing Agent-based Social Institutions using Answer Set Programming Owen Cliffe, Marina De Vos, Julian Padget Technical Report 2005-04

More information

ÓÙÖ ÓÒØ ÒØ Ï Ý Ó Û Ù Ø ÙÒØ ÓÒ Ð ØÝ ÔÖÓÚ Ý Ø Å Ò Ñ ÒØ ËÝ Ø Ñ Ø ÅÓ Ð Ê Ð Ø ÓÒ Ð Æ ØÛÓÖ ÇÇ ÀÓÛ Ó Û Ù ÅË Ê Ð Ø ÓÒ Ð ÑÓ Ð ÓÙÒ Ø ÓÒ Ð ÕÙ ÖÝ Ð Ò Ù ËÉÄ ÔÔÐ Ø

ÓÙÖ ÓÒØ ÒØ Ï Ý Ó Û Ù Ø ÙÒØ ÓÒ Ð ØÝ ÔÖÓÚ Ý Ø Å Ò Ñ ÒØ ËÝ Ø Ñ Ø ÅÓ Ð Ê Ð Ø ÓÒ Ð Æ ØÛÓÖ ÇÇ ÀÓÛ Ó Û Ù ÅË Ê Ð Ø ÓÒ Ð ÑÓ Ð ÓÙÒ Ø ÓÒ Ð ÕÙ ÖÝ Ð Ò Ù ËÉÄ ÔÔÐ Ø ÇÚ ÖÚ Û Ó Ø Å Ò Ñ ÒØ Ö Ò ÌÓÑÔ Ë ÓÓÐ Ó ÓÑÔÙØ Ö Ë Ò ÍÒ Ú Ö ØÝ Ó Ï Ø ÖÐÓÓ Ë ÁÒØÖÓ ÙØ ÓÒ ØÓ Ø Å Ò Ñ ÒØ Ï ÒØ Ö ¾¼½¼ Ë ÁÒØÖÓ ØÓ Å Ñص ÇÚ ÖÚ Û Ó Ø Å Ò Ñ ÒØ Ï ÒØ Ö ¾¼½¼ ½» ¾¾ ÓÙÖ ÄÓ Ø Ï Ô Ì ÜØ ÓÓ Ú ÐÙ Ø ÓÒ ÛÛÛº

More information

Supporting Information Political Quid Pro Quo Agreements: An Experimental Study

Supporting Information Political Quid Pro Quo Agreements: An Experimental Study Supporting Information Political Quid Pro Quo Agreements: An Experimental Study Jens Großer Florida State University and IAS, Princeton Ernesto Reuben Columbia University and IZA Agnieszka Tymula New York

More information

Ø Ñ Ò Ò ÙØÙÑÒ ¾¼¼¾ Ò Ò Ö ÕÙ ÒØ ÐÓ µ Ø Û Ø ØÖ ØÖÙØÙÖ ½ ȹØÖ È¹ ÖÓÛØ ÄÇË Ì È¹ØÖ Ø ØÖÙØÙÖ È¹ ÖÓÛØ Ð ÓÖ Ø Ñ ÓÖ Ò Ò ÐÐ Ö ÕÙ ÒØ Ø ÄÇË Ì Ð ÓÖ Ø Ñ ÓÖ Ò Ò Ö ÕÙ

Ø Ñ Ò Ò ÙØÙÑÒ ¾¼¼¾ Ò Ò Ö ÕÙ ÒØ ÐÓ µ Ø Û Ø ØÖ ØÖÙØÙÖ ½ ȹØÖ È¹ ÖÓÛØ ÄÇË Ì È¹ØÖ Ø ØÖÙØÙÖ È¹ ÖÓÛØ Ð ÓÖ Ø Ñ ÓÖ Ò Ò ÐÐ Ö ÕÙ ÒØ Ø ÄÇË Ì Ð ÓÖ Ø Ñ ÓÖ Ò Ò Ö ÕÙ Ø Ñ Ò Ò ÙØÙÑÒ ¾¼¼¾ Ò Ò Ö ÕÙ ÒØ ÐÓ µ Ø Û Ø ØÖ ØÖÙØÙÖ ½ Ö ÕÙ ÒØ ÐÓ µ Ø Û Ø Ò Ò ØÖÙØÙÖ ØÖ Ø Ñ Ò Ò ÙØÙÑÒ ¾¼¼¾ Ò Ò Ö ÕÙ ÒØ ÐÓ µ Ø Û Ø ØÖ ØÖÙØÙÖ ½ ȹØÖ È¹ ÖÓÛØ ÄÇË Ì È¹ØÖ Ø ØÖÙØÙÖ È¹ ÖÓÛØ Ð ÓÖ Ø Ñ ÓÖ Ò Ò ÐÐ

More information