Modeling, Optimization and Computation for Software Verification

Size: px
Start display at page:

Download "Modeling, Optimization and Computation for Software Verification"

Transcription

1 odeling, Optimization and Computation for Software Verification ardavij Roozbehani 1,EricFeron 2, and Alexandre egrestki 3 1 mardavij@mit.edu, 2 feron@mit.edu, 3 ameg@mit.edu Laboratory for Information and Decision Systems (LIDS), assachusetts Institute of Technology, Cambridge, A, U.S.A Abstract. odeling and analysis techniques are presented for real-time, safety-critical software. Software analysis is the task of verifying whether the computer code will execute safely, free of run-time errors. The critical properties that prove safe execution include bounded-ness of variables and termination of the program in a finite number of steps. In this paper, dynamical system representations of computer programs along with specific models that are pertinent to analysis via an optimization-based search for system invariants are developed. It is shown that the automatic search for system invariants that establish the desired properties of computer code, can be formulated as a convex optimization problem, such as linear programming, semidefinite programming, and/or sum of squares programming. 1 Introduction Failure of real-time control systems, such as those used in spacecrafts, satellites, multiple coordinating UVAs, automobiles and therapy machines may lead to loss of human life or a huge loss in capital and products. However, safe operation of these safety-critical control systems relies heavily on the embedded software. According to Boing Co. and Honeywell Inc., software development accounts for 60 80% of the effort spent on the development of complex control systems, while much of this effort is expended on validation and verification of the software after or during its development. While real-time software must satisfy various resource allocation, timing, computation and performance constraints, the very least to require is that the software must execute safely, free of run-time errors. The critical software properties that must be verified/validated for safe execution include: (1) absence of variable overflow, (2) absence of array index out-of-bounds calls, and (3) termination of the functions and sub-functions and if required, the program itself in finite time. Some additional properties that might be desired in a reliable, safetycritical software include: (4) robustness to uncertain inputs, including feedback from analog systems, (5) validity of certain inequalities relating inputs and outputs, for instance, passivity and (6) absence of dead-code. Software analysis, is the task of verification of some or all of the above properties.

2 Patrick Cousot [5],[7], published one of the most noteworthy results in the literature that deal with software analysis. The main method of verification is based on the notion of abstract interpretation of computer programs. See also [8],[17]. According to [5, 6], abstract interpretation is defined as an approximate program semantics derived from the domain of concrete semantic operations by replacing it with a domain of abstract semantic operations. A drawback associated with these methods is the introduction of a narrowing or widening operator, which often causes the method to generate weak invariants, resulting in considerable conservatism in analysis [4]. Nevertheless, these methods appear to be practical for the verification of limited properties of real-time, safety-critical systems such as large-sized avionics systems. Alternative methods aiming at generating stronger statements about the evolution of variables in software systems might be found, for example, in the model-checking literature; however, the trade-off oftenachievedbythesemethodsisthatof increased accuracy and the generation of stronger properties of software (or software model) variables, often at the cost of increased computational requirements and limited scalability to large systems. oreover, construction of the program models often cannot be fully automated. Recently, there have been renewed efforts at establishing properties of software systems by the combined use of abstractions or, better, bisimulation mechanisms, and applying control theoretic principles to them. uch of the relevant literature in that regard may be found in the recent field of hybrid systems [13]. See for instance [9]. In general, it was found that many methods developed in system and control theory for systems driven by differential equations were in principle applicable to hybrid systems, possibly at the price of having to re-develop some elements of theory, e.g. optimal control theory on hybrid systems [16, 12, 3] or control of hybrid systems using bisimulations [15, 14]. In this paper we introduce a systems theoretic approach for software analysis. We present modeling techniques through the introduction of linear-like models that may represent a broad range of computer programs of interest to this paper. These include single flow programs and gain scheduled piecewise linear systems, used to control physical devices such as aerospace systems or automotive control systems. The main method of verification is an optimization-based search for system invariants. We therefore, suggest specific Lyapunov-like functions, whose properties guarantee variable bounded-ness as well as other desired properties, such as guaranteed program termination. We also show how the search for these system invariants may be formulated as a convex optimization problem, such as linear programming, semi-definite programming and/or a sums of squares problem. At the end, we sketch the block-wise analysis procedure for improving the scalability of the proposed methods as analysis of large-size computer programs is undertaken. 2 Automated Software Analysis: Preliminaries In this section we introduce the fundamentals of software analysis through dynamical system models. We consider computer programs as dynamical systems

3 and introduce certain Lyapunov-like functions as certificates for the behavior of these systems. 2.1 Computer programs as dynamical systems We view a computer program as a dynamical system which defines the rules for iterative modification of operating memory, possibly in response to real-time inputs. In particular, we consider models defined in general by a state space set X with selected subsets X 0 X of initial states and X X of terminal states, and by a set-valued function f : X 7 2 X, such that f(x) X, x X.The dynamical system S = S(X, f, X 0,X ) defined by X, f, X 0,X is understood as the set of all sequences X =(x(0),x(1),...,x(t),...) of elements from X satisfying x (0) X 0, x(t +1) f (x (t)) t Z + (1) s.t. f(x) X, x X The uncertainty in the definition of x(0) represents the programs s dependence on parameters, and the uncertainty in the definition of x(t+1) represents program s ability to respond to real-time inputs. From this viewpoint, analysis of software means verification of certain properties of system (1). In Section 4, we elaborate on the dynamical systems view of computer programs and suggest specific models that are essentially equivalent to (1), yet are more suitable for analysis purposes. Definition 1. A computer program represented by a dynamical system S = S(X, f, X 0,X ) is said to terminate in finite time if every solution X = x(t) of (1) satisfies x(t) X for some t Z +. In addition, we say that the state variables remain bounded (do not overflow) if t Z +,x(t) does not belong to a certain (unsafe) subset X of X for every solution X = x(t) of (1). 2.2 Lyapunov functions as behavior certificates Definition 2. A Lyapunov function for system (1) is defined to be a function V : X 7 R such that V (x) <θv(x) x X, x f (x) :x/ X. (2) where θ R + is a positive constant. Remark 1. The parameter θ in the above definition, is very important in providing the flexibility required for designing appropriate Lyapunov functions that establish finite-time termination and/or bounded-ness. For instance if V (x 0 ) < 0 and θ 1, (2) implies that V must strictly monotonically decrease along the trajectories of (1) until they reach a terminal state. As we will see in the sequel, this is suitable for establishing finite-time termination. However, with V (x 0 ) < 0 and θ<1, V is not required to decrease along the trajectories of (1), while it remains negative. This is very important in proving absence of overflow in computer programs without the finite-time termination property.

4 Termination in finite time The following Theorem provides a useful criterion for verifying finite-time termination in software analysis. Theorem 1. If there exists a bounded function V : X 7 R, and a constant θ>1 satisfying V (x) <θv(x) x X, x f (x) :x/ X. (3) then a terminal state X will be reached in a finite number of steps. Proof. Since V is bounded, there exists R +, such that V (x) < 0, x X. Now, assume that there exists a sequence X =(x(0),x(1),...,x(t),...) of elements from X satisfying (1) that does not reach a terminal state in finite time. I.e. x (t) / X, t Z +. Then, V (x (t)) < for log log V (x (0)) t>, (4) log θ which contradicts bounded-ness of V. Absence of overflow We already saw that absence of overflow can be characterized by avoidance of an unsafe subset X of the state space X. Consider a Lyapunov function V, defined according to (2). Define the level sets L r (V ) of V,by L r (V )={x X : V (x) <r} These level sets are invariant with respect to (1), in the sense that x(t +1) L r (V ) whenever x(t) L r (V ). We use this fact, along with the monotonicity property of V, to establish a separation between the reachable set and the unsafe region of the state space. Theorem 2. Consider the system (1) and let V denote the space of all Lyapunov functions for this system satisfying (2) with some θ 1. An unsafe subset X of the state space X can never be reached along all the trajectories of (1) if there exists V V satisfying In addition, if then, θ>0 is sufficient. inf x X V (x) sup V (x) (5) x X 0 inf x X V (x) 0 (6) Proof. The proof proceeds by contradiction. First consider the θ 1 case and assume that (1) has a solution X =(x (0),x(1),..., x (t ),...), where x (0) X 0 and x (t ) X. Since V (x) is strictly monotonically decreasing along any solution of (1), we must have: inf x X V (x) V (x (t )) <V(x (0)) sup V (x) (7) x X 0

5 which contradicts (5). Now, consider the case θ < 1 for which monotonicity of V is not always implied. Partition X 0 into subsets X 0 and X 0 such that X 0 = X 0 X 0 and V (x) 0 x X 0 V (x) > 0 x X 0 Note that either of X 0 and X 0 mayhappentobeempty.now,assumethat(1) has a solution X =(x (0),x(1),..., x (t ),...), where x (0) X 0 and x (t ) X. Note that by assumption, V (x (t )) 0 and thus V (x (t)) > 0 t <t V (x (t)) is therefore strictly monotonically decreasing over the sequence x (0) to x (t ). Hence, (7) must hold which contradicts (5). Finally, assume that (1) has asolutionx =(x (0),x(1),..., x (t ),...), where x (0) X 0 and x (t ) X. In this case, we must have V (x (t)) 0, t. This implies that V (x (t )) < 0, which contradicts (6). Proof is complete. Now, we turn our attention to development of general forms for system invariants that establish the desired properties and are appropriate for use in a convex optimization framework. Among several properties of a reliable software mentioned earlier, absence of overflow and finite-time termination are expected in most applications. Theorem 3. Consider the dynamical system S = S(X, f, X 0,X ) defined by (1) and assume that there exists a real-valued function V : X 7 R such that V (x) < 0 x X 0. (8) V (x) <θv(x) x X, x f (x) :x/ X. (9) V (x) > x 2 1 x X. (10) where θ R + isaconstant,andnoconstraintonfiniteness of the state space X is imposed. Then, every solution X = x (t) of (1) remains bounded in the safe region defined by x i <,where each x i is a component of the state vector x. oreover, if θ>1, every solution X = x (t) reaches a terminal state X in finite time. Proof. Note that (8) and (9) imply non-positivity of V (x) on X \ X. oreover, by (10),V(x) is bounded from below by 1. Therefore, V (x) ( 1, 0). By Theorem 1, (9) implies finite-time termination. Also, the unsafe region X is defined by x i. Therefore, x 2 1, x X, inf V (x) =0 0= supv (x) x X x X 0 Theorem 2 then completes the proof.

6 Remark 2. By imposing a quadratic form on V, the search for a Lyapunov-like function satisfying (8) (10) reduces to semidefinite programming [1]. As an alternative, imposing a linear or piecewise linear form on V, along with replacing condition (10) with 2n constraints V (x) > x i 1 x X, i =1..n V (x) > x i 1 x X, i =1..n converts the problem of finding an appropriate system invariant to linear or mixed integer/linear programming [2]. Another possibility is to let V be a polynomial function of the state variables x i. In this case, the search for system invariants restricted to the class of polynomials with real coefficients can be formulated as a sums of squares problem [18],[19]. 3 odels of Computer Programs In this section we develop specific models of software that are convenient for analysis purposes. Practical considerations such as convenience for automated parsing/compiling, availability of an efficient relaxation technique and compatibility with a particular numerical engine for convex optimization influence the choice of modeling language. 3.1 ixed integer/linear systems With the following Proposition, we first provide the motivation/intuition behind using this model for software systems. Proposition 1. Universality of mixed-integer linear models. Let f be any arbitrary piece-wise affine function defined on a compact state space X, which consists of finite unions of finite polytopes. Then, f can be defined precisely, by imposing linear equality constraints on a finite number of binary variables and a finite number of analog variables ranging over bounded intervals. I.e. There exists matrices F and H, such that f(x) ={F [x; w; v;1]: s.t. w [ 1, 1] q, v { 1, 1} r s.t. H[x; w; v;1]=0} Proof. The proof is by construction. First, notice that without loss of generality we may assume that x [ 1, 1] n. Now, let X = i=n S X k, where each X i is defined by a finite set of linear inequality constraints. I.e. X i := x a T ª kix b ki,k=1,..., N i (11) Note that by definition f (x) =2A i x +2B i x X i, where the constant 2 appears for convenience in notation only. Now, assign a binary variable v i

7 { 1, 1}, to each X i,...n 1, according to the following rule, i=n 1 X Then we have f (x) = subject to N 1 X v i =1 x X i,v i = 1 x/ X i,,...n 1 (12) v i = N +1 x X N, i=n 1 X v i = N +3 x/ X N N 1 X (1 + v i )(A i x + B i ) (N 3) (A N x + B N ) i=n 1 X v i (A N x + B N ), v i N +3, and (12), and v i { 1, 1},...N (13) Now, we need to relate (11) and (12), which is done in the following way; x X i a T kix b ki (vi +1) 0, k=1,..., N i (14) Since by assumption, each X i is bounded, R ki := min x X i a T kix b ki exists and is finite. Therefore, the condition x X i, is equivalent to, a T kixv i +a T kix b ki v i b ki R ki (w ki +1)=0,w ki [ 1, 1],k=1,..., N i (15) Next, define auxiliary state vectors y i := xv i R n. Notice that y i is the multiplication of an analog variable x, and a binary variable v i. We represent this (nonlinear) transformation by an affine transformation involving auxiliary analog variables z i [ 1, 1] n, and z i [ 1, 1] n, subject to a set of linear constraints, in the following way, y i =4z i x v i 1 n 1 n,z i (v i +1) 1 n 2 equivalently, z i 0, z i v i 1 n,z i = 1 2 (x z i) y i =4z i x v i 1 n 1 n,,.., N (16a) z i + 1 W 1 2 i + I n 1n = (v i +1) 1 n (16b) 2 z i = 1 W 2 2 i + I n 1n (16c) z i W 3 i + I n 1n = v i 1 n (16d) z i = 1 2 (x z i) (16e)

8 where W k i is defined by W k i =diag w k ji, j=1,..,n ª,,.., N, k =1,.., 3, w k ij [ 1, 1] Now, let X e = xy 1... y n z 1... z n z 1... z n wv1 T, where w = w w NN N w wnn 1... Nn w3, and v = v1... v n. Then, " N 1 # X f (x) := A i (N 3) A N x + A 1 A N... A N 1 A N y (17) + N 1 X B 1 B N... B N 1 B N v + B i +( N +3)B N which is linear in x, y, v. oreover, (17) is subject to constraints (13), (15), (16), which are all linear equality constraints in X e. This completes the proof. So far, we have shown that imposing linear equality constraints on Boolean variables and on analog variables ranging over bounded intervals allows one to define arbitrary piecewise linear functions on finite unions of polytopes. This observation serves as the basis for introducing the widely used class of models which will be referred to as mixed integer/linear systems here. These models are capable of providing relatively brief descriptions of complicated dependencies. A mixed integer/linear system model has state space X R n.itsstate transition function f : X 7 2 X is defined by two matrices F, H of dimensions n-by-(n + q + r +1)and p-by-(n + q + r +1), according to f(x) ={F [x; w; v;1]: w [ 1, 1] q, v { 1, 1} r s.t. H[x; w; v;1]=0} Natural Lyapunov function candidates for mixed integer/linear systems are quadratic functionals. Within this class, checking monotonicity of Lyapunov functions along system trajectories can be done by application of the traditional quadratic relaxation techniques, starting with those used in deriving the bounds for the AX-CUT problem, which leads to semidefinite programming as the Lyapunov function design tool. Search for Lyapunov invariants using linear or semidefinite programming This section details our approach to compute Lyapunov invariants for mixed integer/linear software models. Looking for a function V satisfying (8) (10), may be seen an infinite-dimensional convex programming problem in the unknown V. This may be solved by first defining an appropriate, finite-dimensional parameterization of V andthensolvingtheresultingfinite-dimensional, convex optimization problem. Linear parameterization of quadratic Lyapunov functions appear as T x x V (x) := P 1 1

9 where P is a constant, symmetric matrix. For the Lyapunov invariant parameterization considered above, the problem of finding an invariant that satisfies the conditions (8) (10) is about solving a set of nonlinear constraints arising from these conditions. These conditions are often non-convex conditions, which makes their exact solution often impractical, but, fortunately also unnecessary. Instead, we will focus on using relaxed versions of these conditions, which are much easier to solve using either linear or semidefinite optimization routines. The main tool used towards obtaining these relaxations is a Lagrangian relaxation procedure also known as S-procedure. For example, the first of the three conditions does not require such a procedure, since it is a linear constraint on the coefficients of P : Indeed, the requirement V (x(0)) < 0 may also be written as, x(0) T x(0) P < 0. (18) 1 1 T where is the overflow limit. The second condition, (9), may be written as F.[x(k) v(k) w(k) 1] 1 P F.[x(k) v(k) w(k) 1] 1 <θ x(k) 1 P x(k) 1 (19) for any x(k), v(k), w(k) satisfying H. x (k) w (k) v (k) 1 T =0and w(k) [ 1, 1] q,v(k) { 1, 1} r (20) The constraint v { 1, 1} r is equivalent to the quadratic constraint v T 1 v rx µ i,1 =0, with 1 =diag ª µ 1,1,µ 2,1,...µ r,1 for arbitrary µ i,1 R, i =1,...r. Likewise, the constraint w [1, 1] q is equivalent to qx w T E 1 w η i,1 0, with E 1 =diag ª η 1,1,η 2,1,...η q,1 for arbitrary η i,1 > 0, i =1,...q. Formulating the proper Lagrangian relaxation, condition (19) holds whenever condition (20) holds if there exists P, 1, E 1 0 and y 1 R s x n H such that L T 1 PL 1 θl T 2 PL 2 <y 1 H +Hy T 1 T +L T 3 1 L 3 +L T 4 E 1 L 4 L T 5 (Tr 1 +TrE 1 ) L 5 (21) where i f 1 h f H := [h x h w h v h 1 ], F := f w f v x F L 1 := I,L 0 1 (sx 1) 1 2 := n 0 n (sx n) 0 1 (sx 1) 1 L 3 := [I n+q 0 (n+q) (r+1) ],L 4 := [0 (r+1) (n+q) I r+1 ],L 5 := [0 1 (sx 1) 1]

10 Likewise, (10) may be written as x(k) T In 0 x(k) x(k) T x(k) < P (22) for any x(k), v(k), w(k) satisfying H. x (k) w (k) v (k) 1 T =0and w(k) [ 1, 1] q,v(k) { 1, 1} r (23) Thus condition (22) holds whenever condition (23) holds if there exists P, 2, E 2 0 and y 2 R sx n H such that L T 2 P 0 L 2 L T 2 PL 2 <y 2 H +H T y T 2 +L T 3 2 L 3 +L T 4 E 2 L 4 L T 5 (Tr 2 +TrE 2 ) L 5 (24) Thus, absence of overflow and finite execution time are guaranteed if there exist P, 1, 2, E 1 0, E 2 0, y 1, and y 2 satisfying constraints (18,21 and 24). 3.2 Linear systems with conditional switching In this model the state space of the system is the direct product X = {0, 1, 2,...,m} R n = {(k, v) :k Z, 0 k m, v R n } of a discrete set and an n-dimensional Euclidean space, X 0 = {(0,v 0 )}, X = {m} R n. The set-valued state transition map f : X 7 2 X is defined by matrices A k,b k,l k,g k,h k,i k,c k,d k,wherek {0, 1,...,m 1}, aswellas by a function p : {0, 1,...,m 1} 7 {0, 1,...,m}, according to the following rule: f(k, v) ={(k +1,A k v + B k w + L k ): w [ 1, 1]} when C k v + D k 0 and k<m, f(k, v) ={(p(k),g k x + H k w + I k ): w [ 1, 1]} when C k v + D k > 0 and k<m,andf(k, v) ={m, v} when k = m. In this model, the discrete component k of the state vector x =(k, v) represents the current line of the code, while v is the real state vector being processed and w represents bounded real-valued input data. All operations allowed are affine, except for the conditional go to p(k) statements allowed on every line. This model appears to be suitable for programs with simple flow, as well as real-time interactions between simple logic and gain scheduled linear systems. Natural Lyapunov function candidates for linear systems with conditional switching have the piecewise quadratic or piecewise linear form V (k, v) =σ k (v), where for every k {0, 1,...,m} the function σ k : R n 7 R is a quadratic or an affine functional.

11 3.3 Trigonometric polynomial models The models described in the previous sections are only capable of describing piecewise linear transformations of analog variables. This is not always convenient: for example, multiplication of two analog state variables can be represented this way only approximately and this representation is particularly cumbersome. In order to cover a larger class of analog operations, the trigonometric polynomial models could be useful. A trigonometric polynomial model has state space X which is a closed subgroup of a poly-thorus T n,wheret denotes the unit circle in the complex plane. Equivalently, one can think of X as a direct product of sets of the form T k or Z k q,wherez q denotes the set of all complex numbers z such that z q =1.The word trigonometric refers to the natural parameterizations T = {cos(t)+j sin(t) : t R} of the unit circle. The state transition map f : X 7 2 X is defined by a vector polynomial p with respect to 2 n + k complex variables, according to f(x) ={y X : p(y, x, z) =0for some z T k }. Natural Lyapunov function candidates for trigonometric polynomial models are real-valued trigonometric polynomials. Checking validity of a Lyapunov function candidate reduces to verification of positivity of a trigonometric polynomial subject to a set of polynomial constraints, which can be done using the Shor s sums of squares argument: A polynomial is positive if it can be represented as a sum of squares of polynomials. While it is not true that a positive polynomial can always be represented as a sum of squares of polynomials, it can be shown that the equivalence holds in the case of trigonometric polynomials. 4 A Numerical Example Consider the following program: x 1 =0;x 2 =0; while x 2 100, if x 1 0, x 1 = x 1 a; else x 1 = x 1 + b; end x 2 = x 2 +1; end where a [100, 900] and b [200, 800], are uncertain input parameters. Using 2 slack variables and 1 binary variable, a mixed integer/linear model of this piece of code is defined by matrices F, and H, given as:

12 0 x(0) =,n=2,q=2,r= a+b F = b a 2 10,H= ,R= 01 0 R 0 R , Given = 1000 as the overflow limit, using (18), (21), (24), the quadratic Lyapunov function V (x) = x x x x was found to prove bounded-ness and finite-time termination for all a and b. 5 Block-wise Analysis of Computer Programs Block-wise analysis is a method for improving the scalability/computational cost of the above techniques as analysis of large size computer programs is undertaken. The basic idea here is to consider large-size software as the interconnection of smaller size dynamical systems (functions, subfunctions and procedures that we call them "blocks"). These so called blocks interact via a subset of the program states called "global variables". Correctness of each block is established separately, known apriori, or assumed temporarily. The dynamics of each block is then abstracted/approximated by equalities and/or inequalities relating the inputs and the outputs. In obvious cases, abstractions of this level may be provided by the programmer to facilitate the analysis task. This way, the states/variables that are local to each block are eliminated from the global model. Correctness of the software will be established by verifying bounded-ness of global variables, as well as verifying that when required, a final global state will be reached in finite-time. In case correctness of some of the blocks were assumed temporarily, their correctness need to be established rigorously, subject to the bounds available now, for global variables. To further clarify the concept, we implement the method on the following example.

13 typedef enum {FALSE = 0, TRUE = 1} BOOLEAN; BOOLEAN INIT1, INIT2; float P, X; void filter1 () { static float E[2], S[2]; if (INIT1) { S[0] = X; P = X; E[0] = X; E[1]=0; S[1]=0; }else{ P =0.5*X 0.7*E[0]+0.4*E[1]+1.5*S[0] S[1]*0.7; E[1] = E[0]; E[0] = X; S[1] = S[0]; S[0] = P; X=P/6+S[1]/5; } } void filter2 () { static float E2[2], S2[2]; if (INIT2) { S2[0] =0.5*X; P = X; E2[0] = 0.8*X; E2[1]=0; S2[1]=0; }else{ P =0.3*X E2[0]*0.2+E2[1]*1.4+S2[0]*0.5 S2[1]*1.7; E2[1] = 0.5*E2[0]; E2[0] = 2*X; S2[1] = S2[0]+10; S2[0] = P/2+S2[1]/3; X=P/8+S2[1]/10; } } void main () { X = 0; INIT1 = TRUE; INIT2=TRUE; while (1) { X = 0.98 * X + 85; if (abs(x)<= 400) { filter1 (); X=X+100; INIT1=FALSE; }elseif(abs(x)<=800) { filter 2(); X=X 50; INIT2=FALSE; } }}

14 For automated (block-wise) analysis of this program, the analyzer must be provided (either by a complier or by the programmer) with the system invariant that prior to each execution of filter1(), x 400. Next, filter() is modeled in the following abstracted way: w x [ 1, 1],s 0 (0) [ 400, 400],e 0 (0) [ 400, 400], P (0) [ 400, 400],s 1 (0) = 0, e 1 (0) = 0. P (k +1) e 1 (k +1) e 0 (k +1) s 1 (k +1) = s 0 (k +1) P (k) e 1 (k) e 0 (k) s 1 (k) s 0 (k) w x (k) 1 Due to the presence of static variables e and s, bounded-ness of the above recursion for an infinite number of iteration must be verified. Using LIs (18) (24) with θ =0.9, Pe 1 e 0 s 1 s was proved. Pe 1 e 0 s 1 s Ps s µ1 2 µ 2 1 x ' This proves that in the worst case, the value of X, after execution of filter1() cannot be greater than 531. Similarly, prior to each execution of filter2(), x 800 is invariant. Next, filter2() is modeled in the following abstracted way: w x [ 1, 1],s2 0 (0) [ 400, 400],e2 0 (0) [ 640, 640], P (0) [ 800, 800],s2 1 (0) = 0, e2 1 (0) = 0. P (k) P (k +1) e2 1 (k) e2 1 (k +1) e2 0 (k +1) s2 1 (k +1) = e2 0 (k) s2 1 (k) s2 0 (k +1) s2 0 (k) w x (k) 1 Again, using LIs (18) (24) with θ = 0.9, Pe 1 e 0 s 1 s was proved. Pe 1 e 0 s 1 s Ps s µ1 2 µ 2 1 x ' This in turn, proves that in the worst case, the value of X, after execution of filter2() cannot be greater than The main program is now abstracted in the following way.

15 void main () { X=0; while (1) { X = 0.98 * X + 85; if (abs(x)<= 400) { X=531*w1; %w1 [ 1, 1] X=X+100; }elseif(abs(x)<=800) { X=1591*w2; %w2 [ 1, 1] X=X 50; } } } Using the same methods, analysis of this program in turn proves that x Therefore, bounded-ness of all variables is established. 6 Conclusions A new framework for analysis of real-time software was introduced. It was shown that software can be viewed/modeled as a dynamical system. Specific models carrying this task were also introduced. System invariants, found by convex optimization of certain Lyapunov-like functions prove the desired properties of the software. These properties include bounded-ness of all variables within safe regions and finite time termination of the program. To improve scalability of these techniques for application to large-size computer programs, the method of block-wise analysis of computer code was suggested. It was shown through a numerical example, how this method can be applied. References 1. S. Boyd, L.E. Ghaoui, E. Feron, and V. Balakrishnan. Linear atrix Inequalities in Systems and Control Theory. Society for Industrial and Applied athematics, D. Bertsimas, and J. Tsitsikilis. Introduction to Linear Optimization. Athena Scientific, S.Branicky,V.S.Borkar,andS.K.itter.Aunified framework for hybrid control: model and optimal control theory. IEEE Transactions on Automatic Control, 43(1):31-45, A. Colon, S. Sankaranarayanan, H. B. Sipma. Linear invariant generation using non-linear constraint solving. In Computer Aided Verification (CAV 2003), vol of Lecture Notes in Computer Science, Springer Verlag, pp P. Cousot and R. Cousot. Abstract interpretation: a unified lattice model for static analysis of programs by construction or approximation of fixpoints. In Proc. 4th AC SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 77, pages , 1977.

16 6. P. Cousot, and R. Cousot. Systematic design of program analysis frameworks. In Conference Record of the Sixth Annual AC SIGPLAN-SIGACT Symposium on Principles of Programming Languages, pages , San Antonio, Texas, AC Press, New York. 7. P. Cousot. Semantic foundations of program analysis. In S. uchnick and N. Jones, editors, Program Flow Analysis: Theory and Applications, chapter 10, pages Prentice-Hall, D. Dams. Abstract interpretation and partition refinement for odel Checking. Ph.D. Thesis, Eindhoven University of Technology, S. Prajna, and A. Jadbabaie. Safety verification of hybrid systems using barrier certificates. Hybrid Systems: Computation and Control. Springer-Verlag lecture notes in computer science, arch Johansson, and A. Rantzer. On the computation of piecewise quadratic Lyapunov functions. In Proc. 36th IEEE Conference on Decision and Control, San Diego, California, December Johansson, and A. Rantzer. Computation of piecewise quadratic Lyapunov functions for hybrid systems. IEEE Transactions on Automatic Control, 43(4), pp , April S. Hedlund and A. Rantzer. Optimal control of hybrid systems. In Proc. 38th IEEE Conference on Decision and Control, Phoenix, Arizona, December R. Alur, and G. J. Pappas (Eds.): Hybrid Systems: Computation and Control, 7th International Workshop, Lecture Notes in Computer Science, volume 2993, Springer Verlag, arch G. Lafferriere, G. J. Pappas, and S. Sastry. Hybrid systems with finite bisimulations. Hybrid Systems V, Lecture Notes in Computer Science, volume 1567, Springer G. Lafferriere, G. J. Pappas, and S. Sastry. Reachability analysis of hybrid systems using bisimulations. In Proc. of the 37th IEEE Conference on Decision and Control, pages , Tampa, J. Lygeros, C. Tomlin, and S. Sastry. Controllers for reachability specifications for hybrid systems. Automatica, 35(3): , D. onniaux. Abstract interpretation of programs as arkov decision processes. In Static Analysis Symposium, volume 2694 in Lecture Notes in Computer Science, pages , Springer Verlag, P. A. Parrilo. inimizing Polynomial Functions. In Algorithmic and Quantitative Real Algebraic Geometry, DIACS Series in Discrete athematics and Theoretical Computer Science, Vol. 60, pp , AS. 19. K. Gatermann, and P.A. Parrilo. Symmetry groups, semidefinite programs, and sums of squares. Journal of Pure and Appl. Algebra, Vol. 192, No. 1-3, pp , 2004.

Lecture 7: Finding Lyapunov Functions 1

Lecture 7: Finding Lyapunov Functions 1 Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.243j (Fall 2003): DYNAMICS OF NONLINEAR SYSTEMS by A. Megretski Lecture 7: Finding Lyapunov Functions 1

More information

2.3 Convex Constrained Optimization Problems

2.3 Convex Constrained Optimization Problems 42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions

More information

Discrete Optimization

Discrete Optimization Discrete Optimization [Chen, Batson, Dang: Applied integer Programming] Chapter 3 and 4.1-4.3 by Johan Högdahl and Victoria Svedberg Seminar 2, 2015-03-31 Todays presentation Chapter 3 Transforms using

More information

Numerology - A Case Study in Network Marketing Fractions

Numerology - A Case Study in Network Marketing Fractions Vers l analyse statique de programmes numériques Sylvie Putot Laboratoire de Modélisation et Analyse de Systèmes en Interaction, CEA LIST Journées du GDR et réseau Calcul, 9-10 novembre 2010 Sylvie Putot

More information

24. The Branch and Bound Method

24. The Branch and Bound Method 24. The Branch and Bound Method It has serious practical consequences if it is known that a combinatorial problem is NP-complete. Then one can conclude according to the present state of science that no

More information

1 if 1 x 0 1 if 0 x 1

1 if 1 x 0 1 if 0 x 1 Chapter 3 Continuity In this chapter we begin by defining the fundamental notion of continuity for real valued functions of a single real variable. When trying to decide whether a given function is or

More information

Verification of hybrid dynamical systems

Verification of hybrid dynamical systems Verification of hybrid dynamical systems Jüri Vain Tallinn Technical University/Institute of Cybernetics vain@ioc.ee Outline What are Hybrid Systems? Hybrid automata Verification of hybrid systems Verification

More information

it is easy to see that α = a

it is easy to see that α = a 21. Polynomial rings Let us now turn out attention to determining the prime elements of a polynomial ring, where the coefficient ring is a field. We already know that such a polynomial ring is a UF. Therefore

More information

Mathematics Course 111: Algebra I Part IV: Vector Spaces

Mathematics Course 111: Algebra I Part IV: Vector Spaces Mathematics Course 111: Algebra I Part IV: Vector Spaces D. R. Wilkins Academic Year 1996-7 9 Vector Spaces A vector space over some field K is an algebraic structure consisting of a set V on which are

More information

Convex analysis and profit/cost/support functions

Convex analysis and profit/cost/support functions CALIFORNIA INSTITUTE OF TECHNOLOGY Division of the Humanities and Social Sciences Convex analysis and profit/cost/support functions KC Border October 2004 Revised January 2009 Let A be a subset of R m

More information

Static analysis of numerical programs

Static analysis of numerical programs Sylvie Putot with Eric Goubault, Franck Védrine and Karim Tekkal (Digiteo) Laboratory for the Modelling and Analysis of Interacting Systems, CEA LIST RAIM 09: 3es Rencontres Arithmétique de l Informatique

More information

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM

FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT

More information

A Tool for Generating Partition Schedules of Multiprocessor Systems

A Tool for Generating Partition Schedules of Multiprocessor Systems A Tool for Generating Partition Schedules of Multiprocessor Systems Hans-Joachim Goltz and Norbert Pieth Fraunhofer FIRST, Berlin, Germany {hans-joachim.goltz,nobert.pieth}@first.fraunhofer.de Abstract.

More information

Numerical Analysis Lecture Notes

Numerical Analysis Lecture Notes Numerical Analysis Lecture Notes Peter J. Olver 5. Inner Products and Norms The norm of a vector is a measure of its size. Besides the familiar Euclidean norm based on the dot product, there are a number

More information

Duality in General Programs. Ryan Tibshirani Convex Optimization 10-725/36-725

Duality in General Programs. Ryan Tibshirani Convex Optimization 10-725/36-725 Duality in General Programs Ryan Tibshirani Convex Optimization 10-725/36-725 1 Last time: duality in linear programs Given c R n, A R m n, b R m, G R r n, h R r : min x R n c T x max u R m, v R r b T

More information

Conic optimization: examples and software

Conic optimization: examples and software Conic optimization: examples and software Etienne de Klerk Tilburg University, The Netherlands Etienne de Klerk (Tilburg University) Conic optimization: examples and software 1 / 16 Outline Conic optimization

More information

Ideal Class Group and Units

Ideal Class Group and Units Chapter 4 Ideal Class Group and Units We are now interested in understanding two aspects of ring of integers of number fields: how principal they are (that is, what is the proportion of principal ideals

More information

A Static Analyzer for Large Safety-Critical Software. Considered Programs and Semantics. Automatic Program Verification by Abstract Interpretation

A Static Analyzer for Large Safety-Critical Software. Considered Programs and Semantics. Automatic Program Verification by Abstract Interpretation PLDI 03 A Static Analyzer for Large Safety-Critical Software B. Blanchet, P. Cousot, R. Cousot, J. Feret L. Mauborgne, A. Miné, D. Monniaux,. Rival CNRS École normale supérieure École polytechnique Paris

More information

How To Prove The Dirichlet Unit Theorem

How To Prove The Dirichlet Unit Theorem Chapter 6 The Dirichlet Unit Theorem As usual, we will be working in the ring B of algebraic integers of a number field L. Two factorizations of an element of B are regarded as essentially the same if

More information

Example 4.1 (nonlinear pendulum dynamics with friction) Figure 4.1: Pendulum. asin. k, a, and b. We study stability of the origin x

Example 4.1 (nonlinear pendulum dynamics with friction) Figure 4.1: Pendulum. asin. k, a, and b. We study stability of the origin x Lecture 4. LaSalle s Invariance Principle We begin with a motivating eample. Eample 4.1 (nonlinear pendulum dynamics with friction) Figure 4.1: Pendulum Dynamics of a pendulum with friction can be written

More information

F. ABTAHI and M. ZARRIN. (Communicated by J. Goldstein)

F. ABTAHI and M. ZARRIN. (Communicated by J. Goldstein) Journal of Algerian Mathematical Society Vol. 1, pp. 1 6 1 CONCERNING THE l p -CONJECTURE FOR DISCRETE SEMIGROUPS F. ABTAHI and M. ZARRIN (Communicated by J. Goldstein) Abstract. For 2 < p

More information

Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh

Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Peter Richtárik Week 3 Randomized Coordinate Descent With Arbitrary Sampling January 27, 2016 1 / 30 The Problem

More information

Semidefinite characterisation of invariant measures for one-dimensional discrete dynamical systems

Semidefinite characterisation of invariant measures for one-dimensional discrete dynamical systems Semidefinite characterisation of invariant measures for one-dimensional discrete dynamical systems Didier Henrion 1,2,3 April 24, 2012 Abstract Using recent results on measure theory and algebraic geometry,

More information

Continued Fractions and the Euclidean Algorithm

Continued Fractions and the Euclidean Algorithm Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction

More information

Adaptive Online Gradient Descent

Adaptive Online Gradient Descent Adaptive Online Gradient Descent Peter L Bartlett Division of Computer Science Department of Statistics UC Berkeley Berkeley, CA 94709 bartlett@csberkeleyedu Elad Hazan IBM Almaden Research Center 650

More information

Chapter 4, Arithmetic in F [x] Polynomial arithmetic and the division algorithm.

Chapter 4, Arithmetic in F [x] Polynomial arithmetic and the division algorithm. Chapter 4, Arithmetic in F [x] Polynomial arithmetic and the division algorithm. We begin by defining the ring of polynomials with coefficients in a ring R. After some preliminary results, we specialize

More information

THE FUNDAMENTAL THEOREM OF ALGEBRA VIA PROPER MAPS

THE FUNDAMENTAL THEOREM OF ALGEBRA VIA PROPER MAPS THE FUNDAMENTAL THEOREM OF ALGEBRA VIA PROPER MAPS KEITH CONRAD 1. Introduction The Fundamental Theorem of Algebra says every nonconstant polynomial with complex coefficients can be factored into linear

More information

1 Sets and Set Notation.

1 Sets and Set Notation. LINEAR ALGEBRA MATH 27.6 SPRING 23 (COHEN) LECTURE NOTES Sets and Set Notation. Definition (Naive Definition of a Set). A set is any collection of objects, called the elements of that set. We will most

More information

Creating, Solving, and Graphing Systems of Linear Equations and Linear Inequalities

Creating, Solving, and Graphing Systems of Linear Equations and Linear Inequalities Algebra 1, Quarter 2, Unit 2.1 Creating, Solving, and Graphing Systems of Linear Equations and Linear Inequalities Overview Number of instructional days: 15 (1 day = 45 60 minutes) Content to be learned

More information

t := maxγ ν subject to ν {0,1,2,...} and f(x c +γ ν d) f(x c )+cγ ν f (x c ;d).

t := maxγ ν subject to ν {0,1,2,...} and f(x c +γ ν d) f(x c )+cγ ν f (x c ;d). 1. Line Search Methods Let f : R n R be given and suppose that x c is our current best estimate of a solution to P min x R nf(x). A standard method for improving the estimate x c is to choose a direction

More information

1 VECTOR SPACES AND SUBSPACES

1 VECTOR SPACES AND SUBSPACES 1 VECTOR SPACES AND SUBSPACES What is a vector? Many are familiar with the concept of a vector as: Something which has magnitude and direction. an ordered pair or triple. a description for quantities such

More information

The Steepest Descent Algorithm for Unconstrained Optimization and a Bisection Line-search Method

The Steepest Descent Algorithm for Unconstrained Optimization and a Bisection Line-search Method The Steepest Descent Algorithm for Unconstrained Optimization and a Bisection Line-search Method Robert M. Freund February, 004 004 Massachusetts Institute of Technology. 1 1 The Algorithm The problem

More information

By choosing to view this document, you agree to all provisions of the copyright laws protecting it.

By choosing to view this document, you agree to all provisions of the copyright laws protecting it. This material is posted here with permission of the IEEE Such permission of the IEEE does not in any way imply IEEE endorsement of any of Helsinki University of Technology's products or services Internal

More information

The van Hoeij Algorithm for Factoring Polynomials

The van Hoeij Algorithm for Factoring Polynomials The van Hoeij Algorithm for Factoring Polynomials Jürgen Klüners Abstract In this survey we report about a new algorithm for factoring polynomials due to Mark van Hoeij. The main idea is that the combinatorial

More information

Lecture 3: Finding integer solutions to systems of linear equations

Lecture 3: Finding integer solutions to systems of linear equations Lecture 3: Finding integer solutions to systems of linear equations Algorithmic Number Theory (Fall 2014) Rutgers University Swastik Kopparty Scribe: Abhishek Bhrushundi 1 Overview The goal of this lecture

More information

TD(0) Leads to Better Policies than Approximate Value Iteration

TD(0) Leads to Better Policies than Approximate Value Iteration TD(0) Leads to Better Policies than Approximate Value Iteration Benjamin Van Roy Management Science and Engineering and Electrical Engineering Stanford University Stanford, CA 94305 bvr@stanford.edu Abstract

More information

Separation Properties for Locally Convex Cones

Separation Properties for Locally Convex Cones Journal of Convex Analysis Volume 9 (2002), No. 1, 301 307 Separation Properties for Locally Convex Cones Walter Roth Department of Mathematics, Universiti Brunei Darussalam, Gadong BE1410, Brunei Darussalam

More information

Integrating Benders decomposition within Constraint Programming

Integrating Benders decomposition within Constraint Programming Integrating Benders decomposition within Constraint Programming Hadrien Cambazard, Narendra Jussien email: {hcambaza,jussien}@emn.fr École des Mines de Nantes, LINA CNRS FRE 2729 4 rue Alfred Kastler BP

More information

CONTROLLABILITY. Chapter 2. 2.1 Reachable Set and Controllability. Suppose we have a linear system described by the state equation

CONTROLLABILITY. Chapter 2. 2.1 Reachable Set and Controllability. Suppose we have a linear system described by the state equation Chapter 2 CONTROLLABILITY 2 Reachable Set and Controllability Suppose we have a linear system described by the state equation ẋ Ax + Bu (2) x() x Consider the following problem For a given vector x in

More information

Duality of linear conic problems

Duality of linear conic problems Duality of linear conic problems Alexander Shapiro and Arkadi Nemirovski Abstract It is well known that the optimal values of a linear programming problem and its dual are equal to each other if at least

More information

Notes on Factoring. MA 206 Kurt Bryan

Notes on Factoring. MA 206 Kurt Bryan The General Approach Notes on Factoring MA 26 Kurt Bryan Suppose I hand you n, a 2 digit integer and tell you that n is composite, with smallest prime factor around 5 digits. Finding a nontrivial factor

More information

Applications to Data Smoothing and Image Processing I

Applications to Data Smoothing and Image Processing I Applications to Data Smoothing and Image Processing I MA 348 Kurt Bryan Signals and Images Let t denote time and consider a signal a(t) on some time interval, say t. We ll assume that the signal a(t) is

More information

The Ideal Class Group

The Ideal Class Group Chapter 5 The Ideal Class Group We will use Minkowski theory, which belongs to the general area of geometry of numbers, to gain insight into the ideal class group of a number field. We have already mentioned

More information

Modeling and Verification of Sampled-Data Hybrid Systems

Modeling and Verification of Sampled-Data Hybrid Systems Modeling and Verification of Sampled-Data Hybrid Systems Abstract B. Izaias Silva and Bruce H. Krogh Dept. of Electrical and Computer Engineering, Carnegie Mellon University (Izaias /krogh)@cmu.edu We

More information

Further Study on Strong Lagrangian Duality Property for Invex Programs via Penalty Functions 1

Further Study on Strong Lagrangian Duality Property for Invex Programs via Penalty Functions 1 Further Study on Strong Lagrangian Duality Property for Invex Programs via Penalty Functions 1 J. Zhang Institute of Applied Mathematics, Chongqing University of Posts and Telecommunications, Chongqing

More information

We shall turn our attention to solving linear systems of equations. Ax = b

We shall turn our attention to solving linear systems of equations. Ax = b 59 Linear Algebra We shall turn our attention to solving linear systems of equations Ax = b where A R m n, x R n, and b R m. We already saw examples of methods that required the solution of a linear system

More information

Inner Product Spaces and Orthogonality

Inner Product Spaces and Orthogonality Inner Product Spaces and Orthogonality week 3-4 Fall 2006 Dot product of R n The inner product or dot product of R n is a function, defined by u, v a b + a 2 b 2 + + a n b n for u a, a 2,, a n T, v b,

More information

Chapter 3 Nonlinear Model Predictive Control

Chapter 3 Nonlinear Model Predictive Control Chapter 3 Nonlinear Model Predictive Control In this chapter, we introduce the nonlinear model predictive control algorithm in a rigorous way. We start by defining a basic NMPC algorithm for constant reference

More information

OPTIMAL CONTROL OF A COMMERCIAL LOAN REPAYMENT PLAN. E.V. Grigorieva. E.N. Khailov

OPTIMAL CONTROL OF A COMMERCIAL LOAN REPAYMENT PLAN. E.V. Grigorieva. E.N. Khailov DISCRETE AND CONTINUOUS Website: http://aimsciences.org DYNAMICAL SYSTEMS Supplement Volume 2005 pp. 345 354 OPTIMAL CONTROL OF A COMMERCIAL LOAN REPAYMENT PLAN E.V. Grigorieva Department of Mathematics

More information

1 = (a 0 + b 0 α) 2 + + (a m 1 + b m 1 α) 2. for certain elements a 0,..., a m 1, b 0,..., b m 1 of F. Multiplying out, we obtain

1 = (a 0 + b 0 α) 2 + + (a m 1 + b m 1 α) 2. for certain elements a 0,..., a m 1, b 0,..., b m 1 of F. Multiplying out, we obtain Notes on real-closed fields These notes develop the algebraic background needed to understand the model theory of real-closed fields. To understand these notes, a standard graduate course in algebra is

More information

FACTORING POLYNOMIALS IN THE RING OF FORMAL POWER SERIES OVER Z

FACTORING POLYNOMIALS IN THE RING OF FORMAL POWER SERIES OVER Z FACTORING POLYNOMIALS IN THE RING OF FORMAL POWER SERIES OVER Z DANIEL BIRMAJER, JUAN B GIL, AND MICHAEL WEINER Abstract We consider polynomials with integer coefficients and discuss their factorization

More information

Quotient Rings and Field Extensions

Quotient Rings and Field Extensions Chapter 5 Quotient Rings and Field Extensions In this chapter we describe a method for producing field extension of a given field. If F is a field, then a field extension is a field K that contains F.

More information

15.062 Data Mining: Algorithms and Applications Matrix Math Review

15.062 Data Mining: Algorithms and Applications Matrix Math Review .6 Data Mining: Algorithms and Applications Matrix Math Review The purpose of this document is to give a brief review of selected linear algebra concepts that will be useful for the course and to develop

More information

MATH 304 Linear Algebra Lecture 9: Subspaces of vector spaces (continued). Span. Spanning set.

MATH 304 Linear Algebra Lecture 9: Subspaces of vector spaces (continued). Span. Spanning set. MATH 304 Linear Algebra Lecture 9: Subspaces of vector spaces (continued). Span. Spanning set. Vector space A vector space is a set V equipped with two operations, addition V V (x,y) x + y V and scalar

More information

LINEAR ALGEBRA W W L CHEN

LINEAR ALGEBRA W W L CHEN LINEAR ALGEBRA W W L CHEN c W W L Chen, 1997, 2008 This chapter is available free to all individuals, on understanding that it is not to be used for financial gain, and may be downloaded and/or photocopied,

More information

4.5 Linear Dependence and Linear Independence

4.5 Linear Dependence and Linear Independence 4.5 Linear Dependence and Linear Independence 267 32. {v 1, v 2 }, where v 1, v 2 are collinear vectors in R 3. 33. Prove that if S and S are subsets of a vector space V such that S is a subset of S, then

More information

Predictive Control Algorithms: Stability despite Shortened Optimization Horizons

Predictive Control Algorithms: Stability despite Shortened Optimization Horizons Predictive Control Algorithms: Stability despite Shortened Optimization Horizons Philipp Braun Jürgen Pannek Karl Worthmann University of Bayreuth, 9544 Bayreuth, Germany University of the Federal Armed

More information

Proximal mapping via network optimization

Proximal mapping via network optimization L. Vandenberghe EE236C (Spring 23-4) Proximal mapping via network optimization minimum cut and maximum flow problems parametric minimum cut problem application to proximal mapping Introduction this lecture:

More information

MATH 304 Linear Algebra Lecture 20: Inner product spaces. Orthogonal sets.

MATH 304 Linear Algebra Lecture 20: Inner product spaces. Orthogonal sets. MATH 304 Linear Algebra Lecture 20: Inner product spaces. Orthogonal sets. Norm The notion of norm generalizes the notion of length of a vector in R n. Definition. Let V be a vector space. A function α

More information

Lecture 5 Principal Minors and the Hessian

Lecture 5 Principal Minors and the Hessian Lecture 5 Principal Minors and the Hessian Eivind Eriksen BI Norwegian School of Management Department of Economics October 01, 2010 Eivind Eriksen (BI Dept of Economics) Lecture 5 Principal Minors and

More information

Lecture 13 Linear quadratic Lyapunov theory

Lecture 13 Linear quadratic Lyapunov theory EE363 Winter 28-9 Lecture 13 Linear quadratic Lyapunov theory the Lyapunov equation Lyapunov stability conditions the Lyapunov operator and integral evaluating quadratic integrals analysis of ARE discrete-time

More information

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one

More information

Metric Spaces. Chapter 7. 7.1. Metrics

Metric Spaces. Chapter 7. 7.1. Metrics Chapter 7 Metric Spaces A metric space is a set X that has a notion of the distance d(x, y) between every pair of points x, y X. The purpose of this chapter is to introduce metric spaces and give some

More information

PUTNAM TRAINING POLYNOMIALS. Exercises 1. Find a polynomial with integral coefficients whose zeros include 2 + 5.

PUTNAM TRAINING POLYNOMIALS. Exercises 1. Find a polynomial with integral coefficients whose zeros include 2 + 5. PUTNAM TRAINING POLYNOMIALS (Last updated: November 17, 2015) Remark. This is a list of exercises on polynomials. Miguel A. Lerma Exercises 1. Find a polynomial with integral coefficients whose zeros include

More information

Nonlinear Programming Methods.S2 Quadratic Programming

Nonlinear Programming Methods.S2 Quadratic Programming Nonlinear Programming Methods.S2 Quadratic Programming Operations Research Models and Methods Paul A. Jensen and Jonathan F. Bard A linearly constrained optimization problem with a quadratic objective

More information

U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009. Notes on Algebra

U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009. Notes on Algebra U.C. Berkeley CS276: Cryptography Handout 0.1 Luca Trevisan January, 2009 Notes on Algebra These notes contain as little theory as possible, and most results are stated without proof. Any introductory

More information

Using the Theory of Reals in. Analyzing Continuous and Hybrid Systems

Using the Theory of Reals in. Analyzing Continuous and Hybrid Systems Using the Theory of Reals in Analyzing Continuous and Hybrid Systems Ashish Tiwari Computer Science Laboratory (CSL) SRI International (SRI) Menlo Park, CA 94025 Email: ashish.tiwari@sri.com Ashish Tiwari

More information

The Heat Equation. Lectures INF2320 p. 1/88

The Heat Equation. Lectures INF2320 p. 1/88 The Heat Equation Lectures INF232 p. 1/88 Lectures INF232 p. 2/88 The Heat Equation We study the heat equation: u t = u xx for x (,1), t >, (1) u(,t) = u(1,t) = for t >, (2) u(x,) = f(x) for x (,1), (3)

More information

THE FUNDAMENTAL THEOREM OF ARBITRAGE PRICING

THE FUNDAMENTAL THEOREM OF ARBITRAGE PRICING THE FUNDAMENTAL THEOREM OF ARBITRAGE PRICING 1. Introduction The Black-Scholes theory, which is the main subject of this course and its sequel, is based on the Efficient Market Hypothesis, that arbitrages

More information

[Refer Slide Time: 05:10]

[Refer Slide Time: 05:10] Principles of Programming Languages Prof: S. Arun Kumar Department of Computer Science and Engineering Indian Institute of Technology Delhi Lecture no 7 Lecture Title: Syntactic Classes Welcome to lecture

More information

MA651 Topology. Lecture 6. Separation Axioms.

MA651 Topology. Lecture 6. Separation Axioms. MA651 Topology. Lecture 6. Separation Axioms. This text is based on the following books: Fundamental concepts of topology by Peter O Neil Elements of Mathematics: General Topology by Nicolas Bourbaki Counterexamples

More information

Mathematics for Computer Science/Software Engineering. Notes for the course MSM1F3 Dr. R. A. Wilson

Mathematics for Computer Science/Software Engineering. Notes for the course MSM1F3 Dr. R. A. Wilson Mathematics for Computer Science/Software Engineering Notes for the course MSM1F3 Dr. R. A. Wilson October 1996 Chapter 1 Logic Lecture no. 1. We introduce the concept of a proposition, which is a statement

More information

GenOpt (R) Generic Optimization Program User Manual Version 3.0.0β1

GenOpt (R) Generic Optimization Program User Manual Version 3.0.0β1 (R) User Manual Environmental Energy Technologies Division Berkeley, CA 94720 http://simulationresearch.lbl.gov Michael Wetter MWetter@lbl.gov February 20, 2009 Notice: This work was supported by the U.S.

More information

ON COMPLETELY CONTINUOUS INTEGRATION OPERATORS OF A VECTOR MEASURE. 1. Introduction

ON COMPLETELY CONTINUOUS INTEGRATION OPERATORS OF A VECTOR MEASURE. 1. Introduction ON COMPLETELY CONTINUOUS INTEGRATION OPERATORS OF A VECTOR MEASURE J.M. CALABUIG, J. RODRÍGUEZ, AND E.A. SÁNCHEZ-PÉREZ Abstract. Let m be a vector measure taking values in a Banach space X. We prove that

More information

CHAPTER 7 GENERAL PROOF SYSTEMS

CHAPTER 7 GENERAL PROOF SYSTEMS CHAPTER 7 GENERAL PROOF SYSTEMS 1 Introduction Proof systems are built to prove statements. They can be thought as an inference machine with special statements, called provable statements, or sometimes

More information

Notes V General Equilibrium: Positive Theory. 1 Walrasian Equilibrium and Excess Demand

Notes V General Equilibrium: Positive Theory. 1 Walrasian Equilibrium and Excess Demand Notes V General Equilibrium: Positive Theory In this lecture we go on considering a general equilibrium model of a private ownership economy. In contrast to the Notes IV, we focus on positive issues such

More information

Linear Threshold Units

Linear Threshold Units Linear Threshold Units w x hx (... w n x n w We assume that each feature x j and each weight w j is a real number (we will relax this later) We will study three different algorithms for learning linear

More information

Applied Algorithm Design Lecture 5

Applied Algorithm Design Lecture 5 Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design

More information

1 Norms and Vector Spaces

1 Norms and Vector Spaces 008.10.07.01 1 Norms and Vector Spaces Suppose we have a complex vector space V. A norm is a function f : V R which satisfies (i) f(x) 0 for all x V (ii) f(x + y) f(x) + f(y) for all x,y V (iii) f(λx)

More information

MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.

MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1. MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column

More information

The Henstock-Kurzweil-Stieltjes type integral for real functions on a fractal subset of the real line

The Henstock-Kurzweil-Stieltjes type integral for real functions on a fractal subset of the real line The Henstock-Kurzweil-Stieltjes type integral for real functions on a fractal subset of the real line D. Bongiorno, G. Corrao Dipartimento di Ingegneria lettrica, lettronica e delle Telecomunicazioni,

More information

Linear Codes. Chapter 3. 3.1 Basics

Linear Codes. Chapter 3. 3.1 Basics Chapter 3 Linear Codes In order to define codes that we can encode and decode efficiently, we add more structure to the codespace. We shall be mainly interested in linear codes. A linear code of length

More information

CHAPTER SIX IRREDUCIBILITY AND FACTORIZATION 1. BASIC DIVISIBILITY THEORY

CHAPTER SIX IRREDUCIBILITY AND FACTORIZATION 1. BASIC DIVISIBILITY THEORY January 10, 2010 CHAPTER SIX IRREDUCIBILITY AND FACTORIZATION 1. BASIC DIVISIBILITY THEORY The set of polynomials over a field F is a ring, whose structure shares with the ring of integers many characteristics.

More information

IRREDUCIBLE OPERATOR SEMIGROUPS SUCH THAT AB AND BA ARE PROPORTIONAL. 1. Introduction

IRREDUCIBLE OPERATOR SEMIGROUPS SUCH THAT AB AND BA ARE PROPORTIONAL. 1. Introduction IRREDUCIBLE OPERATOR SEMIGROUPS SUCH THAT AB AND BA ARE PROPORTIONAL R. DRNOVŠEK, T. KOŠIR Dedicated to Prof. Heydar Radjavi on the occasion of his seventieth birthday. Abstract. Let S be an irreducible

More information

Computer Graphics. Geometric Modeling. Page 1. Copyright Gotsman, Elber, Barequet, Karni, Sheffer Computer Science - Technion. An Example.

Computer Graphics. Geometric Modeling. Page 1. Copyright Gotsman, Elber, Barequet, Karni, Sheffer Computer Science - Technion. An Example. An Example 2 3 4 Outline Objective: Develop methods and algorithms to mathematically model shape of real world objects Categories: Wire-Frame Representation Object is represented as as a set of points

More information

Research Article Stability Analysis for Higher-Order Adjacent Derivative in Parametrized Vector Optimization

Research Article Stability Analysis for Higher-Order Adjacent Derivative in Parametrized Vector Optimization Hindawi Publishing Corporation Journal of Inequalities and Applications Volume 2010, Article ID 510838, 15 pages doi:10.1155/2010/510838 Research Article Stability Analysis for Higher-Order Adjacent Derivative

More information

Adaptive Control Using Combined Online and Background Learning Neural Network

Adaptive Control Using Combined Online and Background Learning Neural Network Adaptive Control Using Combined Online and Background Learning Neural Network Eric N. Johnson and Seung-Min Oh Abstract A new adaptive neural network (NN control concept is proposed with proof of stability

More information

4 Lyapunov Stability Theory

4 Lyapunov Stability Theory 4 Lyapunov Stability Theory In this section we review the tools of Lyapunov stability theory. These tools will be used in the next section to analyze the stability properties of a robot controller. We

More information

LEARNING OBJECTIVES FOR THIS CHAPTER

LEARNING OBJECTIVES FOR THIS CHAPTER CHAPTER 2 American mathematician Paul Halmos (1916 2006), who in 1942 published the first modern linear algebra book. The title of Halmos s book was the same as the title of this chapter. Finite-Dimensional

More information

µz An Efficient Engine for Fixed points with Constraints

µz An Efficient Engine for Fixed points with Constraints µz An Efficient Engine for Fixed points with Constraints Kryštof Hoder, Nikolaj Bjørner, and Leonardo de Moura Manchester University and Microsoft Research Abstract. The µz tool is a scalable, efficient

More information

Algebra Unpacked Content For the new Common Core standards that will be effective in all North Carolina schools in the 2012-13 school year.

Algebra Unpacked Content For the new Common Core standards that will be effective in all North Carolina schools in the 2012-13 school year. This document is designed to help North Carolina educators teach the Common Core (Standard Course of Study). NCDPI staff are continually updating and improving these tools to better serve teachers. Algebra

More information

Fuzzy Differential Systems and the New Concept of Stability

Fuzzy Differential Systems and the New Concept of Stability Nonlinear Dynamics and Systems Theory, 1(2) (2001) 111 119 Fuzzy Differential Systems and the New Concept of Stability V. Lakshmikantham 1 and S. Leela 2 1 Department of Mathematical Sciences, Florida

More information

s-convexity, model sets and their relation

s-convexity, model sets and their relation s-convexity, model sets and their relation Zuzana Masáková Jiří Patera Edita Pelantová CRM-2639 November 1999 Department of Mathematics, Faculty of Nuclear Science and Physical Engineering, Czech Technical

More information

MOP 2007 Black Group Integer Polynomials Yufei Zhao. Integer Polynomials. June 29, 2007 Yufei Zhao yufeiz@mit.edu

MOP 2007 Black Group Integer Polynomials Yufei Zhao. Integer Polynomials. June 29, 2007 Yufei Zhao yufeiz@mit.edu Integer Polynomials June 9, 007 Yufei Zhao yufeiz@mit.edu We will use Z[x] to denote the ring of polynomials with integer coefficients. We begin by summarizing some of the common approaches used in dealing

More information

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 17 Shannon-Fano-Elias Coding and Introduction to Arithmetic Coding

More information

No: 10 04. Bilkent University. Monotonic Extension. Farhad Husseinov. Discussion Papers. Department of Economics

No: 10 04. Bilkent University. Monotonic Extension. Farhad Husseinov. Discussion Papers. Department of Economics No: 10 04 Bilkent University Monotonic Extension Farhad Husseinov Discussion Papers Department of Economics The Discussion Papers of the Department of Economics are intended to make the initial results

More information

NEW YORK STATE TEACHER CERTIFICATION EXAMINATIONS

NEW YORK STATE TEACHER CERTIFICATION EXAMINATIONS NEW YORK STATE TEACHER CERTIFICATION EXAMINATIONS TEST DESIGN AND FRAMEWORK September 2014 Authorized for Distribution by the New York State Education Department This test design and framework document

More information

Math 4310 Handout - Quotient Vector Spaces

Math 4310 Handout - Quotient Vector Spaces Math 4310 Handout - Quotient Vector Spaces Dan Collins The textbook defines a subspace of a vector space in Chapter 4, but it avoids ever discussing the notion of a quotient space. This is understandable

More information

1 Introduction. Linear Programming. Questions. A general optimization problem is of the form: choose x to. max f(x) subject to x S. where.

1 Introduction. Linear Programming. Questions. A general optimization problem is of the form: choose x to. max f(x) subject to x S. where. Introduction Linear Programming Neil Laws TT 00 A general optimization problem is of the form: choose x to maximise f(x) subject to x S where x = (x,..., x n ) T, f : R n R is the objective function, S

More information

CONSTANT-SIGN SOLUTIONS FOR A NONLINEAR NEUMANN PROBLEM INVOLVING THE DISCRETE p-laplacian. Pasquale Candito and Giuseppina D Aguí

CONSTANT-SIGN SOLUTIONS FOR A NONLINEAR NEUMANN PROBLEM INVOLVING THE DISCRETE p-laplacian. Pasquale Candito and Giuseppina D Aguí Opuscula Math. 34 no. 4 2014 683 690 http://dx.doi.org/10.7494/opmath.2014.34.4.683 Opuscula Mathematica CONSTANT-SIGN SOLUTIONS FOR A NONLINEAR NEUMANN PROBLEM INVOLVING THE DISCRETE p-laplacian Pasquale

More information