DERIVING BISIMULATIONS BY SIMPLIFYING PARTITIONS. Isabella Mastroeni VMCAI Deriving Bisimulations by Simplifying Partitions p.

Size: px
Start display at page:

Download "DERIVING BISIMULATIONS BY SIMPLIFYING PARTITIONS. Isabella Mastroeni VMCAI 2008. Deriving Bisimulations by Simplifying Partitions p."

From this document you will learn the answers to the following questions:

  • What was the main purpose of the Bisimulation?

  • What type of relation did S have?

  • What did the Bisimulations by Simplifying Partitions do?

Transcription

1 DERIVING BISIMULATIONS BY SIMPLIFYING PARTITIONS Isabella Mastroeni VMCAI 2008 Deriving Bisimulations by Simplifying Partitions p.1/15

2 INTRODUCTION INGREDIENTS: BISIMULATION:... compares systems also on their capability of simulating each others. Deriving Bisimulations by Simplifying Partitions p.2/15

3 INTRODUCTION INGREDIENTS: BISIMULATION:... compares systems also on their capability of simulating each others. STABILITY:... requires a bisimulation between a system and one of its abstractions (partitions of states). Deriving Bisimulations by Simplifying Partitions p.2/15

4 INTRODUCTION INGREDIENTS: BISIMULATION:... compares systems also on their capability of simulating each others. STABILITY:... requires a bisimulation between a system and one of its abstractions (partitions of states). COMPLETENESS:... models the precision of an abstract domain wrt an operator. Deriving Bisimulations by Simplifying Partitions p.2/15

5 C bt = [PT = RT GQ[ INTRODUCTION ilar to is im Ano '87] ble Ano ts ta '05] '01, le tcomp te Ano Deriving Bisimulations by Simplifying Partitions p.2/15 INGREDIENTS:

6 C ba = [PT = RT GQ[ INGREDIENTS: INTRODUCTION ilar to is im '87] ble As ta '05] '01, le Acomp te Deriving Bisimulations by Simplifying Partitions p.2/15

7 C ba = [PT = RT GQ[ INGREDIENTS: INTRODUCTION ilar to is im '87] ble As ta '05] '01, le Acomp te Deriving Bisimulations by Simplifying Partitions p.2/15

8 ABSTRACT INTERPRETATION Consider the complete lattice < C,,,,, >, A i uco(c) Lattice of Abstract Domains Lattice uco A ρ(c) < uco(c),,,, λx., λx. x > Deriving Bisimulations by Simplifying Partitions p.3/15

9 ABSTRACT INTERPRETATION Consider the complete lattice < C,,,,, >, A i uco(c) Lattice of Abstract Domains Lattice uco A ρ(c) < uco(c),,,, λx., λx. x > A 1 A 2 A 2 A 1 Deriving Bisimulations by Simplifying Partitions p.3/15

10 ABSTRACT INTERPRETATION Consider the complete lattice < C,,,,, >, A i uco(c) Lattice of Abstract Domains Lattice uco A ρ(c) < uco(c),,,, λx., λx. x > A 1 A 2 A 2 A 1 i A i = M( i A i ) Deriving Bisimulations by Simplifying Partitions p.3/15

11 ABSTRACT INTERPRETATION Consider the complete lattice < C,,,,, >, A i uco(c) Lattice of Abstract Domains Lattice uco A ρ(c) < uco(c),,,, λx., λx. x > A 1 A 2 A 2 A 1 i A i = M( i A i ) i A i = i A i Deriving Bisimulations by Simplifying Partitions p.3/15

12 ABSTRACT INTERPRETATION Consider the complete lattice < C,,,,, >, A i uco(c) Lattice of Abstract Domains Lattice uco A ρ(c) < uco(c),,,, λx., λx. x > A 1 A 2 A 2 A 1 i A i = M( i A i ) i A i = i A i Top: C A x Deriving Bisimulations by Simplifying Partitions p.3/15

13 ABSTRACT INTERPRETATION Consider the complete lattice < C,,,,, >, A i uco(c) Lattice of Abstract Domains Lattice uco A ρ(c) < uco(c),,,, λx., λx. x > A 1 A 2 A 2 A 1 i A i = M( i A i ) i A i = i A i Top: C Bottom: C A A x x x Deriving Bisimulations by Simplifying Partitions p.3/15

14 PARTITIONS VS ABSTRACT DOMAINS Partitions uniquely correspond to particular abstract domains: PARTITIONING [RT 04,HM 05] Deriving Bisimulations by Simplifying Partitions p.4/15

15 PARTITIONS VS ABSTRACT DOMAINS Partitions uniquely correspond to particular abstract domains: PARTITIONING [RT 04,HM 05] η uco( (C)) x,y. x Rel η y iff η(x) = η(y) O Deriving Bisimulations by Simplifying Partitions p.4/15

16 PARTITIONS VS ABSTRACT DOMAINS Partitions uniquely correspond to particular abstract domains: PARTITIONING [RT 04,HM 05] η uco( (C)) x,y. x Rel η y iff η(x) = η(y) O Deriving Bisimulations by Simplifying Partitions p.4/15

17 PARTITIONS VS ABSTRACT DOMAINS Partitions uniquely correspond to particular abstract domains: PARTITIONING [RT 04,HM 05] η uco( (C)) x,y. x Rel η y iff η(x) = η(y) R Eq(C) Clo R (X) def = S x X [x] R O Deriving Bisimulations by Simplifying Partitions p.4/15

18 PARTITIONS VS ABSTRACT DOMAINS Partitions uniquely correspond to particular abstract domains: PARTITIONING [RT 04,HM 05] η uco( (C)) x,y. x Rel η y iff η(x) = η(y) R Eq(C) Clo R (X) def = S x X [x] R Π(η) def = Clo Relη η Deriving Bisimulations by Simplifying Partitions p.4/15

19 COMPLETENESS ρ η BACKWARD COMPLETENESS: η f ρ = η f Deriving Bisimulations by Simplifying Partitions p.5/15

20 COMPLETENESS ρ η BACKWARD IN-COMPLETENESS: η f ρ η f Deriving Bisimulations by Simplifying Partitions p.5/15

21 COMPLETENESS ρ η Making BACKWARD COMPLETE: Refining input domains [GRS 00] Deriving Bisimulations by Simplifying Partitions p.5/15

22 COMPLETENESS ρ η Making BACKWARD COMPLETE: Simplifying output domains [GRS 00] Deriving Bisimulations by Simplifying Partitions p.5/15

23 COMPLETENESS η ρ FORWARD COMPLETENESS: η f ρ = f ρ Deriving Bisimulations by Simplifying Partitions p.5/15

24 COMPLETENESS η ρ FORWARD IN-COMPLETENESS: η f ρ f ρ Deriving Bisimulations by Simplifying Partitions p.5/15

25 COMPLETENESS η ρ Making FORWARD COMPLETE: Refining output domains [GQ 01] Deriving Bisimulations by Simplifying Partitions p.5/15

26 COMPLETENESS η ρ Making FORWARD COMPLETE: Simplifying input domains [GQ 01] Deriving Bisimulations by Simplifying Partitions p.5/15

27 STABILITY Let S and R, resp., an output and an input partition, let p be a binary relation: STABILITY: S is stable wrt R if X S,Y R we have X p(y ) X p(y ) Deriving Bisimulations by Simplifying Partitions p.6/15

28 Y X p STABILITY Let S and R, resp., an output and an input partition, let p be a binary relation: STABILITY: S is stable wrt R if X S,Y R we have X p(y ) X p(y ) Deriving Bisimulations by Simplifying Partitions p.6/15

29 Y p STABILITY Let S and R, resp., an output and an input partition, let p be a binary relation: STABILITY: S is stable wrt R if X S,Y R we have X p(y ) X p(y ) Deriving Bisimulations by Simplifying Partitions p.6/15

30 MAIN CONTRIBUTION WHAT ALREADY EXISTS: A correspondence between stability and forward completeness [RANZATO & TAPPARO 05]; A refinement algorithm for partition stability [PAIGE & TARJAN 87]; A refinement transformer for abstract domain completeness [GIACOBAZZI ET AL. 00, GIACOBAZZI & QUINTARELLI 01]; A simplification transformer for abstract domain completeness [GIACOBAZZI ET AL. 00, GIACOBAZZI & QUINTARELLI 01];; Deriving Bisimulations by Simplifying Partitions p.7/15

31 MAIN CONTRIBUTION WHAT DOES NOT EXIST: A characterization of completeness for partitions; A notion of partition stability/completeness for the backward direction; A simplification algorithm for partition stability Deriving Bisimulations by Simplifying Partitions p.7/15

32 STABILITY VS FORWARD COMPLETENESS F-STABILITY: X f (Y ) X f (Y ) [PT 87,RT 05] Deriving Bisimulations by Simplifying Partitions p.8/15

33 Y R f S f(x ) X STABILITY VS FORWARD COMPLETENESS F-STABILITY: X f (Y ) X f (Y ) [PT 87,RT 05] Deriving Bisimulations by Simplifying Partitions p.8/15

34 Y R f S f(x ) X STABILITY VS FORWARD COMPLETENESS F-STABILITY: X f (Y ) X f (Y ) [PT 87,RT 05] Deriving Bisimulations by Simplifying Partitions p.8/15

35 Y R f S f(x ) X STABILITY VS FORWARD COMPLETENESS F-STABILITY: X f (Y ) X f (Y ) [PT 87,RT 05] F-COMPLETENESS: [f ([x] R )] S = f ([x] R ) Deriving Bisimulations by Simplifying Partitions p.8/15

36 Y R f S f(x ) X CD XD CX BY AB AY f D C X B Y A STABILITY VS FORWARD COMPLETENESS F-STABILITY: X f (Y ) X f (Y ) [PT 87,RT 05] F-COMPLETENESS: [f ([x] R )] S = f ([x] R ) ( X Clo R f (X) Clo S ) Deriving Bisimulations by Simplifying Partitions p.8/15

37 STABILITY VS BACKWARD COMPLETENESS B-STABILITY: X f (Y ) f (Y ) X Deriving Bisimulations by Simplifying Partitions p.9/15

38 R f S f(y ) STABILITY VS BACKWARD COMPLETENESS B-STABILITY: X f (Y ) f (Y ) X Y X Deriving Bisimulations by Simplifying Partitions p.9/15

39 R )X } {Y f S STABILITY VS BACKWARD COMPLETENESS B-STABILITY: X f (Y ) f (Y ) X Y X f(y Deriving Bisimulations by Simplifying Partitions p.9/15

40 R )X } {Y f S STABILITY VS BACKWARD COMPLETENESS B-STABILITY: X f (Y ) f (Y ) X Y X f(y B-COMPLETENESS: [f ([x] R )] S = [f (x)] S Deriving Bisimulations by Simplifying Partitions p.9/15

41 R )X } {Y f S CD XD CX BY AB AY f D C X B Y A STABILITY VS BACKWARD COMPLETENESS B-STABILITY: X f (Y ) f (Y ) X Y X f(y B-COMPLETENESS: { [f ([x] R )] S = [f (x)] S ( X Clo S max Y f (Y ) X } Clo R ) Deriving Bisimulations by Simplifying Partitions p.9/15

42 BACKWARD VS FORWARD A domain is backward complete wrt f iff it is forward complete wrt f + = λx. S { } Y f (Y ) X ; A (not trivial) partition is backward stable wrt f iff it is forward stable wrt { } f 1 = λx. y f (y) X ; If f is injective, a (not trivial) partition is forward stable wrt f iff it is backward stable wrt f 1 ; Deriving Bisimulations by Simplifying Partitions p.10/15

43 BACKWARD VS FORWARD A domain is backward complete wrt f iff it is forward complete wrt f + = λx. S { } Y f (Y ) X ; A (not trivial) partition is backward stable wrt f iff it is forward stable wrt { } f 1 = λx. y f (y) X ; If f is injective, a (not trivial) partition is forward stable wrt f iff it is backward stable wrt f 1 ; A backward problem can always be transformed in a forward one, but the viceversa is not always possible! Deriving Bisimulations by Simplifying Partitions p.10/15

44 REFINING FOR STABILITY: PT GENERALIZED The best refinement towards forward stability always exists! [PT 87] Deriving Bisimulations by Simplifying Partitions p.11/15

45 REFINING FOR STABILITY: PT GENERALIZED The best refinement towards forward stability always exists! [PT 87] Deriving Bisimulations by Simplifying Partitions p.11/15

46 REFINING FOR STABILITY: PT GENERALIZED The best refinement towards forward stability always exists! [PT 87] Deriving Bisimulations by Simplifying Partitions p.11/15

47 REFINING FOR STABILITY: PT GENERALIZED The best refinement towards forward stability always exists! [PT 87] { P : Partition Partition obtained from P by replacing PTSplit f (S, P) : each block B P with B f (S) and B f (S) PTRefiners f (P) def { = S P PTSplit f (S, P) {B i } i P. S = S i B i while (P is not stable) do choose S PTRefiners PT-Algorithm f : f (P); [RT 05] P := PTSplit f (S, P); endwhile } Deriving Bisimulations by Simplifying Partitions p.11/15

48 REFINING FOR STABILITY: PT GENERALIZED The best refinement towards forward stability always exists! [PT 87] The best refinement towards backward stability always exists! Deriving Bisimulations by Simplifying Partitions p.11/15

49 REFINING FOR STABILITY: PT GENERALIZED The best refinement towards forward stability always exists! [PT 87] The best refinement towards backward stability always exists! Deriving Bisimulations by Simplifying Partitions p.11/15

50 REFINING FOR STABILITY: PT GENERALIZED The best refinement towards forward stability always exists! [PT 87] The best refinement towards backward stability always exists! Deriving Bisimulations by Simplifying Partitions p.11/15

51 REFINING FOR STABILITY: PT GENERALIZED The best refinement towards forward stability always exists! [PT 87] The best refinement towards backward stability always exists! We can use the PT algorithm since a backward problem wrt f corresponds always to a forward problem wrt f 1. Deriving Bisimulations by Simplifying Partitions p.11/15

52 SIMPLIFYING FOR STABILITY The best simplification towards backward stability always exists! Deriving Bisimulations by Simplifying Partitions p.12/15

53 SIMPLIFYING FOR STABILITY The best simplification towards backward stability always exists! Deriving Bisimulations by Simplifying Partitions p.12/15

54 SIMPLIFYING FOR STABILITY The best simplification towards backward stability always exists! Deriving Bisimulations by Simplifying Partitions p.12/15

55 SIMPLIFYING FOR STABILITY The best simplification towards backward stability always exists! PTSimplifiers f (S) def { = X PTMerge f (S, P) : X f (S) Partition obtained from P by replacing all the blocks X PTSimplifiers f (S) with S PTSimplifiersf (S) } DPT-Algorithm f : while (P is not stable) do choose S PTSimplifiers f (P); P := PTMerge f (S, P)); endwhile Deriving Bisimulations by Simplifying Partitions p.12/15

56 SIMPLIFYING FOR STABILITY The best simplification towards backward stability always exists! The best simplification towards forward stability DOES NOT always exist! Deriving Bisimulations by Simplifying Partitions p.12/15

57 SIMPLIFYING FOR STABILITY The best simplification towards backward stability always exists! The best simplification towards forward stability DOES NOT always exist! Deriving Bisimulations by Simplifying Partitions p.12/15

58 SIMPLIFYING FOR STABILITY The best simplification towards backward stability always exists! The best simplification towards forward stability DOES NOT always exist! Deriving Bisimulations by Simplifying Partitions p.12/15

59 SIMPLIFYING FOR STABILITY The best simplification towards backward stability always exists! The best simplification towards forward stability DOES NOT always exist! Deriving Bisimulations by Simplifying Partitions p.12/15

60 SIMPLIFYING FOR STABILITY The best simplification towards backward stability always exists! The best simplification towards forward stability DOES NOT always exist! EXAMPLE: Consider f (x) = 2x. is not stable (f ( ) = even ). Consider R = {even, odd} (Parity partition), then even f (odd) since 6 f (3) and even f (odd) since 4 / f (odd) A forward stable simplification does not exist! Deriving Bisimulations by Simplifying Partitions p.12/15

61 STABILITY IN ABSTRACT NON INTERFERENCE ABSTRACT NON INTERFERENCE: [GM 04] Fixed an observation of public input, the variation of private input has not to interfere with the observation of the public output. l 1,l 2 V L,h 1,h 2 V H. η(l 1 ) = η(l 2 ) ρ( P (h 1,l 1 ) L ) = ρ( P (h 2,l 2 ) L ) Deriving Bisimulations by Simplifying Partitions p.13/15

62 STABILITY IN ABSTRACT NON INTERFERENCE ABSTRACT NON INTERFERENCE: [GM 04] Fixed an observation of public input, the variation of private input has not to interfere with the observation of the public output. l 1,l 2 V L,h 1,h 2 V H. η(l 1 ) = η(l 2 ) ρ( P (h 1,l 1 ) L ) = ρ( P (h 2,l 2 ) L ) Let Υ(η(l)) denote the sets of value that has to be indistinguishable by a malicious attacker observing η in input (Υ(η(l)) = P (V H, η(l)) L ). Deriving Bisimulations by Simplifying Partitions p.13/15

63 STABILITY IN ABSTRACT NON INTERFERENCE ABSTRACT NON INTERFERENCE: [GM 04] Fixed an observation of public input, the variation of private input has not to interfere with the observation of the public output. l 1,l 2 V L,h 1,h 2 V H. η(l 1 ) = η(l 2 ) ρ( P (h 1,l 1 ) L ) = ρ( P (h 2,l 2 ) L ) Let Υ(η(l)) denote the sets of value that has to be indistinguishable by a malicious attacker observing η in input (Υ(η(l)) = P (V H, η(l)) L ). Υ(L 1 ) Υ(L 2 ) Deriving Bisimulations by Simplifying Partitions p.13/15

64 STABILITY IN ABSTRACT NON INTERFERENCE ABSTRACT NON INTERFERENCE: [GM 04] Fixed an observation of public input, the variation of private input has not to interfere with the observation of the public output. l 1,l 2 V L,h 1,h 2 V H. η(l 1 ) = η(l 2 ) ρ( P (h 1,l 1 ) L ) = ρ( P (h 2,l 2 ) L ) Let Υ(η(l)) denote the sets of value that has to be indistinguishable by a malicious attacker observing η in input (Υ(η(l)) = P (V H, η(l)) L ). Y Υ(L 1 ) and Υ(L 1 ) Y Υ(L 1 ) Υ(L 2 ) Deriving Bisimulations by Simplifying Partitions p.13/15

65 STABILITY IN ABSTRACT NON INTERFERENCE ABSTRACT NON INTERFERENCE: [GM 04] Fixed an observation of public input, the variation of private input has not to interfere with the observation of the public output. l 1,l 2 V L,h 1,h 2 V H. η(l 1 ) = η(l 2 ) ρ( P (h 1,l 1 ) L ) = ρ( P (h 2,l 2 ) L ) Let Υ(η(l)) denote the sets of value that has to be indistinguishable by a malicious attacker observing η in input (Υ(η(l)) = P (V H, η(l)) L ). THEOREM: The domain { X X is backward stable wrt Υ harmless attacker for deterministic systems. } is the strongest Deriving Bisimulations by Simplifying Partitions p.13/15

66 STABILITY FOR OPACITY OPAQUE PREDICATE: A predicate φ over the semantics of a system, is opaque wrt the observation function obs if, for every execution t 1 satisfying φ there is an execution t 2 which does not satisfy φ, such that obs(t 1 ) =obs(t 2 ). [Bryans et al. 05] Deriving Bisimulations by Simplifying Partitions p.14/15

67 STABILITY FOR OPACITY OPAQUE PREDICATE: A predicate φ over the semantics of a system, is opaque wrt the observation function obs if, for every execution t 1 satisfying φ there is an execution t 2 which does not satisfy φ, such that obs(t 1 ) =obs(t 2 ). [Bryans et al. 05] t. obs(t) φ and obs(t) φ (φ NOT backward stable wrt obs) Deriving Bisimulations by Simplifying Partitions p.14/15

68 STABILITY FOR OPACITY OPAQUE PREDICATE: A predicate φ over the semantics of a system, is opaque wrt the observation function obs if, for every execution t 1 satisfying φ there is an execution t 2 which does not satisfy φ, such that obs(t 1 ) =obs(t 2 ). [Bryans et al. 05] t. obs(t) φ and obs(t) φ (φ NOT backward stable wrt obs) EXAMPLE: φ = 3 (x 3 x), attacker capability α = {Z, 3Z, Z 3Z, } If the attacker can observe the predicate as the bca of all the function composing φ then obs(2) φ = Z φ, while obs(2) φ. Deriving Bisimulations by Simplifying Partitions p.14/15

69 STABILITY FOR OPACITY OPAQUE PREDICATE: A predicate φ over the semantics of a system, is opaque wrt the observation function obs if, for every execution t 1 satisfying φ there is an execution t 2 which does not satisfy φ, such that obs(t 1 ) =obs(t 2 ). [Bryans et al. 05] t. obs(t) φ and obs(t) φ (φ NOT backward stable wrt obs) Completeness can be exploited for certifying the resilience of opaque predicates to reverse engineering; Opacity provides new expectations in seeking domain transformers increasing incompleteness, Deriving Bisimulations by Simplifying Partitions p.14/15

70 DISCUSSION We extend the existing notion of stability (corresponding to forward completeness for partitions) also to the backward direction; We dualize the existing refinement algorithm for stability in order to simplify partitions; The simplification algorithm can be considered for simplifying abstract models in abstract model checking; We show fields of computer science where the new stability notion models existing concepts: The strongest harmless attacker in abstract non-interference [Giacobazzi & Mastroeni 04, Hunt & Mastroeni 05] Opacity for abstract observations of programs Deriving Bisimulations by Simplifying Partitions p.15/15

Static Analysis, Abstract Interpretation and Verification in (Constraint Logic) Programming

Static Analysis, Abstract Interpretation and Verification in (Constraint Logic) Programming Static Analysis, Abstract Interpretation and Verification in (Constraint Logic) Programming Giorgio Delzanno 1, Roberto Giacobazzi 2, and Francesco Ranzato 3 1 Università di Genova, Italy, giorgio@disi.unige.it

More information

Firewall Design: Consistency, Completeness, Compactness

Firewall Design: Consistency, Completeness, Compactness Firewall Design: Consistency, Completeness, Compactness Alex X. Liu alex@cs.utexas.edu Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188, U.S.A. March, 2004 Co-author:

More information

normalisation Goals: Suppose we have a db scheme: is it good? define precise notions of the qualities of a relational database scheme

normalisation Goals: Suppose we have a db scheme: is it good? define precise notions of the qualities of a relational database scheme Goals: Suppose we have a db scheme: is it good? Suppose we have a db scheme derived from an ER diagram: is it good? define precise notions of the qualities of a relational database scheme define algorithms

More information

Linear Maps. Isaiah Lankham, Bruno Nachtergaele, Anne Schilling (February 5, 2007)

Linear Maps. Isaiah Lankham, Bruno Nachtergaele, Anne Schilling (February 5, 2007) MAT067 University of California, Davis Winter 2007 Linear Maps Isaiah Lankham, Bruno Nachtergaele, Anne Schilling (February 5, 2007) As we have discussed in the lecture on What is Linear Algebra? one of

More information

facultad de informática universidad politécnica de madrid

facultad de informática universidad politécnica de madrid facultad de informática universidad politécnica de madrid On the Confluence of CHR Analytical Semantics Rémy Haemmerlé Universidad olitécnica de Madrid & IMDEA Software Institute, Spain TR Number CLI2/2014.0

More information

Geometric Transformations

Geometric Transformations Geometric Transformations Definitions Def: f is a mapping (function) of a set A into a set B if for every element a of A there exists a unique element b of B that is paired with a; this pairing is denoted

More information

Certifying the Security of Android Applications with Cassandra

Certifying the Security of Android Applications with Cassandra 1 15 th International School on Foundations of Software Security and Design August 31 st, 2015, Bertinoro Certifying the Security of Android Applications with Cassandra Steffen Lortz, Heiko Mantel, David

More information

Lecture Notes on Elasticity of Substitution

Lecture Notes on Elasticity of Substitution Lecture Notes on Elasticity of Substitution Ted Bergstrom, UCSB Economics 210A March 3, 2011 Today s featured guest is the elasticity of substitution. Elasticity of a function of a single variable Before

More information

Private Approximation of Clustering and Vertex Cover

Private Approximation of Clustering and Vertex Cover Private Approximation of Clustering and Vertex Cover Amos Beimel, Renen Hallak, and Kobbi Nissim Department of Computer Science, Ben-Gurion University of the Negev Abstract. Private approximation of search

More information

I. GROUPS: BASIC DEFINITIONS AND EXAMPLES

I. GROUPS: BASIC DEFINITIONS AND EXAMPLES I GROUPS: BASIC DEFINITIONS AND EXAMPLES Definition 1: An operation on a set G is a function : G G G Definition 2: A group is a set G which is equipped with an operation and a special element e G, called

More information

discuss how to describe points, lines and planes in 3 space.

discuss how to describe points, lines and planes in 3 space. Chapter 2 3 Space: lines and planes In this chapter we discuss how to describe points, lines and planes in 3 space. introduce the language of vectors. discuss various matters concerning the relative position

More information

Informatique Fondamentale IMA S8

Informatique Fondamentale IMA S8 Informatique Fondamentale IMA S8 Cours 1 - Intro + schedule + finite state machines Laure Gonnord http://laure.gonnord.org/pro/teaching/ Laure.Gonnord@polytech-lille.fr Université Lille 1 - Polytech Lille

More information

Boolean Algebra Part 1

Boolean Algebra Part 1 Boolean Algebra Part 1 Page 1 Boolean Algebra Objectives Understand Basic Boolean Algebra Relate Boolean Algebra to Logic Networks Prove Laws using Truth Tables Understand and Use First Basic Theorems

More information

Lecture 1: Course overview, circuits, and formulas

Lecture 1: Course overview, circuits, and formulas Lecture 1: Course overview, circuits, and formulas Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: John Kim, Ben Lund 1 Course Information Swastik

More information

Models for Quantitative Distributed Systems and Multi-Valued Logics

Models for Quantitative Distributed Systems and Multi-Valued Logics Universität Leipzig Institut für Informatik Models for Quantitative Distributed Systems and Multi-Valued Logics Master Thesis Leipzig, September 2010 Author Supervisor B.Sc. Martin Huschenbett Master Student

More information

ECE 842 Report Implementation of Elliptic Curve Cryptography

ECE 842 Report Implementation of Elliptic Curve Cryptography ECE 842 Report Implementation of Elliptic Curve Cryptography Wei-Yang Lin December 15, 2004 Abstract The aim of this report is to illustrate the issues in implementing a practical elliptic curve cryptographic

More information

Markovian projection for volatility calibration

Markovian projection for volatility calibration cutting edge. calibration Markovian projection for volatility calibration Vladimir Piterbarg looks at the Markovian projection method, a way of obtaining closed-form approximations of European-style option

More information

National Sun Yat-Sen University CSE Course: Information Theory. Gambling And Entropy

National Sun Yat-Sen University CSE Course: Information Theory. Gambling And Entropy Gambling And Entropy 1 Outline There is a strong relationship between the growth rate of investment in a horse race and the entropy of the horse race. The value of side information is related to the mutual

More information

Local periods and binary partial words: An algorithm

Local periods and binary partial words: An algorithm Local periods and binary partial words: An algorithm F. Blanchet-Sadri and Ajay Chriscoe Department of Mathematical Sciences University of North Carolina P.O. Box 26170 Greensboro, NC 27402 6170, USA E-mail:

More information

Magic Sets and their Application to Data Integration

Magic Sets and their Application to Data Integration Magic Sets and their Application to Data Integration Wolfgang Faber, Gianluigi Greco, Nicola Leone Department of Mathematics University of Calabria, Italy {faber,greco,leone}@mat.unical.it Roadmap Motivation:

More information

Left-Handed Completeness

Left-Handed Completeness Left-Handed Completeness Dexter Kozen Computer Science Department Cornell University RAMiCS, September 19, 2012 Joint work with Alexandra Silva Radboud University Nijmegen and CWI Amsterdam Result A new

More information

Econometrics Simple Linear Regression

Econometrics Simple Linear Regression Econometrics Simple Linear Regression Burcu Eke UC3M Linear equations with one variable Recall what a linear equation is: y = b 0 + b 1 x is a linear equation with one variable, or equivalently, a straight

More information

Reducing Clocks in Timed Automata while Preserving Bisimulation

Reducing Clocks in Timed Automata while Preserving Bisimulation Reducing Clocks in Timed Automata while Preserving Bisimulation Shibashis Guha Chinmay Narayan S. Arun-Kumar Indian Institute of Technology Delhi {shibashis, chinmay, sak}@cse.iitd.ac.in arxiv:1404.6613v2

More information

Critical points of once continuously differentiable functions are important because they are the only points that can be local maxima or minima.

Critical points of once continuously differentiable functions are important because they are the only points that can be local maxima or minima. Lecture 0: Convexity and Optimization We say that if f is a once continuously differentiable function on an interval I, and x is a point in the interior of I that x is a critical point of f if f (x) =

More information

UPDATES OF LOGIC PROGRAMS

UPDATES OF LOGIC PROGRAMS Computing and Informatics, Vol. 20, 2001,????, V 2006-Nov-6 UPDATES OF LOGIC PROGRAMS Ján Šefránek Department of Applied Informatics, Faculty of Mathematics, Physics and Informatics, Comenius University,

More information

Imprecise probabilities, bets and functional analytic methods in Łukasiewicz logic.

Imprecise probabilities, bets and functional analytic methods in Łukasiewicz logic. Imprecise probabilities, bets and functional analytic methods in Łukasiewicz logic. Martina Fedel joint work with K.Keimel,F.Montagna,W.Roth Martina Fedel (UNISI) 1 / 32 Goal The goal of this talk is to

More information

26 Ideals and Quotient Rings

26 Ideals and Quotient Rings Arkansas Tech University MATH 4033: Elementary Modern Algebra Dr. Marcel B. Finan 26 Ideals and Quotient Rings In this section we develop some theory of rings that parallels the theory of groups discussed

More information

Line and Polygon Clipping. Foley & Van Dam, Chapter 3

Line and Polygon Clipping. Foley & Van Dam, Chapter 3 Line and Polygon Clipping Foley & Van Dam, Chapter 3 Topics Viewing Transformation Pipeline in 2D Line and polygon clipping Brute force analytic solution Cohen-Sutherland Line Clipping Algorithm Cyrus-Beck

More information

Online Appendix to Stochastic Imitative Game Dynamics with Committed Agents

Online Appendix to Stochastic Imitative Game Dynamics with Committed Agents Online Appendix to Stochastic Imitative Game Dynamics with Committed Agents William H. Sandholm January 6, 22 O.. Imitative protocols, mean dynamics, and equilibrium selection In this section, we consider

More information

Data integration general setting

Data integration general setting Data integration general setting A source schema S: relational schema XML Schema (DTD), etc. A global schema G: could be of many different types too A mapping M between S and G: many ways to specify it,

More information

ALMOST COMMON PRIORS 1. INTRODUCTION

ALMOST COMMON PRIORS 1. INTRODUCTION ALMOST COMMON PRIORS ZIV HELLMAN ABSTRACT. What happens when priors are not common? We introduce a measure for how far a type space is from having a common prior, which we term prior distance. If a type

More information

Relational Database Design

Relational Database Design Relational Database Design To generate a set of relation schemas that allows - to store information without unnecessary redundancy - to retrieve desired information easily Approach - design schema in appropriate

More information

Fabio Patrizi DIS Sapienza - University of Rome

Fabio Patrizi DIS Sapienza - University of Rome Fabio Patrizi DIS Sapienza - University of Rome Overview Introduction to Services The Composition Problem Two frameworks for composition: Non data-aware services Data-aware services Conclusion & Research

More information

19 LINEAR QUADRATIC REGULATOR

19 LINEAR QUADRATIC REGULATOR 19 LINEAR QUADRATIC REGULATOR 19.1 Introduction The simple form of loopshaping in scalar systems does not extend directly to multivariable (MIMO) plants, which are characterized by transfer matrices instead

More information

Lecture 4 on Obfuscation by Partial Evaluation of Distorted Interpreters

Lecture 4 on Obfuscation by Partial Evaluation of Distorted Interpreters Lecture 4 on Obfuscation by Partial Evaluation of Distorted Interpreters Neil D. Jones DIKU, University of Copenhagen (prof. emeritus) Joint work with Roberto Giacobazzi and Isabella Mastroeni University

More information

Software Modeling and Verification

Software Modeling and Verification Software Modeling and Verification Alessandro Aldini DiSBeF - Sezione STI University of Urbino Carlo Bo Italy 3-4 February 2015 Algorithmic verification Correctness problem Is the software/hardware system

More information

Quotient Rings and Field Extensions

Quotient Rings and Field Extensions Chapter 5 Quotient Rings and Field Extensions In this chapter we describe a method for producing field extension of a given field. If F is a field, then a field extension is a field K that contains F.

More information

Simulation-Based Security with Inexhaustible Interactive Turing Machines

Simulation-Based Security with Inexhaustible Interactive Turing Machines Simulation-Based Security with Inexhaustible Interactive Turing Machines Ralf Küsters Institut für Informatik Christian-Albrechts-Universität zu Kiel 24098 Kiel, Germany kuesters@ti.informatik.uni-kiel.de

More information

Real Time Scheduling Basic Concepts. Radek Pelánek

Real Time Scheduling Basic Concepts. Radek Pelánek Real Time Scheduling Basic Concepts Radek Pelánek Basic Elements Model of RT System abstraction focus only on timing constraints idealization (e.g., zero switching time) Basic Elements Basic Notions task

More information

Stochastic Models for Inventory Management at Service Facilities

Stochastic Models for Inventory Management at Service Facilities Stochastic Models for Inventory Management at Service Facilities O. Berman, E. Kim Presented by F. Zoghalchi University of Toronto Rotman School of Management Dec, 2012 Agenda 1 Problem description Deterministic

More information

Binary Number System. 16. Binary Numbers. Base 10 digits: 0 1 2 3 4 5 6 7 8 9. Base 2 digits: 0 1

Binary Number System. 16. Binary Numbers. Base 10 digits: 0 1 2 3 4 5 6 7 8 9. Base 2 digits: 0 1 Binary Number System 1 Base 10 digits: 0 1 2 3 4 5 6 7 8 9 Base 2 digits: 0 1 Recall that in base 10, the digits of a number are just coefficients of powers of the base (10): 417 = 4 * 10 2 + 1 * 10 1

More information

Basic Concepts of Set Theory, Functions and Relations

Basic Concepts of Set Theory, Functions and Relations March 1, 2006 p. 1 Basic Concepts of Set Theory, Functions and Relations 1. Basic Concepts of Set Theory...1 1.1. Sets and elements...1 1.2. Specification of sets...2 1.3. Identity and cardinality...3

More information

Some Essential Statistics The Lure of Statistics

Some Essential Statistics The Lure of Statistics Some Essential Statistics The Lure of Statistics Data Mining Techniques, by M.J.A. Berry and G.S Linoff, 2004 Statistics vs. Data Mining..lie, damn lie, and statistics mining data to support preconceived

More information

ON LIMIT LAWS FOR CENTRAL ORDER STATISTICS UNDER POWER NORMALIZATION. E. I. Pancheva, A. Gacovska-Barandovska

ON LIMIT LAWS FOR CENTRAL ORDER STATISTICS UNDER POWER NORMALIZATION. E. I. Pancheva, A. Gacovska-Barandovska Pliska Stud. Math. Bulgar. 22 (2015), STUDIA MATHEMATICA BULGARICA ON LIMIT LAWS FOR CENTRAL ORDER STATISTICS UNDER POWER NORMALIZATION E. I. Pancheva, A. Gacovska-Barandovska Smirnov (1949) derived four

More information

The Theory of Concept Analysis and Customer Relationship Mining

The Theory of Concept Analysis and Customer Relationship Mining The Application of Association Rule Mining in CRM Based on Formal Concept Analysis HongSheng Xu * and Lan Wang College of Information Technology, Luoyang Normal University, Luoyang, 471022, China xhs_ls@sina.com

More information

Static Analysis. Find the Bug! 15-654: Analysis of Software Artifacts. Jonathan Aldrich. disable interrupts. ERROR: returning with interrupts disabled

Static Analysis. Find the Bug! 15-654: Analysis of Software Artifacts. Jonathan Aldrich. disable interrupts. ERROR: returning with interrupts disabled Static Analysis 15-654: Analysis of Software Artifacts Jonathan Aldrich 1 Find the Bug! Source: Engler et al., Checking System Rules Using System-Specific, Programmer-Written Compiler Extensions, OSDI

More information

Functional Optimization Models for Active Queue Management

Functional Optimization Models for Active Queue Management Functional Optimization Models for Active Queue Management Yixin Chen Department of Computer Science and Engineering Washington University in St Louis 1 Brookings Drive St Louis, MO 63130, USA chen@cse.wustl.edu

More information

Formal Languages and Automata Theory - Regular Expressions and Finite Automata -

Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Samarjit Chakraborty Computer Engineering and Networks Laboratory Swiss Federal Institute of Technology (ETH) Zürich March

More information

Random access protocols for channel access. Markov chains and their stability. Laurent Massoulié.

Random access protocols for channel access. Markov chains and their stability. Laurent Massoulié. Random access protocols for channel access Markov chains and their stability laurent.massoulie@inria.fr Aloha: the first random access protocol for channel access [Abramson, Hawaii 70] Goal: allow machines

More information

RN-coding of Numbers: New Insights and Some Applications

RN-coding of Numbers: New Insights and Some Applications RN-coding of Numbers: New Insights and Some Applications Peter Kornerup Dept. of Mathematics and Computer Science SDU, Odense, Denmark & Jean-Michel Muller LIP/Arénaire (CRNS-ENS Lyon-INRIA-UCBL) Lyon,

More information

1 = (a 0 + b 0 α) 2 + + (a m 1 + b m 1 α) 2. for certain elements a 0,..., a m 1, b 0,..., b m 1 of F. Multiplying out, we obtain

1 = (a 0 + b 0 α) 2 + + (a m 1 + b m 1 α) 2. for certain elements a 0,..., a m 1, b 0,..., b m 1 of F. Multiplying out, we obtain Notes on real-closed fields These notes develop the algebraic background needed to understand the model theory of real-closed fields. To understand these notes, a standard graduate course in algebra is

More information

Lectures notes on orthogonal matrices (with exercises) 92.222 - Linear Algebra II - Spring 2004 by D. Klain

Lectures notes on orthogonal matrices (with exercises) 92.222 - Linear Algebra II - Spring 2004 by D. Klain Lectures notes on orthogonal matrices (with exercises) 92.222 - Linear Algebra II - Spring 2004 by D. Klain 1. Orthogonal matrices and orthonormal sets An n n real-valued matrix A is said to be an orthogonal

More information

Matrix Representations of Linear Transformations and Changes of Coordinates

Matrix Representations of Linear Transformations and Changes of Coordinates Matrix Representations of Linear Transformations and Changes of Coordinates 01 Subspaces and Bases 011 Definitions A subspace V of R n is a subset of R n that contains the zero element and is closed under

More information

A Framework for Measuring Software Obfuscation Resilience Against Automated Attacks

A Framework for Measuring Software Obfuscation Resilience Against Automated Attacks Fakultät für Informatik Technische Universität München A Framework for Measuring Software Obfuscation Resilience Against Automated Attacks Sebastian Banescu, Martín Ochoa and Alexander Pretschner Outline

More information

Software Model Checking. Equivalence Hierarchy

Software Model Checking. Equivalence Hierarchy Software Equivalence Hierarchy Moonzoo Kim CS Dept. KAIST CS750B Software Korea Advanced Institute of Science and Technology Equivalence semantics and SW design Preliminary Hierarchy Diagram Trace-based

More information

Limitations of E-R Designs. Relational Normalization Theory. Redundancy and Other Problems. Redundancy. Anomalies. Example

Limitations of E-R Designs. Relational Normalization Theory. Redundancy and Other Problems. Redundancy. Anomalies. Example Limitations of E-R Designs Relational Normalization Theory Chapter 6 Provides a set of guidelines, does not result in a unique database schema Does not provide a way of evaluating alternative schemas Normalization

More information

Bounded Treewidth in Knowledge Representation and Reasoning 1

Bounded Treewidth in Knowledge Representation and Reasoning 1 Bounded Treewidth in Knowledge Representation and Reasoning 1 Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien Luminy, October 2010 1 Joint work with G.

More information

Statistical Machine Learning

Statistical Machine Learning Statistical Machine Learning UoC Stats 37700, Winter quarter Lecture 4: classical linear and quadratic discriminants. 1 / 25 Linear separation For two classes in R d : simple idea: separate the classes

More information

THE PROBLEM WORMS (1) WORMS (2) THE PROBLEM OF WORM PROPAGATION/PREVENTION THE MINIMUM VERTEX COVER PROBLEM

THE PROBLEM WORMS (1) WORMS (2) THE PROBLEM OF WORM PROPAGATION/PREVENTION THE MINIMUM VERTEX COVER PROBLEM 1 THE PROBLEM OF WORM PROPAGATION/PREVENTION I.E. THE MINIMUM VERTEX COVER PROBLEM Prof. Tiziana Calamoneri Network Algorithms A.y. 2014/15 2 THE PROBLEM WORMS (1)! A computer worm is a standalone malware

More information

Polarization codes and the rate of polarization

Polarization codes and the rate of polarization Polarization codes and the rate of polarization Erdal Arıkan, Emre Telatar Bilkent U., EPFL Sept 10, 2008 Channel Polarization Given a binary input DMC W, i.i.d. uniformly distributed inputs (X 1,...,

More information

6.2 Permutations continued

6.2 Permutations continued 6.2 Permutations continued Theorem A permutation on a finite set A is either a cycle or can be expressed as a product (composition of disjoint cycles. Proof is by (strong induction on the number, r, of

More information

Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption

Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption Ronald Cramer Victor Shoup December 12, 2001 Abstract We present several new and fairly practical public-key

More information

Cartesian Products and Relations

Cartesian Products and Relations Cartesian Products and Relations Definition (Cartesian product) If A and B are sets, the Cartesian product of A and B is the set A B = {(a, b) :(a A) and (b B)}. The following points are worth special

More information

So let us begin our quest to find the holy grail of real analysis.

So let us begin our quest to find the holy grail of real analysis. 1 Section 5.2 The Complete Ordered Field: Purpose of Section We present an axiomatic description of the real numbers as a complete ordered field. The axioms which describe the arithmetic of the real numbers

More information

Hedging Barriers. Liuren Wu. Zicklin School of Business, Baruch College (http://faculty.baruch.cuny.edu/lwu/)

Hedging Barriers. Liuren Wu. Zicklin School of Business, Baruch College (http://faculty.baruch.cuny.edu/lwu/) Hedging Barriers Liuren Wu Zicklin School of Business, Baruch College (http://faculty.baruch.cuny.edu/lwu/) Based on joint work with Peter Carr (Bloomberg) Modeling and Hedging Using FX Options, March

More information

Reliably computing cellular automaton, in 1-sparse noise

Reliably computing cellular automaton, in 1-sparse noise Reliably computing cellular automaton, in 1-sparse noise Peter Gács Boston University Peter Gács (Boston University) TRG Spring 2010 1 / 23 Ths is the second one of a series of three lectures on reliable

More information

Lecture 11: The Goldreich-Levin Theorem

Lecture 11: The Goldreich-Levin Theorem COM S 687 Introduction to Cryptography September 28, 2006 Lecture 11: The Goldreich-Levin Theorem Instructor: Rafael Pass Scribe: Krishnaprasad Vikram Hard-Core Bits Definition: A predicate b : {0, 1}

More information

A Semantic Dissimilarity Measure for Concept Descriptions in Ontological Knowledge Bases

A Semantic Dissimilarity Measure for Concept Descriptions in Ontological Knowledge Bases A Semantic Dissimilarity Measure for Concept Descriptions in Ontological Knowledge Bases Claudia d Amato, Nicola Fanizzi, Floriana Esposito Dipartimento di Informatica, Università degli Studi di Bari Campus

More information

Non-deterministic Semantics and the Undecidability of Boolean BI

Non-deterministic Semantics and the Undecidability of Boolean BI 1 Non-deterministic Semantics and the Undecidability of Boolean BI DOMINIQUE LARCHEY-WENDLING, LORIA CNRS, Nancy, France DIDIER GALMICHE, LORIA Université Henri Poincaré, Nancy, France We solve the open

More information

Methods of Solution of Selected Differential Equations Carol A. Edwards Chandler-Gilbert Community College

Methods of Solution of Selected Differential Equations Carol A. Edwards Chandler-Gilbert Community College Methods of Solution of Selected Differential Equations Carol A. Edwards Chandler-Gilbert Community College Equations of Order One: Mdx + Ndy = 0 1. Separate variables. 2. M, N homogeneous of same degree:

More information

1. Prove that the empty set is a subset of every set.

1. Prove that the empty set is a subset of every set. 1. Prove that the empty set is a subset of every set. Basic Topology Written by Men-Gen Tsai email: b89902089@ntu.edu.tw Proof: For any element x of the empty set, x is also an element of every set since

More information

it is easy to see that α = a

it is easy to see that α = a 21. Polynomial rings Let us now turn out attention to determining the prime elements of a polynomial ring, where the coefficient ring is a field. We already know that such a polynomial ring is a UF. Therefore

More information

Principle of Data Reduction

Principle of Data Reduction Chapter 6 Principle of Data Reduction 6.1 Introduction An experimenter uses the information in a sample X 1,..., X n to make inferences about an unknown parameter θ. If the sample size n is large, then

More information

Goal of the Talk Theorem The class of languages recognisable by T -coalgebra automata is closed under taking complements.

Goal of the Talk Theorem The class of languages recognisable by T -coalgebra automata is closed under taking complements. Complementation of Coalgebra Automata Christian Kissig (University of Leicester) joint work with Yde Venema (Universiteit van Amsterdam) 07 Sept 2009 / Universitá degli Studi di Udine / CALCO 2009 Goal

More information

Chapter 2: Binomial Methods and the Black-Scholes Formula

Chapter 2: Binomial Methods and the Black-Scholes Formula Chapter 2: Binomial Methods and the Black-Scholes Formula 2.1 Binomial Trees We consider a financial market consisting of a bond B t = B(t), a stock S t = S(t), and a call-option C t = C(t), where the

More information

Advanced Cryptography

Advanced Cryptography Family Name:... First Name:... Section:... Advanced Cryptography Final Exam July 18 th, 2006 Start at 9:15, End at 12:00 This document consists of 12 pages. Instructions Electronic devices are not allowed.

More information

Lambda Calculus between Algebra and Topology. Antonino Salibra

Lambda Calculus between Algebra and Topology. Antonino Salibra Lambda Calculus between Algebra and Topology Antonino Salibra Thanks Special thanks to Laboratoire PPS (Univ. Paris Diderot) for supporting my research with financial support and very interesting collaborations

More information

Introduction. Digital Signature

Introduction. Digital Signature Introduction Electronic transactions and activities taken place over Internet need to be protected against all kinds of interference, accidental or malicious. The general task of the information technology

More information

Predicate Logic Review

Predicate Logic Review Predicate Logic Review UC Berkeley, Philosophy 142, Spring 2016 John MacFarlane 1 Grammar A term is an individual constant or a variable. An individual constant is a lowercase letter from the beginning

More information

Theory of turbo machinery / Turbomaskinernas teori. Chapter 4

Theory of turbo machinery / Turbomaskinernas teori. Chapter 4 Theory of turbo machinery / Turbomaskinernas teori Chapter 4 Axial-Flow Turbines: Mean-Line Analyses and Design Power is more certainly retained by wary measures than by daring counsels. (Tacitius, Annals)

More information

Solutions to In-Class Problems Week 4, Mon.

Solutions to In-Class Problems Week 4, Mon. Massachusetts Institute of Technology 6.042J/18.062J, Fall 05: Mathematics for Computer Science September 26 Prof. Albert R. Meyer and Prof. Ronitt Rubinfeld revised September 26, 2005, 1050 minutes Solutions

More information

Sample Test Questions

Sample Test Questions mathematics College Algebra Geometry Trigonometry Sample Test Questions A Guide for Students and Parents act.org/compass Note to Students Welcome to the ACT Compass Sample Mathematics Test! You are about

More information

PYTHAGOREAN TRIPLES KEITH CONRAD

PYTHAGOREAN TRIPLES KEITH CONRAD PYTHAGOREAN TRIPLES KEITH CONRAD 1. Introduction A Pythagorean triple is a triple of positive integers (a, b, c) where a + b = c. Examples include (3, 4, 5), (5, 1, 13), and (8, 15, 17). Below is an ancient

More information

Lecture 13 - Basic Number Theory.

Lecture 13 - Basic Number Theory. Lecture 13 - Basic Number Theory. Boaz Barak March 22, 2010 Divisibility and primes Unless mentioned otherwise throughout this lecture all numbers are non-negative integers. We say that A divides B, denoted

More information

Fundamentals of Statistical Physics Leo P. Kadanoff University of Chicago, USA

Fundamentals of Statistical Physics Leo P. Kadanoff University of Chicago, USA Fundamentals of Statistical Physics Leo P. Kadanoff University of Chicago, USA text: Statistical Physics, Statics, Dynamics, Renormalization Leo Kadanoff I also referred often to Wikipedia and found it

More information

An Hybrid Optimization Method For Risk Measure Reduction Of A Credit Portfolio Under Constraints

An Hybrid Optimization Method For Risk Measure Reduction Of A Credit Portfolio Under Constraints An Hybrid Optimization Method For Risk Measure Reduction Of A Credit Portfolio Under Constraints Ivorra Benjamin & Mohammadi Bijan Montpellier 2 University Quibel Guillaume, Tehraoui Rim & Delcourt Sebastien

More information

Abstract Simulation: a Static Analysis of Simulink Models

Abstract Simulation: a Static Analysis of Simulink Models Abstract Simulation: a Static Analysis of Simulink Models Alexandre Chapoutot LIP6 Université Pierre et Marie Curie 4, place Jussieu F75252 Paris Cedex 05, France Email: alexandre.chapoutot@lip6.fr Matthieu

More information

Additional sources Compilation of sources: http://lrs.ed.uiuc.edu/tseportal/datacollectionmethodologies/jin-tselink/tselink.htm

Additional sources Compilation of sources: http://lrs.ed.uiuc.edu/tseportal/datacollectionmethodologies/jin-tselink/tselink.htm Mgt 540 Research Methods Data Analysis 1 Additional sources Compilation of sources: http://lrs.ed.uiuc.edu/tseportal/datacollectionmethodologies/jin-tselink/tselink.htm http://web.utk.edu/~dap/random/order/start.htm

More information

Basics of Statistical Machine Learning

Basics of Statistical Machine Learning CS761 Spring 2013 Advanced Machine Learning Basics of Statistical Machine Learning Lecturer: Xiaojin Zhu jerryzhu@cs.wisc.edu Modern machine learning is rooted in statistics. You will find many familiar

More information

Procedure for Marine Traffic Simulation with AIS Data

Procedure for Marine Traffic Simulation with AIS Data http://www.transnav.eu the International Journal on Marine Navigation and Safety of Sea Transportation Volume 9 Number 1 March 2015 DOI: 10.12716/1001.09.01.07 Procedure for Marine Traffic Simulation with

More information

a 11 x 1 + a 12 x 2 + + a 1n x n = b 1 a 21 x 1 + a 22 x 2 + + a 2n x n = b 2.

a 11 x 1 + a 12 x 2 + + a 1n x n = b 1 a 21 x 1 + a 22 x 2 + + a 2n x n = b 2. Chapter 1 LINEAR EQUATIONS 1.1 Introduction to linear equations A linear equation in n unknowns x 1, x,, x n is an equation of the form a 1 x 1 + a x + + a n x n = b, where a 1, a,..., a n, b are given

More information

Post-Quantum Cryptography #4

Post-Quantum Cryptography #4 Post-Quantum Cryptography #4 Prof. Claude Crépeau McGill University http://crypto.cs.mcgill.ca/~crepeau/waterloo 185 ( 186 Attack scenarios Ciphertext-only attack: This is the most basic type of attack

More information

Fuzzy Differential Systems and the New Concept of Stability

Fuzzy Differential Systems and the New Concept of Stability Nonlinear Dynamics and Systems Theory, 1(2) (2001) 111 119 Fuzzy Differential Systems and the New Concept of Stability V. Lakshmikantham 1 and S. Leela 2 1 Department of Mathematical Sciences, Florida

More information

A glimpse of combinatorics on words

A glimpse of combinatorics on words A glimpse of combinatorics on words Benny George K Tata Institute of Fundamental Research,Mumbai India Indo Russian Workshop 2008 Ural State Univeristy Kenkireth TIFR (INDIA) A glimpse of combinatorics

More information

Week 1: Introduction to Online Learning

Week 1: Introduction to Online Learning Week 1: Introduction to Online Learning 1 Introduction This is written based on Prediction, Learning, and Games (ISBN: 2184189 / -21-8418-9 Cesa-Bianchi, Nicolo; Lugosi, Gabor 1.1 A Gentle Start Consider

More information

INCIDENCE-BETWEENNESS GEOMETRY

INCIDENCE-BETWEENNESS GEOMETRY INCIDENCE-BETWEENNESS GEOMETRY MATH 410, CSUSM. SPRING 2008. PROFESSOR AITKEN This document covers the geometry that can be developed with just the axioms related to incidence and betweenness. The full

More information

THREE DIMENSIONAL GEOMETRY

THREE DIMENSIONAL GEOMETRY Chapter 8 THREE DIMENSIONAL GEOMETRY 8.1 Introduction In this chapter we present a vector algebra approach to three dimensional geometry. The aim is to present standard properties of lines and planes,

More information

An Overview of Integer Factoring Algorithms. The Problem

An Overview of Integer Factoring Algorithms. The Problem An Overview of Integer Factoring Algorithms Manindra Agrawal IITK / NUS The Problem Given an integer n, find all its prime divisors as efficiently as possible. 1 A Difficult Problem No efficient algorithm

More information

Exact Inference for Gaussian Process Regression in case of Big Data with the Cartesian Product Structure

Exact Inference for Gaussian Process Regression in case of Big Data with the Cartesian Product Structure Exact Inference for Gaussian Process Regression in case of Big Data with the Cartesian Product Structure Belyaev Mikhail 1,2,3, Burnaev Evgeny 1,2,3, Kapushev Yermek 1,2 1 Institute for Information Transmission

More information

Intrinsic Aging and Classes of Nonparametric Distributions Rhonda Righter Department of Industrial Engineering and Operations Research University of

Intrinsic Aging and Classes of Nonparametric Distributions Rhonda Righter Department of Industrial Engineering and Operations Research University of Intrinsic Aging and Classes of Nonparametric Distributions Rhonda Righter Department of Industrial Engineering and Operations Research University of California Berkeley, CA 94720 U.S.A. Moshe Shaked Department

More information