DERIVING BISIMULATIONS BY SIMPLIFYING PARTITIONS. Isabella Mastroeni VMCAI Deriving Bisimulations by Simplifying Partitions p.
|
|
- Dustin Martin
- 3 years ago
- Views:
From this document you will learn the answers to the following questions:
What was the main purpose of the Bisimulation?
What type of relation did S have?
What did the Bisimulations by Simplifying Partitions do?
Transcription
1 DERIVING BISIMULATIONS BY SIMPLIFYING PARTITIONS Isabella Mastroeni VMCAI 2008 Deriving Bisimulations by Simplifying Partitions p.1/15
2 INTRODUCTION INGREDIENTS: BISIMULATION:... compares systems also on their capability of simulating each others. Deriving Bisimulations by Simplifying Partitions p.2/15
3 INTRODUCTION INGREDIENTS: BISIMULATION:... compares systems also on their capability of simulating each others. STABILITY:... requires a bisimulation between a system and one of its abstractions (partitions of states). Deriving Bisimulations by Simplifying Partitions p.2/15
4 INTRODUCTION INGREDIENTS: BISIMULATION:... compares systems also on their capability of simulating each others. STABILITY:... requires a bisimulation between a system and one of its abstractions (partitions of states). COMPLETENESS:... models the precision of an abstract domain wrt an operator. Deriving Bisimulations by Simplifying Partitions p.2/15
5 C bt = [PT = RT GQ[ INTRODUCTION ilar to is im Ano '87] ble Ano ts ta '05] '01, le tcomp te Ano Deriving Bisimulations by Simplifying Partitions p.2/15 INGREDIENTS:
6 C ba = [PT = RT GQ[ INGREDIENTS: INTRODUCTION ilar to is im '87] ble As ta '05] '01, le Acomp te Deriving Bisimulations by Simplifying Partitions p.2/15
7 C ba = [PT = RT GQ[ INGREDIENTS: INTRODUCTION ilar to is im '87] ble As ta '05] '01, le Acomp te Deriving Bisimulations by Simplifying Partitions p.2/15
8 ABSTRACT INTERPRETATION Consider the complete lattice < C,,,,, >, A i uco(c) Lattice of Abstract Domains Lattice uco A ρ(c) < uco(c),,,, λx., λx. x > Deriving Bisimulations by Simplifying Partitions p.3/15
9 ABSTRACT INTERPRETATION Consider the complete lattice < C,,,,, >, A i uco(c) Lattice of Abstract Domains Lattice uco A ρ(c) < uco(c),,,, λx., λx. x > A 1 A 2 A 2 A 1 Deriving Bisimulations by Simplifying Partitions p.3/15
10 ABSTRACT INTERPRETATION Consider the complete lattice < C,,,,, >, A i uco(c) Lattice of Abstract Domains Lattice uco A ρ(c) < uco(c),,,, λx., λx. x > A 1 A 2 A 2 A 1 i A i = M( i A i ) Deriving Bisimulations by Simplifying Partitions p.3/15
11 ABSTRACT INTERPRETATION Consider the complete lattice < C,,,,, >, A i uco(c) Lattice of Abstract Domains Lattice uco A ρ(c) < uco(c),,,, λx., λx. x > A 1 A 2 A 2 A 1 i A i = M( i A i ) i A i = i A i Deriving Bisimulations by Simplifying Partitions p.3/15
12 ABSTRACT INTERPRETATION Consider the complete lattice < C,,,,, >, A i uco(c) Lattice of Abstract Domains Lattice uco A ρ(c) < uco(c),,,, λx., λx. x > A 1 A 2 A 2 A 1 i A i = M( i A i ) i A i = i A i Top: C A x Deriving Bisimulations by Simplifying Partitions p.3/15
13 ABSTRACT INTERPRETATION Consider the complete lattice < C,,,,, >, A i uco(c) Lattice of Abstract Domains Lattice uco A ρ(c) < uco(c),,,, λx., λx. x > A 1 A 2 A 2 A 1 i A i = M( i A i ) i A i = i A i Top: C Bottom: C A A x x x Deriving Bisimulations by Simplifying Partitions p.3/15
14 PARTITIONS VS ABSTRACT DOMAINS Partitions uniquely correspond to particular abstract domains: PARTITIONING [RT 04,HM 05] Deriving Bisimulations by Simplifying Partitions p.4/15
15 PARTITIONS VS ABSTRACT DOMAINS Partitions uniquely correspond to particular abstract domains: PARTITIONING [RT 04,HM 05] η uco( (C)) x,y. x Rel η y iff η(x) = η(y) O Deriving Bisimulations by Simplifying Partitions p.4/15
16 PARTITIONS VS ABSTRACT DOMAINS Partitions uniquely correspond to particular abstract domains: PARTITIONING [RT 04,HM 05] η uco( (C)) x,y. x Rel η y iff η(x) = η(y) O Deriving Bisimulations by Simplifying Partitions p.4/15
17 PARTITIONS VS ABSTRACT DOMAINS Partitions uniquely correspond to particular abstract domains: PARTITIONING [RT 04,HM 05] η uco( (C)) x,y. x Rel η y iff η(x) = η(y) R Eq(C) Clo R (X) def = S x X [x] R O Deriving Bisimulations by Simplifying Partitions p.4/15
18 PARTITIONS VS ABSTRACT DOMAINS Partitions uniquely correspond to particular abstract domains: PARTITIONING [RT 04,HM 05] η uco( (C)) x,y. x Rel η y iff η(x) = η(y) R Eq(C) Clo R (X) def = S x X [x] R Π(η) def = Clo Relη η Deriving Bisimulations by Simplifying Partitions p.4/15
19 COMPLETENESS ρ η BACKWARD COMPLETENESS: η f ρ = η f Deriving Bisimulations by Simplifying Partitions p.5/15
20 COMPLETENESS ρ η BACKWARD IN-COMPLETENESS: η f ρ η f Deriving Bisimulations by Simplifying Partitions p.5/15
21 COMPLETENESS ρ η Making BACKWARD COMPLETE: Refining input domains [GRS 00] Deriving Bisimulations by Simplifying Partitions p.5/15
22 COMPLETENESS ρ η Making BACKWARD COMPLETE: Simplifying output domains [GRS 00] Deriving Bisimulations by Simplifying Partitions p.5/15
23 COMPLETENESS η ρ FORWARD COMPLETENESS: η f ρ = f ρ Deriving Bisimulations by Simplifying Partitions p.5/15
24 COMPLETENESS η ρ FORWARD IN-COMPLETENESS: η f ρ f ρ Deriving Bisimulations by Simplifying Partitions p.5/15
25 COMPLETENESS η ρ Making FORWARD COMPLETE: Refining output domains [GQ 01] Deriving Bisimulations by Simplifying Partitions p.5/15
26 COMPLETENESS η ρ Making FORWARD COMPLETE: Simplifying input domains [GQ 01] Deriving Bisimulations by Simplifying Partitions p.5/15
27 STABILITY Let S and R, resp., an output and an input partition, let p be a binary relation: STABILITY: S is stable wrt R if X S,Y R we have X p(y ) X p(y ) Deriving Bisimulations by Simplifying Partitions p.6/15
28 Y X p STABILITY Let S and R, resp., an output and an input partition, let p be a binary relation: STABILITY: S is stable wrt R if X S,Y R we have X p(y ) X p(y ) Deriving Bisimulations by Simplifying Partitions p.6/15
29 Y p STABILITY Let S and R, resp., an output and an input partition, let p be a binary relation: STABILITY: S is stable wrt R if X S,Y R we have X p(y ) X p(y ) Deriving Bisimulations by Simplifying Partitions p.6/15
30 MAIN CONTRIBUTION WHAT ALREADY EXISTS: A correspondence between stability and forward completeness [RANZATO & TAPPARO 05]; A refinement algorithm for partition stability [PAIGE & TARJAN 87]; A refinement transformer for abstract domain completeness [GIACOBAZZI ET AL. 00, GIACOBAZZI & QUINTARELLI 01]; A simplification transformer for abstract domain completeness [GIACOBAZZI ET AL. 00, GIACOBAZZI & QUINTARELLI 01];; Deriving Bisimulations by Simplifying Partitions p.7/15
31 MAIN CONTRIBUTION WHAT DOES NOT EXIST: A characterization of completeness for partitions; A notion of partition stability/completeness for the backward direction; A simplification algorithm for partition stability Deriving Bisimulations by Simplifying Partitions p.7/15
32 STABILITY VS FORWARD COMPLETENESS F-STABILITY: X f (Y ) X f (Y ) [PT 87,RT 05] Deriving Bisimulations by Simplifying Partitions p.8/15
33 Y R f S f(x ) X STABILITY VS FORWARD COMPLETENESS F-STABILITY: X f (Y ) X f (Y ) [PT 87,RT 05] Deriving Bisimulations by Simplifying Partitions p.8/15
34 Y R f S f(x ) X STABILITY VS FORWARD COMPLETENESS F-STABILITY: X f (Y ) X f (Y ) [PT 87,RT 05] Deriving Bisimulations by Simplifying Partitions p.8/15
35 Y R f S f(x ) X STABILITY VS FORWARD COMPLETENESS F-STABILITY: X f (Y ) X f (Y ) [PT 87,RT 05] F-COMPLETENESS: [f ([x] R )] S = f ([x] R ) Deriving Bisimulations by Simplifying Partitions p.8/15
36 Y R f S f(x ) X CD XD CX BY AB AY f D C X B Y A STABILITY VS FORWARD COMPLETENESS F-STABILITY: X f (Y ) X f (Y ) [PT 87,RT 05] F-COMPLETENESS: [f ([x] R )] S = f ([x] R ) ( X Clo R f (X) Clo S ) Deriving Bisimulations by Simplifying Partitions p.8/15
37 STABILITY VS BACKWARD COMPLETENESS B-STABILITY: X f (Y ) f (Y ) X Deriving Bisimulations by Simplifying Partitions p.9/15
38 R f S f(y ) STABILITY VS BACKWARD COMPLETENESS B-STABILITY: X f (Y ) f (Y ) X Y X Deriving Bisimulations by Simplifying Partitions p.9/15
39 R )X } {Y f S STABILITY VS BACKWARD COMPLETENESS B-STABILITY: X f (Y ) f (Y ) X Y X f(y Deriving Bisimulations by Simplifying Partitions p.9/15
40 R )X } {Y f S STABILITY VS BACKWARD COMPLETENESS B-STABILITY: X f (Y ) f (Y ) X Y X f(y B-COMPLETENESS: [f ([x] R )] S = [f (x)] S Deriving Bisimulations by Simplifying Partitions p.9/15
41 R )X } {Y f S CD XD CX BY AB AY f D C X B Y A STABILITY VS BACKWARD COMPLETENESS B-STABILITY: X f (Y ) f (Y ) X Y X f(y B-COMPLETENESS: { [f ([x] R )] S = [f (x)] S ( X Clo S max Y f (Y ) X } Clo R ) Deriving Bisimulations by Simplifying Partitions p.9/15
42 BACKWARD VS FORWARD A domain is backward complete wrt f iff it is forward complete wrt f + = λx. S { } Y f (Y ) X ; A (not trivial) partition is backward stable wrt f iff it is forward stable wrt { } f 1 = λx. y f (y) X ; If f is injective, a (not trivial) partition is forward stable wrt f iff it is backward stable wrt f 1 ; Deriving Bisimulations by Simplifying Partitions p.10/15
43 BACKWARD VS FORWARD A domain is backward complete wrt f iff it is forward complete wrt f + = λx. S { } Y f (Y ) X ; A (not trivial) partition is backward stable wrt f iff it is forward stable wrt { } f 1 = λx. y f (y) X ; If f is injective, a (not trivial) partition is forward stable wrt f iff it is backward stable wrt f 1 ; A backward problem can always be transformed in a forward one, but the viceversa is not always possible! Deriving Bisimulations by Simplifying Partitions p.10/15
44 REFINING FOR STABILITY: PT GENERALIZED The best refinement towards forward stability always exists! [PT 87] Deriving Bisimulations by Simplifying Partitions p.11/15
45 REFINING FOR STABILITY: PT GENERALIZED The best refinement towards forward stability always exists! [PT 87] Deriving Bisimulations by Simplifying Partitions p.11/15
46 REFINING FOR STABILITY: PT GENERALIZED The best refinement towards forward stability always exists! [PT 87] Deriving Bisimulations by Simplifying Partitions p.11/15
47 REFINING FOR STABILITY: PT GENERALIZED The best refinement towards forward stability always exists! [PT 87] { P : Partition Partition obtained from P by replacing PTSplit f (S, P) : each block B P with B f (S) and B f (S) PTRefiners f (P) def { = S P PTSplit f (S, P) {B i } i P. S = S i B i while (P is not stable) do choose S PTRefiners PT-Algorithm f : f (P); [RT 05] P := PTSplit f (S, P); endwhile } Deriving Bisimulations by Simplifying Partitions p.11/15
48 REFINING FOR STABILITY: PT GENERALIZED The best refinement towards forward stability always exists! [PT 87] The best refinement towards backward stability always exists! Deriving Bisimulations by Simplifying Partitions p.11/15
49 REFINING FOR STABILITY: PT GENERALIZED The best refinement towards forward stability always exists! [PT 87] The best refinement towards backward stability always exists! Deriving Bisimulations by Simplifying Partitions p.11/15
50 REFINING FOR STABILITY: PT GENERALIZED The best refinement towards forward stability always exists! [PT 87] The best refinement towards backward stability always exists! Deriving Bisimulations by Simplifying Partitions p.11/15
51 REFINING FOR STABILITY: PT GENERALIZED The best refinement towards forward stability always exists! [PT 87] The best refinement towards backward stability always exists! We can use the PT algorithm since a backward problem wrt f corresponds always to a forward problem wrt f 1. Deriving Bisimulations by Simplifying Partitions p.11/15
52 SIMPLIFYING FOR STABILITY The best simplification towards backward stability always exists! Deriving Bisimulations by Simplifying Partitions p.12/15
53 SIMPLIFYING FOR STABILITY The best simplification towards backward stability always exists! Deriving Bisimulations by Simplifying Partitions p.12/15
54 SIMPLIFYING FOR STABILITY The best simplification towards backward stability always exists! Deriving Bisimulations by Simplifying Partitions p.12/15
55 SIMPLIFYING FOR STABILITY The best simplification towards backward stability always exists! PTSimplifiers f (S) def { = X PTMerge f (S, P) : X f (S) Partition obtained from P by replacing all the blocks X PTSimplifiers f (S) with S PTSimplifiersf (S) } DPT-Algorithm f : while (P is not stable) do choose S PTSimplifiers f (P); P := PTMerge f (S, P)); endwhile Deriving Bisimulations by Simplifying Partitions p.12/15
56 SIMPLIFYING FOR STABILITY The best simplification towards backward stability always exists! The best simplification towards forward stability DOES NOT always exist! Deriving Bisimulations by Simplifying Partitions p.12/15
57 SIMPLIFYING FOR STABILITY The best simplification towards backward stability always exists! The best simplification towards forward stability DOES NOT always exist! Deriving Bisimulations by Simplifying Partitions p.12/15
58 SIMPLIFYING FOR STABILITY The best simplification towards backward stability always exists! The best simplification towards forward stability DOES NOT always exist! Deriving Bisimulations by Simplifying Partitions p.12/15
59 SIMPLIFYING FOR STABILITY The best simplification towards backward stability always exists! The best simplification towards forward stability DOES NOT always exist! Deriving Bisimulations by Simplifying Partitions p.12/15
60 SIMPLIFYING FOR STABILITY The best simplification towards backward stability always exists! The best simplification towards forward stability DOES NOT always exist! EXAMPLE: Consider f (x) = 2x. is not stable (f ( ) = even ). Consider R = {even, odd} (Parity partition), then even f (odd) since 6 f (3) and even f (odd) since 4 / f (odd) A forward stable simplification does not exist! Deriving Bisimulations by Simplifying Partitions p.12/15
61 STABILITY IN ABSTRACT NON INTERFERENCE ABSTRACT NON INTERFERENCE: [GM 04] Fixed an observation of public input, the variation of private input has not to interfere with the observation of the public output. l 1,l 2 V L,h 1,h 2 V H. η(l 1 ) = η(l 2 ) ρ( P (h 1,l 1 ) L ) = ρ( P (h 2,l 2 ) L ) Deriving Bisimulations by Simplifying Partitions p.13/15
62 STABILITY IN ABSTRACT NON INTERFERENCE ABSTRACT NON INTERFERENCE: [GM 04] Fixed an observation of public input, the variation of private input has not to interfere with the observation of the public output. l 1,l 2 V L,h 1,h 2 V H. η(l 1 ) = η(l 2 ) ρ( P (h 1,l 1 ) L ) = ρ( P (h 2,l 2 ) L ) Let Υ(η(l)) denote the sets of value that has to be indistinguishable by a malicious attacker observing η in input (Υ(η(l)) = P (V H, η(l)) L ). Deriving Bisimulations by Simplifying Partitions p.13/15
63 STABILITY IN ABSTRACT NON INTERFERENCE ABSTRACT NON INTERFERENCE: [GM 04] Fixed an observation of public input, the variation of private input has not to interfere with the observation of the public output. l 1,l 2 V L,h 1,h 2 V H. η(l 1 ) = η(l 2 ) ρ( P (h 1,l 1 ) L ) = ρ( P (h 2,l 2 ) L ) Let Υ(η(l)) denote the sets of value that has to be indistinguishable by a malicious attacker observing η in input (Υ(η(l)) = P (V H, η(l)) L ). Υ(L 1 ) Υ(L 2 ) Deriving Bisimulations by Simplifying Partitions p.13/15
64 STABILITY IN ABSTRACT NON INTERFERENCE ABSTRACT NON INTERFERENCE: [GM 04] Fixed an observation of public input, the variation of private input has not to interfere with the observation of the public output. l 1,l 2 V L,h 1,h 2 V H. η(l 1 ) = η(l 2 ) ρ( P (h 1,l 1 ) L ) = ρ( P (h 2,l 2 ) L ) Let Υ(η(l)) denote the sets of value that has to be indistinguishable by a malicious attacker observing η in input (Υ(η(l)) = P (V H, η(l)) L ). Y Υ(L 1 ) and Υ(L 1 ) Y Υ(L 1 ) Υ(L 2 ) Deriving Bisimulations by Simplifying Partitions p.13/15
65 STABILITY IN ABSTRACT NON INTERFERENCE ABSTRACT NON INTERFERENCE: [GM 04] Fixed an observation of public input, the variation of private input has not to interfere with the observation of the public output. l 1,l 2 V L,h 1,h 2 V H. η(l 1 ) = η(l 2 ) ρ( P (h 1,l 1 ) L ) = ρ( P (h 2,l 2 ) L ) Let Υ(η(l)) denote the sets of value that has to be indistinguishable by a malicious attacker observing η in input (Υ(η(l)) = P (V H, η(l)) L ). THEOREM: The domain { X X is backward stable wrt Υ harmless attacker for deterministic systems. } is the strongest Deriving Bisimulations by Simplifying Partitions p.13/15
66 STABILITY FOR OPACITY OPAQUE PREDICATE: A predicate φ over the semantics of a system, is opaque wrt the observation function obs if, for every execution t 1 satisfying φ there is an execution t 2 which does not satisfy φ, such that obs(t 1 ) =obs(t 2 ). [Bryans et al. 05] Deriving Bisimulations by Simplifying Partitions p.14/15
67 STABILITY FOR OPACITY OPAQUE PREDICATE: A predicate φ over the semantics of a system, is opaque wrt the observation function obs if, for every execution t 1 satisfying φ there is an execution t 2 which does not satisfy φ, such that obs(t 1 ) =obs(t 2 ). [Bryans et al. 05] t. obs(t) φ and obs(t) φ (φ NOT backward stable wrt obs) Deriving Bisimulations by Simplifying Partitions p.14/15
68 STABILITY FOR OPACITY OPAQUE PREDICATE: A predicate φ over the semantics of a system, is opaque wrt the observation function obs if, for every execution t 1 satisfying φ there is an execution t 2 which does not satisfy φ, such that obs(t 1 ) =obs(t 2 ). [Bryans et al. 05] t. obs(t) φ and obs(t) φ (φ NOT backward stable wrt obs) EXAMPLE: φ = 3 (x 3 x), attacker capability α = {Z, 3Z, Z 3Z, } If the attacker can observe the predicate as the bca of all the function composing φ then obs(2) φ = Z φ, while obs(2) φ. Deriving Bisimulations by Simplifying Partitions p.14/15
69 STABILITY FOR OPACITY OPAQUE PREDICATE: A predicate φ over the semantics of a system, is opaque wrt the observation function obs if, for every execution t 1 satisfying φ there is an execution t 2 which does not satisfy φ, such that obs(t 1 ) =obs(t 2 ). [Bryans et al. 05] t. obs(t) φ and obs(t) φ (φ NOT backward stable wrt obs) Completeness can be exploited for certifying the resilience of opaque predicates to reverse engineering; Opacity provides new expectations in seeking domain transformers increasing incompleteness, Deriving Bisimulations by Simplifying Partitions p.14/15
70 DISCUSSION We extend the existing notion of stability (corresponding to forward completeness for partitions) also to the backward direction; We dualize the existing refinement algorithm for stability in order to simplify partitions; The simplification algorithm can be considered for simplifying abstract models in abstract model checking; We show fields of computer science where the new stability notion models existing concepts: The strongest harmless attacker in abstract non-interference [Giacobazzi & Mastroeni 04, Hunt & Mastroeni 05] Opacity for abstract observations of programs Deriving Bisimulations by Simplifying Partitions p.15/15
Static Analysis, Abstract Interpretation and Verification in (Constraint Logic) Programming
Static Analysis, Abstract Interpretation and Verification in (Constraint Logic) Programming Giorgio Delzanno 1, Roberto Giacobazzi 2, and Francesco Ranzato 3 1 Università di Genova, Italy, giorgio@disi.unige.it
More informationFirewall Design: Consistency, Completeness, Compactness
Firewall Design: Consistency, Completeness, Compactness Alex X. Liu alex@cs.utexas.edu Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188, U.S.A. March, 2004 Co-author:
More informationnormalisation Goals: Suppose we have a db scheme: is it good? define precise notions of the qualities of a relational database scheme
Goals: Suppose we have a db scheme: is it good? Suppose we have a db scheme derived from an ER diagram: is it good? define precise notions of the qualities of a relational database scheme define algorithms
More informationLinear Maps. Isaiah Lankham, Bruno Nachtergaele, Anne Schilling (February 5, 2007)
MAT067 University of California, Davis Winter 2007 Linear Maps Isaiah Lankham, Bruno Nachtergaele, Anne Schilling (February 5, 2007) As we have discussed in the lecture on What is Linear Algebra? one of
More informationfacultad de informática universidad politécnica de madrid
facultad de informática universidad politécnica de madrid On the Confluence of CHR Analytical Semantics Rémy Haemmerlé Universidad olitécnica de Madrid & IMDEA Software Institute, Spain TR Number CLI2/2014.0
More informationGeometric Transformations
Geometric Transformations Definitions Def: f is a mapping (function) of a set A into a set B if for every element a of A there exists a unique element b of B that is paired with a; this pairing is denoted
More informationCertifying the Security of Android Applications with Cassandra
1 15 th International School on Foundations of Software Security and Design August 31 st, 2015, Bertinoro Certifying the Security of Android Applications with Cassandra Steffen Lortz, Heiko Mantel, David
More informationLecture Notes on Elasticity of Substitution
Lecture Notes on Elasticity of Substitution Ted Bergstrom, UCSB Economics 210A March 3, 2011 Today s featured guest is the elasticity of substitution. Elasticity of a function of a single variable Before
More informationPrivate Approximation of Clustering and Vertex Cover
Private Approximation of Clustering and Vertex Cover Amos Beimel, Renen Hallak, and Kobbi Nissim Department of Computer Science, Ben-Gurion University of the Negev Abstract. Private approximation of search
More informationI. GROUPS: BASIC DEFINITIONS AND EXAMPLES
I GROUPS: BASIC DEFINITIONS AND EXAMPLES Definition 1: An operation on a set G is a function : G G G Definition 2: A group is a set G which is equipped with an operation and a special element e G, called
More informationdiscuss how to describe points, lines and planes in 3 space.
Chapter 2 3 Space: lines and planes In this chapter we discuss how to describe points, lines and planes in 3 space. introduce the language of vectors. discuss various matters concerning the relative position
More informationInformatique Fondamentale IMA S8
Informatique Fondamentale IMA S8 Cours 1 - Intro + schedule + finite state machines Laure Gonnord http://laure.gonnord.org/pro/teaching/ Laure.Gonnord@polytech-lille.fr Université Lille 1 - Polytech Lille
More informationBoolean Algebra Part 1
Boolean Algebra Part 1 Page 1 Boolean Algebra Objectives Understand Basic Boolean Algebra Relate Boolean Algebra to Logic Networks Prove Laws using Truth Tables Understand and Use First Basic Theorems
More informationLecture 1: Course overview, circuits, and formulas
Lecture 1: Course overview, circuits, and formulas Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: John Kim, Ben Lund 1 Course Information Swastik
More informationModels for Quantitative Distributed Systems and Multi-Valued Logics
Universität Leipzig Institut für Informatik Models for Quantitative Distributed Systems and Multi-Valued Logics Master Thesis Leipzig, September 2010 Author Supervisor B.Sc. Martin Huschenbett Master Student
More informationECE 842 Report Implementation of Elliptic Curve Cryptography
ECE 842 Report Implementation of Elliptic Curve Cryptography Wei-Yang Lin December 15, 2004 Abstract The aim of this report is to illustrate the issues in implementing a practical elliptic curve cryptographic
More informationMarkovian projection for volatility calibration
cutting edge. calibration Markovian projection for volatility calibration Vladimir Piterbarg looks at the Markovian projection method, a way of obtaining closed-form approximations of European-style option
More informationNational Sun Yat-Sen University CSE Course: Information Theory. Gambling And Entropy
Gambling And Entropy 1 Outline There is a strong relationship between the growth rate of investment in a horse race and the entropy of the horse race. The value of side information is related to the mutual
More informationLocal periods and binary partial words: An algorithm
Local periods and binary partial words: An algorithm F. Blanchet-Sadri and Ajay Chriscoe Department of Mathematical Sciences University of North Carolina P.O. Box 26170 Greensboro, NC 27402 6170, USA E-mail:
More informationMagic Sets and their Application to Data Integration
Magic Sets and their Application to Data Integration Wolfgang Faber, Gianluigi Greco, Nicola Leone Department of Mathematics University of Calabria, Italy {faber,greco,leone}@mat.unical.it Roadmap Motivation:
More informationLeft-Handed Completeness
Left-Handed Completeness Dexter Kozen Computer Science Department Cornell University RAMiCS, September 19, 2012 Joint work with Alexandra Silva Radboud University Nijmegen and CWI Amsterdam Result A new
More informationEconometrics Simple Linear Regression
Econometrics Simple Linear Regression Burcu Eke UC3M Linear equations with one variable Recall what a linear equation is: y = b 0 + b 1 x is a linear equation with one variable, or equivalently, a straight
More informationReducing Clocks in Timed Automata while Preserving Bisimulation
Reducing Clocks in Timed Automata while Preserving Bisimulation Shibashis Guha Chinmay Narayan S. Arun-Kumar Indian Institute of Technology Delhi {shibashis, chinmay, sak}@cse.iitd.ac.in arxiv:1404.6613v2
More informationCritical points of once continuously differentiable functions are important because they are the only points that can be local maxima or minima.
Lecture 0: Convexity and Optimization We say that if f is a once continuously differentiable function on an interval I, and x is a point in the interior of I that x is a critical point of f if f (x) =
More informationUPDATES OF LOGIC PROGRAMS
Computing and Informatics, Vol. 20, 2001,????, V 2006-Nov-6 UPDATES OF LOGIC PROGRAMS Ján Šefránek Department of Applied Informatics, Faculty of Mathematics, Physics and Informatics, Comenius University,
More informationImprecise probabilities, bets and functional analytic methods in Łukasiewicz logic.
Imprecise probabilities, bets and functional analytic methods in Łukasiewicz logic. Martina Fedel joint work with K.Keimel,F.Montagna,W.Roth Martina Fedel (UNISI) 1 / 32 Goal The goal of this talk is to
More information26 Ideals and Quotient Rings
Arkansas Tech University MATH 4033: Elementary Modern Algebra Dr. Marcel B. Finan 26 Ideals and Quotient Rings In this section we develop some theory of rings that parallels the theory of groups discussed
More informationLine and Polygon Clipping. Foley & Van Dam, Chapter 3
Line and Polygon Clipping Foley & Van Dam, Chapter 3 Topics Viewing Transformation Pipeline in 2D Line and polygon clipping Brute force analytic solution Cohen-Sutherland Line Clipping Algorithm Cyrus-Beck
More informationOnline Appendix to Stochastic Imitative Game Dynamics with Committed Agents
Online Appendix to Stochastic Imitative Game Dynamics with Committed Agents William H. Sandholm January 6, 22 O.. Imitative protocols, mean dynamics, and equilibrium selection In this section, we consider
More informationData integration general setting
Data integration general setting A source schema S: relational schema XML Schema (DTD), etc. A global schema G: could be of many different types too A mapping M between S and G: many ways to specify it,
More informationALMOST COMMON PRIORS 1. INTRODUCTION
ALMOST COMMON PRIORS ZIV HELLMAN ABSTRACT. What happens when priors are not common? We introduce a measure for how far a type space is from having a common prior, which we term prior distance. If a type
More informationRelational Database Design
Relational Database Design To generate a set of relation schemas that allows - to store information without unnecessary redundancy - to retrieve desired information easily Approach - design schema in appropriate
More informationFabio Patrizi DIS Sapienza - University of Rome
Fabio Patrizi DIS Sapienza - University of Rome Overview Introduction to Services The Composition Problem Two frameworks for composition: Non data-aware services Data-aware services Conclusion & Research
More information19 LINEAR QUADRATIC REGULATOR
19 LINEAR QUADRATIC REGULATOR 19.1 Introduction The simple form of loopshaping in scalar systems does not extend directly to multivariable (MIMO) plants, which are characterized by transfer matrices instead
More informationLecture 4 on Obfuscation by Partial Evaluation of Distorted Interpreters
Lecture 4 on Obfuscation by Partial Evaluation of Distorted Interpreters Neil D. Jones DIKU, University of Copenhagen (prof. emeritus) Joint work with Roberto Giacobazzi and Isabella Mastroeni University
More informationSoftware Modeling and Verification
Software Modeling and Verification Alessandro Aldini DiSBeF - Sezione STI University of Urbino Carlo Bo Italy 3-4 February 2015 Algorithmic verification Correctness problem Is the software/hardware system
More informationQuotient Rings and Field Extensions
Chapter 5 Quotient Rings and Field Extensions In this chapter we describe a method for producing field extension of a given field. If F is a field, then a field extension is a field K that contains F.
More informationSimulation-Based Security with Inexhaustible Interactive Turing Machines
Simulation-Based Security with Inexhaustible Interactive Turing Machines Ralf Küsters Institut für Informatik Christian-Albrechts-Universität zu Kiel 24098 Kiel, Germany kuesters@ti.informatik.uni-kiel.de
More informationReal Time Scheduling Basic Concepts. Radek Pelánek
Real Time Scheduling Basic Concepts Radek Pelánek Basic Elements Model of RT System abstraction focus only on timing constraints idealization (e.g., zero switching time) Basic Elements Basic Notions task
More informationStochastic Models for Inventory Management at Service Facilities
Stochastic Models for Inventory Management at Service Facilities O. Berman, E. Kim Presented by F. Zoghalchi University of Toronto Rotman School of Management Dec, 2012 Agenda 1 Problem description Deterministic
More informationBinary Number System. 16. Binary Numbers. Base 10 digits: 0 1 2 3 4 5 6 7 8 9. Base 2 digits: 0 1
Binary Number System 1 Base 10 digits: 0 1 2 3 4 5 6 7 8 9 Base 2 digits: 0 1 Recall that in base 10, the digits of a number are just coefficients of powers of the base (10): 417 = 4 * 10 2 + 1 * 10 1
More informationBasic Concepts of Set Theory, Functions and Relations
March 1, 2006 p. 1 Basic Concepts of Set Theory, Functions and Relations 1. Basic Concepts of Set Theory...1 1.1. Sets and elements...1 1.2. Specification of sets...2 1.3. Identity and cardinality...3
More informationSome Essential Statistics The Lure of Statistics
Some Essential Statistics The Lure of Statistics Data Mining Techniques, by M.J.A. Berry and G.S Linoff, 2004 Statistics vs. Data Mining..lie, damn lie, and statistics mining data to support preconceived
More informationON LIMIT LAWS FOR CENTRAL ORDER STATISTICS UNDER POWER NORMALIZATION. E. I. Pancheva, A. Gacovska-Barandovska
Pliska Stud. Math. Bulgar. 22 (2015), STUDIA MATHEMATICA BULGARICA ON LIMIT LAWS FOR CENTRAL ORDER STATISTICS UNDER POWER NORMALIZATION E. I. Pancheva, A. Gacovska-Barandovska Smirnov (1949) derived four
More informationThe Theory of Concept Analysis and Customer Relationship Mining
The Application of Association Rule Mining in CRM Based on Formal Concept Analysis HongSheng Xu * and Lan Wang College of Information Technology, Luoyang Normal University, Luoyang, 471022, China xhs_ls@sina.com
More informationStatic Analysis. Find the Bug! 15-654: Analysis of Software Artifacts. Jonathan Aldrich. disable interrupts. ERROR: returning with interrupts disabled
Static Analysis 15-654: Analysis of Software Artifacts Jonathan Aldrich 1 Find the Bug! Source: Engler et al., Checking System Rules Using System-Specific, Programmer-Written Compiler Extensions, OSDI
More informationFunctional Optimization Models for Active Queue Management
Functional Optimization Models for Active Queue Management Yixin Chen Department of Computer Science and Engineering Washington University in St Louis 1 Brookings Drive St Louis, MO 63130, USA chen@cse.wustl.edu
More informationFormal Languages and Automata Theory - Regular Expressions and Finite Automata -
Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Samarjit Chakraborty Computer Engineering and Networks Laboratory Swiss Federal Institute of Technology (ETH) Zürich March
More informationRandom access protocols for channel access. Markov chains and their stability. Laurent Massoulié.
Random access protocols for channel access Markov chains and their stability laurent.massoulie@inria.fr Aloha: the first random access protocol for channel access [Abramson, Hawaii 70] Goal: allow machines
More informationRN-coding of Numbers: New Insights and Some Applications
RN-coding of Numbers: New Insights and Some Applications Peter Kornerup Dept. of Mathematics and Computer Science SDU, Odense, Denmark & Jean-Michel Muller LIP/Arénaire (CRNS-ENS Lyon-INRIA-UCBL) Lyon,
More information1 = (a 0 + b 0 α) 2 + + (a m 1 + b m 1 α) 2. for certain elements a 0,..., a m 1, b 0,..., b m 1 of F. Multiplying out, we obtain
Notes on real-closed fields These notes develop the algebraic background needed to understand the model theory of real-closed fields. To understand these notes, a standard graduate course in algebra is
More informationLectures notes on orthogonal matrices (with exercises) 92.222 - Linear Algebra II - Spring 2004 by D. Klain
Lectures notes on orthogonal matrices (with exercises) 92.222 - Linear Algebra II - Spring 2004 by D. Klain 1. Orthogonal matrices and orthonormal sets An n n real-valued matrix A is said to be an orthogonal
More informationMatrix Representations of Linear Transformations and Changes of Coordinates
Matrix Representations of Linear Transformations and Changes of Coordinates 01 Subspaces and Bases 011 Definitions A subspace V of R n is a subset of R n that contains the zero element and is closed under
More informationA Framework for Measuring Software Obfuscation Resilience Against Automated Attacks
Fakultät für Informatik Technische Universität München A Framework for Measuring Software Obfuscation Resilience Against Automated Attacks Sebastian Banescu, Martín Ochoa and Alexander Pretschner Outline
More informationSoftware Model Checking. Equivalence Hierarchy
Software Equivalence Hierarchy Moonzoo Kim CS Dept. KAIST CS750B Software Korea Advanced Institute of Science and Technology Equivalence semantics and SW design Preliminary Hierarchy Diagram Trace-based
More informationLimitations of E-R Designs. Relational Normalization Theory. Redundancy and Other Problems. Redundancy. Anomalies. Example
Limitations of E-R Designs Relational Normalization Theory Chapter 6 Provides a set of guidelines, does not result in a unique database schema Does not provide a way of evaluating alternative schemas Normalization
More informationBounded Treewidth in Knowledge Representation and Reasoning 1
Bounded Treewidth in Knowledge Representation and Reasoning 1 Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien Luminy, October 2010 1 Joint work with G.
More informationStatistical Machine Learning
Statistical Machine Learning UoC Stats 37700, Winter quarter Lecture 4: classical linear and quadratic discriminants. 1 / 25 Linear separation For two classes in R d : simple idea: separate the classes
More informationTHE PROBLEM WORMS (1) WORMS (2) THE PROBLEM OF WORM PROPAGATION/PREVENTION THE MINIMUM VERTEX COVER PROBLEM
1 THE PROBLEM OF WORM PROPAGATION/PREVENTION I.E. THE MINIMUM VERTEX COVER PROBLEM Prof. Tiziana Calamoneri Network Algorithms A.y. 2014/15 2 THE PROBLEM WORMS (1)! A computer worm is a standalone malware
More informationPolarization codes and the rate of polarization
Polarization codes and the rate of polarization Erdal Arıkan, Emre Telatar Bilkent U., EPFL Sept 10, 2008 Channel Polarization Given a binary input DMC W, i.i.d. uniformly distributed inputs (X 1,...,
More information6.2 Permutations continued
6.2 Permutations continued Theorem A permutation on a finite set A is either a cycle or can be expressed as a product (composition of disjoint cycles. Proof is by (strong induction on the number, r, of
More informationUniversal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption
Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption Ronald Cramer Victor Shoup December 12, 2001 Abstract We present several new and fairly practical public-key
More informationCartesian Products and Relations
Cartesian Products and Relations Definition (Cartesian product) If A and B are sets, the Cartesian product of A and B is the set A B = {(a, b) :(a A) and (b B)}. The following points are worth special
More informationSo let us begin our quest to find the holy grail of real analysis.
1 Section 5.2 The Complete Ordered Field: Purpose of Section We present an axiomatic description of the real numbers as a complete ordered field. The axioms which describe the arithmetic of the real numbers
More informationHedging Barriers. Liuren Wu. Zicklin School of Business, Baruch College (http://faculty.baruch.cuny.edu/lwu/)
Hedging Barriers Liuren Wu Zicklin School of Business, Baruch College (http://faculty.baruch.cuny.edu/lwu/) Based on joint work with Peter Carr (Bloomberg) Modeling and Hedging Using FX Options, March
More informationReliably computing cellular automaton, in 1-sparse noise
Reliably computing cellular automaton, in 1-sparse noise Peter Gács Boston University Peter Gács (Boston University) TRG Spring 2010 1 / 23 Ths is the second one of a series of three lectures on reliable
More informationLecture 11: The Goldreich-Levin Theorem
COM S 687 Introduction to Cryptography September 28, 2006 Lecture 11: The Goldreich-Levin Theorem Instructor: Rafael Pass Scribe: Krishnaprasad Vikram Hard-Core Bits Definition: A predicate b : {0, 1}
More informationA Semantic Dissimilarity Measure for Concept Descriptions in Ontological Knowledge Bases
A Semantic Dissimilarity Measure for Concept Descriptions in Ontological Knowledge Bases Claudia d Amato, Nicola Fanizzi, Floriana Esposito Dipartimento di Informatica, Università degli Studi di Bari Campus
More informationNon-deterministic Semantics and the Undecidability of Boolean BI
1 Non-deterministic Semantics and the Undecidability of Boolean BI DOMINIQUE LARCHEY-WENDLING, LORIA CNRS, Nancy, France DIDIER GALMICHE, LORIA Université Henri Poincaré, Nancy, France We solve the open
More informationMethods of Solution of Selected Differential Equations Carol A. Edwards Chandler-Gilbert Community College
Methods of Solution of Selected Differential Equations Carol A. Edwards Chandler-Gilbert Community College Equations of Order One: Mdx + Ndy = 0 1. Separate variables. 2. M, N homogeneous of same degree:
More information1. Prove that the empty set is a subset of every set.
1. Prove that the empty set is a subset of every set. Basic Topology Written by Men-Gen Tsai email: b89902089@ntu.edu.tw Proof: For any element x of the empty set, x is also an element of every set since
More informationit is easy to see that α = a
21. Polynomial rings Let us now turn out attention to determining the prime elements of a polynomial ring, where the coefficient ring is a field. We already know that such a polynomial ring is a UF. Therefore
More informationPrinciple of Data Reduction
Chapter 6 Principle of Data Reduction 6.1 Introduction An experimenter uses the information in a sample X 1,..., X n to make inferences about an unknown parameter θ. If the sample size n is large, then
More informationGoal of the Talk Theorem The class of languages recognisable by T -coalgebra automata is closed under taking complements.
Complementation of Coalgebra Automata Christian Kissig (University of Leicester) joint work with Yde Venema (Universiteit van Amsterdam) 07 Sept 2009 / Universitá degli Studi di Udine / CALCO 2009 Goal
More informationChapter 2: Binomial Methods and the Black-Scholes Formula
Chapter 2: Binomial Methods and the Black-Scholes Formula 2.1 Binomial Trees We consider a financial market consisting of a bond B t = B(t), a stock S t = S(t), and a call-option C t = C(t), where the
More informationAdvanced Cryptography
Family Name:... First Name:... Section:... Advanced Cryptography Final Exam July 18 th, 2006 Start at 9:15, End at 12:00 This document consists of 12 pages. Instructions Electronic devices are not allowed.
More informationLambda Calculus between Algebra and Topology. Antonino Salibra
Lambda Calculus between Algebra and Topology Antonino Salibra Thanks Special thanks to Laboratoire PPS (Univ. Paris Diderot) for supporting my research with financial support and very interesting collaborations
More informationIntroduction. Digital Signature
Introduction Electronic transactions and activities taken place over Internet need to be protected against all kinds of interference, accidental or malicious. The general task of the information technology
More informationPredicate Logic Review
Predicate Logic Review UC Berkeley, Philosophy 142, Spring 2016 John MacFarlane 1 Grammar A term is an individual constant or a variable. An individual constant is a lowercase letter from the beginning
More informationTheory of turbo machinery / Turbomaskinernas teori. Chapter 4
Theory of turbo machinery / Turbomaskinernas teori Chapter 4 Axial-Flow Turbines: Mean-Line Analyses and Design Power is more certainly retained by wary measures than by daring counsels. (Tacitius, Annals)
More informationSolutions to In-Class Problems Week 4, Mon.
Massachusetts Institute of Technology 6.042J/18.062J, Fall 05: Mathematics for Computer Science September 26 Prof. Albert R. Meyer and Prof. Ronitt Rubinfeld revised September 26, 2005, 1050 minutes Solutions
More informationSample Test Questions
mathematics College Algebra Geometry Trigonometry Sample Test Questions A Guide for Students and Parents act.org/compass Note to Students Welcome to the ACT Compass Sample Mathematics Test! You are about
More informationPYTHAGOREAN TRIPLES KEITH CONRAD
PYTHAGOREAN TRIPLES KEITH CONRAD 1. Introduction A Pythagorean triple is a triple of positive integers (a, b, c) where a + b = c. Examples include (3, 4, 5), (5, 1, 13), and (8, 15, 17). Below is an ancient
More informationLecture 13 - Basic Number Theory.
Lecture 13 - Basic Number Theory. Boaz Barak March 22, 2010 Divisibility and primes Unless mentioned otherwise throughout this lecture all numbers are non-negative integers. We say that A divides B, denoted
More informationFundamentals of Statistical Physics Leo P. Kadanoff University of Chicago, USA
Fundamentals of Statistical Physics Leo P. Kadanoff University of Chicago, USA text: Statistical Physics, Statics, Dynamics, Renormalization Leo Kadanoff I also referred often to Wikipedia and found it
More informationAn Hybrid Optimization Method For Risk Measure Reduction Of A Credit Portfolio Under Constraints
An Hybrid Optimization Method For Risk Measure Reduction Of A Credit Portfolio Under Constraints Ivorra Benjamin & Mohammadi Bijan Montpellier 2 University Quibel Guillaume, Tehraoui Rim & Delcourt Sebastien
More informationAbstract Simulation: a Static Analysis of Simulink Models
Abstract Simulation: a Static Analysis of Simulink Models Alexandre Chapoutot LIP6 Université Pierre et Marie Curie 4, place Jussieu F75252 Paris Cedex 05, France Email: alexandre.chapoutot@lip6.fr Matthieu
More informationAdditional sources Compilation of sources: http://lrs.ed.uiuc.edu/tseportal/datacollectionmethodologies/jin-tselink/tselink.htm
Mgt 540 Research Methods Data Analysis 1 Additional sources Compilation of sources: http://lrs.ed.uiuc.edu/tseportal/datacollectionmethodologies/jin-tselink/tselink.htm http://web.utk.edu/~dap/random/order/start.htm
More informationBasics of Statistical Machine Learning
CS761 Spring 2013 Advanced Machine Learning Basics of Statistical Machine Learning Lecturer: Xiaojin Zhu jerryzhu@cs.wisc.edu Modern machine learning is rooted in statistics. You will find many familiar
More informationProcedure for Marine Traffic Simulation with AIS Data
http://www.transnav.eu the International Journal on Marine Navigation and Safety of Sea Transportation Volume 9 Number 1 March 2015 DOI: 10.12716/1001.09.01.07 Procedure for Marine Traffic Simulation with
More informationa 11 x 1 + a 12 x 2 + + a 1n x n = b 1 a 21 x 1 + a 22 x 2 + + a 2n x n = b 2.
Chapter 1 LINEAR EQUATIONS 1.1 Introduction to linear equations A linear equation in n unknowns x 1, x,, x n is an equation of the form a 1 x 1 + a x + + a n x n = b, where a 1, a,..., a n, b are given
More informationPost-Quantum Cryptography #4
Post-Quantum Cryptography #4 Prof. Claude Crépeau McGill University http://crypto.cs.mcgill.ca/~crepeau/waterloo 185 ( 186 Attack scenarios Ciphertext-only attack: This is the most basic type of attack
More informationFuzzy Differential Systems and the New Concept of Stability
Nonlinear Dynamics and Systems Theory, 1(2) (2001) 111 119 Fuzzy Differential Systems and the New Concept of Stability V. Lakshmikantham 1 and S. Leela 2 1 Department of Mathematical Sciences, Florida
More informationA glimpse of combinatorics on words
A glimpse of combinatorics on words Benny George K Tata Institute of Fundamental Research,Mumbai India Indo Russian Workshop 2008 Ural State Univeristy Kenkireth TIFR (INDIA) A glimpse of combinatorics
More informationWeek 1: Introduction to Online Learning
Week 1: Introduction to Online Learning 1 Introduction This is written based on Prediction, Learning, and Games (ISBN: 2184189 / -21-8418-9 Cesa-Bianchi, Nicolo; Lugosi, Gabor 1.1 A Gentle Start Consider
More informationINCIDENCE-BETWEENNESS GEOMETRY
INCIDENCE-BETWEENNESS GEOMETRY MATH 410, CSUSM. SPRING 2008. PROFESSOR AITKEN This document covers the geometry that can be developed with just the axioms related to incidence and betweenness. The full
More informationTHREE DIMENSIONAL GEOMETRY
Chapter 8 THREE DIMENSIONAL GEOMETRY 8.1 Introduction In this chapter we present a vector algebra approach to three dimensional geometry. The aim is to present standard properties of lines and planes,
More informationAn Overview of Integer Factoring Algorithms. The Problem
An Overview of Integer Factoring Algorithms Manindra Agrawal IITK / NUS The Problem Given an integer n, find all its prime divisors as efficiently as possible. 1 A Difficult Problem No efficient algorithm
More informationExact Inference for Gaussian Process Regression in case of Big Data with the Cartesian Product Structure
Exact Inference for Gaussian Process Regression in case of Big Data with the Cartesian Product Structure Belyaev Mikhail 1,2,3, Burnaev Evgeny 1,2,3, Kapushev Yermek 1,2 1 Institute for Information Transmission
More informationIntrinsic Aging and Classes of Nonparametric Distributions Rhonda Righter Department of Industrial Engineering and Operations Research University of
Intrinsic Aging and Classes of Nonparametric Distributions Rhonda Righter Department of Industrial Engineering and Operations Research University of California Berkeley, CA 94720 U.S.A. Moshe Shaked Department
More information