8 Simulatability of Net Types
|
|
- Osborn Rice
- 7 years ago
- Views:
Transcription
1 8 Simulatability of Net Types In chapter 7 was presented different higher order net types. Now we discuss the relations between these net types, place transition nets, and condition event nets. Especially it would be considered the mutual simulatability of different net types. We have seen that modelling with higher order net types is easier but on the other side some properties like boundedness or liveness are not decidable. Therefore exist innocuous and dangerous modifications. Because the introduction of the firing rule with capacities can be reduced to standard concepts this is innocuously. But introducing the firing rule with priorities it leads to a higher order net class than the class of place transition nets. Definition 8.1 A net type NT 1 is called simulatable by net type NT 2 2 if exists an algorithm which for every net N 1 of type NT 1 constructs a net N 2 of type NT 2 and unique mappings ζ (translation of states) and τ (translation of transitions) such that: (a) Mapping ζ maps the reachability set R 2 of N 2 to the reachability set R 1 of N 1 where the initial marking m 0 (2) of N 2 is mapped to the initial marking m 0 (1) of N 1. (b) Mapping τ maps the set of transition T 2 of N 2 to the set of transitions T 1 of N 1 whereas additionally is included the empty word. (c) If m 2, m 2 R 2, q W(T 2 ) and m 2 [q> m 2 (in N 2 ) then holds ζ (m 2 ) [τ(q) > ζ (m 2 ) (in N 1 ). (d) If m 1, m 1 R 1, q W(T 1 ) and m 1 [q> m 1 (in N 1 ) then exist markings m 2, m 2 R 2, q W(T 2 ) with m 1 = ζ (m 2 ), q = τ(q ), m 2 [q > m 2 (in N 2 ), and m 1 = ζ (m 2 ). If furthermore the mapping ζ is bijective we speak about simulatability of the state behaviour. If the construction of net N 2, ζ, and τ is done node by node and arc by arc whereas only information about the node and its environment are used but not about the whole net or its reachability set, then we are speaking about local simulatability. 120
2 If a net type NT 1 is simulatable by net type NT 2 and vice versa then we say that the net types are equivalent. Theorem 8.1 A place transition net is locally simulatable by a loop free ordinary place transition net. Proof idea: Every place p of N which input arcs have the maximal multiplicity in(p) and which output arcs have maximal the multiplicity out(p) is substituted by a loop of places and transitions with in(p) + out(p)-places. The multiple arcs are distributed to the places of the loop. Using mapping τ the empty word ε is allocated to the transitions of the loop. For a marking m of the constructed net the marking ζ(m) has exactly the same number of tokens in place p like in m in the places of the corresponding loop. Figure 8.1 shows an example for this construction. Fig. 8.1: Transformation of a PT-net into an ordinary PT-net Theorem 8.2 Every bounded place transition net is locally simulatable by a safe Petri net (CE-net). 121
3 Proof idea: Every k-bounded place p (k 1) is splitted into k+1 places p 0,...,p n and the adjacent transitions are splitted in k transitions t 1,..., t k (where holds τ(t 1 ) =... =τ(t k ) = t) such that in every reachable marking m exactly one place contains a token. It is marked the place pi iff place p contains exactly i tokens in the corresponding marking ζ (m). Figure 8.2 shows an example for theorem 8.2. Fig. 8.2: Transformation of a PT-net into a safe PT-net Theorem 8.3 Every PT-net with capacities is locally simulatable with a PT-net (without capacities). The next figure demonstrates how the introducing of co-places realises the transformation of theorem 8.3. A co-place gets as initial marking a number of tokens which equals to the difference between the capacity of the corresponding place and its initial marking. If a transition puts tokens to a place then it consumes the same number of tokens from the coplace and vice versa if a transition consumes tokens from a place then it puts the same number of tokens to the corresponding co-place. 122
4 Fig. 8.3: Transformation of a PT-net with capacities into a PT-net without capacities In definition was introduced the firing rule with maximal steps. If we use this firing rule for normal place transitions nets without time then it is also possible to implement the null test for unbounded places. How to test if a place test is clean or not shows the following figure. Fig. 8.4: Null test for unbounded places in a PT-net using the firing rule with maximal steps If an unbounded place test is clean then fires the sequence of sets [t 1 ], [t 2 ] and place p 0 gets a token. But if place test is marked then the fire sequence are the sets [t 1, t 3 ], [t 4 ] and place p 1 would be marked. 123
5 9. Model Checking - see INA-handbook, p
Diagnosing workflow processes using Woflan
Diagnosing workflow processes using Woflan H.M.W. Verbeek 1, T. Basten 2, and W.M.P. van der Aalst 3 1 Dept. of Computing Science, Eindhoven University of Technology, The Netherlands wsineric@win.tue.nl
More information5.1 Bipartite Matching
CS787: Advanced Algorithms Lecture 5: Applications of Network Flow In the last lecture, we looked at the problem of finding the maximum flow in a graph, and how it can be efficiently solved using the Ford-Fulkerson
More informationFull and Complete Binary Trees
Full and Complete Binary Trees Binary Tree Theorems 1 Here are two important types of binary trees. Note that the definitions, while similar, are logically independent. Definition: a binary tree T is full
More informationArchitecture of Information Systems
Architecture of Information Systems using the theory of Petri nets lecture notes for Systeemmodelleren 1 (2M310) K. van Hee N. Sidorova M. Voorhoeve and J. van der Woude Department of Computing Science
More informationAnalysis of Algorithms I: Binary Search Trees
Analysis of Algorithms I: Binary Search Trees Xi Chen Columbia University Hash table: A data structure that maintains a subset of keys from a universe set U = {0, 1,..., p 1} and supports all three dictionary
More informationCMPSCI611: Approximating MAX-CUT Lecture 20
CMPSCI611: Approximating MAX-CUT Lecture 20 For the next two lectures we ll be seeing examples of approximation algorithms for interesting NP-hard problems. Today we consider MAX-CUT, which we proved to
More informationOn the Unique Games Conjecture
On the Unique Games Conjecture Antonios Angelakis National Technical University of Athens June 16, 2015 Antonios Angelakis (NTUA) Theory of Computation June 16, 2015 1 / 20 Overview 1 Introduction 2 Preliminary
More informationScheduling Shop Scheduling. Tim Nieberg
Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations
More informationMidterm Practice Problems
6.042/8.062J Mathematics for Computer Science October 2, 200 Tom Leighton, Marten van Dijk, and Brooke Cowan Midterm Practice Problems Problem. [0 points] In problem set you showed that the nand operator
More informationBranch-and-Price Approach to the Vehicle Routing Problem with Time Windows
TECHNISCHE UNIVERSITEIT EINDHOVEN Branch-and-Price Approach to the Vehicle Routing Problem with Time Windows Lloyd A. Fasting May 2014 Supervisors: dr. M. Firat dr.ir. M.A.A. Boon J. van Twist MSc. Contents
More informationHow To Understand A Self-Adapting Recovery Net (Sarn)
DOI 10.1007/s10619-007-7020-1 Self-adapting recovery nets for policy-driven exception handling in business processes Rachid Hamadi Boualem Benatallah Brahim Medjahed Springer Science+Business Media, LLC
More informationProcess Mining Using BPMN: Relating Event Logs and Process Models
Noname manuscript No. (will be inserted by the editor) Process Mining Using BPMN: Relating Event Logs and Process Models Anna A. Kalenkova W. M. P. van der Aalst Irina A. Lomazova Vladimir A. Rubin Received:
More informationEfficient Reductions for LTL Formulae Verification
Efficient Reductions for LTL Formulae Verification Serge Haddad a and Jean-François Pradat-Peyre b a LAMSADE-CNRS UMR 7024 Université Paris-Dauphine, Place du Maréchal de Lattre de Tassigny, 75775 Paris
More informationSafety verification of software using structured Petri nets
Safety verification of software using structured Petri nets Krzysztof Sacha Warsaw University of Technology, Institute of Control and Computation Engineering, ul. Nowowiejska 15/19, 00-665 Warszawa, Poland
More informationTheory of Computation Chapter 2: Turing Machines
Theory of Computation Chapter 2: Turing Machines Guan-Shieng Huang Feb. 24, 2003 Feb. 19, 2006 0-0 Turing Machine δ K 0111000a 01bb 1 Definition of TMs A Turing Machine is a quadruple M = (K, Σ, δ, s),
More informationReducing Clocks in Timed Automata while Preserving Bisimulation
Reducing Clocks in Timed Automata while Preserving Bisimulation Shibashis Guha Chinmay Narayan S. Arun-Kumar Indian Institute of Technology Delhi {shibashis, chinmay, sak}@cse.iitd.ac.in arxiv:1404.6613v2
More informationT-79.186 Reactive Systems: Introduction and Finite State Automata
T-79.186 Reactive Systems: Introduction and Finite State Automata Timo Latvala 14.1.2004 Reactive Systems: Introduction and Finite State Automata 1-1 Reactive Systems Reactive systems are a class of software
More informationStructural Detection of Deadlocks in Business Process Models
Structural Detection of Deadlocks in Business Process Models Ahmed Awad and Frank Puhlmann Business Process Technology Group Hasso Plattner Institut University of Potsdam, Germany (ahmed.awad,frank.puhlmann)@hpi.uni-potsdam.de
More informationCost Model: Work, Span and Parallelism. 1 The RAM model for sequential computation:
CSE341T 08/31/2015 Lecture 3 Cost Model: Work, Span and Parallelism In this lecture, we will look at how one analyze a parallel program written using Cilk Plus. When we analyze the cost of an algorithm
More informationUNIVERSIDADE DE SÃO PAULO
UNIVERSIDADE DE SÃO PAULO Instituto de Ciências Matemáticas e de Computação ISSN 0103-2569 Comments on On minimizing the lengths of checking sequences Adenilso da Silva Simão N ō 307 RELATÓRIOS TÉCNICOS
More informationSystem Modeling Introduction Rugby Meta-Model Finite State Machines Petri Nets Untimed Model of Computation Synchronous Model of Computation Timed Model of Computation Integration of Computational Models
More information14.1 Rent-or-buy problem
CS787: Advanced Algorithms Lecture 14: Online algorithms We now shift focus to a different kind of algorithmic problem where we need to perform some optimization without knowing the input in advance. Algorithms
More informationHow To Improve Availability In Local Disaster Recovery
2011 International Conference on Information Communication and Management IPCSIT vol.16 (2011) (2011) IACSIT Press, Singapore A Petri Net Model for High Availability in Virtualized Local Disaster Recovery
More informationThe Relative Worst Order Ratio for On-Line Algorithms
The Relative Worst Order Ratio for On-Line Algorithms Joan Boyar 1 and Lene M. Favrholdt 2 1 Department of Mathematics and Computer Science, University of Southern Denmark, Odense, Denmark, joan@imada.sdu.dk
More informationData Structures Fibonacci Heaps, Amortized Analysis
Chapter 4 Data Structures Fibonacci Heaps, Amortized Analysis Algorithm Theory WS 2012/13 Fabian Kuhn Fibonacci Heaps Lacy merge variant of binomial heaps: Do not merge trees as long as possible Structure:
More informationGenet A tool for the synthesis and mining of Petri nets. Josep Carmona jcarmonalsi.upc.edu Software Department Universitat Politcnica de Catalunya
Genet A tool for the synthesis and mining of Petri nets Josep Carmona jcarmonalsi.upc.edu Software Department Universitat Politcnica de Catalunya 2 Contents 1.1 Overview of the tool.......................
More informationThroughput constraint for Synchronous Data Flow Graphs
Throughput constraint for Synchronous Data Flow Graphs *Alessio Bonfietti Michele Lombardi Michela Milano Luca Benini!"#$%&'()*+,-)./&0&20304(5 60,7&-8990,.+:&;/&."!?@A>&"'&=,0B+C. !"#$%&'()* Resource
More informationBRIDGING THE GAP BETWEEN BUSINESS MODELS AND WORKFLOW SPECIFICATIONS
International Journal of Cooperative Information Systems c World Scientific Publishing Company BRIDGING THE GAP BETWEEN BUSINESS MODELS WORKFLOW SPECIFICATIONS JULIANE DEHNERT Fraunhofer ISST, Mollstr.
More informationComputationally Complete Spiking Neural P Systems Without Delay: Two Types of Neurons Are Enough
Computationally Complete Spiking Neural P Systems Without Delay: Two Types of Neurons Are Enough Rudolf Freund 1 and Marian Kogler 1,2 1 Faculty of Informatics, Vienna University of Technology Favoritenstr.
More information6.2 Permutations continued
6.2 Permutations continued Theorem A permutation on a finite set A is either a cycle or can be expressed as a product (composition of disjoint cycles. Proof is by (strong induction on the number, r, of
More informationBounded LTL Model Checking with Stable Models
Under consideration for publication in Theory and Practice of Logic Programming 1 Bounded LTL Model Checking with Stable Models KEIJO HELJANKO and ILKKA NIEMELÄ Helsinki University of Technology Department
More informationSequential Data Structures
Sequential Data Structures In this lecture we introduce the basic data structures for storing sequences of objects. These data structures are based on arrays and linked lists, which you met in first year
More informationInstitut für Informatik Lehrstuhl Theoretische Informatik I / Komplexitätstheorie. An Iterative Compression Algorithm for Vertex Cover
Friedrich-Schiller-Universität Jena Institut für Informatik Lehrstuhl Theoretische Informatik I / Komplexitätstheorie Studienarbeit An Iterative Compression Algorithm for Vertex Cover von Thomas Peiselt
More informationKirsten Sinclair SyntheSys Systems Engineers
Kirsten Sinclair SyntheSys Systems Engineers Kirsten Sinclair SyntheSys Systems Engineers Spicing-up IBM s Enterprise Architecture tools with Petri Nets On Today s Menu Appetiser: Background Starter: Use
More informationClass notes Program Analysis course given by Prof. Mooly Sagiv Computer Science Department, Tel Aviv University second lecture 8/3/2007
Constant Propagation Class notes Program Analysis course given by Prof. Mooly Sagiv Computer Science Department, Tel Aviv University second lecture 8/3/2007 Osnat Minz and Mati Shomrat Introduction This
More informationFirewall Verification and Redundancy Checking are Equivalent
Firewall Verification and Redundancy Checking are Equivalent H. B. Acharya University of Texas at Austin acharya@cs.utexas.edu M. G. Gouda National Science Foundation University of Texas at Austin mgouda@nsf.gov
More informationHigh-level Petri Nets
High-level Petri Nets Model-based system development Aarhus University, Denmark Presentation at the Carl Adam Petri Memorial Symposium, Berlin, February 4, 2011 1 Concurrent systems are very important
More informationA Petri Net Model for Hardware/Software Codesign
Design Automation for Embedded Systems, 4, 243 310 (1999) c 1999 Kluwer Academic Publishers, Boston. Manufactured in The Netherlands. A Petri Net Model for Hardware/Software Codesign PAULO MACIEL Departamento
More informationLecture 3: Put Options and Distribution-Free Results
OPTIONS and FUTURES Lecture 3: Put Options and Distribution-Free Results Philip H. Dybvig Washington University in Saint Louis put options binomial valuation what are distribution-free results? option
More information1. Domain Name System
1.1 Domain Name System (DNS) 1. Domain Name System To identify an entity, the Internet uses the IP address, which uniquely identifies the connection of a host to the Internet. However, people prefer to
More informationSimulation-Based Security with Inexhaustible Interactive Turing Machines
Simulation-Based Security with Inexhaustible Interactive Turing Machines Ralf Küsters Institut für Informatik Christian-Albrechts-Universität zu Kiel 24098 Kiel, Germany kuesters@ti.informatik.uni-kiel.de
More informationPolarization codes and the rate of polarization
Polarization codes and the rate of polarization Erdal Arıkan, Emre Telatar Bilkent U., EPFL Sept 10, 2008 Channel Polarization Given a binary input DMC W, i.i.d. uniformly distributed inputs (X 1,...,
More information1. Let P be the space of all polynomials (of one real variable and with real coefficients) with the norm
Uppsala Universitet Matematiska Institutionen Andreas Strömbergsson Prov i matematik Funktionalanalys Kurs: F3B, F4Sy, NVP 005-06-15 Skrivtid: 9 14 Tillåtna hjälpmedel: Manuella skrivdon, Kreyszigs bok
More informationThe Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge,
The Union-Find Problem Kruskal s algorithm for finding an MST presented us with a problem in data-structure design. As we looked at each edge, cheapest first, we had to determine whether its two endpoints
More informationAdvanced Topics in Software Engineering (02265) The project(s) Ekkart Kindler
Advanced Topics in Software Engineering (02265) The project(s) Projects Part of this course is a project (ca. 2 ECTS points) The evaluation of this course is based on the result of this project The project
More informationLinear Programming Notes V Problem Transformations
Linear Programming Notes V Problem Transformations 1 Introduction Any linear programming problem can be rewritten in either of two standard forms. In the first form, the objective is to maximize, the material
More informationDimitris Chatzidimitriou. Corelab NTUA. June 28, 2013
AN EFFICIENT ALGORITHM FOR THE OPTIMAL STABLE MARRIAGE PROBLEM Dimitris Chatzidimitriou Corelab NTUA June 28, 2013 OUTLINE 1 BASIC CONCEPTS 2 DEFINITIONS 3 ROTATIONS 4 THE ALGORITHM DIMITRIS CHATZIDIMITRIOU
More informationUnion-Find Problem. Using Arrays And Chains
Union-Find Problem Given a set {,,, n} of n elements. Initially each element is in a different set. ƒ {}, {},, {n} An intermixed sequence of union and find operations is performed. A union operation combines
More informationComplexity Theory. IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar
Complexity Theory IE 661: Scheduling Theory Fall 2003 Satyaki Ghosh Dastidar Outline Goals Computation of Problems Concepts and Definitions Complexity Classes and Problems Polynomial Time Reductions Examples
More informationOn Dealing With Semantically Conflicting Business Process Changes
On Dealing With Semantically Conflicting Business Process Changes Stefanie Rinderle Manfred Reichert Peter Dadam University of Ulm, Faculty of Computer Science, Dept. Databases and Information Systems
More informationLTL Model Checking with Logic Based Petri Nets
LTL Model Checking with Logic Based Petri Nets Tristan M. Behrens and Jürgen Dix IfI Technical Report Series IfI-07-04 Impressum Publisher: Institut für Informatik, Technische Universität Clausthal Julius-Albert
More informationProgramma della seconda parte del corso
Programma della seconda parte del corso Introduction Reliability Performance Risk Software Performance Engineering Layered Queueing Models Stochastic Petri Nets New trends in software modeling: Metamodeling,
More informationBatch Production Scheduling in the Process Industries. By Prashanthi Ravi
Batch Production Scheduling in the Process Industries By Prashanthi Ravi INTRODUCTION Batch production - where a batch means a task together with the quantity produced. The processing of a batch is called
More informationPlace/Transition Petri Nets
Place/Transition Petri Nets JSrg Desel 1 and Wolfgang Reisig 2 1 Institut fiir Angewandte Informatik und Formale Beschreibungsverfahren Universit t Karlsruhe, Germany desel@aifb.uni-karlsruhe.de 2 Institut
More informationGenetic Process Mining: An Experimental Evaluation
Genetic Process Mining: An Experimental Evaluation A.K. Alves de Medeiros, A.J.M.M. Weijters and W.M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology P.O. Box 513,
More informationLoad Balancing and Switch Scheduling
EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: liuxh@systems.stanford.edu Abstract Load
More informationA Labeling Algorithm for the Maximum-Flow Network Problem
A Labeling Algorithm for the Maximum-Flow Network Problem Appendix C Network-flow problems can be solved by several methods. In Chapter 8 we introduced this topic by exploring the special structure of
More informationFormal Approaches to Business Processes through Petri Nets
Formal Approaches to Business Processes through Petri Nets Nick ussell Arthur H. M. ter Hofstede a university 2009, www.yawlfoundation.org Acknowledgement These slides summarize the content of Chapter
More informationA Test Case Generator for the Validation of High-Level Petri Nets
A Test Case Generator for the Validation of High-Level Petri Nets Jörg Desel Institut AIFB Universität Karlsruhe D 76128 Karlsruhe Germany E-mail: desel@aifb.uni-karlsruhe.de Andreas Oberweis, Torsten
More informationRandomized algorithms
Randomized algorithms March 10, 2005 1 What are randomized algorithms? Algorithms which use random numbers to make decisions during the executions of the algorithm. Why would we want to do this?? Deterministic
More informationSocial Media Mining. Graph Essentials
Graph Essentials Graph Basics Measures Graph and Essentials Metrics 2 2 Nodes and Edges A network is a graph nodes, actors, or vertices (plural of vertex) Connections, edges or ties Edge Node Measures
More informationRow Echelon Form and Reduced Row Echelon Form
These notes closely follow the presentation of the material given in David C Lay s textbook Linear Algebra and its Applications (3rd edition) These notes are intended primarily for in-class presentation
More informationCombining Software and Hardware Verification Techniques
Formal Methods in System Design, 21, 251 280, 2002 c 2002 Kluwer Academic Publishers. Manufactured in The Netherlands. Combining Software and Hardware Verification Techniques ROBERT P. KURSHAN VLADIMIR
More informationChallenges in Business Process Management: Verification of business processes using Petri nets
Challenges in Business Process Management: Verification of business processes using Petri nets W.M.P. van der Aalst Department of Technology Management, Eindhoven University of Technology P.O. Box 513,
More informationPETRI NET BASED SUPERVISORY CONTROL OF FLEXIBLE BATCH PLANTS. G. Mušič and D. Matko
PETRI NET BASED SUPERVISORY CONTROL OF FLEXIBLE BATCH PLANTS G. Mušič and D. Matko Faculty of Electrical Engineering, University of Ljubljana, Slovenia. E-mail: gasper.music@fe.uni-lj.si Abstract: The
More informationSecurity-Aware Beacon Based Network Monitoring
Security-Aware Beacon Based Network Monitoring Masahiro Sasaki, Liang Zhao, Hiroshi Nagamochi Graduate School of Informatics, Kyoto University, Kyoto, Japan Email: {sasaki, liang, nag}@amp.i.kyoto-u.ac.jp
More informationThe Analysis Method about Change Domain of Business Process Model Based on the Behavior Profile of Petri Net
Appl. Math. Inf. Sci. 6-3S, No. 3, 943-949 (2012) 943 Applied Mathematics & Information Sciences An International Journal The Analysis Method about Change Domain of Business Process Model Based on the
More informationApproximation of an Open Polygonal Curve with a Minimum Number of Circular Arcs and Biarcs
Approximation of an Open Polygonal Curve with a Minimum Number of Circular Arcs and Biarcs R. L. Scot Drysdale a Günter Rote b,1 Astrid Sturm b,1 a Department of Computer Science, Dartmouth College b Institut
More informationOutline 2.1 Graph Isomorphism 2.2 Automorphisms and Symmetry 2.3 Subgraphs, part 1
GRAPH THEORY LECTURE STRUCTURE AND REPRESENTATION PART A Abstract. Chapter focuses on the question of when two graphs are to be regarded as the same, on symmetries, and on subgraphs.. discusses the concept
More informationShortest Inspection-Path. Queries in Simple Polygons
Shortest Inspection-Path Queries in Simple Polygons Christian Knauer, Günter Rote B 05-05 April 2005 Shortest Inspection-Path Queries in Simple Polygons Christian Knauer, Günter Rote Institut für Informatik,
More informationGRAPH THEORY LECTURE 4: TREES
GRAPH THEORY LECTURE 4: TREES Abstract. 3.1 presents some standard characterizations and properties of trees. 3.2 presents several different types of trees. 3.7 develops a counting method based on a bijection
More informationTest Coverage Criteria for Autonomous Mobile Systems based on Coloured Petri Nets
9th Symposium on Formal Methods for Automation and Safety in Railway and Automotive Systems Institut für Verkehrssicherheit und Automatisierungstechnik, TU Braunschweig, 2012 FORMS/FORMAT 2012 (http://www.forms-format.de)
More informationChapter 4: Architecture for Performance Monitoring of Complex Information Technology (IT) Infrastructures using Petri Net
Chapter 4: Architecture for Performance Monitoring of Complex Information Technology (IT) Infrastructures using Petri Net This chapter will focus on the various approaches that we have taken in the modeling
More informationGOAL-BASED INTELLIGENT AGENTS
International Journal of Information Technology, Vol. 9 No. 1 GOAL-BASED INTELLIGENT AGENTS Zhiqi Shen, Robert Gay and Xuehong Tao ICIS, School of EEE, Nanyang Technological University, Singapore 639798
More informationApproximating the Minimum Chain Completion problem
Approximating the Minimum Chain Completion problem Tomás Feder Heikki Mannila Evimaria Terzi Abstract A bipartite graph G = (U, V, E) is a chain graph [9] if there is a bijection π : {1,..., U } U such
More informationTesting LTL Formula Translation into Büchi Automata
Testing LTL Formula Translation into Büchi Automata Heikki Tauriainen and Keijo Heljanko Helsinki University of Technology, Laboratory for Theoretical Computer Science, P. O. Box 5400, FIN-02015 HUT, Finland
More informationSmall Maximal Independent Sets and Faster Exact Graph Coloring
Small Maximal Independent Sets and Faster Exact Graph Coloring David Eppstein Univ. of California, Irvine Dept. of Information and Computer Science The Exact Graph Coloring Problem: Given an undirected
More informationThe Halting Problem is Undecidable
185 Corollary G = { M, w w L(M) } is not Turing-recognizable. Proof. = ERR, where ERR is the easy to decide language: ERR = { x { 0, 1 }* x does not have a prefix that is a valid code for a Turing machine
More informationSolutions of Equations in One Variable. Fixed-Point Iteration II
Solutions of Equations in One Variable Fixed-Point Iteration II Numerical Analysis (9th Edition) R L Burden & J D Faires Beamer Presentation Slides prepared by John Carroll Dublin City University c 2011
More informationLecture 2 Introduction to Data Flow Analysis
Lecture 2 Introduction to Data Flow Analysis I. Introduction II. Example: Reaching definition analysis III. Example: Liveness analysis IV. A General Framework (Theory in next lecture) Reading: Chapter
More informationPractical Guide to the Simplex Method of Linear Programming
Practical Guide to the Simplex Method of Linear Programming Marcel Oliver Revised: April, 0 The basic steps of the simplex algorithm Step : Write the linear programming problem in standard form Linear
More informationArrangements And Duality
Arrangements And Duality 3.1 Introduction 3 Point configurations are tbe most basic structure we study in computational geometry. But what about configurations of more complicated shapes? For example,
More informationWell-Separated Pair Decomposition for the Unit-disk Graph Metric and its Applications
Well-Separated Pair Decomposition for the Unit-disk Graph Metric and its Applications Jie Gao Department of Computer Science Stanford University Joint work with Li Zhang Systems Research Center Hewlett-Packard
More information6.1 Basic Right Triangle Trigonometry
6.1 Basic Right Triangle Trigonometry MEASURING ANGLES IN RADIANS First, let s introduce the units you will be using to measure angles, radians. A radian is a unit of measurement defined as the angle at
More informationCalculate the value of π
Rakesh Goel CEO, SK Dynamics P. Ltd., B5 Industrial Estate, Roorkee 247 667 I. Abstract: π is a constant extensively used in Mathematics and application of mathematics in Physics etc. In fact, π is considered
More informationFormal Languages and Automata Theory - Regular Expressions and Finite Automata -
Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Samarjit Chakraborty Computer Engineering and Networks Laboratory Swiss Federal Institute of Technology (ETH) Zürich March
More informationSingle machine parallel batch scheduling with unbounded capacity
Workshop on Combinatorics and Graph Theory 21th, April, 2006 Nankai University Single machine parallel batch scheduling with unbounded capacity Yuan Jinjiang Department of mathematics, Zhengzhou University
More informationVerification of Computing Policies and Other Hard Problems
Verification of Computing Policies and Other Hard Problems Mohamed G Gouda University of Texas at Austin gouda@cs.utexas.edu Presentation at METIS-2014 1 Computing Policy A computing policy is a formalism
More informationCleaning Structured Event Logs: A Graph Repair Approach
Cleaning Structured Event Logs: A Repair Approach Jianmin Wang, Shaoxu Song, Xuemin Lin, Xiaochen Zhu, Jian Pei Key Laboratory for Information System Security, MoE; TNList; School of Software, Tsinghua
More informationSoundness of Workflow Nets with Reset Arcs
Soundness of Workflow Nets with Reset Arcs W.M.P. van der Aalst 1,2, K.M. van Hee 1, A.H.M. ter Hofstede 2, N. Sidorova 1, H.M.W. Verbeek 1, M. Voorhoeve 1, and M.T. Wynn 2 1 Department of Mathematics
More informationAdvanced compiler construction. General course information. Teacher & assistant. Course goals. Evaluation. Grading scheme. Michel Schinz 2007 03 16
Advanced compiler construction Michel Schinz 2007 03 16 General course information Teacher & assistant Course goals Teacher: Michel Schinz Michel.Schinz@epfl.ch Assistant: Iulian Dragos INR 321, 368 64
More informationComposing Supply Chains through Multi-unit Combinatorial Reverse Auctions with Transformability Relationships among Goods
JOURNAL OF L A TEX CLASS FILES, VOL. 6, NO., JANUARY 7 Composing Supply Chains through Multi-unit Combinatorial Reverse Auctions with Transformability Relationships among Goods Andrea Giovannucci, Jesús
More information2.3 Convex Constrained Optimization Problems
42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions
More informationTHE TURING DEGREES AND THEIR LACK OF LINEAR ORDER
THE TURING DEGREES AND THEIR LACK OF LINEAR ORDER JASPER DEANTONIO Abstract. This paper is a study of the Turing Degrees, which are levels of incomputability naturally arising from sets of natural numbers.
More informationIntroduction to Algorithms. Part 3: P, NP Hard Problems
Introduction to Algorithms Part 3: P, NP Hard Problems 1) Polynomial Time: P and NP 2) NP-Completeness 3) Dealing with Hard Problems 4) Lower Bounds 5) Books c Wayne Goddard, Clemson University, 2004 Chapter
More informationPostulate 17 The area of a square is the square of the length of a. Postulate 18 If two figures are congruent, then they have the same.
Chapter 11: Areas of Plane Figures (page 422) 11-1: Areas of Rectangles (page 423) Rectangle Rectangular Region Area is measured in units. Postulate 17 The area of a square is the square of the length
More informationFinite Automata and Regular Languages
CHAPTER 3 Finite Automata and Regular Languages 3. Introduction 3.. States and Automata A finite-state machine or finite automaton (the noun comes from the Greek; the singular is automaton, the Greek-derived
More informationJena Research Papers in Business and Economics
Jena Research Papers in Business and Economics Solving symmetric mixed-model multilevel just-in-time scheduling problems Malte Fliedner, Nils Boysen, Armin Scholl 18/2008 Jenaer Schriften zur Wirtschaftswissenschaft
More informationCSC 505, Fall 2000: Week 8
Objecties: CSC 505, Fall 2000: Week 8 learn abot the basic depth-first search algorithm learn how properties of a graph can be inferred from the strctre of a DFS tree learn abot one nontriial application
More informationImproving Data Quality: Consistency and Accuracy
Improving Data Quality: Consistency and Accuracy Gao Cong 1 Wenfei Fan 2,3 Floris Geerts 2,4,5 Xibei Jia 2 Shuai Ma 2 1 Microsoft Research Asia 2 University of Edinburgh 4 Hasselt University 3 Bell Laboratories
More information