Controllers for Robotics and. Manufacturing Devices with Temporal. Logic and the Control-D System. Marco Antoniotti.

Size: px
Start display at page:

Download "Controllers for Robotics and. Manufacturing Devices with Temporal. Logic and the Control-D System. Marco Antoniotti."

Transcription

1 Synthesis and Veriæcation of Discrete Controllers for Robotics and Manufacturing Devices with Temporal Logic and the Control-D System. by Marco Antoniotti September 1995 A dissertation in the Department of Computer Science submitted to the faculty ofthe Graduate School of Arts and Science in partial fulællmentof the requirements for the degree of Doctor of Philosophy at New York University Approved: Professor Bhubaneswar Mishra Research Advisor

2 cæ Marco Antoniotti All Rights Reserved 1995

3

4 To my sister Franca, who made this a better world To my nephew Tommaso and my niece Agnese, who will make this a better world To Mary, who makes this a better world iv

5 Acknowledgments I am really indebted to my advisor Bud Mishra for his continuous support and friendship during myyears as a graduate student. He has been a been a guide through æelds that were unknown to meandhas been a guide during troubled times. There are still many æelds I will need to wander through and I am sure I will ænd his traces there. Iwant tothank Professor Mohsen Jafari of Rutgers University for his help with the CRAMTD project and for kindness and enthusiasm since our ærst meetingat a conference. A person who deserves much credit for my achievements isstefania Bandini of the Universitaça degli Studi di Milano, who has always been able to keep me onmytoes and to come tomy aid whenever necessary. She has always been the source of precious advice. Dr. R. Kurshan of AT&T Bell Laboratories was very kind andhelpful duringtheænal phaseofmythesis by providing valuable information on many technical details and developments inthe theory of related topics. Iwant tothank Professor J. T. Schwartz for his valuable commentson my work. Professor R. Wallace is the person who introduced me tothe Walking Machine problem. He designed and worked on the hardware and was very helpful in giving me feedback inorder to keep my research ærmly set on a pragmatic foundation. v

6 Friends like Giovanni Gallo and Alberto Policriti are a blessing for anybody who is doing research andwhoneeds a companion to sneak out tothe movies every once in a while. Iwant tothank Professor K. Perlin, Professor S. Mallat, Professor D. Shasha and Professor R. Boppana for their kindness and for their suggestions over the past years. Special thanks go to many people in Milan who haveinvarious ways contributed to mysuccess as a graduate student: Professor G. Mauriofthe Dipartimento di Scienze dell'informazioneofthe Universitaça degli Studi di Milano and all the friends at Quinary S.p.A., where the machines are named after Lisp functions. Thanks are also due to Anina Karmen-Meade ofthe Department of Computer Science of NYU for her patience with myoverly complicated administrative problems andtofred Hansen for all his work inthe Robotics Research Laboratory. A group of people who deserves thanks and other things is constituted by my roommate over the years: Sunder Sethuraman, a great mathematician and abetter soccer player than I'll ever be; David Bacon, Ron Even and Marek Teichmann, mythree oæce mates who endured meandtoto Paxia, who I had to endure. Finally, Ithank Mary, whomilove, who loves meand, luckily, thinks the factorial of any numberis7. vi

7 Contents 1 Introduction 1 2 Manufacturing, Robotics, Control Theory and Veriæcation Models and Control : : : : : : : : : : : : : : : : : : : : : : : : Classical Control Theory : : : : : : : : : : : : : : : : : : : : : Control Theory Applied to DES : : : : : : : : : : : : : : : : : Building Supervisory Controllers for CDES : : : : : : : Veriæcation and Temporal Logic : : : : : : : : : : : : : : : : : Temporal Properties of Systems : : : : : : : : : : : : : Temporal Logics: Linear and Branching Time : : : : : Theorem Proving andmodel Checking : : : : : : : : : Veriæcation with Automata Theory : : : : : : : : : : : Reductions and Compositional Veriæcation : : : : : : : Real TimeVeriæcation : : : : : : : : : : : : : : : : : : Role of Veriæcation Tools : : : : : : : : : : : : : : : : : Hybrid Systems Veriæcation and Control : : : : : : : : : : : : 35 vii

8 3 Temporal Logic Supervisor Synthesis with Veriæcation Notational Preliminaries : : : : : : : : : : : : : : : : : : : : : CDES Notions and Notations : : : : : : : : : : : : : : CTL Direct Synthesis of Supervisors : : : : : : : : : : : : : : : Controlled Semantics as Model Restriction : : : : : : : Main Objectiveand Notable Problems : : : : : : : : : Inductive Construction of the Controlled Semantics : : Circumventingthe Problems : : : : : : : : : : : : : : : CTL Soundness of Controlled Semantics : : : : : : : : : Simple CTL-Synthesis Algorithm : : : : : : : : : : : : : : : : : Existence of a Supervisor Synthesis Algorithm : : : : : 88 4 The Control-D System Revised Algorithm and The Implementation : : : : : : : : : : State Space Traversing Algorithm : : : : : : : : : : : : Tradeoæs in the Treatment of Disjunctive Forms : : : : Comparison with Standard Supervisor Synthesis Algorithm : : : : : : : : : : : : : : : : : : : : : : : : : : : : Open Problem: Symbolic Representation : : : : : : : : Veriæcation and Synthesis : : : : : : : : : : : : : : : : : : : : The Environment : : : : : : : : : : : : : : : : : : : : : : : : : Control-D Components anduserinterface : : : : : : :109 viii

9 5 Building a DiscreteèHybrid Controller for a Walking Machine A Brief History of Walking Machines : : : : : : : : : : : : : : Problems for Walking Machines : : : : : : : : : : : : : : : : : Leg Behavior Models and Gaits : : : : : : : : : : : : : StabilityofWalking Machines : : : : : : : : : : : : : : Synchronization and Real-time Control : : : : : : : : : Building Walking Machines Controllers with Control-D : : : : Discrete Controller for the Walking Machine : : : : : : Continuous Control Constraints : : : : : : : : : : : : :129 6 Ensuring Failure Behavior for the CRAMTD Manufacturing Line CRAMTD Project Tray Packing Model : : : : : : : : : : : : : Failure Behavior Control : : : : : : : : : : : : : : : : : : : : : Modeling thetray Packing Line : : : : : : : : : : : : : CTL Speciæcation of Behavior : : : : : : : : : : : : : : Concluding Remarks : : : : : : : : : : : : : : : : : : : : : : :143 7 Conclusion and Future Work 144 ix

10 List of Figures 1.1 The walking machine example : : : : : : : : : : : : : : : : : : Schematic drawing ofthe tray pack lineofthe CRAMTD project The standard arrangement of plant G and supervisor hr;'i. : Schematic æowchart of the Supervisor building steps. : : : : : A case illustrating the requirements for AX supervisors : : : : A counterexample for the intuitive supervisor map construction for disjunctions : : : : : : : : : : : : : : : : : : : : : : : : Restrictions on the language satisfying Aëb U aë. : : : : : : : : Controlled Semantics for :f without uncontrollable events : : Controlled Semantics for :f with uncontrollable events : : : : An illustration of the problems with the controlled semantics for negation : : : : : : : : : : : : : : : : : : : : : : : : : : : : A problematic case involving the supervisor map assignments needed to satisfy AXèpè and f ç AëAXèpè U që. : : : : : : : : A problematic case for the semantic of the EU and AU operators. 83 x

11 4.1 Schematic of the Model Restriction Supervisor Synthesis èmrssè Algorithm : : : : : : : : : : : : : : : : : : : : : : : : : : : : : The label state graph procedure : : : : : : : : : : : : : : : : The function label AU. : : : : : : : : : : : : : : : : : : : : : The procedure label AU next. : : : : : : : : : : : : : : : : : The procedure model synth : : : : : : : : : : : : : : : : : : Asnapshot of the Control-D graphical environment : : : : : : : Control-D edit window : : : : : : : : : : : : : : : : : : : : : : State diagram representing the movementofasingle leg. : : : Hexapod tripod gait : : : : : : : : : : : : : : : : : : : : : : : Hybrid Controller Architecture for Walking Machine : : : : : : Mini Actuator Leg Prototype 1 : : : : : : : : : : : : : : : : : The FSM model of a Leg with uncontrollable event slip : : : : Schematic representation of the walking machine : : : : : : : : Simpliæed Geometric Model of the Walking Machine : : : : : : Schematic of the tray packing line ofthe CRAMTD project : : FSM model for the CRAMTD CheckWeight Station : : : : : FSM model for the CRAMTD Reject-diverter : : : : : : : : : Model of the measurement communication : : : : : : : : : : : Control-D window with CRAMTD constraints : : : : : : : : :142 xi

12 List of Tables 2.1 Syntax and informal Semantics for PLTL : : : : : : : : : : : : Syntax and informal Semantics for CTL : : : : : : : : : : : : : 27 xii

13 Chapter 1 Introduction A person's ëproductivity" can be measured in many ways. However, independent ofhow this productivityismeasured, it appears that the advent of modern computing devices and software architectures has improved this ability byseveral factors of magnitude 1. One ofthe aims of computer science has been to provide better software tools that would increase our productivity èand hopefully, leave us more time to engage in leisurely activities such as philosophizing or æshingè. Two desirable characteristicsofsuch tools are their ëusefulness" in solving a given problem and the ësoundness" of the theory on which they are founded. 1 In spite ofthe fact that computers have been around for decades, there seems to be a folk consensus that this result has been actually achieved only recently outside research institutions and very high-tech industries ècfr. Business Week, July 17th, 1995: cover story on Wages in Americaè. 1

14 This dissertation will describe how problems in robotics and manufacturing prompted the developmentofatheory of Discrete Event Systems èdesè, how this theory has been applied and how achange in perspective leads to the construction of algorithms and tools which improveonthe original formulation. Two motivating examples form robotics and manufacturing will be used to substantiate the claims to bemade. The ærst one isanapplication to the problem of synthesizing a controller for the synchronization of leg movements ofawalking machine. The second isanapplication to the construction of control software for a food processing manufacturing line. èthe latter work has been carried out incollaboration with the DepartmentofIndustrial EngineeringofRutgers Universityè. In the walking machine example the challenge is to build a discrete controller capable of producing reasonable gaits which follow simple principles of coordination. Moreover, the system presents many problems whichhave been recently addressed as ëhybrid" between the continuous and the discrete viewpoints. Figure 1.1 shows a sample graphic output ofthe system. Chapter 5 contains a more thorough description of the example. Manufacturing systems pose very interesting problems from the viewpoint of coordination and failure detection. Figure 1.2 showsaschematicofatray packing lineofthe Combat Ration Automated Manufacturing Technology Demonstration ècramtdè of Rutgers University. Chapter 6 contains a more 2

15 Figure 1.1: The walking machine example. Spacing Conveyor B Reject Conveyor F A Seamer and Main Motor Phasing Conveyor Filling Equipment E Filling Conveyor A C D Reject Diverter I Lids Conveyor H Discharge Conveyor Checkweigher Mound Detector Figure 1.2: Schematic drawing of the tray pack line of the CRAMTD project. 3

16 detailed description of the application. The CRAMTD system is composed of manysubsystems, each of which can be represented by a ænite state model. The result ofthe controller synthesis process for such aplant is packaged in intermediate format which can be translated into avariety of ëprogrammable logic controllers" èplcè and other software tools. In this case, the problems arise from the combinatorial explosion due to the nature of the model. The dissertation is organized as follows. Chapter 2 contains an introduction that provides contexts for the developmentsdescribed later in the dissertation. It contains a brief literature review and adescription of standard tools: e.g. control theory, Ramadge and Wonham's theory of controlled discrete event systems, temporal logic, and veriæcation. Chapter 3 contains a novel interpretation of propositional temporal logic as a tool for the synthesis of controllers for discreteevent systems. Chapter 4 describes an algorithm for controller synthesis and its implementation using the Control-D tool-set, and then compares it with the ëstandard" algorithm for the same problem. Chapters5and 6 contain the descriptions of the walking machineand food manufacturing examples, respectively. 4

17 Chapter 2 Manufacturing, Robotics, Control Theory and Veriæcation This thesis studies the semi-automated synthesis and veriæcation of control systems for robotics and manufacturing devices using formal methods in a discrete framework, and bears some resemblance to the theory of controlled discrete event systems ècdesè of Ramadge and Wonham's ë67ë. The aim is to study the integration of CDES theory with the techniques developed for the speciæcation and veriæcation of discrete event systems èdesè. Many of these techniques rely on the application of someæavor of temporal logic ë35ë. This chapter begins with adescription of the main concepts underlying the dissertation, followed by a review of the literature on various related subjects. It is worthwhile to note in advance that such review will necessarily be partial and incomplete, becauseofitsthe scope and the sheer amount of 5

18 material available in the literature. 2.1 Models and Control The notions of robotics and manufacturing devices or systems encompass many artifacts which are currently employed in the production and servicing activities of the economyofmanynations. Giving a precise deænition of these terms is therefore a self defeating task. Nevertheless, science and engineering have provided many abstractions and tools to model such a wide variety of systems. For the purpose of this dissertation, the robotics and manufacturing systems that will be considered, can be formally described in terms of ænite state machines èfsmè ë41ë. Such discretedescription will represent a certain ëview" of the comprehensivebehavior of the robotics or manufacturing system. I.e., it represents amodel of certain behavioral aspects ofthe device. This model is discrete because byitsnature theunderlying formal tool èfsmè is. Continuous characteristics will be best described by diæerent formal tools èe.g. ordinary diæerential equations, linear and non-linear control theoryè. Models of robotics and manufacturing systems serve diæerent purposes. They may simply be a description of the relationships among the components of a system, to beusedasadocumentation. More often, these models serve the purpose of analyzing the system in order to either explain, predict, or control its behavior. The nature of these models depends on which ofthese 6

19 tasks èor their combinationè is to be performed. Nowadays, explanation, prediction and control are supported by combinations of hardware and software embodied by computer systems. There is therefore a focus on those modelingtools that presentdesirable computational properties such aslow algorithmic complexity. This dissertation will focus on an approach tothe control task based on a computational model whose characteristics make it relatively practical to implement while maintaining expressiveness. The basis of this computational model is the theory of CDES developed by Ramadge and Wonham in the mid 80's. This theory is deeply rooted in the classical control theory from whichit borrows terminology and key concepts. It will be shown that by dropping the traditional control theory heritage, the resulting computational model gains in expressiveness and eæciency. To substantiate these ændings and demonstrate the feasibilityofthe approach, an implementation of the algorithms has been incorporated in the Control-D tool. The tool has been used to construct the controllers of two systems: a walking machine ë12ë and amanufacturing line ë10ë. Before discussingthese results, an introduction to thekey concepts aswell as a èincompleteè review of the related èand vastè literature touching these subjects isinorder. 7

20 2.2 Classical Control Theory The main ideas used in controlling physical devices can be traced back to Maxwell's governor example which also introduced the concept of feedback control for dynamical systems. This traditional control theory approach has been extensively formalized èoriginally by Shannon, Kalman and others í see ë44, 77, 71ëè and has resulted in rich linear and nonlinear theories treating continuous laws. These theories introduce manykey concepts that will be brieæy reviewed in this section, in order to clarify their use in other parts ofthis dissertation. The following brief introduction is closely patterned after ë32, 57ë. Avery abstract view of control theory considers a system which evolves over time èt è while producing outputs èy èinresponseto inputs èuè. The outputs are also dependent onthe system state. Usually, inputs, outputs and system state are denoted with uètè, yètè, and xètè, i.e. as functions of time. The exact nature of these functions and the underlying representation of time are the basis for taxonomy of control models. The evolution of the values produced by these functions are called trajectories, orhistories, ortraces. The focus is usually on state-space trajectories H X 4 = fhx : T! Xg; and ofoutput histories H Y 4 = fhy : T! Y g: 8

21 The dependency of state xètè on the inputs is usually denoted by a state transition equation xètè =çèt; t 0 ;xèt 0 è;uètèè; or by a state evaluation equation xèt 0 è = x 0 ; x 0 ètè = fèt; xètè;uètèè: These functions are coupled with a output equation yètè =gèt; xètè; uètèè: ç, f, and g are application dependent functions. With these deænitions it is now possible to formulatethe control problem for a dynamical system by distinguishing agoal subset of the trajectories in H X. Controlling a dynamical system is equivalent to constraining it within a trajectory in the goal subset. According tothe nature of the goal subset, several æavors of the control problem can be formulated. Two classical ones are the servo problem and the state-avoidance problem. Servo Problem. Given a reference trajectory g 2 H x, deæne the goal subset as G = fh X such that jh X, gjçæ; æ é 0g: I.e. the trajectory g must be ëtracked" as closely as possible. 9

22 State-avoidance Problem. Given a set of states Q ç X, deæne the goal subset as G = fh X such that 8t:h X ètè 62 Qg: I.e. the trajectory never reaches a state inq èprovided that x 0 62 Qè. In order to constrain the system within the bounds speciæed by the trajectory goal set G, actions must be taken. These actions are represented as inputs tothe system and are referred to ascontrol laws or control policies. Control laws are chosen given the ëcurrent" state ofthe system, or the the ëcurrent" output orboth. I.e. feedback is used in order to decide the ënext" input tothe system. Often, goal trajectories may be unattainable. Control theory deænes notions and methods to describe this situation. The key notion is that ofcon- trollability of a system. A point inthe time-space hç;xi2t æ X is said to be controllable with respect to asetc ç X of target states if and only if there exists a control action æ such that ataëtime" téç the resulting point ht; x 0 i in the time-space is within C. hç;xi æ ; ht; x 0 i; and ht; x 0 i2c: A dynamical system is completely controllable if and only if it is possible to transfer any state xèt 0 è 2 X to anyother state inx in a ænite amount of ëtime". 10

23 The deænition of controllability relies on precise information about the state ofthe system. Such information may not be available. The problem of recovering such information is the observability problem of a system. Controllabilityand observability may be related by the so-called duality principle. A wide range of physical systems can be described and controlled in terms of linear, time-invariant models. For this class of models, which are characterized by a linear matrix form of the deæning state andoutput equations, a very rich set of sophisticated mathematical tools has been developed over the years. Non-linear dynamical systems present many more diæculties. Classical Control Theory Deæning Traits Control theory has been historically interested in continuous systems èover time T è, i.e. systems whose models are represented with the tools of diæerential equations and linear algebra. Another characteristic of control theory is the uniformity of representation. This principle applies both to basic research incontrol theory and in the practice of designing controllers for physical systems èrobotics and manufacturingè. It is common practice to represent uètè;gètè;fètè, and the control task using the same underlying formalism. This practice has been carried over to the modelingand control of systems which cannot be promptly represented withthetools of continuous mathematics. Section 2.3, contains some introductory remarks about the reformulation 11

24 of control theory for discrete event systems. 2.3 Control Theory Applied to DES While continuous control theory has been very successful, manymodern complex physical devices have proven to be not amenable to itstechniques. There are essentially two sources of problems. Many ofthese devices can be properly described only in a discrete orhybrid èi.e., mixture of discrete and continuous dynamicsè setting. The plant has to bemodeled in terms of a discrete set of states and transitions 1, which poses many problems. Secondly, the behavior desiredofthe ultimate system tends to be fairly complex. In their original work, Ramadge and Wonham ë66ë describe a reinterpretation of the key concepts ofcontrol theory for systems whose underlying dynamics is represented in terms of formal languages. The system to be controlled is considered a generator ègè of a language L èsee ë41ëè. This choice is well suited to represent the discretenature of a wide variety of systems. Ramadge and Wonham introduced the term CDES to indicate this class of systems. As a standard example, consider a machineonashop æoor. A high level 1 Theword discrete assumes two diæerent meanings in control theory_it is used toindicate a discretization of time T,orasadeæning characteristic of the underlying state space. In this dissertation, unless explicitly noted, the term ëdiscrete" always refers to system modeled with anunderlying discrete state space. 12

25 model of its operation may be given in terms of three states idle, running, faulty. The normal operation of the machineisanalternation of the ærst two states, controlled by start and stop signals. Every once in while, the machine will break down, causing the model to movetothe faulty state. In its simplest form, a CDES is deæned in terms of its generator G =èæ;s;æ;s 0 è: æisthe alphabet of the generator èsimilar to the outputs Y of a control theory speciæcationè, whose elements are called events. S is a ænite set of states èthe analogous of Xè. æ : ææs! S is the unregulated transition function, deæned in the standard way. Thestate s 0 is the initial state. The generator is also called, with anobvious analogy, the plant to be controlled. The main assumption on CDES is that the alphabet set is partitioned into two subsets. æ c ç æisasubset of controllable events, æ u =æ, æ c is a subset of uncontrollable events. This assumption is the basis of the whole CDES theory. The control law to beapplied to the plant can disable events inæ c preventing them from being generated. This disabling action constitutes the input ofthe system èin analogy to Uè. An admissible control for a CDES is a set of disabling actions and can simply be represented as a subset of æ c or as a function æ :æ c!f0; 1g: 13

26 A ç 2 æ is enabled if æèçè = 1,disabled otherwise. The set of all æ's is denoted by,. The analogue of the state equation f is the controlled state transition function æ c, which uses the deænition of æ with the extension that æ :æ u! f1g. i.e. æ c :,æ S æ æ! S: 8 é p if æèq; çè = p and æèçè = 1; æ c èæ;q;çè= é:? otherwise: By substituting æ with æ c in the deænition of G, the controlled generator G c is obtained. With these deænition it is now possible to formulate the control problem for CDES's. I.e. design a supervisor device that selects the control inputs in such a way that the given CDES behaves in obedience to various constraints Building Supervisory Controllers for CDES Theanalogy with continuous control theory is carried over in the speciæcation of a supervisor for a CDES plant G c. Since the plant isagenerator of a language èæëgëè, it is natural to assume adevice observing, orrecognizing, the events generated and producing the control inputs asneeded. Such adevice is represented as a recognizer R =èæ;r;ç;r 0 è: 14

27 hr;'i ç admissible control æ G c Figure 2.1: The standard arrangement of plant G and supervisor hr;'i. R is the recognizer set of states, ç is its transition function and r 0 is its initial state. The recognizer has an associated map ' : R!,; which represents the control law for the CDES. The pair hr;' is the supervisor for G c. ' is called the supervisor map and represents the state feedback law for the plant. The supervisor is coupled with the plant inthe standard arrangementshown in ægure 2.1. With these deænitions, Ramadge and Wonham developatheory which gives guarantees about the existence and the ëconstructibility" of supervisors. 15

28 CDES Theory: Main Results The main result ofthe theory of CDES is the existence theorem for supervisors ècfr. ë66ëè. The result is based on a notion of controllability of languages. Assumethe standard language union, intersection, concatenation and preæx closure operations described in ë41ë. If K and L are languages over an alphabet æ partitioned between controllable and uncontrollable events, then the language K is said to becontrollable if çkæ u ë L ç ç K: This condition ensures that given any sequence of events inthe preæx of K èkè, ç any subsequent uncontrollable event will not produce a behavior that a recognizer for K would fail to detect. The other main result ofthe theory concerns the structure of the family of controllable sublanguages of a given language K. This family is closed under union and intersection and contains a supremal element. The supremal controllable sublanguage of K, denoted by K ",istherefore an approximation to K. The existence of this supremal element isthe key to the construction of the actual supervisor for a wide variety of systems. A Pragmatic Methodology The existence of the supremal controllable sublanguage of a given language K, implies a procedure for the construction of a supervisor for a given system. 16

29 Start Build Model of System Language L Build Model of "Desired Behavior" Language K yes no Is K Controllable? no Is K acceptable? yes Build approximation K yes Is K acceptable? no Done Figure 2.2: Schematic æowchart of the Supervisor building steps. The supervisor hr;'i realizes the control law for a given set of constraints. These constraints are expressed in terms of a language K. Ifthis language is not controllable, then its approximation K " can be built. This leads to a pragmatic procedure for the construction of supervisors èsee Figure 2.2è. Such a procedure is not an algorithm directly implementable. It is a guideline for a practitioner employing these notions to actually build a controller. In particular, the step checking for the ëgoodness" of the controlled behavior is completely up to the human. Ramadge and Wonham take this fact into account intheir theory by introducing the notion of ëacceptable" language ècfr. ë66ëè. The procedure is the basis for the design of a software environment for 17

30 the synthesis of discrete controllers for CDES's. In ë13ë a system is described that performs this ëaiding" task. The process of building a supervisor proceeds in two steps: ærst a supremal sublanguage for the speciæed K is built, then the actual supervisor map ' is synthesized. There are restrictions to the kind oflanguages that can be eæectively used with this procedure. The theory works well for regular languages. For larger classes of languages èe.g. context-freeè the uniqueness of K " cannot be guaranteed. These results are contained in ë64ë. In the same paper, one can ænd an algorithm for the construction of the supremal controllable sublanguage of a K " with respect to a preæx closed language æëgë. This algorithm assumes an FSM representation of G and R and produces the desired automata in OèjSj; jrjè, where jsj is the cardinality of the set of states of the generator G and jrj is the cardinality ofthe set of states of the recognizer R. The synthesis algorithm proposed in this dissertation improves slightly on this result. Though the overall asymptotic complexityofthe proposed synthesis algorithm does not change, it will be argued that the diæerent representation used can signiæcantly improvethe practicalityofthe resulting tool. Other Developments in Ramadge and Wonham's Theory The part of the theory of CDES's described so far is only the basis which constitutes the background for the development of this dissertation. An overview 18

31 of other developmentsinthe theory can be found in ë67ë. The other topics which have been investigated in the CDES framework regard observability and modular synthesis of supervisors ë63ë. The issue of decentralized supervision has been also investigated ë68ë. In this case the question asked is whether the action of several supervisors acting locally can achieve the same eæect as a centralized one. Another research direction concerns what kind of extensions can be introduced in the CDES framework preserving its basic characteristics. A crucial question concerns what classes of languages besides the regular ones admit the unique supremal sublanguage construction or what are the characteristics of other extensions to the basic model. For instance,!-languages èand Bíuchi automataè as a basis for CDES are considered in ë65ë, and Vector Addition Systems are considered in ë47, 48ë. The basic CDES model does not include time as a component. The only notion of the passage of timeisderived from the generation of events bythe plant. In this direction, a standard extension to the basic CDES model with discrete time ticks is presented in ë18ë. On the foundation of CDES, other extensions and reinterpretation of the theory have been proposed, mainly with the aim to reuse the wealth of knowledge developed within the temporal logic community. This dissertation falls in this last category. Additional references will be given in Section

Software Modeling and Verification

Software Modeling and Verification Software Modeling and Verification Alessandro Aldini DiSBeF - Sezione STI University of Urbino Carlo Bo Italy 3-4 February 2015 Algorithmic verification Correctness problem Is the software/hardware system

More information

Testing LTL Formula Translation into Büchi Automata

Testing LTL Formula Translation into Büchi Automata Testing LTL Formula Translation into Büchi Automata Heikki Tauriainen and Keijo Heljanko Helsinki University of Technology, Laboratory for Theoretical Computer Science, P. O. Box 5400, FIN-02015 HUT, Finland

More information

Mathematics for Computer Science/Software Engineering. Notes for the course MSM1F3 Dr. R. A. Wilson

Mathematics for Computer Science/Software Engineering. Notes for the course MSM1F3 Dr. R. A. Wilson Mathematics for Computer Science/Software Engineering Notes for the course MSM1F3 Dr. R. A. Wilson October 1996 Chapter 1 Logic Lecture no. 1. We introduce the concept of a proposition, which is a statement

More information

Model Checking II Temporal Logic Model Checking

Model Checking II Temporal Logic Model Checking 1/32 Model Checking II Temporal Logic Model Checking Edmund M Clarke, Jr School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 2/32 Temporal Logic Model Checking Specification Language:

More information

For example, estimate the population of the United States as 3 times 10⁸ and the

For example, estimate the population of the United States as 3 times 10⁸ and the CCSS: Mathematics The Number System CCSS: Grade 8 8.NS.A. Know that there are numbers that are not rational, and approximate them by rational numbers. 8.NS.A.1. Understand informally that every number

More information

CHAPTER 7 GENERAL PROOF SYSTEMS

CHAPTER 7 GENERAL PROOF SYSTEMS CHAPTER 7 GENERAL PROOF SYSTEMS 1 Introduction Proof systems are built to prove statements. They can be thought as an inference machine with special statements, called provable statements, or sometimes

More information

The E-R èentity-relationshipè data model views the real world as a set of basic objects èentitiesè and

The E-R èentity-relationshipè data model views the real world as a set of basic objects èentitiesè and CMPT-354-Han-95.3 Lecture Notes September 20, 1995 Chapter 2 The Entity-Relationship Model The E-R èentity-relationshipè data model views the real world as a set of basic objects èentitiesè and relationships

More information

CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing

CS Master Level Courses and Areas COURSE DESCRIPTIONS. CSCI 521 Real-Time Systems. CSCI 522 High Performance Computing CS Master Level Courses and Areas The graduate courses offered may change over time, in response to new developments in computer science and the interests of faculty and students; the list of graduate

More information

Creating, Solving, and Graphing Systems of Linear Equations and Linear Inequalities

Creating, Solving, and Graphing Systems of Linear Equations and Linear Inequalities Algebra 1, Quarter 2, Unit 2.1 Creating, Solving, and Graphing Systems of Linear Equations and Linear Inequalities Overview Number of instructional days: 15 (1 day = 45 60 minutes) Content to be learned

More information

Model Checking: An Introduction

Model Checking: An Introduction Announcements Model Checking: An Introduction Meeting 2 Office hours M 1:30pm-2:30pm W 5:30pm-6:30pm (after class) and by appointment ECOT 621 Moodle problems? Fundamentals of Programming Languages CSCI

More information

Algorithmic Software Verification

Algorithmic Software Verification Algorithmic Software Verification (LTL Model Checking) Azadeh Farzan What is Verification Anyway? Proving (in a formal way) that program satisfies a specification written in a logical language. Formal

More information

UPDATES OF LOGIC PROGRAMS

UPDATES OF LOGIC PROGRAMS Computing and Informatics, Vol. 20, 2001,????, V 2006-Nov-6 UPDATES OF LOGIC PROGRAMS Ján Šefránek Department of Applied Informatics, Faculty of Mathematics, Physics and Informatics, Comenius University,

More information

From Workflow Design Patterns to Logical Specifications

From Workflow Design Patterns to Logical Specifications AUTOMATYKA/ AUTOMATICS 2013 Vol. 17 No. 1 http://dx.doi.org/10.7494/automat.2013.17.1.59 Rados³aw Klimek* From Workflow Design Patterns to Logical Specifications 1. Introduction Formal methods in software

More information

A Logic Approach for LTL System Modification

A Logic Approach for LTL System Modification A Logic Approach for LTL System Modification Yulin Ding and Yan Zhang School of Computing & Information Technology University of Western Sydney Kingswood, N.S.W. 1797, Australia email: {yding,yan}@cit.uws.edu.au

More information

Specification and Analysis of Contracts Lecture 1 Introduction

Specification and Analysis of Contracts Lecture 1 Introduction Specification and Analysis of Contracts Lecture 1 Introduction Gerardo Schneider gerardo@ifi.uio.no http://folk.uio.no/gerardo/ Department of Informatics, University of Oslo SEFM School, Oct. 27 - Nov.

More information

! " # The Logic of Descriptions. Logics for Data and Knowledge Representation. Terminology. Overview. Three Basic Features. Some History on DLs

!  # The Logic of Descriptions. Logics for Data and Knowledge Representation. Terminology. Overview. Three Basic Features. Some History on DLs ,!0((,.+#$),%$(-&.& *,2(-$)%&2.'3&%!&, Logics for Data and Knowledge Representation Alessandro Agostini agostini@dit.unitn.it University of Trento Fausto Giunchiglia fausto@dit.unitn.it The Logic of Descriptions!$%&'()*$#)

More information

Reliability Guarantees in Automata Based Scheduling for Embedded Control Software

Reliability Guarantees in Automata Based Scheduling for Embedded Control Software 1 Reliability Guarantees in Automata Based Scheduling for Embedded Control Software Santhosh Prabhu, Aritra Hazra, Pallab Dasgupta Department of CSE, IIT Kharagpur West Bengal, India - 721302. Email: {santhosh.prabhu,

More information

The University of Jordan

The University of Jordan The University of Jordan Master in Web Intelligence Non Thesis Department of Business Information Technology King Abdullah II School for Information Technology The University of Jordan 1 STUDY PLAN MASTER'S

More information

Development of dynamically evolving and self-adaptive software. 1. Background

Development of dynamically evolving and self-adaptive software. 1. Background Development of dynamically evolving and self-adaptive software 1. Background LASER 2013 Isola d Elba, September 2013 Carlo Ghezzi Politecnico di Milano Deep-SE Group @ DEIB 1 Requirements Functional requirements

More information

SECOND YEAR. Major Subject 3 Thesis (EE 300) 3 Thesis (EE 300) 3 TOTAL 3 TOTAL 6. MASTER OF ENGINEERING IN ELECTRICAL ENGINEERING (MEng EE) FIRST YEAR

SECOND YEAR. Major Subject 3 Thesis (EE 300) 3 Thesis (EE 300) 3 TOTAL 3 TOTAL 6. MASTER OF ENGINEERING IN ELECTRICAL ENGINEERING (MEng EE) FIRST YEAR MASTER OF SCIENCE IN ELECTRICAL ENGINEERING (MS EE) FIRST YEAR Elective 3 Elective 3 Elective 3 Seminar Course (EE 296) 1 TOTAL 12 TOTAL 10 SECOND YEAR Major Subject 3 Thesis (EE 300) 3 Thesis (EE 300)

More information

The Basics of Graphical Models

The Basics of Graphical Models The Basics of Graphical Models David M. Blei Columbia University October 3, 2015 Introduction These notes follow Chapter 2 of An Introduction to Probabilistic Graphical Models by Michael Jordan. Many figures

More information

Polynomial Operations and Factoring

Polynomial Operations and Factoring Algebra 1, Quarter 4, Unit 4.1 Polynomial Operations and Factoring Overview Number of instructional days: 15 (1 day = 45 60 minutes) Content to be learned Identify terms, coefficients, and degree of polynomials.

More information

Reading 13 : Finite State Automata and Regular Expressions

Reading 13 : Finite State Automata and Regular Expressions CS/Math 24: Introduction to Discrete Mathematics Fall 25 Reading 3 : Finite State Automata and Regular Expressions Instructors: Beck Hasti, Gautam Prakriya In this reading we study a mathematical model

More information

MEng, BSc Computer Science with Artificial Intelligence

MEng, BSc Computer Science with Artificial Intelligence School of Computing FACULTY OF ENGINEERING MEng, BSc Computer Science with Artificial Intelligence Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give

More information

The program also provides supplemental modules on topics in geometry and probability and statistics.

The program also provides supplemental modules on topics in geometry and probability and statistics. Algebra 1 Course Overview Students develop algebraic fluency by learning the skills needed to solve equations and perform important manipulations with numbers, variables, equations, and inequalities. Students

More information

Formal Languages and Automata Theory - Regular Expressions and Finite Automata -

Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Samarjit Chakraborty Computer Engineering and Networks Laboratory Swiss Federal Institute of Technology (ETH) Zürich March

More information

Temporal Logics. Computation Tree Logic

Temporal Logics. Computation Tree Logic Temporal Logics CTL: definition, relationship between operators, adequate sets, specifying properties, safety/liveness/fairness Modeling: sequential, concurrent systems; maximum parallelism/interleaving

More information

Regular Languages and Finite Automata

Regular Languages and Finite Automata Regular Languages and Finite Automata 1 Introduction Hing Leung Department of Computer Science New Mexico State University Sep 16, 2010 In 1943, McCulloch and Pitts [4] published a pioneering work on a

More information

Introducing Formal Methods. Software Engineering and Formal Methods

Introducing Formal Methods. Software Engineering and Formal Methods Introducing Formal Methods Formal Methods for Software Specification and Analysis: An Overview 1 Software Engineering and Formal Methods Every Software engineering methodology is based on a recommended

More information

logic language, static/dynamic models SAT solvers Verified Software Systems 1 How can we model check of a program or system?

logic language, static/dynamic models SAT solvers Verified Software Systems 1 How can we model check of a program or system? 5. LTL, CTL Last part: Alloy logic language, static/dynamic models SAT solvers Today: Temporal Logic (LTL, CTL) Verified Software Systems 1 Overview How can we model check of a program or system? Modeling

More information

From Control Loops to Software

From Control Loops to Software CNRS-VERIMAG Grenoble, France October 2006 Executive Summary Embedded systems realization of control systems by computers Computers are the major medium for realizing controllers There is a gap between

More information

[Refer Slide Time: 05:10]

[Refer Slide Time: 05:10] Principles of Programming Languages Prof: S. Arun Kumar Department of Computer Science and Engineering Indian Institute of Technology Delhi Lecture no 7 Lecture Title: Syntactic Classes Welcome to lecture

More information

MEng, BSc Applied Computer Science

MEng, BSc Applied Computer Science School of Computing FACULTY OF ENGINEERING MEng, BSc Applied Computer Science Year 1 COMP1212 Computer Processor Effective programming depends on understanding not only how to give a machine instructions

More information

A Framework for the Semantics of Behavioral Contracts

A Framework for the Semantics of Behavioral Contracts A Framework for the Semantics of Behavioral Contracts Ashley McNeile Metamaxim Ltd, 48 Brunswick Gardens, London W8 4AN, UK ashley.mcneile@metamaxim.com Abstract. Contracts have proved a powerful concept

More information

Correspondence analysis for strong three-valued logic

Correspondence analysis for strong three-valued logic Correspondence analysis for strong three-valued logic A. Tamminga abstract. I apply Kooi and Tamminga s (2012) idea of correspondence analysis for many-valued logics to strong three-valued logic (K 3 ).

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 1 CHAPTER 1 INTRODUCTION Exploration is a process of discovery. In the database exploration process, an analyst executes a sequence of transformations over a collection of data structures to discover useful

More information

Low Level. Software. Solution. extensions to handle. coarse grained task. compilers with. Data parallel. parallelism.

Low Level. Software. Solution. extensions to handle. coarse grained task. compilers with. Data parallel. parallelism. . 1 History 2 æ 1960s - First Organized Collections Problem Solving Environments for Parallel Scientiæc Computation Jack Dongarra Univ. of Tenn.èOak Ridge National Lab dongarra@cs.utk.edu æ 1970s - Advent

More information

How To Be A Mathematically Proficient Person

How To Be A Mathematically Proficient Person REPRODUCIBLE Figure 4.4: Evaluation Tool for Assessment Instrument Quality Assessment indicators Description of Level 1 of the Indicator Are Not Present Limited of This Indicator Are Present Substantially

More information

T-79.186 Reactive Systems: Introduction and Finite State Automata

T-79.186 Reactive Systems: Introduction and Finite State Automata T-79.186 Reactive Systems: Introduction and Finite State Automata Timo Latvala 14.1.2004 Reactive Systems: Introduction and Finite State Automata 1-1 Reactive Systems Reactive systems are a class of software

More information

THE TURING DEGREES AND THEIR LACK OF LINEAR ORDER

THE TURING DEGREES AND THEIR LACK OF LINEAR ORDER THE TURING DEGREES AND THEIR LACK OF LINEAR ORDER JASPER DEANTONIO Abstract. This paper is a study of the Turing Degrees, which are levels of incomputability naturally arising from sets of natural numbers.

More information

Master s Program in Information Systems

Master s Program in Information Systems The University of Jordan King Abdullah II School for Information Technology Department of Information Systems Master s Program in Information Systems 2006/2007 Study Plan Master Degree in Information Systems

More information

Georgia Standards of Excellence 2015-2016 Mathematics

Georgia Standards of Excellence 2015-2016 Mathematics Georgia Standards of Excellence 2015-2016 Mathematics Standards GSE Coordinate Algebra K-12 Mathematics Introduction Georgia Mathematics focuses on actively engaging the student in the development of mathematical

More information

Performance Level Descriptors Grade 6 Mathematics

Performance Level Descriptors Grade 6 Mathematics Performance Level Descriptors Grade 6 Mathematics Multiplying and Dividing with Fractions 6.NS.1-2 Grade 6 Math : Sub-Claim A The student solves problems involving the Major Content for grade/course with

More information

WHAT ARE MATHEMATICAL PROOFS AND WHY THEY ARE IMPORTANT?

WHAT ARE MATHEMATICAL PROOFS AND WHY THEY ARE IMPORTANT? WHAT ARE MATHEMATICAL PROOFS AND WHY THEY ARE IMPORTANT? introduction Many students seem to have trouble with the notion of a mathematical proof. People that come to a course like Math 216, who certainly

More information

South Carolina College- and Career-Ready (SCCCR) Algebra 1

South Carolina College- and Career-Ready (SCCCR) Algebra 1 South Carolina College- and Career-Ready (SCCCR) Algebra 1 South Carolina College- and Career-Ready Mathematical Process Standards The South Carolina College- and Career-Ready (SCCCR) Mathematical Process

More information

Simulation-Based Security with Inexhaustible Interactive Turing Machines

Simulation-Based Security with Inexhaustible Interactive Turing Machines Simulation-Based Security with Inexhaustible Interactive Turing Machines Ralf Küsters Institut für Informatik Christian-Albrechts-Universität zu Kiel 24098 Kiel, Germany kuesters@ti.informatik.uni-kiel.de

More information

6.045: Automata, Computability, and Complexity Or, Great Ideas in Theoretical Computer Science Spring, 2010. Class 4 Nancy Lynch

6.045: Automata, Computability, and Complexity Or, Great Ideas in Theoretical Computer Science Spring, 2010. Class 4 Nancy Lynch 6.045: Automata, Computability, and Complexity Or, Great Ideas in Theoretical Computer Science Spring, 2010 Class 4 Nancy Lynch Today Two more models of computation: Nondeterministic Finite Automata (NFAs)

More information

Linear Codes. Chapter 3. 3.1 Basics

Linear Codes. Chapter 3. 3.1 Basics Chapter 3 Linear Codes In order to define codes that we can encode and decode efficiently, we add more structure to the codespace. We shall be mainly interested in linear codes. A linear code of length

More information

A Propositional Dynamic Logic for CCS Programs

A Propositional Dynamic Logic for CCS Programs A Propositional Dynamic Logic for CCS Programs Mario R. F. Benevides and L. Menasché Schechter {mario,luis}@cos.ufrj.br Abstract This work presents a Propositional Dynamic Logic in which the programs are

More information

A Comparison of System Dynamics (SD) and Discrete Event Simulation (DES) Al Sweetser Overview.

A Comparison of System Dynamics (SD) and Discrete Event Simulation (DES) Al Sweetser Overview. A Comparison of System Dynamics (SD) and Discrete Event Simulation (DES) Al Sweetser Andersen Consultng 1600 K Street, N.W., Washington, DC 20006-2873 (202) 862-8080 (voice), (202) 785-4689 (fax) albert.sweetser@ac.com

More information

DRAFT. Algebra 1 EOC Item Specifications

DRAFT. Algebra 1 EOC Item Specifications DRAFT Algebra 1 EOC Item Specifications The draft Florida Standards Assessment (FSA) Test Item Specifications (Specifications) are based upon the Florida Standards and the Florida Course Descriptions as

More information

Static Program Transformations for Efficient Software Model Checking

Static Program Transformations for Efficient Software Model Checking Static Program Transformations for Efficient Software Model Checking Shobha Vasudevan Jacob Abraham The University of Texas at Austin Dependable Systems Large and complex systems Software faults are major

More information

Cloud Computing is NP-Complete

Cloud Computing is NP-Complete Working Paper, February 2, 20 Joe Weinman Permalink: http://www.joeweinman.com/resources/joe_weinman_cloud_computing_is_np-complete.pdf Abstract Cloud computing is a rapidly emerging paradigm for computing,

More information

Formal Verification and Linear-time Model Checking

Formal Verification and Linear-time Model Checking Formal Verification and Linear-time Model Checking Paul Jackson University of Edinburgh Automated Reasoning 21st and 24th October 2013 Why Automated Reasoning? Intellectually stimulating and challenging

More information

Verifying Semantic of System Composition for an Aspect-Oriented Approach

Verifying Semantic of System Composition for an Aspect-Oriented Approach 2012 International Conference on System Engineering and Modeling (ICSEM 2012) IPCSIT vol. 34 (2012) (2012) IACSIT Press, Singapore Verifying Semantic of System Composition for an Aspect-Oriented Approach

More information

Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students

Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students Eastern Washington University Department of Computer Science Questionnaire for Prospective Masters in Computer Science Students I. Personal Information Name: Last First M.I. Mailing Address: Permanent

More information

ELECTRICAL ENGINEERING

ELECTRICAL ENGINEERING EE ELECTRICAL ENGINEERING See beginning of Section H for abbreviations, course numbers and coding. The * denotes labs which are held on alternate weeks. A minimum grade of C is required for all prerequisite

More information

ELLIPTIC CURVES AND LENSTRA S FACTORIZATION ALGORITHM

ELLIPTIC CURVES AND LENSTRA S FACTORIZATION ALGORITHM ELLIPTIC CURVES AND LENSTRA S FACTORIZATION ALGORITHM DANIEL PARKER Abstract. This paper provides a foundation for understanding Lenstra s Elliptic Curve Algorithm for factoring large numbers. We give

More information

Entry Level College Mathematics: Algebra or Modeling

Entry Level College Mathematics: Algebra or Modeling Entry Level College Mathematics: Algebra or Modeling Dan Kalman Dan Kalman is Associate Professor in Mathematics and Statistics at American University. His interests include matrix theory, curriculum development,

More information

Integer Operations. Overview. Grade 7 Mathematics, Quarter 1, Unit 1.1. Number of Instructional Days: 15 (1 day = 45 minutes) Essential Questions

Integer Operations. Overview. Grade 7 Mathematics, Quarter 1, Unit 1.1. Number of Instructional Days: 15 (1 day = 45 minutes) Essential Questions Grade 7 Mathematics, Quarter 1, Unit 1.1 Integer Operations Overview Number of Instructional Days: 15 (1 day = 45 minutes) Content to Be Learned Describe situations in which opposites combine to make zero.

More information

Elements of Abstract Group Theory

Elements of Abstract Group Theory Chapter 2 Elements of Abstract Group Theory Mathematics is a game played according to certain simple rules with meaningless marks on paper. David Hilbert The importance of symmetry in physics, and for

More information

Reasons for need for Computer Engineering program From Computer Engineering Program proposal

Reasons for need for Computer Engineering program From Computer Engineering Program proposal Reasons for need for Computer Engineering program From Computer Engineering Program proposal Department of Computer Science School of Electrical Engineering & Computer Science circa 1988 Dedicated to David

More information

Software Verification and Testing. Lecture Notes: Temporal Logics

Software Verification and Testing. Lecture Notes: Temporal Logics Software Verification and Testing Lecture Notes: Temporal Logics Motivation traditional programs (whether terminating or non-terminating) can be modelled as relations are analysed wrt their input/output

More information

parent ROADMAP MATHEMATICS SUPPORTING YOUR CHILD IN HIGH SCHOOL

parent ROADMAP MATHEMATICS SUPPORTING YOUR CHILD IN HIGH SCHOOL parent ROADMAP MATHEMATICS SUPPORTING YOUR CHILD IN HIGH SCHOOL HS America s schools are working to provide higher quality instruction than ever before. The way we taught students in the past simply does

More information

MA651 Topology. Lecture 6. Separation Axioms.

MA651 Topology. Lecture 6. Separation Axioms. MA651 Topology. Lecture 6. Separation Axioms. This text is based on the following books: Fundamental concepts of topology by Peter O Neil Elements of Mathematics: General Topology by Nicolas Bourbaki Counterexamples

More information

Parametric Domain-theoretic models of Linear Abadi & Plotkin Logic

Parametric Domain-theoretic models of Linear Abadi & Plotkin Logic Parametric Domain-theoretic models of Linear Abadi & Plotkin Logic Lars Birkedal Rasmus Ejlers Møgelberg Rasmus Lerchedahl Petersen IT University Technical Report Series TR-00-7 ISSN 600 600 February 00

More information

136 CHAPTER 4. INDUCTION, GRAPHS AND TREES

136 CHAPTER 4. INDUCTION, GRAPHS AND TREES 136 TER 4. INDUCTION, GRHS ND TREES 4.3 Graphs In this chapter we introduce a fundamental structural idea of discrete mathematics, that of a graph. Many situations in the applications of discrete mathematics

More information

What Is School Mathematics?

What Is School Mathematics? What Is School Mathematics? Lisbon, Portugal January 30, 2010 H. Wu *I am grateful to Alexandra Alves-Rodrigues for her many contributions that helped shape this document. The German conductor Herbert

More information

Indiana University East Faculty Senate

Indiana University East Faculty Senate Indiana University East Faculty Senate General Education Curriculum for Baccalaureate Degree Programs at Indiana University East The purpose of the General Education Curriculum is to ensure that every

More information

Formal Verification of Software

Formal Verification of Software Formal Verification of Software Sabine Broda Department of Computer Science/FCUP 12 de Novembro de 2014 Sabine Broda (DCC-FCUP) Formal Verification of Software 12 de Novembro de 2014 1 / 26 Formal Verification

More information

Model Checking of Software

Model Checking of Software Model Checking of Software Patrice Godefroid Bell Laboratories, Lucent Technologies SpecNCheck Page 1 August 2001 A Brief History of Model Checking Prehistory: transformational programs and theorem proving

More information

Structure of Presentation. The Role of Programming in Informatics Curricula. Concepts of Informatics 2. Concepts of Informatics 1

Structure of Presentation. The Role of Programming in Informatics Curricula. Concepts of Informatics 2. Concepts of Informatics 1 The Role of Programming in Informatics Curricula A. J. Cowling Department of Computer Science University of Sheffield Structure of Presentation Introduction The problem, and the key concepts. Dimensions

More information

Algebra Unpacked Content For the new Common Core standards that will be effective in all North Carolina schools in the 2012-13 school year.

Algebra Unpacked Content For the new Common Core standards that will be effective in all North Carolina schools in the 2012-13 school year. This document is designed to help North Carolina educators teach the Common Core (Standard Course of Study). NCDPI staff are continually updating and improving these tools to better serve teachers. Algebra

More information

Quotient Rings and Field Extensions

Quotient Rings and Field Extensions Chapter 5 Quotient Rings and Field Extensions In this chapter we describe a method for producing field extension of a given field. If F is a field, then a field extension is a field K that contains F.

More information

Random vs. Structure-Based Testing of Answer-Set Programs: An Experimental Comparison

Random vs. Structure-Based Testing of Answer-Set Programs: An Experimental Comparison Random vs. Structure-Based Testing of Answer-Set Programs: An Experimental Comparison Tomi Janhunen 1, Ilkka Niemelä 1, Johannes Oetsch 2, Jörg Pührer 2, and Hans Tompits 2 1 Aalto University, Department

More information

Some Polynomial Theorems. John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 rkennedy@ix.netcom.

Some Polynomial Theorems. John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 rkennedy@ix.netcom. Some Polynomial Theorems by John Kennedy Mathematics Department Santa Monica College 1900 Pico Blvd. Santa Monica, CA 90405 rkennedy@ix.netcom.com This paper contains a collection of 31 theorems, lemmas,

More information

Graduate Certificate in Systems Engineering

Graduate Certificate in Systems Engineering Graduate Certificate in Systems Engineering Systems Engineering is a multi-disciplinary field that aims at integrating the engineering and management functions in the development and creation of a product,

More information

A Brief Introduction to Property Testing

A Brief Introduction to Property Testing A Brief Introduction to Property Testing Oded Goldreich Abstract. This short article provides a brief description of the main issues that underly the study of property testing. It is meant to serve as

More information

This unit will lay the groundwork for later units where the students will extend this knowledge to quadratic and exponential functions.

This unit will lay the groundwork for later units where the students will extend this knowledge to quadratic and exponential functions. Algebra I Overview View unit yearlong overview here Many of the concepts presented in Algebra I are progressions of concepts that were introduced in grades 6 through 8. The content presented in this course

More information

CS 3719 (Theory of Computation and Algorithms) Lecture 4

CS 3719 (Theory of Computation and Algorithms) Lecture 4 CS 3719 (Theory of Computation and Algorithms) Lecture 4 Antonina Kolokolova January 18, 2012 1 Undecidable languages 1.1 Church-Turing thesis Let s recap how it all started. In 1990, Hilbert stated a

More information

CORRELATED TO THE SOUTH CAROLINA COLLEGE AND CAREER-READY FOUNDATIONS IN ALGEBRA

CORRELATED TO THE SOUTH CAROLINA COLLEGE AND CAREER-READY FOUNDATIONS IN ALGEBRA We Can Early Learning Curriculum PreK Grades 8 12 INSIDE ALGEBRA, GRADES 8 12 CORRELATED TO THE SOUTH CAROLINA COLLEGE AND CAREER-READY FOUNDATIONS IN ALGEBRA April 2016 www.voyagersopris.com Mathematical

More information

Managing Variability in Software Architectures 1 Felix Bachmann*

Managing Variability in Software Architectures 1 Felix Bachmann* Managing Variability in Software Architectures Felix Bachmann* Carnegie Bosch Institute Carnegie Mellon University Pittsburgh, Pa 523, USA fb@sei.cmu.edu Len Bass Software Engineering Institute Carnegie

More information

Software Engineering Transfer Degree

Software Engineering Transfer Degree www.capspace.org (01/17/2015) Software Engineering Transfer Degree This program of study is designed for associate-degree students intending to transfer into baccalaureate programs awarding software engineering

More information

Notes on Complexity Theory Last updated: August, 2011. Lecture 1

Notes on Complexity Theory Last updated: August, 2011. Lecture 1 Notes on Complexity Theory Last updated: August, 2011 Jonathan Katz Lecture 1 1 Turing Machines I assume that most students have encountered Turing machines before. (Students who have not may want to look

More information

o-minimality and Uniformity in n 1 Graphs

o-minimality and Uniformity in n 1 Graphs o-minimality and Uniformity in n 1 Graphs Reid Dale July 10, 2013 Contents 1 Introduction 2 2 Languages and Structures 2 3 Definability and Tame Geometry 4 4 Applications to n 1 Graphs 6 5 Further Directions

More information

Data Integration: A Theoretical Perspective

Data Integration: A Theoretical Perspective Data Integration: A Theoretical Perspective Maurizio Lenzerini Dipartimento di Informatica e Sistemistica Università di Roma La Sapienza Via Salaria 113, I 00198 Roma, Italy lenzerini@dis.uniroma1.it ABSTRACT

More information

Monitoring Metric First-order Temporal Properties

Monitoring Metric First-order Temporal Properties Monitoring Metric First-order Temporal Properties DAVID BASIN, FELIX KLAEDTKE, SAMUEL MÜLLER, and EUGEN ZĂLINESCU, ETH Zurich Runtime monitoring is a general approach to verifying system properties at

More information

Metric Spaces. Chapter 1

Metric Spaces. Chapter 1 Chapter 1 Metric Spaces Many of the arguments you have seen in several variable calculus are almost identical to the corresponding arguments in one variable calculus, especially arguments concerning convergence

More information

Software Engineering from an Engineering Perspective: SWEBOK as a Study Object

Software Engineering from an Engineering Perspective: SWEBOK as a Study Object Software Engineering from an Engineering Perspective: SWEBOK as a Study Object Alain Abran a,b, Kenza Meridji b, Javier Dolado a a Universidad del País Vasco/Euskal Herriko Unibertsitatea b Ecole de technologie

More information

Vilnius University. Faculty of Mathematics and Informatics. Gintautas Bareikis

Vilnius University. Faculty of Mathematics and Informatics. Gintautas Bareikis Vilnius University Faculty of Mathematics and Informatics Gintautas Bareikis CONTENT Chapter 1. SIMPLE AND COMPOUND INTEREST 1.1 Simple interest......................................................................

More information

Software Verification: Infinite-State Model Checking and Static Program

Software Verification: Infinite-State Model Checking and Static Program Software Verification: Infinite-State Model Checking and Static Program Analysis Dagstuhl Seminar 06081 February 19 24, 2006 Parosh Abdulla 1, Ahmed Bouajjani 2, and Markus Müller-Olm 3 1 Uppsala Universitet,

More information

Overview. Essential Questions. Precalculus, Quarter 4, Unit 4.5 Build Arithmetic and Geometric Sequences and Series

Overview. Essential Questions. Precalculus, Quarter 4, Unit 4.5 Build Arithmetic and Geometric Sequences and Series Sequences and Series Overview Number of instruction days: 4 6 (1 day = 53 minutes) Content to Be Learned Write arithmetic and geometric sequences both recursively and with an explicit formula, use them

More information

Essays in Financial Mathematics

Essays in Financial Mathematics Essays in Financial Mathematics Essays in Financial Mathematics Kristoffer Lindensjö Dissertation for the Degree of Doctor of Philosophy, Ph.D. Stockholm School of Economics, 2013. Dissertation title:

More information

Degrees of Truth: the formal logic of classical and quantum probabilities as well as fuzzy sets.

Degrees of Truth: the formal logic of classical and quantum probabilities as well as fuzzy sets. Degrees of Truth: the formal logic of classical and quantum probabilities as well as fuzzy sets. Logic is the study of reasoning. A language of propositions is fundamental to this study as well as true

More information

2.2. Instantaneous Velocity

2.2. Instantaneous Velocity 2.2. Instantaneous Velocity toc Assuming that your are not familiar with the technical aspects of this section, when you think about it, your knowledge of velocity is limited. In terms of your own mathematical

More information

The Classes P and NP

The Classes P and NP The Classes P and NP We now shift gears slightly and restrict our attention to the examination of two families of problems which are very important to computer scientists. These families constitute the

More information

Likewise, we have contradictions: formulas that can only be false, e.g. (p p).

Likewise, we have contradictions: formulas that can only be false, e.g. (p p). CHAPTER 4. STATEMENT LOGIC 59 The rightmost column of this truth table contains instances of T and instances of F. Notice that there are no degrees of contingency. If both values are possible, the formula

More information

The Student-Project Allocation Problem

The Student-Project Allocation Problem The Student-Project Allocation Problem David J. Abraham, Robert W. Irving, and David F. Manlove Department of Computing Science, University of Glasgow, Glasgow G12 8QQ, UK Email: {dabraham,rwi,davidm}@dcs.gla.ac.uk.

More information

Master of Science in Computer Science

Master of Science in Computer Science Master of Science in Computer Science Background/Rationale The MSCS program aims to provide both breadth and depth of knowledge in the concepts and techniques related to the theory, design, implementation,

More information