Compositional Reachability Analysis of Genetic Networks
|
|
|
- Willis York
- 10 years ago
- Views:
Transcription
1 Compositional Reachability Analysis of Genetic Networks Gregor Gössler Pop Art project, INRIA Rhône-Alpes, France Abstract. Genetic regulatory networks have been modeled as discrete transition systems by many approaches, benefiting from a large number of formal verification algorithms available for the analysis of discrete transition systems. However, most of these approaches do not scale up well. In this article, we explore the use of compositionality for the analysis of genetic regulatory networks. We present a framework for modeling genetic regulatory networks in a modular yet faithful manner based on the mathematically well-founded formalism of differential inclusions. We then propose a compositional algorithm to efficiently analyze reachability properties of the model. A case study shows the potential of this approach. 1 Introduction A genetic regulatory network usually encompasses a multitude of complex, interacting feedback loops. Being able to model and analyze its behavior is crucial for understanding the interactions between the proteins, and their functions. Genetic regulatory networks have been modeled as discrete transition systems by many approaches, benefiting from a large number of formal verification algorithms available for the analysis of discrete transition systems. However, most of these approaches face the problem of state space explosion, as even models of modest size (from a biological point of view) usually lead to large transition systems, due to a combinatorial blow-up of the number of states. Even if the modeling formalism allows for a compact representation of the state space, such as Petri nets, subsequent analysis algorithms have to cope with the full state space. In practice, non-compositional approaches for the analysis of genetic regulatory networks do not scale up well. In order to deal with the problem of state space explosion, different techniques have been developed in the formal verification community, such as partial order reduction, abstraction, and compositional approaches. In this article, we explore the use of compositionality for the analysis of genetic regulatory networks. Compositional analysis means that the behavior of a system consisting of different components is analyzed by separately examining the behavior of the components and how they interact, rather than by monolithically analyzing the behavior of published in proc. CMSB 06, LNBI 4210, Springer-Verlag.
2 the overall system. It therefore can be more efficient than non-compositional analysis, and scale better. A precondition for compositional algorithms to be applicable, is that the model be structured. Therefore, this paper makes two contributions: first, we present a modeling framework for genetic regulatory networks in which the different components of the system (in our case, proteins or sets of proteins) and the way they constrain each other, are modeled separately and modularly. Second, we propose a compositional algorithm allowing to efficiently analyze reachability properties of the model. Cellular functions are often distributed over groups of components that interact within large networks. The components are organized in functional modules, forming a hierarchical architecture [25, 27]. Therefore, the approach of compositional analysis agrees with the modular structure of genetic regulatory networks, and may take advantage of it by using compositionality on different levels of modularity, for instance, between individual genes, sub-networks, or individual cells. However, compositionality is not everything. The model should also faithfully represent the actual behavior of the modeled network. The approach we present is based on the mathematically well-founded formalism of qualitative simulation [14]. Related work. By now there is a large number of approaches to model and analyze genetic networks. An overview is given in the survey of [11]. The modeling approaches adopt different mathematical frameworks, which vary in expressiveness and the availability and efficiency of verification algorithms. Most of the algorithms flatten the model and work on the global state space, without computationally taking advantage of the modularity of the problem. The approach of [6] compositionally models gene networks in a stochastic framework. There has been a wide variety of modeling approaches based on differential equations since the work of [19]. However, simulation and verification of the continuous model can be expensive, and many properties are not even decidable in this framework. Therefore, several ways have been investigated to discretize the continuous model defined by differential equations while preserving properties like soundness [14] and reachability [3]. [18] and [1] use predicate abstraction to automatically compute backward reachable sets of piecewise affine hybrid automata, and find a conservative approximation of reachability for linear hybrid systems, respectively. [26] addresses the bounded reachability problem of hybrid automata. In order to deal with complex networks, it may be a good choice to change precision against efficiency, and directly model genetic networks in a discrete framework, such as systems of logical equations [29, 5], Petri nets [22, 9, 28, 10], or rule-based formalisms like term rewriting systems [15, 16]. Formal verification can then be carried out enumeratively (for instance, [13, 2, 23]) or symbolically, see for example [8].
3 Organization of the paper. In Section 2, we introduce the modeling framework. We show how a genetic network can be modeled in a modular way in this framework, and compare the model with the qualitative model of [7]. Section 3 presents a reachability algorithm taking advantage of the modularity of the model. Section 4 illustrates our results with a case study, and Section 5 concludes. 2 Component-based Modeling of Genetic Networks This section briefly introduces the notions of piecewise linear system, and its qualitative simulation as defined in [7]. We then define a modularized approximation of qualitative simulation, and compare both models. 2.1 Piecewise Linear Systems The production of a protein in a cell is regulated by the current protein concentrations, which can activate or inhibit the production, for instance by binding to the gene and disabling transcription. At the same time, proteins are degraded. This behavior of a genetic network can be modeled by a system of differential equations of the form ẋ = f(x, u) g(x, u)x (1) where x is a vector of protein concentrations representing the current state, u is a vector of input concentrations, and the vector-valued function f and matrixvalued function g model the production rates, and degradation rates, respectively. The approach of [14, 7] considers an abstraction where the state space of each variable x i is partitioned into a set of intervals Di r and a set of threshold values Di s. This induces a partition of the continuous state space into a discrete set of domains, in each of which Equation (1) is approximated with a system of linear differential equations. Definition 1 (Domain). Consider a Cartesian product θ = θ 1... θ n with θ i = {θi 1,..., θpi i } an ordered set of thresholds, such that 0 < θ1 i <... < θ pi i < max i. Let D r i (θ) = {[0, θ1 i )} {(θj i, θj+1 i ) 1 j < p i } {(θ pi i, max i]} and Di s(θ) = { {θ j i } 1 j p i}. We omit the argument θ when it is clear from the context. Let D i = Di r Ds i, and D = D 1 D 2... D n be the set of domains. The domains in D r = D1 r Dr 2... Dr n are called regulatory domains, the domains D s = D D r are called switching domains. The state space [0, max 1 ] [0, max n ] is thus partitioned into the set of domains D. Definition 2 (Piecewise linear system). A piecewise linear system is a tuple M = (X, θ, µ, ν) where
4 X = {x 1,..., x n } a set of real-valued state variables; θ = θ 1... θ n, with θ i = {θi 1,..., θpi i } such that 0 < θ1 i <... < θpi i < max i, associates with each dimension an ordered set of thresholds; µ : D r (θ) IR n 0 associates with each regulatory domain a vector of production rates; ν : D r (θ) diag(ir n >0) associates with each regulatory domain a diagonal matrix of degradation rates. Within a regulatory domain D D r, the protein concentrations x evolve according to the ratio of production rate and degradation rate: ẋ = µ(d) ν(d)x (2) and thus converge monotonically towards the target equilibrium φ, solution of 0 = µ(d) ν(d)x. Definition 3 (φ). For any D D r, let φ(d) denote the target equilibrium of D such that φ i (D) = µ i (D)/ν i (D) for any variable x i X. Hypothesis: Throughout this paper we make the assumption that for any regulatory domain D, D D r. φ(d) D, that is, all target equilibria lie within regulatory domains, as in [14]. If φ(d) D then the systems stays in D, otherwise it eventually leaves D and enters an adjacent switching domain. In switching domains, where µ and ν are not defined, the behavior of M is defined using differential inclusions as proposed by [17, 21]. Notations. Let reg be the predicate characterizing the set of regulatory domains. For any i {1,..., n}, let reg i and switch i be predicates on D characterizing the regulatory intervals and thresholds of D i, respectively: reg i (D) D i D r i, and switch i (D) D i D s i for any D D. The order of a domain D is the number of variables taking a threshold value in D. Let succ i and prec i be the successor and predecessor function on the ordered set of intervals D i (in the sense that for any D 1, D 2 D i, D 1 < D 2 if x 1 D 1 x 2 D 2. x 1 < x 2 ). We define succ i ( (θ p i i, max i] ) = prec i ( [0, θ 1 i ) ) =. Definition 4 (R(D)). For any domain D = (D 1,..., D n ) D, let R(D) be the set of regulatory domains that have D in their boundary, such that R(D) = {D} for D D r : R(D) = { (D 1,..., D n) reg i (D i ) D i = D i switch i (D i ) ( D i = prec(d i) D i = succ(d i) )}
5 Gouzé and Sari [21] define the possible behaviors by the differential inclusion ẋ H(x) with H(x) = co ( {µ(d ) ν(d )x D R(D)} ) where co(e) is the smallest closed convex set containing the set E. For any regulatory domain D D r and x D, H(x) = {µ(d) ν(d)x}, that is, the behavior is consistent with Equation (2). Definition 5 (Trajectory). A trajectory of M is a solution of ẋ H(x). Qualitative model. The continuous behavior according to Definition 5 can be approximated by a discrete transition graph on the set of domains D [14, 7] (where the qualitative model of [7] is more precise than [14]). This graph simulates the behavior of the underlying genetic network. Example 1. Consider the example of two proteins a and b inhibiting each other s production [14], as shown in Figure 1. The respective production rates of proteins a and b are defined by µ a = { 20 if 0 xa < θ 2 a 0 x b < θ 1 b 0 otherwise µ b = { 20 if 0 xa < θ 1 a 0 x b < θ 2 b 0 otherwise with θa 1 = θ1 b = 4 and θ2 a = θ2 b = 8. The degradation rate ν of both proteins is ( always 2. The example is thus modeled by the piecewise linear system M = {xa, x b }, {θa 1, θ2 a } {θ1 b, θ2 b }, (µ a, µ b ) t, diag(ν, ν) ). a b Fig. 1. Two proteins inhibiting each other. 2.2 Transition systems and Constraints In the following, we present a simplified version of the component model adopted in [20]. For a set of variables X, let V (X) denote the set of valuations of X, and let P(X) = 2 V (X) be the set of predicates on V (X). Definition 6 (Transition system). A transition system B is a tuple (X, A, G, F ) where X is a finite set of variables;
6 A is a finite set of actions; G : A P(X) associates with every action its guard specifying when the action can occur; F : A ( V (X) V (X) ) associates with every action its transition function. For convenience, we write G a and F a for G(a) and F (a), respectively. Definition 7 (Semantics of a transition system). A transition system B = (X, A, G, F ) defines a transition relation : V (X) A V (X) such that: x, x V (X) a A. x a x G a (x) x = F a (x). We write x x for a A. x a x, and for the transitive and reflexive closure of. Given states x and x, x is reachable from x if x x. Definition 8 (Predecessors). Given a transition system B = (X, A, G, F ) and a predicate P P(X), let the predicate pre a (P ) characterize the predecessors of P by action a: pre a (P )(x) G a (x) P ( F a (x) ). Let pre(p ) = a A pre a(p ), pre 0 (P ) = P, and pre i+1 (P ) = pre(pre i (P )), i 0. The predicate pre a (P ) (resp. pre(p )) characterizes the states from which execution of a (resp. execution of some action) leads to a state satisfying P. We define two operations on transition systems: composition and restriction. The composition of transition systems is a transition system again, and so is the restriction of a transition system. Definition 9 (Composition). Let B i = (X 1, A i, G i, F i ), i = 1, 2, with X 1 X 2 = and A 1 A 2 =. B 1 B 2 is defined as the transition system (X 1 X 2, A 1 A 2, G 1 G 2, F 1 F 2 ). This is the standard asynchronous product. Restrictions allow to constrain the behavior of a transition system. Definition 10 (Action constraint). Given a transition system B = (X, A, G, F ), an action constraint is a tuple of predicates U = (U a ) a A with U a P(X). Definition 11 (Restriction). The restriction of B = (X, A, G, F ) with an action constraint U = (U a ) a A is the transition system B/U = (X, A, G, F ) where for any a A, G (a) = G(a) U a is the (restricted) guard of a in B/U. Example 2. Consider two transition systems B i = ({x i }, {inc i, dec i }, G i, F i ) where x i are variables on {low, high}, G i (inc i ) = (x i = low), G i (dec i ) = (x i = high), F i (inc i ) = (x i := high), and F i (dec i ) = (x i := low), i = 1, 2. The composition is B 1 B 2 = ({x 1, x 2 }, {inc 1, inc 2, dec 1, dec 2 }, G 1 G 2, F 1 F 2 ). Further suppose that we want to prevent B 1 from entering state x 1 = high if x 2 = high, and vice versa. This can be done by restricting B 1 B 2 with action constraint U = (U inc1, U inc2, U dec1, U dec2 ) where U inc1 = (x 2 = low), U inc2 = (x 1 = low), and U dec1 = U dec2 = true. The restricted system is (B 1 B 2 )/U = ({x 1, x 2 }, {inc 1, inc 2, dec 1, dec 2 }, G, F 1 F 2 ) with G (inc 1 ) = G 1 (inc 1 ) (x 2 = low), G (inc 2 ) = G 2 (inc 2 ) (x 1 = low), G (dec 1 ) = G 1 (dec 1 ), and G (dec 2 ) = G 1 (dec 2 ).
7 Definition 12 (incr, decr). Given a predicate P on D and i {1,..., n}, we define the predicates incr i (P ) and decr i (P ) such that for any domain D = (D 1,..., D i,..., D n ) D, incr i (P )(D) = P ( D 1,..., succ i (D i ),..., D n ) if succi (D i ), and incr i (P )(D) = false otherwise. Similarly, let decr i (P )(D) = P ( D 1,..., prec i (D i ),..., D n ) if preci (D i ), and decr i (P )(D) = false otherwise. Intuitively, incr i (P ) and decr i (P ) denote the predicate P shifted by one domain along the i-th dimension, towards lower and higher values, respectively. For instance, consider predicate P = (x a = θa 2 ) on the state space of Example 1. Then, incr a (P ) = (θa 1 < x a < θa) 2 and decr b (P ) = (x a = θa 2 θb 1 x b max b ). 2.3 Component Model of Genetic Networks We now propose the construction of a component-based model from a piecewise linear system. Definition 13 (eq). Given θ = θ 1... θ n, we define predicates eq # i on D, i {1,..., n}, # {<,,, >} such that for any domain D = (D 1,..., D n ) D, eq # i (D) D = (D 1,..., D n ) R(D) x D i. φ i(d )#x for # {<, >} eq = i (D) D = (D 1,..., D n) R(D) x D i. φ i (D ) = x and eq i = eq < i eq = i, eq i = eq = i eq > i. The predicates eq # i reflect the relative position of target equilibria of the adjacent regulatory domains. The predicates eq i < (D) and eq> i (D) specify when some adjacent regulatory domain has its target equilibrium left of D i and right of D i, respectively. Definition 14 (Č(M)). Given a piecewise linear system M = (X, θ, µ, ν) with X = n, we define the transition system Č(M) = (B 1 B 2... B n )/U as follows. i = 1,..., n. B i = counter(d i ), where counter(d i ) is a bounded counter defined on D i (θ) by the transition system counter(d i ) = ( {level i }, {inc i, dec i }, {G inci = level i θ pi i, = level Gdeci i θi 1}, { F inci = ( level i := succ i (level i ) ), F deci = ( level i := prec i (level i ) )}). U is an action constraint such that U(inc i ) = V i > and U(dec i ) = V i < with V < i =reg eq < i decr i (reg eq i ) (3) V > i =reg eq > i incr i (reg eq i ) (4) Actions inc i (dec i ) correspond to an increase (decrease) by one of the discretized concentration level i of protein i. The predicates V i < and V i > specify when a transition decrementing level i and incrementing level i, respectively, is enabled. More precisely, the first term in the disjunctions of lines (3) and (4) specifies that there is a transition from a regulatory domain to a first-order
8 switching domain in the direction of the target equilibrium of the source domain. The second term gives the conditions for transitions decreasing the order: they must be compatible with the relative position of the target equilibrium of the destination domain. Definition 14 limits the behavior of the model to transitions between regulatory and first-order switching domains. The generalization to the set of domains D is not presented here due to space limitation. Remark 1. Since is associative, Definition 14 leaves open how the system is actually partitioned into components (in the sense of sets of transition systems). The two extreme cases are that each B i is considered as one component, or that B 1 B 2... B n is considered as one single component. This choice will usually depend on the degree of interaction between the modeled proteins. Putting all proteins in one component amounts to a non-modular model leading to noncompositional analysis. Representing each protein with a separate component may lead to a too heavy abstraction of the behavior. A good choice may gather closely interacting proteins, for instance proteins in the same cell, in one component, while modeling neighboring cells as separate components. Notice that the above modeling framework enforces separation of concerns by making a clear distinction between the behaviors of the individual components, and constraints between the components. Example 3. Figure 2 shows the transition relations of counter(d a ), counter(d b ), and Č(M) for the piecewise linear system M of Example 1. x b dec b dec b inc b inc b θ 2 b dec b dec b inc b inc b θ 1 b counter(d b ) 0 θ 1 a θ 2 a x a counter(d a ) inc a inc a inc a inc a dec a dec a dec a dec a Fig. 2. The transition relations of counter(d a), counter(d b ), and Č(M).
9 Theorem 1 (Correctness). Consider a piecewise linear system M = (X, θ, µ, ν). The behavior of Č(M) under-approximates qualitative simulation as defined in [14, 7]. 3 Compositional Reachability Analysis Based on the transition system Č(M), the compositional algorithm shown below can be used to check for reachability of a goal domain, or set of domains, from an initial domain. The algorithm exhibits a path, if one is found, that solves the reachability problem. In the sequel we consider a system B = (X, A, G, F ) = (B 1... B N )/U with B i = (X i, A i, G i, F i ), i K = {1,..., N}, and U an action constraint. That is, we suppose the n proteins to be modeled with N (1 N n) components, according to Remark 1. Given a conjunction c = c 1... c N of predicates c i P(X i ), i = 1,..., N, let c[i] = c i denote the projection of c on X i. Let path k : V (X k ) P(X k ) 2 A k be a function on component k telling which action to take in order to get from some current component state towards a state satisfying some predicate. This function can be computed locally: for any predicate P P(X k ) and domain D, let path k (D[k], P ) = {a A k i 0. pre a ( pre i k (P ) ) (D[k]) j {0,..., i}. pre j k (P )(D[k])} That is, path k (D[k], P ) contains an action a if and only if executing a from D[k] will bring component k closer to P. For a set of actions A, let enabling(a) be a list of predicates enabling some action in A: c enabling(a). c = a A G(a). We suppose each of these predicates to be a conjunction of predicates on the components. Let denote list concatenation. Given a non-empty list l, we write l = e.l where e is the first element, and l the rest of the list. Given a list A of actions and a domain D, let first enabled(a, D) be the first action a of A such that G(a)(D), and first enabled(a, D) = if all actions are disabled. Algorithm 1 is constructive, that is, it establishes reachability from some initial domain D init to a set of domains P by constructing a path from D init to P. Function move works as follows. It takes as arguments the current domain D, a predicate to be reached in the form of a list d of conjunctions, and a list good of all actions requested to be executed, and returns a new domain, the part of the path constructed so far, and a boolean indicating whether a path was found. The five cases are (1) if the current domain satisfies the predicate to be reached, then we are done. (2) Otherwise, execute the first action in good that is enabled. If there is none, compute the set goal of actions not considered so far that bring the system closer to the first element c of d. (3) If goal is non-empty, recursively call move so as to reach some domain D enabling some action in goal, then call move once more to continue moving towards c. (4) If reaching c fails, try the next conjunction of d. (5) If all above fails, then this call of move
10 Algorithm 1 Initial call to construct a path σ from domain D init to predicate P : (D, σ, success) = move(d init, P, ). move 8 (D, c.l, good) = (D,, true) if c(d) (1) >< `F (a)(d), a, true if c(d) a (2) (D, σ σ, true) if c(d) a = goal ok ok (3) move(d, l, good) if c(d) a = (goal = (ok ok >: )) l (4) (D,, false) otherwise (5) where a = first enabled(good, D) goal = [ path k (D[k], c[k]) good k (D, σ, ok) = move`d, enabling(goal), good goal (D, σ, ok ) = move(d, c, good) failed. It can be shown that Algorithm 1 is guaranteed to terminate. It is not guaranteed to find a path even if one exists, though. If a path is found on Č(M), then Theorem 1 ensures that the same path exists in the qualitative model of [7]. Algorithm 1 is compositional in the sense that it independently computes local paths through the state spaces of the components (line goal = k path k(d[k], c[k]) good). A global path is then constructed from the local paths and the constraints between the components: when an action a to be executed is blocked by a constraint involving other components, the algorithm is called recursively to move the blocking components into a domain where a is enabled. Example 4 (Example 3 continued.). The functioning of Algorithm 1 is illustrated by the path construction from domain D init = (θa 1 < x a < θa 2 θ1 b < x b < θb 2) to domain D goal = (x a = θa 2 0 x b < θb 1 ) representing a stable equilibrium. The subsequent calls of move are move (D init, D goal, ) a =, goal = {inc a, dec b } move (D init, θ 1 a < x a < θ 2 a,..., inc a, dec b ) = (D 1 = (θ 1 a < x a < θ 2 a x b = θ 1 b ), dec b, true) (2) move (D 1, D goal, ) a =, goal = {inc a, dec b } move (D 1, θ 1 a < x a < θ 2 a,..., inc a, dec b ) = (D 2 = (θ 1 a < x a < θ 2 a 0 x b < θ 1 b ), dec b, true) (2) move (D 2, D goal, ) a =, goal = {inc a } move (D 2, x a < θ 2 a 0 x b < θ 1 b, inc a ) = (D goal, inc a, true) (2) move (D goal, D goal, ) = (D goal,, true)
11 = (D goal, inc a, true) (3) = (D goal, dec b, inc a, true) (3) = (D goal, dec b, dec b, inc a, true) (3) Thus, D goal is reached from D init by decrementing level b twice and then incrementing level a. 4 Case Study: Delta-Notch Cell Differentiation Cell differentiation by delta-notch lateral inhibition is a well-studied genetic network [24, 18]. Cell differentiation is an important step in embryonic development, as it causes initially uniform cells to assume different functions. For each cell we consider the concentrations of two trans-membrane proteins, Delta and Notch. Following the model provided in [24], high concentrations of Delta and Notch inhibit each other s production within the same cell. High Delta levels activate further Delta production in the same cell and Notch production in the neighboring cells. Figure 3 illustrates these interactions. Delta Delta Delta Notch Notch Notch Fig. 3. Interactions within and between neighbor cells. For our case study, we consider a network consisting of 19 cells with the layout shown in Figure 4, a network of 37 cells with a similar layout, and the network of 49 cells shown in Figure 4. For each protein we partition the continuous state space into two intervals and one threshold value: D = {[0, θ ), {θ }, (θ, max ]} and D N = {[0, θ N ), {θ N }, (θ N, max N ]}. Cells with low Delta and high Notch levels (0 < θ, θ N < Notch max N ) are undifferentiated, whereas cells with high Delta and low Notch concentrations (θ < max, 0 Notch < θ N ) are differentiated. We are not interested in the actual production and degradation rates of the proteins but require the target equilibria φ i and φ Notchi to satisfy 0 φ i < θ if Notch i > θ N θ < φ i max if Notch i < θ N 0 φ Notchi < θ N if max{ j j neighbors(i)} < θ θ N < φ Notchi max N if max{ j j neighbors(i)} > θ Considering only regulatory and first-order switching domains for a system modeling n cells, the 2n-dimensional global state space encompasses 4 n regula-
12 ( 1, N 1) ( 2, N 2) ( 3, N 3) ( 4, N 4) ( 5, N 5) ( 6, N 6) ( 7, N 7) ( 8, N 8) ( 9, N 9)( 10, N 10)( 11, N 11)( 12, N 12) ( 13, N 13)( 14, N 14)( 15, N 15)( 16, N 16) ( 17, N 17)( 18, N 18)( 19, N 19) Fig. 4. Model of 19 communicating cells (left); a stable equilibrium state involving 49 cells where dark cells are differentiated (right). tory domains and 2n 2 2n 1 first-order switching domains, that is, states for 19 cells, states for 37 cells, and states for 49 cells. We have implemented Algorithm 1 in the compositional verification tool Prometheus. To start, we choose to represent each cell by one component, and check reachability of a given stable equilibrium from the initial state where all cells are non differentiated. The results reported by Prometheus are consistent with the actual, experimentally observed behavior [24]. For the case of 49 cells and the state shown in Figure 4, Prometheus finds a path of length 32 reaching the state. Table 1 shows the execution times for the models of cell differentiation with 19, 37, and 49 cells, and for models of the nutritional stress response of E. coli [4] and sporulation initiation of B. subtilis taken from [12]. The subsequent columns show the number of domains of the model, and the times for constructing the component model and a path to the final state using Algorithm 1. All measurements have been made on the same machine, a Pentium4 at 3 GHz with 512 MB of memory. state space model reachability E. coli < 10 ms 0.02 s B. subtilis < 10 ms 0.28 s Delta-Notch s 1.06 s Delta-Notch s 10.8 s Delta-Notch s 7.5 s Table 1. Performance on different models. In order to evaluate the performance increase due to compositionality, we compare the compositional approach with a non-compositional reachability anal-
13 ysis, using the same framework. More precisely, we use Algorithm 1 to find a path from the initial, undifferentiated state to the state of Figure 4, on different instances of the Delta-Notch model with 49 cells. The only parameter that varies is the size of the components, where extreme cases are given by the model of 98 components each modeling one protein, and the model consisting of one single component. The measured performance is shown in Table 2. For this example, the optimal degree of modularity lies around one component per cell. It should be noted that the optimal partitioning of proteins into components depend on the system, and cannot be easily generalized. For a higher degree of modularity (1 component per protein), the algorithm performs somewhat slower, probably due to an overhead in coordination between closely interacting components. As the component size increases, complexity of the (non compositional) path construction within the components exponentially blows up. Although the algorithm used for path construction within a component is not designed to be optimal for large state spaces, it allows to compare the complexity for different degrees of granularity. cells per component /4 7 9/10 49 reachability 10.7 s 7.5 s 8.4 s 35.5 s (*) (*) Table 2. Benchmarks for different levels of modularity of Delta-Notch 49. (*): computation interrupted after 12 hours. 5 Discussion We have presented a novel approach for component-based modeling and reachability analysis of genetic regulatory networks. The model discretizes the network dynamics defined by a system of piecewise linear differential equations. On this model, a compositional algorithm constructively analyzes reachability properties, allowing to deal with complex, high-dimensional systems. A case study and several benchmarks show the potential of this approach. In spite of the conservative approximation, our approach has yielded the expected results in the case studies carried out so far, and confirmed its efficiency. We intend to apply the technique to genetic networks involving a hierarchy of communicating functional modules, and to models of not yet fully understood networks. We are currently investigating compositional analysis of further properties like equilibria and cyclic behavior, based on the same component model. In order to further improve precision, we intend to study the integration of the qualitative model of [3] using piecewise affine differential equations in our framework. Acknowledgment. The author thanks Hidde de Jong for many fruitful discussions and comments on earlier versions of this work.
14 References 1. R. Alur, T. Dang, and F. Ivancić. Reachability analysis of hybrid systems via predicate abstraction. Trans. on Embedded Computing Systems, G. Batt, D. Bergamini, H. de Jong, H. Garavel, and R. Mateescu. Model checking genetic regulatory networks using GNA and CADP. In proc. SPIN 04, volume 2989 of LNCS, pages Springer-Verlag, G. Batt, H. de Jong, J. Geiselmann, M. Page, D. Ropers, and D. Schneider. Symbolic reachability analysis of genetic regulatory networks using qualitative abstraction. Research Report 5362, INRIA, France, G. Batt, D. Ropers, H. de Jong, J. Geiselmann, M. Page, and D. Schneider. Qualitative analysis and verification of hybrid models of genetic regulatory networks: Nutritional stress response in escherichia coli. In proc. HSCC 05, volume 3414 of LNCS, pages Springer-Verlag, G. Bernot, J.-P. Comet, A. Richard, and J. Guespin. Application of formal methods to biological regulatory networks: Extending Thomas asynchronous logical approach with temporal logic. Journal of Theoretical Biology, 229(3): , R. Blossey, L. Cardelli, and A. Phillips. A compositional approach to the stochastic dynamics of gene networks. Trans. on Comput. Syst. Biol., 4:99 122, R. Casey, H. de Jong, and J.-L. Gouzé. Piecewise-linear models of genetic regulatory networks: Equilibria and their stability. Mathematical Biology, 52(1):27 56, N. Chabrier and F. Fages. Symbolic model checking of biochemical networks. In proc. CMSB 03, C. Chaouiya, E. Remy, P. Ruet, and D. Thieffry. Qualitative modelling of genetic networks: From logical regulatory graphs to standard petri nets. In J. Cortadella and W. Reisig, editors, proc. ICATPN 04, volume 3099 of LNCS, pages Springer-Verlag, J.-P. Comet, H. Klaudel, and S. Liauzu. Modeling multi-valued genetic regulatory networks using high-level petri nets. In G. Ciardo and P. Darondeau, editors, proc. ICATPN 05, volume 3536 of LNCS, pages Springer-Verlag, H. de Jong. Modeling and simulation of genetic regulatory systems: A literature review. Journal of Computational Biology, 9(1):69 105, H. de Jong, J. Geiselmann, G. Batt, C. Hernandez, and M. Page. Qualitative simulation of the initiation of sporulation in Bacillus subtilis. Bulletin of Mathematical Biology, 66(2): , H. de Jong, J. Geiselmann, C. Hernandez, and M. Page. Genetic Network Analyzer: Qualitative simulation of genetic regulatory networks. Bioinformatics, 19(3): , H. de Jong, J.-L. Gouzé, C. Hernandez, M. Page, T. Sari, and J. Geiselmann. Qualitative simulation of genetic regulatory networks using piecewise-linear models. Bulletin of Mathematical Biology, 66: , S. Eker, M. Knapp, K. Laderoute, P. Lincoln, and C. Talcott. Pathway logic: Executable models of biological networks. ENTCS, 71, F. Fages, S. Soliman, and N. Chabrier-Rivier. Modelling and querying interaction networks in the biochemical abstract machine BIOCHAM. J. of Biological Physics and Chemistry, 4(2):64 72, A.F. Filippov. Differential equations with discontinuous righthand side. Mathematics and its Applications, 18, 1988.
15 18. R. Ghosh, A. Tiwari, and C. Tomlin. Automated symbolic reachability analysis; with application to delta-notch signaling automata. In O. Maler and A. Pnueli, editors, proc. HSCC 03, volume 2623 of LNCS, pages Springer-Verlag, L. Glass and S.A. Kauffman. The logical analysis of continuous, non-linear biochemical control networks. Journal of Theoretical Biology, 39(1): , G. Gössler and J. Sifakis. Component-based construction of deadlock-free systems (extended abstract). In proc. FSTTCS 03, volume 2914 of LNCS. Springer-Verlag, J.-L. Gouzé and T. Sari. A class of piecewise linear differential equations arising in biological models. Dynamical Systems, 17(4): , M. Heiner and I. Koch. Petri net based model validation in systems biology. In J. Cortadella and W. Reisig, editors, proc. ICATPN 04, volume 3099 of LNCS, pages Springer-Verlag, A. Larrinaga, A. Naldi, L. Sánchez, D. Thieffry, and C. Chaouiya. GINsim: a software suite for the qualitative modelling, simulation and analysis of regulatory networks. Biosystems, G. Marnellos, G.A. Deblandre, E. Mjolsness, and G. Kintner. Delta-Notch lateral inhibitory patterning in the emergence of ciliated cells in Xenopus: Experimental observations and a gene network model. In proc. PSB 00, volume 5, pages World Scientific Publishing, Z.N. Oltvai and A.L. Barabási. Life s complexity pyramid. Science, 298: , C. Piazza, M. Antoniotti, V. Mysore, A. Policriti, F. Winkler, and B. Mishra. Algorithmic algebraic model checking I: Challenges form systems biology. In proc. CAV 05, volume 3576 of LNCS, pages Springer-Verlag, O. Resendis-Antonio, J.A. Freyre-González, R. Menchaca-Méndez, R.M. Gutiérrez- Ríos, A. Martínez-Antonio, C. Avila-Sánchez, and J. Collado-Vides. Modular analysis of the transcriptional regulatory network of e. coli. Trends in Genetics, 21(1):16 20, E. Simão, E. Remy, D. Thieffry, and C. Chaouiya. Qualitative modelling of regulated metabolic pathways: application to the tryptophan biosynthesis in e.coli. Bioinformatics, 21(Suppl. 2):ii190 ii196, R. Thomas. Boolean formalisation of genetic control circuits. J. Theor. Biol., 42: , 1973.
Qualitative Simulation and Model Checking in Genetic Regulatory Networks
An Application of Model Checking to a realistic biological problem: Qualitative Simulation and Model Checking in Genetic Regulatory Networks A presentation of Formal Methods in Biology Justin Hogg [email protected]
Using the Theory of Reals in. Analyzing Continuous and Hybrid Systems
Using the Theory of Reals in Analyzing Continuous and Hybrid Systems Ashish Tiwari Computer Science Laboratory (CSL) SRI International (SRI) Menlo Park, CA 94025 Email: [email protected] Ashish Tiwari
Qualitative analysis of regulatory networks
Qualitative analsis of regulator networks Denis THIEFFRY (LGPD-IBDM, Marseille, France) Introduction Formal tools for the analsis of gene networks Graph-based representation of regulator networks Dnamical
Software Verification: Infinite-State Model Checking and Static Program
Software Verification: Infinite-State Model Checking and Static Program Analysis Dagstuhl Seminar 06081 February 19 24, 2006 Parosh Abdulla 1, Ahmed Bouajjani 2, and Markus Müller-Olm 3 1 Uppsala Universitet,
Feed Forward Loops in Biological Systems
Feed Forward Loops in Biological Systems Dr. M. Vijayalakshmi School of Chemical and Biotechnology SASTRA University Joint Initiative of IITs and IISc Funded by MHRD Page 1 of 7 Table of Contents 1 INTRODUCTION...
Fixed Point Theorems
Fixed Point Theorems Definition: Let X be a set and let T : X X be a function that maps X into itself. (Such a function is often called an operator, a transformation, or a transform on X, and the notation
Doctor of Philosophy in Computer Science
Doctor of Philosophy in Computer Science Background/Rationale The program aims to develop computer scientists who are armed with methods, tools and techniques from both theoretical and systems aspects
Static Program Transformations for Efficient Software Model Checking
Static Program Transformations for Efficient Software Model Checking Shobha Vasudevan Jacob Abraham The University of Texas at Austin Dependable Systems Large and complex systems Software faults are major
Understanding the dynamics and function of cellular networks
Understanding the dynamics and function of cellular networks Cells are complex systems functionally diverse elements diverse interactions that form networks signal transduction-, gene regulatory-, metabolic-
Bargaining Solutions in a Social Network
Bargaining Solutions in a Social Network Tanmoy Chakraborty and Michael Kearns Department of Computer and Information Science University of Pennsylvania Abstract. We study the concept of bargaining solutions,
CHAPTER 1 Splines and B-splines an Introduction
CHAPTER 1 Splines and B-splines an Introduction In this first chapter, we consider the following fundamental problem: Given a set of points in the plane, determine a smooth curve that approximates the
Software Modeling and Verification
Software Modeling and Verification Alessandro Aldini DiSBeF - Sezione STI University of Urbino Carlo Bo Italy 3-4 February 2015 Algorithmic verification Correctness problem Is the software/hardware system
Modeling and Verification of Sampled-Data Hybrid Systems
Modeling and Verification of Sampled-Data Hybrid Systems Abstract B. Izaias Silva and Bruce H. Krogh Dept. of Electrical and Computer Engineering, Carnegie Mellon University (Izaias /krogh)@cmu.edu We
The Basics of Graphical Models
The Basics of Graphical Models David M. Blei Columbia University October 3, 2015 Introduction These notes follow Chapter 2 of An Introduction to Probabilistic Graphical Models by Michael Jordan. Many figures
Mathematics for Computer Science/Software Engineering. Notes for the course MSM1F3 Dr. R. A. Wilson
Mathematics for Computer Science/Software Engineering Notes for the course MSM1F3 Dr. R. A. Wilson October 1996 Chapter 1 Logic Lecture no. 1. We introduce the concept of a proposition, which is a statement
Representing Reversible Cellular Automata with Reversible Block Cellular Automata
Discrete Mathematics and Theoretical Computer Science Proceedings AA (DM-CCG), 2001, 145 154 Representing Reversible Cellular Automata with Reversible Block Cellular Automata Jérôme Durand-Lose Laboratoire
Formal Verification Coverage: Computing the Coverage Gap between Temporal Specifications
Formal Verification Coverage: Computing the Coverage Gap between Temporal Specifications Sayantan Das Prasenjit Basu Ansuman Banerjee Pallab Dasgupta P.P. Chakrabarti Department of Computer Science & Engineering
Development of dynamically evolving and self-adaptive software. 1. Background
Development of dynamically evolving and self-adaptive software 1. Background LASER 2013 Isola d Elba, September 2013 Carlo Ghezzi Politecnico di Milano Deep-SE Group @ DEIB 1 Requirements Functional requirements
24. The Branch and Bound Method
24. The Branch and Bound Method It has serious practical consequences if it is known that a combinatorial problem is NP-complete. Then one can conclude according to the present state of science that no
On the Interaction and Competition among Internet Service Providers
On the Interaction and Competition among Internet Service Providers Sam C.M. Lee John C.S. Lui + Abstract The current Internet architecture comprises of different privately owned Internet service providers
Verification of hybrid dynamical systems
Verification of hybrid dynamical systems Jüri Vain Tallinn Technical University/Institute of Cybernetics [email protected] Outline What are Hybrid Systems? Hybrid automata Verification of hybrid systems Verification
Notes V General Equilibrium: Positive Theory. 1 Walrasian Equilibrium and Excess Demand
Notes V General Equilibrium: Positive Theory In this lecture we go on considering a general equilibrium model of a private ownership economy. In contrast to the Notes IV, we focus on positive issues such
Max-Min Representation of Piecewise Linear Functions
Beiträge zur Algebra und Geometrie Contributions to Algebra and Geometry Volume 43 (2002), No. 1, 297-302. Max-Min Representation of Piecewise Linear Functions Sergei Ovchinnikov Mathematics Department,
ON FUNCTIONAL SYMBOL-FREE LOGIC PROGRAMS
PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical and Mathematical Sciences 2012 1 p. 43 48 ON FUNCTIONAL SYMBOL-FREE LOGIC PROGRAMS I nf or m at i cs L. A. HAYKAZYAN * Chair of Programming and Information
Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs
CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like
Model Checking: An Introduction
Announcements Model Checking: An Introduction Meeting 2 Office hours M 1:30pm-2:30pm W 5:30pm-6:30pm (after class) and by appointment ECOT 621 Moodle problems? Fundamentals of Programming Languages CSCI
1 if 1 x 0 1 if 0 x 1
Chapter 3 Continuity In this chapter we begin by defining the fundamental notion of continuity for real valued functions of a single real variable. When trying to decide whether a given function is or
Algebra Unpacked Content For the new Common Core standards that will be effective in all North Carolina schools in the 2012-13 school year.
This document is designed to help North Carolina educators teach the Common Core (Standard Course of Study). NCDPI staff are continually updating and improving these tools to better serve teachers. Algebra
Data Structures and Algorithms
Data Structures and Algorithms Computational Complexity Escola Politècnica Superior d Alcoi Universitat Politècnica de València Contents Introduction Resources consumptions: spatial and temporal cost Costs
Load Balancing and Switch Scheduling
EE384Y Project Final Report Load Balancing and Switch Scheduling Xiangheng Liu Department of Electrical Engineering Stanford University, Stanford CA 94305 Email: [email protected] Abstract Load
Testing LTL Formula Translation into Büchi Automata
Testing LTL Formula Translation into Büchi Automata Heikki Tauriainen and Keijo Heljanko Helsinki University of Technology, Laboratory for Theoretical Computer Science, P. O. Box 5400, FIN-02015 HUT, Finland
Stochastic Inventory Control
Chapter 3 Stochastic Inventory Control 1 In this chapter, we consider in much greater details certain dynamic inventory control problems of the type already encountered in section 1.3. In addition to the
Graph theoretic approach to analyze amino acid network
Int. J. Adv. Appl. Math. and Mech. 2(3) (2015) 31-37 (ISSN: 2347-2529) Journal homepage: www.ijaamm.com International Journal of Advances in Applied Mathematics and Mechanics Graph theoretic approach to
Statistical Forecasting of High-Way Traffic Jam at a Bottleneck
Metodološki zvezki, Vol. 9, No. 1, 2012, 81-93 Statistical Forecasting of High-Way Traffic Jam at a Bottleneck Igor Grabec and Franc Švegl 1 Abstract Maintenance works on high-ways usually require installation
DERIVATIVES AS MATRICES; CHAIN RULE
DERIVATIVES AS MATRICES; CHAIN RULE 1. Derivatives of Real-valued Functions Let s first consider functions f : R 2 R. Recall that if the partial derivatives of f exist at the point (x 0, y 0 ), then we
µz An Efficient Engine for Fixed points with Constraints
µz An Efficient Engine for Fixed points with Constraints Kryštof Hoder, Nikolaj Bjørner, and Leonardo de Moura Manchester University and Microsoft Research Abstract. The µz tool is a scalable, efficient
Protein Protein Interaction Networks
Functional Pattern Mining from Genome Scale Protein Protein Interaction Networks Young-Rae Cho, Ph.D. Assistant Professor Department of Computer Science Baylor University it My Definition of Bioinformatics
2.3 Convex Constrained Optimization Problems
42 CHAPTER 2. FUNDAMENTAL CONCEPTS IN CONVEX OPTIMIZATION Theorem 15 Let f : R n R and h : R R. Consider g(x) = h(f(x)) for all x R n. The function g is convex if either of the following two conditions
GameTime: A Toolkit for Timing Analysis of Software
GameTime: A Toolkit for Timing Analysis of Software Sanjit A. Seshia and Jonathan Kotker EECS Department, UC Berkeley {sseshia,jamhoot}@eecs.berkeley.edu Abstract. Timing analysis is a key step in the
Specification and Analysis of Contracts Lecture 1 Introduction
Specification and Analysis of Contracts Lecture 1 Introduction Gerardo Schneider [email protected] http://folk.uio.no/gerardo/ Department of Informatics, University of Oslo SEFM School, Oct. 27 - Nov.
Tensor Factorization for Multi-Relational Learning
Tensor Factorization for Multi-Relational Learning Maximilian Nickel 1 and Volker Tresp 2 1 Ludwig Maximilian University, Oettingenstr. 67, Munich, Germany [email protected] 2 Siemens AG, Corporate
Eastern Washington University Department of Computer Science. Questionnaire for Prospective Masters in Computer Science Students
Eastern Washington University Department of Computer Science Questionnaire for Prospective Masters in Computer Science Students I. Personal Information Name: Last First M.I. Mailing Address: Permanent
On strong fairness in UNITY
On strong fairness in UNITY H.P.Gumm, D.Zhukov Fachbereich Mathematik und Informatik Philipps Universität Marburg {gumm,shukov}@mathematik.uni-marburg.de Abstract. In [6] Tsay and Bagrodia present a correct
Introduction to Machine Learning and Data Mining. Prof. Dr. Igor Trajkovski [email protected]
Introduction to Machine Learning and Data Mining Prof. Dr. Igor Trakovski [email protected] Neural Networks 2 Neural Networks Analogy to biological neural systems, the most robust learning systems
In developmental genomic regulatory interactions among genes, encoding transcription factors
JOURNAL OF COMPUTATIONAL BIOLOGY Volume 20, Number 6, 2013 # Mary Ann Liebert, Inc. Pp. 419 423 DOI: 10.1089/cmb.2012.0297 Research Articles A New Software Package for Predictive Gene Regulatory Network
Monitoring Metric First-order Temporal Properties
Monitoring Metric First-order Temporal Properties DAVID BASIN, FELIX KLAEDTKE, SAMUEL MÜLLER, and EUGEN ZĂLINESCU, ETH Zurich Runtime monitoring is a general approach to verifying system properties at
Load balancing Static Load Balancing
Chapter 7 Load Balancing and Termination Detection Load balancing used to distribute computations fairly across processors in order to obtain the highest possible execution speed. Termination detection
[Refer Slide Time: 05:10]
Principles of Programming Languages Prof: S. Arun Kumar Department of Computer Science and Engineering Indian Institute of Technology Delhi Lecture no 7 Lecture Title: Syntactic Classes Welcome to lecture
Reliability Guarantees in Automata Based Scheduling for Embedded Control Software
1 Reliability Guarantees in Automata Based Scheduling for Embedded Control Software Santhosh Prabhu, Aritra Hazra, Pallab Dasgupta Department of CSE, IIT Kharagpur West Bengal, India - 721302. Email: {santhosh.prabhu,
Lecture 3: Linear methods for classification
Lecture 3: Linear methods for classification Rafael A. Irizarry and Hector Corrada Bravo February, 2010 Today we describe four specific algorithms useful for classification problems: linear regression,
DEGREE PLAN INSTRUCTIONS FOR COMPUTER ENGINEERING
DEGREE PLAN INSTRUCTIONS FOR COMPUTER ENGINEERING Fall 2000 The instructions contained in this packet are to be used as a guide in preparing the Departmental Computer Science Degree Plan Form for the Bachelor's
Class Meeting # 1: Introduction to PDEs
MATH 18.152 COURSE NOTES - CLASS MEETING # 1 18.152 Introduction to PDEs, Fall 2011 Professor: Jared Speck Class Meeting # 1: Introduction to PDEs 1. What is a PDE? We will be studying functions u = u(x
Probability Using Dice
Using Dice One Page Overview By Robert B. Brown, The Ohio State University Topics: Levels:, Statistics Grades 5 8 Problem: What are the probabilities of rolling various sums with two dice? How can you
Chapter 12 Discovering New Knowledge Data Mining
Chapter 12 Discovering New Knowledge Data Mining Becerra-Fernandez, et al. -- Knowledge Management 1/e -- 2004 Prentice Hall Additional material 2007 Dekai Wu Chapter Objectives Introduce the student to
Solving polynomial least squares problems via semidefinite programming relaxations
Solving polynomial least squares problems via semidefinite programming relaxations Sunyoung Kim and Masakazu Kojima August 2007, revised in November, 2007 Abstract. A polynomial optimization problem whose
InvGen: An Efficient Invariant Generator
InvGen: An Efficient Invariant Generator Ashutosh Gupta and Andrey Rybalchenko Max Planck Institute for Software Systems (MPI-SWS) Abstract. In this paper we present InvGen, an automatic linear arithmetic
1 Local Brouwer degree
1 Local Brouwer degree Let D R n be an open set and f : S R n be continuous, D S and c R n. Suppose that the set f 1 (c) D is compact. (1) Then the local Brouwer degree of f at c in the set D is defined.
TOPIC 4: DERIVATIVES
TOPIC 4: DERIVATIVES 1. The derivative of a function. Differentiation rules 1.1. The slope of a curve. The slope of a curve at a point P is a measure of the steepness of the curve. If Q is a point on the
Euler: A System for Numerical Optimization of Programs
Euler: A System for Numerical Optimization of Programs Swarat Chaudhuri 1 and Armando Solar-Lezama 2 1 Rice University 2 MIT Abstract. We give a tutorial introduction to Euler, a system for solving difficult
Chapter 3. Cartesian Products and Relations. 3.1 Cartesian Products
Chapter 3 Cartesian Products and Relations The material in this chapter is the first real encounter with abstraction. Relations are very general thing they are a special type of subset. After introducing
Separation Properties for Locally Convex Cones
Journal of Convex Analysis Volume 9 (2002), No. 1, 301 307 Separation Properties for Locally Convex Cones Walter Roth Department of Mathematics, Universiti Brunei Darussalam, Gadong BE1410, Brunei Darussalam
Notes on Complexity Theory Last updated: August, 2011. Lecture 1
Notes on Complexity Theory Last updated: August, 2011 Jonathan Katz Lecture 1 1 Turing Machines I assume that most students have encountered Turing machines before. (Students who have not may want to look
Data Integration: A Theoretical Perspective
Data Integration: A Theoretical Perspective Maurizio Lenzerini Dipartimento di Informatica e Sistemistica Università di Roma La Sapienza Via Salaria 113, I 00198 Roma, Italy [email protected] ABSTRACT
A New Quantitative Behavioral Model for Financial Prediction
2011 3rd International Conference on Information and Financial Engineering IPEDR vol.12 (2011) (2011) IACSIT Press, Singapore A New Quantitative Behavioral Model for Financial Prediction Thimmaraya Ramesh
A Static Analyzer for Large Safety-Critical Software. Considered Programs and Semantics. Automatic Program Verification by Abstract Interpretation
PLDI 03 A Static Analyzer for Large Safety-Critical Software B. Blanchet, P. Cousot, R. Cousot, J. Feret L. Mauborgne, A. Miné, D. Monniaux,. Rival CNRS École normale supérieure École polytechnique Paris
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 17 Shannon-Fano-Elias Coding and Introduction to Arithmetic Coding
Completion Time Scheduling and the WSRPT Algorithm
Completion Time Scheduling and the WSRPT Algorithm Bo Xiong, Christine Chung Department of Computer Science, Connecticut College, New London, CT {bxiong,cchung}@conncoll.edu Abstract. We consider the online
PETRI NET BASED SUPERVISORY CONTROL OF FLEXIBLE BATCH PLANTS. G. Mušič and D. Matko
PETRI NET BASED SUPERVISORY CONTROL OF FLEXIBLE BATCH PLANTS G. Mušič and D. Matko Faculty of Electrical Engineering, University of Ljubljana, Slovenia. E-mail: [email protected] Abstract: The
Example 4.1 (nonlinear pendulum dynamics with friction) Figure 4.1: Pendulum. asin. k, a, and b. We study stability of the origin x
Lecture 4. LaSalle s Invariance Principle We begin with a motivating eample. Eample 4.1 (nonlinear pendulum dynamics with friction) Figure 4.1: Pendulum Dynamics of a pendulum with friction can be written
Modeling and Simulation of Gene Regulatory Networks
Modeling and Simulation of Gene Regulatory Networks Hidde de Jong INRIA Grenoble - Rhône-Alpes [email protected] http://ibis.inrialpes.fr INRIA Grenoble - Rhône-Alpes and IBIS IBIS: systems biology
PartJoin: An Efficient Storage and Query Execution for Data Warehouses
PartJoin: An Efficient Storage and Query Execution for Data Warehouses Ladjel Bellatreche 1, Michel Schneider 2, Mukesh Mohania 3, and Bharat Bhargava 4 1 IMERIR, Perpignan, FRANCE [email protected] 2
CS 3719 (Theory of Computation and Algorithms) Lecture 4
CS 3719 (Theory of Computation and Algorithms) Lecture 4 Antonina Kolokolova January 18, 2012 1 Undecidable languages 1.1 Church-Turing thesis Let s recap how it all started. In 1990, Hilbert stated a
INTRODUCTORY SET THEORY
M.Sc. program in mathematics INTRODUCTORY SET THEORY Katalin Károlyi Department of Applied Analysis, Eötvös Loránd University H-1088 Budapest, Múzeum krt. 6-8. CONTENTS 1. SETS Set, equal sets, subset,
FPGA area allocation for parallel C applications
1 FPGA area allocation for parallel C applications Vlad-Mihai Sima, Elena Moscu Panainte, Koen Bertels Computer Engineering Faculty of Electrical Engineering, Mathematics and Computer Science Delft University
Undergraduate Notes in Mathematics. Arkansas Tech University Department of Mathematics
Undergraduate Notes in Mathematics Arkansas Tech University Department of Mathematics An Introductory Single Variable Real Analysis: A Learning Approach through Problem Solving Marcel B. Finan c All Rights
GenOpt (R) Generic Optimization Program User Manual Version 3.0.0β1
(R) User Manual Environmental Energy Technologies Division Berkeley, CA 94720 http://simulationresearch.lbl.gov Michael Wetter [email protected] February 20, 2009 Notice: This work was supported by the U.S.
Random vs. Structure-Based Testing of Answer-Set Programs: An Experimental Comparison
Random vs. Structure-Based Testing of Answer-Set Programs: An Experimental Comparison Tomi Janhunen 1, Ilkka Niemelä 1, Johannes Oetsch 2, Jörg Pührer 2, and Hans Tompits 2 1 Aalto University, Department
Discrete Optimization
Discrete Optimization [Chen, Batson, Dang: Applied integer Programming] Chapter 3 and 4.1-4.3 by Johan Högdahl and Victoria Svedberg Seminar 2, 2015-03-31 Todays presentation Chapter 3 Transforms using
Mathematics Course 111: Algebra I Part IV: Vector Spaces
Mathematics Course 111: Algebra I Part IV: Vector Spaces D. R. Wilkins Academic Year 1996-7 9 Vector Spaces A vector space over some field K is an algebraic structure consisting of a set V on which are
Nonparametric adaptive age replacement with a one-cycle criterion
Nonparametric adaptive age replacement with a one-cycle criterion P. Coolen-Schrijner, F.P.A. Coolen Department of Mathematical Sciences University of Durham, Durham, DH1 3LE, UK e-mail: [email protected]
DATA ANALYSIS II. Matrix Algorithms
DATA ANALYSIS II Matrix Algorithms Similarity Matrix Given a dataset D = {x i }, i=1,..,n consisting of n points in R d, let A denote the n n symmetric similarity matrix between the points, given as where
Is Sometime Ever Better Than Alway?
Is Sometime Ever Better Than Alway? DAVID GRIES Cornell University The "intermittent assertion" method for proving programs correct is explained and compared with the conventional method. Simple conventional
Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh
Modern Optimization Methods for Big Data Problems MATH11146 The University of Edinburgh Peter Richtárik Week 3 Randomized Coordinate Descent With Arbitrary Sampling January 27, 2016 1 / 30 The Problem
Inner Product Spaces
Math 571 Inner Product Spaces 1. Preliminaries An inner product space is a vector space V along with a function, called an inner product which associates each pair of vectors u, v with a scalar u, v, and
1 VECTOR SPACES AND SUBSPACES
1 VECTOR SPACES AND SUBSPACES What is a vector? Many are familiar with the concept of a vector as: Something which has magnitude and direction. an ordered pair or triple. a description for quantities such
FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT MINING SYSTEM
International Journal of Innovative Computing, Information and Control ICIC International c 0 ISSN 34-48 Volume 8, Number 8, August 0 pp. 4 FUZZY CLUSTERING ANALYSIS OF DATA MINING: APPLICATION TO AN ACCIDENT
Artificial Neural Networks and Support Vector Machines. CS 486/686: Introduction to Artificial Intelligence
Artificial Neural Networks and Support Vector Machines CS 486/686: Introduction to Artificial Intelligence 1 Outline What is a Neural Network? - Perceptron learners - Multi-layer networks What is a Support
