Learning Workflow Petri Nets

Size: px
Start display at page:

Download "Learning Workflow Petri Nets"

Transcription

1 Lerning Workflow Petri Nets Jvier Esprz, Mrtin Leucker, nd Mximilin Schlund Technische Universität München, Boltzmnnstr. 3, Grching, Germny Abstrct. Workflow mining is the tsk of utomticlly producing workflow model from set of event logs recording sequences of workflow events; ech sequence corresponds to use cse or workflow instnce. Forml pproches to workflow mining ssume tht the event log is complete (contins enough informtion to infer the workflow) which is often not the cse. We present lerning pproch tht relxes this ssumption: if the event log is incomplete, our lerning lgorithm utomticlly derives queries bout the executbility of some event sequences. If techer nswers these queries, the lgorithm is gurnteed to terminte with correct model. We provide mtching upper nd lower bounds on the number of queries required by the lgorithm, nd report on the ppliction of n implementtion to some exmples. 1 Introduction Modern workflow mngement systems offer modelling cpbilities to support business processes [vdavh04]. However, constructing forml or semi-forml workflow model of n existing business process is non-trivil tsk, nd for this reson workflow mining hs been extensively studied (see [vdavdh + 03] for survey). In this pproch, informtion bout the business processes is gthered in the form of logs recording sequences of workflow events, where ech sequence corresponds to use cse. The logs re then used to extrct forml model. Workflow mining techniques hve been implemented in severl systems, most prominently in the ProM tool [vdavdg + 07], nd successfully pplied. Most pproches to process mining use combintion of heuristics nd forml techniques, like mchine lerning or neurl networks, nd do not offer ny kind of gurntee bout the reltionship between the business process nd the mined model. Forml pproches hve been studied using workflow grphs [AGL98] nd workflow nets [vda98, BDLM07] s formlisms. These pproches ssume tht the logs provide enough informtion to infer the model, i.e., tht there is one single model comptible with them. In this cse we the cll the logs complete. This is strong ssumption, which often fils to hold, for two resons: first, the number of use cses my grow exponentilly in the number of tsks of the process, nd so my the size of complete set of logs. Second, mny processes hve corner cses : unusul process instnces tht rrely hppen. A complete set of logs must contin t lest one instnce of ech corner cse. In this pper we propose lerning technique to relx the completeness ssumption on the set of logs. In this pproch the model is produced by Lerner

2 tht my sk questions to Techer. The Lerner cn hve initil knowledge in the form of n initil set of logs; if the log contins enough informtion to infer the model, the Lerner produces it. If not, it itertively produces membership queries of the form: Does the business process hve n instnce ( use cse) strting with given sequence of tsks? For instnce, in the stndrd exmple of complint processing (see Figure 1 nd [vda98]), membership query could hve the form Is there use cse in which first the complint is registered nd then immeditely rejected? The Techer would nswer no, becuse decision on cceptnce or rejection is mde only fter the customer hs been sent questionnire. Notice tht the Lerner does not guess the queries, they re utomticlly constructed by the lerning lgorithm. Under the ssumption tht the Techer provides correct nswers, the lerning process is gurnteed to terminte with correct model: model whose executions coincide with the possible event sequences of the business process. In other words, we provide forml frmework with correctness nd completeness gurntee which only ssumes the existence of the Techer. It could be objected tht if Techer exists, then workflow model must lredy exist, nd there is no need to produce it. To see the flw in this rgument, observe tht the Techers cn be employees, dtbses of client records, etc, tht hve knowledge bout the process, but usully lck the modelling expertise required to produce forml model. Our lerning lgorithm only requires from the Techer the low-level bility to recognize given sequence of process ctions s the initil sequence of process ctions of some use cse. It is useful to drw n nlogy. Witnesses of crime cn usully nswer questions bout the physicl ppernce of the criminl, but they re very rrely ble to drw the criminl s portrit: this requires interction with police expert. This interction cn be seen s lerning process: the Techer is the witness, nd the Lerner is the police expert. The techer hs knowledge bout the criminl, but is unble to express it in the form of portrit. The Lerner hs the expertise required to produce portrit, but needs input from the Techer. In the context of business processes, Like [vda98, KRS06, BDLM07, RGvdA + 07], we use workflow nets, introduced by vn der Alst, s forml model of business processes. Loosely speking, workflow net is Petri net with distinguished initil nd finl mrking. Vn der Alst convincingly rgues tht well-formed business processes (n informl notion) correspond to sound workflow nets ( forml concept). A workflow net is sound [vda98] if it is live nd bounded. In this pper we follow vn der Alst s ides. Given Techer, we wish to lern sound workflow net for the business process. It is esy to come up with nive correct lerning lgorithm. However, first nive complexity nlysis yields tht the number of queries necessry to lern workflow net cn be triple exponentil in the number of tsks of the business process in the worst cse. This seems to indicte tht the pproch is useless. However, we show how the specil properties of sound workflow nets, together with finer complexity nlysis, led to WNL, new lerning lgorithm 2

3 requiring single exponentil number of queries in the worst cse. We lso provide n exponentil lower bound, showing tht WNL is symptoticlly optiml. Finlly, in number of experiments we show tht despite the exponentil worstcse complexity the lgorithm is ble to synthesize interesting workflows. Notice lso tht the complexity is nlysed for the cse in which no initil event log is provided, tht is, the cse in which ll knowledge hs to be extrcted from the Techer by sking membership queries. Techniclly, the triple exponentil complexity of the nive lgorithm is consequence of the following three fcts: () the size of deterministic finite utomton (DFA) recognizing the lnguge of net with n trnsitions cn be priori double exponentil in n; (b) lerning such DFA using only membership queries requires exponentilly mny queries in the size of the DFA (follows from [Ang87] nd [Vs73, Cho78]); nd (c) the lgorithms of Drondeu et l. for synthesis of Petri nets from regulr lnguges [BBD95] re exponentil in the size of the DFA. In the pper we solve () by proving tht the size of the DFA is only single exponentil; we solve (b) by exhibiting better lerning lgorithm for sound workflow nets requiring only polynomilly mny queries; finlly, we solve (c) by showing tht for sound workflow nets the lgorithms for synthesis of Petri nets from regulr lnguges cn be replced by the lgorithms for synthesis of bounded nets from miniml DFA, which re of polynomil complexity. Notice tht our solution very much profits from the restriction to sound workflow nets, but tht this restriction is given by the ppliction domin: tht sound workflow nets re n dequte formliztion of well-formed business processes hs been proved by the lrge success of the model in both the workflow modelling nd Petri net communities. Outline In the next section, we fix the nottion of utomt, recll the notion of Petri nets nd workflow nets, nd cite results on synthesis of Petri nets from utomt. Our lerning lgorithm WNL is elborted in Section 3. Section 4 reports on our implementtion nd experimentl results. Finlly, we sum up our contribution in the conclusion. 2 Preliminries We ssume tht the reder is fmilir with elementry notions of grphs, utomt nd net theory. In this section we fix some nottions nd define some less common notions. Automt nd Lnguges A deterministic finite utomton (DFA) is 5- tuple A = (Q, Σ, δ, q 0, F ) where Q is finite set of sttes, Σ is finite lphbet, q 0 Q is the initil stte, δ : Q Σ Q is the (prtil) trnsition function nd 3

4 F Q is the set of finl sttes. We denote by δ the function δ : Q Σ Q inductively defined by δ(q, ɛ) = q nd δ(q, w) = δ( δ(q, w), ). The lnguge L(q) of some stte q Q is the set of words w Σ such tht δ(q, w) F. The lnguge recognized by DFA A is defined s L(A) := L(q 0 ). A lnguge is regulr if it is ccepted by some DFA. Myhill-Nerode s theorem nd miniml DFAs Given lnguge L Σ, we sy two words w, w Σ re L-equivlent, denoted by w L w, if wv L w v L for every v Σ. The lnguge L is regulr iff L-equivlence prtitions Σ into finite number of equivlence clsses. Given regulr lnguge L, there exists unique DFA A up to isomorphism with miniml number of sttes such tht L(A) = L; this utomton A is clled the miniml DFA for L. The number of sttes of this utomton recognizing is equl to the number of equivlence clsses. Given DFA A = (Q, Σ, δ, q 0, F ), we sy two sttes q, q Q re A-equivlent if L(q) = L(q ). We cn quotient A with respect to this equivlence reltion. The sttes of the quotient DFA re the equivlence clsses of A. The trnsitions re defined by lifting the trnsitions of A: for every trnsition q q, dd [q] [q ] to the trnsitions of the quotient DFA, where [q] nd [q ] denote s the equivlence clsses of q nd q. The initil stte is [q 0 ], nd the finl sttes re {[q] q F }. The quotient DFA recognizes the sme lnguge s A, nd is isomorphic to the miniml DFA recognizing L. It is esy to see tht the miniml utomton for prefix-closed regulr lnguge hs unique non-finl stte ( trp stte). For simplicity, we sometimes identify this utomton with the one obtined by removing the trp stte together with its ingoing nd outgoing trnsitions. Petri Nets A (mrked) Petri net is 5-tuple N = (P, T, F, W, m 0 ) where P is set of plces, T is set of trnsitions with P T =, F (P T ) (T P ) is flow reltion, W : (P T ) (T P ) N is weight function stisfying W (x, y) > 0 iff (x, y) F, nd m 0 : P N is mpping clled the initil mrking. For ech trnsition or plce x we cll the set x := {y P T : (y, x) F } the preset of x. Anlogously we cll x := {y P T : (x, y) F } the postset of x. A net is pure if no trnsition belongs to both the pre- nd postsets of some plce. Given n rbitrry but fixed numbering of P nd T, the incidence mtrix of N is the P T -mtrix C given by: C(p i, t j ) = W (t j, p i ) W (p i, t j ). A trnsition t T is enbled t mrking m, if p t : m(p) W (p, t). If trnsition t is enbled it cn fire to produce the new mrking m, written s m t m. m (p) := m(p) + C(p, t) p P Given w = t 1 t n T (i.e. t i T ), we write m 0 m if there exist mrkings t m 1,..., m n 1 such tht m 1 t 0 2 t m1 m2... m n n 1 m. Then, we sy w 4

5 tht m is rechble. The set of rechble mrkings of N is denoted by M(N) nd defined by M(N) = {m : w T w. m 0 m}. It is well-known tht if w m 0 m, then m = m0 + C P (w), where P (w), the Prikh vector of w, is the vector of dimension T hving s i-th component the number of times tht t i occurs in w. We cll this equlity the mrking eqution. A net N is k-bounded if m(p) k for every rechble mrking m nd every plce p of N, nd bounded if it is k-bounded for some k 0. A 1-bounded net is w lso clled sfe. A net is reversible if for every firing sequence m 0 m there is sequence v w leding bck to the initil stte, i.e. m vw m 0. N is live if every trnsition cn fire eventully t every mrking, i.e. m M(N) w m.m wmt m for some m. The rechbility grph of net N = (P, T, F, W, m 0 ) is the directed grph G = (V, E) with V = M(N) nd (x, y) E iff x t y for some t T. If G is finite, then the five-tuple A(N) = (Q, Σ, δ, q 0, F ) given by Q = M(N), Σ = T, q 0 = m 0, F = Q nd δ(m, t) := m if m t m is DFA, nd undefined otherwise. (Note tht δ is well-defined, becuse if m t m nd m t m then m = m.) We cll it the mrking-dfa of N. The lnguge of N, denoted by L(N), is defined s the lnguge of A(N). Workflow nets Loosely speking, workflow net is Petri net with two distinguished input nd output plces without input nd output trnsitions respectively, nd such tht the ddition of reset trnsition leding bck from the output to the input plce mkes the net strongly connected (see Figure 1, for exmple). Formlly, net N = (P, T, F, W, m 0 ) is workflow net if there exist plces i, o P such tht i = = o, m 0 (p) = 1 for p = i nd m 0 (p) = 0, otherwise, nd the net Ñ = (P, T {r}, F {(o, r), (r, i)}, W {(o, r) 1, (r, i) 1}, m 0 ), where r / T, is strongly connected. wr A firing sequence w of workflow net N is run if m 0 m 0 in Ñ. The runs of N re the formliztion of the use cses of the business process modelled by the workflow net. A workflow net N is sound if Ñ is live nd bounded. It is rgued in [vda98] tht well-formed business process cn be modelled by sound workflow net (t certin level of bstrction). The workflow net in Figure 1 is very simple model for processing complints ( slightly ltered exmple, tken from [vdavh04]) The following lemm chrcterizes soundness. In the pper we work with this chrcteriztion s definition. Lemm 1. A workflow net N is sound iff Ñ is bounded, reversible, nd for every trnsition t there is rechble mrking m such tht m enbles t. Proof. Let N = (P, T, F, W, m 0 ) be workflow net. ( ): Assume N is sound. Then Ñ is bounded nd live. We show Ñ is reversible. w Let m be n rbitrry rechble mrking of Ñ. Then m 0 m for some w (T {r}) wr. Since Ñ is live, there is firing sequence w such tht m m for some mrking m. We clim m = m 0. Assume m m 0. Then, since m (i) > 0, 5

6 contct customer ccept py refund i register collect cquire info rchive o need more info contct deprtment reject send rejection Fig. 1. An exmple for sound workflow net (drwn without the reset trnsition r) we hve m (p) m 0 (p) for every plce p, nd m (p) > m 0 (p) for some p. So m strictly covers m 0, nd so N is not bounded. ( ): Assume Ñ is bounded, reversible nd every trnsition is enbled t some rechble mrking. We show tht Ñ is live, which implies tht N is sound. Let m be n rbitrry rechble mrking of Ñ, nd let t T {r}. Since Ñ is reversible, m w m 0 for some w (T {r}), nd since t occurs in some firing vt sequence m 0 m for some v (T {r}) nd some m. So Ñ is live (nd bounded by ssumption) nd therefore N is sound. Synthesis of Petri nets from Lnguges nd from Automt In [BBD95], Drondeu et l. ddress two synthesis problems of Petri nets from miniml DFA A over n lphbet T : (S1) Decide if there is bounded net N with T s set of trnsitions such tht L(N) = L(A), nd if so return one. We cll this problem synthesis up to lnguge equivlence. (S2) Decide if there is bounded net N with T s set of trnsitions such tht the rechbility grph of N is isomorphic to A, nd if so return one. We cll this problem synthesis up to isomorphism. The lgorithm of [BBD95] for synthesis up to lnguge equivlence works in two phses: firstly, A is trnsformed into n equivlent utomton A in certin norml form. In the worst cse, A cn be exponentilly lrger thn A. The second phse constructs the net N, if it exists, in polynomil time in A. The lgorithm requires exponentil time in A. The lgorithm of [BBD95] for synthesis up to isomorphism, on the contrry, needs only polynomil time in A. Notice tht, in generl, if one knows the lnguge L(N) of net, one does not know yet its rechbility grph. In prticulr, the miniml utomton recognizing L(N) my not be the rechbility grph of ny net. The bsic lgorithm in [BBD95] cn only hndle pure nets, but there is lso generliztion to non-pure nets to be found in [BDBM96]. Hints on how to obtin nets tht re more visully ppeling (i.e. hve few rcs, no redundnt plces, etc.) thn those generted by stndrd synthesis l- 6

7 gorithms cn be found in [BDKM08], where net synthesis ws pplied to process mining from event logs. 3 A Lerning Algorithm for Sound Workflow Nets Our gol is to develop lerning lgorithm for sound workflow nets which is gurnteed to terminte, nd in which techer only needs to nswer membership queries. The precise lerning setting is s follows. We hve Lener nd Techer. The Lerner is given set T of trnsitions, where ech trnsition corresponds to dedicted tsk (in the sense of [vda98]) of the business process. The Lerner repetedly sks the Techer workflow membership queries. A query is sequence σ T, nd is nswered by the Techer s follows: if σ cn be extended to use cse (i.e., sequence corresponding to complete instnce of the business process), then the Techer returns this use cse in the form of trnsition sequence στr, where τ T. Otherwise, the Techer nswers no. In our running exmple the Lerner is given the set of trnsitions of the net of Figure 1, nd the Techer s nswers re comptible with this net, i.e., cts s if it knew the net. Note tht in prctice, this only mens tht the Techer cn either extend the query to use cse of the net to lern or cn reject the query. Two possible queries re register contct customer contct deprtment register contct customer collect A possible nswer to the first query is the run register contct customer contct deprtment collect ccept py refund rchive while the nswer to the second query is no. Assuming tht the Techer s nswers re comptible with k-bounded nd reversible net N, the gol of the Lerner is to produce net N such tht L(N) = L(N ). It is esy to see tht (very inefficient) lerning lgorithm exists: (1) A net with n trnsitions hs t most c 1 := 2 (n+1) plces, becuse plce is determined by its pre- nd post-sets of trnsitions. (2) By (1), N hs t most c 2 := (k + 1) c1 rechble mrkings. Therefore, there exists miniml DFA A with t most c 2 sttes such tht L(N) = L(A). (3) Since ny two prefix-closed miniml DFAs with c 2 sttes differ in some word of length c 2, the utomton A cn be lerned by querying ll words over T of length 2c 2, i.e., fter t most c 3 := n 2c2 queries. This follows esily from Myhill-Nerode s theorem. The DFA A cn be constructed from the nswers to the queries s follows. The sttes of A re the equivlence clsses of words of L(N) of length up to c 2, where two words w, v re equivlent if for every word u of length up to c 2 either wu nd vu belong to L(N), or none of them does [Vs73, Cho78].) The initil stte is the equivlence clss of the empty word, nd ll sttes re finl. There is trnsition [w] [w] for every word w of length t most c 2. 7

8 (4) The net N is obtined from A by mens of the lgorithm of [BBD95] for synthesis up to lnguge equivlence (see problem (S1) in Section 2). The lgorithm runs in 2 O(p(c2)) time for some polynomil p. The query complexity of this nive lgorithm, i.e. the number of queries it needs to sk, is triple exponentil in the number n of trnsitions. In this section we prove series of results ending in n improved lgorithm with single exponentil query nd time complexity (notice tht single exponentil time complexity implies single exponentil query complexity, but not vice vers). 3.1 An Upper Bound on the Number of Rechble Mrkings We show tht the nive bound on the number of sttes of A obtined in (2) bove, which is double exponentil in n, cn be improved to single exponentil bound. Given net N = (P, T, F, W, m 0 ) with incidence mtrix C, we denote by C(p) the vector (C(p, t 1 ),..., C(p, t T ). We sy tht plce p is liner combintion of the plces p 1,..., p k if there re rel numbers λ 1,..., λ k such tht C(p) = k i=1 λ i C(p i ). The following lemm is well known. Lemm 2. Let N = (P, T, F, W, m 0 ) be net with incidence mtrix C, nd let C(p) = k i=1 λ ic(p i ). Then for every rechble mrking m: p P. m(p) = m 0 (p) + k i=1 λ i(m(p i ) m 0 (p i )). Proof. Since m is rechble, there is w T w such tht m 0 m. By the mrking eqution m = m 0 + C P (w), nd so in prticulr m(p) = m 0 (p) + C(p) P (w), nd m(p i ) = m 0 (p i ) + C(p i ) P (w) for every 1 i k. So m(p) = m 0 (p) + k i=1 λ ic(p i ) P (w) = m 0 (p) + k i=1 λ i(m(p i ) m 0 (p i )) Theorem 1. Let N = (P, T, F, W, m 0 ) be k-bounded net with n trnsitions. Then N hs t most (k + 1) n rechble mrkings. Proof. The incidence mtrix C hs P rows nd n columns, nd so it hs rnk t most n. So there re l plces p 1,..., p l, l n, such tht C(p 1 ),..., C(p l ) re linerly independent. So every plce p is liner combintion of p 1,..., p l. It follows from Lemm 2 tht for every two rechble mrkings m, m, if m(p i ) = m (p i ) for every 1 i l, then m(p) = m (p) for every plce p. In other words, if two mrkings coincide on ll of p 1,..., p l, they re equl. Since for every rechble mrking m we hve 0 m(p i ) k, the number of projections of the rechble mrkings onto the plces p 1,..., p l is t most (k + 1) l (k + 1) n. So N hs t most (k + 1) n rechble mrkings. 3.2 Minimlity of the mrking-dfa We show tht the mrking-dfa of bounded nd reversible net is miniml. Since our gol is to construct bounded nd reversible net model N of the 8

9 business process, fter we lern the miniml DFA A with L(A) = L(N) in step (3), we cn cn synthesize N by pplying the lgorithm of [BBD95] for synthesis up to isomorphism (Problem (S2)), insted of the lgorithm for synthesis up to lnguge equivlence (Problem (S1)). This elimintes one exponentil from step (4) of the nive lgorithm. The proof is bsed on Lemm 3 below. Reders fmilir with Myhill-Nerode s theorem (see lso Section 2) will probbly need no proof, but we include one for completeness. Recll tht we identify DFA with single trp stte with the one obtined by removing the trp stte together with its ingoing nd outgoing trnsitions. Lemm 3. A DFA A = (Q, Σ, δ, q 0, F ) is miniml iff the following two conditions hold: (1) every stte lies in pth leding from q 0 to some stte of F, nd (2) L(q) L(q ) for every two distinct sttes q, q Q. Proof. ( ): We prove the contrpositive. For (1), if some stte q does not lie in ny pth from q 0 to some finl stte, then it cn be removed without chnging the lnguge, nd so A is not miniml. For (2), if two distinct sttes q, q of A stisfy L(q) = L(q ), then [q] = [q ], nd so the quotient utomton hs fewer sttes thn A. So A is not miniml. ( ): Assume (1) nd (2) hold. We prove tht for every stte q the lnguge of the words w such tht δ(q 0, w) = q is n equivlence clss of L-equivlence. It follows tht the number of sttes of A is t most s lrge s the number of equivlence clsses of L-equivlence, which implies tht A is the miniml DFA for L. It suffices to show: If δ(q 0, w) = q = δ(q 0, v), then w L v. This follows immeditely from the definition of L-equivlence. If δ(q 0, w) = q nd δ(q 0, v) = q for some q q, then w L v. Since L(q) L(q ), w.l.o.g. there is word u L(q) \ L(q ). So wu L nd vu / L, which implies w L v. Theorem 2. Let N = (P, T, F, W, m 0 ) be bounded nd reversible Petri net. The mrking-dfa A(N) of N is miniml DFA. Proof. Assume tht A(N) is not miniml. Since every stte of A(N) is finl, by Lemm 3 there re two sttes of A(N), i.e., two rechble mrkings m 1 m 2 of N, such tht L(m 1 ) = L(m 2 ). As m 1 m 2 there exists p P with m 1 (p) m 2 (p). Assume w.l.o.g. m 1 (p) < m 2 (p). Let m be rechble mrking such tht m(p) is miniml, i.e. there is no other rechble mrking m s.t. m (p) < m(p). Since m is rechble nd N is reversible, there is w T such w tht m 2 m. Since L(m1 ) = L(m 2 ), there is rechble mrking m such w tht m 1 m. It follows m (p) = m 1 (p) + C(p) P (w) < m 2 (p) + C(p) P (w) = m(p) contrdicting the minimlity of m(p). 9

10 3.3 Lerning the rechbility grph by Explortion The finl step towrds single exponentil lerning lgorithm consists of improving the nive lgorithm of step (3) for lerning the miniml DFA A. Recll tht we ssume tht the Techer s nswers re comptible with k-bounded nd reversible net N. If n nd r re the number of trnsitions nd rechble mrkings of N, then the nive lgorithm requires n r membership queries. We present new lgorithm tht requires only O(n r 2 ) queries. Recll the stndrd serch pproch for constructing the rechbility grph of net if the net is known. We mintin queue of mrkings, initilly contining the initil mrking, nd two sets of lredy visited mrkings nd trnsitions (trnsitions between mrkings). While the queue is non-empty, we tke the mrking m t the top of the queue, nd check for ech trnsition whether is enbled t m. If so, we compute the mrking m such tht m m, nd proceed s follows: if m hs been lredy visited, we dd m m to the set of visited trnsitions; if m hd not been visited yet, we dd m to the set of visited mrkings nd to the queue, nd dd m m to the set of visited trnsitions. Our lerning lgorithm closely mimics this behviour, but works with firing sequences of N insted of rechble mrkings (the Lerner does not know the mrkings of the net, it does not even know its plces). We mintin queue of firing sequences, initilly contining the empty sequence, nd two sets of lredy visited firing sequences nd trnsitions. While the queue is non-empty, we tke the firing sequence w (T {r}) t the top of the queue, nd sk the Techer for ech trnsition whether w is lso firing sequence of N. If so, we proceed s follows. We first determine whether ech lredy visited firing sequence u leds to the sme mrking s w. Notice tht it is not obvious how to do this this is the key of the lerning lgorithm. If some firing sequence u leds to the sme mrking s w, then we dd w u to the set of visited trnsitions; otherwise, we dd w to the set of visited firing sequences nd to the queue, nd dd w w to the set of visited trnsitions. The lgorithm in pseudo code cn be found below (Algorithm 1), where Equiv(u, v) denotes tht there is u v mrking m such tht m 0 m nd m 0 m. The correctness of the lgorithm is immedite: we just simulte serch lgorithm for the construction of the rechbility grph, using firing sequence u u to represent the mrking m such tht m 0 m. The check Equiv(u, w) gurntees tht ech mrking gets exctly one representtive. The problem is to implement Equiv(u, w) using only membership queries. In generl this is no esy tsk, but in the cse of reversible nets it cn be esily done s follows. When checking Equiv(u, w) the word u hs been lredy dded to V, nd so the Lerner hs estblished tht u L(N). So in prticulr the Techer hs nswered positively query bout u nd, due to the structure of workflow membership queries, it hs returned run uu c, where u c r is trnsition sequence leding bck to the initil mrking. We prove tht Equiv(x, y) holds if nd only if the sequence xy c is run of N: 10

11 Algorithm 1: Lerning the rechbility grph Output: grph (V, E) isomorphic to the rechbility grph of N V ; E F {ɛ} // queue of firing sequences while not F.empty() do w F.dequeue() forll T do if w is ccepted by the Techer then /* This mens w L(N) */ σ w forll u V do if Equiv(u, w) then σ u end if σ = w then F.enqueue(w) dd σ to V nd w σ to E end end end Proposition 1. In Algorithm 1, Equiv(u, w) = true if nd only if uw c is run of N, where ww c is the run reported by the Techer when positively nswering the query bout w L(N). Proof. If Equiv(u, w) = true, then there is mrking m such tht m 0 m w w nd m 0 m. Becuse m 0 m wcr u m 0, we hve m 0 m wcr m 0, which implies tht uw c is run. ww If u w c is run, then we hve m cr uw 0 m 0 nd m cr 0 m 0. Let m be w the mrking such tht m 0 m. We then hve m wcr m 0. Moreover, m is the only mrking such tht m wcr m 0 (Petri nets re bckwrd deterministic: given firing sequence nd its trget mrking, the source mrking is uniquely uw determined). Since m cr u 0 m 0, we then necessrily hve m 0 m wcr m 0, u nd so in prticulr m 0 m. So both w nd u led to the sme mrking m, nd we hve Equiv(u, w) = true. We cn now esily show tht checking Equiv(u, w) reduces to one single membership query. Proposition 2. The check Equiv(u, w) cn be performed by querying whether uw c L(N): Equiv(u, w) holds if nd only if the Techer nswers positively nd returns the sequence uw c itself s run. Proof. There re three possible cses: The nswer is negtive. Then uw c / L(N), nd so in prticulr it is not run of N. So Equiv(u, w) = flse. u 11

12 The nswer is positive nd the Techer returns uw c s run. Then Equiv(u, w) = true by Proposition 1. The nswer is positive, but the Techer returns uw c v for some v ɛ s run. Since the Techer returns run uw c v such tht no proper prefix uw c v is run, we hve in prticulr by tking v = ɛ tht uw c is not run. By Proposition 1 we hve Equiv(u, w) = flse. Remrk 1. In nticiption to the experiments described in Section 4, let us mention tht in mny cses the queries for uw c do not even hve to be submitted to the techer. (recll tht w lbels the potentilly new stte nd u lbels known stte). Often we cn deduce tht uw c is not fireble by observing tht uw c / L(A) where A is the prt of the DFA tht is lredy known. If we would query wu c insted (which would lso tell us if Equiv(u, w) = true) we would not be ble to discrd ny query becuse the neighbourhood of w hs not yet been explored. This is one of the resons why this lgorithm is so efficient in prctice (cf. Section 4). Exmple 1. We now provide n exmple run of our lgorithm, pplied to the first prt of the net in figure 1. To simplify presenttion we grouped together some queries which correspond to the interesting stges of the lgorithm (w A re ll queries w with A). i # Query Answer Possible Automt 1-4 ε {0, 1, 2, 3} 0(123) 0 0 o 5 Equiv(ε, 0)? ε 123 no 0 3 Possibilities: {0, 1, 3} 01(23) Equiv(ε, 01)? no 0 ε Equiv(0, 01)? 0 23 no (13) (4 Possiblities) 12 Equiv(ε, 02)? ε 13 no (3 Poss.) 13 Equiv(0, 02)? 0 13 no (2 Poss.) 14 Equiv(01, 02)? 0 1 no {0, 1, 2, 3} 012(3) (5 Poss.) Equiv? no ({ε, 0, 01, 02}, 012) {0, 1, 2, 3} 021(3) (6 Poss. - nive) 27 [Equiv(021,012)?] yes {0, 1, 2, 3} 0123(ε) (7 Poss. - nive) 32 [Equiv-Queries] no The Answer -column contins the run ww c returned by the techer, if w L(N) - we put the continutions w c in brckets. As observed in Remrk??, mny queries (like 23 in # 9) do not relly hve to be sked - either becuse we lredy sked prefix of the query tht ws rejected, or becuse the query is prefix of run supplied by the techer nd therefore we lredy know tht is is ccepted. We lso do not need to sk query # 27 becuse 021 nd 012 hve the sme Prikh vector nd therefore must led to the sme mrking. There is technicl issue tht should be mentioned t this point. The lgorithm delivers net N such tht the rechbility grphs of N nd N re isomorphic. It follows tht N is reversible nd bounded. However, we cnnot

13 gurntee tht N hs the sme bound s N. We consider this minor problem, since N nd N re for behviourl purposes equivlent models. Complexity It follows clerly from the description of Algorithm 1 tht the number of firing sequences dded to the queue is equl to the number of rechble mrkings r of N. For the i-th sequence tken from the queue, sy w, nd for ech trnsition, sy, we perform t most i membership queries: one to check if w L(N), nd t most (i 1) for checks Equiv(u, w), becuse t tht point V contins t most i 1 elements. So the lgorithm performs t most r i=1 n i = nr(r + 1)/2 O(n r2 ) queries. The following theorem sums up the results of the section. Theorem 3 (Lerning by Explortion). We cn lern k-bounded nd reversible net N with number of workflow membership queries nd running time tht re single exponentil in the number of trnsitions of N. The proof follows esily form our discussion. The overll lgorithm, tht we cll WNL, uses the lerning technique of Section 3.3 to lern miniml DFA A such tht L(A) = L(N). Section 3.1 shows tht A is single exponentil in the number of trnsitions of N, nd so it cn be lerned with single exponentil number of queries. Section 3.2 shows tht this miniml DFA is (isomorphic to) the rechbility grph of N. We cn then pply the polynomil lgorithm of [BBD95] for synthesis up to isomorphism (S2). A finl question is wht hppens if the Techer s nswers re not comptible with ny k-bounded nd reversible net N. In this cse there re two possibilities: they re not comptible with ny miniml DFA hving t most (k + 1) n sttes, or they re comptible with some such DFA, but this DFA is not the mrking- DFA of ny net. In the first cse the lgorithm cn stop when the number of generted sttes exceeds (k + 1) n. In the second cse, the lgorithm termintes nd produces DFA, but the synthesis lgorithm of [BBD95] does not return net. 3.4 Mixing process mining nd lerning The lgorithm we hve just presented does not ssume the existence of n event log: the Lerner only gets informtion from membership queries. However, s explined in the introduction, we consider our lerning pproch s wy of complementing log-bsed process mining. In this section we explin how to modify the lgorithm ccordingly. We ssume the existence of n event log consisting of use cses. Given the set of tsks T of the business process, we cn think of ech use cse s word w T, such tht w corresponds to run of the reversible net to be lernt. The event log then corresponds to lnguge L T. In first step we construct the miniml DFA for the lnguge L. This cn be done spce-efficiently in number of wys. For instnce, we cn divide the set of runs in two hlves L 1, L 2, recursively compute miniml DFAs A 1, A 2 recognizing 13

14 L 1 nd L 2, nd then compute the miniml DFA for L from A 1, A 2 using n lgorithm very similr to the one tht computes the union of two binry decision digrms [And99]. Once this is done, we esily get the miniml DFA A for the lnguge of prefixes of (Lr) (this requires to dd one extr stte nd mke ll sttes finl). Once A is computed, we ssign to ech stte q of A word w q such tht q 0 w q q. For every two sttes q1, q 2, we check whether the sttes correspond to the sme rechble mrking by clling Equiv(w q1, w q2 ). After this step we re in the sme sitution we would hve reched if the lgorithm would hve queried ll the words w q. From prcticl point of view, notice tht it is very inefficient to sk the Techer for ech pir of sttes q 1, q 2 whether Equiv(w q1, w q2 ). A better procedure is to sk the Techer, given sequence w, which re the letters such tht w cn be extended to use cse. We cll them the possible extensions of w. The test Equiv(w q1, w q2 ) need only be crried out for sequences w q1, w q2 hving the sme set of extensions. Note tht the techer does not hve to provide full runs for ny of these possible extensions so this is quite simple tsk. We cn even more reduce the number of clls to Equiv() by first merging sttes for which we cn lredy deduce tht they hve to be equivlent. Some criteri, which re esy properties of Petri nets, nd cn be directly used to trim DFA tht ws generted from event logs re: The DFA is bckwrd deterministic: if m 1 m 3 nd m 2 m 3 for some T then m 1 = m 2 If two words w 1,w 2 only differ in the order of their letters (i.e. their Prikh vectors coincide P (w 1 ) = P (w 2 )) then they led to the sme stte Given k-bounded net N, if vw k+1 L(N) for some words v, w then w describes cycle in the rechbility grph of N A further criterion for pure nets is the dimond property : We cn dd trnsitions tht hve to be present due to bsic Petri net properties. A dimond is subgrph in the rechbility grph of net with four sttes tht re connected b b m 4. A in the following wy: m 1 m 2, m 1 m 3, m 2 m 4, m 3 dimond is incomplete if it is missing exctly one trnsition (see Figure 2). One cn esily see tht incomplete dimonds cn lwys be completed with the missing trnsition (in the cse of pure nets), i.e., if n incomplete dimond is found in the DFA, we cn dd the missing trnsition. This dimond property cn lso be used to merge sttes s indicted in Figure A Lower Bound for Petri Net Lerning We now show tht we cnnot in generl solve the lerning problem in subexponentil time, by providing hrd-to-lern instnce. We will show with the help of n dversry rgument tht ny lerning lgorithm hs to sk t lest Ω(2 n ) membership queries to derive the correct net, where n is the number of trnsitions. 14

15 m 2 b b b m 1 m 4 merge() b m 3 b b merge() Fig. 2. Incomplete dimond (left), sttes merged becuse of equl prikh-vectors (middle) or by using the dimond property (middle nd right) Consider the following set N of workflow nets. All the nets in N hve the sme number n + 3 of trnsitions: two trnsitions init nd finl, trnsitions clled 1,..., n, nd trnsition t (see Figure 3). The pre- nd postsets of ll trnsitions but t, which re identicl for ll nets of N, re shown in the figure. The postset of t is lwys the plce o. The preset of t lwys contins for ech i exctly one of the plces p i or q i, nd the only difference between two nets in N is their choice of p i or q i. Clerly, the set N contins 2 n workflow nets, ll of them sound. For ech net N N there is exctly one subset of { 1,..., n } such tht t cn fire fter the trnsitions of the set hve fired. We cll this subset S N. Notice tht if we know S N then we cn infer t. p 1 p 2 p n 1 2 n i init q 1 q 2 t finl Fig. 3. Hrd-to-lern instnce for Petri net lerning o q n We ese the tsk for the Lerner by ssuming she knows tht the net to be lerned belongs to N. Her tsk consists only of finding out t, or, equivlently, the set S N. A query of n optiml Lerner hs lwys the form i1 i2 ik t, becuse querying ny i fter t does not provide the Lerner with ny informtion. Furthermore the order of the i is not importnt ll these trnsitions re independent nd the Lerner lredy knows this. So we cn view query just s subset S of the set of ll trnsitions. A negtive nswer to query S lwys rules out exctly one of the nets of N, nmely the one in which t = S. The worst cse ppers when the Lerner sk queries in the worst possible order, eliminting ll nets of N but the right one. This requires 2 n 1 queries. 15

16 4 Prcticl experiences To get insights in the prcticl fesibility of the derived lgorithm WNL, we hve developed prototype lerning nd synthesis tool for workflow nets nd exmined its prcticl performnce on number of exmples. Implementtion Our prototype is written in C++ with pproximtely 3,000 lines of code nd uses libalf for deling with utomt. libalf is prt of the utomt lerning fctory currently developed jointly t RWTH Achen nd TU München 1. The synthesis lgorithm (S2) of [BBD95] is implemented using the lp solve 2 frmework to efficiently solve the liner progrms needed for computing the plces of the net. Furthermore lp solve is used for eliminting redundnt plces fter the net hs been synthesized to reduce its size nd to mke it look more ppeling. The implementtion is currently not tilored to user interction but consults pre-existing workflow nets for queries. Outputs re given in form of dot-files tht cn be visulized using the grphviz toolkit. Experimentl Results We tested our implementtion on vrious exmples of pure, sfe nd reversible nets. The exmples rnge from existing sound workflow nets obtined in cse studies performed by [Ver04] to more stndrd exmples like mutul exclusion between processes nd n n-cell buffer with 2 n rechble mrkings. The ltter exmple is especilly suitble to understnd sclbility issues of the lgorithms. The bsence workflow is loosely modelled fter n exmple from [SAP01], the complint workflow is the exmple presented in our bckground section (Figure 1). We pplied our implementtion once without ny event logs s initil knowledge nd then gin with rndomly generted logs s input nd counted the number of queries needed to lern the model. Besides counting the queries needed for Equiv(), we only count queries nswered positively by the Techer, s these correspond to runs supplied by him, nd thus reflect the ctul work to be done by n expert in n dequte mnner. q? b Fig. 4. Querying extensions t stte q, possible extensions: solid rrows c?? To illustrte this, consider the tsk of lerning the sequence of clendr months: insted of sking twelve questions of the form Does Jnury, Februry,... come fter July? (we cll these smll-step queries) we would just sk Which month comes fter July?. So we count every continution provided by the techer s one query. In the sitution of Figure 4 we would count 2 workflow membership queries compred to 3 smll-step queries. We hve lso included the number of smll-step queries in the tble below for comprison. 16

17 Model T RG ssq WNL buf_ buf_ buf_ buf_ buf_ buf_ buf_ mutex_ mutex_ mutex_ order_simp bsence complint trnsit Fig. 5. Membership queries needed by WNL without ny event logs; ssq = number of smll-step queries, RG = rechbility grph We hve first collected the number of membership queries needed by WNL when lerning model from scrtch with respect to the size of the lphbet nd the rechbility grph, see Figure 5. On the chosen exmples, the number of membership queries rnges between 12 nd The series of the n-cell buffer exmples from n = 2 to n = 8 suggests tht the prcticl performnce of WNL is even better thn qudrtic in the number of rechble mrkings. Next, we studied the effect of lerning workflow nets in the presence of existing logs. To this end, we used our tool to generte rndom event logs contining vrying number of runs (see Figure 6 for n exmple log). The runs in the generted log-files re not unique runs tht re more likely will probbly pper multiple times, which is lso the cse for rel-world event logs. For the rndom logs we clculted the verge number of queries over 100 executions. 1..b..c.d.b.c..d.b.c.d...b.c.d...b.c..b.d.c..d.b.c.d...b..c.d.b.c.d...b..c.b..d.c.d.b.c.d...b.c..d.b..c.d.b.c.d...b.c..b.d.c.d...b..c.b.d..c.d.b.c.d...b.c.d...b.c.d. 1 b c d 1 Fig. 6. Exmple event log for 3-cell buffer We found out tht for tiny models like the buffer with two cells or the complint workflow very smll number of runs (< 10) suffices to lredy construct the model. The Techer does not hve to supply dditionl runs for these. Clerly, for lrger models, we cn only expect tht the Techer s work is reduced but not completely eliminted when logs re given. To illustrte the impct of event logs on the lerning process we show how 17

18 buffer_5 mutex_3 mutex_4 trnsit Averge num. of queries Number of runs in log Fig. 7. Averge number of queries needed by WNL pplied to event logs of different sizes the number of queries behves for some of the lrger models with logs of different sizes (see Figure 7). 3 We observe tht lredy quite smll logs drsticlly reduce the number of queries to be nswered. At the sme time, becuse our logs my not contin unique but mny identicl entries, lrger logs contribute less nd less new knowledge. This reflects the sitution for rel-life logs, which mostly contin common executions of workflow but lck less common runs. In other words, it seems most promising for prcticl pplictions, to combine knowledge from (smll) logs with tht of Techers responsible for corner cses to ctully lern the workflow net in question efficiently. The time needed for lerning the nets in n pplied setting is of course dominted by the number of queries user hs to nswer. Synthesizing the resulting Petri net using the method proposed by Drondeu et l. (see Section 2) together with some post-processing to remove redundnt plces needs just few seconds in the worst cse nd is therefore negligible. The results depicted in Figures 5 nd 7 suggest tht, despite the seemingly intimidting result in Section 3.5, lerning of workflow models is quite fesible for prcticl pplictions. 3 Also lrger exmples behve in the sme wy, yet, we depicted models requiring number of queries in the sme order of mgnitude to optimize the figure. 18

19 5 Conclusion We hve presented new pproch for mining workflow nets bsed on lerning techniques. The pproch pllites the problem of incompleteness of event logs: if log is incomplete, our lgorithm derives membership queries identifying the missing knowledge. The queries cn be pssed to n expert, whose nswers llow to produce model. We hve shown the correctness nd completeness of our pproch under the ssumption of techer nswering workflow membership queries. Strting with generl combintoril rguments showing tht workflow models cn in principle be lerned, we hve derived lerning lgorithm requiring single exponentil number of queries in the worst cse, nd we hve given mtching lower bound. We hve lso shown experimentl evidence indicting tht the combintion of n event log, even of smll size, nd Techer responsible for providing informtion bout corner cses llows to efficiently produce models in prcticlly relevnt cses. There re severl promising pths for further reserch. One spect is the ppliction of lerning to the design of workflows. In this pproch n expert on business processes nd modelling expert (or n dequte softwre) cooperte. The modelling expert sks queries bout how the workflow should behve, which re nswered by the Techer, until model ccepted by the business process expert is produced. We expect to trnsfer ides from the field of lerning models of softwre systems [BKKL09] to workflow systems, nd develop teching ssistnts tht filter the queries, utomticlly nswering those for which the nswer cn be deduced from current informtion (for instnce becuse it is known tht two tsks must be concurrent), nd only pssing to the expert the remining ones. Here we expect to profit from relted work by Desel, Lorenz nd others [BDML09]. An importnt point for process mining nd even more for process design is designing fult tolernce techniques llowing to cope with flse nswers by the Techer. Finlly, lerning more generl clsses of Petri nets, nd pplictions to modelling/reconstruction of distributed systems, or biologicl/chemicl processes, re lso promising pths for future work. References [AGL98] [And99] [Ang87] [BBD95] Rkesh Agrwl, Dimitrios Gunopulos, nd Frnk Leymnn. Mining process models from workflow logs. In EDBT, volume 1377 of LNCS, pges Springer, Henrik Reif Andersen. An introduction to binry decision digrms. Technicl report, 1999, Dn Angluin. Lerning regulr sets from queries nd counterexmples. Informtion nd Computtion, 75(2):87 106, Eric Bdouel, Luc Bernrdinello, nd Philippe Drondeu. Polynomil lgorithms for the synthesis of bounded nets. In TAPSOFT 95: Proceedings of the 6th Interntionl Joint Conference CAAP/FASE on Theory nd Prctice of Softwre Development, pges , London, UK, Springer-Verlg. 19

20 [BDBM96] Eric Bdouel nd Philippe Drondeu. On the synthesis of generl petri nets. Technicl report, INRIA, [BDKM08] Robin Bergenthum, Jörg Desel, Christin Kölbl, nd Sebstin Muser. Experimentl results on process mining bsed on regions of lnguges. In CHINA 2008, workshop t the Applictions nd theory of Petri nets : 29th interntionl conference, [BDLM07] Robin Bergenthum, Jörg Desel, Robert Lorenz, nd Sebstin Muser. Process mining bsed on regions of lnguges. In Gustvo Alonso, Peter Ddm, nd Michel Rosemnn, editors, BPM, volume 4714 of LNCS, pges Springer, [BDML09] Robin Bergenthum, Jörg Desel, Sebstin Muser, nd Robert Lorenz. Construction of process models from exmple runs. T. Petri Nets nd Other Models of Concurrency, 2: , [BKKL09] Benedikt Bollig, Joost-Pieter Ktoen, Crsten Kern, nd Mrtin Leucker. Lerning communicting utomt from MSCs. IEEE Trnsctions on Softwre Engineering (TSE), in press. [Cho78] Tsun S. Chow. Testing softwre design modeled by finite-stte mchines. TSE, 4(3): , My Specil collection bsed on COMPSAC. [KRS06] Ekkrt Kindler, Vldimir Rubin, nd Wilhelm Schäfer. Process mining nd petri net synthesis. In Johnn Eder nd Schhrm Dustdr, editors, Business Process Mngement Workshops, volume 4103 of LNCS, pges Springer, [RGvdA + 07] Vldimir Rubin, Christin W. Günther, Wil M. P. vn der Alst, Ekkrt Kindler, Boudewijn F. vn Dongen, nd Wilhelm Schäfer. Process mining frmework for softwre processes. In Qing Wng, Dietmr Pfhl, nd Dvid M. Rffo, editors, ICSP, volume 4470 of LNCS, pges Springer, [SAP01] SAP AG. SAP Business Workflow Demo Exmples (BC-BMT-WFM), [Vs73] M. P. Vsilevski. Filure dignosis of utomt. Cybernetic, 9(4):653 [vda98] 665, Wil M. P. vn der Alst. The ppliction of petri nets to workflow mngement. Journl of Circuits, Systems, nd Computers, 8(1):21 66, [vdavdg + 07] Wil M. P. vn der Alst, Boudewijn F. vn Dongen, Christin W. Günther, R. S. Mns, An Krl Alves de Medeiros, Anne Rozint, Vldimir Rubin, Minseok Song, H. M. W. (Eric) Verbeek, nd A. J. M. M. Weijters. Prom 4.0: Comprehensive support for el process nlysis. In Jetty Kleijn nd Alexndre Ykovlev, editors, ICATPN, volume 4546 of LNCS, pges Springer, [vdavdh + 03] [vdavh04] [Ver04] Wil M. P. vn der Alst, Boudewijn F. vn Dongen, Jochim Herbst, Lur Mruster, Guido Schimm, nd A. J. M. M. Weijters. Workflow mining: A survey of issues nd pproches. Dt Knowl. Eng., 47(2): , Wil vn der Alst nd Kees vn Hee. Workflow Mngement. Models, Methods, nd Systems. MIT Press, Henricus M.W. Verbeek. Verifiction of WF-nets. PhD thesis, Technische Universiteit Eindhoven,

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( ) Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +

More information

Regular Sets and Expressions

Regular Sets and Expressions Regulr Sets nd Expressions Finite utomt re importnt in science, mthemtics, nd engineering. Engineers like them ecuse they re super models for circuits (And, since the dvent of VLSI systems sometimes finite

More information

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES DAVID WEBB CONTENTS Liner trnsformtions 2 The representing mtrix of liner trnsformtion 3 3 An ppliction: reflections in the plne 6 4 The lgebr of

More information

Decision Rule Extraction from Trained Neural Networks Using Rough Sets

Decision Rule Extraction from Trained Neural Networks Using Rough Sets Decision Rule Extrction from Trined Neurl Networks Using Rough Sets Alin Lzr nd Ishwr K. Sethi Vision nd Neurl Networks Lbortory Deprtment of Computer Science Wyne Stte University Detroit, MI 48 ABSTRACT

More information

Reasoning to Solve Equations and Inequalities

Reasoning to Solve Equations and Inequalities Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing

More information

4.11 Inner Product Spaces

4.11 Inner Product Spaces 314 CHAPTER 4 Vector Spces 9. A mtrix of the form 0 0 b c 0 d 0 0 e 0 f g 0 h 0 cnnot be invertible. 10. A mtrix of the form bc d e f ghi such tht e bd = 0 cnnot be invertible. 4.11 Inner Product Spces

More information

JaERM Software-as-a-Solution Package

JaERM Software-as-a-Solution Package JERM Softwre-s--Solution Pckge Enterprise Risk Mngement ( ERM ) Public listed compnies nd orgnistions providing finncil services re required by Monetry Authority of Singpore ( MAS ) nd/or Singpore Stock

More information

EQUATIONS OF LINES AND PLANES

EQUATIONS OF LINES AND PLANES EQUATIONS OF LINES AND PLANES MATH 195, SECTION 59 (VIPUL NAIK) Corresponding mteril in the ook: Section 12.5. Wht students should definitely get: Prmetric eqution of line given in point-direction nd twopoint

More information

Math 135 Circles and Completing the Square Examples

Math 135 Circles and Completing the Square Examples Mth 135 Circles nd Completing the Squre Exmples A perfect squre is number such tht = b 2 for some rel number b. Some exmples of perfect squres re 4 = 2 2, 16 = 4 2, 169 = 13 2. We wish to hve method for

More information

PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY

PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY MAT 0630 INTERNET RESOURCES, REVIEW OF CONCEPTS AND COMMON MISTAKES PROF. BOYAN KOSTADINOV NEW YORK CITY COLLEGE OF TECHNOLOGY, CUNY Contents 1. ACT Compss Prctice Tests 1 2. Common Mistkes 2 3. Distributive

More information

Homework 3 Solutions

Homework 3 Solutions CS 341: Foundtions of Computer Science II Prof. Mrvin Nkym Homework 3 Solutions 1. Give NFAs with the specified numer of sttes recognizing ech of the following lnguges. In ll cses, the lphet is Σ = {,1}.

More information

Factoring Polynomials

Factoring Polynomials Fctoring Polynomils Some definitions (not necessrily ll for secondry school mthemtics): A polynomil is the sum of one or more terms, in which ech term consists of product of constnt nd one or more vribles

More information

Protocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff

Protocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff Protocol Anlysis 17-654/17-764 Anlysis of Softwre Artifcts Kevin Bierhoff Tke-Awys Protocols define temporl ordering of events Cn often be cptured with stte mchines Protocol nlysis needs to py ttention

More information

SPECIAL PRODUCTS AND FACTORIZATION

SPECIAL PRODUCTS AND FACTORIZATION MODULE - Specil Products nd Fctoriztion 4 SPECIAL PRODUCTS AND FACTORIZATION In n erlier lesson you hve lernt multipliction of lgebric epressions, prticulrly polynomils. In the study of lgebr, we come

More information

How To Network A Smll Business

How To Network A Smll Business Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

All pay auctions with certain and uncertain prizes a comment

All pay auctions with certain and uncertain prizes a comment CENTER FOR RESEARC IN ECONOMICS AND MANAGEMENT CREAM Publiction No. 1-2015 All py uctions with certin nd uncertin prizes comment Christin Riis All py uctions with certin nd uncertin prizes comment Christin

More information

Integration. 148 Chapter 7 Integration

Integration. 148 Chapter 7 Integration 48 Chpter 7 Integrtion 7 Integrtion t ech, by supposing tht during ech tenth of second the object is going t constnt speed Since the object initilly hs speed, we gin suppose it mintins this speed, but

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

5.2. LINE INTEGRALS 265. Let us quickly review the kind of integrals we have studied so far before we introduce a new one.

5.2. LINE INTEGRALS 265. Let us quickly review the kind of integrals we have studied so far before we introduce a new one. 5.2. LINE INTEGRALS 265 5.2 Line Integrls 5.2.1 Introduction Let us quickly review the kind of integrls we hve studied so fr before we introduce new one. 1. Definite integrl. Given continuous rel-vlued

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Solving BAMO Problems

Solving BAMO Problems Solving BAMO Problems Tom Dvis tomrdvis@erthlink.net http://www.geometer.org/mthcircles Februry 20, 2000 Abstrct Strtegies for solving problems in the BAMO contest (the By Are Mthemticl Olympid). Only

More information

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process

An Undergraduate Curriculum Evaluation with the Analytic Hierarchy Process An Undergrdute Curriculum Evlution with the Anlytic Hierrchy Process Les Frir Jessic O. Mtson Jck E. Mtson Deprtment of Industril Engineering P.O. Box 870288 University of Albm Tuscloos, AL. 35487 Abstrct

More information

Unambiguous Recognizable Two-dimensional Languages

Unambiguous Recognizable Two-dimensional Languages Unmbiguous Recognizble Two-dimensionl Lnguges Mrcell Anselmo, Dor Gimmrresi, Mri Mdoni, Antonio Restivo (Univ. of Slerno, Univ. Rom Tor Vergt, Univ. of Ctni, Univ. of Plermo) W2DL, My 26 REC fmily I REC

More information

Babylonian Method of Computing the Square Root: Justifications Based on Fuzzy Techniques and on Computational Complexity

Babylonian Method of Computing the Square Root: Justifications Based on Fuzzy Techniques and on Computational Complexity Bbylonin Method of Computing the Squre Root: Justifictions Bsed on Fuzzy Techniques nd on Computtionl Complexity Olg Koshelev Deprtment of Mthemtics Eduction University of Texs t El Pso 500 W. University

More information

Graphs on Logarithmic and Semilogarithmic Paper

Graphs on Logarithmic and Semilogarithmic Paper 0CH_PHClter_TMSETE_ 3//00 :3 PM Pge Grphs on Logrithmic nd Semilogrithmic Pper OBJECTIVES When ou hve completed this chpter, ou should be ble to: Mke grphs on logrithmic nd semilogrithmic pper. Grph empiricl

More information

Vendor Rating for Service Desk Selection

Vendor Rating for Service Desk Selection Vendor Presented By DATE Using the scores of 0, 1, 2, or 3, plese rte the vendor's presenttion on how well they demonstrted the functionl requirements in the res below. Also consider how efficient nd functionl

More information

Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions.

Use Geometry Expressions to create a more complex locus of points. Find evidence for equivalence using Geometry Expressions. Lerning Objectives Loci nd Conics Lesson 3: The Ellipse Level: Preclculus Time required: 120 minutes In this lesson, students will generlize their knowledge of the circle to the ellipse. The prmetric nd

More information

Experiment 6: Friction

Experiment 6: Friction Experiment 6: Friction In previous lbs we studied Newton s lws in n idel setting, tht is, one where friction nd ir resistnce were ignored. However, from our everydy experience with motion, we know tht

More information

Example 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers.

Example 27.1 Draw a Venn diagram to show the relationship between counting numbers, whole numbers, integers, and rational numbers. 2 Rtionl Numbers Integers such s 5 were importnt when solving the eqution x+5 = 0. In similr wy, frctions re importnt for solving equtions like 2x = 1. Wht bout equtions like 2x + 1 = 0? Equtions of this

More information

9.3. The Scalar Product. Introduction. Prerequisites. Learning Outcomes

9.3. The Scalar Product. Introduction. Prerequisites. Learning Outcomes The Sclr Product 9.3 Introduction There re two kinds of multipliction involving vectors. The first is known s the sclr product or dot product. This is so-clled becuse when the sclr product of two vectors

More information

One Minute To Learn Programming: Finite Automata

One Minute To Learn Programming: Finite Automata Gret Theoreticl Ides In Computer Science Steven Rudich CS 15-251 Spring 2005 Lecture 9 Fe 8 2005 Crnegie Mellon University One Minute To Lern Progrmming: Finite Automt Let me tech you progrmming lnguge

More information

Econ 4721 Money and Banking Problem Set 2 Answer Key

Econ 4721 Money and Banking Problem Set 2 Answer Key Econ 472 Money nd Bnking Problem Set 2 Answer Key Problem (35 points) Consider n overlpping genertions model in which consumers live for two periods. The number of people born in ech genertion grows in

More information

and thus, they are similar. If k = 3 then the Jordan form of both matrices is

and thus, they are similar. If k = 3 then the Jordan form of both matrices is Homework ssignment 11 Section 7. pp. 249-25 Exercise 1. Let N 1 nd N 2 be nilpotent mtrices over the field F. Prove tht N 1 nd N 2 re similr if nd only if they hve the sme miniml polynomil. Solution: If

More information

GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs C2C Archive One Policy Mnger GFI MilArchiver 6 C2C Archive One Policy Mnger Who we re Generl fetures Supports

More information

Bayesian Updating with Continuous Priors Class 13, 18.05, Spring 2014 Jeremy Orloff and Jonathan Bloom

Bayesian Updating with Continuous Priors Class 13, 18.05, Spring 2014 Jeremy Orloff and Jonathan Bloom Byesin Updting with Continuous Priors Clss 3, 8.05, Spring 04 Jeremy Orloff nd Jonthn Bloom Lerning Gols. Understnd prmeterized fmily of distriutions s representing continuous rnge of hypotheses for the

More information

Integration by Substitution

Integration by Substitution Integrtion by Substitution Dr. Philippe B. Lvl Kennesw Stte University August, 8 Abstrct This hndout contins mteril on very importnt integrtion method clled integrtion by substitution. Substitution is

More information

Lecture 3 Gaussian Probability Distribution

Lecture 3 Gaussian Probability Distribution Lecture 3 Gussin Probbility Distribution Introduction l Gussin probbility distribution is perhps the most used distribution in ll of science. u lso clled bell shped curve or norml distribution l Unlike

More information

Regular Languages and Finite Automata

Regular Languages and Finite Automata N Lecture Notes on Regulr Lnguges nd Finite Automt for Prt IA of the Computer Science Tripos Mrcelo Fiore Cmbridge University Computer Lbortory First Edition 1998. Revised 1999, 2000, 2001, 2002, 2003,

More information

How To Study The Effects Of Music Composition On Children

How To Study The Effects Of Music Composition On Children C-crcs Cognitive - Counselling Reserch & Conference Services (eissn: 2301-2358) Volume I Effects of Music Composition Intervention on Elementry School Children b M. Hogenes, B. Vn Oers, R. F. W. Diekstr,

More information

Binary Representation of Numbers Autar Kaw

Binary Representation of Numbers Autar Kaw Binry Representtion of Numbers Autr Kw After reding this chpter, you should be ble to: 1. convert bse- rel number to its binry representtion,. convert binry number to n equivlent bse- number. In everydy

More information

How To Set Up A Network For Your Business

How To Set Up A Network For Your Business Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer

More information

Operations with Polynomials

Operations with Polynomials 38 Chpter P Prerequisites P.4 Opertions with Polynomils Wht you should lern: Write polynomils in stndrd form nd identify the leding coefficients nd degrees of polynomils Add nd subtrct polynomils Multiply

More information

MATH 150 HOMEWORK 4 SOLUTIONS

MATH 150 HOMEWORK 4 SOLUTIONS MATH 150 HOMEWORK 4 SOLUTIONS Section 1.8 Show tht the product of two of the numbers 65 1000 8 2001 + 3 177, 79 1212 9 2399 + 2 2001, nd 24 4493 5 8192 + 7 1777 is nonnegtive. Is your proof constructive

More information

Introducing Kashef for Application Monitoring

Introducing Kashef for Application Monitoring WextWise 2010 Introducing Kshef for Appliction The Cse for Rel-time monitoring of dtcenter helth is criticl IT process serving vriety of needs. Avilbility requirements of 6 nd 7 nines of tody SOA oriented

More information

Helicopter Theme and Variations

Helicopter Theme and Variations Helicopter Theme nd Vritions Or, Some Experimentl Designs Employing Pper Helicopters Some possible explntory vribles re: Who drops the helicopter The length of the rotor bldes The height from which the

More information

Basic Analysis of Autarky and Free Trade Models

Basic Analysis of Autarky and Free Trade Models Bsic Anlysis of Autrky nd Free Trde Models AUTARKY Autrky condition in prticulr commodity mrket refers to sitution in which country does not engge in ny trde in tht commodity with other countries. Consequently

More information

Example A rectangular box without lid is to be made from a square cardboard of sides 18 cm by cutting equal squares from each corner and then folding

Example A rectangular box without lid is to be made from a square cardboard of sides 18 cm by cutting equal squares from each corner and then folding 1 Exmple A rectngulr box without lid is to be mde from squre crdbord of sides 18 cm by cutting equl squres from ech corner nd then folding up the sides. 1 Exmple A rectngulr box without lid is to be mde

More information

On decidability of LTL model checking for process rewrite systems

On decidability of LTL model checking for process rewrite systems Act Informtic (2009) 46:1 28 DOI 10.1007/s00236-008-0082-3 ORIGINAL ARTICLE On decidbility of LTL model checking for process rewrite systems Lur Bozzelli Mojmír Křetínský Vojtěch Řehák Jn Strejček Received:

More information

1.00/1.001 Introduction to Computers and Engineering Problem Solving Fall 2011 - Final Exam

1.00/1.001 Introduction to Computers and Engineering Problem Solving Fall 2011 - Final Exam 1./1.1 Introduction to Computers nd Engineering Problem Solving Fll 211 - Finl Exm Nme: MIT Emil: TA: Section: You hve 3 hours to complete this exm. In ll questions, you should ssume tht ll necessry pckges

More information

Modular Generic Verification of LTL Properties for Aspects

Modular Generic Verification of LTL Properties for Aspects Modulr Generic Verifiction of LTL Properties for Aspects Mx Goldmn Shmuel Ktz Computer Science Deprtment Technion Isrel Institute of Technology {mgoldmn, ktz}@cs.technion.c.il ABSTRACT Aspects re seprte

More information

Virtual Machine. Part II: Program Control. Building a Modern Computer From First Principles. www.nand2tetris.org

Virtual Machine. Part II: Program Control. Building a Modern Computer From First Principles. www.nand2tetris.org Virtul Mchine Prt II: Progrm Control Building Modern Computer From First Principles www.nnd2tetris.org Elements of Computing Systems, Nisn & Schocken, MIT Press, www.nnd2tetris.org, Chpter 8: Virtul Mchine,

More information

6.2 Volumes of Revolution: The Disk Method

6.2 Volumes of Revolution: The Disk Method mth ppliction: volumes of revolution, prt ii Volumes of Revolution: The Disk Method One of the simplest pplictions of integrtion (Theorem ) nd the ccumultion process is to determine so-clled volumes of

More information

Generating In-Line Monitors For Rabin Automata

Generating In-Line Monitors For Rabin Automata Generting In-Line Monitors For Rin Automt Hugues Chot, Rphel Khoury, nd Ndi Twi Lvl University, Deprtment of Computer Science nd Softwre Engineering, Pvillon Adrien-Pouliot, 1065, venue de l Medecine Queec

More information

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report DlNBVRGH + + THE CITY OF EDINBURGH COUNCIL Sickness Absence Monitoring Report Executive of the Council 8fh My 4 I.I...3 Purpose of report This report quntifies the mount of working time lost s result of

More information

Assumption Generation for Software Component Verification

Assumption Generation for Software Component Verification Assumption Genertion for Softwre Component Verifiction Dimitr Ginnkopoulou Corin S. Păsărenu RIACS/USRA Kestrel Technologies LLC NASA Ames Reserch Center Moffett Field, CA 94035-1000, USA {dimitr, pcorin}@emil.rc.ns.gov

More information

Online Multicommodity Routing with Time Windows

Online Multicommodity Routing with Time Windows Konrd-Zuse-Zentrum für Informtionstechnik Berlin Tkustrße 7 D-14195 Berlin-Dhlem Germny TOBIAS HARKS 1 STEFAN HEINZ MARC E. PFETSCH TJARK VREDEVELD 2 Online Multicommodity Routing with Time Windows 1 Institute

More information

Learning to Search Better than Your Teacher

Learning to Search Better than Your Teacher Ki-Wei Chng University of Illinois t Urbn Chmpign, IL Akshy Krishnmurthy Crnegie Mellon University, Pittsburgh, PA Alekh Agrwl Microsoft Reserch, New York, NY Hl Dumé III University of Mrylnd, College

More information

AntiSpyware Enterprise Module 8.5

AntiSpyware Enterprise Module 8.5 AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility

More information

Mathematics. Vectors. hsn.uk.net. Higher. Contents. Vectors 128 HSN23100

Mathematics. Vectors. hsn.uk.net. Higher. Contents. Vectors 128 HSN23100 hsn.uk.net Higher Mthemtics UNIT 3 OUTCOME 1 Vectors Contents Vectors 18 1 Vectors nd Sclrs 18 Components 18 3 Mgnitude 130 4 Equl Vectors 131 5 Addition nd Subtrction of Vectors 13 6 Multipliction by

More information

Modeling POMDPs for Generating and Simulating Stock Investment Policies

Modeling POMDPs for Generating and Simulating Stock Investment Policies Modeling POMDPs for Generting nd Simulting Stock Investment Policies Augusto Cesr Espíndol Bff UNIRIO - Dep. Informátic Aplicd Av. Psteur, 458 - Térreo Rio de Jneiro - Brzil ugusto.bff@uniriotec.br Angelo

More information

9 CONTINUOUS DISTRIBUTIONS

9 CONTINUOUS DISTRIBUTIONS 9 CONTINUOUS DISTIBUTIONS A rndom vrible whose vlue my fll nywhere in rnge of vlues is continuous rndom vrible nd will be ssocited with some continuous distribution. Continuous distributions re to discrete

More information

CHAPTER 11 Numerical Differentiation and Integration

CHAPTER 11 Numerical Differentiation and Integration CHAPTER 11 Numericl Differentition nd Integrtion Differentition nd integrtion re bsic mthemticl opertions with wide rnge of pplictions in mny res of science. It is therefore importnt to hve good methods

More information

When Simulation Meets Antichains (on Checking Language Inclusion of NFAs)

When Simulation Meets Antichains (on Checking Language Inclusion of NFAs) When Simultion Meets Antichins (on Checking Lnguge Inclusion of NFAs) Prosh Aziz Abdull 1, Yu-Fng Chen 1, Lukáš Holík 2, Richrd Myr 3, nd Tomáš Vojnr 2 1 Uppsl University 2 Brno University of Technology

More information

Section 7-4 Translation of Axes

Section 7-4 Translation of Axes 62 7 ADDITIONAL TOPICS IN ANALYTIC GEOMETRY Section 7-4 Trnsltion of Aes Trnsltion of Aes Stndrd Equtions of Trnslted Conics Grphing Equtions of the Form A 2 C 2 D E F 0 Finding Equtions of Conics In the

More information

Treatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3.

Treatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3. The nlysis of vrince (ANOVA) Although the t-test is one of the most commonly used sttisticl hypothesis tests, it hs limittions. The mjor limittion is tht the t-test cn be used to compre the mens of only

More information

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment ClerPeks Customer Cre Guide Business s Usul (BU) Services Pece of mind for your BI Investment ClerPeks Customer Cre Business s Usul Services Tble of Contents 1. Overview...3 Benefits of Choosing ClerPeks

More information

Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm

Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm Bibhudendr chry, Girij Snkr Rth, Srt Kumr Ptr, nd Sroj Kumr Pnigrhy Novel Methods of Generting Self-Invertible Mtrix for Hill Cipher lgorithm Bibhudendr chry Deprtment of Electronics & Communiction Engineering

More information

Section 5-4 Trigonometric Functions

Section 5-4 Trigonometric Functions 5- Trigonometric Functions Section 5- Trigonometric Functions Definition of the Trigonometric Functions Clcultor Evlution of Trigonometric Functions Definition of the Trigonometric Functions Alternte Form

More information

Network Configuration Independence Mechanism

Network Configuration Independence Mechanism 3GPP TSG SA WG3 Security S3#19 S3-010323 3-6 July, 2001 Newbury, UK Source: Title: Document for: AT&T Wireless Network Configurtion Independence Mechnism Approvl 1 Introduction During the lst S3 meeting

More information

Vectors 2. 1. Recap of vectors

Vectors 2. 1. Recap of vectors Vectors 2. Recp of vectors Vectors re directed line segments - they cn be represented in component form or by direction nd mgnitude. We cn use trigonometry nd Pythgors theorem to switch between the forms

More information

Regular Repair of Specifications

Regular Repair of Specifications Regulr Repir of Specifictions Michel Benedikt Oxford University michel.enedikt@coml.ox.c.uk Griele Puppis Oxford University griele.puppis@coml.ox.c.uk Cristin Riveros Oxford University cristin.riveros@coml.ox.c.uk

More information

2005-06 Second Term MAT2060B 1. Supplementary Notes 3 Interchange of Differentiation and Integration

2005-06 Second Term MAT2060B 1. Supplementary Notes 3 Interchange of Differentiation and Integration Source: http://www.mth.cuhk.edu.hk/~mt26/mt26b/notes/notes3.pdf 25-6 Second Term MAT26B 1 Supplementry Notes 3 Interchnge of Differentition nd Integrtion The theme of this course is bout vrious limiting

More information

GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI Softwre www.gfi.com GFI MilArchiver 6 vs Quest Softwre Archive Mnger GFI MilArchiver 6 Quest Softwre Archive Mnger Who we re Generl fetures Supports

More information

Efficient load-balancing routing for wireless mesh networks

Efficient load-balancing routing for wireless mesh networks Computer Networks 51 (007) 50 66 www.elsevier.com/locte/comnet Efficient lod-blncing routing for wireless mesh networks Yigl Bejerno, Seung-Je Hn b, *,1, Amit Kumr c Bell Lbortories, Lucent Technologies,

More information

Optiml Control of Seril, Multi-Echelon Inventory (E&I) & Mixed Erlng demnds

Optiml Control of Seril, Multi-Echelon Inventory (E&I) & Mixed Erlng demnds Optiml Control of Seril, Multi-Echelon Inventory/Production Systems with Periodic Btching Geert-Jn vn Houtum Deprtment of Technology Mngement, Technische Universiteit Eindhoven, P.O. Box 513, 56 MB, Eindhoven,

More information

Economics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999

Economics Letters 65 (1999) 9 15. macroeconomists. a b, Ruth A. Judson, Ann L. Owen. Received 11 December 1998; accepted 12 May 1999 Economics Letters 65 (1999) 9 15 Estimting dynmic pnel dt models: guide for q mcroeconomists b, * Ruth A. Judson, Ann L. Owen Federl Reserve Bord of Governors, 0th & C Sts., N.W. Wshington, D.C. 0551,

More information

Data replication in mobile computing

Data replication in mobile computing Technicl Report, My 2010 Dt repliction in mobile computing Bchelor s Thesis in Electricl Engineering Rodrigo Christovm Pmplon HALMSTAD UNIVERSITY, IDE SCHOOL OF INFORMATION SCIENCE, COMPUTER AND ELECTRICAL

More information

MODULE 3. 0, y = 0 for all y

MODULE 3. 0, y = 0 for all y Topics: Inner products MOULE 3 The inner product of two vectors: The inner product of two vectors x, y V, denoted by x, y is (in generl) complex vlued function which hs the following four properties: i)

More information

Module Summary Sheets. C3, Methods for Advanced Mathematics (Version B reference to new book) Topic 2: Natural Logarithms and Exponentials

Module Summary Sheets. C3, Methods for Advanced Mathematics (Version B reference to new book) Topic 2: Natural Logarithms and Exponentials MEI Mthemtics in Ection nd Instry Topic : Proof MEI Structured Mthemtics Mole Summry Sheets C, Methods for Anced Mthemtics (Version B reference to new book) Topic : Nturl Logrithms nd Eponentils Topic

More information

Enterprise Risk Management Software Buyer s Guide

Enterprise Risk Management Software Buyer s Guide Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors

More information

Drawing Diagrams From Labelled Graphs

Drawing Diagrams From Labelled Graphs Drwing Digrms From Lbelled Grphs Jérôme Thièvre 1 INA, 4, venue de l Europe, 94366 BRY SUR MARNE FRANCE Anne Verroust-Blondet 2 INRIA Rocquencourt, B.P. 105, 78153 LE CHESNAY Cedex FRANCE Mrie-Luce Viud

More information

Source Code verification Using Logiscope and CodeReducer. Christophe Peron Principal Consultant Kalimetrix

Source Code verification Using Logiscope and CodeReducer. Christophe Peron Principal Consultant Kalimetrix Source Code verifiction Using Logiscope nd CodeReducer Christophe Peron Principl Consultnt Klimetrix Agend Introducing Logiscope: Improving confidence nd developer s productivity Bsed on stte-of-the-rt

More information

Warm-up for Differential Calculus

Warm-up for Differential Calculus Summer Assignment Wrm-up for Differentil Clculus Who should complete this pcket? Students who hve completed Functions or Honors Functions nd will be tking Differentil Clculus in the fll of 015. Due Dte:

More information

Pentominoes. Pentominoes. Bruce Baguley Cascade Math Systems, LLC. The pentominoes are a simple-looking set of objects through which some powerful

Pentominoes. Pentominoes. Bruce Baguley Cascade Math Systems, LLC. The pentominoes are a simple-looking set of objects through which some powerful Pentominoes Bruce Bguley Cscde Mth Systems, LLC Astrct. Pentominoes nd their reltives the polyominoes, polycues, nd polyhypercues will e used to explore nd pply vrious importnt mthemticl concepts. In this

More information

Section 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control

Section 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control Chpter 5 Configurtion of ISDN Protocols This chpter provides instructions for configuring the ISDN protocols in the SP201 for signling conversion. Use the sections tht reflect the softwre you re configuring.

More information

Software Cost Estimation Model Based on Integration of Multi-agent and Case-Based Reasoning

Software Cost Estimation Model Based on Integration of Multi-agent and Case-Based Reasoning Journl of Computer Science 2 (3): 276-282, 2006 ISSN 1549-3636 2006 Science Publictions Softwre Cost Estimtion Model Bsed on Integrtion of Multi-gent nd Cse-Bsed Resoning Hsn Al-Skrn Informtion Technology

More information

Automated Grading of DFA Constructions

Automated Grading of DFA Constructions Automted Grding of DFA Constructions Rjeev Alur nd Loris D Antoni Sumit Gulwni Dileep Kini nd Mhesh Viswnthn Deprtment of Computer Science Microsoft Reserch Deprtment of Computer Science University of

More information

Neighborhood Based Fast Graph Search in Large Networks

Neighborhood Based Fast Graph Search in Large Networks Neighborhood Bsed Fst Grph Serch in Lrge Networks Arijit Khn Dept. of Computer Science University of Cliforni Snt Brbr, CA 9306 rijitkhn@cs.ucsb.edu Ziyu Gun Dept. of Computer Science University of Cliforni

More information

4 Approximations. 4.1 Background. D. Levy

4 Approximations. 4.1 Background. D. Levy D. Levy 4 Approximtions 4.1 Bckground In this chpter we re interested in pproximtion problems. Generlly speking, strting from function f(x) we would like to find different function g(x) tht belongs to

More information

Performance analysis model for big data applications in cloud computing

Performance analysis model for big data applications in cloud computing Butist Villlpndo et l. Journl of Cloud Computing: Advnces, Systems nd Applictions 2014, 3:19 RESEARCH Performnce nlysis model for big dt pplictions in cloud computing Luis Edurdo Butist Villlpndo 1,2,

More information

Project 6 Aircraft static stability and control

Project 6 Aircraft static stability and control Project 6 Aircrft sttic stbility nd control The min objective of the project No. 6 is to compute the chrcteristics of the ircrft sttic stbility nd control chrcteristics in the pitch nd roll chnnel. The

More information

Lecture 5. Inner Product

Lecture 5. Inner Product Lecture 5 Inner Product Let us strt with the following problem. Given point P R nd line L R, how cn we find the point on the line closest to P? Answer: Drw line segment from P meeting the line in right

More information

Hillsborough Township Public Schools Mathematics Department Computer Programming 1

Hillsborough Township Public Schools Mathematics Department Computer Programming 1 Essentil Unit 1 Introduction to Progrmming Pcing: 15 dys Common Unit Test Wht re the ethicl implictions for ming in tody s world? There re ethicl responsibilities to consider when writing computer s. Citizenship,

More information

FDIC Study of Bank Overdraft Programs

FDIC Study of Bank Overdraft Programs FDIC Study of Bnk Overdrft Progrms Federl Deposit Insurnce Corportion November 2008 Executive Summry In 2006, the Federl Deposit Insurnce Corportion (FDIC) initited two-prt study to gther empiricl dt on

More information

AN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS

AN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS AN ANALYTICAL HIERARCHY PROCESS METHODOLOGY TO EVALUATE IT SOLUTIONS FOR ORGANIZATIONS Spiros Vsilkos (), Chrysostomos D. Stylios (),(b), John Groflkis (c) () Dept. of Telemtics Center, Computer Technology

More information

NOTES. Cohasset Associates, Inc. 2015 Managing Electronic Records Conference 8.1

NOTES. Cohasset Associates, Inc. 2015 Managing Electronic Records Conference 8.1 Cohsset Assocites, Inc. Expnding Your Skill Set: How to Apply the Right Serch Methods to Your Big Dt Problems Juli L. Brickell H5 Generl Counsel MER Conference My 18, 2015 H5 POWERING YOUR DISCOVERY GLOBALLY

More information

Quality Evaluation of Entrepreneur Education on Graduate Students Based on AHP-fuzzy Comprehensive Evaluation Approach ZhongXiaojun 1, WangYunfeng 2

Quality Evaluation of Entrepreneur Education on Graduate Students Based on AHP-fuzzy Comprehensive Evaluation Approach ZhongXiaojun 1, WangYunfeng 2 Interntionl Journl of Engineering Reserch & Science (IJOER) ISSN [2395-6992] [Vol-2, Issue-1, Jnury- 2016] Qulity Evlution of Entrepreneur Eduction on Grdute Students Bsed on AHP-fuzzy Comprehensive Evlution

More information

ASG Techniques of Adaptivity

ASG Techniques of Adaptivity ASG Techniques of Adptivity Hrld Meyer nd Dominik Kuropk nd Peter Tröger Hsso-Plttner-Institute for IT-Systems-Engineering t the University of Potsdm Prof.-Dr.-Helmert-Strsse 2-3, 14482 Potsdm, Germny

More information