Regular Expressions with Nested Levels of Back Referencing Form a Hierarchy
|
|
|
- Clinton Allen
- 9 years ago
- Views:
Transcription
1 Regular Expressions with Nested Levels of Back Referencing Form a Hierarchy Kim S. Larsen Odense University Abstract For many years, regular expressions with back referencing have been used in a variety of software products in common use, including operating systems, editors, and programming languages. In these products, regular expressions have been extended with a naming construct. If a subexpression is named by some variable, whenever this subexpression matches some string, that string is assigned to the variable. Later occurrences of the same variable will then match the string assigned to it. This construction greatly increases the power of regular expressions and is useful in text searching as well as in text substitution in large documents. We study the nested usage of this operator, and prove that the power of the expressions increase with the number of nested levels that are allowed. Keywords: Formal languages; regular expressions; back referencing. 1 Introduction For many years, regular expressions with back referencing have been used in a variety of software products in common use, including operating systems, editors, and programming languages. However, it seems that a theoretical study of this language construction has not been made. In [2], a vaguely related class of expressions are studied. In the terminology of our paper, these are regular expressions without alternation and with back referencing being restricted to using one variable name only. Using the semantics of regular expressions with back referencing as outlined in [1], we define nested levels of back referencing and prove that the number of languages that can be expressed increases with the number of nested levels that are allowed. Supported in part by the esprit Long Term Research Programme of the EU under project number (alcom-it). Department of Mathematics and Computer Science, Odense University, Campusvej 55, DK 5230 Odense M, Denmark. [email protected]. 1
2 2 Regular expressions with back referencing We choose a standard syntax for regular expressions with and without back referencing [1]. Let Σ, the alphabet, be an infinite 1 set of symbols, and let Ψ be an infinite set of names. The following grammar defines the syntax of regular expressions with back referencing. where a Σ and α Ψ. E ::= a E E E E E E%α α (E) The precedence of the operators from highest to lowest is as follows: naming (E%α), Kleene star (E ), concatenation (E E), and alternation (E E). As usual, we often write EE instead of E E, i.e., leaving out the dot. If E is a regular expression with back referencing, we use L(E) to denote the language it defines. A complete definition of the semantics of regular expressions with back referencing can be found in [1]. The semantics of the operators concatenation, alternation, and star are as usual for regular expressions. Informally, the semantics of naming and use of variables is best explained from an operational point of view. If we try to parse a string, from left to right, according to a regular expression with back referencing, whenever a substring is matched with a named subexpression, that substring is assigned to the variable in question. A later occurrence of this variable matches the string assigned to it. Before continuing, let us give a few examples (partly from [1]) of the semantics of these expressions: (a b) %α α α is the language {www w (a b) }. (a b c) (a b c)%α (a b c) α (a b c) is the language of strings over {a,b,c} with at least one repeated occurrence of a symbol. (a b) %α (a b) %β (α β) is the language u,v (a b) {uuv,uvv}. ((a b) %α α) isthesetofallstringsover{a,b}oftheforms 1 s 1 s 2 s 2 s k s k for some k, where the s i s can be any strings of a s and b s. In the last example, notice that in each iteration of the outermost star expression, a new value is bound to the variable α. For convenience, we use e i as an abbreviation for e e (i times) e, and we assume that names are not reused, i.e., in any expression e, for any α Ψ, there is at most one subexpression of the form e %α. This does not restrict the expressive power and could be avoided at the cost of more cumbersome definitions and proofs. 1 Usually, the alphabet for regular expressions is finite. Here, our goal is to establish an infinite hierarchy, and we need infinitely many symbols. However, each expression that we consider is finite and uses only a finite part of the alphabet. For purists, we want to remark that we could instead have used an infinite family of finite alphabets. 2
3 There are the following additional requirements, which are necessary in order to ensure that the use of variables is well-defined: If α appears in an expression e, then there must exist a subexpression e of e of the form e = e 1 e 2, where the α under discussion is a subexpression of e 2, and an expression of the form e %α is a subexpression of e 1. Assume that e %α is a subexpression of e. If there exists a subexpression e = e 1 e 2 of e such that e is a subexpression of e i, where i = 1 or i = 2, then the name α is only allowed to appear in e i. Assume that e %α is a subexpression of e. If there exists a subexpression e = e 1 of e such that e is a subexpression of e 1, then α is only allowed to appear in e 1. The first requirement ensures that a name is defined before it is used, and the last two requirements ensure that a string has been assigned to it. The nested level of a regular expression with back referencing is defined recursively in the structure of the expression. Regular expressions have nested level zero. The nested level of E%α is one more than the nested level of E. The nested level of a variable α is the nested level of its defining expression E%α. For all other operators, the nested level of the expression is the maximum of the nested levels of the arguments. In the following sections, we use contexts [3]. These are merely expressions with a hole instead of a symbol. As an example, C[] = (a []) is a context. If C[] is a context, C[E] is the expression C[] with the hole replaced by E. In the example, C[b c] is the expression (a (b c)). We use σ(e) (the signature of E) to denote the set of symbols from Σ occurring in an expression E. 3 The hierarchy Let L i be the set of languages which can be expressed by a regular expression with back referencing of at most i nested levels. Thus, L 0 equals the set of regular languages. Clearly, L i L j, if i j. In this section, we prove that L i L j if i j. AssumethatΣ = {a l 0,am 0,ar 0,al 1,am 1,ar 1,al 2,am 2,ar 2,...}andΨ = {α 0,α 1,α 2,...}. The superscripts l, m, and r stand for left, middle, and right. Define the sequence of expressions {x i } i 0 as follows: x 0 = (a l 0 am 0 ar 0 ) and for i 1, x i = (a l i x i 1%α i 1 a m i α i 1 a r i ). Clearly, L(x i ) L i. In this section, we show that for all i > 0, L(x i ) L i 1. Thus, the sequence of sets of languages forms a hierarchy. If a regular expression with back referencing R defines the language L(x k ) for some k, then we can prove that R must have a certain form. Basically, the 3
4 following lemma breaks up the expression R. Looking at R as a syntax tree, it says that there must exist a path from the root to a leaf on which there are k+1 stars with the property that the symbols a d i are introduced gradually going up this path (there could be more than k +1 stars total; the statement is merely that there exists k + 1 stars with this property). More precisely, only symbols a d j with j < i are present in the subexpression under the ith of these stars going from the the leaf and up. Lemma 1 Let R be a regular expression with back referencing such that L(R) = L(x k ). Then there exists expressions R i and contexts C i, 1 i k+1, such that R can be written as follows: R = C k+1 [R k ] R i = C i [R i 1 ], i {1,...,k} R 0 = C 0 [a m 0 ] where σ(r 0 ) = {a l 0,am 0,ar 0 } and σ(r i) = σ(r i 1 ) {a l i,am i,ar i }, i {1,...,k}. Proof Let y j be as x k, except that all occurrences of stars in x k are replaced by j s, i.e., any subexpression e is replaced by e j. Let M = j L(y j ). Clearly, M L(x k ) and M is infinite. We consider all possible R i s and C i s and show that if they are not of the right form, then either strings not in L(x k ) can be produced (which is a contradiction), or this part of the expression R can only contribute with finitely many of the substrings in M. This also leads to a contradiction since there are only a finite number of possibilities for choosing the R i s and C i s (which is the same as saying that there are only a finite number of different paths from the root to a leaf in the syntax tree of a finite expression). For convenience, define R k+1 = R. Now, assume for the sake of contradiction that the lemma does not hold. Let p {0,...,k} be the largest integer for which we can find expressions and contexts of the right form, i.e., for 1 i p, we have R i = C i [R i 1 ] and R 0 = C 0 [a m 0 ], where σ(r 0) = {a l 0,am 0,ar 0 } and σ(r i ) = σ(r i 1 ) {a l i,am i,ar i }. We consider the different possibilities for why this sequence cannot be extended to one fulfilling the lemma. Consider the smallest context C[] such that R = C [(C[R p ]) ] and σ(c[]) \ σ(r p ) (the context C [] is just the rest of R after C[] has been defined). If no such context exists, either there is no star containing the subexpression R p, in which case this path can only produce a bounded number of a d p+1 s, or no symbols with indices greater than p are introduced at all. In any case, this path s contribution to M is finite. If such a context C[] does exist, then, by the choice of p, a symbol with index greater than or equal to p+2 is introduced, i.e., belongs to σ(c[])\σ(r p ). But then the strings will not have the correct form unless symbols with index p+1 are introduced at the same time. However, since C[] is chosen to be the smallest context fulfilling the requirements listed above, it is not possible to produce an unbounded number of symbols with index p+1 in between symbols with index p+2, so again only finitely many strings from M can originate from this path. 4
5 Theorem 2 Let R be a regular expression with back referencing, and assume that L(R) = L(x k ). Then R has nested level k. Proof Let R be written as described in lemma 1. We prove that if some R i, i {1,...,k}, is not of the form R i = C A i [(CB i [R i 1 ])%α], for some α, then we get a contradiction. Clearly, this implies that all of these k R i s are of this form, so the nested level is k. Now, assume to the contrary that R i is not of the form described above. We make some transformations on the expression R i (in the remaining part of this proof, we ignore the rest of R). These transformations have the property that if an expression F is transformed into F, then L(F ) L(F). First, we perform the following transformations on R i 1 : Replace an alternation with one of its arguments; if a d i 1, for some d {l,m,r}, is in the signature of one argument and not the other, choose the former. Otherwise, decide arbitrarily. Replace a star with its argument. The transformations are carried out repeatedly until none of them can be applied any more. After this, let E refer to the expression that R i 1 has been transformed into. Now the remaining parts of R i are transformed: Replace an alternation with one of its arguments; if E is a subexpression of one of the arguments, that argument is chosen. Otherwise, decide arbitrarily. Replace a star with its argument whenever E is not a subexpression of that argument. The transformations are carried out repeatedly until none of them can be applied any more. The resulting expression has no alternations, and only stars having E as a subexpression. Since, by assumption, there were no namings between R i 1 and R i, this means that in the transformed expression, subexpressions of namings only contain concatenation as an operator. Now replace all names with the subexpression which has been given that name, and remove the naming. Since the named subexpressions only contain concatenation, each subexpression is in fact simply a string, so this transformation preserves the semantic meaning of the expression. After this, let F refer to the transformed expression. Thus, F is of the form (C [E ]). Since L(F) L(R i ) and since R i is a subexpression of R, the strings in L(F) must be of the form x a l iy 1 a m i y 1 a r i a l iy 2 a m i y 2 a r i a l iy 3 a m i y 3 a r i z 5
6 where a l i σ(x), ar i σ(z) and x, z, and the y i s are some strings. Since stars are only applied to expressions containing E as a subexpression, there must exist a constant p such that L(F) intersected with (Σ\{a l i}) a l it a m i T a r i a l it a m i T a r i (p times) a l it a m i T a r i (Σ\{a r i}), where T = {a l 0,am 0,ar 0,...,al i 1,am i 1,ar i 1 }, is still infinite. This is seen as follows: Let E s be the smallest expression containing E as a subexpression such that R i can be written R i = C s [E s ] and {a l i,am i,ar i } σ(e s). Since E s is the smallest expression with this property, there cannot be any stars in E s applied to a subexpression containing any of the a d i s. If there were, strings would not have the correct form (there would be occurrences of one of the a d i s without both of the other a d i s appearing in between). Removing all stars in C s [] (in other words changing all stars to a 1 for one iteration ), would give us a regular expression with a bounded number, p, of a d i s. Since E s contains a star and σ(e ), the language is still infinite. We now apply a sequential transducer [4] to the result of this intersection. The transducer outputs ε until it meets the first a l i after which it outputs whatever it reads. In this way, we can get rid of the x s and still have a regular language. Since the reverse of a regular language is also regular, we can with a similar transducer remove the z s. Again using a sequential transducer, we change every symbol with a subscript different from i to a new symbol b. The strings in this regular language are of the form a l iy 1 a m i y 1 a r i a l iy 2 a m i y 2 a r i a l iy p a m i y p a r i where the y i s only contain b s. Applying the pumping lemma [5] to this infinite language shows that it is not regular, and we have obtained a contradiction. Corollary 3 If L k is the set of languages which can be expressed by a regular expression with back referencing of at most k nested levels, then i,j IN: i < j L i L j L i L j. Acknowledgment The author would like to thank Peter Høyer for many interesting discussions on this and related issues. References [1] A. V. Aho, Algorithms for Finding Patterns in Strings, in Handbook of Theoretical Computer Science, Vol. A, J. van Leeuwen, ed., Chap. 5, : Algorithms and Complexity (Elsevier Science Publishers, Amsterdam, 1990). [2] D. Angluin, Finding Patterns Common to a Set of String, Proceedings of the 11th Annual ACM Symposium on Theory of Computing (1979)
7 [3] H. P. Barendregt, The Lambda Calculus: Its Syntax and Semantics (North- Holland, Amsterdam, 1981). [4] M. A. Harrison, Introduction to Formal Language Theory (Addison-Wesley, Reading, Massachusetts, 1978). [5] J. C. Martin, Introduction to Languages and the Theory of Computation(McGraw- Hill, New York, 1991). 7
C H A P T E R Regular Expressions regular expression
7 CHAPTER Regular Expressions Most programmers and other power-users of computer systems have used tools that match text patterns. You may have used a Web search engine with a pattern like travel cancun
6.045: Automata, Computability, and Complexity Or, Great Ideas in Theoretical Computer Science Spring, 2010. Class 4 Nancy Lynch
6.045: Automata, Computability, and Complexity Or, Great Ideas in Theoretical Computer Science Spring, 2010 Class 4 Nancy Lynch Today Two more models of computation: Nondeterministic Finite Automata (NFAs)
(IALC, Chapters 8 and 9) Introduction to Turing s life, Turing machines, universal machines, unsolvable problems.
3130CIT: Theory of Computation Turing machines and undecidability (IALC, Chapters 8 and 9) Introduction to Turing s life, Turing machines, universal machines, unsolvable problems. An undecidable problem
Automata and Formal Languages
Automata and Formal Languages Winter 2009-2010 Yacov Hel-Or 1 What this course is all about This course is about mathematical models of computation We ll study different machine models (finite automata,
6.2 Permutations continued
6.2 Permutations continued Theorem A permutation on a finite set A is either a cycle or can be expressed as a product (composition of disjoint cycles. Proof is by (strong induction on the number, r, of
Regular Languages and Finite Automata
Regular Languages and Finite Automata 1 Introduction Hing Leung Department of Computer Science New Mexico State University Sep 16, 2010 In 1943, McCulloch and Pitts [4] published a pioneering work on a
Automata and Computability. Solutions to Exercises
Automata and Computability Solutions to Exercises Fall 25 Alexis Maciel Department of Computer Science Clarkson University Copyright c 25 Alexis Maciel ii Contents Preface vii Introduction 2 Finite Automata
Continued Fractions and the Euclidean Algorithm
Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction
Fundamentele Informatica II
Fundamentele Informatica II Answer to selected exercises 1 John C Martin: Introduction to Languages and the Theory of Computation M.M. Bonsangue (and J. Kleijn) Fall 2011 Let L be a language. It is clear
Formal Languages and Automata Theory - Regular Expressions and Finite Automata -
Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Samarjit Chakraborty Computer Engineering and Networks Laboratory Swiss Federal Institute of Technology (ETH) Zürich March
1 Definition of a Turing machine
Introduction to Algorithms Notes on Turing Machines CS 4820, Spring 2012 April 2-16, 2012 1 Definition of a Turing machine Turing machines are an abstract model of computation. They provide a precise,
Automata on Infinite Words and Trees
Automata on Infinite Words and Trees Course notes for the course Automata on Infinite Words and Trees given by Dr. Meghyn Bienvenu at Universität Bremen in the 2009-2010 winter semester Last modified:
Lecture 2: Regular Languages [Fa 14]
Caveat lector: This is the first edition of this lecture note. Please send bug reports and suggestions to [email protected]. But the Lord came down to see the city and the tower the people were building.
Reading 13 : Finite State Automata and Regular Expressions
CS/Math 24: Introduction to Discrete Mathematics Fall 25 Reading 3 : Finite State Automata and Regular Expressions Instructors: Beck Hasti, Gautam Prakriya In this reading we study a mathematical model
Introduction to Automata Theory. Reading: Chapter 1
Introduction to Automata Theory Reading: Chapter 1 1 What is Automata Theory? Study of abstract computing devices, or machines Automaton = an abstract computing device Note: A device need not even be a
MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.
MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column
Lemma 5.2. Let S be a set. (1) Let f and g be two permutations of S. Then the composition of f and g is a permutation of S.
Definition 51 Let S be a set bijection f : S S 5 Permutation groups A permutation of S is simply a Lemma 52 Let S be a set (1) Let f and g be two permutations of S Then the composition of f and g is a
a 11 x 1 + a 12 x 2 + + a 1n x n = b 1 a 21 x 1 + a 22 x 2 + + a 2n x n = b 2.
Chapter 1 LINEAR EQUATIONS 1.1 Introduction to linear equations A linear equation in n unknowns x 1, x,, x n is an equation of the form a 1 x 1 + a x + + a n x n = b, where a 1, a,..., a n, b are given
GRAPH THEORY LECTURE 4: TREES
GRAPH THEORY LECTURE 4: TREES Abstract. 3.1 presents some standard characterizations and properties of trees. 3.2 presents several different types of trees. 3.7 develops a counting method based on a bijection
How To Understand The Theory Of Computer Science
Theory of Computation Lecture Notes Abhijat Vichare August 2005 Contents 1 Introduction 2 What is Computation? 3 The λ Calculus 3.1 Conversions: 3.2 The calculus in use 3.3 Few Important Theorems 3.4 Worked
I. GROUPS: BASIC DEFINITIONS AND EXAMPLES
I GROUPS: BASIC DEFINITIONS AND EXAMPLES Definition 1: An operation on a set G is a function : G G G Definition 2: A group is a set G which is equipped with an operation and a special element e G, called
Lecture 2: Universality
CS 710: Complexity Theory 1/21/2010 Lecture 2: Universality Instructor: Dieter van Melkebeek Scribe: Tyson Williams In this lecture, we introduce the notion of a universal machine, develop efficient universal
Today s Topics. Primes & Greatest Common Divisors
Today s Topics Primes & Greatest Common Divisors Prime representations Important theorems about primality Greatest Common Divisors Least Common Multiples Euclid s algorithm Once and for all, what are prime
2110711 THEORY of COMPUTATION
2110711 THEORY of COMPUTATION ATHASIT SURARERKS ELITE Athasit Surarerks ELITE Engineering Laboratory in Theoretical Enumerable System Computer Engineering, Faculty of Engineering Chulalongkorn University
CMPSCI 250: Introduction to Computation. Lecture #19: Regular Expressions and Their Languages David Mix Barrington 11 April 2013
CMPSCI 250: Introduction to Computation Lecture #19: Regular Expressions and Their Languages David Mix Barrington 11 April 2013 Regular Expressions and Their Languages Alphabets, Strings and Languages
HOMEWORK 5 SOLUTIONS. n!f n (1) lim. ln x n! + xn x. 1 = G n 1 (x). (2) k + 1 n. (n 1)!
Math 7 Fall 205 HOMEWORK 5 SOLUTIONS Problem. 2008 B2 Let F 0 x = ln x. For n 0 and x > 0, let F n+ x = 0 F ntdt. Evaluate n!f n lim n ln n. By directly computing F n x for small n s, we obtain the following
Methods for Finding Bases
Methods for Finding Bases Bases for the subspaces of a matrix Row-reduction methods can be used to find bases. Let us now look at an example illustrating how to obtain bases for the row space, null space,
INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS
INDISTINGUISHABILITY OF ABSOLUTELY CONTINUOUS AND SINGULAR DISTRIBUTIONS STEVEN P. LALLEY AND ANDREW NOBEL Abstract. It is shown that there are no consistent decision rules for the hypothesis testing problem
Markov random fields and Gibbs measures
Chapter Markov random fields and Gibbs measures 1. Conditional independence Suppose X i is a random element of (X i, B i ), for i = 1, 2, 3, with all X i defined on the same probability space (.F, P).
CS 103X: Discrete Structures Homework Assignment 3 Solutions
CS 103X: Discrete Structures Homework Assignment 3 s Exercise 1 (20 points). On well-ordering and induction: (a) Prove the induction principle from the well-ordering principle. (b) Prove the well-ordering
Computability Theory
CSC 438F/2404F Notes (S. Cook and T. Pitassi) Fall, 2014 Computability Theory This section is partly inspired by the material in A Course in Mathematical Logic by Bell and Machover, Chap 6, sections 1-10.
Finite Automata and Regular Languages
CHAPTER 3 Finite Automata and Regular Languages 3. Introduction 3.. States and Automata A finite-state machine or finite automaton (the noun comes from the Greek; the singular is automaton, the Greek-derived
The Prime Numbers. Definition. A prime number is a positive integer with exactly two positive divisors.
The Prime Numbers Before starting our study of primes, we record the following important lemma. Recall that integers a, b are said to be relatively prime if gcd(a, b) = 1. Lemma (Euclid s Lemma). If gcd(a,
MATH10040 Chapter 2: Prime and relatively prime numbers
MATH10040 Chapter 2: Prime and relatively prime numbers Recall the basic definition: 1. Prime numbers Definition 1.1. Recall that a positive integer is said to be prime if it has precisely two positive
Galois Theory III. 3.1. Splitting fields.
Galois Theory III. 3.1. Splitting fields. We know how to construct a field extension L of a given field K where a given irreducible polynomial P (X) K[X] has a root. We need a field extension of K where
1 if 1 x 0 1 if 0 x 1
Chapter 3 Continuity In this chapter we begin by defining the fundamental notion of continuity for real valued functions of a single real variable. When trying to decide whether a given function is or
Lecture 3: Finding integer solutions to systems of linear equations
Lecture 3: Finding integer solutions to systems of linear equations Algorithmic Number Theory (Fall 2014) Rutgers University Swastik Kopparty Scribe: Abhishek Bhrushundi 1 Overview The goal of this lecture
Mathematical Induction. Lecture 10-11
Mathematical Induction Lecture 10-11 Menu Mathematical Induction Strong Induction Recursive Definitions Structural Induction Climbing an Infinite Ladder Suppose we have an infinite ladder: 1. We can reach
CS5236 Advanced Automata Theory
CS5236 Advanced Automata Theory Frank Stephan Semester I, Academic Year 2012-2013 Advanced Automata Theory is a lecture which will first review the basics of formal languages and automata theory and then
Regular Expressions and Automata using Haskell
Regular Expressions and Automata using Haskell Simon Thompson Computing Laboratory University of Kent at Canterbury January 2000 Contents 1 Introduction 2 2 Regular Expressions 2 3 Matching regular expressions
The Goldberg Rao Algorithm for the Maximum Flow Problem
The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }
8 Divisibility and prime numbers
8 Divisibility and prime numbers 8.1 Divisibility In this short section we extend the concept of a multiple from the natural numbers to the integers. We also summarize several other terms that express
Turing Machines: An Introduction
CIT 596 Theory of Computation 1 We have seen several abstract models of computing devices: Deterministic Finite Automata, Nondeterministic Finite Automata, Nondeterministic Finite Automata with ɛ-transitions,
Math 319 Problem Set #3 Solution 21 February 2002
Math 319 Problem Set #3 Solution 21 February 2002 1. ( 2.1, problem 15) Find integers a 1, a 2, a 3, a 4, a 5 such that every integer x satisfies at least one of the congruences x a 1 (mod 2), x a 2 (mod
INCIDENCE-BETWEENNESS GEOMETRY
INCIDENCE-BETWEENNESS GEOMETRY MATH 410, CSUSM. SPRING 2008. PROFESSOR AITKEN This document covers the geometry that can be developed with just the axioms related to incidence and betweenness. The full
CS 3719 (Theory of Computation and Algorithms) Lecture 4
CS 3719 (Theory of Computation and Algorithms) Lecture 4 Antonina Kolokolova January 18, 2012 1 Undecidable languages 1.1 Church-Turing thesis Let s recap how it all started. In 1990, Hilbert stated a
Local periods and binary partial words: An algorithm
Local periods and binary partial words: An algorithm F. Blanchet-Sadri and Ajay Chriscoe Department of Mathematical Sciences University of North Carolina P.O. Box 26170 Greensboro, NC 27402 6170, USA E-mail:
No: 10 04. Bilkent University. Monotonic Extension. Farhad Husseinov. Discussion Papers. Department of Economics
No: 10 04 Bilkent University Monotonic Extension Farhad Husseinov Discussion Papers Department of Economics The Discussion Papers of the Department of Economics are intended to make the initial results
Full and Complete Binary Trees
Full and Complete Binary Trees Binary Tree Theorems 1 Here are two important types of binary trees. Note that the definitions, while similar, are logically independent. Definition: a binary tree T is full
THE BANACH CONTRACTION PRINCIPLE. Contents
THE BANACH CONTRACTION PRINCIPLE ALEX PONIECKI Abstract. This paper will study contractions of metric spaces. To do this, we will mainly use tools from topology. We will give some examples of contractions,
A simple criterion on degree sequences of graphs
Discrete Applied Mathematics 156 (2008) 3513 3517 Contents lists available at ScienceDirect Discrete Applied Mathematics journal homepage: www.elsevier.com/locate/dam Note A simple criterion on degree
Stationary random graphs on Z with prescribed iid degrees and finite mean connections
Stationary random graphs on Z with prescribed iid degrees and finite mean connections Maria Deijfen Johan Jonasson February 2006 Abstract Let F be a probability distribution with support on the non-negative
The Ergodic Theorem and randomness
The Ergodic Theorem and randomness Peter Gács Department of Computer Science Boston University March 19, 2008 Peter Gács (Boston University) Ergodic theorem March 19, 2008 1 / 27 Introduction Introduction
Notes on Complexity Theory Last updated: August, 2011. Lecture 1
Notes on Complexity Theory Last updated: August, 2011 Jonathan Katz Lecture 1 1 Turing Machines I assume that most students have encountered Turing machines before. (Students who have not may want to look
CONTINUED FRACTIONS AND PELL S EQUATION. Contents 1. Continued Fractions 1 2. Solution to Pell s Equation 9 References 12
CONTINUED FRACTIONS AND PELL S EQUATION SEUNG HYUN YANG Abstract. In this REU paper, I will use some important characteristics of continued fractions to give the complete set of solutions to Pell s equation.
k, then n = p2α 1 1 pα k
Powers of Integers An integer n is a perfect square if n = m for some integer m. Taking into account the prime factorization, if m = p α 1 1 pα k k, then n = pα 1 1 p α k k. That is, n is a perfect square
MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES
MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.436J/15.085J Fall 2008 Lecture 5 9/17/2008 RANDOM VARIABLES Contents 1. Random variables and measurable functions 2. Cumulative distribution functions 3. Discrete
1. Prove that the empty set is a subset of every set.
1. Prove that the empty set is a subset of every set. Basic Topology Written by Men-Gen Tsai email: [email protected] Proof: For any element x of the empty set, x is also an element of every set since
WRITING PROOFS. Christopher Heil Georgia Institute of Technology
WRITING PROOFS Christopher Heil Georgia Institute of Technology A theorem is just a statement of fact A proof of the theorem is a logical explanation of why the theorem is true Many theorems have this
This asserts two sets are equal iff they have the same elements, that is, a set is determined by its elements.
3. Axioms of Set theory Before presenting the axioms of set theory, we first make a few basic comments about the relevant first order logic. We will give a somewhat more detailed discussion later, but
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
Lexical analysis FORMAL LANGUAGES AND COMPILERS. Floriano Scioscia. Formal Languages and Compilers A.Y. 2015/2016
Master s Degree Course in Computer Engineering Formal Languages FORMAL LANGUAGES AND COMPILERS Lexical analysis Floriano Scioscia 1 Introductive terminological distinction Lexical string or lexeme = meaningful
Total Degrees and Nonsplitting Properties of Σ 0 2 Enumeration Degrees
Total Degrees and Nonsplitting Properties of Σ 0 2 Enumeration Degrees M. M. Arslanov, S. B. Cooper, I. Sh. Kalimullin and M. I. Soskova Kazan State University, Russia University of Leeds, U.K. This paper
University of Ostrava. Reasoning in Description Logic with Semantic Tableau Binary Trees
University of Ostrava Institute for Research and Applications of Fuzzy Modeling Reasoning in Description Logic with Semantic Tableau Binary Trees Alena Lukasová Research report No. 63 2005 Submitted/to
n k=1 k=0 1/k! = e. Example 6.4. The series 1/k 2 converges in R. Indeed, if s n = n then k=1 1/k, then s 2n s n = 1 n + 1 +...
6 Series We call a normed space (X, ) a Banach space provided that every Cauchy sequence (x n ) in X converges. For example, R with the norm = is an example of Banach space. Now let (x n ) be a sequence
5.3 Improper Integrals Involving Rational and Exponential Functions
Section 5.3 Improper Integrals Involving Rational and Exponential Functions 99.. 3. 4. dθ +a cos θ =, < a
Section IV.1: Recursive Algorithms and Recursion Trees
Section IV.1: Recursive Algorithms and Recursion Trees Definition IV.1.1: A recursive algorithm is an algorithm that solves a problem by (1) reducing it to an instance of the same problem with smaller
Lecture 5 - CPA security, Pseudorandom functions
Lecture 5 - CPA security, Pseudorandom functions Boaz Barak October 2, 2007 Reading Pages 82 93 and 221 225 of KL (sections 3.5, 3.6.1, 3.6.2 and 6.5). See also Goldreich (Vol I) for proof of PRF construction.
On strong fairness in UNITY
On strong fairness in UNITY H.P.Gumm, D.Zhukov Fachbereich Mathematik und Informatik Philipps Universität Marburg {gumm,shukov}@mathematik.uni-marburg.de Abstract. In [6] Tsay and Bagrodia present a correct
Testing LTL Formula Translation into Büchi Automata
Testing LTL Formula Translation into Büchi Automata Heikki Tauriainen and Keijo Heljanko Helsinki University of Technology, Laboratory for Theoretical Computer Science, P. O. Box 5400, FIN-02015 HUT, Finland
1 Approximating Set Cover
CS 05: Algorithms (Grad) Feb 2-24, 2005 Approximating Set Cover. Definition An Instance (X, F ) of the set-covering problem consists of a finite set X and a family F of subset of X, such that every elemennt
1 Operational Semantics for While
Models of Computation, 2010 1 1 Operational Semantics for While The language While of simple while programs has a grammar consisting of three syntactic categories: numeric expressions, which represent
Kevin James. MTHSC 412 Section 2.4 Prime Factors and Greatest Comm
MTHSC 412 Section 2.4 Prime Factors and Greatest Common Divisor Greatest Common Divisor Definition Suppose that a, b Z. Then we say that d Z is a greatest common divisor (gcd) of a and b if the following
A characterization of trace zero symmetric nonnegative 5x5 matrices
A characterization of trace zero symmetric nonnegative 5x5 matrices Oren Spector June 1, 009 Abstract The problem of determining necessary and sufficient conditions for a set of real numbers to be the
The Fundamental Theorem of Arithmetic
The Fundamental Theorem of Arithmetic 1 Introduction: Why this theorem? Why this proof? One of the purposes of this course 1 is to train you in the methods mathematicians use to prove mathematical statements,
Computational Models Lecture 8, Spring 2009
Slides modified by Benny Chor, based on original slides by Maurice Herlihy, Brown Univ. p. 1 Computational Models Lecture 8, Spring 2009 Encoding of TMs Universal Turing Machines The Halting/Acceptance
CHAPTER 5. Number Theory. 1. Integers and Division. Discussion
CHAPTER 5 Number Theory 1. Integers and Division 1.1. Divisibility. Definition 1.1.1. Given two integers a and b we say a divides b if there is an integer c such that b = ac. If a divides b, we write a
1 Solving LPs: The Simplex Algorithm of George Dantzig
Solving LPs: The Simplex Algorithm of George Dantzig. Simplex Pivoting: Dictionary Format We illustrate a general solution procedure, called the simplex algorithm, by implementing it on a very simple example.
Section 4.2: The Division Algorithm and Greatest Common Divisors
Section 4.2: The Division Algorithm and Greatest Common Divisors The Division Algorithm The Division Algorithm is merely long division restated as an equation. For example, the division 29 r. 20 32 948
Separation Properties for Locally Convex Cones
Journal of Convex Analysis Volume 9 (2002), No. 1, 301 307 Separation Properties for Locally Convex Cones Walter Roth Department of Mathematics, Universiti Brunei Darussalam, Gadong BE1410, Brunei Darussalam
Network (Tree) Topology Inference Based on Prüfer Sequence
Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 [email protected],
CS 598CSC: Combinatorial Optimization Lecture date: 2/4/2010
CS 598CSC: Combinatorial Optimization Lecture date: /4/010 Instructor: Chandra Chekuri Scribe: David Morrison Gomory-Hu Trees (The work in this section closely follows [3]) Let G = (V, E) be an undirected
A Note on Maximum Independent Sets in Rectangle Intersection Graphs
A Note on Maximum Independent Sets in Rectangle Intersection Graphs Timothy M. Chan School of Computer Science University of Waterloo Waterloo, Ontario N2L 3G1, Canada [email protected] September 12,
Quotient Rings and Field Extensions
Chapter 5 Quotient Rings and Field Extensions In this chapter we describe a method for producing field extension of a given field. If F is a field, then a field extension is a field K that contains F.
NP-Completeness and Cook s Theorem
NP-Completeness and Cook s Theorem Lecture notes for COM3412 Logic and Computation 15th January 2002 1 NP decision problems The decision problem D L for a formal language L Σ is the computational task:
Degrees that are not degrees of categoricity
Degrees that are not degrees of categoricity Bernard A. Anderson Department of Mathematics and Physical Sciences Gordon State College [email protected] www.gordonstate.edu/faculty/banderson Barbara
PRIME FACTORS OF CONSECUTIVE INTEGERS
PRIME FACTORS OF CONSECUTIVE INTEGERS MARK BAUER AND MICHAEL A. BENNETT Abstract. This note contains a new algorithm for computing a function f(k) introduced by Erdős to measure the minimal gap size in
Stochastic Inventory Control
Chapter 3 Stochastic Inventory Control 1 In this chapter, we consider in much greater details certain dynamic inventory control problems of the type already encountered in section 1.3. In addition to the
CS103B Handout 17 Winter 2007 February 26, 2007 Languages and Regular Expressions
CS103B Handout 17 Winter 2007 February 26, 2007 Languages and Regular Expressions Theory of Formal Languages In the English language, we distinguish between three different identities: letter, word, sentence.
Elementary Number Theory and Methods of Proof. CSE 215, Foundations of Computer Science Stony Brook University http://www.cs.stonybrook.
Elementary Number Theory and Methods of Proof CSE 215, Foundations of Computer Science Stony Brook University http://www.cs.stonybrook.edu/~cse215 1 Number theory Properties: 2 Properties of integers (whole
Compiler Construction
Compiler Construction Regular expressions Scanning Görel Hedin Reviderad 2013 01 23.a 2013 Compiler Construction 2013 F02-1 Compiler overview source code lexical analysis tokens intermediate code generation
CSE 135: Introduction to Theory of Computation Decidability and Recognizability
CSE 135: Introduction to Theory of Computation Decidability and Recognizability Sungjin Im University of California, Merced 04-28, 30-2014 High-Level Descriptions of Computation Instead of giving a Turing
Monitoring Metric First-order Temporal Properties
Monitoring Metric First-order Temporal Properties DAVID BASIN, FELIX KLAEDTKE, SAMUEL MÜLLER, and EUGEN ZĂLINESCU, ETH Zurich Runtime monitoring is a general approach to verifying system properties at
Undergraduate Notes in Mathematics. Arkansas Tech University Department of Mathematics
Undergraduate Notes in Mathematics Arkansas Tech University Department of Mathematics An Introductory Single Variable Real Analysis: A Learning Approach through Problem Solving Marcel B. Finan c All Rights
Metric Spaces Joseph Muscat 2003 (Last revised May 2009)
1 Distance J Muscat 1 Metric Spaces Joseph Muscat 2003 (Last revised May 2009) (A revised and expanded version of these notes are now published by Springer.) 1 Distance A metric space can be thought of
Implementation of Recursively Enumerable Languages using Universal Turing Machine in JFLAP
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 1 (2014), pp. 79-84 International Research Publications House http://www. irphouse.com /ijict.htm Implementation
Systems of Linear Equations
Systems of Linear Equations Beifang Chen Systems of linear equations Linear systems A linear equation in variables x, x,, x n is an equation of the form a x + a x + + a n x n = b, where a, a,, a n and
