Regular Expressions and Automata using Haskell
|
|
|
- Doris Green
- 9 years ago
- Views:
Transcription
1 Regular Expressions and Automata using Haskell Simon Thompson Computing Laboratory University of Kent at Canterbury January 2000 Contents 1 Introduction 2 2 Regular Expressions 2 3 Matching regular expressions 4 4 Sets 6 5 Non-deterministic Finite Automata 12 6 Simulating an NFA 14 7 Implementing an example 17 8 Building NFAs from regular expressions 18 9 Deterministic machines Transforming NFAs to DFAs Minimising a DFA Regular definitions 27 1
2 1 Introduction In these notes Haskell is used as a vehicle to introduce regular expressions, pattern matching, and their implementations by means of non-deterministic and deterministic automata. As part of the material, we give an implementation of the ideas, contained in a set of files. References to this material are scattered through the text. The files can be obtained by following the instructions in This material is based on the treatment of the subject in [Aho et. al.], but provides full implementations rather than their pseudo-code versions of the algorithms. The material gives an illustration of many of the features of Haskell, including polymorphism (the states of an NFA can be represented by objects of any type); type classes (in practice the states need to have equality and an ordering defined on them); modularisation (the system is split across a number of modules); higher-order functions (used in finding limits of processes, for example) and other features. A tutorial introduction to Haskell can be found in [Thompson]. The paper begins with definitions of regular expressions, and how strings are matched to them; this also gives our first Haskell treatment also. After describing the abstract data type of sets we define non-deterministic finite automata, and their implementation in Haskell. We then show how to build an NFA corresponding to each regular expression, and how such a machine can be optimised, first by transforming it into a deterministic machine, and then by minimising the state space of the DFA. We conclude with a discussion of regular definitions, and show how recognisers for strings matching regular definitions can be built. 2 Regular Expressions Regular expressions are patterns which can be used to describe sets of strings of characters of various kinds, such as the identifiers of a programming language strings of alphanumeric characters which begin with an alphabetic character; the numbers integer or real given in a programming language; and so on. There are five sorts of pattern, or regular expression: 2
3 This is the Greek character epsilon, which matches the empty string. is any character. This matches the character itself. and are regular expressions. and are regular expressions. is a regular expression. Examples of regular expressions include, and. In order to give a more readable version of these, it is assumed that binds more tightly than juxtaposition (i.e. ), and that juxtaposition binds more tightly than. This means that will mean, not, and that will mean, not. A Haskell algebraic type representing regular expressions is given by The statement at the end of the definition ensures that the type is made to belong to the type class ; in other words the equality function is defined over. This definition and those which follow can be found in the file ; this file contains the module, which will be included in other modules in the system. The Haskell representations of and are respectively. In order to shorten these definitions we will usually define constant literals such as so that the expressions above become If we use the infix forms of and, and, they read 3
4 Functions over the type of regular expressions are defined by recursion over the structure of the expression. Examples include which prints a list of the literals appearing in a regular expression, and which gives a printable form of a regular expression. Note that is used to represent epsilon in ASCII. The type can be made to belong to the class thus: or indeed an instance could be derived automatically (like Exercises earlier). 1. Write a more readable form of the expression. 2. What is the unabbreviated form of? 3 Matching regular expressions Regular expressions are patterns. We should ask which strings match each regular expression. 4
5 The empty string matches epsilon. The character matches the pattern, for any character. The string will match if matches either or (or both). The string will match if can be split into two substrings and,, so that matches and matches. The string will match if can be split into zero or more substrings,, each of which matches. The zero case implies that the empty string will match for any regular expression. This can be implemented in Haskell, in the module are a simple transliteration of the definitions above.. The first three cases In the case of juxtaposition, we need an auxiliary function which gives the list containing all the possible ways of splitting up a list. For example, is. A string will match if at least one of the splits gives strings which match and. The final case is that of. We can explain as either or as followed by. We can use this to implement the check for the match, but it is problematic 5
6 when can be matched by. When this happens, the match is tested recursively on the same string, giving an infinite loop. This is avoided by disallowing an epsilon match on the first match on has to be non-trivial. Exercises is defined like but so as to exclude the split. 3. Argue that the string matches and that the string matches. 4. Why does the string not match? 5. Give informal descriptions of the sets of strings matching the following regular expressions. 6. Give regular expressions describing the following sets of strings All strings of s and s containing at most two s. All strings of s and s containing exactly two s. All strings of s and s of length at most three. All strings of s and s which contain no repeated adjacent characters, that is no substring of the form or. 4 Sets A set is a collection of elements of a particular type, which is both like and unlike a list. Lists are familiar from Haskell, and examples include 6
7 Figure 1: The functions in the set abstract data type Each of these lists is different not only do the elements of a list matter, but also the order in which they occur, and their multiplicity (the number of times each element occurs). In many situations, order and multiplicity are irrelevant. If we want to talk about the collection of people coming to our birthday party, we just want the names we cannot invite someone more than once, so multiplicity is not important; the order we might list them in is also of no interest. In other words, all we want to know is the set of people coming. In the example above, this is the set containing, and. Sets can be implemented in a number of ways in Haskell, and the precise form is not important for the user. It is sensible to declare the type as an abstract data type, so that its implementation is hidden from the user. This is done by failing to export the constructor of the type which implements sets. Details of this mechanism are given in Chapter 16 of [Thompson], which also discusses the particular implementation given here in rather more detail. The definition is given in the module which is defined in the file. The heading of the module is illustrated in Figure 1. 7
8 The implementation we have given represents a set as an ordered list of elements without repetitions, wrapped up by the constructor. For instance, the set of birthday party attendees will be given by The implementation of the type is hidden because the constructor for this type is not exported from the module. Since the lists are ordered we expect to have an ordering over the type of set elements; it is this requirement that gives rise to the constraint in many of the set-manipulating functions. The individual functions are described and implemented as follows. The set is the empty list and is the singleton set, consisting of the single element Figure 2 defines the functions which give the union, intersection and difference of two sets. The union consists of the elements occurring in either set (or both), the intersection of those elements in both sets and the difference of those elements in the first but not the second set. (Note also that here is a redefinition of the function with the same name from the.) These definitions each follow the same pattern: a function like implements the operation over lists, and the top-level function lifts this to operate over the lists wrapped by the constructor. The operation tests whether is a member of the set. Note that this is an optimisation of the function over lists; since the list is ordered, we need look no further once we have found an element greater than the one we seek. tests whether is a subset of ; that is whether every element of is an element of. 8
9 Figure 2: Set operations 9
10 tests whether two sets are equal. and an instance declaration for over makes into over. The functions, and behave like, and except that they operate over sets. is a synonym for. The operation turns a list into a set gives a printable version of a set, one item per line, using the function to give a printable version of each element. 10
11 gives the number of elements in a set, turns a set into an ordered list of the elements of the set Obviously this breaks the abstraction barrier, but it is necessary in some situations to do this. The function gives the limit of the sequence that is the first element in the sequence whose successor is equal, as a set, to the element itself. In other words, keep applying until a fixed point or limit is reached. Exercises 7. Define the function which returns the set of all subsets of a set. What context information is required on the type? 8. How would you define the functions which return the union and intersection of a set of sets? What contexts are required on the types? 9. Can infinite sets (of numbers, for instance) be adequately represented by ordered lists? Can you tell if two infinite lists are equal, for instance? 10. The abstract data type can be represented in a number of different ways. Alternatives include: arbitrary lists (rather than ordered lists without repetitions), and boolean valued functions, that is elements of the type. Give implementations of the type using these two representations. 11
12 5 Non-deterministic Finite Automata A Non-deterministic Finite Automaton or NFA is a simple machine which can be used to recognise regular expressions. It consists of four components A finite set of states,. A finite set of moves. A start state (in ). A set of terminal or final states (a subset of ). In the Haskell module this is written This has been represented by an algebraic type rather than a 4-tuple simply for readability. The type of states can be different in different applications, and indeed in the following we use both numbers and sets of numbers as states. A move is between two states, and is either given by a character, or an. The first example of an NFA, called, follows. The states are, with the start state indicated by an incoming arrow, and the final states indicated by shaded circles. In this case there is a single final state,. The moves are indicated by the arrows, marked with characters and in this case. From state there are two possible moves on symbol, to and to remain at. This is one source of the non-determinism in the machine. The Haskell representation of the machine is 12
13 A second example, called, is illustrated below. The Haskell representation of this machine is This machine contains two kinds of non-determinism. The first is at state, from which it is possible to move to either or on reading. The second occurs at state : it is possible to move invisibly from state to state on the epsilon move,. The Haskell code for these machines together with a function to print an nfa whose states are numbered can be found in the module. How do these machines recognise strings? A move can be made from one state to another either if the machine contains or if the next symbol to 13
14 be read is, say, and the machine contains a move. A string will be accepted by a machine if there is a sequence of moves through states of the machine starting at the start state and terminating at one of the terminal states this is called an accepting path. For instance, the path is an accepting path through for the string. This means that the machine accepts this string. Note that other paths through the machine are possible for this string, an example being All that is needed for the machine to accept is one accepting path; it does not affect acceptance if there are other non-accepting (or indeed accepting) paths. More than one accepting path can exist. Machine accepts the string by both and A machine will reject a string only when there is no accepting path. Machine rejects the string, since the two paths through the machine labelled by fail to terminate in a final state: Machine rejects the string since there is no path through the machine labelled by : after reading the machine can be in state, or, from none of these can an move be made. 6 Simulating an NFA As was explained in the last section, a string is accepted by a machine when there is at least one accepting path labelled by through, and is rejected by when no such path exists. The key to implementation is to explore simultaneously all possible paths through the machine labelled by a particular string. Take as an informal example the string and the machine. After reading no input, the machine can only be in state. On reading an there are moves to states and ; however this is not the whole story. From state it is possible to make an -move to state, so after reading the machine can be in any of the states. 14
15 On reading a, we have to look for all the possible moves from each of the states. From we can move to, from to and from to no -moves are possible from the states, and so the states accessible after reading the string are. Is this string to be accepted by? We accept it exactly if the set contains a final state it contains both and, so it is accepted. Note that the states accessible after reading are ; this set contains no final state, and so the machine rejects the string. There is a general pattern to this process, which consists of a repetition of Take a set of states, such as, and find the set of states accessible by a move on a particular symbol, e.g.. In this case it is the set. This is called in the module. Take a set of states, like, and find the set of states accessible from the states by zero or more -moves. In this example, it is the set. This is the -closure of the original set, and is called in. The functions and are composed in the function, and this function is iterated along the string by the function of the module. Implementation in Haskell We discuss the development of the function top-down. Iteration along a string is given by The first argument,, is the step function, taking a set and a character to the states accessible from the set on the character. The second argument,, is the starting state, and the final argument is the string along which to iterate. How does the function operate? If given an empty string, the start state is the result. If given a string, the function is called again, with the tail of the string,, and with a new starting state,, which is the result of applying the step function to the starting set of states and the first character of the string. Now to develop. 15
16 is derived from simply by suppling its machine argument, similarly is derived from the machine, using the functions and. All these functions are defined in the module. We discuss their definitions now. Next, we examine, The essential idea here is to run through the elements of the set and the set of moves, looking for all -moves originating at. For each of these, the result of the move,, goes into the resulting set. The definition uses list comprehensions, so it is necessary first to the sets and into lists, and then to convert the list comprehension into a set by means of. 16
17 The essence of is to take the limit of the function which adds to a set of states all those states which are accessible by a single -move; in the limit we get a set to which no further states can be added by -transitions. Adding the states got by single -moves is accomplished by the function and the auxiliary definition which resembles the construction of. 7 Implementing an example The machine is illustrated by Exercise 11. Give the Haskell definition of the machine. The -closure of the set is the set. Looking at the definition of above, the first application of the function to gives the set ; applying to this gives. Applying to this set gives the same set, hence this is the value of here. The set of states with which we start the simulation is therefore. Suppose the first input is ; applying reveals only one move, from to. Taking the closure of the set gives the set. A move from here is only from to ; closing under -moves gives. An move from here is possible in two ways: from to and from to ; closing up gives. Is the string therefore accepted by? Yes, because is a member of. This sequence can be illustrated thus 17
18 Exercise 12. Show that the string is not accepted by the machine. 8 Building NFAs from regular expressions For each regular expression it is possible to build an NFA which accepts exactly those strings matching the expression. The machines are illustrated in Figure 3. The construction is by induction over the structure of the regular expression: the machines for an character and for are given outright, and for complex expressions, the machines are built from the machines representing the parts. It is straightforward to justify the construction. Any path through must be either a path through or a path through (with at the start and end. Any path through will be a path through followed by a path through. Paths through are of two sorts; the first is simply an, others begin with a path through, and continue with a path through. In other words, paths through go through zero or more times. The machine for the pattern is given by 18
19 Figure 3: Building NFAs for regular expressions 19
20 The Haskell description of the construction is given in BuildNfa. At the top level the function does the recursion. For the base case, The definition of is similar. In the other cases we define in which the functions and so on build the machines from their components as illustrated in Figure 3. We make certain assumptions about the NFAs we build. We take it that the states are numbered from, with the final state having the highest number. Putting the machines together will involve adding various new states and transitions, and renumbering the states and moves in the constituent machines. The definition of is given in Figure 4, and the other functions are defined in a similar way. The function renumbers states and renumbers moves. 9 Deterministic machines A deterministic finite automaton is an NFA which contains no -moves, and has at most one arrow labelled with a particular symbol leaving any given state. The effect of this is to make operation of the machine deterministic at any stage there is at most one possible move to make, and so after reading a sequence of characters, the machine can be in one state at most. 20
21 Figure 4: The definition of the function 21
22 Implementing a machine of this sort is much simpler than for an general NFA: we only have to keep track of a single position. Is there a general mechanism for finding a DFA corresponding to a regular expression? In fact, there is a general technique for transforming an arbitrary NFA into a DFA, and this we examine now. The conversion of an NFA into a DFA is based on the implementation given in Section 6. The main idea there is to keep track of a set of states, representing all the possible positions after reading a certain amount of input. This set itself can be thought of as a state of another machine, which will be deterministic: the moves from one set to another are completely deterministic. We show how the conversion works with the machine. The start state of the machine will be the closure of the set, that is Now, the construction proceeds by finding the sets accessible from by moves on and on all the characters in the alphabet of the machine. These sets are states of the new machine; we then repeat the construction with these new states, until no more states are produced by the construction. From on the symbol we can move to from. Closing under -moves we have the set, which we call In a similar way, from on we have Our new machine so far looks like We now have to see what is accessible from and. First. which is another new state. The process of generating new states must stop, as there is only a finite number of sets of states to choose from. What happens with a move from? 22
23 This gives the partial machine Similarly, which completes the construction of the DFA Which of the new states is final? One of these sets represents an accepting state exactly when it contains a final state of the original machine. For this is, which is contained in the set only. In general there can be more than one accepting state for a machine. (This need not be true for NFAs, since we can always add a new final state to which each of the originals is linked by an -move.) 10 Transforming NFAs to DFAs The Haskell code to covert an NFA to a DFA is found in the module, and the main function is 23
24 A deterministic version of an NFA with numeric states is defined in two stages, using does the conversion to the deterministic automaton with sets of numbers as states, replaces sets of numbers by numbers (rather than capital letters, as was done above). States are replaced by their position in a list of states see the file for more details. The function is a special case of the function The process of adding state sets is repeated until no more sets are added. This is a version of taking a limit, given by the function, which acts as the usual limit function, except that it checks for equality of NFAs as collections of sets. The start machine,, consists of a single state, the -closure of the start state of the original machine. takes a partially built DFA and adds the state sets of accessible by a single move on any of the characters in, the alphabet of. 24
25 This involves iterating over the state sets in the partially built DFA, which is done using. will add to all the moves from state set over the alphabet. In turn, iterates along the alphabet, using. will add to the moves from state set on character. The new state set added by is defined using the function first defined in the simulation of the NFA. 25
26 11 Minimising a DFA In building a DFA, we have produced a machine which cam be implemented more efficiently. We might, however, have more states in the DFA than necessary. This section shows how we can optimise a DFA so that it contains the minimum number of states to perform its function of recognising the strings matching a particular regular expression. Two states and in a DFA are distinguishable if we can find a string which reaches an accepting state from but not from (or vice versa). Otherwise, they can be treated as the same, because no string makes them behave differently putting it a different way, no experiment makes the two different. How can we tell when two states are different? We start by dividing the states into two partitions: one contains the accepting states, and the other the remainder, or non-accepting states. For our example, we get the partition Now, for each set in the partition, we check whether the elements in the set can be further divided. We look at how each of the states in the set behaves relative to the previous partition. In pictures, This means that we can re-partition thus: We now repeat the process, and examine the only set which might be further subdivided, giving 26
27 This shows that we don t have to re-partition any further, and so that we can stop now, and collapse the two states and into one, thus: The Haskell implementation of this process is in the module. Exercises 13. For the regular expression, find the corresponding NFA. 14. For the NFA of question 1, find the corresponding (non-optimised) DFA. 15. For the DFA of question 2, find the optimised DFA. 12 Regular definitions A regular definition consists of a number of named regular expressions. We are allowed to use the defined names on the right-hand sides of definitions after the definition of the name. For example, 27
28 Because of the stipulation that a definition precedes the use of a name, we can expand each right-hand side to a regular expression involving no names. We can build machines to recognise strings from a number of regular expressions. Suppose we have the patterns We can build the three NFAs thus: and then they can be joined into a single machine, thus In using the machine we look for the longest match against any of the patterns: 28
29 In the example, the segment of matches the pattern. Exercises 16. Fully expand the names and given above. 17. Build a Haskell program to recognise strings according to a set of regular definitions, as outlined in this section. Bibliography [Aho et. al.] Aho, A.V., Sethi, R. and Ullman, J.D., Compilers: Principles, Techniques and Tools, Addison-Wesley, Reading, MA, USA, [Thompson] Thompson, S., Haskell: The Craft of Functional Programming, second edition, Addison-Wesley,
Formal Languages and Automata Theory - Regular Expressions and Finite Automata -
Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Samarjit Chakraborty Computer Engineering and Networks Laboratory Swiss Federal Institute of Technology (ETH) Zürich March
6.045: Automata, Computability, and Complexity Or, Great Ideas in Theoretical Computer Science Spring, 2010. Class 4 Nancy Lynch
6.045: Automata, Computability, and Complexity Or, Great Ideas in Theoretical Computer Science Spring, 2010 Class 4 Nancy Lynch Today Two more models of computation: Nondeterministic Finite Automata (NFAs)
Reading 13 : Finite State Automata and Regular Expressions
CS/Math 24: Introduction to Discrete Mathematics Fall 25 Reading 3 : Finite State Automata and Regular Expressions Instructors: Beck Hasti, Gautam Prakriya In this reading we study a mathematical model
Automata and Computability. Solutions to Exercises
Automata and Computability Solutions to Exercises Fall 25 Alexis Maciel Department of Computer Science Clarkson University Copyright c 25 Alexis Maciel ii Contents Preface vii Introduction 2 Finite Automata
6.080/6.089 GITCS Feb 12, 2008. Lecture 3
6.8/6.89 GITCS Feb 2, 28 Lecturer: Scott Aaronson Lecture 3 Scribe: Adam Rogal Administrivia. Scribe notes The purpose of scribe notes is to transcribe our lectures. Although I have formal notes of my
Finite Automata and Regular Languages
CHAPTER 3 Finite Automata and Regular Languages 3. Introduction 3.. States and Automata A finite-state machine or finite automaton (the noun comes from the Greek; the singular is automaton, the Greek-derived
CSC4510 AUTOMATA 2.1 Finite Automata: Examples and D efinitions Definitions
CSC45 AUTOMATA 2. Finite Automata: Examples and Definitions Finite Automata: Examples and Definitions A finite automaton is a simple type of computer. Itsoutputislimitedto yes to or no. It has very primitive
The Halting Problem is Undecidable
185 Corollary G = { M, w w L(M) } is not Turing-recognizable. Proof. = ERR, where ERR is the easy to decide language: ERR = { x { 0, 1 }* x does not have a prefix that is a valid code for a Turing machine
Pushdown Automata. place the input head on the leftmost input symbol. while symbol read = b and pile contains discs advance head remove disc from pile
Pushdown Automata In the last section we found that restricting the computational power of computing devices produced solvable decision problems for the class of sets accepted by finite automata. But along
Finite Automata. Reading: Chapter 2
Finite Automata Reading: Chapter 2 1 Finite Automaton (FA) Informally, a state diagram that comprehensively captures all possible states and transitions that a machine can take while responding to a stream
Regular Languages and Finite Automata
Regular Languages and Finite Automata 1 Introduction Hing Leung Department of Computer Science New Mexico State University Sep 16, 2010 In 1943, McCulloch and Pitts [4] published a pioneering work on a
Automata and Formal Languages
Automata and Formal Languages Winter 2009-2010 Yacov Hel-Or 1 What this course is all about This course is about mathematical models of computation We ll study different machine models (finite automata,
Regular Languages and Finite State Machines
Regular Languages and Finite State Machines Plan for the Day: Mathematical preliminaries - some review One application formal definition of finite automata Examples 1 Sets A set is an unordered collection
CSE 135: Introduction to Theory of Computation Decidability and Recognizability
CSE 135: Introduction to Theory of Computation Decidability and Recognizability Sungjin Im University of California, Merced 04-28, 30-2014 High-Level Descriptions of Computation Instead of giving a Turing
(IALC, Chapters 8 and 9) Introduction to Turing s life, Turing machines, universal machines, unsolvable problems.
3130CIT: Theory of Computation Turing machines and undecidability (IALC, Chapters 8 and 9) Introduction to Turing s life, Turing machines, universal machines, unsolvable problems. An undecidable problem
Testing LTL Formula Translation into Büchi Automata
Testing LTL Formula Translation into Büchi Automata Heikki Tauriainen and Keijo Heljanko Helsinki University of Technology, Laboratory for Theoretical Computer Science, P. O. Box 5400, FIN-02015 HUT, Finland
Turing Machines: An Introduction
CIT 596 Theory of Computation 1 We have seen several abstract models of computing devices: Deterministic Finite Automata, Nondeterministic Finite Automata, Nondeterministic Finite Automata with ɛ-transitions,
C H A P T E R Regular Expressions regular expression
7 CHAPTER Regular Expressions Most programmers and other power-users of computer systems have used tools that match text patterns. You may have used a Web search engine with a pattern like travel cancun
Finite Automata. Reading: Chapter 2
Finite Automata Reading: Chapter 2 1 Finite Automata Informally, a state machine that comprehensively captures all possible states and transitions that a machine can take while responding to a stream (or
Compiler Construction
Compiler Construction Regular expressions Scanning Görel Hedin Reviderad 2013 01 23.a 2013 Compiler Construction 2013 F02-1 Compiler overview source code lexical analysis tokens intermediate code generation
Regular Languages and Finite Automata
Regular Languages and Finite Automata A C Norman, Lent Term 1996 Part IA 1 Introduction This course is short, but it is present in Part 1A because of the way it introduces links between many different
How To Understand The Theory Of Computer Science
Theory of Computation Lecture Notes Abhijat Vichare August 2005 Contents 1 Introduction 2 What is Computation? 3 The λ Calculus 3.1 Conversions: 3.2 The calculus in use 3.3 Few Important Theorems 3.4 Worked
3515ICT Theory of Computation Turing Machines
Griffith University 3515ICT Theory of Computation Turing Machines (Based loosely on slides by Harald Søndergaard of The University of Melbourne) 9-0 Overview Turing machines: a general model of computation
Implementation of Recursively Enumerable Languages using Universal Turing Machine in JFLAP
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 4, Number 1 (2014), pp. 79-84 International Research Publications House http://www. irphouse.com /ijict.htm Implementation
Chapter 3. Cartesian Products and Relations. 3.1 Cartesian Products
Chapter 3 Cartesian Products and Relations The material in this chapter is the first real encounter with abstraction. Relations are very general thing they are a special type of subset. After introducing
Lecture 17 : Equivalence and Order Relations DRAFT
CS/Math 240: Introduction to Discrete Mathematics 3/31/2011 Lecture 17 : Equivalence and Order Relations Instructor: Dieter van Melkebeek Scribe: Dalibor Zelený DRAFT Last lecture we introduced the notion
Notes on Complexity Theory Last updated: August, 2011. Lecture 1
Notes on Complexity Theory Last updated: August, 2011 Jonathan Katz Lecture 1 1 Turing Machines I assume that most students have encountered Turing machines before. (Students who have not may want to look
Pushdown automata. Informatics 2A: Lecture 9. Alex Simpson. 3 October, 2014. School of Informatics University of Edinburgh [email protected].
Pushdown automata Informatics 2A: Lecture 9 Alex Simpson School of Informatics University of Edinburgh [email protected] 3 October, 2014 1 / 17 Recap of lecture 8 Context-free languages are defined by context-free
8 Divisibility and prime numbers
8 Divisibility and prime numbers 8.1 Divisibility In this short section we extend the concept of a multiple from the natural numbers to the integers. We also summarize several other terms that express
NFAs with Tagged Transitions, their Conversion to Deterministic Automata and Application to Regular Expressions
NFAs with Tagged Transitions, their Conversion to Deterministic Automata and Application to Regular Expressions Ville Laurikari Helsinki University of Technology Laboratory of Computer Science PL 9700,
1 Definition of a Turing machine
Introduction to Algorithms Notes on Turing Machines CS 4820, Spring 2012 April 2-16, 2012 1 Definition of a Turing machine Turing machines are an abstract model of computation. They provide a precise,
CS154. Turing Machines. Turing Machine. Turing Machines versus DFAs FINITE STATE CONTROL AI N P U T INFINITE TAPE. read write move.
CS54 Turing Machines Turing Machine q 0 AI N P U T IN TAPE read write move read write move Language = {0} q This Turing machine recognizes the language {0} Turing Machines versus DFAs TM can both write
Automata on Infinite Words and Trees
Automata on Infinite Words and Trees Course notes for the course Automata on Infinite Words and Trees given by Dr. Meghyn Bienvenu at Universität Bremen in the 2009-2010 winter semester Last modified:
Efficient Data Structures for Decision Diagrams
Artificial Intelligence Laboratory Efficient Data Structures for Decision Diagrams Master Thesis Nacereddine Ouaret Professor: Supervisors: Boi Faltings Thomas Léauté Radoslaw Szymanek Contents Introduction...
CS 3719 (Theory of Computation and Algorithms) Lecture 4
CS 3719 (Theory of Computation and Algorithms) Lecture 4 Antonina Kolokolova January 18, 2012 1 Undecidable languages 1.1 Church-Turing thesis Let s recap how it all started. In 1990, Hilbert stated a
T-79.186 Reactive Systems: Introduction and Finite State Automata
T-79.186 Reactive Systems: Introduction and Finite State Automata Timo Latvala 14.1.2004 Reactive Systems: Introduction and Finite State Automata 1-1 Reactive Systems Reactive systems are a class of software
Scanner. tokens scanner parser IR. source code. errors
Scanner source code tokens scanner parser IR errors maps characters into tokens the basic unit of syntax x = x + y; becomes = + ; character string value for a token is a lexeme
CS5236 Advanced Automata Theory
CS5236 Advanced Automata Theory Frank Stephan Semester I, Academic Year 2012-2013 Advanced Automata Theory is a lecture which will first review the basics of formal languages and automata theory and then
The Graphical Method: An Example
The Graphical Method: An Example Consider the following linear program: Maximize 4x 1 +3x 2 Subject to: 2x 1 +3x 2 6 (1) 3x 1 +2x 2 3 (2) 2x 2 5 (3) 2x 1 +x 2 4 (4) x 1, x 2 0, where, for ease of reference,
Deterministic Finite Automata
1 Deterministic Finite Automata Definition: A deterministic finite automaton (DFA) consists of 1. a finite set of states (often denoted Q) 2. a finite set Σ of symbols (alphabet) 3. a transition function
NP-Completeness and Cook s Theorem
NP-Completeness and Cook s Theorem Lecture notes for COM3412 Logic and Computation 15th January 2002 1 NP decision problems The decision problem D L for a formal language L Σ is the computational task:
Special Situations in the Simplex Algorithm
Special Situations in the Simplex Algorithm Degeneracy Consider the linear program: Maximize 2x 1 +x 2 Subject to: 4x 1 +3x 2 12 (1) 4x 1 +x 2 8 (2) 4x 1 +2x 2 8 (3) x 1, x 2 0. We will first apply the
3. Mathematical Induction
3. MATHEMATICAL INDUCTION 83 3. Mathematical Induction 3.1. First Principle of Mathematical Induction. Let P (n) be a predicate with domain of discourse (over) the natural numbers N = {0, 1,,...}. If (1)
Automata Theory. Şubat 2006 Tuğrul Yılmaz Ankara Üniversitesi
Automata Theory Automata theory is the study of abstract computing devices. A. M. Turing studied an abstract machine that had all the capabilities of today s computers. Turing s goal was to describe the
Lecture 1. Basic Concepts of Set Theory, Functions and Relations
September 7, 2005 p. 1 Lecture 1. Basic Concepts of Set Theory, Functions and Relations 0. Preliminaries...1 1. Basic Concepts of Set Theory...1 1.1. Sets and elements...1 1.2. Specification of sets...2
1 if 1 x 0 1 if 0 x 1
Chapter 3 Continuity In this chapter we begin by defining the fundamental notion of continuity for real valued functions of a single real variable. When trying to decide whether a given function is or
CAs and Turing Machines. The Basis for Universal Computation
CAs and Turing Machines The Basis for Universal Computation What We Mean By Universal When we claim universal computation we mean that the CA is capable of calculating anything that could possibly be calculated*.
Web Data Extraction: 1 o Semestre 2007/2008
Web Data : Given Slides baseados nos slides oficiais do livro Web Data Mining c Bing Liu, Springer, December, 2006. Departamento de Engenharia Informática Instituto Superior Técnico 1 o Semestre 2007/2008
Lexical analysis FORMAL LANGUAGES AND COMPILERS. Floriano Scioscia. Formal Languages and Compilers A.Y. 2015/2016
Master s Degree Course in Computer Engineering Formal Languages FORMAL LANGUAGES AND COMPILERS Lexical analysis Floriano Scioscia 1 Introductive terminological distinction Lexical string or lexeme = meaningful
Sudoku puzzles and how to solve them
Sudoku puzzles and how to solve them Andries E. Brouwer 2006-05-31 1 Sudoku Figure 1: Two puzzles the second one is difficult A Sudoku puzzle (of classical type ) consists of a 9-by-9 matrix partitioned
LEARNING OBJECTIVES FOR THIS CHAPTER
CHAPTER 2 American mathematician Paul Halmos (1916 2006), who in 1942 published the first modern linear algebra book. The title of Halmos s book was the same as the title of this chapter. Finite-Dimensional
Cardinality. The set of all finite strings over the alphabet of lowercase letters is countable. The set of real numbers R is an uncountable set.
Section 2.5 Cardinality (another) Definition: The cardinality of a set A is equal to the cardinality of a set B, denoted A = B, if and only if there is a bijection from A to B. If there is an injection
COMP 250 Fall 2012 lecture 2 binary representations Sept. 11, 2012
Binary numbers The reason humans represent numbers using decimal (the ten digits from 0,1,... 9) is that we have ten fingers. There is no other reason than that. There is nothing special otherwise about
Regular Expressions with Nested Levels of Back Referencing Form a Hierarchy
Regular Expressions with Nested Levels of Back Referencing Form a Hierarchy Kim S. Larsen Odense University Abstract For many years, regular expressions with back referencing have been used in a variety
The Clean programming language. Group 25, Jingui Li, Daren Tuzi
The Clean programming language Group 25, Jingui Li, Daren Tuzi The Clean programming language Overview The Clean programming language first appeared in 1987 and is still being further developed. It was
A Little Set Theory (Never Hurt Anybody)
A Little Set Theory (Never Hurt Anybody) Matthew Saltzman Department of Mathematical Sciences Clemson University Draft: August 21, 2013 1 Introduction The fundamental ideas of set theory and the algebra
8.2. Solution by Inverse Matrix Method. Introduction. Prerequisites. Learning Outcomes
Solution by Inverse Matrix Method 8.2 Introduction The power of matrix algebra is seen in the representation of a system of simultaneous linear equations as a matrix equation. Matrix algebra allows us
FINITE STATE AND TURING MACHINES
FINITE STATE AND TURING MACHINES FSM With Output Without Output (also called Finite State Automata) Mealy Machine Moore Machine FINITE STATE MACHINES... 2 INTRODUCTION TO FSM S... 2 STATE TRANSITION DIAGRAMS
Chapter One Introduction to Programming
Chapter One Introduction to Programming 1-1 Algorithm and Flowchart Algorithm is a step-by-step procedure for calculation. More precisely, algorithm is an effective method expressed as a finite list of
Linear Programming. Solving LP Models Using MS Excel, 18
SUPPLEMENT TO CHAPTER SIX Linear Programming SUPPLEMENT OUTLINE Introduction, 2 Linear Programming Models, 2 Model Formulation, 4 Graphical Linear Programming, 5 Outline of Graphical Procedure, 5 Plotting
Continued Fractions and the Euclidean Algorithm
Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction
Mathematics for Computer Science/Software Engineering. Notes for the course MSM1F3 Dr. R. A. Wilson
Mathematics for Computer Science/Software Engineering Notes for the course MSM1F3 Dr. R. A. Wilson October 1996 Chapter 1 Logic Lecture no. 1. We introduce the concept of a proposition, which is a statement
Playing with Numbers
PLAYING WITH NUMBERS 249 Playing with Numbers CHAPTER 16 16.1 Introduction You have studied various types of numbers such as natural numbers, whole numbers, integers and rational numbers. You have also
How To Compare A Markov Algorithm To A Turing Machine
Markov Algorithm CHEN Yuanmi December 18, 2007 1 Abstract Markov Algorithm can be understood as a priority string rewriting system. In this short paper we give the definition of Markov algorithm and also
6.080 / 6.089 Great Ideas in Theoretical Computer Science Spring 2008
MIT OpenCourseWare http://ocw.mit.edu 6.080 / 6.089 Great Ideas in Theoretical Computer Science Spring 2008 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.
COMPUTER SCIENCE TRIPOS
CST.98.5.1 COMPUTER SCIENCE TRIPOS Part IB Wednesday 3 June 1998 1.30 to 4.30 Paper 5 Answer five questions. No more than two questions from any one section are to be answered. Submit the answers in five
1. Give the 16 bit signed (twos complement) representation of the following decimal numbers, and convert to hexadecimal:
Exercises 1 - number representations Questions 1. Give the 16 bit signed (twos complement) representation of the following decimal numbers, and convert to hexadecimal: (a) 3012 (b) - 435 2. For each of
Converting Finite Automata to Regular Expressions
Converting Finite Automata to Regular Expressions Alexander Meduna, Lukáš Vrábel, and Petr Zemek Brno University of Technology, Faculty of Information Technology Božetěchova 1/2, 612 00 Brno, CZ http://www.fit.vutbr.cz/
CS 103X: Discrete Structures Homework Assignment 3 Solutions
CS 103X: Discrete Structures Homework Assignment 3 s Exercise 1 (20 points). On well-ordering and induction: (a) Prove the induction principle from the well-ordering principle. (b) Prove the well-ordering
CS143 Handout 08 Summer 2008 July 02, 2007 Bottom-Up Parsing
CS143 Handout 08 Summer 2008 July 02, 2007 Bottom-Up Parsing Handout written by Maggie Johnson and revised by Julie Zelenski. Bottom-up parsing As the name suggests, bottom-up parsing works in the opposite
Sample Induction Proofs
Math 3 Worksheet: Induction Proofs III, Sample Proofs A.J. Hildebrand Sample Induction Proofs Below are model solutions to some of the practice problems on the induction worksheets. The solutions given
INCIDENCE-BETWEENNESS GEOMETRY
INCIDENCE-BETWEENNESS GEOMETRY MATH 410, CSUSM. SPRING 2008. PROFESSOR AITKEN This document covers the geometry that can be developed with just the axioms related to incidence and betweenness. The full
THE DIMENSION OF A VECTOR SPACE
THE DIMENSION OF A VECTOR SPACE KEITH CONRAD This handout is a supplementary discussion leading up to the definition of dimension and some of its basic properties. Let V be a vector space over a field
CS103B Handout 17 Winter 2007 February 26, 2007 Languages and Regular Expressions
CS103B Handout 17 Winter 2007 February 26, 2007 Languages and Regular Expressions Theory of Formal Languages In the English language, we distinguish between three different identities: letter, word, sentence.
Omega Automata: Minimization and Learning 1
Omega Automata: Minimization and Learning 1 Oded Maler CNRS - VERIMAG Grenoble, France 2007 1 Joint work with A. Pnueli, late 80s Summary Machine learning in general and of formal languages in particular
Introduction to Theory of Computation
Introduction to Theory of Computation Prof. (Dr.) K.R. Chowdhary Email: [email protected] Formerly at department of Computer Science and Engineering MBM Engineering College, Jodhpur Tuesday 28 th
Introduction to Turing Machines
Automata Theory, Languages and Computation - Mírian Halfeld-Ferrari p. 1/2 Introduction to Turing Machines SITE : http://www.sir.blois.univ-tours.fr/ mirian/ Automata Theory, Languages and Computation
Informatique Fondamentale IMA S8
Informatique Fondamentale IMA S8 Cours 1 - Intro + schedule + finite state machines Laure Gonnord http://laure.gonnord.org/pro/teaching/ [email protected] Université Lille 1 - Polytech Lille
Mathematical Induction
Mathematical Induction In logic, we often want to prove that every member of an infinite set has some feature. E.g., we would like to show: N 1 : is a number 1 : has the feature Φ ( x)(n 1 x! 1 x) How
Lab 4.4 Secret Messages: Indexing, Arrays, and Iteration
Lab 4.4 Secret Messages: Indexing, Arrays, and Iteration This JavaScript lab (the last of the series) focuses on indexing, arrays, and iteration, but it also provides another context for practicing with
Cartesian Products and Relations
Cartesian Products and Relations Definition (Cartesian product) If A and B are sets, the Cartesian product of A and B is the set A B = {(a, b) :(a A) and (b B)}. The following points are worth special
Genetic programming with regular expressions
Genetic programming with regular expressions Børge Svingen Chief Technology Officer, Open AdExchange [email protected] 2009-03-23 Pattern discovery Pattern discovery: Recognizing patterns that characterize
Basic Proof Techniques
Basic Proof Techniques David Ferry [email protected] September 13, 010 1 Four Fundamental Proof Techniques When one wishes to prove the statement P Q there are four fundamental approaches. This document
Computability Theory
CSC 438F/2404F Notes (S. Cook and T. Pitassi) Fall, 2014 Computability Theory This section is partly inspired by the material in A Course in Mathematical Logic by Bell and Machover, Chap 6, sections 1-10.
Philadelphia University Faculty of Information Technology Department of Computer Science First Semester, 2007/2008.
Philadelphia University Faculty of Information Technology Department of Computer Science First Semester, 2007/2008 Course Syllabus Course Title: Theory of Computation Course Level: 3 Lecture Time: Course
a 11 x 1 + a 12 x 2 + + a 1n x n = b 1 a 21 x 1 + a 22 x 2 + + a 2n x n = b 2.
Chapter 1 LINEAR EQUATIONS 1.1 Introduction to linear equations A linear equation in n unknowns x 1, x,, x n is an equation of the form a 1 x 1 + a x + + a n x n = b, where a 1, a,..., a n, b are given
Glossary of Object Oriented Terms
Appendix E Glossary of Object Oriented Terms abstract class: A class primarily intended to define an instance, but can not be instantiated without additional methods. abstract data type: An abstraction
Base Conversion written by Cathy Saxton
Base Conversion written by Cathy Saxton 1. Base 10 In base 10, the digits, from right to left, specify the 1 s, 10 s, 100 s, 1000 s, etc. These are powers of 10 (10 x ): 10 0 = 1, 10 1 = 10, 10 2 = 100,
MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.
MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column
24 Uses of Turing Machines
Formal Language and Automata Theory: CS2004 24 Uses of Turing Machines 24 Introduction We have previously covered the application of Turing Machine as a recognizer and decider In this lecture we will discuss
Relational Databases
Relational Databases Jan Chomicki University at Buffalo Jan Chomicki () Relational databases 1 / 18 Relational data model Domain domain: predefined set of atomic values: integers, strings,... every attribute
Finite Automata and Formal Languages
Finite Automata and Formal Languages TMV026/DIT321 LP4 2011 Ana Bove Lecture 1 March 21st 2011 Course Organisation Overview of the Course Overview of today s lecture: Course Organisation Level: This course
WRITING PROOFS. Christopher Heil Georgia Institute of Technology
WRITING PROOFS Christopher Heil Georgia Institute of Technology A theorem is just a statement of fact A proof of the theorem is a logical explanation of why the theorem is true Many theorems have this
It is the thinnest layer in the OSI model. At the time the model was formulated, it was not clear that a session layer was needed.
Session Layer The session layer resides above the transport layer, and provides value added services to the underlying transport layer services. The session layer (along with the presentation layer) add
Chapter 2: Algorithm Discovery and Design. Invitation to Computer Science, C++ Version, Third Edition
Chapter 2: Algorithm Discovery and Design Invitation to Computer Science, C++ Version, Third Edition Objectives In this chapter, you will learn about: Representing algorithms Examples of algorithmic problem
[Refer Slide Time: 05:10]
Principles of Programming Languages Prof: S. Arun Kumar Department of Computer Science and Engineering Indian Institute of Technology Delhi Lecture no 7 Lecture Title: Syntactic Classes Welcome to lecture
Overview. Essential Questions. Precalculus, Quarter 4, Unit 4.5 Build Arithmetic and Geometric Sequences and Series
Sequences and Series Overview Number of instruction days: 4 6 (1 day = 53 minutes) Content to Be Learned Write arithmetic and geometric sequences both recursively and with an explicit formula, use them
