Termination of Linear Programs
|
|
- Ross Carroll
- 7 years ago
- Views:
Transcription
1 Termnaton of Lnear Programs Ashsh Twar SRI Internatonal, 333 Ravenswood Ave, Menlo Park, CA, U.S.A Abstract. We show that termnaton of a class of lnear loop programs s decdable. Lnear loop programs are dscrete-tme lnear systems wth a loop condton governng termnaton, that s, a whle loop wth lnear assgnments. We relate the termnaton of such a smple loop, on all ntal values, to the egenvectors correspondng to only the postve real egenvalues of the matrx defnng the loop assgnments. Ths characterzaton of termnaton s remnscent of the famous stablty theorems n control theory that characterze stablty n terms of egenvalues. 1 Introducton Dynamcal systems have been studed by both computer scentsts and control theorsts, but both the models and the propertes studed have been dfferent. However there s one class of models, called dscrete-tme lnear systems n the control world, where there s a consderable overlap. In computer scence, these are uncondtonal whle loops wth lnear assgnments to a set of nteger or ratonal varables; for example, whle (true) { x := x y; y := y }. The two communtes are nterested n dfferent questons: stablty and controllablty ssues n control theory aganst reachablty, nvarants, and termnaton ssues n computer scence. In recent years, computer scentsts have begun to apply the rch mathematcal knowledge that has been developed n systems theory for analyzng such systems for safety propertes, see for nstance [17, 12, 11]. One of the most basc results n the theory of lnear systems, both dscretetme and contnuous-tme, s the characterzaton of the stablty of lnear systems n terms of the egenvalues of the correspondng matrx. In ths paper, we are nterested n termnaton of smple whle loop programs, such as the one descrbed above, but wth nontrval loop guards. We present results that relate the termnaton of such lnear programs to egenvalues of the correspondng matrx, analogous to the stablty characterzaton n control theory. Our characterzaton also yelds decdablty of the termnaton problem for such programs. Although Research supported n part by the Natonal Scence Foundaton under grant CCR and CCR
2 lnear programs are smlar to dscrete-tme lnear systems, the termnaton characterzaton of lnear programs s more complex than, though remnscent of, the stablty characterzaton for both contnuous- and dscrete-tme lnear systems. Lnear loop programs, as studed n ths paper, are specalzed pecewse affne systems, whch themselves are specal knds of nonlnear systems. Whle several propertes, such as reachablty, stablty, and controllablty, are decdable for lnear systems [10, 16], they soon become undecdable even when a lttle nonlnearty s ntroduced [16]. In partcular, ths s also true for pecewse affne systems [3, 4], see also Secton 6. In ths context, t s nterestng to note that termnaton s decdable for lnear loop programs. Technques to prove termnaton of programs have attracted renewed attenton lately [7, 5, 6, 13]. The popular approach to prove termnaton s through the synthess of a rankng functon, a mappng from the state space to a well-founded doman, whose value monotoncally decreases as the system moves forward. Ths lne of research has focused mostly on generatng lnear rankng functons some effectve heurstcs have been proposed [5, 6] and recently a complete method was presented n [13] for a model motvated by [14]. Ths paper nvestgates termnaton at a more basc theoretcal level. The man result establshes the decdablty of the termnaton problem for programs of the form (n matrx notaton) whle (Bx > b) { x := Ax + c } where Bx > b represents a conjuncton of lnear nequaltes over the state varables x and x := Ax+c represents the lnear assgnments to each of the varables. The varables are nterpreted over the reals R and hence the state space s R n. Ths class of programs s smpler than the ones consdered n [5, 6, 13]. Although a program may not be presented n ths form, termnaton questons can often be reduced to ths basc form after sutable smplfcatons and transformatons. We approach the termnaton ssue of the above program as follows. We frst consder the homogeneous verson, whle (Bx > 0) { x := Ax }, and note that the condton Bx > 0 defnes a regon smaller than a half space of R n. Now f a state x = c s mapped by A (n one or more teratons) to somethng on the other sde of the half space, then the program wll termnate on ths state (snce the loop condton wll become false). In partcular, ths means that the program always termnates on states specfed by egenvectors c correspondng to negatve real egenvalue and complex egenvalues. The former ones are mapped by A to ther negatve mage, whle the latter ones are rotated gradually untl they reach the other half space (where Bx > 0 s false). Thus, our frst result s that, for purposes of termnaton, the egenspace correspondng to only the postve real egenvalues of A s relevant (Secton 2 and Secton 3). In the case when all egenvalues are postve, the egenvectors correspondng to larger egenvalues domnate the behavor of the program, that s, after suffcently many teratons, the values of the state varables wll be governed almost solely by the nfluence of the largest egenvalue. Based on ths, we can guess a wtness to nontermnaton and test f the guess s correct by checkng satsfabl-
3 ty of a set of constrants (Secton 4). Fnally, we show that the nonhomogeneous case can be reduced to the homogeneous case (Secton 5). 1.1 Notaton We use standard mathematcal notaton for representng vectors and matrces. We follow the conventon that upper case letters I, J,..., denote nteger constants and lower case letters, j,... denote ndces rangng over ntegers. In partcular, a (N 1) column matrx s called a vector, and t s denoted by c, d whenever the components of the vector are known constants; and by x, y whenever the components of the vector are all varables. A (N N)-matrx wth constant entres a j at the (, j)-poston s denoted by A = (a j ). A dagonal matrx A = (a j ) = dag(λ 1,..., λ N ) has a = λ and a j = 0 otherwse. The transpose of a matrx A = (a j ) s a matrx B = (b j ) such that b j = a j, and t s denoted by A T. Note that the transpose of a column vector c s a row vector c T. Usng juxtaposton for matrx multplcaton, we note that c T d denotes the nner product, c d, of the vectors c and d. We wll also denote matrces by specfyng the submatrces nsde t. So, for nstance, dag(j 1,..., J K ) would denote a matrx whch has matrces J 1,..., J K on ts dagonal and 0 elsewhere. If A s a (N N)-matrx and c s a vector such that Ac = λc, then c s called an egenvector of A correspondng to the egenvalue λ. The effect of repeated lnear assgnments (x := Ax) becomes much more explct when we do a change of varables and let the new varables y be the egenvectors of A. In partcular, we get transformed assgnments of the form y := λy. If there are N lnearly ndependent egenvectors, then A s sad to be dagonalzable and the assgnments on the new varables wll be of the form y := dag(λ 1,..., λ N )y. But ths s not possble always. However, nstead of a dagonal matrx, we can always get an almost dagonal, the so-called Jordan form, matrx [9]. 2 The Homogeneous Case The presentaton n ths paper s ncremental gong from syntactcally smple to more complex programs. In ths secton, we consder lnear programs of the followng form: P1: whle (c T x > 0) { x := Ax }. The varables n x are nterpreted over the set R of reals. The assgnment x := Ax s nterpreted as beng done smultaneously and not n any sequental order. A lst of sequental assgnments can be modfed and presented n the form x := Ax, see Example 1. We say that the Program P1 termnates f t termnates on all ntal values n R for the varables n x. Theorem 1. If the lnear loop program P1, defned by an (N N)-matrx A and a nonzero N 1-vector c, s nontermnatng then there exsts a real egenvector v of A, correspondng to postve egenvalue, such that c T v 0.
4 Proof. (Sketch) Suppose the lnear loop program s nontermnatng. Defne the set NT of all ponts on whch the program does not termnate. NT = {x R N : c T x > 0, c T Ax > 0, c T A 2 x > 0,..., c T A x > 0,...}. By assumpton, NT. The set NT s also A-nvarant, that s, f v NT, then Av NT. Note that NT s an affne subspace of R N, that s, t s closed under addton and scalar multplcaton by postve reals. Hence, t s convex 1. Defne T = R N NT to be the set of all ponts where the program termnates. Defne the boundary, NT, of NT and T as the set of all v such that (for all ɛ) there exsts a pont n the ɛ-neghborhood of v that belongs to T and another that belongs to NT. Let NT be the completon of NT, that s, NT = NT NT. Snce NT s A-nvarant, t means that A maps NT nto NT. By contnuty we have that A also maps NT nto NT. Now, NT s convex, and f we dentfy ponts x and y, wrtten as x y, that are nonzero scalar multples of each other (x = λy), then the resultng set (NT / ) s closed and bounded (as a subset of R n 1 ). By Brouwer s fxed pont theorem [15], t follows that there s an egenvector v (wth postve egenvalue) of A n NT. For all ponts u NT, we know c T u > 0. By contnuty, for all ponts u NT, we have c T u 0. If, n fact, t s the case that c T v > 0, then v s a wtness to nontermnaton of the loop. Thus, Theorem 1 can be used to get the followng condtonal characterzaton of nontermnaton. Corollary 1. If there s no real egenvector v of A such that c T v = 0, then the lnear loop program defned by A and c s nontermnatng ff there exsts an egenvector v on whch the loop s nontermnatng. Example 1. The effect of two sequental assgnments x := x y; y := x + 2y s captured by the smultaneous assgnment ( ) ( ) ( ) x 1 1 x = y 1 1 y The matrx A has no real egenvalues. Let c 0 be any (nonzero) vector. The condton of Corollary 1 s trvally satsfed. And snce there s no real egenvalue, we mmedately conclude that the lnear loop program specfed by A and (any nonzero vector) c s termnatng. Example 2. Let θ be a fxed number. Consder the followng program: whle (z y > 0) { x := Ax }, where A = [cos θ, sn θ, 0; sn θ, cos θ, 0; 0, 0, 1]. Thus, A smply rotates the 3-D space by an angle θ about the z-axs. The set of ponts where ths program s nontermnatng s NT = {(x, y, z) : z > x sn φ + y cos φ : φ = nθ, n = 0, 1, 2,...}. For θ that s not a factor of π, NT = {(x, y, z) : z 2 = x 2 + y 2 } (elmnate φ from above). Note that there s the egenvector (0, 0, 1) n NT correspondng to postve egenvalue 1. As another example of the boundary, note that f θ = π/4, then NT contans 8 hyperplanes, each one s mapped by A to the next adjacent one. 1 A set NT s convex f αu + (1 α)v NT whenever u, v NT and 0 α 1.
5 2.1 Generalzng the Loop Condton The loop condton can be generalzed to allow for a conjuncton of multple lnear nequaltes. We contnue to assume that all lnear nequaltes and lnear assgnments consst only of homogeneous expressons. Let B be a (M N)-matrx (wth ratonal entres) and A be a (N N)-matrx. We consder programs of the followng form: P2: whle (Bx > 0) { x := Ax }. Theorem 1 and Corollary 1 mmedately generalze to programs of the form P2. Theorem 2. If Program P2, specfed by matrces A and B, s nontermnatng, then there s a real egenvector v of A, correspondng to a postve real egenvalue, such that Bv 0. Corollary 2. Assume that for every real egenvector v of A, correspondng to a postve egenvalue, whenever Bv 0, then t s actually the case that Bv > 0. Then, the Program P2, defned by A and B, s nontermnatng ff there exsts an egenvector v on whch the loop s nontermnatng. Example 3. Consder the program: whle (x y > 0) { x := x + y; y := y }. The matrx A = [ 1, 1; 0, 1] has two egenvalues, 1 and 1. The egenvector correspondng to the egenvalue 1 s [1; 2] and we note that Hence, t follows from Corollary 2 that the above loop s termnatng. 2.2 Two Varable Case Theorem 1 and Theorem 2 show that nontermnatng lnear loops almost always have a wtness that s an egenvector of the matrx A. The only problematc case s when the egenvector s on the boundary, NT, so that t s not clear f ndeed there are ponts where the program s nontermnatng. However, n the 2-dmensonal case, that s, when there are only two varables, the regon NT wll be a sector and t can be specfed by ts two boundary rays. Thus, f NT, then there exsts an A-nvarant sector, gven by a T x 0 b T x 0 x 0 where {>, }, on whch the loop condton always evaluates to true. Ths can be expressed as a quantfed formula over the theory of (lnear) arthmetc nterpreted over the reals, whch s a decdable theory. Theorem 3. A two varable lnear loop program, whle (Bx > 0) { x := Ax }, s non-termnatng ff the followng sentence n true n the theory of reals a, b.[ x.φ(a, b, x) x.(φ(a, b, x) (Bx > 0 φ(a, b, Ax)))] where φ(a, b, x) denotes a T x 0 b T x 0 x 0 and {>, }. Ths theorem gves a decson procedure for termnaton of two varable loops snce the formula n Theorem 3 can be tested for satsfablty. Theorem 3 cannot be generalzed to hgher dmensons snce there may not be fntely many hyperplane boundares, as Example 2 llustrates.
6 3 Reducng the Homogeneous Case Corollary 2 falls short of yeldng decdablty of termnaton of homogeneous lnear programs. But t hnts that the real egenvalues and the correspondng egenvectors are relevant for termnaton characterstcs of such programs. In ths secton, we wll formally show that the nonpostve egenvalues (and the correspondng egenspace) can be gnored and the termnaton problem can be reduced to only the egenspace correspondng to postve real egenvalues of the matrx A. We frst note that the Program P2 from Secton 2.1 can be transformed by an nvertble (bjectve) transformaton, preservng ts termnaton propertes. Proposton 1. Let P be an nvertble lnear transformaton. The program P2: whle (Bx > 0) { x := Ax } s termnatng ff the program P3: whle (BP y > 0) { y := P 1 AP y } s termnatng. Proof. If Program P2 does not termnate on nput x := c, then Program P3 wll not termnate on nput y := P 1 c. Conversely, f Program P3 does not termnate on nput y := d, then Program P2 wll not termnate on nput x := P d. Thus, Proposton 1 s just about dong a change of varables. It s a well known result n lnear algebra [9, 1] that usng a sutable change of varables, a real matrx A can be transformed nto the form, dag(j 1, J 2,..., J K ), called the real Jordan form, where each J s ether of the two forms: λ D I λ D I I λ D ( α β where λ R s a real whereas D s a (2 2)-matrx of the form β α ). For unformty, the second Jordan block wll denote both the forms. When t denotes the frst form, then D and I are both (1 1)-matrces and we wll say D R and treat t as a real. We defne D = λ n the frst case and D = α 2 + β2 n the second case. Let P be the real (N N)-matrx such that P 1 AP = dag(j 1,..., J K ). Thus, Program P2, specfed by matrces A and B, P2: whle (Bx > 0) { x := Ax }, can be transformed nto the new Program P3, P3: whle (BP y > 0) { y := dag(j 1,..., J K )y }. Proposton 1 means that we can focus on termnaton of Program P3. Partton the varables n y nto y 1, y 2,..., y K and rewrte the Program P3 as P3: whle (B 1 y 1 + +B K y K > 0) { y 1 := J 1 y 1 ;... ; y K := J K y K }, where B s are obtaned by parttonng the matrx BP. Let S = {1, 2,..., K} be the set of ndces. Defne the set S + = { S : D R, D > 0}. The followng
7 techncal lemma shows that we can gnore the state space correspondng to negatve and complex egenvalues, whle stll preservng the termnaton behavor of the Program P3. Lemma 1. The Program P3, as defned above, s termnatng ff the program P4: whle ( j S + B j y j > 0) { y j := J j y j ; for j S + } s termnatng. Proof. (Sketch) If the Program P4 does not termnate on nput y j := c j, where j S +, then the Program P3 does not termnate on nput y j := c j for j S + and y j := 0 for j S +. For the converse, assume that Program P3 does not termnate on nput y j := c j, j S. Consder the m-th loop condton, j S B jmy j > 0, where B jm denotes the m-th row of B j. Assume that y j has N j components, y j 0, y j 1,..., y j, Nj 1 where each y j k s ether a 2 1 or a 1 1 matrx (dependng on whether D j s 2 2 or 1 1.) The value of y j, at the -th teraton, s gven by y j () =. D j D 1 j ( 2 ) D 2 j... 0 D j D 1 j... ( ) ( N j 1 ) N j Dj D 1 j Dj D (Nj 1) j D (Nj 2) j c j (1) Defne f m () to be the value of the expresson of the m-th condton at - th teraton, that s, f m () = j S B jmy j (). Let J be an ndex such that N J = max{n j : D j = max{ D ( : ) S}}. We clam, wthout further proof, N that for large, the term D J +1 N J 1 J y J N J 1(0) wll domnate the value of f m (). If J S +, then the sgn of ths domnatng term, and consequently the sgn of f m (), wll fluctuate (between postve and negatve) as ncreases. By assumpton, ths does not happen. Hence, J S + and hence, for a large enough, say I m, we have j S + B jm y j () > 0. For each condton m, we get an ndex I m. Set I to be the maxmum of all I m s. For I, t s the case that j S + B jm y j () > 0 for all m. Defne new ntal condtons for Program P3 and Program P4 as follows: y (0) := y (I) for all S + and y (0) := 0 for all S +. Program P3 does not termnate on ths new ntal condtons. Hence, Program P4 also does not termnate on t. Ths completes the proof. Example 4. We borrow the followng example from [13], Q1: whle (x > 0 y > 0) { x := 2x + 10y; y := y }. The matrx A has two egenvalues 2 and 1, and t s clearly dagonalzable. In fact, consder the transformaton matrx P, ( ) ( ) ( ) A = P = P AP = BP = P 0 1
8 Transformng Program Q1 by P, we get Q2: whle (x x 2 > 0 3x 2 > 0) { x 1 := 2x 1 ; x 2 := x 2 }. Lemma 1 says that the termnaton of Program Q1 and Program Q2 can be decded by just consderng the termnaton characterstcs of: Q3: whle (10x 2 > 0 3x 2 > 0) { x 2 := x 2 }. In fact, the pont x 1 = 0, x 2 = 1 makes Program Q3 nontermnatng, and correspondngly, the pont x = 10, y = 3 makes Program Q1 nontermnatng. 4 All Postve Egenvalues Lemma 1 reduces the termnaton of Program P2 of Secton 2.1 to testng termnaton of Program P4, whch s gven as: P4: whle (B 1 y B r y r > 0) { y 1 := J 1 y 1 ;... ; y r := J r y r } where each of the Jordan blocks J corresponds to a postve real egenvalue λ. The value of varables n y j, after the -th teraton, are gven by Equaton 1, where D j = λ j s a postve real now. As before, assume that the k-th loop condton s wrtten as B 1k y 1 + B 2k y B rk y r > 0. We can express the requrement that the k-th loop condton be true after the -th teraton as B 1k y 1 () + B 2k y 2 () + + B rk y r () > 0. Expand ths usng Equaton 1 and let C klj denote the result of collectng all coeffcents of the term ( ) (j 1) j 1 λ l. Now, the k-th loop condton after -th teraton can be wrtten as ( ) λ 1C k11 y(0) + λ 1 1 C k12 y(0) + + λ (n1 1) n C k1n1 y(0) + + ( ) λ rc kr1 y(0) + λ 1 r C kr2 y(0) + + λ (nr 1) n r 1 r C krnr y(0) > 0, whch we wll denote by Cond k (y()). If two egenvalues λ l and λ m are the same, then we assume that the correspondng coeffcents (of ( ) j λ j l and ( ) j λ j m ) have been merged n the above expresson, so that wthout loss of generalty, we can assume that each λ l s dstnct and such that 0 < λ 1 < λ 2 < < λ r. Defne the set Ind = {11, 12,..., 1n 1, 21, 22,..., 2n 2,..., r1, r2,..., rn r } and an orderng on ths set so that elements on the rght are greater-than elements on the left n the above set. The dea here s that nonzero terms n Cond k that have larger ndces grow faster asymptotcally (as ncreases). We decde the termnaton of Program P4 usng the followng three step nondetermnstc algorthm: (1) For each of the m loop condtons, we guess an element from the set Ind. Formally, we guess a mappng ndex : {1, 2,..., m} Ind. Intutvely f y(0) s a wtness to nontermnaton, then ndex(k) s chosen so that C k,ndex(k) y(0) > 0 (and ths s the domnant summand) and C k,nd y(0) = 0 for all nd ndex(k).
9 (2) Buld a set of lnear equalty and nequalty constrants as follows: from the k-th loop condton, generate the followng constrants, C k,nd z = 0, C k,nd z > 0, Cond k (z()) > 0, f nd ndex(k) f nd = ndex(k) f 0 Π 2 (ndex(k)) where Π 1 and Π 2 denote the projecton onto the frst and second components respectvely. Note that the unknowns are just z (the ntal values for y). (3) Return nontermnatng f the new set of lnear nequaltes and lnear equatons s satsfable (n R n ), return termnatng otherwse. We state the correctness of the algorthm, wthout proof, n Lemma 2 and follow t up by a summary of the complete decson procedure n the proof of Theorem 4. Lemma 2. The nondetermnstc procedure returns nontermnatng ff the Program P4 P4: whle (B 1 y B r y r > 0) { y 1 := J 1 y 1 ;... ; y r := J r y r } s nontermnatng. Theorem 4. The termnaton of a homogeneous lnear program of the form P2: whle (Bx > 0) { x := Ax } s decdable. Proof. We decde termnaton of the Program P2 as follows: If A has no postve real egenvalues, then return termnatng (Corollary 2). If every real egenvector v correspondng to a postve real egenvalue of A satsfes Bv < 0, then return termnatng (Theorem 2). If there s a real egenvector v correspondng to a postve real egenvalue of A such that Bv > 0, then return nontermnatng (Corollary 2). If none of the above cases s true, then clearly A has postve real egenvalues. Compute the Jordan blocks and the generalzed egenvectors only correspondng to the postve real egenvalues of A. Generate a transformaton P by extendng the computed set of generalzed egenvectors wth any set of vectors n space orthogonal to that of the generated egenvectors. Transform Program P2 by P as n Proposton 1. It s an easy exercse 2 to note that we can apply Lemma 1 and reduce the termnaton problem to that for Program P4 of Lemma 1. Fnally, we decde termnaton of Program P4 usng the nondetermnstc procedure of Secton 4 (Lemma 2). Example 5. Consder the program Q4: whle (x > 0 y > 0) { x := x - y; y := y } Ths contans only two varables, and hence we can use Theorem 3, but for purposes of llustraton, we apply Theorem 4 here. The matrx A = [1, 1; 0, 1] has a postve real egenvalue 1. The vector gven by x = 1, y = 0 s an egenvector correspondng to ths egenvalue. Hence, we cannot apply Theorem 2 or 2 We cannot apply Lemma 1 drectly snce we dd not compute the real Jordan form of the full matrx A, but only of a part of t. But we do not need to compute the full real Jordan form to get Program P4.
10 Corollary 2. The real Jordan form of A s A = [1, 1; 0, 1] and the correspondng transformaton matrx s P = [ 1, 0; 0, 1]. The new program s: Q5: whle ( x > 0 y > 0) { x := x + y; y := y } The general solutons are gven by x() = 1 x(0) + y(0) = x(0) + y(0) y() = 1 y(0) = y(0) The condton Cond 1 correspondng to the loop condton x > 0 s x(0) y(0) > 0 and smlarly Cond 2 s y(0) > 0. There s no choce for ndex(2), but there s a choce for ndex(1): t can be ether 11 or 12. In the frst case, we generate the followng constrants from the frst loop condton: { y = 0, x > 0, x 0y > 0}. From the second loop condton, we only generate the constrant y > 0. Together, we detect an nconsstency. In the second case, we generate the followng constrants from the frst loop condton: { y > 0, x 0y > 0, x 1y > 0}. Agan, from the second loop condton, we generate the constrant y > 0, whch s nconsstent wth the above constrants. Hence, we conclude that the Program Q4 s termnatng. 5 Nonhomogeneous Programs Now we consder lnear programs of the followng form: P5: whle (Bx > b) { x := Ax + c } We can homogenze ths program and add an addtonal constrant on the homogenzng varable to get the followng P6: whle (Bx bz > 0 z > 0) { x := Ax + cz; z := z } where z s a new varable. The homogeneous program reduces to the orgnal program f we substtute 1 for z. Proposton 2. The nonhomogeneous Program P5 does not termnate ff the homogeneous Program P6 does not termnate. Proof. If Program P5 does not termnate, say on nput x = d, = 1, 2,..., n, then Program P6 does not termnate on nput z = 1, x = d, = 1, 2,..., n. For the converse, assume that Program P6 does not termnate on nput x 0 = d 0, x = d, = 1, 2,..., n. If d 0 > 0, then we can scale ths nput to get a new state x 0 = 1, x = d /d 0, = 1, 2,..., n. The behavor of Program P6 wll be the same on the scaled nput, and hence Program P5 would not termnate on ths nput ether. Thus we can reduce the decdablty of termnaton of nonhomogeneous programs to that of homogeneous programs. Together wth Theorem 4, we get the followng result. Theorem 5. The termnaton of a nonhomogeneous lnear program of the form P5: whle (Bx > b) { x := Ax + c } s decdable.
11 Remarks on Computablty and Complexty. The three step nondetermnstc algorthm descrbed n Secton 4 s clearly n class NP. However, the nondetermnsm can be elmnated by a careful enumeraton of choces. The dea s that we always start wth the guess ndex(k) = rn r for each loop condton k and f the resultng formula s unsatsfable, then we readjust the guess and gradually set ndex(k) to smaller elements n the set Ind. We do not formalze ths detal n ths paper because t s not central to the decdablty result. The reducton descrbed n Secton 3 requres computaton of a real egenvector. Computng wth real numbers s not easy, but f the nput matrces are over the ratonals, then all the real numbers that arse n the computaton are algebrac. Computng wth algebrac numbers s theoretcally possble, but t can be expensve (snce the theory of real-closed felds has a double exponental lower bound). But ths should not be a serous problem for two reasons. Frst, for most problems arsng n practce, we expect the egenvalues to be ratonal, and computaton wth ratonals can be done very effcently. Second, even f the egenvalues are rratonal, the dmenson of the problem s unlkely to be so hgh that computng wth algebrac numbers wll become a bottleneck. However, these ssues have to be expermented wth and that s left as future work. We beleve that the Jordan form computaton step n the decson procedure outlned n ths paper can be elmnated n most cases n practce. Ths can be acheved by perturbng the system by a lttle (for example, replacng condtons c > 0 by c > ɛ for some small constant ɛ) and studyng the termnaton property of the perturned system. We conjecture that Corollary 2 can be strengthened for the case when the homogenzaton varable volates the condton. Ths would allow us to avod the Jordan decomposton step n many cases. The decson procedure for termnaton of lnear loop programs can be adapted to the case when the varables are nterpreted over the ntegers and ratonals. If there are a lot of wtnesses to nontermnaton, then there wll be a ratonal wtness too, snce the ratonals are dense n reals. If not, then we can detect ths case usng a specalzed wrapper. Ths leads us to conjecture the followng. Conjecture 1. The termnaton of Program P5, as defned n Theorem 5, when all varables are nterpreted over the set of ntegers, s decdable. 6 The General Case We consder the termnaton of a set of nondetermnstc lnear condtonal assgnments, wrtten n a guarded command language [8] as, P7 : [ B 1 x > b 1 x := A 1 x + c 1 [] B 2 x > b 2 x := A 2 x + c 2... [] B k x > b k x := A k x + c k ] whch we wll wrte n shorthand as P7: [] k =1 (B x > b x := A x + c )
12 Counter machnes can be naturally encoded as Program P7. We ntroduce one varable x for each counter and one varable x for the fnte control (program counter). Encodngs of condtonal branches, counter ncrements, and counter decrements are straghtforward. The problem of decdng f a counter machne halts on all nputs s undecdable, see [3], where ths problem s called the mortalty problem. Therefore, the problem of decdng f a program of the above form halts on all nteger nputs s also undecdable. Note however that for the restrcted forms of assgnments (x := x ± 1) generated by the translaton, termnaton over reals s equvalent to termnaton over ntegers. Thus, we conclude that the termnaton problem for Program P7 s undecdable. Theorem 5 can be used to get an ncomplete test for nontermnaton for Program P7 If Program P7 s termnatng, then for each, the program whle (B x > b ) { x := A x + c } s termnatng. The converse s also true under addtonal commutaton propertes [2] amongst the k bnary relatons, say R 1,..., R k, nduced by the k guarded commands. In partcular, one mmedate consequence of a result n [2] s the followng. Proposton 3. Let Program P7 and relatons R 1,..., R k be as defned above. Let R = R 1 R k. Assume that whenever < j, t s the case that R j R R R. Then, the Program P7 termnates f and only f each R do. Note that the condton above s dependent on the order R 1,..., R k, whch we are free to choose. Testng for the quas-commutaton property [2] R j R R R s possble f we restrct the search to R j R R R l, for some fnte l. In the specal case when the -th guarded command cannot be enabled after executon of the j-th guarded command (that s, R j R = ), then the above ncluson s trvally true. In the case when the quas-commutaton property cannot be establshed, the test for nontermnaton can be made more complete by ncludng new guarded transtons obtaned by composng two or more of the orgnal guarded commands. It s easy to see that the composton results n a lnear guarded command. These new guarded commands can be tested for nontermnaton usng Theorem 5 agan. 7 Future Work and Concluson We have presented decdablty results for termnaton of smple loop programs. The loops are consdered termnatng f they termnate on all ntal real values of the varables. The decson procedure s based on the observaton that only the egenvectors (and the generalzed egenspace) correspondng to postve real egenvalues of the assgnment matrx are relevant for termnaton. The generalzaton to multple lnear nondetermnstc guarded commands makes the problem undecdable. Under certan restrctve commutaton condtons, termnaton of multple lnear guarded commands can be reduced to termnaton of each ndvdual smple lnear loops.
13 We beleve that results and tools from systems theory, such as Lyapunov functons and control Lyapunov functons, can yeld powerful tools for analyzng software, especally for termnaton analyss and nvarant generaton. Ths avenue should be explored further n the future. Acknowledgments. We wsh to thank Andreas Podelsk, Andrey Rybalchenko, and ther colleagues at MPI for motvaton and ntal dscussons and the revewers for nsghtful comments and references. References [1] D. K. Arrowsmth and C. M. Place. An ntroducton to dynamcal systems. Cambrdge, [2] L. Bachmar and N. Dershowtz. Commutaton, transformaton, and termnaton. In J. H. Sekmann, edtor, Proc. 8th Int. Conf. on Automated Deducton, volume 230 of LNCS, pages 5 20, Berln, Sprnger-Verlag. [3] V. D. Blondel, O. Bournez, P. Koran, C. H. Papadmtrou, and J. N. Tstskls. Decdng stablty and mortalty of pecewse affne dynamcal system. Theoretcal Computer Scence, 255(1 2): , [4] V. D. Blondel and J. N. Tstskls. A survey of computatonal complexty results n systems and control. Automatca, 36: , [5] M. Colon and H. Spma. Synthess of lnear rankng functons. In T. Margara and W. Y, edtors, Tools and Algorthms for the Constructon and Analyss of Systems, 7th Intl. Conf. TACAS 2001, volume 2031 of LNCS, pages Sprnger, [6] M. Colon and H. Spma. Practcal methods for provng program termnaton. In E. Brnksma and K. G. Larsen, edtors, Computer Aded Verfcaton, 14th Intl. Conf. CAV 2002, volume 2034 of LNCS, pages Sprnger, [7] D. Dams, R. Gerth, and O. Grumberg. A heurstc for the automatc generaton of rankng functon. In Workshop on Advances n Verfcaton WAVe 2000, pages 1 8, [8] E. W. Djkstra. A Dscplne of Programmng. Prentce Hall PTR, [9] K. Hoffman and R. Kunze. Lnear Algebra. Prentce-Hall, second edton, [10] R. Kannan and R. J. Lpton. Polynomal-tme algorthm for the orbt problem. J. of the ACM, 33(4): , [11] G. Lafferrere, G. J. Pappas, and S. Yovne. Symbolc reachablty computatons for famles of lnear vector felds. J. Symbolc Computaton, 32(3): , [12] J. Musset and M. Rusnowtch. Computng metatranstons for lnear transton systems. In 12th Intl. FME symposum, [13] A. Podelsk and A. Rybalchenko. A complete method for synthess of lnear rankng functons. In VMCAI 2004: Verfcaton, Model Checkng, and Abstract Interpretaton, LNCS. Sprnger-Verlag, [14] A. Podelsk and A. Rybalchenko. Transton nvarants. In Logc n Computer Scence, LICS. IEEE Computer Socety, [15] D. R. Smart. Fxed Pont Theorems. Cambrdge Unversty Press, [16] E. Sontag. From lnear to nonlnear: Some complexty comparsons. In 34th IEEE Conf. on Decson and Control, CDC, [17] A. Twar. Approxmate reachablty for lnear systems. In O. Maler and A. Pnuel, edtors, Hybrd Systems: Computaton and Control HSCC, volume 2623 of LNCS, pages Sprnger, Aprl 2003.
8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by
6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng
More informationv a 1 b 1 i, a 2 b 2 i,..., a n b n i.
SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are
More information1 Example 1: Axis-aligned rectangles
COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton
More informationRecurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
More informationLuby s Alg. for Maximal Independent Sets using Pairwise Independence
Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent
More informationPERRON FROBENIUS THEOREM
PERRON FROBENIUS THEOREM R. CLARK ROBINSON Defnton. A n n matrx M wth real entres m, s called a stochastc matrx provded () all the entres m satsfy 0 m, () each of the columns sum to one, m = for all, ()
More informationExtending Probabilistic Dynamic Epistemic Logic
Extendng Probablstc Dynamc Epstemc Logc Joshua Sack May 29, 2008 Probablty Space Defnton A probablty space s a tuple (S, A, µ), where 1 S s a set called the sample space. 2 A P(S) s a σ-algebra: a set
More informationwhere the coordinates are related to those in the old frame as follows.
Chapter 2 - Cartesan Vectors and Tensors: Ther Algebra Defnton of a vector Examples of vectors Scalar multplcaton Addton of vectors coplanar vectors Unt vectors A bass of non-coplanar vectors Scalar product
More informationWe are now ready to answer the question: What are the possible cardinalities for finite fields?
Chapter 3 Fnte felds We have seen, n the prevous chapters, some examples of fnte felds. For example, the resdue class rng Z/pZ (when p s a prme) forms a feld wth p elements whch may be dentfed wth the
More informationHow Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence
1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh
More informationSupport Vector Machines
Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.
More informationModule 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
More informationRing structure of splines on triangulations
www.oeaw.ac.at Rng structure of splnes on trangulatons N. Vllamzar RICAM-Report 2014-48 www.rcam.oeaw.ac.at RING STRUCTURE OF SPLINES ON TRIANGULATIONS NELLY VILLAMIZAR Introducton For a trangulated regon
More informationLoop Parallelization
- - Loop Parallelzaton C-52 Complaton steps: nested loops operatng on arrays, sequentell executon of teraton space DECLARE B[..,..+] FOR I :=.. FOR J :=.. I B[I,J] := B[I-,J]+B[I-,J-] ED FOR ED FOR analyze
More informationFeature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College
Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure
More information+ + + - - This circuit than can be reduced to a planar circuit
MeshCurrent Method The meshcurrent s analog of the nodeoltage method. We sole for a new set of arables, mesh currents, that automatcally satsfy KCLs. As such, meshcurrent method reduces crcut soluton to
More informationFisher Markets and Convex Programs
Fsher Markets and Convex Programs Nkhl R. Devanur 1 Introducton Convex programmng dualty s usually stated n ts most general form, wth convex objectve functons and convex constrants. (The book by Boyd and
More information8 Algorithm for Binary Searching in Trees
8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the
More informationbenefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
More informationBERNSTEIN POLYNOMIALS
On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful
More informationThe University of Texas at Austin. Austin, Texas 78712. December 1987. Abstract. programs in which operations of dierent processes mayoverlap.
Atomc Semantcs of Nonatomc Programs James H. Anderson Mohamed G. Gouda Department of Computer Scences The Unversty of Texas at Austn Austn, Texas 78712 December 1987 Abstract We argue that t s possble,
More informationL10: Linear discriminants analysis
L0: Lnear dscrmnants analyss Lnear dscrmnant analyss, two classes Lnear dscrmnant analyss, C classes LDA vs. PCA Lmtatons of LDA Varants of LDA Other dmensonalty reducton methods CSCE 666 Pattern Analyss
More informationProduction. 2. Y is closed A set is closed if it contains its boundary. We need this for the solution existence in the profit maximization problem.
Producer Theory Producton ASSUMPTION 2.1 Propertes of the Producton Set The producton set Y satsfes the followng propertes 1. Y s non-empty If Y s empty, we have nothng to talk about 2. Y s closed A set
More information1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)
6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes
More informationn + d + q = 24 and.05n +.1d +.25q = 2 { n + d + q = 24 (3) n + 2d + 5q = 40 (2)
MATH 16T Exam 1 : Part I (In-Class) Solutons 1. (0 pts) A pggy bank contans 4 cons, all of whch are nckels (5 ), dmes (10 ) or quarters (5 ). The pggy bank also contans a con of each denomnaton. The total
More informationWhat is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
More informationREGULAR MULTILINEAR OPERATORS ON C(K) SPACES
REGULAR MULTILINEAR OPERATORS ON C(K) SPACES FERNANDO BOMBAL AND IGNACIO VILLANUEVA Abstract. The purpose of ths paper s to characterze the class of regular contnuous multlnear operators on a product of
More informationA Probabilistic Theory of Coherence
A Probablstc Theory of Coherence BRANDEN FITELSON. The Coherence Measure C Let E be a set of n propostons E,..., E n. We seek a probablstc measure C(E) of the degree of coherence of E. Intutvely, we want
More informationJ. Parallel Distrib. Comput.
J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n
More informationGeneralizing the degree sequence problem
Mddlebury College March 2009 Arzona State Unversty Dscrete Mathematcs Semnar The degree sequence problem Problem: Gven an nteger sequence d = (d 1,...,d n ) determne f there exsts a graph G wth d as ts
More informationINTERPRETING TRUE ARITHMETIC IN THE LOCAL STRUCTURE OF THE ENUMERATION DEGREES.
INTERPRETING TRUE ARITHMETIC IN THE LOCAL STRUCTURE OF THE ENUMERATION DEGREES. HRISTO GANCHEV AND MARIYA SOSKOVA 1. Introducton Degree theory studes mathematcal structures, whch arse from a formal noton
More informationHÜCKEL MOLECULAR ORBITAL THEORY
1 HÜCKEL MOLECULAR ORBITAL THEORY In general, the vast maorty polyatomc molecules can be thought of as consstng of a collecton of two electron bonds between pars of atoms. So the qualtatve pcture of σ
More informationLinear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits
Lnear Crcuts Analyss. Superposton, Theenn /Norton Equalent crcuts So far we hae explored tmendependent (resste) elements that are also lnear. A tmendependent elements s one for whch we can plot an / cure.
More informationA hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel
More informationThe descriptive complexity of the family of Banach spaces with the π-property
Arab. J. Math. (2015) 4:35 39 DOI 10.1007/s40065-014-0116-3 Araban Journal of Mathematcs Ghadeer Ghawadrah The descrptve complexty of the famly of Banach spaces wth the π-property Receved: 25 March 2014
More informationPOLYSA: A Polynomial Algorithm for Non-binary Constraint Satisfaction Problems with and
POLYSA: A Polynomal Algorthm for Non-bnary Constrant Satsfacton Problems wth and Mguel A. Saldo, Federco Barber Dpto. Sstemas Informátcos y Computacón Unversdad Poltécnca de Valenca, Camno de Vera s/n
More informationCan Auto Liability Insurance Purchases Signal Risk Attitude?
Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang
More informationLogistic Regression. Lecture 4: More classifiers and classes. Logistic regression. Adaboost. Optimization. Multiple class classification
Lecture 4: More classfers and classes C4B Machne Learnng Hlary 20 A. Zsserman Logstc regresson Loss functons revsted Adaboost Loss functons revsted Optmzaton Multple class classfcaton Logstc Regresson
More informationCompiling for Parallelism & Locality. Dependence Testing in General. Algorithms for Solving the Dependence Problem. Dependence Testing
Complng for Parallelsm & Localty Dependence Testng n General Assgnments Deadlne for proect 4 extended to Dec 1 Last tme Data dependences and loops Today Fnsh data dependence analyss for loops General code
More informationLeast Squares Fitting of Data
Least Squares Fttng of Data Davd Eberly Geoetrc Tools, LLC http://www.geoetrctools.co/ Copyrght c 1998-2016. All Rghts Reserved. Created: July 15, 1999 Last Modfed: January 5, 2015 Contents 1 Lnear Fttng
More informationEmbedding lattices in the Kleene degrees
F U N D A M E N T A MATHEMATICAE 62 (999) Embeddng lattces n the Kleene degrees by Hsato M u r a k (Nagoya) Abstract. Under ZFC+CH, we prove that some lattces whose cardnaltes do not exceed ℵ can be embedded
More informationThe Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.
More informationA Fast Incremental Spectral Clustering for Large Data Sets
2011 12th Internatonal Conference on Parallel and Dstrbuted Computng, Applcatons and Technologes A Fast Incremental Spectral Clusterng for Large Data Sets Tengteng Kong 1,YeTan 1, Hong Shen 1,2 1 School
More informationChapter 4 ECONOMIC DISPATCH AND UNIT COMMITMENT
Chapter 4 ECOOMIC DISATCH AD UIT COMMITMET ITRODUCTIO A power system has several power plants. Each power plant has several generatng unts. At any pont of tme, the total load n the system s met by the
More informationProject Networks With Mixed-Time Constraints
Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa
More informationProduct-Form Stationary Distributions for Deficiency Zero Chemical Reaction Networks
Bulletn of Mathematcal Bology (21 DOI 1.17/s11538-1-9517-4 ORIGINAL ARTICLE Product-Form Statonary Dstrbutons for Defcency Zero Chemcal Reacton Networks Davd F. Anderson, Gheorghe Cracun, Thomas G. Kurtz
More informationCalculation of Sampling Weights
Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample
More informationRate Monotonic (RM) Disadvantages of cyclic. TDDB47 Real Time Systems. Lecture 2: RM & EDF. Priority-based scheduling. States of a process
Dsadvantages of cyclc TDDB47 Real Tme Systems Manual scheduler constructon Cannot deal wth any runtme changes What happens f we add a task to the set? Real-Tme Systems Laboratory Department of Computer
More informationPSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12
14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed
More informationTHE METHOD OF LEAST SQUARES THE METHOD OF LEAST SQUARES
The goal: to measure (determne) an unknown quantty x (the value of a RV X) Realsaton: n results: y 1, y 2,..., y j,..., y n, (the measured values of Y 1, Y 2,..., Y j,..., Y n ) every result s encumbered
More informationNON-CONSTANT SUM RED-AND-BLACK GAMES WITH BET-DEPENDENT WIN PROBABILITY FUNCTION LAURA PONTIGGIA, University of the Sciences in Philadelphia
To appear n Journal o Appled Probablty June 2007 O-COSTAT SUM RED-AD-BLACK GAMES WITH BET-DEPEDET WI PROBABILITY FUCTIO LAURA POTIGGIA, Unversty o the Scences n Phladelpha Abstract In ths paper we nvestgate
More informationOn fourth order simultaneously zero-finding method for multiple roots of complex polynomial equations 1
General Mathematcs Vol. 6, No. 3 (2008), 9 3 On fourth order smultaneously zero-fndng method for multple roots of complex polynomal euatons Nazr Ahmad Mr and Khald Ayub Abstract In ths paper, we present
More informationNonbinary Quantum Error-Correcting Codes from Algebraic Curves
Nonbnary Quantum Error-Correctng Codes from Algebrac Curves Jon-Lark Km and Judy Walker Department of Mathematcs Unversty of Nebraska-Lncoln, Lncoln, NE 68588-0130 USA e-mal: {jlkm, jwalker}@math.unl.edu
More informationNPAR TESTS. One-Sample Chi-Square Test. Cell Specification. Observed Frequencies 1O i 6. Expected Frequencies 1EXP i 6
PAR TESTS If a WEIGHT varable s specfed, t s used to replcate a case as many tmes as ndcated by the weght value rounded to the nearest nteger. If the workspace requrements are exceeded and samplng has
More informationFace Verification Problem. Face Recognition Problem. Application: Access Control. Biometric Authentication. Face Verification (1:1 matching)
Face Recognton Problem Face Verfcaton Problem Face Verfcaton (1:1 matchng) Querymage face query Face Recognton (1:N matchng) database Applcaton: Access Control www.vsage.com www.vsoncs.com Bometrc Authentcaton
More informationOn the Optimal Control of a Cascade of Hydro-Electric Power Stations
On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;
More informationHow To Know The Components Of Mean Squared Error Of Herarchcal Estmator S
S C H E D A E I N F O R M A T I C A E VOLUME 0 0 On Mean Squared Error of Herarchcal Estmator Stans law Brodowsk Faculty of Physcs, Astronomy, and Appled Computer Scence, Jagellonan Unversty, Reymonta
More informationAn Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
More informationInstitute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic
Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange
More informationThe OC Curve of Attribute Acceptance Plans
The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4
More informationAn Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services
An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao
More informationJoint Scheduling of Processing and Shuffle Phases in MapReduce Systems
Jont Schedulng of Processng and Shuffle Phases n MapReduce Systems Fangfe Chen, Mural Kodalam, T. V. Lakshman Department of Computer Scence and Engneerng, The Penn State Unversty Bell Laboratores, Alcatel-Lucent
More informationConversion between the vector and raster data structures using Fuzzy Geographical Entities
Converson between the vector and raster data structures usng Fuzzy Geographcal Enttes Cdála Fonte Department of Mathematcs Faculty of Scences and Technology Unversty of Combra, Apartado 38, 3 454 Combra,
More informationANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING
ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,
More informationWhen Network Effect Meets Congestion Effect: Leveraging Social Services for Wireless Services
When Network Effect Meets Congeston Effect: Leveragng Socal Servces for Wreless Servces aowen Gong School of Electrcal, Computer and Energy Engeerng Arzona State Unversty Tempe, AZ 8587, USA xgong9@asuedu
More informationGeneral Auction Mechanism for Search Advertising
General Aucton Mechansm for Search Advertsng Gagan Aggarwal S. Muthukrshnan Dávd Pál Martn Pál Keywords game theory, onlne auctons, stable matchngs ABSTRACT Internet search advertsng s often sold by an
More informationHow To Calculate The Accountng Perod Of Nequalty
Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.
More informationAn Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems
STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part
More informationPeriod and Deadline Selection for Schedulability in Real-Time Systems
Perod and Deadlne Selecton for Schedulablty n Real-Tme Systems Thdapat Chantem, Xaofeng Wang, M.D. Lemmon, and X. Sharon Hu Department of Computer Scence and Engneerng, Department of Electrcal Engneerng
More information1. Measuring association using correlation and regression
How to measure assocaton I: Correlaton. 1. Measurng assocaton usng correlaton and regresson We often would lke to know how one varable, such as a mother's weght, s related to another varable, such as a
More informationComplete Fairness in Secure Two-Party Computation
Complete Farness n Secure Two-Party Computaton S. Dov Gordon Carmt Hazay Jonathan Katz Yehuda Lndell Abstract In the settng of secure two-party computaton, two mutually dstrustng partes wsh to compute
More informationOPTIMAL INVESTMENT POLICIES FOR THE HORSE RACE MODEL. Thomas S. Ferguson and C. Zachary Gilstein UCLA and Bell Communications May 1985, revised 2004
OPTIMAL INVESTMENT POLICIES FOR THE HORSE RACE MODEL Thomas S. Ferguson and C. Zachary Glsten UCLA and Bell Communcatons May 985, revsed 2004 Abstract. Optmal nvestment polces for maxmzng the expected
More informationTHE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek
HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo
More informationThe Distribution of Eigenvalues of Covariance Matrices of Residuals in Analysis of Variance
JOURNAL OF RESEARCH of the Natonal Bureau of Standards - B. Mathem atca l Scence s Vol. 74B, No.3, July-September 1970 The Dstrbuton of Egenvalues of Covarance Matrces of Resduals n Analyss of Varance
More informationOn the Solution of Indefinite Systems Arising in Nonlinear Optimization
On the Soluton of Indefnte Systems Arsng n Nonlnear Optmzaton Slva Bonettn, Valera Ruggero and Federca Tnt Dpartmento d Matematca, Unverstà d Ferrara Abstract We consder the applcaton of the precondtoned
More informationFINITE HILBERT STABILITY OF (BI)CANONICAL CURVES
FINITE HILBERT STABILITY OF (BICANONICAL CURVES JAROD ALPER, MAKSYM FEDORCHUK, AND DAVID ISHII SMYTH* To Joe Harrs on hs sxteth brthday Abstract. We prove that a generc canoncally or bcanoncally embedded
More informationMultiplication Algorithms for Radix-2 RN-Codings and Two s Complement Numbers
Multplcaton Algorthms for Radx- RN-Codngs and Two s Complement Numbers Jean-Luc Beuchat Projet Arénare, LIP, ENS Lyon 46, Allée d Itale F 69364 Lyon Cedex 07 jean-luc.beuchat@ens-lyon.fr Jean-Mchel Muller
More informationFORMAL ANALYSIS FOR REAL-TIME SCHEDULING
FORMAL ANALYSIS FOR REAL-TIME SCHEDULING Bruno Dutertre and Vctora Stavrdou, SRI Internatonal, Menlo Park, CA Introducton In modern avoncs archtectures, applcaton software ncreasngly reles on servces provded
More informationReal-Time Process Scheduling
Real-Tme Process Schedulng ktw@cse.ntu.edu.tw (Real-Tme and Embedded Systems Laboratory) Independent Process Schedulng Processes share nothng but CPU Papers for dscussons: C.L. Lu and James. W. Layland,
More informationConsider a 1-D stationary state diffusion-type equation, which we will call the generalized diffusion equation from now on:
Chapter 1 Boundary value problems Numercal lnear algebra technques can be used for many physcal problems. In ths chapter we wll gve some examples of how these technques can be used to solve certan boundary
More informationA Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression
Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,
More informationImplementation of Boolean Functions through Multiplexers with the Help of Shannon Expansion Theorem
Internatonal Journal o Computer pplcatons (975 8887) Volume 62 No.6, January 23 Implementaton o Boolean Functons through Multplexers wth the Help o Shannon Expanson Theorem Saurabh Rawat Graphc Era Unversty.
More informationLecture 3: Force of Interest, Real Interest Rate, Annuity
Lecture 3: Force of Interest, Real Interest Rate, Annuty Goals: Study contnuous compoundng and force of nterest Dscuss real nterest rate Learn annuty-mmedate, and ts present value Study annuty-due, and
More informationThe Greedy Method. Introduction. 0/1 Knapsack Problem
The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton
More informationMinimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures
Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng
More informationTime Domain simulation of PD Propagation in XLPE Cables Considering Frequency Dependent Parameters
Internatonal Journal of Smart Grd and Clean Energy Tme Doman smulaton of PD Propagaton n XLPE Cables Consderng Frequency Dependent Parameters We Zhang a, Jan He b, Ln Tan b, Xuejun Lv b, Hong-Je L a *
More informationStochastic epidemic models revisited: Analysis of some continuous performance measures
Stochastc epdemc models revsted: Analyss of some contnuous performance measures J.R. Artalejo Faculty of Mathematcs, Complutense Unversty of Madrd, 28040 Madrd, Span A. Economou Department of Mathematcs,
More informationINSTITUT FÜR INFORMATIK
INSTITUT FÜR INFORMATIK Schedulng jobs on unform processors revsted Klaus Jansen Chrstna Robene Bercht Nr. 1109 November 2011 ISSN 2192-6247 CHRISTIAN-ALBRECHTS-UNIVERSITÄT ZU KIEL Insttut für Informat
More informationOn Lockett pairs and Lockett conjecture for π-soluble Fitting classes
On Lockett pars and Lockett conjecture for π-soluble Fttng classes Lujn Zhu Department of Mathematcs, Yangzhou Unversty, Yangzhou 225002, P.R. Chna E-mal: ljzhu@yzu.edu.cn Nanyng Yang School of Mathematcs
More informationCHAPTER 14 MORE ABOUT REGRESSION
CHAPTER 14 MORE ABOUT REGRESSION We learned n Chapter 5 that often a straght lne descrbes the pattern of a relatonshp between two quanttatve varables. For nstance, n Example 5.1 we explored the relatonshp
More informationMatrix Multiplication I
Matrx Multplcaton I Yuval Flmus February 2, 2012 These notes are based on a lecture gven at the Toronto Student Semnar on February 2, 2012. The materal s taen mostly from the boo Algebrac Complexty Theory
More informationRESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.
ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract
More information21 Vectors: The Cross Product & Torque
21 Vectors: The Cross Product & Torque Do not use our left hand when applng ether the rght-hand rule for the cross product of two vectors dscussed n ths chapter or the rght-hand rule for somethng curl
More informationStability, observer design and control of networks using Lyapunov methods
Stablty, observer desgn and control of networks usng Lyapunov methods von Lars Naujok Dssertaton zur Erlangung des Grades enes Doktors der Naturwssenschaften - Dr. rer. nat. - Vorgelegt m Fachberech 3
More informationPoint cloud to point cloud rigid transformations. Minimizing Rigid Registration Errors
Pont cloud to pont cloud rgd transformatons Russell Taylor 600.445 1 600.445 Fall 000-014 Copyrght R. H. Taylor Mnmzng Rgd Regstraton Errors Typcally, gven a set of ponts {a } n one coordnate system and
More informationDEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
More informationCombinatorial Agency of Threshold Functions
Combnatoral Agency of Threshold Functons Shal Jan Computer Scence Department Yale Unversty New Haven, CT 06520 shal.jan@yale.edu Davd C. Parkes School of Engneerng and Appled Scences Harvard Unversty Cambrdge,
More informationBrigid Mullany, Ph.D University of North Carolina, Charlotte
Evaluaton And Comparson Of The Dfferent Standards Used To Defne The Postonal Accuracy And Repeatablty Of Numercally Controlled Machnng Center Axes Brgd Mullany, Ph.D Unversty of North Carolna, Charlotte
More informationSketching Sampled Data Streams
Sketchng Sampled Data Streams Florn Rusu, Aln Dobra CISE Department Unversty of Florda Ganesvlle, FL, USA frusu@cse.ufl.edu adobra@cse.ufl.edu Abstract Samplng s used as a unversal method to reduce the
More informationA Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
More information