Weighted Automata on Infinite Words in the Context of Attacker-Defender Games

Size: px
Start display at page:

Download "Weighted Automata on Infinite Words in the Context of Attacker-Defender Games"

Transcription

1 Weighted Automata on Infinite Words in the Context of Attacker-Defender Games V. Halava 1,2 T. Harju 1 R. Niskanen 1 I. Potapov 2 1 Department of Mathematics and Statistics University of Turku, Finland 2 Department of Computer Science University of Liverpool, UK Workshop on Automatic Sequences, 2015 Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

2 Attacker-Defender Games Two players: Attacker, Defender. Players play in turns using available moves. Initial and target configurations. Configuration is a sequence of alternating moves. Play is an infinite sequence of configurations. Attacker wins if the target configuration is reachable in a play starting from the initial configuration. Otherwise Defender wins. Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

3 Games we consider 1 Weighted Word Games 2 Word Game on pairs of group words 3 Matrix Games 4 Braid Games Theorem It is undecidable whether Attacker has a winning strategy in these games. Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

4 Weighted Word Games Players are given sets of words over free group alphabet. They play words in turns. Attacker s goal to reach a certain word. Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

5 Word Games on pairs of group words Similar to Weighted Word Games but now the weight is encoded as a unary word. Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

6 Matrix Games Players are given sets of matrices from SL(n, Z). We encode words from Word Games on pair of words into 4 4 matrices. M2 M3 M1 x0 x M4 Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

7 Braid Games Two variants - played on 3 (B 3 ) or 5 strands (B 5 ). Players are given sets of braid words. = Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

8 Universality Problem for Finite Automata For given Finite Automaton A, over alphabet A, is its language L(A) = A? For given Büchi Automaton B, over alphabet A, is its language L(B) = A ω? Both are known to be decidable. Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

9 Universality Problem for Weighted Automata Extend automaton by adding weight function γ to transitions. For given Weighted Automaton A γ, over alphabet A, is its language L(A γ ) = A? Shown to be undecidable by Halava and Harju in Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

10 Weighted automaton on Infinite Words Let A = (Q, A, σ, q 0, F, Z) be a finite automaton, where Q is the set of states, A is the alphabet, σ is the set of transitions, q 0 is the initial state, F is the set of final states, and Z is the additive group of integers. Transitions In the form t = q, a, q, z. Weight of a path Let π = t i0 t i1 be an infinite path of A. Let p π be a finite prefix. Weight of p is γ(p) = z z n Z. Acceptance condition Let w A ω. It is accepted by A if there exists a computation π such that infinite number of its prefixes p have zero weight. (a, 1) (a, 1) (a, 0), (b, 0) (b, 2) (a, 0), (b, 0) Words beginning with aab, aba or baa are accepted. Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

11 Infinite Post Correspondence Problem (ωpcp) In ωpcp we are given two morphisms h, g : A B. Does there exist an infinite word w such that for all prefixes p either h(p) < g(p) or g(p) < h(p)? Shown to be undecidable by Halava and Harju for domain alphabets A 9 and improved to A 8 by Dong and Liu. Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

12 Idea of construction The goal is to construct an automaton A such that L(A) = A ω if and only if the instance of ωpcp has no solution. An infinite word w A ω is accepted by A if and only if for some finite prefix p of w, g(p) h(p) and h(p) g(p). Such a prefix p does exist for all infinite words except for the solutions of the instance (h, g). We call the verification of such a prefix p error checking. Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

13 One possible path in the automaton h : g : abaab ab aab aa babaa k aba a babaab a aba b abaa A B C l D j k i l Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

14 Example Relevant part of the automaton ω PCP instance Let g(1) = 12, g(2) = 12, h(1) = 1, h(2) = 2. q0 (1, 1), (2, 0) (1, 5), (2, 5) q1 (1, 1), (1, 5) (2, 1), (2, 5) (1, 3), (2, 3) q2 (1, 0) (2, 0) q4 (1, 5) (2, 4) We ll show that non-solutions are accepted and why the solution is not accepted. Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

15 Example ω PCP instance Let g(1) = 12, g(2) = 12, h(1) = 1, h(2) = 2. Relevant part of the automaton q0 (1, 1), (2, 0) (1, 5), (2, 5) q1 (1, 1), (1, 5) (2, 1), (2, 5) (1, 3), (2, 3) (1, 0) (2, 0) q2 q4 (1, 5) (2, 4) Clearly w = is the solution. Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

16 Example ω PCP instance Let g(1) = 12, g(2) = 12, h(1) = 1, h(2) = 2. Relevant part of the automaton q0 (1, 1), (2, 0) (1, 5), (2, 5) q1 (1, 1), (1, 5) (2, 1), (2, 5) (1, 3), (2, 3) (1, 0) (2, 0) q2 q4 (1, 5) (2, 4) Clearly w = is the solution. Computation path (1, 1) The counter is 1, i.e. this is not an accepting path. q0 (1, 0) (2, 0) q4 Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

17 Example ω PCP instance Let g(1) = 12, g(2) = 12, h(1) = 1, h(2) = 2. Relevant part of the automaton q0 (1, 1), (2, 0) (1, 5), (2, 5) q1 (1, 1), (1, 5) (2, 1), (2, 5) (1, 3), (2, 3) (1, 0) (2, 0) q2 q4 (1, 5) (2, 4) Clearly w = is the solution. Computation path q0 (1, 5) (1, 3), (2, 3) q2 (1, 5) (2, 4) (1, 0) (2, 0) q4 The counter is 5 3 2k 4 (when (2, 4) is the final transition) or 5 3 (2k + 1) 5 (when (1, 5) is the final transition) for some k N, i.e. this is not an accepting path. Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

18 Example ω PCP instance Let g(1) = 12, g(2) = 12, h(1) = 1, h(2) = 2. Relevant part of the automaton q0 (1, 1), (2, 0) (1, 5), (2, 5) q1 (1, 1), (1, 5) (2, 1), (2, 5) (1, 3), (2, 3) (1, 0) (2, 0) q2 q4 (1, 5) (2, 4) Clearly w = is the solution. Computation path q0 (1, 3) q1 (1, 1), (1, 5) (2, 1), (2, 5) (1, 3), (2, 3) q2 (1, 0) (2, 0) q4 (1, 5) (2, 4) Let s consider one of the possible paths. Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

19 Example ω PCP instance Let g(1) = 12, g(2) = 12, h(1) = 1, h(2) = 2. Relevant part of the automaton q0 (1, 1), (2, 0) (1, 5), (2, 5) q1 (1, 1), (1, 5) (2, 1), (2, 5) (1, 3), (2, 3) (1, 0) (2, 0) q2 q4 (1, 5) (2, 4) Clearly w = is the solution. Computation path q0 (1, 3) q1 (1, 1) (1, 3), (2, 3) q2 (1, 0) (2, 0) q4 (2, 4) Now the counter is 3 2k k 4 for some k, k N, i.e. this is not an accepting path. Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

20 Example ω PCP instance Let g(1) = 12, g(2) = 12, h(1) = 1, h(2) = 2. Relevant part of the automaton q0 (1, 1), (2, 0) (1, 5), (2, 5) q1 (1, 1), (1, 5) (2, 1), (2, 5) (1, 3), (2, 3) (1, 0) (2, 0) q2 q4 (1, 5) (2, 4) Consider w = 2. Computation path (2, 0) The counter is 0, i.e. this is an accepting path. q0 (1, 0) (2, 0) q4 Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

21 Example ω PCP instance Let g(1) = 12, g(2) = 12, h(1) = 1, h(2) = 2. Relevant part of the automaton q0 (1, 1), (2, 0) (1, 5), (2, 5) q1 (1, 1), (1, 5) (2, 1), (2, 5) (1, 3), (2, 3) (1, 0) (2, 0) q2 q4 (1, 5) (2, 4) Consider w = 11. Computation path q0 (1, 5) q2 (1, 0) (2, 0) q4 (1, 5) The counter is 0, i.e. this is an accepting path. Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

22 Example ω PCP instance Let g(1) = 12, g(2) = 12, h(1) = 1, h(2) = 2. Relevant part of the automaton q0 (1, 1), (2, 0) (1, 5), (2, 5) q1 (1, 1), (1, 5) (2, 1), (2, 5) (1, 3), (2, 3) (1, 0) (2, 0) q2 q4 (1, 5) (2, 4) Consider w = 122. Computation path q0 (1, 3) q1 (2, 1) q2 (1, 0) (2, 0) q4 (2, 4) The counter is 0, i.e. this is an accepting path. Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

23 Additional paths are needed for different forms of PCP instances: Image under h is longer and error is far away (part C is non-empty). Image under g is longer and error is far away (part C is non-empty). Image under h is longer and error is close (part C is empty, parts B and D are done simultaneously). Image under g is longer and error is close (part C is empty, parts B and D are done simultaneously). Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

24 Theorem It is undecidable whether or not L(A) = A ω holds for 5-state integer weighted automata A on infinite words over alphabet A. Theorem It is undecidable whether or not L R (B) = A ω holds for 5-state integer weighted automata B on infinite words over alphabet A using reverse acceptance condition. Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

25 Attacker-Defender Games Two players: Attacker, Defender. Players play in turns using available moves. Initial and target configurations. Configuration is a sequence of alternating moves. Play is an infinite sequence of configurations. Attacker wins if target configuration is in reachable in a play starting from initial configuration. Otherwise Defender wins. Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

26 Games we consider 1 Weighted Word Games 2 Word Game on pairs of group words 3 Matrix Games 4 Braid Games Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

27 Weighted Word Games Players are given sets of words over free group alphabet. Defender plays a word of the automaton letter by letter. Attacker plays words corresponding to the letter played by Defender and respecting the structure of the automaton. Attacker tries to reach the word corresponding to the accepting configuration starting from the word corresponding to the initial configuration. Attacker has a winning strategy if and only if every word that Defender plays is accepted, that is the automaton is universal. Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

28 Word Games on pairs of group words Similar to Weighted Word Games but now the weight is encoded as a unary word. Using an additional trick, initial and final words are (ε, ε). Attacker has a winning strategy if and only if every word that Defender plays is accepted, that is the automaton is universal. Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

29 Idea of construction for Word Game Initial word q 0. Defender plays letter a. Current word: q 0 a Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

30 Idea of construction for Word Game Initial word q 0. Attacker plays word a q 0 q 1 corresponding to transition q 0, a, q 1. Current word: q 0 a(a q 0 q 1 ) = q 1 Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

31 Idea of construction for Word Game Initial word q 0. Defender plays letter b. Current word: q 1 b Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

32 Idea of construction for Word Game Initial word q 0. Attacker plays word bq 1 q 2 corresponding to transition q 1, b, q 2. Current word: q 1 b(bq 1 q 2 ) = q 2 If Attacker does not match the letter or plays incorrect transition, uncancellable elements will remain. In actual Word Game, the construction is slightly more complicated. Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

33 Counter Example (In previous construction, Attacker commits to a path, while Defender does not commit to a word.) Universal automaton q0 (a, 1) q1 (b, 0) (a, 1) (b, 0) (a, 1) (a, 0) (b, 1) q2 (a, 0) (b, 0) Now from q 0, Defender plays a. If Attacker plays a q 0 q 1, then Defender will play only b and there is no path with 0 weight. If Attacker plays a q 0 q 2, then Defender will play only a and there is no path with 0 weight. Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

34 Matrix Games Players are given sets of matrices from SL(n, Z). Starting from initial vector x 0, players apply their matrices in turns. Attacker s goal is to reach x 0. We encode words from Word Games on pair of words into 4 4 matrices. Since matrices are from SL(4, Z), this is only possible when matrix played by the players is the identity matrix. Identity matrix is reachable if and only if the empty word is reachable in the Word Game. M3 M2 M1 x0 x M4 Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

35 Braid Games Two variants - played on 3 (B 3 ) or 5 strands (B 5 ). Players are given sets of braid words. In B 3, starting from a braid word corresponding to the initial word of Weighted Word Game, Attacker s aim is to reach the trivial braid. B 5 contains direct product of two free groups of rank 2 as a subgroup. We encode words of Word Game on pair of words into braids. In both variants, the trivial braid is reachable if and only if the empty word is reachable in the corresponding Word Game. = Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

36 THANK YOU! Halava, Harju, Niskanen, Potapov Weighted Automata on Infinite Words in... Automatic / 27

C H A P T E R Regular Expressions regular expression

C H A P T E R Regular Expressions regular expression 7 CHAPTER Regular Expressions Most programmers and other power-users of computer systems have used tools that match text patterns. You may have used a Web search engine with a pattern like travel cancun

More information

The Halting Problem is Undecidable

The Halting Problem is Undecidable 185 Corollary G = { M, w w L(M) } is not Turing-recognizable. Proof. = ERR, where ERR is the easy to decide language: ERR = { x { 0, 1 }* x does not have a prefix that is a valid code for a Turing machine

More information

CMPSCI 250: Introduction to Computation. Lecture #19: Regular Expressions and Their Languages David Mix Barrington 11 April 2013

CMPSCI 250: Introduction to Computation. Lecture #19: Regular Expressions and Their Languages David Mix Barrington 11 April 2013 CMPSCI 250: Introduction to Computation Lecture #19: Regular Expressions and Their Languages David Mix Barrington 11 April 2013 Regular Expressions and Their Languages Alphabets, Strings and Languages

More information

Formal Languages and Automata Theory - Regular Expressions and Finite Automata -

Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Samarjit Chakraborty Computer Engineering and Networks Laboratory Swiss Federal Institute of Technology (ETH) Zürich March

More information

Automata and Formal Languages

Automata and Formal Languages Automata and Formal Languages Winter 2009-2010 Yacov Hel-Or 1 What this course is all about This course is about mathematical models of computation We ll study different machine models (finite automata,

More information

(IALC, Chapters 8 and 9) Introduction to Turing s life, Turing machines, universal machines, unsolvable problems.

(IALC, Chapters 8 and 9) Introduction to Turing s life, Turing machines, universal machines, unsolvable problems. 3130CIT: Theory of Computation Turing machines and undecidability (IALC, Chapters 8 and 9) Introduction to Turing s life, Turing machines, universal machines, unsolvable problems. An undecidable problem

More information

Algorithmic Software Verification

Algorithmic Software Verification Algorithmic Software Verification (LTL Model Checking) Azadeh Farzan What is Verification Anyway? Proving (in a formal way) that program satisfies a specification written in a logical language. Formal

More information

Informatique Fondamentale IMA S8

Informatique Fondamentale IMA S8 Informatique Fondamentale IMA S8 Cours 1 - Intro + schedule + finite state machines Laure Gonnord http://laure.gonnord.org/pro/teaching/ Laure.Gonnord@polytech-lille.fr Université Lille 1 - Polytech Lille

More information

Local periods and binary partial words: An algorithm

Local periods and binary partial words: An algorithm Local periods and binary partial words: An algorithm F. Blanchet-Sadri and Ajay Chriscoe Department of Mathematical Sciences University of North Carolina P.O. Box 26170 Greensboro, NC 27402 6170, USA E-mail:

More information

Regular Languages and Finite State Machines

Regular Languages and Finite State Machines Regular Languages and Finite State Machines Plan for the Day: Mathematical preliminaries - some review One application formal definition of finite automata Examples 1 Sets A set is an unordered collection

More information

Testing LTL Formula Translation into Büchi Automata

Testing LTL Formula Translation into Büchi Automata Testing LTL Formula Translation into Büchi Automata Heikki Tauriainen and Keijo Heljanko Helsinki University of Technology, Laboratory for Theoretical Computer Science, P. O. Box 5400, FIN-02015 HUT, Finland

More information

The Model Checker SPIN

The Model Checker SPIN The Model Checker SPIN Author: Gerard J. Holzmann Presented By: Maulik Patel Outline Introduction Structure Foundation Algorithms Memory management Example/Demo SPIN-Introduction Introduction SPIN (Simple(

More information

Omega Automata: Minimization and Learning 1

Omega Automata: Minimization and Learning 1 Omega Automata: Minimization and Learning 1 Oded Maler CNRS - VERIMAG Grenoble, France 2007 1 Joint work with A. Pnueli, late 80s Summary Machine learning in general and of formal languages in particular

More information

Techniques algébriques en calcul quantique

Techniques algébriques en calcul quantique Techniques algébriques en calcul quantique E. Jeandel Laboratoire de l Informatique du Parallélisme LIP, ENS Lyon, CNRS, INRIA, UCB Lyon 8 Avril 25 E. Jeandel, LIP, ENS Lyon Techniques algébriques en calcul

More information

Overview of E0222: Automata and Computability

Overview of E0222: Automata and Computability Overview of E0222: Automata and Computability Deepak D Souza Department of Computer Science and Automation Indian Institute of Science, Bangalore. August 3, 2011 What this course is about What we study

More information

CSE 135: Introduction to Theory of Computation Decidability and Recognizability

CSE 135: Introduction to Theory of Computation Decidability and Recognizability CSE 135: Introduction to Theory of Computation Decidability and Recognizability Sungjin Im University of California, Merced 04-28, 30-2014 High-Level Descriptions of Computation Instead of giving a Turing

More information

CAs and Turing Machines. The Basis for Universal Computation

CAs and Turing Machines. The Basis for Universal Computation CAs and Turing Machines The Basis for Universal Computation What We Mean By Universal When we claim universal computation we mean that the CA is capable of calculating anything that could possibly be calculated*.

More information

RACE TO CLEAR THE MAT

RACE TO CLEAR THE MAT RACE TO CLEAR THE MAT NUMBER Place Value Counting Addition Subtraction Getting Ready What You ll Need Base Ten Blocks, 1 set per group Base Ten Blocks Place-Value Mat, 1 per child Number cubes marked 1

More information

CS103B Handout 17 Winter 2007 February 26, 2007 Languages and Regular Expressions

CS103B Handout 17 Winter 2007 February 26, 2007 Languages and Regular Expressions CS103B Handout 17 Winter 2007 February 26, 2007 Languages and Regular Expressions Theory of Formal Languages In the English language, we distinguish between three different identities: letter, word, sentence.

More information

Reading 13 : Finite State Automata and Regular Expressions

Reading 13 : Finite State Automata and Regular Expressions CS/Math 24: Introduction to Discrete Mathematics Fall 25 Reading 3 : Finite State Automata and Regular Expressions Instructors: Beck Hasti, Gautam Prakriya In this reading we study a mathematical model

More information

The Theory of Tetris

The Theory of Tetris The Theory of Tetris Hendrik Jan Hoogeboom and Walter A. Kosters Leiden Institute of Advanced Computer Science Universiteit Leiden, The Netherlands {hoogeboo,kosters}@liacs.nl 1 Introduction Any algorithm

More information

3515ICT Theory of Computation Turing Machines

3515ICT Theory of Computation Turing Machines Griffith University 3515ICT Theory of Computation Turing Machines (Based loosely on slides by Harald Søndergaard of The University of Melbourne) 9-0 Overview Turing machines: a general model of computation

More information

Mathematical Induction

Mathematical Induction Mathematical Induction (Handout March 8, 01) The Principle of Mathematical Induction provides a means to prove infinitely many statements all at once The principle is logical rather than strictly mathematical,

More information

Regular Languages and Finite Automata

Regular Languages and Finite Automata Regular Languages and Finite Automata 1 Introduction Hing Leung Department of Computer Science New Mexico State University Sep 16, 2010 In 1943, McCulloch and Pitts [4] published a pioneering work on a

More information

ω-automata Automata that accept (or reject) words of infinite length. Languages of infinite words appear:

ω-automata Automata that accept (or reject) words of infinite length. Languages of infinite words appear: ω-automata ω-automata Automata that accept (or reject) words of infinite length. Languages of infinite words appear: in verification, as encodings of non-terminating executions of a program. in arithmetic,

More information

Reliability Guarantees in Automata Based Scheduling for Embedded Control Software

Reliability Guarantees in Automata Based Scheduling for Embedded Control Software 1 Reliability Guarantees in Automata Based Scheduling for Embedded Control Software Santhosh Prabhu, Aritra Hazra, Pallab Dasgupta Department of CSE, IIT Kharagpur West Bengal, India - 721302. Email: {santhosh.prabhu,

More information

MATH 304 Linear Algebra Lecture 9: Subspaces of vector spaces (continued). Span. Spanning set.

MATH 304 Linear Algebra Lecture 9: Subspaces of vector spaces (continued). Span. Spanning set. MATH 304 Linear Algebra Lecture 9: Subspaces of vector spaces (continued). Span. Spanning set. Vector space A vector space is a set V equipped with two operations, addition V V (x,y) x + y V and scalar

More information

CSC4510 AUTOMATA 2.1 Finite Automata: Examples and D efinitions Definitions

CSC4510 AUTOMATA 2.1 Finite Automata: Examples and D efinitions Definitions CSC45 AUTOMATA 2. Finite Automata: Examples and Definitions Finite Automata: Examples and Definitions A finite automaton is a simple type of computer. Itsoutputislimitedto yes to or no. It has very primitive

More information

Automata on Infinite Words and Trees

Automata on Infinite Words and Trees Automata on Infinite Words and Trees Course notes for the course Automata on Infinite Words and Trees given by Dr. Meghyn Bienvenu at Universität Bremen in the 2009-2010 winter semester Last modified:

More information

A First Investigation of Sturmian Trees

A First Investigation of Sturmian Trees A First Investigation of Sturmian Trees Jean Berstel 2, Luc Boasson 1 Olivier Carton 1, Isabelle Fagnot 2 1 LIAFA, CNRS Université Paris 7 2 IGM, CNRS Université de Marne-la-Vallée Atelier de Combinatoire,

More information

Composability of Infinite-State Activity Automata*

Composability of Infinite-State Activity Automata* Composability of Infinite-State Activity Automata* Zhe Dang 1, Oscar H. Ibarra 2, Jianwen Su 2 1 Washington State University, Pullman 2 University of California, Santa Barbara Presented by Prof. Hsu-Chun

More information

a 11 x 1 + a 12 x 2 + + a 1n x n = b 1 a 21 x 1 + a 22 x 2 + + a 2n x n = b 2.

a 11 x 1 + a 12 x 2 + + a 1n x n = b 1 a 21 x 1 + a 22 x 2 + + a 2n x n = b 2. Chapter 1 LINEAR EQUATIONS 1.1 Introduction to linear equations A linear equation in n unknowns x 1, x,, x n is an equation of the form a 1 x 1 + a x + + a n x n = b, where a 1, a,..., a n, b are given

More information

The Optimum One-Pass Strategy for Juliet

The Optimum One-Pass Strategy for Juliet Master s Thesis One-Pass Strategies for Context-Free Games Christian Cöster August 2015 Examiners: Prof. Dr. Thomas Schwentick Prof. Dr. Christoph Buchheim Technische Universität Dortmund Fakultät für

More information

Grammars with Regulated Rewriting

Grammars with Regulated Rewriting Grammars with Regulated Rewriting Jürgen Dassow Otto-von-Guericke-Universität Magdeburg Fakultät für Informatik Lecture in the 5 th PhD Program Formal Languages and Applications PhD Program Formal Languages

More information

On Winning Conditions of High Borel Complexity in Pushdown Games

On Winning Conditions of High Borel Complexity in Pushdown Games Fundamenta Informaticae (2005) 1 22 1 IOS Press On Winning Conditions of High Borel Complexity in Pushdown Games Olivier Finkel Equipe de Logique Mathématique U.F.R. de Mathématiques, Université Paris

More information

Characterization of some binary words with few squares

Characterization of some binary words with few squares Characterization of some binary words with few squares Golnaz Badkobeh a, Pascal Ochem b a Department of Computer Science, University of Sheffield, UK b CNRS - LIRMM, Montpellier, France Abstract Thue

More information

A glimpse of combinatorics on words

A glimpse of combinatorics on words A glimpse of combinatorics on words Benny George K Tata Institute of Fundamental Research,Mumbai India Indo Russian Workshop 2008 Ural State Univeristy Kenkireth TIFR (INDIA) A glimpse of combinatorics

More information

AN ANALYSIS OF A WAR-LIKE CARD GAME. Introduction

AN ANALYSIS OF A WAR-LIKE CARD GAME. Introduction AN ANALYSIS OF A WAR-LIKE CARD GAME BORIS ALEXEEV AND JACOB TSIMERMAN Abstract. In his book Mathematical Mind-Benders, Peter Winkler poses the following open problem, originally due to the first author:

More information

Turing Machines: An Introduction

Turing Machines: An Introduction CIT 596 Theory of Computation 1 We have seen several abstract models of computing devices: Deterministic Finite Automata, Nondeterministic Finite Automata, Nondeterministic Finite Automata with ɛ-transitions,

More information

Computational Models Lecture 8, Spring 2009

Computational Models Lecture 8, Spring 2009 Slides modified by Benny Chor, based on original slides by Maurice Herlihy, Brown Univ. p. 1 Computational Models Lecture 8, Spring 2009 Encoding of TMs Universal Turing Machines The Halting/Acceptance

More information

Finite Automata. Reading: Chapter 2

Finite Automata. Reading: Chapter 2 Finite Automata Reading: Chapter 2 1 Finite Automata Informally, a state machine that comprehensively captures all possible states and transitions that a machine can take while responding to a stream (or

More information

WRITING PROOFS. Christopher Heil Georgia Institute of Technology

WRITING PROOFS. Christopher Heil Georgia Institute of Technology WRITING PROOFS Christopher Heil Georgia Institute of Technology A theorem is just a statement of fact A proof of the theorem is a logical explanation of why the theorem is true Many theorems have this

More information

MACM 101 Discrete Mathematics I

MACM 101 Discrete Mathematics I MACM 101 Discrete Mathematics I Exercises on Combinatorics, Probability, Languages and Integers. Due: Tuesday, November 2th (at the beginning of the class) Reminder: the work you submit must be your own.

More information

I. GROUPS: BASIC DEFINITIONS AND EXAMPLES

I. GROUPS: BASIC DEFINITIONS AND EXAMPLES I GROUPS: BASIC DEFINITIONS AND EXAMPLES Definition 1: An operation on a set G is a function : G G G Definition 2: A group is a set G which is equipped with an operation and a special element e G, called

More information

Pushdown Automata. place the input head on the leftmost input symbol. while symbol read = b and pile contains discs advance head remove disc from pile

Pushdown Automata. place the input head on the leftmost input symbol. while symbol read = b and pile contains discs advance head remove disc from pile Pushdown Automata In the last section we found that restricting the computational power of computing devices produced solvable decision problems for the class of sets accepted by finite automata. But along

More information

So let us begin our quest to find the holy grail of real analysis.

So let us begin our quest to find the holy grail of real analysis. 1 Section 5.2 The Complete Ordered Field: Purpose of Section We present an axiomatic description of the real numbers as a complete ordered field. The axioms which describe the arithmetic of the real numbers

More information

Representing Reversible Cellular Automata with Reversible Block Cellular Automata

Representing Reversible Cellular Automata with Reversible Block Cellular Automata Discrete Mathematics and Theoretical Computer Science Proceedings AA (DM-CCG), 2001, 145 154 Representing Reversible Cellular Automata with Reversible Block Cellular Automata Jérôme Durand-Lose Laboratoire

More information

Solving Systems of Linear Equations

Solving Systems of Linear Equations LECTURE 5 Solving Systems of Linear Equations Recall that we introduced the notion of matrices as a way of standardizing the expression of systems of linear equations In today s lecture I shall show how

More information

Compiler Construction

Compiler Construction Compiler Construction Regular expressions Scanning Görel Hedin Reviderad 2013 01 23.a 2013 Compiler Construction 2013 F02-1 Compiler overview source code lexical analysis tokens intermediate code generation

More information

Department of Computer Science, University of Otago

Department of Computer Science, University of Otago Department of Computer Science, University of Otago Technical Report OUCS-2005-03 On the Wilf-Stanley limit of 4231-avoiding permutations and a conjecture of Arratia M.H. Albert, Department of Computer

More information

IRREDUCIBLE OPERATOR SEMIGROUPS SUCH THAT AB AND BA ARE PROPORTIONAL. 1. Introduction

IRREDUCIBLE OPERATOR SEMIGROUPS SUCH THAT AB AND BA ARE PROPORTIONAL. 1. Introduction IRREDUCIBLE OPERATOR SEMIGROUPS SUCH THAT AB AND BA ARE PROPORTIONAL R. DRNOVŠEK, T. KOŠIR Dedicated to Prof. Heydar Radjavi on the occasion of his seventieth birthday. Abstract. Let S be an irreducible

More information

Static analysis of parity games: alternating reachability under parity

Static analysis of parity games: alternating reachability under parity 8 January 2016, DTU Denmark Static analysis of parity games: alternating reachability under parity Michael Huth, Imperial College London Nir Piterman, University of Leicester Jim Huan-Pu Kuo, Imperial

More information

Worksheet for Teaching Module Probability (Lesson 1)

Worksheet for Teaching Module Probability (Lesson 1) Worksheet for Teaching Module Probability (Lesson 1) Topic: Basic Concepts and Definitions Equipment needed for each student 1 computer with internet connection Introduction In the regular lectures in

More information

Automata Theory. Şubat 2006 Tuğrul Yılmaz Ankara Üniversitesi

Automata Theory. Şubat 2006 Tuğrul Yılmaz Ankara Üniversitesi Automata Theory Automata theory is the study of abstract computing devices. A. M. Turing studied an abstract machine that had all the capabilities of today s computers. Turing s goal was to describe the

More information

Today s Topics. Primes & Greatest Common Divisors

Today s Topics. Primes & Greatest Common Divisors Today s Topics Primes & Greatest Common Divisors Prime representations Important theorems about primality Greatest Common Divisors Least Common Multiples Euclid s algorithm Once and for all, what are prime

More information

What is Linear Programming?

What is Linear Programming? Chapter 1 What is Linear Programming? An optimization problem usually has three essential ingredients: a variable vector x consisting of a set of unknowns to be determined, an objective function of x to

More information

Finite Automata. Reading: Chapter 2

Finite Automata. Reading: Chapter 2 Finite Automata Reading: Chapter 2 1 Finite Automaton (FA) Informally, a state diagram that comprehensively captures all possible states and transitions that a machine can take while responding to a stream

More information

logic language, static/dynamic models SAT solvers Verified Software Systems 1 How can we model check of a program or system?

logic language, static/dynamic models SAT solvers Verified Software Systems 1 How can we model check of a program or system? 5. LTL, CTL Last part: Alloy logic language, static/dynamic models SAT solvers Today: Temporal Logic (LTL, CTL) Verified Software Systems 1 Overview How can we model check of a program or system? Modeling

More information

Chapter 17. Orthogonal Matrices and Symmetries of Space

Chapter 17. Orthogonal Matrices and Symmetries of Space Chapter 17. Orthogonal Matrices and Symmetries of Space Take a random matrix, say 1 3 A = 4 5 6, 7 8 9 and compare the lengths of e 1 and Ae 1. The vector e 1 has length 1, while Ae 1 = (1, 4, 7) has length

More information

T-79.186 Reactive Systems: Introduction and Finite State Automata

T-79.186 Reactive Systems: Introduction and Finite State Automata T-79.186 Reactive Systems: Introduction and Finite State Automata Timo Latvala 14.1.2004 Reactive Systems: Introduction and Finite State Automata 1-1 Reactive Systems Reactive systems are a class of software

More information

Fundamentele Informatica II

Fundamentele Informatica II Fundamentele Informatica II Answer to selected exercises 1 John C Martin: Introduction to Languages and the Theory of Computation M.M. Bonsangue (and J. Kleijn) Fall 2011 Let L be a language. It is clear

More information

Algebraic Recognizability of Languages

Algebraic Recognizability of Languages of Languages LaBRI, Université Bordeaux-1 and CNRS MFCS Conference, Prague, August 2004 The general problem Problem: to specify and analyse infinite sets by finite means The general problem Problem: to

More information

Matrix Representations of Linear Transformations and Changes of Coordinates

Matrix Representations of Linear Transformations and Changes of Coordinates Matrix Representations of Linear Transformations and Changes of Coordinates 01 Subspaces and Bases 011 Definitions A subspace V of R n is a subset of R n that contains the zero element and is closed under

More information

Learning Analysis by Reduction from Positive Data

Learning Analysis by Reduction from Positive Data Learning Analysis by Reduction from Positive Data František Mráz 1, Friedrich Otto 1, and Martin Plátek 2 1 Fachbereich Mathematik/Informatik, Universität Kassel 34109 Kassel, Germany {mraz,otto}@theory.informatik.uni-kassel.de

More information

6.080/6.089 GITCS Feb 12, 2008. Lecture 3

6.080/6.089 GITCS Feb 12, 2008. Lecture 3 6.8/6.89 GITCS Feb 2, 28 Lecturer: Scott Aaronson Lecture 3 Scribe: Adam Rogal Administrivia. Scribe notes The purpose of scribe notes is to transcribe our lectures. Although I have formal notes of my

More information

Sequential lmove Games. Using Backward Induction (Rollback) to Find Equilibrium

Sequential lmove Games. Using Backward Induction (Rollback) to Find Equilibrium Sequential lmove Games Using Backward Induction (Rollback) to Find Equilibrium Sequential Move Class Game: Century Mark Played by fixed pairs of players taking turns. At each turn, each player chooses

More information

Software Model Checking: Theory and Practice

Software Model Checking: Theory and Practice Software Model Checking: Theory and Practice Lecture: Specification Checking - LTL Model Checking Copyright 2004, Matt Dwyer, John Hatcliff, and Robby. The syllabus and all lectures for this course are

More information

6.045: Automata, Computability, and Complexity Or, Great Ideas in Theoretical Computer Science Spring, 2010. Class 4 Nancy Lynch

6.045: Automata, Computability, and Complexity Or, Great Ideas in Theoretical Computer Science Spring, 2010. Class 4 Nancy Lynch 6.045: Automata, Computability, and Complexity Or, Great Ideas in Theoretical Computer Science Spring, 2010 Class 4 Nancy Lynch Today Two more models of computation: Nondeterministic Finite Automata (NFAs)

More information

Monitoring Metric First-order Temporal Properties

Monitoring Metric First-order Temporal Properties Monitoring Metric First-order Temporal Properties DAVID BASIN, FELIX KLAEDTKE, SAMUEL MÜLLER, and EUGEN ZĂLINESCU, ETH Zurich Runtime monitoring is a general approach to verifying system properties at

More information

Scanner. tokens scanner parser IR. source code. errors

Scanner. tokens scanner parser IR. source code. errors Scanner source code tokens scanner parser IR errors maps characters into tokens the basic unit of syntax x = x + y; becomes = + ; character string value for a token is a lexeme

More information

6.254 : Game Theory with Engineering Applications Lecture 2: Strategic Form Games

6.254 : Game Theory with Engineering Applications Lecture 2: Strategic Form Games 6.254 : Game Theory with Engineering Applications Lecture 2: Strategic Form Games Asu Ozdaglar MIT February 4, 2009 1 Introduction Outline Decisions, utility maximization Strategic form games Best responses

More information

2x + y = 3. Since the second equation is precisely the same as the first equation, it is enough to find x and y satisfying the system

2x + y = 3. Since the second equation is precisely the same as the first equation, it is enough to find x and y satisfying the system 1. Systems of linear equations We are interested in the solutions to systems of linear equations. A linear equation is of the form 3x 5y + 2z + w = 3. The key thing is that we don t multiply the variables

More information

Honors Class (Foundations of) Informatics. Tom Verhoeff. Department of Mathematics & Computer Science Software Engineering & Technology

Honors Class (Foundations of) Informatics. Tom Verhoeff. Department of Mathematics & Computer Science Software Engineering & Technology Honors Class (Foundations of) Informatics Tom Verhoeff Department of Mathematics & Computer Science Software Engineering & Technology www.win.tue.nl/~wstomv/edu/hci c 2011, T. Verhoeff @ TUE.NL 1/20 Information

More information

Name: Section Registered In:

Name: Section Registered In: Name: Section Registered In: Math 125 Exam 3 Version 1 April 24, 2006 60 total points possible 1. (5pts) Use Cramer s Rule to solve 3x + 4y = 30 x 2y = 8. Be sure to show enough detail that shows you are

More information

8 Divisibility and prime numbers

8 Divisibility and prime numbers 8 Divisibility and prime numbers 8.1 Divisibility In this short section we extend the concept of a multiple from the natural numbers to the integers. We also summarize several other terms that express

More information

About the inverse football pool problem for 9 games 1

About the inverse football pool problem for 9 games 1 Seventh International Workshop on Optimal Codes and Related Topics September 6-1, 013, Albena, Bulgaria pp. 15-133 About the inverse football pool problem for 9 games 1 Emil Kolev Tsonka Baicheva Institute

More information

The Ultimate Undecidability Result for the Halpern Shoham Logic

The Ultimate Undecidability Result for the Halpern Shoham Logic The Ultimate Undecidability Result for the Halpern Shoham Logic Jerzy Marcinkowski, Jakub Michaliszyn Institute of Computer Science University Of Wrocław {jma,jmi}@cs.uni.wroc.pl Abstract The Halpern Shoham

More information

Colored Hats and Logic Puzzles

Colored Hats and Logic Puzzles Colored Hats and Logic Puzzles Alex Zorn January 21, 2013 1 Introduction In this talk we ll discuss a collection of logic puzzles/games in which a number of people are given colored hats, and they try

More information

COMPUTER SCIENCE TRIPOS

COMPUTER SCIENCE TRIPOS CST.98.5.1 COMPUTER SCIENCE TRIPOS Part IB Wednesday 3 June 1998 1.30 to 4.30 Paper 5 Answer five questions. No more than two questions from any one section are to be answered. Submit the answers in five

More information

Models of Sequential Computation

Models of Sequential Computation Models of Sequential Computation 13 C H A P T E R Programming is often considered as an art, but it raises mostly practical questions like which language should I choose, which algorithm is adequate, and

More information

Lempel-Ziv Coding Adaptive Dictionary Compression Algorithm

Lempel-Ziv Coding Adaptive Dictionary Compression Algorithm Lempel-Ziv Coding Adaptive Dictionary Compression Algorithm 1. LZ77:Sliding Window Lempel-Ziv Algorithm [gzip, pkzip] Encode a string by finding the longest match anywhere within a window of past symbols

More information

Coverability for Parallel Programs

Coverability for Parallel Programs 2015 http://excel.fit.vutbr.cz Coverability for Parallel Programs Lenka Turoňová* Abstract We improve existing method for the automatic verification of systems with parallel running processes. The technique

More information

Hill s Cipher: Linear Algebra in Cryptography

Hill s Cipher: Linear Algebra in Cryptography Ryan Doyle Hill s Cipher: Linear Algebra in Cryptography Introduction: Since the beginning of written language, humans have wanted to share information secretly. The information could be orders from a

More information

Computability Theory

Computability Theory CSC 438F/2404F Notes (S. Cook and T. Pitassi) Fall, 2014 Computability Theory This section is partly inspired by the material in A Course in Mathematical Logic by Bell and Machover, Chap 6, sections 1-10.

More information

Math 312 Homework 1 Solutions

Math 312 Homework 1 Solutions Math 31 Homework 1 Solutions Last modified: July 15, 01 This homework is due on Thursday, July 1th, 01 at 1:10pm Please turn it in during class, or in my mailbox in the main math office (next to 4W1) Please

More information

Proseminar on Semantic Theory Fall 2013 Ling 720. Problem Set on the Formal Preliminaries : Answers and Notes

Proseminar on Semantic Theory Fall 2013 Ling 720. Problem Set on the Formal Preliminaries : Answers and Notes 1. Notes on the Answers Problem Set on the Formal Preliminaries : Answers and Notes In the pages that follow, I have copied some illustrative answers from the problem sets submitted to me. In this section,

More information

Reliably computing cellular automaton, in 1-sparse noise

Reliably computing cellular automaton, in 1-sparse noise Reliably computing cellular automaton, in 1-sparse noise Peter Gács Boston University Peter Gács (Boston University) TRG Spring 2010 1 / 23 Ths is the second one of a series of three lectures on reliable

More information

Linear Algebra I. Ronald van Luijk, 2012

Linear Algebra I. Ronald van Luijk, 2012 Linear Algebra I Ronald van Luijk, 2012 With many parts from Linear Algebra I by Michael Stoll, 2007 Contents 1. Vector spaces 3 1.1. Examples 3 1.2. Fields 4 1.3. The field of complex numbers. 6 1.4.

More information

Primes in Sequences. Lee 1. By: Jae Young Lee. Project for MA 341 (Number Theory) Boston University Summer Term I 2009 Instructor: Kalin Kostadinov

Primes in Sequences. Lee 1. By: Jae Young Lee. Project for MA 341 (Number Theory) Boston University Summer Term I 2009 Instructor: Kalin Kostadinov Lee 1 Primes in Sequences By: Jae Young Lee Project for MA 341 (Number Theory) Boston University Summer Term I 2009 Instructor: Kalin Kostadinov Lee 2 Jae Young Lee MA341 Number Theory PRIMES IN SEQUENCES

More information

On Omega-Languages Defined by Mean-Payoff Conditions

On Omega-Languages Defined by Mean-Payoff Conditions On Omega-Languages Defined by Mean-Payoff Conditions Rajeev Alur 1, Aldric Degorre 2, Oded Maler 2, Gera Weiss 1 1 Dept. of Computer and Information Science, University of Pennsylvania, USA {alur, gera}@cis.upenn.edu

More information

Two-dimensional Languages

Two-dimensional Languages Charles University Faculty of Mathematics and Physics Mgr. Daniel Průša Two-dimensional Languages Doctoral Thesis Supervisor: Martin Plátek, CSc. Prague, 2004 Acknowledgements The results presented in

More information

Theory of Computation Chapter 2: Turing Machines

Theory of Computation Chapter 2: Turing Machines Theory of Computation Chapter 2: Turing Machines Guan-Shieng Huang Feb. 24, 2003 Feb. 19, 2006 0-0 Turing Machine δ K 0111000a 01bb 1 Definition of TMs A Turing Machine is a quadruple M = (K, Σ, δ, s),

More information

SMALL SKEW FIELDS CÉDRIC MILLIET

SMALL SKEW FIELDS CÉDRIC MILLIET SMALL SKEW FIELDS CÉDRIC MILLIET Abstract A division ring of positive characteristic with countably many pure types is a field Wedderburn showed in 1905 that finite fields are commutative As for infinite

More information

3. Mathematical Induction

3. Mathematical Induction 3. MATHEMATICAL INDUCTION 83 3. Mathematical Induction 3.1. First Principle of Mathematical Induction. Let P (n) be a predicate with domain of discourse (over) the natural numbers N = {0, 1,,...}. If (1)

More information

2110711 THEORY of COMPUTATION

2110711 THEORY of COMPUTATION 2110711 THEORY of COMPUTATION ATHASIT SURARERKS ELITE Athasit Surarerks ELITE Engineering Laboratory in Theoretical Enumerable System Computer Engineering, Faculty of Engineering Chulalongkorn University

More information

Continued Fractions and the Euclidean Algorithm

Continued Fractions and the Euclidean Algorithm Continued Fractions and the Euclidean Algorithm Lecture notes prepared for MATH 326, Spring 997 Department of Mathematics and Statistics University at Albany William F Hammond Table of Contents Introduction

More information

Lecture 9 - Message Authentication Codes

Lecture 9 - Message Authentication Codes Lecture 9 - Message Authentication Codes Boaz Barak March 1, 2010 Reading: Boneh-Shoup chapter 6, Sections 9.1 9.3. Data integrity Until now we ve only been interested in protecting secrecy of data. However,

More information

15-251: Great Theoretical Ideas in Computer Science Anupam Gupta Notes on Combinatorial Games (draft!!) January 29, 2012

15-251: Great Theoretical Ideas in Computer Science Anupam Gupta Notes on Combinatorial Games (draft!!) January 29, 2012 15-251: Great Theoretical Ideas in Computer Science Anupam Gupta Notes on Combinatorial Games (draft!!) January 29, 2012 1 A Take-Away Game Consider the following game: there are 21 chips on the table.

More information

MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.

MATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1. MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column

More information

( ) which must be a vector

( ) which must be a vector MATH 37 Linear Transformations from Rn to Rm Dr. Neal, WKU Let T : R n R m be a function which maps vectors from R n to R m. Then T is called a linear transformation if the following two properties are

More information