SlideShare une entreprise Scribd logo
1  sur  66
Télécharger pour lire hors ligne
Deciding language inclusion problems
using quasiorders
Pierre Ganty IMDEA Software Institute
joint work with Pedro Valero (IMDEA) and Francesco Ranzato (Uni. Padova)
L1
L1
L2
L1
L2
L2
ρ(L1)
L2
ρ(L1)
• ρ is extensive: L ⊆ ρ(L)
• ρ is monotone: L ⊆ L implies ρ(L) ⊆ ρ(L )
• ρ is idempotent: ρ(ρ(L)) = ρ(L)
L2
ρ(L1)
L1 ⊆ L2 iff ρ(L1) ⊆ L2
Assume ρ(L2) = L2, then
ρ(L2) = L2
L1 as a fixed point
q
q
b a
a
lfp λ
Xq
Xq
.
{ } ∪ bXq
∅ ∪ aXq ∪ aXq
L1 as a fixed point
q
q
b a
a
lfp λ
Xq
Xq
.
{ } ∪ bXq
∅ ∪ aXq ∪ aXq
Xq ∅
Xq ∅
L1 as a fixed point
q
q
b a
a
lfp λ
Xq
Xq
.
{ } ∪ bXq
∅ ∪ aXq ∪ aXq
Xq ∅
Xq ∅
{ε}
∅
L1 as a fixed point
q
q
b a
a
lfp λ
Xq
Xq
.
{ } ∪ bXq
∅ ∪ aXq ∪ aXq
Xq ∅
Xq ∅
{ε}
∅
{ε}
{a}
L1 as a fixed point
q
q
b a
a
lfp λ
Xq
Xq
.
{ } ∪ bXq
∅ ∪ aXq ∪ aXq
Lq (ba+
)∗
Lq a+
(ba+
)∗
Xq ∅
Xq ∅
{ε}
∅
{ε}
{a}
L1 as a fixed point
q
q
b a
a
lfp λ
Xq
Xq
.
{ } ∪ bXq
∅ ∪ aXq ∪ aXq
L1 = Lq = (ba+
)∗
= lfp λX. b ∪ Fn(X) q
Lq (ba+
)∗
Lq a+
(ba+
)∗
Xq ∅
Xq ∅
{ε}
∅
{ε}
{a}
L1 as a fixed point
q
q
b a
a
lfp λ
Xq
Xq
.
{ } ∪ bXq
∅ ∪ aXq ∪ aXq
L1 = Lq = (ba+
)∗
= lfp λX. b ∪ Fn(X) q
Lq (ba+
)∗
Lq a+
(ba+
)∗
Xq ∅
Xq ∅
{ε}
∅
{ε}
{a}
b Fn
ρ(L1) = ρ lfp λX. b ∪ Fn(X)
ρ(L1)
if ρ is complete for Fn (i.e. ρ Fn ρ = ρ Fn) then
ρ(L1) = lfp λX. ρ b ∪ Fn(X)
ρ(L1) = ρ lfp λX. b ∪ Fn(X)
ρ(L1)
if ρ is complete for Fn (i.e. ρ Fn ρ = ρ Fn) then
ρ(L1) = lfp λX. ρ b ∪ Fn(X)
ρ is complete for Fn
Wanted
ρ(L2) = L2
ρ is complete for Fn
Quasiorder induced ρ
Given a quasiorder on words, define
ρ (X) = {y | ∃x ∈ X : x y}
Quasiorder induced ρ
Given a quasiorder on words, define
ρ (X) = {y | ∃x ∈ X : x y}
∩ (L2 × L2) = ∅
x y implies a x a y for all a
Quasiorder induced ρ
Given a quasiorder on words, define
ρ (X) = {y | ∃x ∈ X : x y}
∩ (L2 × L2) = ∅
x y implies a x a y for all a
ρ (L2) = L2
ρ is complete for λX. aX for all a
Quasiorder induced ρ
Given a quasiorder on words, define
ρ (X) = {y | ∃x ∈ X : x y}
∩ (L2 × L2) = ∅
x y implies a x a y for all a
ρ (L2) = L2
ρ is complete for λX. aX for all a
is a left L2
consistent qo
Example of quasiorder
Nerode left quasiorder relative to L2 [Varricchio,deLuca’94]
x l
L2
y ⇔ L2 x−1
⊆ L2 y−1
Example of quasiorder
Nerode left quasiorder relative to L2 [Varricchio,deLuca’94]
x l
L2
y ⇔ L2 x−1
⊆ L2 y−1
Lx−1
= {w | wx ∈ L}
Example of quasiorder
Nerode left quasiorder relative to L2 [Varricchio,deLuca’94]
x l
L2
y ⇔ L2 x−1
⊆ L2 y−1
l
L2
is left L2 consistent
Example of quasiorder
Nerode left quasiorder relative to L2 [Varricchio,deLuca’94]
x l
L2
y ⇔ L2 x−1
⊆ L2 y−1
l
L2
is left L2 consistent
l
L2
is a well-quasi order if L2 is regular
Example of quasiorder
Nerode left quasiorder relative to L2 [Varricchio,deLuca’94]
x l
L2
y ⇔ L2 x−1
⊆ L2 y−1
l
L2
is left L2 consistent
l
L2
is a well-quasi order if L2 is regular
l
L2
is decidable if L2 is regular
Deciding L1 ⊆ L2 using Nerode’s left qo l
L2
L1 ⊆ L2 iff ρ l
L2
(L1) ⊆ L2
Deciding L1 ⊆ L2 using Nerode’s left qo l
L2
L1 ⊆ L2 iff ρ l
L2
(L1) ⊆ L2
ρ l
L2
(L1)
Deciding L1 ⊆ L2 using Nerode’s left qo l
L2
L1 ⊆ L2 iff ρ l
L2
(L1) ⊆ L2
ρ l
L2
(L1)
L2
Deciding L1 ⊆ L2 using Nerode’s left qo l
L2
L1 ⊆ L2 iff ρ l
L2
(L1) ⊆ L2
iff min l
L2
(ρ l
L2
(L1)) ⊆ L2
ρ l
L2
(L1)
L2
Deciding L1 ⊆ L2 using Nerode’s left qo l
L2
L1 ⊆ L2 iff ρ l
L2
(L1) ⊆ L2
iff min l
L2
(ρ l
L2
(L1)) ⊆ L2
iff ∀w ∈ min l
L2
(ρ l
L2
(L1)): w ∈ L2
ρ l
L2
(L1)
L2
Deciding L1 ⊆ L2 using l
L2
(cont’d)
L1 ⊆ L2 iff ∀w ∈ min l
L2
(ρ l
L2
(L1)): w ∈ L2
Deciding L1 ⊆ L2 using l
L2
(cont’d)
L1 ⊆ L2 iff ∀w ∈ min l
L2
(ρ l
L2
(L1)): w ∈ L2
iff ∀w ∈ min l
L2
(lfp λX. ρ l
L2
b ∪ Fn(X) : w ∈ L2
Deciding L1 ⊆ L2 using l
L2
(cont’d)
L1 ⊆ L2 iff ∀w ∈ min l
L2
(ρ l
L2
(L1)): w ∈ L2
iff ∀w ∈ min l
L2
(lfp λX. ρ l
L2
b ∪ Fn(X) : w ∈ L2
Deciding L1 ⊆ L2 using l
L2
(cont’d)
L1 ⊆ L2 iff ∀w ∈ min l
L2
(ρ l
L2
(L1)): w ∈ L2
iff ∀w ∈ min l
L2
(lfp λX. ρ l
L2
b ∪ Fn(X) : w ∈ L2
Deciding L1 ⊆ L2 using l
L2
(cont’d)
L1 ⊆ L2 iff ∀w ∈ min l
L2
(ρ l
L2
(L1)): w ∈ L2
iff ∀w ∈ min l
L2
(lfp λX. ρ l
L2
b ∪ Fn(X) : w ∈ L2
Deciding L1 ⊆ L2 using l
L2
(cont’d)
L1 ⊆ L2 iff ∀w ∈ min l
L2
(ρ l
L2
(L1)): w ∈ L2
iff ∀w ∈ min l
L2
(lfp λX. ρ l
L2
b ∪ Fn(X) : w ∈ L2
Deciding L1 ⊆ L2 using l
L2
(cont’d)
L1 ⊆ L2 iff ∀w ∈ min l
L2
(ρ l
L2
(L1)): w ∈ L2
iff ∀w ∈ lfp λX. min l
L2
b ∪ Fn(X) : w ∈ L2
iff ∀w ∈ min l
L2
(lfp λX. ρ l
L2
b ∪ Fn(X) : w ∈ L2
Deciding L1 ⊆ L2 using l
L2
(cont’d)
L1 ⊆ L2 iff ∀w ∈ min l
L2
(ρ l
L2
(L1)): w ∈ L2
iff ∀w ∈ lfp λX. min l
L2
b ∪ Fn(X) : w ∈ L2
iff ∀w ∈ min l
L2
(lfp λX. ρ l
L2
b ∪ Fn(X) : w ∈ L2
Word-based antichain algorithm for L(A) ⊆ L2
Data: FA A = Q, δ, q0
, F
Data: L2 regular
1 Yq q∈Q := ∅;
2 repeat
3 Xq q∈Q := Yq q∈Q;
4 Yq q∈Q := min l
L2
b ∪ Fn( Yq q∈Q) ;
5 until ρ l
L2
( Yq q∈Q) ⊆ ρ l
L2
( Xq q∈Q);
6 forall u ∈ Yq0 do
7 if u /∈ L2 then return false;
8 return true;
What else?
Nerode left quasiorder relative to L2 [Varricchio,deLuca’94]
x l
L2
y ⇔ L2 x−1
⊆ L2 y−1
What else?
State based quasiorder
Let A2 = Q2, δ2, q0
2, F2 be an automaton for L2
x l
A2
y ⇔ prex(F2) ⊆ prey(F2)
Nerode left quasiorder relative to L2 [Varricchio,deLuca’94]
x l
L2
y ⇔ L2 x−1
⊆ L2 y−1
What else?
State based quasiorder
Let A2 = Q2, δ2, q0
2, F2 be an automaton for L2
x l
A2
y ⇔ prex(F2) ⊆ prey(F2)
Nerode left quasiorder relative to L2 [Varricchio,deLuca’94]
x l
L2
y ⇔ L2 x−1
⊆ L2 y−1
1. l
A2
∩ (L2 × L2) = ∅
2. x l
A2
y implies a x l
A2
a y for all a
3. l
A2
is a well-quasiorder
4. l
A2
is decidable
What else?
State based quasiorder
Let A2 = Q2, δ2, q0
2, F2 be an automaton for L2
x l
A2
y ⇔ prex(F2) ⊆ prey(F2)
Nerode left quasiorder relative to L2 [Varricchio,deLuca’94]
x l
L2
y ⇔ L2 x−1
⊆ L2 y−1
1. l
A2
∩ (L2 × L2) = ∅
2. x l
A2
y implies a x l
A2
a y for all a
3. l
A2
is a well-quasiorder
4. l
A2
is decidable
l
A2
is left L2 consistent
decidable wqo
Word-based antichain algorithm for L(A1) ⊆ L(A2)
Data: FA A1 = Q1, δ1, q0
1, F1
Data: FA A2 = Q2, δ2, q0
2, F2
1 Yq q∈Q1
:= ∅;
2 repeat
3 Xq q∈Q1
:= Yq q∈Q1
;
4 Yq q∈Q1
:= min l
A2
b ∪ Fn( Yq q∈Q1
) ;
5 until ρ l
A2
( Yq q∈Q1
) ⊆ ρ l
A2
( Xq q∈Q1
);
6 forall u ∈ Yq0
1
do
7 if u /∈ L(A2) then return false;
8 return true;
Word-based antichain algorithm for L(A1) ⊆ L(A2)
Data: FA A1 = Q1, δ1, q0
1, F1
Data: FA A2 = Q2, δ2, q0
2, F2
1 Yq q∈Q1
:= ∅;
2 repeat
3 Xq q∈Q1
:= Yq q∈Q1
;
4 Yq q∈Q1
:= min l
A2
b ∪ Fn( Yq q∈Q1
) ;
5 until ρ l
A2
( Yq q∈Q1
) ⊆ ρ l
A2
( Xq q∈Q1
);
6 forall u ∈ Yq0
1
do
7 if u /∈ L(A2) then return false;
8 return true;
State based quasiorder
Let A2 = Q2, δ2, q0
2, F2 be an automaton for L2
x l
A2
y ⇔ prex(F2) ⊆ prey(F2)
Ditching words altogether
State-based antichain algorithm for L(A1) ⊆ L(A2)
Data: FA A1 = Q1, δ1, q0
1, F1
Data: FA A2 = Q2, δ2, q0
2, F2
1 Yq q∈Q1
:= ∅;
2 repeat
3 Xq q∈Q1
:= Yq q∈Q1
;
4 Yq q∈Q1 := [. . .];
5 until Yq ⊆∀∃
Xq, for all q ∈ Q1;
6 forall s ∈ Yq0
1
do
7 if q0
2 /∈ s then return false;
8 return true;
[. . .] = min⊆∀∃ {preA2
a (s) | ∃a ∈ Σ, q ∈ δ1(q, a), s ∈ Xq } ∪ F2
• Same as antichain algo
• Derived from general solution instantiated to l
A2
• Variants of the antichain algorithm as instantiations
• Simulation enhanced qo 2
• Nerode’s qo induce the coarsest qo based abstractions
• Same as antichain algo
• Derived from general solution instantiated to l
A2
• Variants of the antichain algorithm as instantiations
• Simulation enhanced qo 2
• Nerode’s qo induce the coarsest qo based abstractions
l
L2
and r
L2
are wqo’s if L2 is regular
L2 is a one-counter net trace set
q2
q1
q3a, 1
a, 0
a, −1
b, 1
The right Nerode qo for L2 ( r
L2
) is a wqo but it’s undecidable
u r
O2
v is a right L2 consistent decidable wqo
u r
O2
v iff mu ≤ mv where mu, mv ∈ (N ∪ {⊥})3
L2 = L(O2) is the set of traces
from configuration q2 0
Decision procedure for L(A1) ⊆ L(O2) using r
O2
Word-based antichain algorithm for L(A) ⊆ L(O2)
Data: FA A = Q, δ, q0
, F
Data: OCN O2
1 Yq q∈Q := ∅;
2 repeat
3 Xq q∈Q := Yq q∈Q;
4 Yq q∈Q := min r
O2
b ∪ Gn( Yq q∈Q) ;
5 until ρ r
O2
( Yq q∈Q) ⊆ ρ r
O2
( Xq q∈Q);
6 forall u ∈ Yq0 do
7 if u /∈ L2 then return false;
8 return true;
So far. . .
L(A1) ⊆ L(A2)
L(A1) ⊆ L(O2)
ρ(L1) = ρ lfp λX. b ∪ Fn(X)
= lfp λX. ρ b ∪ Fn(X)
L2
ρ(L1)
ρ(L1) = ρ lfp λX. b ∪ Fn(X)
= lfp λX. ρ b ∪ Fn(X)
L2
ρ(L1)
ρ Fn ρ = ρ Fn
ρ(L1) = ρ lfp λX. b ∪ Fn(X)
= lfp λX. ρ b ∪ Fn(X)
L2
ρ(L1)
When L1 is regular, ρ is complete for λX. aX for all a
ρ Fn ρ = ρ Fn
lfp λ
Xq
Xq
.
{ } ∪ bXq
∅ ∪ aXq ∪ aXq
Quasiorders for the case L(G1) ⊆ L(A2)
FnG1
is more general: from aX, Xa, aXb, XX
Quasiorders for the case L(G1) ⊆ L(A2)
FnG1
is more general: from aX, Xa, aXb, XX
ρ(L1) = lfp λX. ρ b ∪ FnG1 (X)
if ρ is complete for λX. aX and λX. Xa for all a
Quasiorders for the case L(G1) ⊆ L(A2)
FnG1
is more general: from aX, Xa, aXb, XX
1. ∩ (L2 × L2) = ∅
2. x y implies a x a y and x a y a for all a
ρ(L1) = lfp λX. ρ b ∪ FnG1 (X)
if ρ is complete for λX. aX and λX. Xa for all a
Quasiorders for the case L(G1) ⊆ L(A2)
Myhill quasiorder relative to L2 [Varricchio, deLuca’94]
x L2
y ⇔ {(u, v) | u x v∈L2} ⊆ {(u, v) | u y v∈L2}
FnG1
is more general: from aX, Xa, aXb, XX
1. ∩ (L2 × L2) = ∅
2. x y implies a x a y and x a y a for all a
ρ(L1) = lfp λX. ρ b ∪ FnG1 (X)
if ρ is complete for λX. aX and λX. Xa for all a
Quasiorders for the case L(G1) ⊆ L(A2)
Myhill quasiorder relative to L2 [Varricchio, deLuca’94]
x L2
y ⇔ {(u, v) | u x v∈L2} ⊆ {(u, v) | u y v∈L2}
State based quasi order [Netys’15]
x A2
y ⇔ {(q, q ) | q
x
q } ⊆ {(q, q ) | q
y
q }
FnG1
is more general: from aX, Xa, aXb, XX
1. ∩ (L2 × L2) = ∅
2. x y implies a x a y and x a y a for all a
ρ(L1) = lfp λX. ρ b ∪ FnG1 (X)
if ρ is complete for λX. aX and λX. Xa for all a
Greatest fixpoint based approach
lfp λX. b ∪ Fn(X) ⊆ L2 iff b ⊆ gfp λX. L2 ∩ Fn(X)
∪ becomes ∩
λX. aX becomes λX. a−1
X
ρ Fn ρ = ρ Fn becomes ρ Fn ρ = Fn ρ
gfp λX. ρ(L2 ∩ Fn(X)) stepwise equal gfp λX. L2 ∩ Fn(X)
Greatest fixpoint based approach
lfp λX. b ∪ Fn(X) ⊆ L2 iff b ⊆ gfp λX. L2 ∩ Fn(X)
∪ becomes ∩
λX. aX becomes λX. a−1
X
ρ Fn ρ = ρ Fn becomes ρ Fn ρ = Fn ρ
gfp λX. ρ(L2 ∩ Fn(X)) stepwise equal gfp λX. L2 ∩ Fn(X)
Does not terminate in general
Greatest fixpoint based approach
lfp λX. b ∪ Fn(X) ⊆ L2 iff b ⊆ gfp λX. L2 ∩ Fn(X)
∪ becomes ∩
λX. aX becomes λX. a−1
X
ρ Fn ρ = ρ Fn becomes ρ Fn ρ = Fn ρ
gfp λX. ρ(L2 ∩ Fn(X)) stepwise equal gfp λX. L2 ∩ Fn(X)
Does not terminate in general
Does always terminate 1
Conclusion
Promising framework for language inclusion
Conclusion
Promising framework for language inclusion
Extension to trees, ω-languages, timed languages,. . .
Conclusion
Promising framework for language inclusion
Extension to trees, ω-languages, timed languages,. . .
Technical Report 1904.01388 on arxiv.org

Contenu connexe

Tendances

Harmonic Analysis and Deep Learning
Harmonic Analysis and Deep LearningHarmonic Analysis and Deep Learning
Harmonic Analysis and Deep LearningSungbin Lim
 
Proof of Kraft-McMillan theorem
Proof of Kraft-McMillan theoremProof of Kraft-McMillan theorem
Proof of Kraft-McMillan theoremVu Hung Nguyen
 
Finite automata examples
Finite automata examplesFinite automata examples
Finite automata examplesankitamakin
 
Algoritmos Greedy
Algoritmos GreedyAlgoritmos Greedy
Algoritmos Greedyluzenith_g
 
Maksim Zhukovskii – Zero-one k-laws for G(n,n−α)
Maksim Zhukovskii – Zero-one k-laws for G(n,n−α)Maksim Zhukovskii – Zero-one k-laws for G(n,n−α)
Maksim Zhukovskii – Zero-one k-laws for G(n,n−α)Yandex
 
Predicates and Quantifiers
Predicates and Quantifiers Predicates and Quantifiers
Predicates and Quantifiers Istiak Ahmed
 
Boolean Programs and Quantified Propositional Proof System -
Boolean Programs and Quantified Propositional Proof System - Boolean Programs and Quantified Propositional Proof System -
Boolean Programs and Quantified Propositional Proof System - Michael Soltys
 
Random variables
Random variablesRandom variables
Random variablesMenglinLiu1
 
Intro probability 2
Intro probability 2Intro probability 2
Intro probability 2Phong Vo
 
The Euclidean Spaces (elementary topology and sequences)
The Euclidean Spaces (elementary topology and sequences)The Euclidean Spaces (elementary topology and sequences)
The Euclidean Spaces (elementary topology and sequences)JelaiAujero
 
Intro probability 3
Intro probability 3Intro probability 3
Intro probability 3Phong Vo
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Scienceresearchinventy
 
"Exact and approximate algorithms for resultant polytopes."
"Exact and approximate algorithms for resultant polytopes." "Exact and approximate algorithms for resultant polytopes."
"Exact and approximate algorithms for resultant polytopes." Vissarion Fisikopoulos
 
Module of algelbra analyses 2
Module of algelbra analyses 2Module of algelbra analyses 2
Module of algelbra analyses 2Bui Loi
 

Tendances (19)

Harmonic Analysis and Deep Learning
Harmonic Analysis and Deep LearningHarmonic Analysis and Deep Learning
Harmonic Analysis and Deep Learning
 
Proof of Kraft-McMillan theorem
Proof of Kraft-McMillan theoremProof of Kraft-McMillan theorem
Proof of Kraft-McMillan theorem
 
Finite automata examples
Finite automata examplesFinite automata examples
Finite automata examples
 
Algoritmos Greedy
Algoritmos GreedyAlgoritmos Greedy
Algoritmos Greedy
 
Maksim Zhukovskii – Zero-one k-laws for G(n,n−α)
Maksim Zhukovskii – Zero-one k-laws for G(n,n−α)Maksim Zhukovskii – Zero-one k-laws for G(n,n−α)
Maksim Zhukovskii – Zero-one k-laws for G(n,n−α)
 
Predicates and Quantifiers
Predicates and Quantifiers Predicates and Quantifiers
Predicates and Quantifiers
 
Boolean Programs and Quantified Propositional Proof System -
Boolean Programs and Quantified Propositional Proof System - Boolean Programs and Quantified Propositional Proof System -
Boolean Programs and Quantified Propositional Proof System -
 
Dfa
DfaDfa
Dfa
 
Predicate Logic
Predicate LogicPredicate Logic
Predicate Logic
 
Random variables
Random variablesRandom variables
Random variables
 
O2
O2O2
O2
 
QMC: Operator Splitting Workshop, Thresholdings, Robustness, and Generalized ...
QMC: Operator Splitting Workshop, Thresholdings, Robustness, and Generalized ...QMC: Operator Splitting Workshop, Thresholdings, Robustness, and Generalized ...
QMC: Operator Splitting Workshop, Thresholdings, Robustness, and Generalized ...
 
Intro probability 2
Intro probability 2Intro probability 2
Intro probability 2
 
The Euclidean Spaces (elementary topology and sequences)
The Euclidean Spaces (elementary topology and sequences)The Euclidean Spaces (elementary topology and sequences)
The Euclidean Spaces (elementary topology and sequences)
 
Intro probability 3
Intro probability 3Intro probability 3
Intro probability 3
 
Research Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and ScienceResearch Inventy : International Journal of Engineering and Science
Research Inventy : International Journal of Engineering and Science
 
"Exact and approximate algorithms for resultant polytopes."
"Exact and approximate algorithms for resultant polytopes." "Exact and approximate algorithms for resultant polytopes."
"Exact and approximate algorithms for resultant polytopes."
 
Module of algelbra analyses 2
Module of algelbra analyses 2Module of algelbra analyses 2
Module of algelbra analyses 2
 
Analysis of algorithms
Analysis of algorithmsAnalysis of algorithms
Analysis of algorithms
 

Similaire à Deciding language inclusion problems using quasiorders

6-Nfa & equivalence with RE.pdf
6-Nfa & equivalence with RE.pdf6-Nfa & equivalence with RE.pdf
6-Nfa & equivalence with RE.pdfshruti533256
 
IVR - Chapter 1 - Introduction
IVR - Chapter 1 - IntroductionIVR - Chapter 1 - Introduction
IVR - Chapter 1 - IntroductionCharles Deledalle
 
590-Article Text.pdf
590-Article Text.pdf590-Article Text.pdf
590-Article Text.pdfBenoitValea
 
590-Article Text.pdf
590-Article Text.pdf590-Article Text.pdf
590-Article Text.pdfBenoitValea
 
Fourier series of odd functions with period 2 l
Fourier series of odd functions with period 2 lFourier series of odd functions with period 2 l
Fourier series of odd functions with period 2 lPepa Vidosa Serradilla
 
A Proof of the Generalized Riemann Hypothesis
A Proof of the Generalized Riemann HypothesisA Proof of the Generalized Riemann Hypothesis
A Proof of the Generalized Riemann HypothesisCharaf Ech-Chatbi
 
A Proof of the Generalized Riemann Hypothesis
A Proof of the Generalized Riemann HypothesisA Proof of the Generalized Riemann Hypothesis
A Proof of the Generalized Riemann HypothesisCharaf Ech-Chatbi
 
The Chase in Database Theory
The Chase in Database TheoryThe Chase in Database Theory
The Chase in Database TheoryJan Hidders
 
Some Thoughts on Sampling
Some Thoughts on SamplingSome Thoughts on Sampling
Some Thoughts on SamplingDon Sheehy
 
OrthogonalFunctionsPaper
OrthogonalFunctionsPaperOrthogonalFunctionsPaper
OrthogonalFunctionsPaperTyler Otto
 
A sharp nonlinear Hausdorff-Young inequality for small potentials
A sharp nonlinear Hausdorff-Young inequality for small potentialsA sharp nonlinear Hausdorff-Young inequality for small potentials
A sharp nonlinear Hausdorff-Young inequality for small potentialsVjekoslavKovac1
 
End semexam | Theory of Computation | Akash Anand | MTH 401A | IIT Kanpur
End semexam | Theory of Computation | Akash Anand | MTH 401A | IIT KanpurEnd semexam | Theory of Computation | Akash Anand | MTH 401A | IIT Kanpur
End semexam | Theory of Computation | Akash Anand | MTH 401A | IIT KanpurVivekananda Samiti
 
Algorithmic foundations.docx
Algorithmic foundations.docxAlgorithmic foundations.docx
Algorithmic foundations.docxedwin orege
 
Introduction to the theory of optimization
Introduction to the theory of optimizationIntroduction to the theory of optimization
Introduction to the theory of optimizationDelta Pi Systems
 
從 VAE 走向深度學習新理論
從 VAE 走向深度學習新理論從 VAE 走向深度學習新理論
從 VAE 走向深度學習新理論岳華 杜
 
Chapter-4 combined.pptx
Chapter-4 combined.pptxChapter-4 combined.pptx
Chapter-4 combined.pptxHamzaHaji6
 
A transference result of Lp continuity from the Jacobi Riesz transform to the...
A transference result of Lp continuity from the Jacobi Riesz transform to the...A transference result of Lp continuity from the Jacobi Riesz transform to the...
A transference result of Lp continuity from the Jacobi Riesz transform to the...Wilfredo Urbina
 

Similaire à Deciding language inclusion problems using quasiorders (20)

6-Nfa & equivalence with RE.pdf
6-Nfa & equivalence with RE.pdf6-Nfa & equivalence with RE.pdf
6-Nfa & equivalence with RE.pdf
 
IVR - Chapter 1 - Introduction
IVR - Chapter 1 - IntroductionIVR - Chapter 1 - Introduction
IVR - Chapter 1 - Introduction
 
590-Article Text.pdf
590-Article Text.pdf590-Article Text.pdf
590-Article Text.pdf
 
590-Article Text.pdf
590-Article Text.pdf590-Article Text.pdf
590-Article Text.pdf
 
Fourier series of odd functions with period 2 l
Fourier series of odd functions with period 2 lFourier series of odd functions with period 2 l
Fourier series of odd functions with period 2 l
 
A Proof of the Generalized Riemann Hypothesis
A Proof of the Generalized Riemann HypothesisA Proof of the Generalized Riemann Hypothesis
A Proof of the Generalized Riemann Hypothesis
 
A Proof of the Generalized Riemann Hypothesis
A Proof of the Generalized Riemann HypothesisA Proof of the Generalized Riemann Hypothesis
A Proof of the Generalized Riemann Hypothesis
 
Lecture5
Lecture5Lecture5
Lecture5
 
The Chase in Database Theory
The Chase in Database TheoryThe Chase in Database Theory
The Chase in Database Theory
 
Some Thoughts on Sampling
Some Thoughts on SamplingSome Thoughts on Sampling
Some Thoughts on Sampling
 
OrthogonalFunctionsPaper
OrthogonalFunctionsPaperOrthogonalFunctionsPaper
OrthogonalFunctionsPaper
 
A sharp nonlinear Hausdorff-Young inequality for small potentials
A sharp nonlinear Hausdorff-Young inequality for small potentialsA sharp nonlinear Hausdorff-Young inequality for small potentials
A sharp nonlinear Hausdorff-Young inequality for small potentials
 
End semexam | Theory of Computation | Akash Anand | MTH 401A | IIT Kanpur
End semexam | Theory of Computation | Akash Anand | MTH 401A | IIT KanpurEnd semexam | Theory of Computation | Akash Anand | MTH 401A | IIT Kanpur
End semexam | Theory of Computation | Akash Anand | MTH 401A | IIT Kanpur
 
Algorithmic foundations.docx
Algorithmic foundations.docxAlgorithmic foundations.docx
Algorithmic foundations.docx
 
LPS talk notes
LPS talk notesLPS talk notes
LPS talk notes
 
Introduction to the theory of optimization
Introduction to the theory of optimizationIntroduction to the theory of optimization
Introduction to the theory of optimization
 
Ch05 7
Ch05 7Ch05 7
Ch05 7
 
從 VAE 走向深度學習新理論
從 VAE 走向深度學習新理論從 VAE 走向深度學習新理論
從 VAE 走向深度學習新理論
 
Chapter-4 combined.pptx
Chapter-4 combined.pptxChapter-4 combined.pptx
Chapter-4 combined.pptx
 
A transference result of Lp continuity from the Jacobi Riesz transform to the...
A transference result of Lp continuity from the Jacobi Riesz transform to the...A transference result of Lp continuity from the Jacobi Riesz transform to the...
A transference result of Lp continuity from the Jacobi Riesz transform to the...
 

Plus de Facultad de Informática UCM

¿Por qué debemos seguir trabajando en álgebra lineal?
¿Por qué debemos seguir trabajando en álgebra lineal?¿Por qué debemos seguir trabajando en álgebra lineal?
¿Por qué debemos seguir trabajando en álgebra lineal?Facultad de Informática UCM
 
TECNOPOLÍTICA Y ACTIVISMO DE DATOS: EL MAPEO COMO FORMA DE RESILIENCIA ANTE L...
TECNOPOLÍTICA Y ACTIVISMO DE DATOS: EL MAPEO COMO FORMA DE RESILIENCIA ANTE L...TECNOPOLÍTICA Y ACTIVISMO DE DATOS: EL MAPEO COMO FORMA DE RESILIENCIA ANTE L...
TECNOPOLÍTICA Y ACTIVISMO DE DATOS: EL MAPEO COMO FORMA DE RESILIENCIA ANTE L...Facultad de Informática UCM
 
DRAC: Designing RISC-V-based Accelerators for next generation Computers
DRAC: Designing RISC-V-based Accelerators for next generation ComputersDRAC: Designing RISC-V-based Accelerators for next generation Computers
DRAC: Designing RISC-V-based Accelerators for next generation ComputersFacultad de Informática UCM
 
Tendencias en el diseño de procesadores con arquitectura Arm
Tendencias en el diseño de procesadores con arquitectura ArmTendencias en el diseño de procesadores con arquitectura Arm
Tendencias en el diseño de procesadores con arquitectura ArmFacultad de Informática UCM
 
Introduction to Quantum Computing and Quantum Service Oriented Computing
Introduction to Quantum Computing and Quantum Service Oriented ComputingIntroduction to Quantum Computing and Quantum Service Oriented Computing
Introduction to Quantum Computing and Quantum Service Oriented ComputingFacultad de Informática UCM
 
Inteligencia Artificial en la atención sanitaria del futuro
Inteligencia Artificial en la atención sanitaria del futuroInteligencia Artificial en la atención sanitaria del futuro
Inteligencia Artificial en la atención sanitaria del futuroFacultad de Informática UCM
 
Design Automation Approaches for Real-Time Edge Computing for Science Applic...
 Design Automation Approaches for Real-Time Edge Computing for Science Applic... Design Automation Approaches for Real-Time Edge Computing for Science Applic...
Design Automation Approaches for Real-Time Edge Computing for Science Applic...Facultad de Informática UCM
 
Estrategias de navegación para robótica móvil de campo: caso de estudio proye...
Estrategias de navegación para robótica móvil de campo: caso de estudio proye...Estrategias de navegación para robótica móvil de campo: caso de estudio proye...
Estrategias de navegación para robótica móvil de campo: caso de estudio proye...Facultad de Informática UCM
 
Fault-tolerance Quantum computation and Quantum Error Correction
Fault-tolerance Quantum computation and Quantum Error CorrectionFault-tolerance Quantum computation and Quantum Error Correction
Fault-tolerance Quantum computation and Quantum Error CorrectionFacultad de Informática UCM
 
Cómo construir un chatbot inteligente sin morir en el intento
Cómo construir un chatbot inteligente sin morir en el intentoCómo construir un chatbot inteligente sin morir en el intento
Cómo construir un chatbot inteligente sin morir en el intentoFacultad de Informática UCM
 
Automatic generation of hardware memory architectures for HPC
Automatic generation of hardware memory architectures for HPCAutomatic generation of hardware memory architectures for HPC
Automatic generation of hardware memory architectures for HPCFacultad de Informática UCM
 
Hardware/software security contracts: Principled foundations for building sec...
Hardware/software security contracts: Principled foundations for building sec...Hardware/software security contracts: Principled foundations for building sec...
Hardware/software security contracts: Principled foundations for building sec...Facultad de Informática UCM
 
Jose carlossancho slidesLa seguridad en el desarrollo de software implementad...
Jose carlossancho slidesLa seguridad en el desarrollo de software implementad...Jose carlossancho slidesLa seguridad en el desarrollo de software implementad...
Jose carlossancho slidesLa seguridad en el desarrollo de software implementad...Facultad de Informática UCM
 
Redes neuronales y reinforcement learning. Aplicación en energía eólica.
Redes neuronales y reinforcement learning. Aplicación en energía eólica.Redes neuronales y reinforcement learning. Aplicación en energía eólica.
Redes neuronales y reinforcement learning. Aplicación en energía eólica.Facultad de Informática UCM
 
Challenges and Opportunities for AI and Data analytics in Offshore wind
Challenges and Opportunities for AI and Data analytics in Offshore windChallenges and Opportunities for AI and Data analytics in Offshore wind
Challenges and Opportunities for AI and Data analytics in Offshore windFacultad de Informática UCM
 

Plus de Facultad de Informática UCM (20)

¿Por qué debemos seguir trabajando en álgebra lineal?
¿Por qué debemos seguir trabajando en álgebra lineal?¿Por qué debemos seguir trabajando en álgebra lineal?
¿Por qué debemos seguir trabajando en álgebra lineal?
 
TECNOPOLÍTICA Y ACTIVISMO DE DATOS: EL MAPEO COMO FORMA DE RESILIENCIA ANTE L...
TECNOPOLÍTICA Y ACTIVISMO DE DATOS: EL MAPEO COMO FORMA DE RESILIENCIA ANTE L...TECNOPOLÍTICA Y ACTIVISMO DE DATOS: EL MAPEO COMO FORMA DE RESILIENCIA ANTE L...
TECNOPOLÍTICA Y ACTIVISMO DE DATOS: EL MAPEO COMO FORMA DE RESILIENCIA ANTE L...
 
DRAC: Designing RISC-V-based Accelerators for next generation Computers
DRAC: Designing RISC-V-based Accelerators for next generation ComputersDRAC: Designing RISC-V-based Accelerators for next generation Computers
DRAC: Designing RISC-V-based Accelerators for next generation Computers
 
uElectronics ongoing activities at ESA
uElectronics ongoing activities at ESAuElectronics ongoing activities at ESA
uElectronics ongoing activities at ESA
 
Tendencias en el diseño de procesadores con arquitectura Arm
Tendencias en el diseño de procesadores con arquitectura ArmTendencias en el diseño de procesadores con arquitectura Arm
Tendencias en el diseño de procesadores con arquitectura Arm
 
Formalizing Mathematics in Lean
Formalizing Mathematics in LeanFormalizing Mathematics in Lean
Formalizing Mathematics in Lean
 
Introduction to Quantum Computing and Quantum Service Oriented Computing
Introduction to Quantum Computing and Quantum Service Oriented ComputingIntroduction to Quantum Computing and Quantum Service Oriented Computing
Introduction to Quantum Computing and Quantum Service Oriented Computing
 
Computer Design Concepts for Machine Learning
Computer Design Concepts for Machine LearningComputer Design Concepts for Machine Learning
Computer Design Concepts for Machine Learning
 
Inteligencia Artificial en la atención sanitaria del futuro
Inteligencia Artificial en la atención sanitaria del futuroInteligencia Artificial en la atención sanitaria del futuro
Inteligencia Artificial en la atención sanitaria del futuro
 
Design Automation Approaches for Real-Time Edge Computing for Science Applic...
 Design Automation Approaches for Real-Time Edge Computing for Science Applic... Design Automation Approaches for Real-Time Edge Computing for Science Applic...
Design Automation Approaches for Real-Time Edge Computing for Science Applic...
 
Estrategias de navegación para robótica móvil de campo: caso de estudio proye...
Estrategias de navegación para robótica móvil de campo: caso de estudio proye...Estrategias de navegación para robótica móvil de campo: caso de estudio proye...
Estrategias de navegación para robótica móvil de campo: caso de estudio proye...
 
Fault-tolerance Quantum computation and Quantum Error Correction
Fault-tolerance Quantum computation and Quantum Error CorrectionFault-tolerance Quantum computation and Quantum Error Correction
Fault-tolerance Quantum computation and Quantum Error Correction
 
Cómo construir un chatbot inteligente sin morir en el intento
Cómo construir un chatbot inteligente sin morir en el intentoCómo construir un chatbot inteligente sin morir en el intento
Cómo construir un chatbot inteligente sin morir en el intento
 
Automatic generation of hardware memory architectures for HPC
Automatic generation of hardware memory architectures for HPCAutomatic generation of hardware memory architectures for HPC
Automatic generation of hardware memory architectures for HPC
 
Type and proof structures for concurrency
Type and proof structures for concurrencyType and proof structures for concurrency
Type and proof structures for concurrency
 
Hardware/software security contracts: Principled foundations for building sec...
Hardware/software security contracts: Principled foundations for building sec...Hardware/software security contracts: Principled foundations for building sec...
Hardware/software security contracts: Principled foundations for building sec...
 
Jose carlossancho slidesLa seguridad en el desarrollo de software implementad...
Jose carlossancho slidesLa seguridad en el desarrollo de software implementad...Jose carlossancho slidesLa seguridad en el desarrollo de software implementad...
Jose carlossancho slidesLa seguridad en el desarrollo de software implementad...
 
Do you trust your artificial intelligence system?
Do you trust your artificial intelligence system?Do you trust your artificial intelligence system?
Do you trust your artificial intelligence system?
 
Redes neuronales y reinforcement learning. Aplicación en energía eólica.
Redes neuronales y reinforcement learning. Aplicación en energía eólica.Redes neuronales y reinforcement learning. Aplicación en energía eólica.
Redes neuronales y reinforcement learning. Aplicación en energía eólica.
 
Challenges and Opportunities for AI and Data analytics in Offshore wind
Challenges and Opportunities for AI and Data analytics in Offshore windChallenges and Opportunities for AI and Data analytics in Offshore wind
Challenges and Opportunities for AI and Data analytics in Offshore wind
 

Dernier

computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction managementMariconPadriquez1
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxDeepakSakkari2
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncssuser2ae721
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile servicerehmti665
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)Dr SOUNDIRARAJ N
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleAlluxio, Inc.
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfme23b1001
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxPoojaBan
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptSAURABHKUMAR892774
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxPurva Nikam
 

Dernier (20)

computer application and construction management
computer application and construction managementcomputer application and construction management
computer application and construction management
 
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
🔝9953056974🔝!!-YOUNG call girls in Rajendra Nagar Escort rvice Shot 2000 nigh...
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
Biology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptxBiology for Computer Engineers Course Handout.pptx
Biology for Computer Engineers Course Handout.pptx
 
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsyncWhy does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
Why does (not) Kafka need fsync: Eliminating tail latency spikes caused by fsync
 
Call Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile serviceCall Girls Delhi {Jodhpur} 9711199012 high profile service
Call Girls Delhi {Jodhpur} 9711199012 high profile service
 
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
UNIT III ANALOG ELECTRONICS (BASIC ELECTRONICS)
 
Design and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdfDesign and analysis of solar grass cutter.pdf
Design and analysis of solar grass cutter.pdf
 
young call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Serviceyoung call girls in Green Park🔝 9953056974 🔝 escort Service
young call girls in Green Park🔝 9953056974 🔝 escort Service
 
Correctly Loading Incremental Data at Scale
Correctly Loading Incremental Data at ScaleCorrectly Loading Incremental Data at Scale
Correctly Loading Incremental Data at Scale
 
Electronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdfElectronically Controlled suspensions system .pdf
Electronically Controlled suspensions system .pdf
 
Heart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptxHeart Disease Prediction using machine learning.pptx
Heart Disease Prediction using machine learning.pptx
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
Arduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.pptArduino_CSE ece ppt for working and principal of arduino.ppt
Arduino_CSE ece ppt for working and principal of arduino.ppt
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
An introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptxAn introduction to Semiconductor and its types.pptx
An introduction to Semiconductor and its types.pptx
 

Deciding language inclusion problems using quasiorders

  • 1. Deciding language inclusion problems using quasiorders Pierre Ganty IMDEA Software Institute joint work with Pedro Valero (IMDEA) and Francesco Ranzato (Uni. Padova)
  • 2. L1
  • 6. L2 ρ(L1) • ρ is extensive: L ⊆ ρ(L) • ρ is monotone: L ⊆ L implies ρ(L) ⊆ ρ(L ) • ρ is idempotent: ρ(ρ(L)) = ρ(L)
  • 7. L2 ρ(L1) L1 ⊆ L2 iff ρ(L1) ⊆ L2 Assume ρ(L2) = L2, then ρ(L2) = L2
  • 8. L1 as a fixed point q q b a a lfp λ Xq Xq . { } ∪ bXq ∅ ∪ aXq ∪ aXq
  • 9. L1 as a fixed point q q b a a lfp λ Xq Xq . { } ∪ bXq ∅ ∪ aXq ∪ aXq Xq ∅ Xq ∅
  • 10. L1 as a fixed point q q b a a lfp λ Xq Xq . { } ∪ bXq ∅ ∪ aXq ∪ aXq Xq ∅ Xq ∅ {ε} ∅
  • 11. L1 as a fixed point q q b a a lfp λ Xq Xq . { } ∪ bXq ∅ ∪ aXq ∪ aXq Xq ∅ Xq ∅ {ε} ∅ {ε} {a}
  • 12. L1 as a fixed point q q b a a lfp λ Xq Xq . { } ∪ bXq ∅ ∪ aXq ∪ aXq Lq (ba+ )∗ Lq a+ (ba+ )∗ Xq ∅ Xq ∅ {ε} ∅ {ε} {a}
  • 13. L1 as a fixed point q q b a a lfp λ Xq Xq . { } ∪ bXq ∅ ∪ aXq ∪ aXq L1 = Lq = (ba+ )∗ = lfp λX. b ∪ Fn(X) q Lq (ba+ )∗ Lq a+ (ba+ )∗ Xq ∅ Xq ∅ {ε} ∅ {ε} {a}
  • 14. L1 as a fixed point q q b a a lfp λ Xq Xq . { } ∪ bXq ∅ ∪ aXq ∪ aXq L1 = Lq = (ba+ )∗ = lfp λX. b ∪ Fn(X) q Lq (ba+ )∗ Lq a+ (ba+ )∗ Xq ∅ Xq ∅ {ε} ∅ {ε} {a} b Fn
  • 15. ρ(L1) = ρ lfp λX. b ∪ Fn(X) ρ(L1) if ρ is complete for Fn (i.e. ρ Fn ρ = ρ Fn) then ρ(L1) = lfp λX. ρ b ∪ Fn(X)
  • 16. ρ(L1) = ρ lfp λX. b ∪ Fn(X) ρ(L1) if ρ is complete for Fn (i.e. ρ Fn ρ = ρ Fn) then ρ(L1) = lfp λX. ρ b ∪ Fn(X) ρ is complete for Fn
  • 17. Wanted ρ(L2) = L2 ρ is complete for Fn
  • 18. Quasiorder induced ρ Given a quasiorder on words, define ρ (X) = {y | ∃x ∈ X : x y}
  • 19. Quasiorder induced ρ Given a quasiorder on words, define ρ (X) = {y | ∃x ∈ X : x y} ∩ (L2 × L2) = ∅ x y implies a x a y for all a
  • 20. Quasiorder induced ρ Given a quasiorder on words, define ρ (X) = {y | ∃x ∈ X : x y} ∩ (L2 × L2) = ∅ x y implies a x a y for all a ρ (L2) = L2 ρ is complete for λX. aX for all a
  • 21. Quasiorder induced ρ Given a quasiorder on words, define ρ (X) = {y | ∃x ∈ X : x y} ∩ (L2 × L2) = ∅ x y implies a x a y for all a ρ (L2) = L2 ρ is complete for λX. aX for all a is a left L2 consistent qo
  • 22. Example of quasiorder Nerode left quasiorder relative to L2 [Varricchio,deLuca’94] x l L2 y ⇔ L2 x−1 ⊆ L2 y−1
  • 23. Example of quasiorder Nerode left quasiorder relative to L2 [Varricchio,deLuca’94] x l L2 y ⇔ L2 x−1 ⊆ L2 y−1 Lx−1 = {w | wx ∈ L}
  • 24. Example of quasiorder Nerode left quasiorder relative to L2 [Varricchio,deLuca’94] x l L2 y ⇔ L2 x−1 ⊆ L2 y−1 l L2 is left L2 consistent
  • 25. Example of quasiorder Nerode left quasiorder relative to L2 [Varricchio,deLuca’94] x l L2 y ⇔ L2 x−1 ⊆ L2 y−1 l L2 is left L2 consistent l L2 is a well-quasi order if L2 is regular
  • 26. Example of quasiorder Nerode left quasiorder relative to L2 [Varricchio,deLuca’94] x l L2 y ⇔ L2 x−1 ⊆ L2 y−1 l L2 is left L2 consistent l L2 is a well-quasi order if L2 is regular l L2 is decidable if L2 is regular
  • 27. Deciding L1 ⊆ L2 using Nerode’s left qo l L2 L1 ⊆ L2 iff ρ l L2 (L1) ⊆ L2
  • 28. Deciding L1 ⊆ L2 using Nerode’s left qo l L2 L1 ⊆ L2 iff ρ l L2 (L1) ⊆ L2 ρ l L2 (L1)
  • 29. Deciding L1 ⊆ L2 using Nerode’s left qo l L2 L1 ⊆ L2 iff ρ l L2 (L1) ⊆ L2 ρ l L2 (L1) L2
  • 30. Deciding L1 ⊆ L2 using Nerode’s left qo l L2 L1 ⊆ L2 iff ρ l L2 (L1) ⊆ L2 iff min l L2 (ρ l L2 (L1)) ⊆ L2 ρ l L2 (L1) L2
  • 31. Deciding L1 ⊆ L2 using Nerode’s left qo l L2 L1 ⊆ L2 iff ρ l L2 (L1) ⊆ L2 iff min l L2 (ρ l L2 (L1)) ⊆ L2 iff ∀w ∈ min l L2 (ρ l L2 (L1)): w ∈ L2 ρ l L2 (L1) L2
  • 32. Deciding L1 ⊆ L2 using l L2 (cont’d) L1 ⊆ L2 iff ∀w ∈ min l L2 (ρ l L2 (L1)): w ∈ L2
  • 33. Deciding L1 ⊆ L2 using l L2 (cont’d) L1 ⊆ L2 iff ∀w ∈ min l L2 (ρ l L2 (L1)): w ∈ L2 iff ∀w ∈ min l L2 (lfp λX. ρ l L2 b ∪ Fn(X) : w ∈ L2
  • 34. Deciding L1 ⊆ L2 using l L2 (cont’d) L1 ⊆ L2 iff ∀w ∈ min l L2 (ρ l L2 (L1)): w ∈ L2 iff ∀w ∈ min l L2 (lfp λX. ρ l L2 b ∪ Fn(X) : w ∈ L2
  • 35. Deciding L1 ⊆ L2 using l L2 (cont’d) L1 ⊆ L2 iff ∀w ∈ min l L2 (ρ l L2 (L1)): w ∈ L2 iff ∀w ∈ min l L2 (lfp λX. ρ l L2 b ∪ Fn(X) : w ∈ L2
  • 36. Deciding L1 ⊆ L2 using l L2 (cont’d) L1 ⊆ L2 iff ∀w ∈ min l L2 (ρ l L2 (L1)): w ∈ L2 iff ∀w ∈ min l L2 (lfp λX. ρ l L2 b ∪ Fn(X) : w ∈ L2
  • 37. Deciding L1 ⊆ L2 using l L2 (cont’d) L1 ⊆ L2 iff ∀w ∈ min l L2 (ρ l L2 (L1)): w ∈ L2 iff ∀w ∈ min l L2 (lfp λX. ρ l L2 b ∪ Fn(X) : w ∈ L2
  • 38. Deciding L1 ⊆ L2 using l L2 (cont’d) L1 ⊆ L2 iff ∀w ∈ min l L2 (ρ l L2 (L1)): w ∈ L2 iff ∀w ∈ lfp λX. min l L2 b ∪ Fn(X) : w ∈ L2 iff ∀w ∈ min l L2 (lfp λX. ρ l L2 b ∪ Fn(X) : w ∈ L2
  • 39. Deciding L1 ⊆ L2 using l L2 (cont’d) L1 ⊆ L2 iff ∀w ∈ min l L2 (ρ l L2 (L1)): w ∈ L2 iff ∀w ∈ lfp λX. min l L2 b ∪ Fn(X) : w ∈ L2 iff ∀w ∈ min l L2 (lfp λX. ρ l L2 b ∪ Fn(X) : w ∈ L2
  • 40. Word-based antichain algorithm for L(A) ⊆ L2 Data: FA A = Q, δ, q0 , F Data: L2 regular 1 Yq q∈Q := ∅; 2 repeat 3 Xq q∈Q := Yq q∈Q; 4 Yq q∈Q := min l L2 b ∪ Fn( Yq q∈Q) ; 5 until ρ l L2 ( Yq q∈Q) ⊆ ρ l L2 ( Xq q∈Q); 6 forall u ∈ Yq0 do 7 if u /∈ L2 then return false; 8 return true;
  • 41. What else? Nerode left quasiorder relative to L2 [Varricchio,deLuca’94] x l L2 y ⇔ L2 x−1 ⊆ L2 y−1
  • 42. What else? State based quasiorder Let A2 = Q2, δ2, q0 2, F2 be an automaton for L2 x l A2 y ⇔ prex(F2) ⊆ prey(F2) Nerode left quasiorder relative to L2 [Varricchio,deLuca’94] x l L2 y ⇔ L2 x−1 ⊆ L2 y−1
  • 43. What else? State based quasiorder Let A2 = Q2, δ2, q0 2, F2 be an automaton for L2 x l A2 y ⇔ prex(F2) ⊆ prey(F2) Nerode left quasiorder relative to L2 [Varricchio,deLuca’94] x l L2 y ⇔ L2 x−1 ⊆ L2 y−1 1. l A2 ∩ (L2 × L2) = ∅ 2. x l A2 y implies a x l A2 a y for all a 3. l A2 is a well-quasiorder 4. l A2 is decidable
  • 44. What else? State based quasiorder Let A2 = Q2, δ2, q0 2, F2 be an automaton for L2 x l A2 y ⇔ prex(F2) ⊆ prey(F2) Nerode left quasiorder relative to L2 [Varricchio,deLuca’94] x l L2 y ⇔ L2 x−1 ⊆ L2 y−1 1. l A2 ∩ (L2 × L2) = ∅ 2. x l A2 y implies a x l A2 a y for all a 3. l A2 is a well-quasiorder 4. l A2 is decidable l A2 is left L2 consistent decidable wqo
  • 45. Word-based antichain algorithm for L(A1) ⊆ L(A2) Data: FA A1 = Q1, δ1, q0 1, F1 Data: FA A2 = Q2, δ2, q0 2, F2 1 Yq q∈Q1 := ∅; 2 repeat 3 Xq q∈Q1 := Yq q∈Q1 ; 4 Yq q∈Q1 := min l A2 b ∪ Fn( Yq q∈Q1 ) ; 5 until ρ l A2 ( Yq q∈Q1 ) ⊆ ρ l A2 ( Xq q∈Q1 ); 6 forall u ∈ Yq0 1 do 7 if u /∈ L(A2) then return false; 8 return true;
  • 46. Word-based antichain algorithm for L(A1) ⊆ L(A2) Data: FA A1 = Q1, δ1, q0 1, F1 Data: FA A2 = Q2, δ2, q0 2, F2 1 Yq q∈Q1 := ∅; 2 repeat 3 Xq q∈Q1 := Yq q∈Q1 ; 4 Yq q∈Q1 := min l A2 b ∪ Fn( Yq q∈Q1 ) ; 5 until ρ l A2 ( Yq q∈Q1 ) ⊆ ρ l A2 ( Xq q∈Q1 ); 6 forall u ∈ Yq0 1 do 7 if u /∈ L(A2) then return false; 8 return true; State based quasiorder Let A2 = Q2, δ2, q0 2, F2 be an automaton for L2 x l A2 y ⇔ prex(F2) ⊆ prey(F2)
  • 47. Ditching words altogether State-based antichain algorithm for L(A1) ⊆ L(A2) Data: FA A1 = Q1, δ1, q0 1, F1 Data: FA A2 = Q2, δ2, q0 2, F2 1 Yq q∈Q1 := ∅; 2 repeat 3 Xq q∈Q1 := Yq q∈Q1 ; 4 Yq q∈Q1 := [. . .]; 5 until Yq ⊆∀∃ Xq, for all q ∈ Q1; 6 forall s ∈ Yq0 1 do 7 if q0 2 /∈ s then return false; 8 return true; [. . .] = min⊆∀∃ {preA2 a (s) | ∃a ∈ Σ, q ∈ δ1(q, a), s ∈ Xq } ∪ F2
  • 48. • Same as antichain algo • Derived from general solution instantiated to l A2 • Variants of the antichain algorithm as instantiations • Simulation enhanced qo 2 • Nerode’s qo induce the coarsest qo based abstractions
  • 49. • Same as antichain algo • Derived from general solution instantiated to l A2 • Variants of the antichain algorithm as instantiations • Simulation enhanced qo 2 • Nerode’s qo induce the coarsest qo based abstractions l L2 and r L2 are wqo’s if L2 is regular
  • 50. L2 is a one-counter net trace set q2 q1 q3a, 1 a, 0 a, −1 b, 1 The right Nerode qo for L2 ( r L2 ) is a wqo but it’s undecidable u r O2 v is a right L2 consistent decidable wqo u r O2 v iff mu ≤ mv where mu, mv ∈ (N ∪ {⊥})3 L2 = L(O2) is the set of traces from configuration q2 0
  • 51. Decision procedure for L(A1) ⊆ L(O2) using r O2 Word-based antichain algorithm for L(A) ⊆ L(O2) Data: FA A = Q, δ, q0 , F Data: OCN O2 1 Yq q∈Q := ∅; 2 repeat 3 Xq q∈Q := Yq q∈Q; 4 Yq q∈Q := min r O2 b ∪ Gn( Yq q∈Q) ; 5 until ρ r O2 ( Yq q∈Q) ⊆ ρ r O2 ( Xq q∈Q); 6 forall u ∈ Yq0 do 7 if u /∈ L2 then return false; 8 return true;
  • 52. So far. . . L(A1) ⊆ L(A2) L(A1) ⊆ L(O2)
  • 53. ρ(L1) = ρ lfp λX. b ∪ Fn(X) = lfp λX. ρ b ∪ Fn(X) L2 ρ(L1)
  • 54. ρ(L1) = ρ lfp λX. b ∪ Fn(X) = lfp λX. ρ b ∪ Fn(X) L2 ρ(L1) ρ Fn ρ = ρ Fn
  • 55. ρ(L1) = ρ lfp λX. b ∪ Fn(X) = lfp λX. ρ b ∪ Fn(X) L2 ρ(L1) When L1 is regular, ρ is complete for λX. aX for all a ρ Fn ρ = ρ Fn lfp λ Xq Xq . { } ∪ bXq ∅ ∪ aXq ∪ aXq
  • 56. Quasiorders for the case L(G1) ⊆ L(A2) FnG1 is more general: from aX, Xa, aXb, XX
  • 57. Quasiorders for the case L(G1) ⊆ L(A2) FnG1 is more general: from aX, Xa, aXb, XX ρ(L1) = lfp λX. ρ b ∪ FnG1 (X) if ρ is complete for λX. aX and λX. Xa for all a
  • 58. Quasiorders for the case L(G1) ⊆ L(A2) FnG1 is more general: from aX, Xa, aXb, XX 1. ∩ (L2 × L2) = ∅ 2. x y implies a x a y and x a y a for all a ρ(L1) = lfp λX. ρ b ∪ FnG1 (X) if ρ is complete for λX. aX and λX. Xa for all a
  • 59. Quasiorders for the case L(G1) ⊆ L(A2) Myhill quasiorder relative to L2 [Varricchio, deLuca’94] x L2 y ⇔ {(u, v) | u x v∈L2} ⊆ {(u, v) | u y v∈L2} FnG1 is more general: from aX, Xa, aXb, XX 1. ∩ (L2 × L2) = ∅ 2. x y implies a x a y and x a y a for all a ρ(L1) = lfp λX. ρ b ∪ FnG1 (X) if ρ is complete for λX. aX and λX. Xa for all a
  • 60. Quasiorders for the case L(G1) ⊆ L(A2) Myhill quasiorder relative to L2 [Varricchio, deLuca’94] x L2 y ⇔ {(u, v) | u x v∈L2} ⊆ {(u, v) | u y v∈L2} State based quasi order [Netys’15] x A2 y ⇔ {(q, q ) | q x q } ⊆ {(q, q ) | q y q } FnG1 is more general: from aX, Xa, aXb, XX 1. ∩ (L2 × L2) = ∅ 2. x y implies a x a y and x a y a for all a ρ(L1) = lfp λX. ρ b ∪ FnG1 (X) if ρ is complete for λX. aX and λX. Xa for all a
  • 61. Greatest fixpoint based approach lfp λX. b ∪ Fn(X) ⊆ L2 iff b ⊆ gfp λX. L2 ∩ Fn(X) ∪ becomes ∩ λX. aX becomes λX. a−1 X ρ Fn ρ = ρ Fn becomes ρ Fn ρ = Fn ρ gfp λX. ρ(L2 ∩ Fn(X)) stepwise equal gfp λX. L2 ∩ Fn(X)
  • 62. Greatest fixpoint based approach lfp λX. b ∪ Fn(X) ⊆ L2 iff b ⊆ gfp λX. L2 ∩ Fn(X) ∪ becomes ∩ λX. aX becomes λX. a−1 X ρ Fn ρ = ρ Fn becomes ρ Fn ρ = Fn ρ gfp λX. ρ(L2 ∩ Fn(X)) stepwise equal gfp λX. L2 ∩ Fn(X) Does not terminate in general
  • 63. Greatest fixpoint based approach lfp λX. b ∪ Fn(X) ⊆ L2 iff b ⊆ gfp λX. L2 ∩ Fn(X) ∪ becomes ∩ λX. aX becomes λX. a−1 X ρ Fn ρ = ρ Fn becomes ρ Fn ρ = Fn ρ gfp λX. ρ(L2 ∩ Fn(X)) stepwise equal gfp λX. L2 ∩ Fn(X) Does not terminate in general Does always terminate 1
  • 65. Conclusion Promising framework for language inclusion Extension to trees, ω-languages, timed languages,. . .
  • 66. Conclusion Promising framework for language inclusion Extension to trees, ω-languages, timed languages,. . . Technical Report 1904.01388 on arxiv.org