Catálogo de publicaciones - libros
Relations and Kleene Algebra in Computer Science: 9th International Conference on Relational Methods in Computer Science and 4th International Workshop on Applications of Kleene Algebra, RelMiCS/AKA 2006, Manchester, UK, August 29September 2, 2006.
Renate A. Schmidt (eds.)
En conferencia: 9º International Conference on Relational Methods in Computer Science (RelMiCS) . Manchester, UK . August 29, 2006 - September 2, 2006
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
Mathematical Logic and Formal Languages; Symbolic and Algebraic Manipulation; Artificial Intelligence (incl. Robotics); Software Engineering
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | 2006 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-3-540-37873-0
ISBN electrónico
978-3-540-37874-7
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2006
Información sobre derechos de publicación
© Springer-Verlag Berlin Heidelberg 2006
Tabla de contenidos
doi: 10.1007/11828563_11
Relational Representation Theorems for General Lattices with Negations
Wojciech Dzik; Ewa Orlowska; Clint van Alten
Relational representation theorems are presented for general (i.e., non-distributive) lattices with the following types of negations: De Morgan, ortho, Heyting and pseudo-complement. The representation is built on Urquhart’s representation for lattices where the associated relational structures are doubly ordered sets and the canonical frame of a lattice consists of its maximal disjoint filter-ideal pairs. For lattices with negation, the relational structures require an additional binary relation satisfying certain conditions which derive from the properties of the negation. In each case, these conditions are sufficient to ensure that the lattice with negation is embeddable into the complex algebra of its canonical frame.
Pp. 162-176
doi: 10.1007/11828563_12
Monotonicity Analysis Can Speed Up Verification
Marcelo F. Frias; Rodolfo Gamarra; Gabriela Steren; Lorena Bourg
We introduce a strategy for the verification of relational specifications based on the analysis of monotonicity of variables within formulas. By comparing with the Alloy Analyzer, we show that for a relevant class of problems this technique outperforms analysis of the same problems using SAT-solvers, while consuming a fraction of the memory SAT-solvers require.
Pp. 177-191
doi: 10.1007/11828563_13
Max-Plus Convex Geometry
Stéphane Gaubert; Ricardo Katz
Max-plus analogues of linear spaces, convex sets, and polyhedra have appeared in several works. We survey their main geometrical properties, including max-plus versions of the separation theorem, existence of linear and non-linear projectors, max-plus analogues of the Minkowski-Weyl theorem, and the characterization of the analogues of “simplicial” cones in terms of distributive lattices.
Pp. 192-206
doi: 10.1007/11828563_14
Lazy Semiring Neighbours and Some Applications
Peter Höfner; Bernhard Möller
We extend an earlier algebraic approach to Neighbourhood Logic (NL) from domain semirings to lazy semi-rings yielding lazy semiring neighbours. Furthermore we show three important applications for these. The first one extends NL to intervals with infinite length. The second one applies lazy semiring neighbours in an algebraic semantics of the branching time temporal logic CTL. The third one sets up a connection between hybrid systems and lazy semiring neighbours.
Pp. 207-221
doi: 10.1007/11828563_15
Omega Algebra, Demonic Refinement Algebra and Commands
Peter Höfner; Bernhard Möller; Kim Solin
Weak omega algebra and demonic refinement algebra are two ways of describing systems with finite and infinite iteration. We show that these independently introduced kinds of algebras can actually be defined in terms of each other. By defining modal operators on the underlying weak semiring, that result directly gives a demonic refinement algebra of commands. This yields models in which extensionality does not hold. Since in predicate-transformer models extensionality always holds, this means that the axioms of demonic refinement algebra do not characterise predicate-transformer models uniquely. The omega and the demonic refinement algebra of commands both utilise the convergence operator that is analogous to the halting predicate of modal -calculus. We show that the convergence operator can be defined explicitly in terms of infinite iteration and domain if and only if domain coinduction for infinite iteration holds.
Pp. 222-234
doi: 10.1007/11828563_16
Semigroupoid Interfaces for Relation-Algebraic Programming in Haskell
Wolfram Kahl
We present a Haskell interface for manipulating finite binary relations as data in a point-free relation-algebraic programming style that integrates naturally with the current Haskell collection types. This approach enables seamless integration of relation-algebraic formulations to provide elegant solutions of problems that, with different data organisation, are awkward to tackle.
Perhaps surprisingly, the mathematical foundations for dealing with relations in such a context are not well-established, so we provide an appropriate generalisation of relational categories to semigroupoids to serve as specification for our interface.
After having established an appropriate interface for relation-algebraic programming, we also need an efficient implementation; we find this in BDD-based kernel library KURE of recent versions of the Kiel RelView system. We show how this combination enables high-level declarative and efficient relational programming in Haskell.
Pp. 235-250
doi: 10.1007/11828563_17
On the Cardinality of Relations
Yasuo Kawahara
This paper will discuss and characterise the cardinality of boolean (crisp) and fuzzy relations. The main result is a Dedekind inequality for the cardinality, which enables us to manipulate the cardinality of the composites of relations. As applications a few relational proofs for the basic theorems on graph matchings, and fundamentals about network flows will be given.
Pp. 251-265
doi: 10.1007/11828563_18
Evaluating Sets of Search Points Using Relational Algebra
Britta Kehden
We model a set of search points as a relation and use relational algebra to evaluate all elements of the set in one step in order to select search points with certain properties. Therefore we transform relations into vectors and prove a formula to translate properties of relations into properties of the corresponding vectors. This approach is applied to timetable problems.
Pp. 266-280
doi: 10.1007/11828563_19
Algebraization of Hybrid Logic with Binders
Tadeusz Litak
This paper introduces an algebraic semantics for hybrid logic with binders . It is known that this formalism is a modal counterpart of the bounded fragment of the first-order logic, studied by Feferman in the 1960’s. The algebraization process leads to an interesting class of boolean algebras with operators, called . We provide a representation theorem for these algebras and thus provide an algebraic proof of completeness of hybrid logic.
Pp. 281-295
doi: 10.1007/11828563_20
Using Probabilistic Kleene Algebra for Protocol Verification
A. K. McIver; E. Cohen; C. C. Morgan
We describe , a probabilistic Kleene-style algebra, based on a well known model of probabilistic/demonic computation [3,16,10]. Our technical aim is to express probabilistic versions of Cohen’s .
Separation theorems simplify reasoning about distributed systems, where with purely algebraic reasoning they can reduce complicated interleaving behaviour to “separated” behaviours each of which can be analysed on its own. Until now that has not been possible for distributed systems.
Algebraic reasoning in general is very robust, and easy to check: thus an algebraic approach to probabilistic distributed systems is attractive because in that “doubly hostile” environment (probability interleaving) the opportunities for subtle error abound. Especially tricky is the interaction of probability and the demonic or “adversarial” scheduling implied by concurrency.
Our case study — based on Rabin’s — is one where just such problems have already occurred: the original presentation was later shown to have subtle flaws [15]. It motivates our interest in algebras, where assumptions relating probability and secrecy are clearly exposed and, in some cases, can be given simple characterisations in spite of their intricacy.
Pp. 296-310