8,727 research outputs found
Recommended from our members
Completeness, robustness, and safety in real-time software requirements specification
This paper presents an approach to providing a rigorous basis for ascertaining whether or not a given set of software requirements is internally complete, i.e., closed with respect to questions and inferences that can be made on the basis of information included in the specification. Emphasis is placed on aspects of software requirements specifications that previously have not been adequately handled, including timing abstractions, safety, and robustness
An Autonomous Engine for Services Configuration and Deployment.
The runtime management of the infrastructure providing service-based systems is a complex task, up to the point where manual operation struggles to be cost effective. As the functionality is provided by a set of dynamically composed distributed services, in order to achieve a management objective multiple operations have to be applied over the distributed elements of the managed infrastructure. Moreover, the manager must cope with the highly heterogeneous characteristics and management interfaces of the runtime resources. With this in mind, this paper proposes to support the configuration and deployment of services with an automated closed control loop. The automation is enabled by the definition of a generic information model, which captures all the information relevant to the management of the services with the same abstractions, describing the runtime elements, service dependencies, and business objectives. On top of that, a technique based on satisfiability is described which automatically diagnoses the state of the managed environment and obtains the required changes for correcting it (e.g., installation, service binding, update, or configuration). The results from a set of case studies extracted from the banking domain are provided to validate the feasibility of this propos
Analysis of the computational complexity of solving random satisfiability problems using branch and bound search algorithms
The computational complexity of solving random 3-Satisfiability (3-SAT)
problems is investigated. 3-SAT is a representative example of hard
computational tasks; it consists in knowing whether a set of alpha N randomly
drawn logical constraints involving N Boolean variables can be satisfied
altogether or not. Widely used solving procedures, as the
Davis-Putnam-Loveland-Logeman (DPLL) algorithm, perform a systematic search for
a solution, through a sequence of trials and errors represented by a search
tree. In the present study, we identify, using theory and numerical
experiments, easy (size of the search tree scaling polynomially with N) and
hard (exponential scaling) regimes as a function of the ratio alpha of
constraints per variable. The typical complexity is explicitly calculated in
the different regimes, in very good agreement with numerical simulations. Our
theoretical approach is based on the analysis of the growth of the branches in
the search tree under the operation of DPLL. On each branch, the initial 3-SAT
problem is dynamically turned into a more generic 2+p-SAT problem, where p and
1-p are the fractions of constraints involving three and two variables
respectively. The growth of each branch is monitored by the dynamical evolution
of alpha and p and is represented by a trajectory in the static phase diagram
of the random 2+p-SAT problem. Depending on whether or not the trajectories
cross the boundary between phases, single branches or full trees are generated
by DPLL, resulting in easy or hard resolutions.Comment: 37 RevTeX pages, 15 figures; submitted to Phys.Rev.
Space complexity in polynomial calculus
During the last decade, an active line of research in proof complexity has been to study space
complexity and time-space trade-offs for proofs. Besides being a natural complexity measure of
intrinsic interest, space is also an important issue in SAT solving, and so research has mostly focused
on weak systems that are used by SAT solvers.
There has been a relatively long sequence of papers on space in resolution, which is now reasonably
well understood from this point of view. For other natural candidates to study, however, such as
polynomial calculus or cutting planes, very little has been known. We are not aware of any nontrivial
space lower bounds for cutting planes, and for polynomial calculus the only lower bound has been
for CNF formulas of unbounded width in [Alekhnovich et al. ’02], where the space lower bound is
smaller than the initial width of the clauses in the formulas. Thus, in particular, it has been consistent
with current knowledge that polynomial calculus could be able to refute any k-CNF formula in
constant space.
In this paper, we prove several new results on space in polynomial calculus (PC), and in the
extended proof system polynomial calculus resolution (PCR) studied in [Alekhnovich et al. ’02]:
1. We prove an Ω(n) space lower bound in PC for the canonical 3-CNF version of the pigeonhole
principle formulas PHPm
n with m pigeons and n holes, and show that this is tight.
2. For PCR, we prove an Ω(n) space lower bound for a bitwise encoding of the functional pigeonhole
principle. These formulas have width O(log n), and hence this is an exponential
improvement over [Alekhnovich et al. ’02] measured in the width of the formulas.
3. We then present another encoding of the pigeonhole principle that has constant width, and
prove an Ω(n) space lower bound in PCR for these formulas as well.
4. Finally, we prove that any k-CNF formula can be refuted in PC in simultaneous exponential
size and linear space (which holds for resolution and thus for PCR, but was not obviously
the case for PC). We also characterize a natural class of CNF formulas for which the space
complexity in resolution and PCR does not change when the formula is transformed into 3-CNF
in the canonical way, something that we believe can be useful when proving PCR space lower
bounds for other well-studied formula families in proof complexity
The use of data-mining for the automatic formation of tactics
This paper discusses the usse of data-mining for the automatic formation of tactics. It was presented at the Workshop on Computer-Supported Mathematical Theory Development held at IJCAR in 2004. The aim of this project is to evaluate the applicability of data-mining techniques to the automatic formation of tactics from large corpuses of proofs. We data-mine information from large proof corpuses to find commonly occurring patterns. These patterns are then evolved into tactics using genetic programming techniques
MaxSAT Resolution and Subcube Sums
We study the MaxRes rule in the context of certifying unsatisfiability. We
show that it can be exponentially more powerful than tree-like resolution, and
when augmented with weakening (the system MaxResW), p-simulates tree-like
resolution. In devising a lower bound technique specific to MaxRes (and not
merely inheriting lower bounds from Res), we define a new proof system called
the SubCubeSums proof system. This system, which p-simulates MaxResW, can be
viewed as a special case of the semialgebraic Sherali-Adams proof system. In
expressivity, it is the integral restriction of conical juntas studied in the
contexts of communication complexity and extension complexity. We show that it
is not simulated by Res. Using a proof technique qualitatively different from
the lower bounds that MaxResW inherits from Res, we show that Tseitin
contradictions on expander graphs are hard to refute in SubCubeSums. We also
establish a lower bound technique via lifting: for formulas requiring large
degree in SubCubeSums, their XOR-ification requires large size in SubCubeSums
- …