Arithmetic, Logic, Syntax and Mathcheck
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Avoiding the Undefined by Underspecification
Avoiding the Undefined by Underspecification David Gries* and Fred B. Schneider** Computer Science Department, Cornell University Ithaca, New York 14853 USA Abstract. We use the appeal of simplicity and an aversion to com- plexity in selecting a method for handling partial functions in logic. We conclude that avoiding the undefined by using underspecification is the preferred choice. 1 Introduction Everything should be made as simple as possible, but not any simpler. --Albert Einstein The first volume of Springer-Verlag's Lecture Notes in Computer Science ap- peared in 1973, almost 22 years ago. The field has learned a lot about computing since then, and in doing so it has leaned on and supported advances in other fields. In this paper, we discuss an aspect of one of these fields that has been explored by computer scientists, handling undefined terms in formal logic. Logicians are concerned mainly with studying logic --not using it. Some computer scientists have discovered, by necessity, that logic is actually a useful tool. Their attempts to use logic have led to new insights --new axiomatizations, new proof formats, new meta-logical notions like relative completeness, and new concerns. We, the authors, are computer scientists whose interests have forced us to become users of formal logic. We use it in our work on language definition and in the formal development of programs. This paper is born of that experience. The operation of a computer is nothing more than uninterpreted symbol ma- nipulation. Bits are moved and altered electronically, without regard for what they denote. It iswe who provide the interpretation, saying that one bit string represents money and another someone's name, or that one transformation rep- resents addition and another alphabetization. -
A Quick Algebra Review
A Quick Algebra Review 1. Simplifying Expressions 2. Solving Equations 3. Problem Solving 4. Inequalities 5. Absolute Values 6. Linear Equations 7. Systems of Equations 8. Laws of Exponents 9. Quadratics 10. Rationals 11. Radicals Simplifying Expressions An expression is a mathematical “phrase.” Expressions contain numbers and variables, but not an equal sign. An equation has an “equal” sign. For example: Expression: Equation: 5 + 3 5 + 3 = 8 x + 3 x + 3 = 8 (x + 4)(x – 2) (x + 4)(x – 2) = 10 x² + 5x + 6 x² + 5x + 6 = 0 x – 8 x – 8 > 3 When we simplify an expression, we work until there are as few terms as possible. This process makes the expression easier to use, (that’s why it’s called “simplify”). The first thing we want to do when simplifying an expression is to combine like terms. For example: There are many terms to look at! Let’s start with x². There Simplify: are no other terms with x² in them, so we move on. 10x x² + 10x – 6 – 5x + 4 and 5x are like terms, so we add their coefficients = x² + 5x – 6 + 4 together. 10 + (-5) = 5, so we write 5x. -6 and 4 are also = x² + 5x – 2 like terms, so we can combine them to get -2. Isn’t the simplified expression much nicer? Now you try: x² + 5x + 3x² + x³ - 5 + 3 [You should get x³ + 4x² + 5x – 2] Order of Operations PEMDAS – Please Excuse My Dear Aunt Sally, remember that from Algebra class? It tells the order in which we can complete operations when solving an equation. -
Undefinedness and Soft Typing in Formal Mathematics
Undefinedness and Soft Typing in Formal Mathematics PhD Research Proposal by Jonas Betzendahl January 7, 2020 Supervisors: Prof. Dr. Michael Kohlhase Dr. Florian Rabe Abstract During my PhD, I want to contribute towards more natural reasoning in formal systems for mathematics (i.e. closer resembling that of actual mathematicians), with special focus on two topics on the precipice between type systems and logics in formal systems: undefinedness and soft types. Undefined terms are common in mathematics as practised on paper or blackboard by math- ematicians, yet few of the many systems for formalising mathematics that exist today deal with it in a principled way or allow explicit reasoning with undefined terms because allowing for this often results in undecidability. Soft types are a way of allowing the user of a formal system to also incorporate information about mathematical objects into the type system that had to be proven or computed after their creation. This approach is equally a closer match for mathematics as performed by mathematicians and has had promising results in the past. The MMT system constitutes a natural fit for this endeavour due to its rapid prototyping ca- pabilities and existing infrastructure. However, both of the aspects above necessitate a stronger support for automated reasoning than currently available. Hence, a further goal of mine is to extend the MMT framework with additional capabilities for automated and interactive theorem proving, both for reasoning in and outside the domains of undefinedness and soft types. 2 Contents 1 Introduction & Motivation 4 2 State of the Art 5 2.1 Undefinedness in Mathematics . -
Complex Analysis Class 24: Wednesday April 2
Complex Analysis Math 214 Spring 2014 Fowler 307 MWF 3:00pm - 3:55pm c 2014 Ron Buckmire http://faculty.oxy.edu/ron/math/312/14/ Class 24: Wednesday April 2 TITLE Classifying Singularities using Laurent Series CURRENT READING Zill & Shanahan, §6.2-6.3 HOMEWORK Zill & Shanahan, §6.2 3, 15, 20, 24 33*. §6.3 7, 8, 9, 10. SUMMARY We shall be introduced to Laurent Series and learn how to use them to classify different various kinds of singularities (locations where complex functions are no longer analytic). Classifying Singularities There are basically three types of singularities (points where f(z) is not analytic) in the complex plane. Isolated Singularity An isolated singularity of a function f(z) is a point z0 such that f(z) is analytic on the punctured disc 0 < |z − z0| <rbut is undefined at z = z0. We usually call isolated singularities poles. An example is z = i for the function z/(z − i). Removable Singularity A removable singularity is a point z0 where the function f(z0) appears to be undefined but if we assign f(z0) the value w0 with the knowledge that lim f(z)=w0 then we can say that we z→z0 have “removed” the singularity. An example would be the point z = 0 for f(z) = sin(z)/z. Branch Singularity A branch singularity is a point z0 through which all possible branch cuts of a multi-valued function can be drawn to produce a single-valued function. An example of such a point would be the point z = 0 for Log (z). -
Control Systems
ECE 380: Control Systems Course Notes: Winter 2014 Prof. Shreyas Sundaram Department of Electrical and Computer Engineering University of Waterloo ii c Shreyas Sundaram Acknowledgments Parts of these course notes are loosely based on lecture notes by Professors Daniel Liberzon, Sean Meyn, and Mark Spong (University of Illinois), on notes by Professors Daniel Davison and Daniel Miller (University of Waterloo), and on parts of the textbook Feedback Control of Dynamic Systems (5th edition) by Franklin, Powell and Emami-Naeini. I claim credit for all typos and mistakes in the notes. The LATEX template for The Not So Short Introduction to LATEX 2" by T. Oetiker et al. was used to typeset portions of these notes. Shreyas Sundaram University of Waterloo c Shreyas Sundaram iv c Shreyas Sundaram Contents 1 Introduction 1 1.1 Dynamical Systems . .1 1.2 What is Control Theory? . .2 1.3 Outline of the Course . .4 2 Review of Complex Numbers 5 3 Review of Laplace Transforms 9 3.1 The Laplace Transform . .9 3.2 The Inverse Laplace Transform . 13 3.2.1 Partial Fraction Expansion . 13 3.3 The Final Value Theorem . 15 4 Linear Time-Invariant Systems 17 4.1 Linearity, Time-Invariance and Causality . 17 4.2 Transfer Functions . 18 4.2.1 Obtaining the transfer function of a differential equation model . 20 4.3 Frequency Response . 21 5 Bode Plots 25 5.1 Rules for Drawing Bode Plots . 26 5.1.1 Bode Plot for Ko ....................... 27 5.1.2 Bode Plot for sq ....................... 28 s −1 s 5.1.3 Bode Plot for ( p + 1) and ( z + 1) . -
Division by Zero in Logic and Computing Jan Bergstra
Division by Zero in Logic and Computing Jan Bergstra To cite this version: Jan Bergstra. Division by Zero in Logic and Computing. 2021. hal-03184956v2 HAL Id: hal-03184956 https://hal.archives-ouvertes.fr/hal-03184956v2 Preprint submitted on 19 Apr 2021 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. DIVISION BY ZERO IN LOGIC AND COMPUTING JAN A. BERGSTRA Abstract. The phenomenon of division by zero is considered from the per- spectives of logic and informatics respectively. Division rather than multi- plicative inverse is taken as the point of departure. A classification of views on division by zero is proposed: principled, physics based principled, quasi- principled, curiosity driven, pragmatic, and ad hoc. A survey is provided of different perspectives on the value of 1=0 with for each view an assessment view from the perspectives of logic and computing. No attempt is made to survey the long and diverse history of the subject. 1. Introduction In the context of rational numbers the constants 0 and 1 and the operations of addition ( + ) and subtraction ( − ) as well as multiplication ( · ) and division ( = ) play a key role. When starting with a binary primitive for subtraction unary opposite is an abbreviation as follows: −x = 0 − x, and given a two-place division function unary inverse is an abbreviation as follows: x−1 = 1=x. -
4 Complex Analysis
4 Complex Analysis “He is not a true man of science who does not bring some sympathy to his studies, and expect to learn something by behavior as well as by application. It is childish to rest in the discovery of mere coincidences, or of partial and extraneous laws. The study of geometry is a petty and idle exercise of the mind, if it is applied to no larger system than the starry one. Mathematics should be mixed not only with physics but with ethics; that is mixed mathematics. The fact which interests us most is the life of the naturalist. The purest science is still biographical.” Henry David Thoreau (1817 - 1862) We have seen that we can seek the frequency content of a signal f (t) defined on an interval [0, T] by looking for the the Fourier coefficients in the Fourier series expansion In this chapter we introduce complex numbers and complex functions. We a ¥ 2pnt 2pnt will later see that the rich structure of f (t) = 0 + a cos + b sin . 2 ∑ n T n T complex functions will lead to a deeper n=1 understanding of analysis, interesting techniques for computing integrals, and The coefficients can be written as integrals such as a natural way to express analog and dis- crete signals. 2 Z T 2pnt an = f (t) cos dt. T 0 T However, we have also seen that, using Euler’s Formula, trigonometric func- tions can be written in a complex exponential form, 2pnt e2pint/T + e−2pint/T cos = . T 2 We can use these ideas to rewrite the trigonometric Fourier series as a sum over complex exponentials in the form ¥ 2pint/T f (t) = ∑ cne , n=−¥ where the Fourier coefficients now take the form Z T −2pint/T cn = f (t)e dt. -
1 Category Theory
{-# LANGUAGE RankNTypes #-} module AbstractNonsense where import Control.Monad 1 Category theory Definition 1. A category consists of • a collection of objects • and a collection of morphisms between those objects. We write f : A → B for the morphism f connecting the object A to B. • Morphisms are closed under composition, i.e. for morphisms f : A → B and g : B → C there exists the composed morphism h = f ◦ g : A → C1. Furthermore we require that • Composition is associative, i.e. f ◦ (g ◦ h) = (f ◦ g) ◦ h • and for each object A there exists an identity morphism idA such that for all morphisms f : A → B: f ◦ idB = idA ◦ f = f Many mathematical structures form catgeories and thus the theorems and con- structions of category theory apply to them. As an example consider the cate- gories • Set whose objects are sets and morphisms are functions between those sets. • Grp whose objects are groups and morphisms are group homomorphisms, i.e. structure preserving functions, between those groups. 1.1 Functors Category theory is mainly interested in relationships between different kinds of mathematical structures. Therefore the fundamental notion of a functor is introduced: 1The order of the composition is to be read from left to right in contrast to standard mathematical notation. 1 Definition 2. A functor F : C → D is a transformation between categories C and D. It is defined by its action on objects F (A) and morphisms F (f) and has to preserve the categorical structure, i.e. for any morphism f : A → B: F (f(A)) = F (f)(F (A)) which can also be stated graphically as the commutativity of the following dia- gram: F (f) F (A) F (B) f A B Alternatively we can state that functors preserve the categorical structure by the requirement to respect the composition of morphisms: F (idC) = idD F (f) ◦ F (g) = F (f ◦ g) 1.2 Natural transformations Taking the construction a step further we can ask for transformations between functors. -
Topology Proceedings
Topology Proceedings Web: http://topology.auburn.edu/tp/ Mail: Topology Proceedings Department of Mathematics & Statistics Auburn University, Alabama 36849, USA E-mail: [email protected] ISSN: 0146-4124 COPYRIGHT °c by Topology Proceedings. All rights reserved. Topology Proceedings Vol 17, 1992 LOWER SEMIFINITE TOPOLOGY IN HYPERSPACES E. CUCHILLO-IBANEZ, M. A. MORON AND F. R. RUIZ DEt PORTAL ABSTRACT. In this paper we use the lower semifinite topology in hyperspaces to obtain examples in topology such as pseudocompact spaces not countably compact, separable spaces not Lindelof and in a natural way many spaces appear which are To but not TI . We also give, in a unified form, many examples of contractible locally contractible spaces, absolute extensor for the class of all topological spaces, absolute retract and many examples of- spaces having the fixed point property. Finally we obtain the following characterization of compactness: "A paracompact Hausdorff space is compact if and only if the hyperspace, with the lower semifinite topology, 2x , has the fixed point property". INTRODUCTION This paper was born while the authors were rereading two excellent books: Rings of Continuous Functions by L. Gillman and M. Jerison, [4], and Hyperspaces of Sets by S. Nadler, [6]. But the subject of our paper is not the same as that in [4] or [6]. On the other hand there is some relation to the material in [3]. We found, in a unified form, many examples of different kinds in Topology, such as covering, homotopy, separation, The authors have been supported by the "Acciones Concertadas" of the Universidad Politecnica de Madrid. -
Intflow: Improving the Accuracy of Arithmetic Error Detection Using Information Flow Tracking
IntFlow: Improving the Accuracy of Arithmetic Error Detection Using Information Flow Tracking Anonymous Submission ABSTRACT operations often constitute a well-established status quo. Integer overflow and underflow, signedness conversion, and Language specifications and compiler checks are tolerant other types of arithmetic errors in C/C++ programs are towards such errors, not only to compensate for develop- among the most common software flaws that result in ex- ers' imprecise understanding of the C/C++ type systems, ploitable vulnerabilities. Despite significant advances in au- but, more importantly, to allow for code optimizations that tomating the detection of arithmetic errors, existing tools greatly increase the performance of critical code segments. have not seen widespread adoption mainly due to their in- This freedom comes at a cost: arithmetic operations consti- creased number of false positives. Developers rely on wrap- tute a major source of errors, often leading to serious secu- around counters, bit shifts, and other language constructs rity breaches when an erroneous value directly or indirectly for performance optimizations and code compactness, but affects sensitive system calls or memory operations. those same constructs, along with incorrect assumptions and The root of the problem is fundamentally bound to the dif- conditions of undefined behavior, are often the main cause ferences between the physical and machine representations of severe vulnerabilities. Accurate differentiation between of numbers: although integer and floating point numbers legitimate and erroneous uses of arithmetic language intri- are infinite, their machine representations are restricted by cacies thus remains an open problem. their respective type-specific characteristics (e.g., signedness As a step towards addressing this issue, we present Int- and bit-length). -
Arcgis: Working with Geodatabase Topology
ArcGIS™: Working With Geodatabase Topology ® An ESRI White Paper • May 2003 ESRI 380 New York St., Redlands, CA 92373-8100, USA • TEL 909-793-2853 • FAX 909-793-5953 • E-MAIL [email protected] • WEB www.esri.com Copyright © 2003 ESRI All rights reserved. Printed in the United States of America. The information contained in this document is the exclusive property of ESRI. This work is protected under United States copyright law and other international copyright treaties and conventions. No part of this work may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording, or by any information storage or retrieval system, except as expressly permitted in writing by ESRI. All requests should be sent to Attention: Contracts Manager, ESRI, 380 New York Street, Redlands, CA 92373-8100, USA. The information contained in this document is subject to change without notice. U.S. GOVERNMENT RESTRICTED/LIMITED RIGHTS Any software, documentation, and/or data delivered hereunder is subject to the terms of the License Agreement. In no event shall the U.S. Government acquire greater than RESTRICTED/LIMITED RIGHTS. At a minimum, use, duplication, or disclosure by the U.S. Government is subject to restrictions as set forth in FAR §52.227-14 Alternates I, II, and III (JUN 1987); FAR §52.227-19 (JUN 1987) and/or FAR §12.211/12.212 (Commercial Technical Data/Computer Software); and DFARS §252.227-7015 (NOV 1995) (Technical Data) and/or DFARS §227.7202 (Computer Software), as applicable. Contractor/Manufacturer is ESRI, 380 New York Street, Redlands, CA 92373-8100, USA. -
Intflow: Improving the Accuracy of Arithmetic Error Detection Using Information Flow Tracking
IntFlow: Improving the Accuracy of Arithmetic Error Detection Using Information Flow Tracking Marios Pomonis Theofilos Petsios Kangkook Jee Columbia University Columbia University Columbia University [email protected] theofi[email protected] [email protected] Michalis Polychronakis Angelos D. Keromytis Columbia University Columbia University [email protected] [email protected] ABSTRACT General Terms Integer overflow and underflow, signedness conversion, and Security, Reliability other types of arithmetic errors in C/C++ programs are among the most common software flaws that result in ex- Keywords ploitable vulnerabilities. Despite significant advances in au- Static analysis, information flow tracking, arithmetic errors tomating the detection of arithmetic errors, existing tools have not seen widespread adoption mainly due to their in- creased number of false positives. Developers rely on wrap- 1. INTRODUCTION around counters, bit shifts, and other language constructs When developing programs in the C and C++ languages, for performance optimizations and code compactness, but programming practices that involve undefined arithmetic those same constructs, along with incorrect assumptions and operations often constitute a well-established status quo. conditions of undefined behavior, are often the main cause Compilers tolerate the use of undefined behavior, as this of severe vulnerabilities. Accurate differentiation between enables code optimizations that greatly increase the perfor- legitimate and erroneous uses of arithmetic language intri- mance of critical code segments. Consequently, program- cacies thus remains an open problem. mers often purposely rely on undefined language constructs As a step towards addressing this issue, we present Int- due to empirical certainty for certain expected outcomes. Flow, an accurate arithmetic error detection tool that com- This flexibility comes at a cost: arithmetic operations con- bines static information flow tracking and dynamic program stitute a major source of errors, often leading to serious se- analysis.