text stringlengths 30 4k | source stringlengths 60 201 |
|---|---|
:17)
(cid:30) (cid:7)
(cid:0)
(cid:1)
which
allows
to
treat
them
as
coordinate
and
k
k
kk
momentum(cid:5)
In
terms
of
the
operators
p(cid:17)
(cid:1)
q(cid:17)
the
hamiltonian
is
represented
as
a
sum
of
k
k
independent
harmonic
oscillators(cid:5)
Indeed(cid:1)
since
a
a
(cid:8)
a
a
(cid:7)
p(cid:17)
p(cid:17)
(cid:8)... | https://ocw.mit.edu/courses/8-514-strongly-correlated-systems-in-condensed-matter-physics-fall-2003/59d41060e232d13d3da729e329a15c73_lec45.pdf |
:7)
k
k
k
(0)
(cid:12)
q(cid:17)
(cid:7)
e
q(cid:17) (cid:2)
p(cid:17)
(cid:7)
e
p(cid:17) (cid:2)
e
(cid:7)
(cid:3)(cid:11)(cid:22)(cid:4)
k
k
(cid:1)
(cid:0)
(cid:1)
k
k
(0)
(cid:12)
(cid:8) (cid:9)
(cid:11)n
k
which
acts
on
the
operators
a
(cid:1)
a
as
k
k
+
a
(cid:7)
cosh
(cid:13)
b
sinh
(cid:13)
b
(cid:2)
a
(cid... | https://ocw.mit.edu/courses/8-514-strongly-correlated-systems-in-condensed-matter-physics-fall-2003/59d41060e232d13d3da729e329a15c73_lec45.pdf |
(cid:7)
(cid:11)n
V
(cid:8)
E
b
b
(cid:3)(cid:11)(cid:24)(cid:4)
k
k
k
k
k
k
k
k
H
(cid:9)
(cid:9)
(cid:0)
(cid:0)
(
(cid:6)
)
k
k
X
(cid:0)
(cid:0)
(cid:1)
k
�0
X
describing
a
gas
of
Bogoliubov
quasiparticles(cid:1)
the
noninteracting
bosons
created
and
an(cid:0)
nihilated
by
the
operators
b
(cid:1)
b
(cid:1)
having
e... | https://ocw.mit.edu/courses/8-514-strongly-correlated-systems-in-condensed-matter-physics-fall-2003/59d41060e232d13d3da729e329a15c73_lec45.pdf |
9)(cid:15)(cid:4)
k
k
k
k
k
+ +
(cid:5)
(cid:7)
(cid:0)
(cid:0)
(cid:0)
k
�0
X
(cid:0)
(cid:1)
(cid:6)
A
(cid:13)
(cid:4)
(cid:4)
... | https://ocw.mit.edu/courses/8-514-strongly-correlated-systems-in-condensed-matter-physics-fall-2003/59d41060e232d13d3da729e329a15c73_lec45.pdf |
1)
the
dispersion
k
takes
the
form
of
a
usual
free(cid:0)particle
expression
E
(cid:7) (cid:10)
h
(cid:7)(cid:9)m
(cid:8)
(cid:11)n(cid:5)
k
2
2
k
E
(cid:7)
hc
(cid:10)
(cid:2)
c
(cid:7)
(cid:11)n(cid:7)m
(cid:3)(cid:9)(cid:11)(cid:4)
k
k
j
j
q
Remarkably(cid:1)
both
the
collective
modes(cid:1)
sound
waves(cid:1)
and
t... | https://ocw.mit.edu/courses/8-514-strongly-correlated-systems-in-condensed-matter-physics-fall-2003/59d41060e232d13d3da729e329a15c73_lec45.pdf |
:11)n
(cid:3)(cid:11)n(cid:4)
the
same
as
Eq(cid:5)(cid:3)(cid:11)(cid:28)(cid:4)(cid:5)
In
other
words(cid:1)
one
can
con(cid:0)
(0)
2
2
k
(cid:6)
(cid:0)
r
(cid:0)
(cid:1)
sider
condensate
with
(cid:26)uctuating
amplitude
and
phase(cid:1)
and
show
that
these
(cid:26)uctuations
propagate
in
just
the
same
way
as
the
co... | https://ocw.mit.edu/courses/8-514-strongly-correlated-systems-in-condensed-matter-physics-fall-2003/59d41060e232d13d3da729e329a15c73_lec45.pdf |
in
magnitude(cid:1)
which
means
that
the
oscillation
follows
a
small
circle
in
the
complex
(cid:10)
plane(cid:1)
i(cid:5)e(cid:5)
the
phase
and
the
modulus
(cid:0)
of
(cid:10)
participate
in
the
collective
oscillations
roughly
equally(cid:5)
We
can
use
the
above
results
to
estimate
the
e(cid:6)ect
of
condensate
depleti... | https://ocw.mit.edu/courses/8-514-strongly-correlated-systems-in-condensed-matter-physics-fall-2003/59d41060e232d13d3da729e329a15c73_lec45.pdf |
:1)
3(cid:1)2
Estimating
the
sum
as
O(cid:3)(cid:11)
(cid:4)(cid:1)
we
(cid:16)nd
that
the
condensate
depletion
is
a
small
e(cid:6)ect(cid:5)
In
contrast(cid:1)
in
superfuid
He
only
few
percent
of
the
helium
atoms
are
in
the
single(cid:0)particle
4
ground
state(cid:5)
(cid:19)
... | https://ocw.mit.edu/courses/8-514-strongly-correlated-systems-in-condensed-matter-physics-fall-2003/59d41060e232d13d3da729e329a15c73_lec45.pdf |
Routing
Second main application of Chernoff: analysis of load balancing.
• Already saw balls in bins example
• synchronous message passing
• bidirectional links, one message per step
• queues on links
• permutation routing
• oblivious algorithms only consider self packet.
• Theorem Any deterministic oblivious perm... | https://ocw.mit.edu/courses/6-856j-randomized-algorithms-fall-2002/59d8268c8f271c4bc7c5302f797fd6bd_n6.pdf |
�
– Adversary doesn’t know our routing so cannot plan worst permu
tation
• What if don’t wait for next phase?
– FIFO queuing
– total time is length plus delay
– Expected delay ≤ E[ T (el)] = n/2.
– Chernoff bound? no. dependence of T (ei).
�
• High prob. bound:
– consider paths sharing i’s fixed route (e0, . . . ... | https://ocw.mit.edu/courses/6-856j-randomized-algorithms-fall-2002/59d8268c8f271c4bc7c5302f797fd6bd_n6.pdf |
, then l at ej +1 next time)
�
∗
∗ charge one delay to w.
Summary:
• 2 key roles for chernoff
• sampling
• load balancing
• “high probability” results at log n means.
3
The Probabilistic Method—Value of Random Answers
Idea: to show an object with certain properties exists
• generate a random object
• pro... | https://ocw.mit.edu/courses/6-856j-randomized-algorithms-fall-2002/59d8268c8f271c4bc7c5302f797fd6bd_n6.pdf |
sets T
sets S
–
–
–
Pr[] ≤
�
��
n
s
n
�
cs
(cs/n)ds
≤ (en/s)s(en/cs)cs(cs/n)ds
=
≤
≤
[(s/n)d−c−1 e
[(1/3)d−c−1 e
[(c/3)d(3e)c+1]
c d−c]
s
c d−c]
s
s
c+1
c+1
– Take c = 2, d = 18, get [(2/3)18(3e)3]<2−s
– sum over s, get < 1
Existence proof
• No known construction this good.
• N P -hard to verify
•... | https://ocw.mit.edu/courses/6-856j-randomized-algorithms-fall-2002/59d8268c8f271c4bc7c5302f797fd6bd_n6.pdf |
, value ˆ
w.
• rounding is Poisson vars, mean ˆw.
6
• Pr[≥ (1 + δ) ˆ
w] ≤ e−δ2 ˆ
w/4
• need 2n boundaries, so aim for prob. bound 1/2n2 .
• solve, δ =
�
(4 ln 2n2)/ ˆw.
√
•
So absolute error
8 ˆw ln n
– Good (o(1)-error) if ˆw � 8 ln n
– Bad (O(ln n) error) is ˆw = 2
– General rule: randomized rounding g... | https://ocw.mit.edu/courses/6-856j-randomized-algorithms-fall-2002/59d8268c8f271c4bc7c5302f797fd6bd_n6.pdf |
1-approx for k = 1
LP good for small clauses, random for large.
• Better: try both methods.
• n1, n2 number in both methods
• Show (n1 + n2)/2 ≥ (3/4)
�
zˆj
• n1 ≥
Cj ∈Sk (1 − 2−k )ˆzj
�
• n2 ≥
βk zˆj
�
• n1 + n2 ≥
(1 − 2−k + βk )ˆ
zj ≥
�
3 ˆ
2 zj
�
8 | https://ocw.mit.edu/courses/6-856j-randomized-algorithms-fall-2002/59d8268c8f271c4bc7c5302f797fd6bd_n6.pdf |
MASSACHUSETTS INSTITUTE OF TECHNOLOGY
6.265/15.070J
Lecture 1
Fall 2013
9/4/2013
Metric spaces and topology
Content. Metric spaces and topology. Polish Space. Arzel´a-Ascoli Theo
rem. Convergence of mappings. Skorohod metric and Skorohod space.
1
Metric spaces. Open, closed and compact sets
When we discuss p... | https://ocw.mit.edu/courses/15-070j-advanced-stochastic-processes-fall-2013/59e4f0d302a20e75921eaf4e290739dd_MIT15_070JF13_Lec1.pdf |
∞ essentially corresponds to Ix − yI∞.
1≤j≤d
1
Problem 1. Show that Lp is not a metric when 0 < p < 1.
Another important example is S = C[0, T ] – the space of continuous func
tions x : [0, T ] → Rd and ρ(x, y) = ρT = sup0≤t≤T Ix(t) − y(t)I, where I · I
can be taken as any of Lp or L∞. We will usually concentrate ... | https://ocw.mit.edu/courses/15-070j-advanced-stochastic-processes-fall-2013/59e4f0d302a20e75921eaf4e290739dd_MIT15_070JF13_Lec1.pdf |
of E is a pair of nodes (u, v), u, v ∈ V . For every two nodes u
and v, which are not necessarily connected by an edge, let ρ(u, v) be the length
of a shortest path connecting u with v. Then it is easy to see that ρ is a metric
on the finite set V .
Definition 2. A sequence xn ∈ S is said to converge to a limit x ∈ S... | https://ocw.mit.edu/courses/15-070j-advanced-stochastic-processes-fall-2013/59e4f0d302a20e75921eaf4e290739dd_MIT15_070JF13_Lec1.pdf |
T ] of C[0, ∞), namely are these spaces Polish as well? The answer is
yes, but we will get to this later.
Problem 3. Given a set S, consider the metric ρ defined by ρ(x, x) = 0, ρ(x, y) =
1 for x = y. Show that (S, ρ) is a metric space. Suppose S is uncountable. Show
that S is not separable.
Given x ∈ S and r > 0 d... | https://ocw.mit.edu/courses/15-070j-advanced-stochastic-processes-fall-2013/59e4f0d302a20e75921eaf4e290739dd_MIT15_070JF13_Lec1.pdf |
A \ Ao . Examples of open sets are open balls Bo(x, r) = {y ∈ S :
ρ(x, y) < r} ⊂ B(x, r) (check this). A set K ⊂ S is defined to be compact
if every sequence xn ∈ K contains a converging subsequence xnk → x and
x ∈ K. It can be shown that K ⊂ Rd is compact if and only if K is closed and
bounded (namely supx∈K IxI < ... | https://ocw.mit.edu/courses/15-070j-advanced-stochastic-processes-fall-2013/59e4f0d302a20e75921eaf4e290739dd_MIT15_070JF13_Lec1.pdf |
to x ∈ S it is also true that f (xn) converges to f (x).
A mapping f is defined to be continuous if it is continuous in every x ∈ S1.
A mapping is uniformly continuous if for every E > 0 there exists δ > 0 such
that ρ1(x, y) < δ implies ρ2(f (x), f (y)) < E.
Problem 5. Show that f is a continuous mapping if and only... | https://ocw.mit.edu/courses/15-070j-advanced-stochastic-processes-fall-2013/59e4f0d302a20e75921eaf4e290739dd_MIT15_070JF13_Lec1.pdf |
�1(y, z) < δ/2.
We just showed that there exists i, 1 ≤ i ≤ k such that ρ1(xi, y) ≤ δ(xi)/2.
By triangle inequality ρ1(xi, z) < δ(xi)/2 + δ/2 ≤ δ(xi). Namely both y
and z belong to Bo(xi, δ(xi)). Then f (y), f (z) ∈ Bo(f (xi), E). By triangle
inequality we have If (y) − f (z)I ≤ If (y) − f (xi)I + If (z) − f (xi)I ... | https://ocw.mit.edu/courses/15-070j-advanced-stochastic-processes-fall-2013/59e4f0d302a20e75921eaf4e290739dd_MIT15_070JF13_Lec1.pdf |
n If (xn)I = supx∈K If (x)I.
Since K is compact there exists a converging subsequence xnk → x0. Again us
ing continuity of f we have f (xnk ) → f (x0). But If (xnk )I → supx∈K If (x)I.
We conclude f (x0) = supx∈K If (x)I.
We mentioned that the sets in Rd which are compact are exactly bounded closed
sets. What abou... | https://ocw.mit.edu/courses/15-070j-advanced-stochastic-processes-fall-2013/59e4f0d302a20e75921eaf4e290739dd_MIT15_070JF13_Lec1.pdf |
x(t)| + |x(t) − x(s)| + |x(s) − y(s)| ≤ |x(t) − x(s)| + 2Ix − yI.
Similarly we show that |x(t) − x(s)| ≤ |y(t) − y(s)| + 2Ix − yI. Therefore for
every δ > 0.
|wx(δ) − wy(δ)| < 2Ix − yI.
We now show (2). Check that (2) is equivalent to
lim sup wx( ) = 0.
n
x∈A
1
n
(3)
(4)
Suppose A is compact but (4) does not... | https://ocw.mit.edu/courses/15-070j-advanced-stochastic-processes-fall-2013/59e4f0d302a20e75921eaf4e290739dd_MIT15_070JF13_Lec1.pdf |
. A sequence fn is defined to converge to f uniformly
if
lim sup ρ2(fn(x), f (x)) = 0.
n x∈S1
Also given K ⊂ S1, sequence fn is said to converge to f uniformly on K if the
restriction of fn, f onto K gives a uniform convergence. A sequence fn is said
to converge to f uniformly on compact sets u.o.c if fn converges... | https://ocw.mit.edu/courses/15-070j-advanced-stochastic-processes-fall-2013/59e4f0d302a20e75921eaf4e290739dd_MIT15_070JF13_Lec1.pdf |
all n > n0,
sup ρ2(fn(z), f (z)) < E/3. Fix any such n > n0. Since, by assumption fn
is continuous, then there exists δ > 0 such that ρ2(fn(x), fn(y)) < E/3 for all
y ∈ Bo(x, δ). Then for any such y we have
ρ2(f (x), f (y)) ≤ ρ2(f (x), fn(x)) + ρ2(fn(x), fn(y)) + ρ2(fn(y), f (x)) < 3E/3 = E.
This proves continuity ... | https://ocw.mit.edu/courses/15-070j-advanced-stochastic-processes-fall-2013/59e4f0d302a20e75921eaf4e290739dd_MIT15_070JF13_Lec1.pdf |
think about a process describing the number of customers
in a branch of a bank. This process is described as a piece-wise constant func
tion. We adopt a convention that at a moment when a customer arrives/departs,
the number of customers is identified with the number of customers right af
ter arrival/departure. This... | https://ocw.mit.edu/courses/15-070j-advanced-stochastic-processes-fall-2013/59e4f0d302a20e75921eaf4e290739dd_MIT15_070JF13_Lec1.pdf |
1−τ (t − τ − δ),
1−τ −δ
t ∈ [0, τ + δ];
t ∈ [τ + δ, T ].
7
We see that x(λ(t)) = y(t). In other words, we rescaled the axis [0, T ] by
a small amount and made y close to (in fact identical to) x. This motivates the
following definition. From here on we use the following notations: x ∧ y stands
for min(x, y) and x ... | https://ocw.mit.edu/courses/15-070j-advanced-stochastic-processes-fall-2013/59e4f0d302a20e75921eaf4e290739dd_MIT15_070JF13_Lec1.pdf |
orohod metric. Suppose now ρs(xn, x) → 0. We
need to show Ixn − xI → 0.
Consider any sequence λn ∈ Λ such that Iλn−II → 0 and Ix(λn)−xnI →
0. Such a sequence exists since ρs(xn, x) → 0 (check). We have
Ix − xnI ≤ Ix − xλnI + Ixλn − xnI.
The second summand in the right-hand side converges to zero by the choice of
... | https://ocw.mit.edu/courses/15-070j-advanced-stochastic-processes-fall-2013/59e4f0d302a20e75921eaf4e290739dd_MIT15_070JF13_Lec1.pdf |
Massachusetts Institute of Technology
Department of Electrical Engineering and Computer Science
6.243j (Fall 2003): DYNAMICS OF NONLINEAR SYSTEMS
by A. Megretski
Lecture 2: Differential Equations As System Models1
Ordinary differential requations (ODE) are the most frequently used tool for modeling
continuous-time ... | https://ocw.mit.edu/courses/6-243j-dynamics-of-nonlinear-systems-fall-2003/5a1c1ee61722a192c4479093ffb612d0_lec2_6243_2003.pdf |
all t ⊂ T , and
x˙ (t) = a(x(t), t)
x(t2) − x(t1) =
t2
�
t1
a(x(t), t)dt � t1, t2 ⊂ T.
1Version of September 10, 2003
(2.1)
(2.2)
2
The variable t is usually referred to as the “time”.
Note the use of an integral form in the formal definition (2.2): it assumes that the
function t ∈� a(x(t), t) is integrab... | https://ocw.mit.edu/courses/6-243j-dynamics-of-nonlinear-systems-fall-2003/5a1c1ee61722a192c4479093ffb612d0_lec2_6243_2003.pdf |
(2.3) have the form
x(t) = max{c − t, 0} or x(t) = min{t − c, 0},
where c is an arbitrary real constant. These solutions are not differentiable at the critical
“stopping moment” t = c.
2.1.2 Standard ODE system models
Ordinary differential equations can be used in many ways for modeling of dynamical
systems. The no... | https://ocw.mit.edu/courses/6-243j-dynamics-of-nonlinear-systems-fall-2003/5a1c1ee61722a192c4479093ffb612d0_lec2_6243_2003.pdf |
mentioned before, not all ODE models are adequate for design and analysis
purposes. The notion of well-posedness introduces some typical constraints aimed at
insuring their applicability.
Definition A standard ODE model ODE(f, g) is called well posed if for every signal
v(t) ⊂ V and for every solution x1 : [0, t1] ∈... | https://ocw.mit.edu/courses/6-243j-dynamics-of-nonlinear-systems-fall-2003/5a1c1ee61722a192c4479093ffb612d0_lec2_6243_2003.pdf |
to dry friction and external force input v), the model is not well-posed.
To prove this, consider the input v(t) = 0.5 = const. It is sufficient to show that no
solution of the ODE
x˙ (t) = 0.5 − sgn(x(t))
satisfying x(0) = 0 exists on a time interval [0, tf ] for tf > 0. Indeed, let x = x(t) be such
solution. As an... | https://ocw.mit.edu/courses/6-243j-dynamics-of-nonlinear-systems-fall-2003/5a1c1ee61722a192c4479093ffb612d0_lec2_6243_2003.pdf |
solutions for continuous ODE
This section contains fundamental results establishing existence of solutions of differential
equations with a continuous right side.
2.2.1 Local existence of solutions for continuous ODE
In this subsection we study solutions x :
[t0, tf ] ∈� Rn of the standard ODE
(same as (2.1)), subj... | https://ocw.mit.edu/courses/6-243j-dynamics-of-nonlinear-systems-fall-2003/5a1c1ee61722a192c4479093ffb612d0_lec2_6243_2003.pdf |
.3 The ODE
x˙ (t) = c0 + c1 cos(t) + x(t)2 ,
where c0, c1 are given constants, belongs to the class of Riccati equations, which play a
prominent role in the linear system theory. According to Theorem 2.1, for any initial
condition x(0) = x0 there exists a solution of the Riccati equation, defined on some time
inter... | https://ocw.mit.edu/courses/6-243j-dynamics-of-nonlinear-systems-fall-2003/5a1c1ee61722a192c4479093ffb612d0_lec2_6243_2003.pdf |
which T is a proper subset of T , and x(t) = x(t) for all t ⊂ T . In
¯
particular, well-posedness of standard ODE system models contains the requirement that
all maximal solutions must be defined on the whole time-line t ⊂ [0, →).
¯
¯
The following theorem gives a useful characterization of maximal solutions.
Theore... | https://ocw.mit.edu/courses/6-243j-dynamics-of-nonlinear-systems-fall-2003/5a1c1ee61722a192c4479093ffb612d0_lec2_6243_2003.pdf |
lim |x(t)| = →.
t�tf
In Example 2.2.1 with c0 = 1, c1 = 0, one maximal ODE solution is x(t) = tan(t),
defined for t ⊂ (−�/2, �/2). It cannot be extended on either side because |x(t)| � → as
t � �/2 or t � −�/2.
2.2.3 Discontinuous dependence on time
The ODE describing systems dynamics are frequently discontinuous ... | https://ocw.mit.edu/courses/6-243j-dynamics-of-nonlinear-systems-fall-2003/5a1c1ee61722a192c4479093ffb612d0_lec2_6243_2003.pdf |
t ⊂ [t0, t0 + r]}
is a subset of Z;
(b) the function t ∈� a(x(t), t) is integrable on [t0, t0 + r] for every continuous function
x :
[t0, t0 + r] ∈� Rn satisfying |x(t) − x0| ∀ r for all t ⊂ [t0, t0 + r];
(c) for every π > 0 there exists � > 0 such that
t0+r
�
t0
|a(x1(t), t) − a(x2(t), t)|dt < π
whenever x1, x... | https://ocw.mit.edu/courses/6-243j-dynamics-of-nonlinear-systems-fall-2003/5a1c1ee61722a192c4479093ffb612d0_lec2_6243_2003.pdf |
∀
t1
�
0
t−1/3dt max |x1(t) − x2(t)|
t�[0,t1]
holds.
On the contrary, the differential equation
x˙ (t) =
⎩
t−1x(t), t > 0
t = 0,
0,
x(0) = x0
does not have a solution on [0, →) for every x0 ∞= 0. Indeed, if x : [0, t1] ∈� R is a solution
for some t1 > 0 then
d
dt
⎧
x(t)
t
⎨
= 0
for all t ∞= 0. Hence x(t)... | https://ocw.mit.edu/courses/6-243j-dynamics-of-nonlinear-systems-fall-2003/5a1c1ee61722a192c4479093ffb612d0_lec2_6243_2003.pdf |
fining discontinuous ODE to guarantee existence of solutions.
It turns out that differential inclusion (2.9) subject to fixed initial condition x(t0) = x0
has a solution on a sufficiently small interval T = [t0, t1] whenever the set-valued function
� is compact convex set-valued and semicontinuous with respect to its arg... | https://ocw.mit.edu/courses/6-243j-dynamics-of-nonlinear-systems-fall-2003/5a1c1ee61722a192c4479093ffb612d0_lec2_6243_2003.pdf |
) = x0. Moreover, any
The discontinuous differential equation
x˙ (t) = −sgn(x(t)) + c,
8
where c is a fixed constant, can be re-defined as a continuous differential inclusion (2.9)
by introducing
�(y) =
{c − 1},
y > 0,
[c − 1, c + 1], y = 0,
y < 0.
{c + 1},
�
�
�
The newly obtained differential inclusion has t... | https://ocw.mit.edu/courses/6-243j-dynamics-of-nonlinear-systems-fall-2003/5a1c1ee61722a192c4479093ffb612d0_lec2_6243_2003.pdf |
6.825 Techniques in Artificial Intelligence
Logic
Lecture 3 • 1
Today we're going to start talking about logic. Now, my guess is that almost
everybody's been exposed to basic propositional logic in the context of
machine architecture or something like that. But, it turns out that that
exposure to logic was just a... | https://ocw.mit.edu/courses/6-825-techniques-in-artificial-intelligence-sma-5504-fall-2002/5a2344cf5fdd746421d4ab2b8bc60ee8_Lecture3Final.pdf |
6.825 Techniques in Artificial Intelligence
Logic
• When we have too many states, we want a
convenient way of dealing with sets of states.
• The sentence “It’s raining” stands for all the states
of the world in which it is raining.
Lecture 3 • 3
What if I say "It's raining."? One way to think about what it means... | https://ocw.mit.edu/courses/6-825-techniques-in-artificial-intelligence-sma-5504-fall-2002/5a2344cf5fdd746421d4ab2b8bc60ee8_Lecture3Final.pdf |
5
What is a logic?
• A formal language
Lecture 3 • 6
So, what is a logic? Well, a logic is a formal language. And what does that
mean? It has a syntax and a semantics, and a way of manipulating
expressions in the language. We’ll talk about each of these.
6
What is a logic?
• A formal language
• Syntax – what ... | https://ocw.mit.edu/courses/6-825-techniques-in-artificial-intelligence-sma-5504-fall-2002/5a2344cf5fdd746421d4ab2b8bc60ee8_Lecture3Final.pdf |
So, why do we want to do proofs? There are lots of situations.
Lecture 3 • 10
10
What is a logic?
• A formal language
• Syntax – what expressions are legal
• Semantics – what legal expressions mean
• Proof system – a way of manipulating syntactic
expressions to get other syntactic expressions
(which will tell ... | https://ocw.mit.edu/courses/6-825-techniques-in-artificial-intelligence-sma-5504-fall-2002/5a2344cf5fdd746421d4ab2b8bc60ee8_Lecture3Final.pdf |
things together and infer something about the next state
of the world. So these are two kinds of inferences that an agent might want
to do. We could come up with a lot of other ones, but those are two good
examples to keep in mind.
12
Propositional Logic Syntax
Lecture 3 • 13
In the book they start by talking ab... | https://ocw.mit.edu/courses/6-825-techniques-in-artificial-intelligence-sma-5504-fall-2002/5a2344cf5fdd746421d4ab2b8bc60ee8_Lecture3Final.pdf |
really, but it's syntactically well-formed. It's got the nouns,
the verbs, and the adjectives in the right place. If you scrambled the words
up, you wouldn’t get a sentence, right? You’d just get a string of words that
didn’t obey the rules of syntax. So, "furiously ideas green sleep colorless" is
not OK.
15
Prop... | https://ocw.mit.edu/courses/6-825-techniques-in-artificial-intelligence-sma-5504-fall-2002/5a2344cf5fdd746421d4ab2b8bc60ee8_Lecture3Final.pdf |
that a computer is going to
read. And so we don't have to be absolutely rigorous about what characters
are allowed in the name of a variable. But there are going to be things called
variables, and we'll just use uppercase letters for them. Those are
sentences. It's OK to say "P" -- that's well-formed.
18
Proposit... | https://ocw.mit.edu/courses/6-825-techniques-in-artificial-intelligence-sma-5504-fall-2002/5a2344cf5fdd746421d4ab2b8bc60ee8_Lecture3Final.pdf |
: well formed formulas)
• true and false are sentences
• Propositional variables are sentences: P,Q,R,Z
• If φ and ψ are sentences, then so are
(φ),
φ, φ Æψ, φ Çψ, φ
ψ, φ
→
• Nothing else is a sentence
¬
↔
ψ
Lecture 3 • 20
And there's one more part of the definition, which says nothing else is a
sentence. OK. ... | https://ocw.mit.edu/courses/6-825-techniques-in-artificial-intelligence-sma-5504-fall-2002/5a2344cf5fdd746421d4ab2b8bc60ee8_Lecture3Final.pdf |
, which is negation. For every negation, you’d add an
open paren in front of the negation sign and a close parenthesis after the
next whole expression. This is exactly how minus behaves in arithmetic.
The next highest operator is wedge, which behaves like multiplication in
arithmetic.
Next is vee, which behaves li... | https://ocw.mit.edu/courses/6-825-techniques-in-artificial-intelligence-sma-5504-fall-2002/5a2344cf5fdd746421d4ab2b8bc60ee8_Lecture3Final.pdf |
So, in our study of logic, we’re not going to assign particular
values or meanings to the variables; rather, we’re going to study the general
properties of symbols and their potential meanings.
23
Semantics
• Meaning of a sentence is truth value {t, f}
Lecture 3 • 24
Ultimately, the meaning of every sentence, in... | https://ocw.mit.edu/courses/6-825-techniques-in-artificial-intelligence-sma-5504-fall-2002/5a2344cf5fdd746421d4ab2b8bc60ee8_Lecture3Final.pdf |
two
horizontal bars coming out to the right) to mean “sentence \Phi is true in
interpretation I”. The turnstile symbol is not part of our language. It's part of
the way logicians write things on the board when they're talking about what
they're doing.
This is a really important distinction. If you can think of our... | https://ocw.mit.edu/courses/6-825-techniques-in-artificial-intelligence-sma-5504-fall-2002/5a2344cf5fdd746421d4ab2b8bc60ee8_Lecture3Final.pdf |
Phi is true in interpretation I.
I'm going to write the semantics down in a way that's parallel to the way we
specified the syntax.
27
Semantics
• Meaning of a sentence is truth value {t, f}
• Interpretation is an assignment of truth values to
the propositional variables
[
• ² i φ Sentence φ is t in interpretat... | https://ocw.mit.edu/courses/6-825-techniques-in-artificial-intelligence-sma-5504-fall-2002/5a2344cf5fdd746421d4ab2b8bc60ee8_Lecture3Final.pdf |
i [the sentence false has truth value f in all
if and only if 2i φ
Now, let’s think about the negation sign. When is \negation \Phi true in an
interpretation I? Whenever \Phi is false in that interpretation.
Lecture 3 • 30
30
Semantics
• Meaning of a sentence is truth value {t, f}
• Interpretation is an assignm... | https://ocw.mit.edu/courses/6-825-techniques-in-artificial-intelligence-sma-5504-fall-2002/5a2344cf5fdd746421d4ab2b8bc60ee8_Lecture3Final.pdf |
if and only if 2i φ
if and only if ² i φ and ² i ψ [conjunction]
if and only if ² i φ or ² i ψ [disjunction]
Lecture 3 • 32
When is Phi vee Psi true in an interpretation I? Whenever either Phi or Psi
is true in I. This is called “disjuction”, and we’ll call the vee symbol “or”. It is
not an exclusive or; so that ... | https://ocw.mit.edu/courses/6-825-techniques-in-artificial-intelligence-sma-5504-fall-2002/5a2344cf5fdd746421d4ab2b8bc60ee8_Lecture3Final.pdf |
33
Some important shorthand
Lecture 3 • 34
It seems like we left out the arrows in the semantic definitions of the previous
slide. But the arrows are not strictly necessary; that is, it’s going to turn out
that you can say anything you want to without them, but they’re a convenient
shorthand. (In fact, you can al... | https://ocw.mit.edu/courses/6-825-techniques-in-artificial-intelligence-sma-5504-fall-2002/5a2344cf5fdd746421d4ab2b8bc60ee8_Lecture3Final.pdf |
→
¬
antecedent
≡
• φ
ψ
↔
≡
→
(φ
→
consequent
ψ) Æ (ψ
φ) [biconditional, equivalence]
→
Truth Tables
P
P Æ Q
P Ç Q
P
f
f
t
t
Q
f
t
f
t
¬
t
t
f
f
f
f
f
t
f
t
t
t
Q
Q
P
→
t
t
f
t
P
→
t
f
t
t
P
Q
↔
t
f
f
t
Lecture 3 • 37
Just so you can see how all of these operators work, here are the t... | https://ocw.mit.edu/courses/6-825-techniques-in-artificial-intelligence-sma-5504-fall-2002/5a2344cf5fdd746421d4ab2b8bc60ee8_Lecture3Final.pdf |
t
t
f
f
f
f
f
t
f
t
t
t
Q
Q
P
→
t
t
f
t
P
→
t
f
t
t
P
Q
↔
t
f
f
t
Q is t
Note that implication is not “causality”, if P is f then P
→
Lecture 3 • 38
Most of them are fairly obvious, but it’s worth studying the truth table for
implication fairly closely. In particular, note that (P implies Q) is tru... | https://ocw.mit.edu/courses/6-825-techniques-in-artificial-intelligence-sma-5504-fall-2002/5a2344cf5fdd746421d4ab2b8bc60ee8_Lecture3Final.pdf |
• A sentence is satisfiable iff its truth value is t in at
¬
least one interpretation
Satisfiable sentences: P, true,
¬
P
Lecture 3 • 41
A sentence is satisfiable if and only if it's true in at least one interpretation.
The sentence P is satisfiable. The sentence True is satisfiable. Not P is
satisfiable.
41
... | https://ocw.mit.edu/courses/6-825-techniques-in-artificial-intelligence-sma-5504-fall-2002/5a2344cf5fdd746421d4ab2b8bc60ee8_Lecture3Final.pdf |
Write down
all the interpretations, figure out the value of the sentence in each
interpretation, and if they're all true, it's valid. If they're all false, it's
unsatisfiable. If it's somewhere in between, it's satisfiable. So there's a way;
there's just a completely dopey, tedious, mechanical way to figure out if ... | https://ocw.mit.edu/courses/6-825-techniques-in-artificial-intelligence-sma-5504-fall-2002/5a2344cf5fdd746421d4ab2b8bc60ee8_Lecture3Final.pdf |
Lecture 3 • 46
46
Models and Entailment
• An interpretation i is a model
of a sentence φ iff ² i φ
• A set of sentences KB entails φ
iff every model of KB is also a
model of φ
Sentences
Sentences
Lecture 3 • 47
So, here’s the picture. If we consider two groups of sentences, we might like
to say that one set... | https://ocw.mit.edu/courses/6-825-techniques-in-artificial-intelligence-sma-5504-fall-2002/5a2344cf5fdd746421d4ab2b8bc60ee8_Lecture3Final.pdf |
m
e
s
s
c
i
t
n
a
m
e
s
Sentences
Sentences
Interpretations
Interpretations
subset
Now, we can ask whether the first set of interpretations is a subset of the
second set.
Lecture 3 • 50
50
Models and Entailment
• An interpretation i is a model
of a sentence φ iff ² i φ
• A set of sentences KB entails φ ... | https://ocw.mit.edu/courses/6-825-techniques-in-artificial-intelligence-sma-5504-fall-2002/5a2344cf5fdd746421d4ab2b8bc60ee8_Lecture3Final.pdf |
m
e
s
s
c
i
t
n
a
m
e
s
Sentences
entails
Sentences
Interpretations
Interpretations
subset
KB = A Æ B
φ = B
U
Lecture 3 • 53
Now, we can use a Venn diagram to think about the interpretations. Let U
be the set of all possible interpretations.
53
Models and Entailment
• An interpretation i is a model
o... | https://ocw.mit.edu/courses/6-825-techniques-in-artificial-intelligence-sma-5504-fall-2002/5a2344cf5fdd746421d4ab2b8bc60ee8_Lecture3Final.pdf |
Models and Entailment
• An interpretation i is a model
of a sentence φ iff ² i φ
• A set of sentences KB entails φ
iff every model of KB is also a
model of φ
s
c
i
t
n
a
m
e
s
s
c
i
t
n
a
m
e
s
Sentences
entails
Sentences
Interpretations
Interpretations
subset
KB = A Æ B
φ = B
A Æ B ² B
A Æ B
B
U
Lect... | https://ocw.mit.edu/courses/6-825-techniques-in-artificial-intelligence-sma-5504-fall-2002/5a2344cf5fdd746421d4ab2b8bc60ee8_Lecture3Final.pdf |
if we have a way of deciding whether
sentences are valid, then we have a way of checking whether one set of
sentences entails another. That is, whether the truth of one set of sentences
semantically requires the truth of another. This is going to lead into
techniques for proof, which is the process of testing for v... | https://ocw.mit.edu/courses/6-825-techniques-in-artificial-intelligence-sma-5504-fall-2002/5a2344cf5fdd746421d4ab2b8bc60ee8_Lecture3Final.pdf |
→
f)
¬
Examples
Interpretation that make
sentence’s truth value = f
Valid?
valid
satisfiable,
not valid
satisfiable,
not valid
smoke = t, fire = f
s = f, f = t
s
f = t,
→
¬
s
→
¬
f = f
Lecture 3 • 61
Here is a form of reasoning that you hear people do a lot, but the question is,
is it OK? “Smoke im... | https://ocw.mit.edu/courses/6-825-techniques-in-artificial-intelligence-sma-5504-fall-2002/5a2344cf5fdd746421d4ab2b8bc60ee8_Lecture3Final.pdf |
fire, then there's no smoke.
62
smoke
Sentence
smoke
→
smoke Ç
smoke
¬
smoke
fire
→
(s
→
f)
→
(
¬
s
→
f)
¬
(s
f)
→
contrapositive
(
f
→
¬
→
¬
s)
b Ç d Ç (b
b Ç d Ç
d)
→
b Ç d
¬
Examples
Interpretation that make
sentence’s truth value = f
Valid?
valid
satisfiable,
not valid ... | https://ocw.mit.edu/courses/6-825-techniques-in-artificial-intelligence-sma-5504-fall-2002/5a2344cf5fdd746421d4ab2b8bc60ee8_Lecture3Final.pdf |
Programs with Flexible Time
When?
Contributions:
Brian Williams
Patrick Conrad
Simon Fang
Paul Morris
Nicola Muscettola
Pedro Santana
Julie Shah
John Stedl
Andrew Wang
courtesy of JPL
Steve Levine
Tuesday, Feb 16th
(cid:2)
Assignments
Problems Sets:
• Pset 1 due tomorrow (Wednesday) at 11:59pm
• Pset 2 released tomorr... | https://ocw.mit.edu/courses/16-412j-cognitive-robotics-spring-2016/5a40e2ff010a7721fdf6c5513ce5e26a_MIT16_412JS16_L4.pdf |
YX
Y X
Y
X
Y-
Y-
BF G(cid:29)CD
[0,inf]
X+
[0,0]
BF <(cid:29)CD
X+
CD G(cid:29)BF and X- < Y+
CD G(cid:29)BD and X+ < Y+
BD <(cid:29)CD and X+ < Y+
BD G(cid:29)CD and X+ = Y+
BD <(cid:29)CD and X+ = Y+
BF G(cid:29)CD or Y+ < X-
(cid:2)(cid:5)
[Villain & Kautz; Simmons]
Temporal Relations Described by a
Simple Tempora... | https://ocw.mit.edu/courses/16-412j-cognitive-robotics-spring-2016/5a40e2ff010a7721fdf6c5513ce5e26a_MIT16_412JS16_L4.pdf |
:13)(cid:27) (cid:21)(cid:27)(cid:8)
(cid:2)(
Consistency of an STN
Input: STN <X, C> where Cj = < <Xk, Xi>, <aj, bj> >
[1,10]
B
A
[0,9]
C
[1,1]
D
[2,2]
STN is consistent iff there exists an assignment to times X
satisfying C.
(cid:2)-
Schedule of an STN
Input: STN <X, C> where Cj = < <Xk, Xi>, <aj, bj> >
[1,10]
B
A
... | https://ocw.mit.edu/courses/16-412j-cognitive-robotics-spring-2016/5a40e2ff010a7721fdf6c5513ce5e26a_MIT16_412JS16_L4.pdf |
xi’s neighbors & update their windows
(cid:3)(cid:4)
Naïve (and wrong) scheduling
• (Board)
(cid:3)(cid:5)
Propagating to neighbors
Tighten neighbor’s execution windows:
- outgoing edges to neighbor: u’ = min(u, ti + wu)
- w )
- incoming edges from neighbor: l’ = max(l, ti
l
[u, l] (cid:2)tightened [u’, l’]
xi = ti
w... | https://ocw.mit.edu/courses/16-412j-cognitive-robotics-spring-2016/5a40e2ff010a7721fdf6c5513ce5e26a_MIT16_412JS16_L4.pdf |
(cid:4)(cid:2)
Summary
• To schedule, want a simple, local-propagation
algorithm
– Requires exposing implicit constraints
• All-pairs shortest path (APSP) exposes all
implicit constraints
– Puts network in dispatchable form
• Negative cycle in APSP: inconsistent.
(cid:4)(cid:3)
To Execute a Temporal Plan
(cid:25)(c... | https://ocw.mit.edu/courses/16-412j-cognitive-robotics-spring-2016/5a40e2ff010a7721fdf6c5513ce5e26a_MIT16_412JS16_L4.pdf |
1
0
D -2 -1 -2
1
2
0
-1
9
1
-1
-1
2
1
-2
11
-2
10
0
(cid:4)(
Computing a schedule
10
0
-1
9
1
-1
-1
2
1
-2
11
-2
(cid:4)-
Computing a schedule
[-∞, ∞]
10
0
[-∞, ∞]
-1
9
1
-1
-1
2
1
-2
[-∞, ∞]
11
[-∞, ∞]
-2
Initialize execution windows for each event in the plan
(cid:4).
t = 0
Computing a schedule
[-∞, ∞]
-1
9
1
-1
-... | https://ocw.mit.edu/courses/16-412j-cognitive-robotics-spring-2016/5a40e2ff010a7721fdf6c5513ce5e26a_MIT16_412JS16_L4.pdf |
to neighbors
(cid:5)(cid:3)
t = 0
Computing a schedule
[1, 10]
-1
9
1
-1
-1
2
1
-2
10
0
[0, 9]
11
-2
[-∞, ∞]
Propagate updated time bounds to neighbors
(cid:5)(cid:4)
t = 0
Computing a schedule
[1, 10]
-1
9
1
-1
-1
2
1
-2
10
0
[0, 9]
11
-2
[2, 11]
Propagate updated time bounds to neighbors
(cid:5)(cid:5)
t = 0
Compu... | https://ocw.mit.edu/courses/16-412j-cognitive-robotics-spring-2016/5a40e2ff010a7721fdf6c5513ce5e26a_MIT16_412JS16_L4.pdf |
)-
[4, 4]
t = 0
Computing a schedule
10
0
t = 3
-1
9
1
-1
-1
2
1
-2
t = 2
11
-2
Propagate to neighbors
(cid:5).
[4, 4]
t = 0
Computing a schedule
10
0
t = 3
-1
9
1
-1
-1
2
1
-2
t = 2
11
-2
Assign the final event
(cid:10)$
t = 4
Pre-computed schedules not robust
against fluctuations
• We’ve just computed a schedule:... | https://ocw.mit.edu/courses/16-412j-cognitive-robotics-spring-2016/5a40e2ff010a7721fdf6c5513ce5e26a_MIT16_412JS16_L4.pdf |
cid:8)
(cid:13)(cid:27) (cid:21)(cid:27)(cid:8)
(cid:10)(cid:3)
How do we schedule online?
• First, consider naive (incorrect!) approach.
• Similar to offline schedule algorithm, but now online:
– Wait until current time in execution window (“active”)
• (Still a problem though as we’ll see shortly)
(cid:10)(cid:4)
Na... | https://ocw.mit.edu/courses/16-412j-cognitive-robotics-spring-2016/5a40e2ff010a7721fdf6c5513ce5e26a_MIT16_412JS16_L4.pdf |
we constrain dispatcher to do this?
• Solution: determine “enablement conditions” by
analyzing negative edges.
– Allows us to infer if some edges must precede other edges
(cid:10)-
Enablement conditions dictate the
ordering of dispatched events
• Negative edges from APSP dictate ordering constraints
10
0
-1
9
1
-1
-... | https://ocw.mit.edu/courses/16-412j-cognitive-robotics-spring-2016/5a40e2ff010a7721fdf6c5513ce5e26a_MIT16_412JS16_L4.pdf |
to E any now-enabled events
E = {A, C}
S = {}
[-∞, ∞]
[-∞, ∞]
10
0
-1
9
1
-1
-1
2
[-∞, ∞]
1
-2
A, C initially in E – have no
negative, outgoing edges
[-∞, ∞]
11
-2
(cid:11)3
Running online dispatcher
Compute dispatchable form (i.e., APSP)
Initialize execution windows to [-∞, ∞]
E (cid:3) {events with no predecessors... | https://ocw.mit.edu/courses/16-412j-cognitive-robotics-spring-2016/5a40e2ff010a7721fdf6c5513ce5e26a_MIT16_412JS16_L4.pdf |
windows to [-∞, ∞]
E (cid:3) {events with no predecessors}
S (cid:3) {}
while unexecuted events:
Wait until some event xi in E is active
ti = now
Propagate to xi’s neighbors
Add xi to S
Add to E any now-enabled events
t = 0
10
0
B, D not enabled! But C still is.
E = {C}
S = {A}
[1, 10]
-1
9
1
-1
-1
2
[0, 9]
11
-2
[2, ... | https://ocw.mit.edu/courses/16-412j-cognitive-robotics-spring-2016/5a40e2ff010a7721fdf6c5513ce5e26a_MIT16_412JS16_L4.pdf |
1
-2
B is now enabled (but still not D).
t = 2
11
-2
68
Running online dispatcher
Compute dispatchable form (i.e., APSP)
Initialize execution windows to [-∞, ∞]
E (cid:3) {events with no predecessors}
S (cid:3) {}
while unexecuted events:
Wait until some event xi in E is active
ti = now
Propagate to xi’s neighbors
Ad... | https://ocw.mit.edu/courses/16-412j-cognitive-robotics-spring-2016/5a40e2ff010a7721fdf6c5513ce5e26a_MIT16_412JS16_L4.pdf |
}
t = 3
t = 0
10
0
-1
9
1
-1
-1
2
Finish up by dispatching D!
(1
t = 2
11
-2
t = 4
1
-2
73
Online dispatching algorithm remarks
• By considering predecessors, we guarantee that events
assigned monotonically increasing times online.
• Capable of responding to fluctuations that do not affect
overall temporal feasibili... | https://ocw.mit.edu/courses/16-412j-cognitive-robotics-spring-2016/5a40e2ff010a7721fdf6c5513ce5e26a_MIT16_412JS16_L4.pdf |
xi’s neighbors
Add xi to S
Add to E any now-enabled events
(5
Online dispatcher efficiency
• Consider an STN with n edges.
• How many edges in APSP distance graph? n2.
• How many neighbors to propagate to each step? n.
Compute dispatchable form (i.e., APSP)
Initialize execution windows to [-∞, ∞]
E (cid:3) {events wi... | https://ocw.mit.edu/courses/16-412j-cognitive-robotics-spring-2016/5a40e2ff010a7721fdf6c5513ce5e26a_MIT16_412JS16_L4.pdf |
)(cid:27) (cid:21)(cid:27)(cid:8)
7-
79
You don’t need all those edges!
10
0
-1
9
1
-1
-1
2
1
-2
11
-2
-0
You don’t need all those edges!
10
0
-1
9
1
-1
-1
2
1
-2
11
-2
1
-1
1
9
-1
0
Equivalent minimal dispatchable network
-1
You don’t need all those edges!
Let’s consider a specific triangle
of edges.
10
0
-1
9
1
... | https://ocw.mit.edu/courses/16-412j-cognitive-robotics-spring-2016/5a40e2ff010a7721fdf6c5513ce5e26a_MIT16_412JS16_L4.pdf |
1
Can we remove rope AD without changing behavior?
10
11
1
Yes! Same possible positions for A, B,
D.
8.
Rope analogy
10
1
11
Can we remove ropes AB, BD without changing
behavior?
10
11
1
No. AD still constrained, but B could slide freely! Not the
same behavior. Collectively, AB and BD entail AD (but AD
does not en... | https://ocw.mit.edu/courses/16-412j-cognitive-robotics-spring-2016/5a40e2ff010a7721fdf6c5513ce5e26a_MIT16_412JS16_L4.pdf |
10
0
-1
9
1
-1
-1
2
1
-2
11
-2 Upper dominated!
98
Dominance example
10
0
-1
9
1
-1
-1
2
1
-2
11
-2 Upper dominated!
99
Dominance example
Lower dominated!
10
0
-1
9
1
-1
-1
2
1
-2
11
-2
(cid:2)$0
Dominance example
Lower dominated!
10
0
-1
9
1
-1
-1
2
1
-2
11
-2
(cid:2)$1
Dominance example
10
0
-1
9
1
-1
-1
2
1
-2
1... | https://ocw.mit.edu/courses/16-412j-cognitive-robotics-spring-2016/5a40e2ff010a7721fdf6c5513ce5e26a_MIT16_412JS16_L4.pdf |
1]
[0,10]
[2, 2]
Original STN
1
-1
... now in minimal
dispatchable form!
1
9
-1
0
(cid:2)$8
FilteringAlgorithm(G)
Input: A dispatchable APSP-graph G
Output: A minimal dispatchable graph
1 for each pair of intersecting edges in G
2 if both dominate each other
3 if neither is marked
4 arbitrarily mark one for eliminati... | https://ocw.mit.edu/courses/16-412j-cognitive-robotics-spring-2016/5a40e2ff010a7721fdf6c5513ce5e26a_MIT16_412JS16_L4.pdf |
position.
4. Execute Plan
(cid:13))) (cid:21)(cid:27)(cid:8)
(cid:13)(cid:27) (cid:21)(cid:27)(cid:8)
(cid:2)(cid:2)2
[Dechter, Meiri, Pearl 91]
To Execute a Temporal Plan
(cid:25)(cid:26)*(cid:8)+" (cid:8)(cid:29),)) (cid:21)(cid:27)(cid:8)
1. Describe Temporal Plan
2. Test Consistency
3. Schedule Plan
4. Execute Pla... | https://ocw.mit.edu/courses/16-412j-cognitive-robotics-spring-2016/5a40e2ff010a7721fdf6c5513ce5e26a_MIT16_412JS16_L4.pdf |
16)(cid:8)(cid:7)(cid:15)
A
[0,9]
t=0
A
[0,9]
[1,1]
[1,1]
D
B
C
t=3
B
[1,1]
[1,1]
t=4
D
C
t=2
(cid:13))) (cid:21)(cid:27)(cid:8)
(cid:13)(cid:27) (cid:21)(cid:27)(cid:8)
(cid:2)(cid:2)5
MIT OpenCourseWare
https://ocw.mit.edu
16.412J / 6.834J Cognitive Robotics
Spring 2016
For information about citing these materials o... | https://ocw.mit.edu/courses/16-412j-cognitive-robotics-spring-2016/5a40e2ff010a7721fdf6c5513ce5e26a_MIT16_412JS16_L4.pdf |
MIT OpenCourseWare
http://ocw.mit.edu
6.005 Elements of Software Construction
Fall 2008
For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.
6.005
elements of
software
construction
basics of mutable types
Daniel Jackson
heap semantics of Java
pop quiz
what ha... | https://ocw.mit.edu/courses/6-005-elements-of-software-construction-fall-2008/5a6830a94eaa166e2db4b5e820498609_MIT6_005f08_lec16.pdf |
of object type
‣ but does not denote an object
‣ cannot call method on null, or get/set field
© Daniel Jackson 2008
6
the operator ==
the operator ==
‣ returns true when its arguments denote the same object
(or both evaluate to null)
for mutable objects
‣ if x == y is false, objects x and y are observably di... | https://ocw.mit.edu/courses/6-005-elements-of-software-construction-fall-2008/5a6830a94eaa166e2db4b5e820498609_MIT6_005f08_lec16.pdf |
}
}
© Daniel Jackson 2008
9
mutable datatypes
mutable vs. immutable
String is an immutable datatype
‣ computation creates new objects with producers
class String {
String concat (String s);
...}
... | https://ocw.mit.edu/courses/6-005-elements-of-software-construction-fall-2008/5a6830a94eaa166e2db4b5e820498609_MIT6_005f08_lec16.pdf |
08
15
equivalence
can define your own equality notion
‣ but is any spec reasonable?
reasonable equality predicates
‣ define objects to be equal when they represent the same abstract value
a simple theorem
‣ if we define a ≈ b when f(a) = f(b) for some function f
‣ then the predicate ≈ will be an equivalence
an... | https://ocw.mit.edu/courses/6-005-elements-of-software-construction-fall-2008/5a6830a94eaa166e2db4b5e820498609_MIT6_005f08_lec16.pdf |
public class Duration {
private final int hours;
private final int mins;
public Duration(int h, int h) {hours = h; mins = m;}
public boolean equals (Duration d) {
return d.getMins() == this.getMins();
}
}
Duration d1 = new Duration(1,2);
Duration d2 = new Duration(1,2);
System.out.println(d1.equals(d2));... | https://ocw.mit.edu/courses/6-005-elements-of-software-construction-fall-2008/5a6830a94eaa166e2db4b5e820498609_MIT6_005f08_lec16.pdf |
08
23
bug #3
an attempt at writing equals for subclass
@Override
public boolean equals(Object o) {
if (! (o instanceof ShortDuration))
return false;
ShortDuration d = (ShortDuration) o;
return d.getSecs () == this.getSecs();
}
will this work?
‣ no, now it’s not symmetric!
Duration d1 = new ShortDurat... | https://ocw.mit.edu/courses/6-005-elements-of-software-construction-fall-2008/5a6830a94eaa166e2db4b5e820498609_MIT6_005f08_lec16.pdf |
K key; V val; Entry<K,V> next; ... }
© Daniel Jackson 2008
28
Entryk1: Kv1: VEntrynextkeyvalk2: Kv2: Vkeyval01234HashMaptablehash map operations
operations
‣ put(k,v): to associate value v with key k
compute index i = hash(k)
hash(k) = k.hashCode & table.length-1 (eg)
if find entry in table[i] with key equal t... | https://ocw.mit.edu/courses/6-005-elements-of-software-construction-fall-2008/5a6830a94eaa166e2db4b5e820498609_MIT6_005f08_lec16.pdf |
happens
if equals and hashCode depend on key’s fields
‣ then value of hashCode can change
‣ rep invariant of hash map is violated
‣ lookup may fail to find key, even if one exists
problem is example of ‘abstract aliasing’
‣ hash map and key are aliased
© Daniel Jackson 2008
31
example
what does this print?
... | https://ocw.mit.edu/courses/6-005-elements-of-software-construction-fall-2008/5a6830a94eaa166e2db4b5e820498609_MIT6_005f08_lec16.pdf |
consistently return false, provided no information used in equals comparisons on the object is modified
© Daniel Jackson 2008
33
non-determinism
to iterate over elements of a hash set
‣ use HashSet.iterator()
‣ elements yielded in unspecified order
what determines order?
‣ code iterates over table indices
‣ so... | https://ocw.mit.edu/courses/6-005-elements-of-software-construction-fall-2008/5a6830a94eaa166e2db4b5e820498609_MIT6_005f08_lec16.pdf |
operator ξ S†ΓµW hv which is not equivalent to (10.6) because S and W do not commute. This apparent
problem is solved by considering the remaining two diagrams of the same order as this one
n,p
11 SCETII APPLICATIONS
Diagrams.
These diagrams both yield the current
Fig() = Fig() =
2
if abcT c
g
2
ν
µ
n¯
n
n · qs... | https://ocw.mit.edu/courses/8-851-effective-field-theory-spring-2013/5a73e8bb8f7f637a9b3eb58c5e733e6b_MIT8_851S13_SCETIIApplicat.pdf |
only present in currents
JI = (ξ
(0)
n
W (0))ΓµY †hv
3. Matching SCETI onto SCETII by taking Yn → Sn.
JII = (ξ
(0)
n
W (0))ΓµS†hv
(10.10)
(10.11)
(10.12)
11 SCETII Applications
(ROUGH) In this section we will apply the SCETII formalism developed in previous sections to various
processes to illustrate the formalis... | https://ocw.mit.edu/courses/8-851-effective-field-theory-spring-2013/5a73e8bb8f7f637a9b3eb58c5e733e6b_MIT8_851S13_SCETIIApplicat.pdf |
= [cγµPLT ab][dγµPLT a u].
(11.1)
(11.2)
(11.3)
We want to factorize the matrix element (Dπ| O0,8 |B). We can represent this factorization diagrammat
ically as (INSERT FIG) where there are no gluons between π quarks and B/D quarks. For this process
we expect a B → D form factor (Isgur-Wise form factor) and a pion... | https://ocw.mit.edu/courses/8-851-effective-field-theory-spring-2013/5a73e8bb8f7f637a9b3eb58c5e733e6b_MIT8_851S13_SCETIIApplicat.pdf |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.