Spelling suggestions: "subject:"bounded"" "subject:"abounded""
71 |
A Filter Description for the Homomorphisms of the Algebra of Bounded Analytic Functions on the Unit DiscKerr-Lawson , Angus Carmichael 08 1900 (has links)
For any filter F defined on the unit disc D, F* is the filter generated by ∈-neighbourhoods of the sets of F, using hyperbolic distance. Any complex homomorphism I of β, the algebra of bounded analytic functions on D, is given by I(g) = lim g(F*) for some maximal closed filter F. The homomorphisms can be classified according to the direction of approach to the boundary of the corresponding filters. For those which are obtained by oricycle or non-tangential approach, the *-filters are in 1-1 correspondence with the homomorphisms; and into these subsets, one can analytically embed discs. On the Silov boundary of β, the above correspondence fails to be 1-1, and smaller filters are considered. / Thesis / Doctor of Philosophy (PhD)
|
72 |
EFFICIENT GROUP COMMUNICATION AND THE DEGREE-BOUNDED SHORTEST PATH PROBLEMHELMICK, MICHAEL T. 02 July 2007 (has links)
No description available.
|
73 |
Comparison of BV Norms in Weighted Euclidean Spaces and Metric Measure SpacesCAMFIELD, CHRISTOPHER SCOTT 25 August 2008 (has links)
No description available.
|
74 |
Bilipschitz Homogeneity and Jordan CurvesFreeman, David M. 06 November 2009 (has links)
No description available.
|
75 |
Curvilinear Extension to the Giles Non-reflecting Boundary Conditions for Wall-bounded FlowsMedida, Shivaji 11 September 2007 (has links)
No description available.
|
76 |
Design Verification for Sequential Systems at Various Abstraction LevelsZhang, Liang 31 January 2005 (has links)
With the ever increasing complexity of digital systems, functional verification has become a daunting task to circuit designers. Functional verification alone often surpasses 70% of the total development cost and the situation has been projected to continue to worsen. The most critical limitations of existing techniques are the capacity issue and the run-time issue. This dissertation addresses the functional verification problem using a unified approach, which utilizes different core algorithms at various abstraction levels. At the logic level, we focus on incorporating a set of novel ideas to existing formal verification approaches. First, we present a number of powerful optimizations to improve the performance and capacity of a typical SAT-based bounded model checking framework. Secondly, we present a novel method for performing dynamic abstraction within a framework for abstraction-refinement based model checking. Experiments on a wide range of industrial designs have shown that the proposed optimizations consistently provide between 1-2 orders of magnitude speedup and can be extremely useful in enhancing the efficacy of existing formal verification algorithms. At the register transfer level, where the formal verification is less likely to succeed, we developed an efficient ATPG-based validation framework, which leverages the high-level circuit information and an improved observability-enhanced coverage to generate high quality validation sequences. Experiments show that our approach is able to generate high quality validation vectors, which achieve both high tag coverage and high bug coverage with extremely low computational cost. / Ph. D.
|
77 |
Exploring Abstraction Techniques for Scalable Bit-Precise Verification of Embedded SoftwareHe, Nannan 01 June 2009 (has links)
Conventional testing has become inadequate to satisfy rigorous reliability requirements of embedded software that is playing an increasingly important role in many safety critical applications. Automatic formal verification is a viable avenue for ensuring the reliability of such software. Recently, more and more formal verification techniques have begun modeling a non-Boolean data variable as a bit-vector with bounded width (i.e. a vector of multiple bits like 32- or 64- bits) to implement bit-precise verification. One major challenge in the scalable application of such bit-precise verification on real-world embedded software is that the state space for verification can be intractably large.
In this dissertation, several abstraction techniques are explored to deal with this scalability challenge in the bit-precise verification of embedded software. First, we propose a tight integration of program slicing, which is an important static program analysis technique, with bounded model checking (BMC). While many software verification tools apply program slicing as a separate preprocessing step, we integrate slicing operations into our model construction and reduction process and enhance them with compilation optimization techniques to compute accurate program slices. We also apply a proof-based abstraction-refinement framework to further remove those program segments irrelevant to the property being verified.
Next, we present a method of using symbolic simulation for scalable formal verification. The simulation involves distinguishing X as symbolic values to abstract concrete variables' values. Also, the method embeds this symbolic simulation in a counterexample-guided abstraction-refinement framework to automatically construct and verify an abstract model, which has a smaller state space than that of the original concrete program.
This dissertation also presents our efforts on using two common testability metrics — controllability metric (CM) and observability metric (OM) — as the high-level structural guidance for scalable bit-precise verification. A new abstraction approach is proposed based on the concept of under- and over-approximation to efficiently solve bit-vector formulas generated from embedded software verification instances. These instances include both complicated arithmetic computations and intensive control structures. Our approach applies CM and OM to assist the abstraction refinement procedure in two ways: (1) it uses CM and OM to guide the construction of a simple under-approximate model, which includes only a subset of execution paths in a verification instance, so that a counterexample that refutes the instance can be obtained with reduced effort, and (2) in order to reduce the cost of using proof-based refinement alone, it uses OM heuristics to guide the restoration of additional verification-relevant formula constraints with low computational cost for refinement. Experiments show a significant reduction of the solving time compared to state-of-the-art solvers for the bit-vector arithmetic.
This dissertation finally proposes an efficient algorithm to discover non-uniform encoding widths of individual variables in the verification model, which may be smaller than their original modeling width but sufficient for the verification. Our algorithm distinguishes itself from existing approaches in that it is path-oriented; it takes advantage of CM and OM values to guide the computation of the initial, non-uniform encoding widths, and the effective adjustment of these widths along different paths, until the property is verified. It can restrict the search from those paths that are deemed less favorable or have been searched in previous steps, thus simplifying the problem. Experiments demonstrate that our algorithm can significantly speed up the verification especially in searching for a counterexample that violates the property under verification. / Ph. D.
|
78 |
Parameter Identification and the Design of Experiments for Continuous Non-Linear Dynamical SystemsChilders, Adam Fletcher 24 July 2009 (has links)
Mathematical models are useful for simulation, design, analysis, control, and optimization of complex systems. One important step necessary to create an effective model is designing an experiment from which the unknown model parameter can be accurately identified and then verified. The strategy which one approaches this problem is dependent on the amount of data that can be collected and the assumptions made about the behavior of the error in the statistical model. In this presentation we describe how to approach this problem using a combination of statistical and mathematical theory with reliable computation. More specifically, we present a new approach to bounded error parameter validation that approximates the membership set by solving an inverse problem rather than using the standard forward interval analysis methods. For our method we provide theoretical justification, apply this technique to several examples, and describe how it relates to designing experiments. We also address how to define infinite dimensional designs that can be used to create designs of any finite dimension. In general, finding a good design for an experiment requires a careful investigation of all available information and we provide an effective approach to dthe problem. / Ph. D.
|
79 |
Constraint Solving for Diagnosing Concurrency BugsKhoshnood, Sepideh 28 May 2015 (has links)
Programmers often have to spend a significant amount of time inspecting the software code and execution traces to identify the root cause of a software bug. For a multithreaded program, debugging is even more challenging due to the subtle interactions between concurrent threads and the often astronomical number of possible interleavings. In this work, we propose a logical constraint-based symbolic analysis method to aid in the diagnosis of concurrency bugs and find their root causes, which can be later used to recommend repairs. In our method, the diagnosis process is formulated as a set of constraint solving problems. By leveraging the power of constraint satisfiability (SAT) solvers and a bounded model checker, we perform a semantic analysis of the sequential computation as well as the thread interactions. The analysis is ideally suited for handling software with small to medium code size but complex concurrency control, such as device drivers, synchronization protocols, and concurrent data structures. We have implemented our method in a software tool and demonstrated its effectiveness in diagnosing subtle concurrency bugs in multithreaded C programs. / Master of Science
|
80 |
The Riemann Definite Integral of a Bounded Real FunctionHendrick, H. Wayne 08 1900 (has links)
The object of this paper is to define, to establish necessary and sufficient conditions for the existence of, and to consider the elementary properties of the Riemann definite integral of a bounded function.
|
Page generated in 0.0482 seconds