• Tidak ada hasil yang ditemukan

which, by algebraic manipulation, implies thatx=x0.

Surjective We are required to show that if f1 and f2 are surjective, then the composition of f1 and f2 is surjective as well.

∀i∈ A,∃j ∈ A: f1(j) =i ^

(A.40)

∀i∈ A,∃j ∈ A: f2(j) =i (A.41)

=⇒

∀i∈ A,∃j ∈ A: f2(f1(j)) =i. (A.42)

Letx00 be an instance ofi in Equation A.42; use this value fori in Equation A.41. Let x0 be an instance ofj in Equation A.41; use this value fori in Equation A.40. Finally, letx be an instance of j in Equation A.40; use this value forj in Equation A.42. The implication follows:

f1(x) = x0∧f2(x0) =x00 =⇒ f2(f1(x)) = x00

=⇒ f2(x0) =x00

=⇒ x00 =x00.

Permutes We are required to show

∀i∈ A: S(i) =S0(f1(i)) ^

(A.43)

∀i∈ A: S0(i) = S00(f2(i)) (A.44)

=⇒

∀i∈ A: S(i) =S00(f2(f1(i))). (A.45) Let x be the instantiation of i in Equation A.45. Use x for i in Equation A.43 and

f1(x) in Equation A.44. The implication follows:

S(x) = S0(f1(x))∧S0(f1(x)) = S00(f2(f1(x))) =⇒ S(x) =S00(f2(f1(x)))

=⇒ S(x) =S0(f1(x))

=⇒ S(x) =S(x).

Bibliography

[1] S. Owre, J.M. Rushby, and N. Shankar. PVS: A prototype verification system. In Deepak Kapur, editor,International Conference on Automated Deduction, volume 607 of Lecture Notes in Artificial Intelligence, pages 748–752, Saratoga, NY, June 1992.

Springer-Verlag. 1.2.1.2, 9.1

[2] G. Holzmann. The model checker SPIN. IEEE Transactions on Software Engineering, 23(5):279–295, 1997. doi:10.1109/32.588521. 1.2.1.2, 9.2.1

[3] K. Sacha. Model-based implementation of real-time systems. InInternational Confer- ence on Computer Safety, Reliability, and Security, pages 332–345, Berlin, Heidelberg, 2008. Springer-Verlag. doi:10.1007/978-3-540-87698-4_28. 1.2.1.2

[4] J. Blech and A. Poetzsch-Heffter. A certifying code generation phase.Electronic Notes in Theoretical Computer Science, 190(4):65–82, 2007. doi:10.1016/j.entcs.2007.

09.008. 1.2.1.2

[5] E. Denney and B. Fischer. Extending source code generators for evidence-based soft- ware certification. In International Symposium on Leveraging Applications of Formal Methods, Verification and Validation, pages 138–145, Washington, DC, USA, 2006.

IEEE Computer Society. doi:10.1109/ISoLA.2006.76. 1.2.1.2

[6] K. Kennedy. Caps: concurrent automatic programming system. PhD thesis, Clemson University, Clemson, SC, USA, 2008. 1.2.1.2, 9.3

[7] L. Burdy, Y. Cheon, D. Cok, M. Ernst, J. Kiniry, G. Leavens, K.R. Leino, and E. Poll.

An overview of JML tools and applications.International Journal on Software Tools for

Technology Transfer, 7(3):212–232, 2005. doi:10.1007/s10009-004-0167-4. 1.2.1.2, 9.3.3

[8] J. Armstrong. Programming Erlang—Software for a Concurrent World. Cambridge University Press, New York, NY, USA, first edition, July 2007. doi:10.1017/

S0956796809007163. 1.2.1.2, 9.3

[9] S. Demri, F. Laroussinie, and P. Schnoebelen. A parametric analysis of the state- explosion problem in model checking. Journal of Computer and System Sciences, 72(4):547–575, 2006. doi:10.1016/j.jcss.2005.11.003. 1.4.1

[10] J. Woodcock, P. Larsen, J. Bicarregui, and J. Fitzgerald. Formal methods: Practice and experience. ACM Computing Surveys, 41(4):1–36, 2009. doi:10.1145/1592434.

1592436. 1.4.1, 9.3.4

[11] N. Lynch and M. Tuttle. Hierarchical correctness proofs for distributed algorithms.

In Symposium on Principles of distributed computing, pages 137–151, New York, NY, USA, 1987. ACM. doi:10.1145/41840.41852. 1.5

[12] I. Keidar, R. Khazan, N. Lynch, and A. Shvartsman. An inheritance-based technique for building simulation proofs incrementally. Transactions on Software Engineering and Methodology, 11(1):63–91, 2002. doi:10.1145/504087.504090. 1.5

[13] B. Jonsson. Compositional specification and verification of distributed systems.

Transactions on Programming Languages and Systems, 16(2):259–303, 1994. doi:

10.1145/174662.174665. 1.5

[14] B. M¨oller. Algebraic calculation of graph and sorting algorithms. In Dines Bjørner, Manfred Broy, and Igor Pottosin, editors, Formal Methods in Programming and Their Applications, volume 735 of Lecture Notes in Computer Science, pages 394–413.

Springer Berlin/Heidelberg, 1993. doi:10.1007/BFb0039722. 1.5

[15] K.M. Chandy and J. Misra. Parallel Program Design: A Foundation. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1988. 2.1

[16] N. Lynch. Distributed Algorithms. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 1996. 2.1.2

[17] K.M. Chandy, B. Go, S. Mitra, C. Pilotto, and J. White. Verification of distributed systems with local-global predicates. Formal Aspects of Computing, pages 1–31, 2010.

doi:10.1007/s00165-010-0150-7. 2.3.2, 3, 14

[18] J. Bard. Morphogenesis : the cellular and molecular processes of developmental anatomy, volume 23 of Developmental and cell biology series. Cambridge, 1990. 2.4 [19] L. Wolpert. Principles of development, volume 23. Oxford University Press, third

edition, 2007. 2.4

[20] E. Bonabeau, M. Dorigo, and G. Theraulaz. Swarm Intelligence: From Natural to Artificial Systems. Oxford University Press, USA, 1999. 2.4

[21] J. Kennedy and R. Eberhart with Y. Shi. Swarm Intelligence. Morgan Kaufmann, 2001. 2.4

[22] H. Abelson, D. Allen, D. Coore, C. Hanson, G. Homsy, T. Knight, R. Nagpal, E. Rauch, G. Sussman, and R. Weiss. Amorphous computing. Communications of the ACM, 43(5):74–82, 2000. doi:10.1145/332833.332842. 2.4

[23] A. Kondacs. Biologically-inspired self-assembly of two-dimensional shapes using global- to-local compilation. InInternational Joint Conference on Artificial Intelligence, pages 633–638, San Francisco, CA, USA, 2003. Morgan Kaufmann Publishers, Inc. 2.4 [24] E. Klavins, R. Ghrist, and D. Lipsky. Graph grammars for self assembling robotic

systems. In International Conference on Robotics and Automation, volume 5, pages 5293–5300. IEEE, April 2004. doi:10.1109/ROBOT.2004.1302558. 2.4

[25] E. Klavins. Programmable self-assembly. Control Systems Magazine, IEEE, 27(4):43–

56, August 2007. doi:10.1109/MCS.2007.384126. 2.4

[26] D. Coore. The Growing Point Language. Lambert Academic Publishing, 2010. 2.4 [27] R. Nagpal. Programmable self-assembly: constructing global shape using biologically-

inspired local interactions and origami mathematics. PhD thesis, Massachusetts Insti- tute of Technology, 2001. 2.4

[28] J. Beal and J. Bachrach. Infrastructure for engineered emergence on sensor/actuator networks. Intelligent Systems, IEEE, 21(2):10–19, March 2006. doi:10.1109/MIS.

2006.29. 2.4

[29] D. Yamins, S. Waydo, and N. Khaneja. Group control and kernels: the 1-d equigroup- ing problem.IEEE Conference on Decision and Control, 3:2460–2466, December 2004.

2.4

[30] D. Yamins. Towards a theory of ”local to global” in distributed multi-agent systems (I).

In International Joint Conference on Autonomous Agents and Multiagent Systems, pages 183–190, New York, NY, USA, 2005. ACM. doi:10.1145/1082473.1082501.

2.4

[31] D. Yamins. Towards a theory of ”local to global” in distributed multi-agent sys- tems (II). In International Joint Conference on Autonomous Agents and Multiagent Systems, pages 191–198, New York, NY, USA, 2005. ACM. doi:10.1145/1082473.

1082502. 2.4

[32] D. Yamins. The emergence of global properties from local interactions: static proper- ties and one-dimensional patterns. InInternational Joint Conference on Autonomous Agents and Multiagent Systems, pages 1122–1124, New York, NY, USA, 2006. ACM.

doi:10.1145/1160633.1160837. 2.4

[33] D. Yamins. A theory of local-to-global algorithms for one-dimensional spatial multi- agent systems. PhD thesis, Harvard University, Cambridge, MA, USA, 2008. 2.4

[34] N. Minsky. Regularity-based trust in cyberspace. In Paddy Nixon and Sotirios Terzis, editors,Trust Management, volume 2692 ofLecture Notes in Computer Science, pages 1071–1072. Springer Berlin/Heidelberg, 2003. doi:10.1007/3-540-44875-6_2. 2.4 [35] W. Zhang, C. Serban, and N. Minsky. Establishing Global Properties of Multi-Agent

Systems Via Local Laws, volume 4389/2007 of Lecture Notes in Computer Science, pages 170–183. Springer Berlin/Heidelberg, 2007. doi:10.1007/978-3-540-71103-2.

2.4

[36] X. Ao and N. Minsky. Flexible regulation of distributed coalitions. In Einar Snekkenes and Dieter Gollmann, editors, European Symposium on Research in Computer Secu- rity, volume 2808/2003 of Lecture Notes in Computer Science, pages 39–60. Springer Berlin/Heidelberg, 2003. doi:10.1007/978-3-540-39650-5_3. 2.4

[37] C. Serban, W. Zhang, and N. Minsky. A decentralized mechanism for application level monitoring of distributed systems. International Conference on Collaborative Computing: Networking, Applications and Worksharing, pages 1–10, November 2009.

doi:10.4108/ICST.COLLABORATECOM2009.8336. 2.4

[38] N. Minsky. Reducing spam via trustworthy self regulation by email senders. In MIT Span Conference, 2010. 2.4

[39] C. Serban, Y. Chen, W. Zhang, and N. Minsky. The concept of decentralized and secure electronic marketplace. Electronic Commerce Research, 8:79–101, 2008. doi:

10.1007/s10660-008-9014-0. 2.4

[40] K. Marzullo and L. Sabel. Efficient detection of a class of stable properties. Distributed Computing, 8(2):81–91, 1994. doi:10.1007/BF02280830. 2.4

[41] R. Atreya, N. Mittal, A. Kshemkalyani, V. Garg, and M. Singhal. Efficient detection of a locally stable predicate in a distributed system. Journal of Parallel and Distributed Computing, 67(4):369–385, 2007. doi:10.1016/j.jpdc.2006.12.004. 2.4

[42] P. Wegner, F. Arbab, D. Goldin, P. McBurney, M. Luck, and D. Robertson. The role of agent interaction in models of computing: Panelist reviews. Electronic Notes in Theoretical Computer Science, 141(5):181–198, 2005. Workshop on the Foundations of Interactive Computation. doi:10.1016/j.entcs.2005.05.022. 2.4

[43] T. Nipkow and L. Paulson. Proof pearl: Defining functions over finite sets. In Joe Hurd and Tom Melham, editors, Theorem Proving in Higher Order Logics, volume 3603 of Lecture Notes in Computer Science, pages 385–396. Springer Berlin / Heidelberg, 2005.

doi:10.1007/11541868_25. 3,3.2

[44] G. Hutton. A tutorial on the universality and expressiveness of fold. Journal of Functional Programming, 9(4):355–372, 1999. doi:10.1017/S0956796899003500. 3, 3.2

[45] R. Dean. Elements of Abstract Algebra. Wiley, New York, second edition, 1966. 3 [46] A. Viterbi. Error bounds for convolutional codes and an asymptotically optimum

decoding algorithm. Information Theory, IEEE Transactions on, 13(2):260–269, April 1967. 12

[47] L. Huang. Advanced dynamic programming in semiring and hypergraph frameworks.

InAdvanced Dynamic Programming in Computational Linguistics: Theory, Algorithms and Applications—Tutorial notes, pages 1–18, Manchester, UK, August 2008. Coling 2008 Organizing Committee. 12,4.6

[48] S. Warshall. A theorem on boolean matrices. Journal of the ACM, 9(1):11–12, 1962.

doi:10.1145/321105.321107. 4.6

[49] M. Yoeli. A note on a generalization of boolean matrix theory. The American Mathe- matical Monthly, 68(6):552–557, June–July 1961. 4.6

[50] G. Penn. Efficient transitive closure of sparse matrices over closed semirings. Theoret- ical Computer Science, 354(1):72–81, 2006. doi:10.1016/j.tcs.2005.11.008. 4.6

[51] M. Gondran and M. Minoux. Graphs, dioids and semirings, volume 41 of Operations Research/Computer Science Interfaces Series. Springer, New York, 2008. New models and algorithms. 4.6

[52] C. Huang and C. Lengauer. An incremental mechanical development of systolic solutions to the algebraic path problem. Acta Informatica, 27(2):97–124, 1989.

doi:10.1007/BF00265150. 4.6

[53] G. Chen, B. Wang, and C. Lu. On the parallel computation of the algebraic path problem. IEEE Transactions on Parallel and Distributed Systems, 3:251–256, 1992.

doi:10.1109/71.127265. 4.6

[54] G. Rote. A systolic array algorithm for the algebraic path problem (shortest paths;

matrix inversion). Computing, 34:191–219, 1985. doi:10.1007/BF02253318. 4.6 [55] C. Djam´egni, P. Quinton, S. Rajopadhye, and T. Risset. Derivation of systolic algo-

rithms for the algebraic path problem by recurrence transformations. Parallel Com- puting, 26(11):1429–1445, 2000. doi:10.1016/S0167-8191(00)00039-9. 4.6

[56] H. Tsai, S. Horng, S. Tsai, T. Kao, and S. Lee. Solving an algebraic path problem and some related graph problems on a hyper-bus broadcast network. IEEE Transactions on Parallel and Distributed Systems, 8(12):1226–1235, December 1997. doi:10.1109/

71.640014. 4.6

[57] E. Fink. A survey of sequential and systolic algorithms for the algebraic path problem.

Technical Report CS-92-37, University of Waterloo, 1992. 4.6

[58] D. Lehmann. Algebraic structures for transitive closure.Theoretical Computer Science, 4(1):59–76, 1977. doi:10.1016/0304-3975(77)90056-1. 4.6

[59] R. Tarjan. A unified approach to path problems. Journal of the ACM, 28(3):577–593, 1981. doi:10.1145/322261.322272. 4.6

[60] M. Mohri. Semiring frameworks and algorithms for shortest-distance problems.Journal of Automata, Languages and Combinatorics, 7(3):321–350, 2002. 4.6

[61] H. Hofstee, A. Martin, and J. van de Snepscheut. Distributed sorting. Science of Computer Programming, 15:119–133, December 1990. doi:10.1016/0167-6423(90) 90081-N. 5

[62] D. Knuth.The art of computer programming, volume 3: sorting and searching. Addison Wesley Longman Publishing Co., Inc., Redwood City, CA, USA, second edition, 1998.

5

[63] M. Mehyar. Distributed averaging and efficient file sharing on peer-to-peer networks.

PhD thesis, California Institute of Technology, 2007. 6.1

[64] J. Fax and R. Murray. Information flow and cooperative control of vehicle formations.

IEEE Transactions on Automatic Control, 49(9):1465–1476, September 2004. doi:

10.1109/TAC.2004.834433. 6.1

[65] R. Olfati-Saber and J. Shamma. Consensus filters for sensor networks and distributed sensor fusion. InIEEE Conference on Decision and Control, pages 6698–6703, Decem- ber 2005. doi:10.1109/CDC.2005.1583238. 6.1

[66] S. Kar, S. Aldosari, and J. Moura. Topology for distributed inference on graphs. IEEE Transactions on Signal Processing, 56(6):2609–2613, June 2008. doi:10.1109/TSP.

2008.923536. 6.1

[67] C. Xu and F. Lau. Load Balancing in Parallel Computers: Theory and Practice.

Kluwer Academic Publishers, Norwell, MA, USA, 1997. 6.1

[68] M. Mehyar, D. Spanos, J. Pongsajapan, S. Low, and R. Murray. Asynchronous dis- tributed averaging on communication networks. IEEE/ACM Transactions on Net- working, 15(3):512–520, June 2007. doi:10.1109/TNET.2007.893226. 6.1

[69] R. Olfati-Saber and R. Murray. Consensus problems in networks of agents with switch- ing topology and time-delays. IEEE Transactions on Automatic Control, 49(9):1520–

1533, September 2004. doi:10.1109/TAC.2004.834113. 6.1

[70] S. Kar and J. Moura. Distributed consensus algorithms in sensor networks with im- perfect communication: Link failures and channel noise. IEEE Transactions on Signal Processing, 57(1):355 –369, January 2009. doi:10.1109/TSP.2008.2007111. 6.1 [71] L. Xiao, S. Boyd, and S. Kim. Distributed average consensus with least-mean-square

deviation. Journal of Parallel and Distributed Computing, 67(1):33–46, 2007. doi:

10.1016/j.jpdc.2006.08.010. 6.1

[72] C. Pilotto, K.M. Chandy, and J. White. Consensus on asynchronous communication networks in presence of external input. In 49th IEEE Conference on Decision and Control, pages 3838–3844, December 2010. doi:10.1109/CDC.2010.5717134. 6.1 [73] Z. Minghui and S. Martnez. Discrete-time dynamic average consensus. Automatica,

46(2):322 – 329, 2010. doi:10.1016/j.automatica.2009.10.021. 7

[74] D. Spanos, R. Olfati-Saber, and R. Murray. Dynamic consensus on mobile networks.

In World Congress of the International Federation of Automatic Control, 2005. 7 [75] S. Maharaj and J. Bicarregui. On the verification of vdm specification and refinement

with pvs. In International conference on Automated software engineering, page 280, Washington, DC, USA, 1997. IEEE Computer Society. 9.1

[76] E. de Jong, J. van de Pol, and J. Hooman. Refinement in requirements specification and analysis: A case study. InInternational Conference and Workshop on the Engineering of Computer Based Systems, pages 290–298, Washington, DC, USA, April 2000. IEEE Computer Society. doi:10.1109/ECBS.2000.839888. 9.1

[77] T. Nipkow, L. Paulson, and M. Wenzel. Isabelle/HOL—A Proof Assistant for Higher- Order Logic, volume 2283 ofLecture Notes in Computer Science. Springer, 2002. 9.1.5

[78] G. Holzmann, R. Joshi, and A. Groce. Swarm verification. InInternational Conference on Automated Software Engineering, pages 1–6, Washington, DC, USA, 2008. IEEE Computer Society. doi:10.1109/ASE.2008.9. 9.2

[79] G. Holzmann. State compression in SPIN: Recursive indexing and compression training runs. In International SPIN Workshop, 1997. 9.2.4

[80] M. Casadei and M. Viroli. An experience on probabilistic model checking and stochastic simulation to design self-organizing systems. In Congress on Evolution- ary Computation, pages 1538–1545, Piscataway, NJ, USA, 2009. IEEE Press. doi:

10.1109/CEC.2009.4983125. 9.2.6

[81] M. Casadei and M. Viroli. Using probabilistic model checking and simulation for designing self-organizing systems. In Symposium on Applied Computing, pages 2103–

2104, New York, NY, USA, 2009. ACM. doi:10.1145/1529282.1529747. 9.2.6 [82] M. Casadei, M. Viroli, and L. Gardelli. On the collective sort problem for distributed

tuple spaces. Science of Computer Programming, 74(9):702–722, 2009. doi:10.1016/

j.scico.2008.09.018. 9.2.6

[83] M. Casadei, L. Gardelli, and M. Viroli. Simulating emergent properties of coordination in maude: the collective sort case. Electronic Notes in Theoretical Computer Science, 175(2):59–80, 2007. doi:10.1016/j.entcs.2007.05.022. 9.2.6

[84] J.O. Blech and A. Poetzsch-Heffter. A certifying code generation phase. Electronic Notes in Theoretical Computer Science, 190(4):65–82, 2007. doi:10.1016/j.entcs.

2007.09.008. 9.3

[85] E. Denney and B. Fischer. Extending source code generators for evidence-based soft- ware certification. In International Symposium on Leveraging Applications of Formal Methods, Verification and Validation, pages 138–145, Washington, DC, USA, Novem- ber 2006. IEEE Computer Society. doi:10.1109/ISoLA.2006.76. 9.3

[86] K. Sacha. Model-based implementation of real-time systems. InInternational Confer- ence on Computer Safety, Reliability, and Security, volume 5219 of Lecture Notes in Computer Science, pages 332–345. Springer-Verlag, September 2008. doi:10.1007/

978-3-540-87698-4_28. 9.3

[87] J. Armstrong. A history of Erlang. In ACM SIGPLAN conference on History of programming languages, pages 6–1–6–26, New York, NY, USA, 2007. ACM. doi:

10.1145/1238844.1238850. 9.3

[88] C. Hewitt. scriptJ(TM) extension of Java(R): discretionary, adaptive concur- rency for privacy-friendly, client-cloud computing. Computing Research Repository, abs/1008.2748, 2010. 9.3

[89] R. Khazan. Group membership: a novel approach and the first single-round algorithm.

InSymposium on Principles of Distributed Computing, pages 347–356, New York, NY, USA, July 2004. ACM. doi:10.1145/1011767.1011819. 9.3.1

[90] Y. Amir, D. Dolev, S. Kramer, and D. Malki. Membership algorithms for multicast communication groups. In International Workshop on Distributed Algorithms, vol- ume 647 of Lecture Notes in Computer Science, pages 292–312, Berlin, Heidelberg, November 1992. Springer-Verlag. doi:10.1007/3-540-56188-9_20. 9.3.1

[91] M. Reiter. A secure group membership protocol. IEEE Transactions on Software Engineering, 22(1):31–42, 1996. doi:10.1109/32.481515. 9.3.1

[92] Q. Huang, C. Julien, and G. Roman. Relying on safe distance to achieve strong partitionable group membership in ad hoc networks. IEEE Transactions on Mobile Computing, 3(2):192–205, 2004. doi:10.1109/TMC.2004.14. 9.3.1

[93] A. Jain and R. Shyamasundar. Failure detection and membership management in grid environments. In International Workshop on Grid Computing, pages 44–52, Washing- ton, DC, USA, November 2004. IEEE Computer Society.doi:10.1109/GRID.2004.30.

9.3.1