Modern trends in discrete mathematics and computer science — различия между версиями
(→Lectures 3,4. Constraint satisfaction problem: an algebraic approach.) |
(→Lectures 3,4. Constraint satisfaction problem: an algebraic approach.) |
||
Строка 45: | Строка 45: | ||
Lecturer: [[Селезнева Светлана Николаевна | Svetlana N. Selezneva]] | Lecturer: [[Селезнева Светлана Николаевна | Svetlana N. Selezneva]] | ||
− | [[Media: lect3-4-ex-selezn.pdf| | + | [[Media: lect3-4-ex-selezn.pdf|Exam]]. |
== Lecture 5. '''Closed classes in k-valued and partial k-valued logics.''' == | == Lecture 5. '''Closed classes in k-valued and partial k-valued logics.''' == |
Версия 15:09, 12 апреля 2018
Compulsory course for master students, 2-nd year, groups 618/1 and 618/2.
Lectures — 16 h.
Responsible lecturer Vladimir Zakharov.
This course is intended to introduce the audience to some topics in discrete mathematics and its applications in software engineering, VLSI designing and biochemistry which are in line with the modern development of computer science and applied mathematics.
Содержание
- 1 Preliminary program and materials
- 1.1 Lecture 1. Theory and practice of software obfuscation.
- 1.2 Lecture 2. Formal correctness proofs for sequential programs.
- 1.3 Lectures 3,4. Constraint satisfaction problem: an algebraic approach.
- 1.4 Lecture 5. Closed classes in k-valued and partial k-valued logics.
- 1.5 Lecture 6. Algebras of minimal multiplicative complexity.
- 1.6 Lecture 7. Some new bounds of Shannon functions for cardinality of test sets for logical circuits.
- 1.7 Lecture 8. 13С metabolic flux analysis.
- 2 Literature
Preliminary program and materials
Lecture 1. Theory and practice of software obfuscation.
This lecture is devoted to the software obfuscation problem, its applications in software protection, information hiding and cryptography, to the practical techniques of program obfuscation with the help of structures and techniques from discrete mathematics, automata theory, coding theory. Much attention is payed to formal definitions of obfuscation security. It wil be shown that a secure obfuscation of some programs is impossible in the framework of a "black box" model, but , nevertheless, certain classes of simple programs admit secure obfuscation.
Lecturer: Vladimir Zakharov.
Lecture 2. Formal correctness proofs for sequential programs.
This lecture is devoted to formal verification of sequential imperative programs. The main topic of the lecture is the notion of formal system (logical calculus) applied to correctness proof for imperative programs. Several valuable properties of such formal systems and proofs for simple-but-useful programs are to be discussed.
Lecturer: Vladislav Podymov
Essay topics:
- [3], p.127-144. Explain the main ideas of the procedural extension of while programs and corresponding proof systems, and the relationship between the extension and the "real" programming.
- [3], p.245-261. Explain the main ideas of the parallel extension of while programs and corresponding proof systems, and the relationship between the extension and the "real" programming.
Link to [3]: https://drive.google.com/open?id=1EAD7Ax9sU32E-9qZldmkrWRABQC1Awah
Lectures 3,4. Constraint satisfaction problem: an algebraic approach.
The topic of the lecture is the constraint satisfaction problem (CSP). CSP is a universal formalization for a wide variety of problems in discrete mathematics and computer science. A characterization of the CSP complexity has recently been obtained by an algebraic approach. The aim of the lecture is to describe the algebraic approach to CSP and the results established by its applying.
Lecturer: Svetlana N. Selezneva
Exam.
Lecture 5. Closed classes in k-valued and partial k-valued logics.
This lecture gives a survey of results on the description of some parts of the lattice of closed classes in partial k-valued logics. The results on cardinality of the set of all closed classes in partial k-valued logic containing given precomplete class of k-valued logic are considered. Also results on cardinality of the set of all closed classes in partial 2-valued logic containing given closed class of 2-valued logic are considered.
Literature:
- Lau, D.. Function algebras on finite sets. A basic course on many-valued logic and clone theory. Springer Monographs in Mathematics. Springer-Verlag Berlin-Heidelberg 2006. P. 619-628. Обозначения см. на стр. 655-661.
- Алексеев В.Б., Вороненко А.А.. О некоторых замкнутых классах в частичной двузначной логике, Дискрет. матем., 1994, том 6, выпуск 4, 58–79
Задания:
1. Сформулировать решаемую задачу и основные полученные результаты из раздела 20.7 (страницы 619-627) книги Lau.
2. Сформулировать результаты по мощности множества классов, содержащих заданный замкнутый класс булевых функций, по статье Алексеев, Вороненко и разделу 20.8 (стр. 627-628) книги Lau.
Lecturer: V.B. Alekseev.
Lecture 6. Algebras of minimal multiplicative complexity.
We prove that an associative algebra A has minimal rank if and only if the Alder–Strassen bound is also tight for the multiplicative complexity of A, that is, the multiplicative complexity of A is 2 dimA - t(A) where t(A) denotes the number of maximal twosided ideals of A. This generalizes a result by E. Feig who proved this for division algebras. Furthermore,we show that if A is local or superbasic, then every optimal quadratic computation for A is almost bilinear.
Lecturer: Bekhan Chokaev.
Lecture 7. Some new bounds of Shannon functions for cardinality of test sets for logical circuits.
Lecture 8. 13С metabolic flux analysis.
Literature
- Варновский Н.П., Захаров В.А., Кузюрин Н.П., Шокуров А.В. Современное состояние исследований в области обфускации программ: определения стойкости обфускации // Труды института системного программирования, 2014б т. 26, вып. 3, с. 167-191.
- Cappaert J. Code Obfuscation Techniques for Software Protection. PhD Thesis, 2012, Leuven University.
- Apt K.R., Boer F.S., Olderog E.-R. Verification of sequential and concurrent programs. Third, extended edition. Springer, 2010.
- Kleene S.C. Mathematical logic. 1967.
- Creignou N., Khanna S., Sudan M. Complexity classifications of Boolean constraint satisfaction problems. 2001.
- Bulatov A., Jeavons P., Krokhin A. Classifying the complexity of constraints using finite algebras // SIAM J. Comput. 2005. V. 34, N 3. P. 720-742.
- Lau, D. Function algebras on finite sets. A basic course on many-valued logic and clone theory. Springer Monographs in Mathematics. Springer-Verlag Berlin-Heidelberg 2006.
- Peter B¨urgisser, Michael Clausen, and M. Amin Shokrollahi. Algebraic Complexity Theory. Springer, 1997.
- Yurij A. Drozd and Vladimir V. Kirichenko. Finite Dimensional Algebras. Springer, 1994.
- A. Alder and V. Strassen. On the algorithmic complexity of associative algebras. Theoret. Comput. Sci., 15:201–211, 1981.
- Valery B. Alekseyev. On the Complexity of Some Algorithms of Matrix Multiplication. J. Algorithms, 6(1):71-85, 1985.
- Markus Bl¨aser. Lower bounds for the multiplicative complexity of matrix multiplication. Comput. Complexity, 8:203-226, 1999.
- Markus Bl¨aser. Lower bounds for the bilinear complexity of associative algebras. Comput. Complexity, 9:73-112, 2000.
- Markus Bl¨aser. A 2:5n2-lower bound for the multiplicative complexity of n х n-matrix multiplication. In Proc. 18th Int. Symp. on Theoret. Aspects of Comput. Sci. (STACS), Lectures Notes in Comput. Sci. 2010, 99-110, 2001.