Derive a regular expression for the language

Assignment Help Computer Engineering
Reference no: EM132385745

Questions -

Q1. Consider the automaton on page 15 in Milner's book, with the initial state as accepting state. Derive a regular expression for the language accepted by this automaton.

Q2. Give the standard form of

(newa((a.Q + b.S)|(b-.P + a-.P)))|newb(a.Q|a-.0)

and prove that it is structurally equivalent.

Q3. Consider

P1 =def a.P1 + b.P2 + τ.P2, P2 =def a.P2 + τ.P3, P3 =def b.P1

and

Q1 = a.Q1 + τ.Q2, Q2 =def b.Q1

Prove or refute that P1 ≈ Q1.

Q4. Consider the following equation:

X ≈ τ.X + a.Q

Prove (using 6.15) that if P1 is a solution, then also τ.(τ.P1 + τ.P2), with P2 any process, is a solution.

Q5. Why does this weak equivalence not hold? Argue informally why it is not true. There is a state of S which is equivalent to no possible state of the specification Scheduler. (Hint: This state only occurs after about 2n transitions from the start.)

Q6. Draw the transition graph of S, when n = 2. In general, every state is clearly of the form new c(Q1|Q2| · · · |Qn), where each Q is one of  A, B, C, D, E (with subscript). Convince yourself that the only accessible states are those in which one Q is A, B or C, and all the others are either D or E.

Q7. What state of Scheduler does new c(E1|D2|C3|E4) correspond to?

Q8. Give formal derivations of all the actions and reactions of process newc(E1|D2|C3|E4) from question 7.

Q9. Using the Expansion Law, Proposition 5.23, show that each of the following is strongly equivalent to a summation Σr αr.S=, where each αr is ai, bi or τ and each Sr an accessible state:

new c(D1|D2|A3|E4)

new c(D1|E2|B3|D4)

new c(E1|D2|C3|E4).

Q10. Let the relation R containing the following pairs, where {i}, X and Y form any partition of the set {1, . . . , n}:

Ai,X,Y, Schedi,Y

Bi,X,Y, Schedi,YUi

Ci,X,Y, Schedi+1,YUi.

Then show that R is a weak bi simulation up to ∼.

Textbook - Communicating and Mobile Systems: the π-Calculus by Robin Milner. ISBN 0 521 64320.

Reference no: EM132385745

Questions Cloud

Calculate the amount of accumulated depreciation : Calculate the amount of accumulated depreciation related to the machine that would appear in Jackson Company's December 31, 2025 balance sheet.
How do reimbursements from health insurance policies : How do reimbursements from health insurance policies affect the amount of the medical deduction? What happens if an insurance reimbursement.
Determine whether substantially all of the risks and rewards : How do you determine whether substantially all of the risks and rewards of ownership are transferred in the lease. Address how "substantially all" is defined.
Record the sale of the ovens at the end of the second year : Hudson Donuts is in the process of closing its operations. It sold its three-year-old bakery ovens to Great Harvest Bakery for $650,000.
Derive a regular expression for the language : Derive a regular expression for the language accepted by this automaton and Why does this weak equivalence not hold? Argue informally why it is not true
MGT602 Business Decision Analytics Assignment Problem : MGT602 Business Decision Analytics Assignment Help and Solution - Assessment - Decision Style Analysis Reflective Report - Laureate International Universities
What is the desired beginning inventory on june 1 : Cost of goods sold is budgeted at 40% of sales, and the inventory at the end of February was $34,000. Desired inventory levels at the end of each month.
How much cahs will kmiko retain after taxes : How much cahs will Kmiko retain after taxes, if she holds the investments for 5 years and then she sells it when the long term capital gains rate is 15%?
What would be the balance for company y prepaid insurance : This is the only insurance policy Company Y has in place. As of December 31, 2018, what would be the balance for company Y prepaid insurance?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write a cpp function to retrieve an entry from a hash table

Write a C++ function to retrieve an entry from a hash table with open addressing using (a) linear probing; (b) quadratic probing.

  Describe primary threats that compromise organization data

Describe at least 2 primary threats that could compromise the organization's data. Describe how the encryption methodologies that should be implemented.

  Print the array using an asterisk for bombs

Take 2 integers from the user m and n, and produces an m-by-n boolean array where each entry is occupied with probability 0.25.

  Rordan manufacturing is the virtual organizationsthe

riordan manufacturing is the virtual organizations.the microsoftreg powerpointreg slide nbsp presentation updating it

  Describe an instance of plagiarism using given information

On the discussion forum, describe an instance of plagiarism or other use of another's intellectual property with which you are familiar.

  Explain the potential interfaces used in accessing the data

Explain The potential interfaces used in accessing the data, Security technologies for data at rest in the cloud and Foundational cloud architectures.

  Determine the nature of holographic storage

IBM has invested heavily in research and development for holographic storage systems. Investigate this research to determine the nature of holographic storage.

  Create motorway class that can be use as extra documentation

Create a Motorway class that can be used as extra documentation with directions. Include data members such as name of motorway, type and direction.

  What is a credit-balance function and how is it used

What is a credit-balance function, and how is it used? In the big-O notation, what is the cost of splaying amortized over sequence of retrievals and insertions?

  Shadow it for business operations

Organizations do not always provide information systems that allow their staff to perform their responsibilities efficiently and effectively.

  Describe how the principle impacts data security

Read five articles and discuss the principle of least privilege(POLP promotes minimal user profile privileges on databases based on the idea that limiting user.

  Identify households and close-groups

Identify households, communities, and close-groups to better manage your relationships with them. Identify customer life-stages-Identifying social network.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd