25,147 results on '"Mathematical proof"'
Search Results
202. Memory State Verification Based on Inductive and Deductive Reasoning
- Author
-
Lei Qiao, Mengfei Yang, and Shaofeng Li
- Subjects
Memory management ,Correctness ,Theoretical computer science ,Deductive reasoning ,Computer science ,Proof assistant ,State (computer science) ,Electrical and Electronic Engineering ,Safety, Risk, Reliability and Quality ,Mathematical proof ,Embedded operating system ,Invariant (computer science) - Abstract
Memory allocation and deallocation are the fundamental operations of embedded operating systems, which have been extensively used in many safety critical systems. The correctness of the operations is of paramount importance because their failure could incur severe consequences. While the system is running, the memory state can easily grow to a gigantic amount, which means that it is impossible to verify the huge memory states one by one. Therefore, it is a challenge how to verify the correctness of running memory state of the system. In this article, we propose a novel memory state verification method based on inductive and deductive reasoning. First, we abstract the memory state as a list of memory blocks, which will transform in memory operations. Second, we construct the generic model based on the transition function of the memory management and summarize the invariant properties of the memory state. Third, we use the inductive method to calculate the changes between the memory states, and verify that the memory state of the system always satisfy the global properties. All the proofs are implemented in the interactive theorem prover Coq. On the basis of our proposed model, we verify the correctness of a two-level segregated fit (TLSF) algorithm through some extensions, and we also apply this method to verify the correctness of the memory state of the embedded system at runtime.
- Published
- 2021
203. Continuous leaderless synchronization control of multiple spacecraft on SO(3)
- Author
-
Ti Chen
- Subjects
Observer (quantum physics) ,Spacecraft ,Computer science ,business.industry ,Aerospace Engineering ,Astronomy and Astrophysics ,Angular velocity ,Topology (electrical circuits) ,Mathematical proof ,Topology ,Space and Planetary Science ,Control theory ,Synchronization (computer science) ,business ,MathematicsofComputing_DISCRETEMATHEMATICS ,Rotation group SO - Abstract
This paper presents a solution to the leaderless consensus of multiple spacecraft on SO(3) under a connected undirected graph. An algorithm is proposed to generate an undirected tree graph from a connected undirected communication topology. A distributed observer is designed to estimate the desired attitude and angular velocity for each spacecraft under the generated tree graph. An adaptive controller with a general connected undirected graph is developed to complete the synchronization task. Cases with zero and nonzero final angular velocities are considered. Theoretical proofs and numerical simulations are presented to demonstrate the effectiveness of the proposed controllers.
- Published
- 2021
204. Nowhere Differentiability Conditions on Composites of Peano Curves
- Author
-
Antonio Martínez-Abejón
- Subjects
General Mathematics ,Peano axioms ,Differentiable function ,Function (mathematics) ,Composite material ,Mathematical proof ,Mathematics ,Analytic proof - Abstract
Sufficient conditions on a smooth, real-valued function g for the nowhere differentiability of $$g\circ p$$ are given, where p is Peano’s curve. This generalizes Sagan’s analytic proof on the nowhere differentiability of the coordinate functions of p. Most of the proofs are geometrically intuitive. The interest about the composites $$g\circ p$$ stems from their recent applications in technical branches.
- Published
- 2021
205. On the long-only minimum variance portfolio under single factor model
- Author
-
Houduo Qi
- Subjects
Property (philosophy) ,Applied Mathematics ,Existential quantification ,Management Science and Operations Research ,Mathematical proof ,Industrial and Manufacturing Engineering ,Simple (abstract algebra) ,Bisection method ,Portfolio ,Applied mathematics ,Beta (velocity) ,Software ,Modern portfolio theory ,Mathematics - Abstract
The minimum-variance portfolio (MVP) has become an essential part of modern portfolio theory, largely due to the availability of its analytical formula and its good out-of-sample performance. When extra constraints such as the long-only constraints are added, MVP in general does not admit an analytical formula anymore. An exceptional case is when the single-factor model holds among the securities considered. It is known that there exists a semi-closed form formula, which relies on an unknown quantity called the long-only beta threshold ( β L ). This note conducts a detailed study of β L and establishes its optimality property that it is the smallest among all possible thresholds. We also develop a simple bisection method for computing β L . Finally we include a mathematical proof for this semi-closed form formula. The results reported provide a deep understanding how the long-only MVP are constructed.
- Published
- 2021
206. On Blass Translation for Leśniewski’s Propositional Ontology and Modal Logics
- Author
-
Takao Inoué
- Subjects
Discrete mathematics ,Section (fiber bundle) ,History and Philosophy of Science ,Fragment (logic) ,Logic ,Deontic logic ,Provability logic ,Modal logic ,Symmetry (geometry) ,Mathematical proof ,Translation (geometry) ,Mathematics - Abstract
In this paper, we shall give another proof of the faithfulness of Blass translation (for short, B-translation) of the propositional fragment $$\mathbf{L}_1$$ of Leśniewski’s ontology in the modal logic $$\mathbf{K}$$ by means of Hintikka formula. And we extend the result to von Wright-type deontic logics, i.e., ten Smiley-Hanson systems of monadic deontic logic. As a result of observing the proofs we shall give general theorems on the faithfulness of B-translation with respect to normal modal logics complete to certain sets of well-known accessibility relations with a restriction that transitivity and symmetry are not set at the same time. As an application of the theorems, for example, B-translation is faithful for the provability logic $$\mathbf{PrL}$$ (= $$\mathbf{GL}$$ ), that is, $$\mathbf{K}$$ $$+$$ $$\Box (\Box \phi \supset \phi ) \supset \Box \phi $$ . The faithfulness also holds for normal modal logics, e.g., $$\mathbf{KD}$$ , $$\mathbf{K4}$$ , $$\mathbf{KD4}$$ , $$\mathbf{KB}$$ . We shall conclude this paper with the section of some open problems and conjectures.
- Published
- 2021
207. Metasequents and Tetravaluations
- Author
-
Rohan French
- Subjects
Philosophy ,Computer science ,medicine ,Calculus ,Collapse (topology) ,Sequent calculus ,Closing (morphology) ,medicine.disease ,Mathematical proof ,Calculus (medicine) ,First class - Abstract
In this paper we treat metasequents—objects which stand to sequents as sequents stand to formulas—as first class logical citizens. To this end we provide a metasequent calculus, a sequent calculus which allows us to directly manipulate metasequents. We show that the various metasequent calculi we consider are sound and complete w.r.t. appropriate classes of tetravaluations where validity is understood locally. Finally we use our metasequent calculus to give direct syntactic proofs of various collapse results, closing a problem left open in French (Ergo, 3(5), 113–131 2016).
- Published
- 2021
208. Further extensions of some truncated Hecke type identities
- Author
-
Helen W. J. Zhang
- Subjects
Pure mathematics ,Series (mathematics) ,General Mathematics ,General Physics and Astronomy ,Type (model theory) ,Mathematical proof ,Mathematics - Abstract
The main purpose of this paper is to generalize the study of the Hecke-Rogers type series, which are the extensions of truncated theorems obtained by Andrews, Merca, Wang and Yee. Our proofs rely heavily on the theory of Bailey pairs.
- Published
- 2021
209. Generating mathematical knowledge in the classroom through proof, refutation, and abductive reasoning
- Author
-
Kotaro Komatsu and Keith Jones
- Subjects
Mathematical practice ,Process (engineering) ,Computer science ,Heuristic ,General Mathematics ,ComputingMilieux_COMPUTERSANDEDUCATION ,Job design ,Mathematical proof ,Curriculum ,Abductive reasoning ,Education ,Epistemology ,Counterexample - Abstract
Proving and refuting are fundamental aspects of mathematical practice that are intertwined in mathematical activity in which conjectures and proofs are often produced and improved through the back-and-forth transition between attempts to prove and disprove. One aspect underexplored in the education literature is the connection between this activity and the construction by students of knowledge, such as mathematical concepts and theorems, that is new to them. This issue is significant to seeking a better integration of mathematical practice and content, emphasised in curricula in several countries. In this paper, we address this issue by exploring how students generate mathematical knowledge through discovering and handling refutations. We first explicate a model depicting the generation of mathematical knowledge throughheuristic refutation(revising conjectures/proofs through discovering and addressing counterexamples) and draw on a model representing different types of abductive reasoning. We employed both models, together with the literature on the teachers’ role in orchestrating whole-class discussion, to analyse a series of classroom lessons involving secondary school students (aged 14–15 years, Grade 9). Our analysis uncovers the process by which the students discovered a counterexample invalidating their proof and then worked via creative abduction where a certain theorem was produced to cope with the counterexample. The paper highlights the roles played by the teacher in supporting the students’ work and the importance of careful task design. One implication is better insight into the form of activity in which students learn mathematical content while engaging in mathematical practice.
- Published
- 2021
210. Lower bounds for batched bin packing
- Author
-
József Békési, János Balogh, György Dósa, Leah Epstein, and Asaf Levin
- Subjects
Combinatorics ,Control and Optimization ,Computational Theory and Mathematics ,Bin packing problem ,Applied Mathematics ,Theory of computation ,Discrete Mathematics and Combinatorics ,Constant (mathematics) ,Mathematical proof ,Computer Science Applications ,Mathematics ,Parametric statistics - Abstract
We consider batched bin packing. Items are presented in a constant number of batches, and each batch should be packed before the next batch is presented. The cases of two, three, and four batches are studied. We prove improved lower bounds for the standard and parametric variants in some of the cases, and shorten the proofs for all other cases. To achieve this, we apply a new technique in our analysis, which differs from the ones previously used for proving such results.
- Published
- 2021
211. A theory of higher-order subtyping with type intervals
- Author
-
Paolo G. Giarrusso and Sandro Stucki
- Subjects
Theoretical computer science ,Computer science ,Scala ,Agda ,Substitution (logic) ,020207 software engineering ,0102 computer and information sciences ,02 engineering and technology ,Mathematical proof ,01 natural sciences ,Subtyping ,Bounded operator ,010201 computation theory & mathematics ,0202 electrical engineering, electronic engineering, information engineering ,Object type ,Bounded quantification ,Safety, Risk, Reliability and Quality ,computer ,Software ,computer.programming_language - Abstract
The calculus of Dependent Object Types (DOT) has enabled a more principled and robust implementation of Scala, but its support for type-level computation has proven insufficient. As a remedy, we propose F ·· ω , a rigorous theoretical foundation for Scala’s higher-kinded types. F ·· ω extends F ω with interval kinds , which afford a unified treatment of important type- and kind-level abstraction mechanisms found in Scala, such as bounded quantification, bounded operator abstractions, translucent type definitions and first-class subtyping constraints. The result is a flexible and general theory of higher-order subtyping. We prove type and kind safety of F ·· ω , as well as weak normalization of types and undecidability of subtyping. All our proofs are mechanized in Agda using a fully syntactic approach based on hereditary substitution.
- Published
- 2021
212. Symbolic and automatic differentiation of languages
- Author
-
Conal Elliott
- Subjects
Parsing ,Computer science ,Programming language ,String (computer science) ,Concatenation ,computer.software_genre ,Mathematical proof ,Type theory ,Kleene star ,Formal language ,Regular expression ,Safety, Risk, Reliability and Quality ,computer ,Software - Abstract
Formal languages are usually defined in terms of set theory. Choosing type theory instead gives us languages as type-level predicates over strings. Applying a language to a string yields a type whose elements are language membership proofs describing how a string parses in the language. The usual building blocks of languages (including union, concatenation, and Kleene closure) have precise and compelling specifications uncomplicated by operational strategies and are easily generalized to a few general domain-transforming and codomain-transforming operations on predicates. A simple characterization of languages (and indeed functions from lists to any type) captures the essential idea behind language “differentiation” as used for recognizing languages, leading to a collection of lemmas about type-level predicates. These lemmas are the heart of two dual parsing implementations—using (inductive) regular expressions and (coinductive) tries—each containing the same code but in dual arrangements (with representation and primitive operations trading places). The regular expression version corresponds to symbolic differentiation, while the trie version corresponds to automatic differentiation. The relatively easy-to-prove properties of type-level languages transfer almost effortlessly to the decidable implementations. In particular, despite the inductive and coinductive nature of regular expressions and tries respectively, we need neither inductive nor coinductive/bisimulation arguments to prove algebraic properties.
- Published
- 2021
213. One-Step Modal Logics, Intuitionistic and Classical, Part 2
- Author
-
Harold T. Hodes
- Subjects
Philosophy ,Class (set theory) ,Pure mathematics ,Iterated function ,Law of excluded middle ,Modal logic ,Intuitionistic logic ,Join (topology) ,Variety (universal algebra) ,Mathematical proof ,Mathematics - Abstract
Hodes (2021) “looked under the hood” of the familiar versions of the classical propositional modal logic K and its intuitionistic counterpart (see Plotkin & Sterling 1986). This paper continues that project, addressing some familiar classical strengthenings of K (D, T, K4, KB, K5, Dio (the Diodorian strengthening of K) and GL), and their intuitionistic counterparts (see Plotkin & Sterling 1986 for some of these counterparts). Section 9 associates two intuitionistic one-step proof-theoretic systems to each of the just mentioned intuitionistic logics, this by adding for each a new rule to those which generated IK in Hodes (2021). For the systems associated with the intuitionistic counterparts of D and T, these rules are “pure one-step”: their schematic formulations does not use □ or ♢. For the systems associated with the intuitionistic counterparts of K4, etc., these rules meet these conditions: neither □ nor ♢ is iterated; none use both □ and ♢. The join of the two systems associated with each of these familiar logics is the full one-step system for that intuitionistic logic. And further “blended” intuitionistic systems arise from joining these systems in various ways. Adding the 0-version of Excluded Middle to their intuitionistic counterparts yields the one-step systems corresponding to the familiar classical logics. Each proof-theoretic system defines a consequence relation in the obvious way. Section 10 examines inclusions between these consequence relations. Section 11 associates each of the above consequence relations with an appropriate class of models, and proves them sound with respect to their appropriate class. This allows proofs of some failures of inclusion between consequence relations. (Sections 10 and 11 provide an exhaustive study of a variety of intuitionistic modal logics.) Section 12 proves that the each consequence relation is complete or (for those corresponding to GL) weakly complete, that relative to its appropriate class of models. The Appendix presents three further results about some of the intuitionistic consequence relations discussed in the body of the paper.
- Published
- 2021
214. A Prevailing-Decree Verifier intended for Cryptographic Etiquettes
- Author
-
Dr.V. Isakkirajan
- Subjects
Guesstimate ,business.industry ,Computer science ,Cryptography ,Cryptographic protocol ,Encryption ,Mathematical proof ,Computer security ,computer.software_genre ,Code (cryptography) ,business ,Protocol (object-oriented programming) ,computer ,Cryptographic nonce - Abstract
In recent years, a number of cryptographic etiquettes have been mechanically verified using a selection of inductive methods. These attestations typically want central a figure of recursive sets of messages, and need deep intuition into why the etiquette is correct. As a result, these proofs frequently require days to weeks of expert effort. We ensure advanced an involuntary verifier, which seems to overawe these glitches for many cryptographic protocols. The code of behavior text to concept a number of first-order invariant the proof commitments mitigating these invariants, along with any user-specified protocol properties are showed from the invariants with a tenacity theorem proved. The individual litheness in construction these invariants is to guesstimate, for each type of nonce and encryption engendered by the protocol, a formulary arresting conditions compulsory for that nonce encryption to be published.
- Published
- 2021
215. Geometric aspects of two- and threepeakons
- Author
-
Wojciech Kryński and Tomasz Cieślak
- Subjects
Mathematics - Differential Geometry ,Applied Mathematics ,Mathematical analysis ,General Physics and Astronomy ,Statistical and Nonlinear Physics ,Mathematical proof ,Collision ,53C22, 37J39, 70H06 ,symbols.namesake ,Mathematics - Analysis of PDEs ,Differential Geometry (math.DG) ,FOS: Mathematics ,Gaussian curvature ,symbols ,Mathematics::Differential Geometry ,Sectional curvature ,Mathematical Physics ,Analysis of PDEs (math.AP) ,Mathematics - Abstract
We apply geometric tools to study dynamics of two- and threepeakon solutions of the Camassa–Holm equation. New proofs of asymptotic behavior of the solutions are given. In particular we recover well-known collision conditions. Additionally the Gauss curvature (in the twopeakon case) and the sectional curvature (in the threepeakon case) of corresponding manifolds are computed.
- Published
- 2021
216. Proofs of Ibukiyama’s conjectures on Siegel modular forms of half-integral weight and of degree 2
- Author
-
Hiroshi Ishimoto
- Subjects
Pure mathematics ,Metaplectic group ,Degree (graph theory) ,General Mathematics ,Multiplicity (mathematics) ,Orthogonal group ,Mathematical proof ,Representation theory ,Mathematics ,Siegel modular form - Abstract
We prove Ibukiyama’s conjectures on Siegel modular forms of half-integral weight and of degree 2 by using Arthur’s multiplicity formula on the split odd special orthogonal group $${\text {SO}}_5$$ and Gan–Ichino’s multiplicity formula on the metaplectic group $${\text {Mp}}_4$$ . In the proof, the representation theory of the Jacobi groups also plays an important role.
- Published
- 2021
217. The chords theorem recalled to life at the turn of the eighteenth century
- Author
-
Alessandra Fiocca and Andrea Del Centina
- Subjects
History ,conic sections ,General Mathematics ,Socio-culturale ,Pappus ,06 humanities and the arts ,SH6_10 ,Mathematical proof ,PE1_1 ,the chords theorem ,060105 history of science, technology & medicine ,Projection (mathematics) ,Conic section ,Simple (abstract algebra) ,Turn (geometry) ,Calculus ,0601 history and archaeology ,Direct proof ,Algebraic number ,PE1_5 ,Mathematics - Abstract
This paper is a historical account of the chords theorem, for conic sections from Apollonius to Boscovich. We comment the most significant proofs and applications, focusing on Newton's solution of the Pappus four lines problem. Newton's geometrical achievements drew L'Hospital's attention to the chords theorem as a fundamental one, and led him to search for a simple and direct proof, that he finally obtained by the method of projection. Stirling gave a very elegant algebraic proof; then Boscovich succeeded in finding an almost immediate geometrical proof, and showed how to develop the elements of conic sections starting from this theorem.
- Published
- 2021
218. Hempel on scientific understanding
- Author
-
Xingming Hu
- Subjects
Male ,History ,Cognition ,History and Philosophy of Science ,Argument ,Philosophical analysis ,Humans ,Mathematical proof ,Psychology ,Epistemology - Abstract
Hempel seems to hold the following three views: (H1) Understanding is pragmatic/relativistic: Whether one understands why X happened in terms of Explanation E depends on one's beliefs and cognitive abilities; (H2) Whether a scientific explanation is good, just like whether a mathematical proof is good, is a nonpragmatic and objective issue independent of the beliefs or cognitive abilities of individuals; (H3) The goal of scientific explanation is understanding: A good scientific explanation is the one that provides understanding. Apparently, H1, H2, and H3 cannot be all true. Some philosophers think that Hempel is inconsistent, while some others claim that Hempel does not actually hold H3. I argue that Hempel does hold H3 and that he can consistently hold all of H1, H2, and H3 if he endorses what I call the “understanding argument.” I also show how attributing the understanding argument to Hempel can make more sense of his D-N model and his philosophical analysis of the pragmatic aspects of scientific explanation.
- Published
- 2021
219. Collective marking for arbitrary order adaptive least-squares finite element methods with optimal rates
- Author
-
Rui Ma and Carsten Carstensen
- Subjects
Mathematical proof ,Least squares ,Finite element method ,Mathematics::Numerical Analysis ,Computational Mathematics ,Computational Theory and Mathematics ,Modeling and Simulation ,Mathematik ,Convergence (routing) ,Order (group theory) ,Applied mathematics ,Degree of a polynomial ,Boundary value problem ,Poisson's equation ,Mathematics - Abstract
The collective marking strategy with alternative refinement-indicators in adaptive mesh-refining of least-squares finite element methods (LSFEMs) has recently been shown to lead to optimal convergence rates in Carstensen (2020). The proofs utilize explicit identities for the lowest-order Raviart–Thomas and the Crouzeix–Raviart finite elements. This paper generalizes those results to arbitrary polynomial degree and mixed boundary conditions with some novel arguments. The analysis is outlined for the Poisson equation in 3D with mixed boundary conditions.
- Published
- 2021
220. Algebraic quantum theory with maximal frequency
- Author
-
G. A. Kravzova
- Subjects
Quantization (physics) ,Spinor ,High Energy Physics::Lattice ,Algebraic theory ,Dirac (software) ,Statistical and Nonlinear Physics ,Algebraic number ,Mathematical proof ,Mathematical Physics ,Mathematics ,Mathematical physics - Abstract
We consider an algebraic theory with a maximal mass (modified Dirac theory with a $$\gamma_5$$ -expansion of mass). We consider properties of spinors and give the necessary proofs. Quantization is performed.
- Published
- 2021
221. WWPD elements of big mapping class groups
- Author
-
Alexander J. Rasmussen
- Subjects
Loop (graph theory) ,Pure mathematics ,Class (set theory) ,Property (philosophy) ,Geometric Topology (math.GT) ,Group Theory (math.GR) ,Type (model theory) ,Mathematical proof ,Cohomology ,Mathematics - Geometric Topology ,Simple (abstract algebra) ,Bounded function ,FOS: Mathematics ,Discrete Mathematics and Combinatorics ,Geometry and Topology ,Mathematics - Group Theory ,Mathematics - Abstract
We study mapping class groups of infinite type surfaces with isolated punctures and their actions on the loop graphs introduced by Bavard-Walker. We classify all of the mapping classes in these actions which are loxodromic with a WWPD action on the corresponding loop graph. The WWPD property is a weakening of Bestvina-Fujiwara's weak proper discontinuity and is useful for constructing non-trivial quasimorphisms. We use this classification to give a sufficient criterion for subgroups of big mapping class groups to have infinite-dimensional second bounded cohomology and use this criterion to give simple proofs that certain natural subgroups of big mapping class groups have infinite-dimensional second bounded cohomology., Final version to appear in Groups, Geometry, and Dynamics
- Published
- 2021
222. Human-Centered Automated Proof Search
- Author
-
Farzaneh Derakhshan and Wilfried Sieg
- Subjects
Structure (mathematical logic) ,Exploit ,Computer science ,Programming language ,Proof search ,Mathematical proof ,computer.software_genre ,Sketch ,Theorem provers ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,Computational Theory and Mathematics ,Artificial Intelligence ,computer ,Software ,Natural language ,Proof construction - Abstract
Human-centered automated proof search aims to capture structures of ordinary mathematical proofs and discover human strategies that are used (implicitly) in their construction. We analyze the ways of two theorem provers for approaching that goal. One, the GG the other, Sieg’s AProS system, is described in Sieg and Walsh (Rev Symb Logic 1-35, 2019). Both systems make explicit, via their underlying logical calculi, the goal-directedness and bi-directionality of proof construction. However, the calculus for the GG AProS is to yield humanly intelligible formal proofs by logically and mathematically motivated strategies. In our final Programmatic remarks, we sketch a plausible, but difficult project for achieving more fully G&G’s broad goals by radically separating proof search from proof translation: one could use AProS for the proof search and then exploit the strategic structure of the completed proof as the deterministic underpinning for its translation into a natural language.
- Published
- 2021
223. Diagnostic Problem for a Model of a Gyrostabilized Platform
- Author
-
Maxim V. Shamolin and E. P. Krugova
- Subjects
Statistics and Probability ,Angular displacement ,Applied Mathematics ,General Mathematics ,ComputerApplications_COMPUTERSINOTHERSYSTEMS ,Gyroscope ,Mathematical proof ,Motion (physics) ,law.invention ,Position (vector) ,law ,Control theory ,Key (cryptography) ,Mathematics - Abstract
This paper is devoted to the study of the motion of a platform maintained on an aircraft in a predetermined position by a system of gyroscopes, which does follows oscillations of the aircraft. Such systems are used for determining the angular position of the aircraft. We briefly review key results on this issue without detailed proofs.
- Published
- 2021
224. Introducing a measure of perceived self-efficacy for proof (PSEP): Evidence of validity
- Author
-
Vimolan Mudaly and Benjamin Shongwe
- Subjects
Microbiology (medical) ,Science ,Immunology ,Education (General) ,Inductive reasoning ,Mathematical proof ,Exploratory factor analysis ,Confirmatory factor analysis ,External validity ,QA1-939 ,Content validity ,Mathematics education ,Immunology and Allergy ,calibration, factor analyses, instrument development, self-efficacy for proof ,L7-991 ,Psychology ,Construct (philosophy) ,Mathematics ,Reliability (statistics) - Abstract
It is widely recognized that students encounter difficulties with proof across all grades and beyond, yet standardized instruments related specifically to students’ perceived self-efficacy for mathematical proof have not been readily available. The purpose of this study was to develop and investigate preliminary validity evidence for a new instrument for measuring self-efficacy for mathematical proof that can be of importance to the field. The new Perceived Self-Efficacy for Proof (PSEP) questionnaire is a self-administered, 8-item questionnaire that quantifies experimentation, conjecturing, inductive reasoning, justification, and validation. To validate the PSEP, two studies with 260 eleventh grade students—recruited from three Dinaledi schools in EThekwini metropolitan area, South Africa—were conducted. In Study 1 (n=128), face and content validity were evaluated, and an exploratory factor analysis (EFA) was performed. In Study 2 (n=132), a confirmatory factor analysis (CFA) was conducted and external validity was investigated. In both samples, the PSEP was found to possess good internal consistency reliability with relatively high factor loadings on a single component. Although the findings in this report represent preliminary validation evidence, it can be concluded that the PSEP is a valid, reliable and sensitive measure of 11th grade students’ perceptions of their ability to construct a proof and may serve as a meaningful outcome in mathematical proof research and classroom proof education.
- Published
- 2021
225. Some Reiteration Theorems for <math xmlns='http://www.w3.org/1998/Math/MathML' id='M1'> <mi mathvariant='script'>R</mi> </math>, <math xmlns='http://www.w3.org/1998/Math/MathML' id='M2'> <mi mathvariant='script'>L</mi> </math>, <math xmlns='http://www.w3.org/1998/Math/MathML' id='M3'> <mi mathvariant='script'>R</mi> <mi mathvariant='script'>R</mi> </math>, <math xmlns='http://www.w3.org/1998/Math/MathML' id='M4'> <mi mathvariant='script'>R</mi> <mi mathvariant='script'>L</mi> </math>, <math xmlns='http://www.w3.org/1998/Math/MathML' id='M5'> <mi mathvariant='script'>L</mi> <mi mathvariant='script'>R</mi> </math>, and <math xmlns='http://www.w3.org/1998/Math/MathML' id='M6'> <mi mathvariant='script'>L</mi> <mi mathvariant='script'>L</mi> </math> Limiting Interpolation Spaces
- Author
-
Leo R. Ya. Doktorski
- Subjects
Pure mathematics ,Lorentz transformation ,010102 general mathematics ,MathematicsofComputing_GENERAL ,Limiting ,Mathematical proof ,01 natural sciences ,010101 applied mathematics ,symbols.namesake ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,symbols ,0101 mathematics ,GeneralLiterature_REFERENCE(e.g.,dictionaries,encyclopedias,glossaries) ,Analysis ,Mathematics ,Interpolation - Abstract
We consider the K -interpolation methods involving slowly varying functions. We establish some reiteration formulae including so-called L or R limiting interpolation spaces as well as the R R , R L , L R , and L L extremal interpolation spaces. These spaces arise in the limiting situations. The proofs of most reiteration formulae are based on Holmstedt-type formulae. Applications to grand and small Lorentz spaces in critical cases are given.
- Published
- 2021
226. Mathematical Proof of Collatz Conjecture
- Author
-
Nishad T M
- Subjects
Discrete mathematics ,Mathematical proof ,Mathematics ,Collatz conjecture - Published
- 2021
227. Regular numeral systems for data structures
- Author
-
Amr Elmasry and Jyrki Katajainen
- Subjects
Numeral system ,Correctness ,Computer Networks and Communications ,Computer science ,Simple (abstract algebra) ,Theory of computation ,Arithmetic ,Data structure ,Constant (mathematics) ,Mathematical proof ,Software ,Numerical digit ,Information Systems - Abstract
We formalize several regular numeral systems, state their properties and supported operations, clarify the correctness, and tabulate the proofs. Our goal is to use as few symbols in the presentation of digits and make as few digit changes as possible in every operation. Most importantly, we introduce two new systems: (1) the buffered regular system is simple and allows the increment and decrement of the least-significant digit in constant time, and (2) the strictly regular system allows the increment and decrement of a digit at arbitrary position with a constant number of digit changes while using three symbols only (instead of four symbols required by the extended regular system). To demonstrate the usefulness of the regular systems, we survey how they have been used in the design of data structures.
- Published
- 2021
228. HashWires: Hyperefficient Credential-Based Range Proofs
- Author
-
Shir Cohen, Yolan Romailler, Kevin Lewi, Fredric Moezinia, and Konstantinos Chalkias
- Subjects
Ethics ,0303 health sciences ,malleability ,accumulators ,Computer science ,cryptographic commitments ,location privacy ,QA75.5-76.95 ,BJ1-1725 ,Mathematical proof ,micro-payments ,Credential ,03 medical and health sciences ,hash-chains ,0302 clinical medicine ,Electronic computers. Computer science ,030220 oncology & carcinogenesis ,Calculus ,General Earth and Planetary Sciences ,credentials ,range proofs ,030304 developmental biology ,General Environmental Science ,Range (computer programming) - Abstract
This paper presents HashWires, a hash-based range proof protocol that is applicable in settings for which there is a trusted third party (typically a credential issuer) that can generate commitments. We refer to these as “credential-based” range proofs (CBRPs). HashWires improves upon hashchain solutions that are typically restricted to micro-payments for small interval ranges, achieving an exponential speedup in proof generation and verification time. Under reasonable assumptions and performance considerations, a Hash-Wires proof can be as small as 305 bytes for 64-bit integers. Although CBRPs are not zero-knowledge and are inherently less flexible than general zero-knowledge range proofs, we provide a number of applications in which a credential issuer can leverage HashWires to provide range proofs for private values, without having to rely on heavyweight cryptographic tools and assumptions.
- Published
- 2021
229. Calculating lifetime expected loss for IFRS 9: which formula is measuring what?
- Author
-
Bernd Engelmann
- Subjects
050208 finance ,IFRS 9 ,Floating interest rate ,05 social sciences ,Risk management information systems ,050201 accounting ,Prepayment of loan ,Mathematical proof ,Loan ,0502 economics and business ,Econometrics ,Economics ,Cash flow ,Expected loss ,Finance - Abstract
PurposeThe purpose of this article is to derive formulas for lifetime expected credit loss of loans that are required for the calculation of loan loss reserves under IFRS 9. This is done both for fixed-rate and floating rate loans under different assumptions on LGD modeling, prepayment, and discount rates.Design/methodology/approachThis study provides exact formulas for lifetime expected credit loss derived analytically together with the mathematical proofs of each expression.FindingsThis articles shows that the formula most commonly applied in the literature for calculating lifetime expected credit loss is inconsistent with measuring expected loss based on expected discounted cash flows. Formulas based on discounted cash flows always lead to more conservative numbers.Practical implicationsFor banks reporting under IFRS 9, the implication of this research is a better understanding of the different approaches used for computing lifetime expected loss, how they are connected, and what assumptions are underlying each approach. This may lead to corrections in existing frameworks to make applications of risk management systems more consistent.Originality/valueWhile there is a lot of literature explaining IFRS 9 and evaluating its impact, none of the existing research has systematically analyzed the calculation of lifetime expected credit loss for this purpose and how the formula changes under different modeling assumptions. This gap is filled by this study.
- Published
- 2021
230. Three pairs of congruences concerning sums of central binomial coefficients
- Author
-
Guo-Shuai Mao and Roberto Tauraso
- Subjects
Mathematics::Number Theory ,p-adic gamma function ,11A07, 05A10, 11B65, 11G05, 33B15 ,Mathematical proof ,Prime (order theory) ,Combinatorics ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,FOS: Mathematics ,Mathematics - Combinatorics ,Computer Science::General Literature ,Congruence (manifolds) ,Harmonic number ,Number Theory (math.NT) ,Central binomial coefficient ,central binomial coefficient ,Hypergeometric function ,ComputingMilieux_MISCELLANEOUS ,Binomial coefficient ,Mathematics ,Algebra and Number Theory ,Mathematics - Number Theory ,Computer Science::Information Retrieval ,Astrophysics::Instrumentation and Methods for Astrophysics ,Computer Science::Computation and Language (Computational Linguistics and Natural Language and Speech Processing) ,Congruence relation ,Congruence ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,harmonic numbers ,Settore MAT/05 ,ComputingMethodologies_DOCUMENTANDTEXTPROCESSING ,Combinatorics (math.CO) ,hypergeometric functions - Abstract
Recently the first author proved a congruence proposed in 2006 by Adamchuk: [Formula: see text] for any prime [Formula: see text]. In this paper, we provide more examples (with proofs) of congruences of the same kind [Formula: see text] where [Formula: see text] is a prime such that [Formula: see text], [Formula: see text] is a fraction in [Formula: see text] and [Formula: see text] is a [Formula: see text]-adic integer. The key ingredients are the [Formula: see text]-adic Gamma function [Formula: see text] and a special class of computer-discovered hypergeometric identities.
- Published
- 2021
231. Can Guided Notes Support Students’ Note-taking in Mathematics Lectures?
- Author
-
Anja Panse and Frank Feudel
- Subjects
Mathematics lectures ,05 social sciences ,050301 education ,Guided notes ,510 Mathematik ,Qualitative property ,Mathematical proof ,Education ,Mathematics (miscellaneous) ,ddc:370 ,0502 economics and business ,ComputingMilieux_COMPUTERSANDEDUCATION ,Mathematics education ,Mathematics instruction ,ddc:510 ,0503 education ,Traditional mathematics ,370 Bildung und Erziehung ,050203 business & management ,Note-taking - Abstract
In traditional mathematics lectures the instructor normally writes the definitions, theorems, and proofs covered on the board, and gives informal oral explanations that help to make sense of them. The students have to take notes. However, there are serious problems concerning students’ note-taking in traditional mathematics lectures. Students often cannot think about the information presented during the lecture as they are busy writing. Making sense of the content later is also difficult because many students do not include the lecturer’s oral explanations in their notes. One approach to addressing these problems can be the use of guided notes: a modified version of the instructor’s notes with certain blanks the students have to fill in during the lecture. We investigated to what extent guided notes can support students in their note-taking in mathematics lectures in a study using a mixed-method design. This study provides on the one hand quantitative data suggesting that guided notes are perceived as beneficial by many students for several aspects of their note-taking. On the other hand, it offers qualitative data illustrating how the use of guided notes can influence these aspects. The results indicate in particular that the use of guided notes can address some of the problems concerning students’ note-taking in traditional mathematics lectures, while it can also lead to new problems that one needs to be aware of.
- Published
- 2021
232. PROOF OF THE IMPOSSIBILITY OF THE PERFECT CUBOID EXISTENCE
- Author
-
H. Gevorgyan
- Subjects
Discrete mathematics ,Mathematical problem ,Diagonal ,Computer Science::Computational Geometry ,Mathematical proof ,symbols.namesake ,Euler brick ,Number theory ,Physics::Atomic and Molecular Clusters ,Euler's formula ,symbols ,Impossibility ,Equivalence (measure theory) ,Mathematics - Abstract
The problem of finding, among the Euler parallelepipeds, one with an integer spatial diagonal, called the perfect cuboid problem, is one of the unsolved mathematical problems from the section of number theory. This article provides mathematical proof of the impossibility of the existence of the perfect cuboide among all possible Euler parallelepipeds. A mathematical justification for an equivalence of the problem of doubling a cube and the problem of constructing a perfect cuboid is also given.
- Published
- 2021
233. A Novel Mathematical Formal Proof in Zhang-Wang's Cryptographic Algorithm
- Author
-
Junwei Yang, Chenglian Liu, Xiangkun Tong, and Sonia C-I Chen
- Subjects
Combinational logic ,Computer science ,General Chemical Engineering ,Exclusive or ,Cryptographic protocol ,Mathematical proof ,Industrial and Manufacturing Engineering ,Formal proof ,Boolean algebra ,Digital Signature Algorithm ,symbols.namesake ,symbols ,General Materials Science ,Formal verification ,Algorithm - Abstract
Formal verification is to use mathematical methods to prove that our scheme is correct. This scheme is just a pronoun. It may be expressed as a hardware, a software or an algorithm. Errors in hardware are more difficult to modify than errors in software, so formal proofs and inspections often appear in the argument for hardware design. But, it does not mean that the software does not need to be formally verified. In addition to digital circuits or combinational circuits, cryptographic protocols also need to be formally verified. Formal proof can only ensure whether the result of logical inference is consistent with the previous stage, and can not guarantee whether there are defects in the process of logical inference. In this article the authors take as an example of Zhang-Wang's digital signature algorithm, and point out two formal proof methods of Boolean algebra and Galois field respectively.
- Published
- 2021
234. Learning about Proof with the Theorem Prover LEAN: the Abundant Numbers Task
- Author
-
Paola Iannone and Athina Thoma
- Subjects
Statement (computer science) ,Structure (mathematical logic) ,Automated theorem proving ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,Mathematics (miscellaneous) ,TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS ,Mathematics education ,Exploratory research ,Production (computer science) ,Abundant number ,Mathematical proof ,Education ,Task (project management) - Abstract
This exploratory study reports on characteristics of proof production and proof writing observed in the work of first-year university students who took part in workshops on the theorem prover LEAN (https://leanprover.github.io). These workshops were voluntary and offered alongside a transition to proof module in a UK university. Through qualitative analysis of 36 student produced proofs of an unfamiliar statement we highlight characteristics of proofs produced by students who did engaged and who did not engage with LEAN. The analysis shows two characteristics of proofs written by students who engaged with the programming language. The first concerns proof writing and includes the accurate and correct use of mathematics language and symbols, together with the use of complete sentences and punctuations in proofs. The second concerns proof structure and includes the overt break down of proofs in goals and sub-goals. We conclude by hypothesising a link between the characteristics observed and the experience of engaging with the theorem prover and we reflect on the potential that engagement with this theorem prover may have in mathematics instruction at university level.
- Published
- 2021
235. Master Equation for the Finite State Space Planning Problem
- Author
-
Charles Bertucci, Jean-Michel Lasry, Pierre-Louis Lions, Centre de Mathématiques Appliquées - Ecole Polytechnique (CMAP), École polytechnique (X)-Centre National de la Recherche Scientifique (CNRS), CEntre de REcherches en MAthématiques de la DEcision (CEREMADE), Université Paris Dauphine-PSL, Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)-Centre National de la Recherche Scientifique (CNRS), Chaire Équations aux dérivées partielles et applications, Collège de France (CdF (institution)), Centre National de la Recherche Scientifique (CNRS)-Université Paris Dauphine-PSL, and Université Paris sciences et lettres (PSL)-Université Paris sciences et lettres (PSL)
- Subjects
0209 industrial biotechnology ,Mechanical Engineering ,010102 general mathematics ,Complex system ,Monotonic function ,02 engineering and technology ,Space (mathematics) ,Mathematical proof ,01 natural sciences ,Mathematics - Analysis of PDEs ,020901 industrial engineering & automation ,Mathematics (miscellaneous) ,Mean field theory ,Master equation ,FOS: Mathematics ,[MATH.MATH-AP]Mathematics [math]/Analysis of PDEs [math.AP] ,Applied mathematics ,Boundary value problem ,Uniqueness ,0101 mathematics ,Analysis ,Analysis of PDEs (math.AP) ,Mathematics - Abstract
International audience; We present results of existence, regularity and uniqueness of solutions of the master equation associated with the mean field planning problem in the finite state space case, in the presence of a common noise. The results hold under monotonicity assumptions, which are used crucially in the different proofs of the paper. We also make a link with the trajectories induced by the solution of the master equation and start a discussion on the case of boundary conditions.
- Published
- 2021
236. Bounded Leader-Following Consensus of Heterogeneous Directed Delayed Multi-Agent Systems via Asynchronous Impulsive Control
- Author
-
Guoliang He, Jiangtao Gong, Xiaoqun Wu, and Di Ning
- Subjects
Rate of convergence ,Computer simulation ,Control theory ,Computer science ,Asynchronous communication ,Multi-agent system ,Bounded function ,Convergence (routing) ,Symmetric matrix ,Electrical and Electronic Engineering ,Mathematical proof - Abstract
This brief investigates consensus of multi-agent systems via asynchronous impulsive control. Firstly, the model considered in this brief accords with actual situation. Secondly, a new control scheme is proposed, which not only can greatly reduce communication and control cost, but also effectively solves the problem of excessive power. Moreover, sufficient conditions formulated by linear matrix inequalities are developed to obtain the less conservative results. The consensus error bound and the convergence rate are also given by rigorous mathematical proof. Finally, a numerical simulation is given to verify the theoretical analysis.
- Published
- 2021
237. Analysis of the Functioning and Structural Decomposing of Special-Purpose Information Systems
- Author
-
V. M. Tyutyunnik, Yu. Yu. Gromov, T. E. Smolentseva, and V. I. Sumin
- Subjects
Algebra ,Controllability ,Sequence ,Basis (linear algebra) ,Computer science ,Complex system ,Structure (category theory) ,Information system ,Observability ,Mathematical proof ,General Economics, Econometrics and Finance - Abstract
On the basis of the analysis of the functioning of complex special-purpose information systems, a general approach was proposed to their mathematical modeling and structural decomposition, based on topological constructions using the theory of the final semigroups. The connection between any transformations of a complex system in the finite space of its states and certain valid coordinatization variants is defined for the final semigroups. Various generalized indicators of evaluation of functional structure simplexes, which allowed one to obtain the characteristics of these complexes, have been determined. The proposed method of analysis allowed more objective analysis of the q-connectivity of the simplexes and the observability and controllability of the special-purpose complex information system. Definitions, theorems, and proofs are presented, which allows calculation of the sequence of composition and the integration of the subsystems of a complex system into a single whole.
- Published
- 2021
238. Glimpses are forever in RC4 amidst the spectre of biases
- Author
-
Chandratop Chakraborty, Pranab Chakraborty, and Subhamoy Maitra
- Subjects
Exploit ,Point (typography) ,Applied Mathematics ,0211 other engineering and technologies ,Byte ,021107 urban & regional planning ,0102 computer and information sciences ,02 engineering and technology ,RC4 ,Mathematical proof ,01 natural sciences ,Task (project management) ,law.invention ,010201 computation theory & mathematics ,law ,Hidden variable theory ,Discrete Mathematics and Combinatorics ,Arithmetic ,Cryptanalysis ,Mathematics - Abstract
In this paper we exploit elementary combinatorial techniques to settle different cryptanalytic observations on RC4 that remained unproved for more than two decades. At the same time, we present new observations with theoretical proofs. We first prove the biases (non-randomness) presented by Fluhrer and McGrew (FSE 2000) two decades ago. It is surprising that though the biases have been published long back, and there are many applications of them in cryptanalysis till recent days as well, the proofs have never been presented. In this paper, we complete that task and also show that any such bias immediately provides a glimpse of hidden variables in RC4. Further, we take up the biases of two non-consecutive key-stream bytes skipping one byte in between. We show the incompleteness of such a result presented by SenGupta et al. (JoC, 2013) and provide new observations and proofs in this direction relating the key-stream bytes and glimpses. Similarly, we streamline certain missed observation in the famous Glimpse theorem presented by Jenkins in 1996. Our results point out how biases of RC4 key-stream and the Glimpses of the RC4 hidden variables are related. It is evident from our results that the biases and glimpses are everywhere in RC4 and it needs further investigation as we provide very high magnitude of glimpses that were not known earlier.
- Published
- 2021
239. The improved AdaBoost algorithms for imbalanced data classification
- Author
-
Dongchu Sun and Wenyang Wang
- Subjects
Information Systems and Management ,Computer science ,05 social sciences ,050301 education ,02 engineering and technology ,Mathematical proof ,Adaboost algorithm ,Measure (mathematics) ,Class (biology) ,Imbalanced data ,Computer Science Applications ,Theoretical Computer Science ,Effective solution ,Domain (software engineering) ,ComputingMethodologies_PATTERNRECOGNITION ,Artificial Intelligence ,Control and Systems Engineering ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,AdaBoost ,0503 education ,Algorithm ,Software - Abstract
Class imbalance is one of the most popular and important issues in the domain of classification. The AdaBoost algorithm is an effective solution for classification, but it still needs improvement in the imbalanced data problem. This paper proposes a method to improve the AdaBoost algorithm using the new weighted vote parameters for the weak classifiers. Our proposed weighted vote parameters are determined not only by the global error rate but also by the classification accuracy rate of the positive class, which is our primary interest. The imbalanced index of the data is also a factor in constructing our algorithms. Our proposed algorithms outperform the traditional ones, especially regarding the evaluation criterion of F - 1 Measure . Theoretic proofs of the advantages of our proposed algorithms are presented. Two kinds of simulated datasets and four real datasets are applied in the experiment as the specific support to our proposed algorithms.
- Published
- 2021
240. Applications of CERES
- Author
-
Baaz, Matthias, Leitsch, Alexander, Leitsch, Alexander, and Baaz, Matthias
- Published
- 2011
- Full Text
- View/download PDF
241. Strategies for Proofs
- Author
-
Bloch, Ethan D. and Bloch, Ethan D.
- Published
- 2011
- Full Text
- View/download PDF
242. Coexistence of Three Predators Competing for a Single Biotic Resource
- Author
-
Lobry, Claude, Sari, Tewfik, Yadi, Karim, Morari, Manfred, editor, Thoma, Manfred, editor, Lévine, Jean, editor, and Müllhaupt, Philippe, editor
- Published
- 2011
- Full Text
- View/download PDF
243. Basic Mathematical Concepts and Methods
- Author
-
Dadkhah, Kamran and Dadkhah, Kamran
- Published
- 2011
- Full Text
- View/download PDF
244. Programs: The Good, the Bad, and the Verified
- Author
-
Partridge, Derek and Partridge, Derek
- Published
- 2011
- Full Text
- View/download PDF
245. The Ancients
- Author
-
Krantz, Steven G. and Krantz, Steven G.
- Published
- 2011
- Full Text
- View/download PDF
246. What Is a Proof and Why?
- Author
-
Krantz, Steven G. and Krantz, Steven G.
- Published
- 2011
- Full Text
- View/download PDF
247. Beyond Computers: The Sociology of Mathematical Proof
- Author
-
Krantz, Steven G. and Krantz, Steven G.
- Published
- 2011
- Full Text
- View/download PDF
248. John Horgan and 'The Death of Proof?'
- Author
-
Krantz, Steven G. and Krantz, Steven G.
- Published
- 2011
- Full Text
- View/download PDF
249. Rozumienie dowodu matematycznego a zagadnienie wyjaśnienia w matematyce
- Author
-
Krzysztof Wójtowicz
- Subjects
philosophy of mathematics ,mathematical proof ,explanation in mathematics ,explanatory proofs ,mathematical intuition ,Philosophy (General) ,B1-5802 - Abstract
In the article, I present two possible points of view concerning mathematical proofs: (a) the formal view (according to which the formalized versions of mathematical proofs reveal their “essence”); (b) the semantic view (according to which mathematical proofs are sequences of intellectual acts, and a form of intuitive “grasp” is crucial). The problem of formalizability of mathematical proofs is discussed, as well as the problem of explanation in mathematics – in particular the problem of explanatory versus non-explanatory character of mathematical proofs. I argue, that this problem can be analyzed in a fruitful way only from the semantic point of view.
- Published
- 2015
250. Set characterizations and convex extensions for geometric convex-hull proofs
- Author
-
Andreas Bärmann, Oskar Schneider, and Publica
- Subjects
Convex hull ,General Mathematics ,Regular polygon ,Extension (predicate logic) ,Mathematical proof ,Algebra ,Set (abstract data type) ,Polyhedron ,90C57, 52B05, 90C10, 90C27, 90C25 ,Optimization and Control (math.OC) ,Completeness (order theory) ,TheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITY ,FOS: Mathematics ,Algebraic number ,ddc:510 ,Mathematics - Optimization and Control ,Software ,Mathematics - Abstract
In the present work, we consider Zuckerberg's method for geometric convex-hull proofs introduced in [Geometric proofs for convex hull defining formulations, Operations Research Letters 44(5), 625-629 (2016)]. It has only been scarcely adopted in the literature so far, despite the great flexibility in designing algorithmic proofs for the completeness of polyhedral descriptions that it offers. We suspect that this is partly due to the rather heavy algebraic framework its original statement entails. This is why we present a much more lightweight and accessible approach to Zuckerberg's proof technique, building on ideas from [Extended formulations for convex hulls of some bilinear functions, Discrete Optimization 36, 100569 (2020)]. We introduce the concept of set characterizations to replace the set-theoretic expressions needed in the original version and to facilitate the construction of algorithmic proof schemes. Along with this, we develop several different strategies to conduct Zuckerberg-type convex-hull proofs. Very importantly, we also show that our concept allows for a significant extension of Zuckerberg's proof technique. While the original method was only applicable to 0/1-polytopes, our extended framework allows to treat arbitrary polyhedra and even general convex sets. We demonstrate this increase in expressive power by characterizing the convex hull of Boolean and bilinear functions over polytopal domains. All results are illustrated with indicative examples to underline the practical usefulness and wide applicability of our framework.
- Published
- 2022
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.