Abstract
Practical methods are proposed to solve linear constraints over real and rational fields with quantifiers. Secondary problems are observed together with the set of possible solutions in the context of automatic software model verification.
Similar content being viewed by others
References
http://coq.inria.fr/V8.1pl4/refman/Reference-Manual022.html.
http://en.wikipedia.org/wiki/Fourier%E2%80%93Motzkin_elimination
G. E. Collins, “Quantifier elimination by cylindrical algebraic decomposition — twenty years of progress,” in: B. F. Caviness and J. R. Johnson (eds.), Quantifier Elimination and Cylindrical Algebraic Decomposition, Springer–Verlag, New York (1998), pp. 8–23.
G. Badros, A. Borning, and P. Stuckey, “The Cassowary linear arithmetic constraint solving algorithm,” ACM Trans. on Computer-Human Interaction (TOCHI), 8(4), 267–306 (2001).
http://research.microsoft.com/en-us/um/redmond/projects/z3/index.html.
J.-L. Lassez, “Querying constraints,” in: Proc. ACM Conf. on Principles of Database Systems (ACM 089791-352-3/90/0004/0288), Nashville (1990).
B. C. Eaves and U. G. Rothblum, “Dines–Fourier–Motzkin quantifier elimination and an application of corresponding transfer principles over ordered fields,” Math. Program., 53, No. 3, 307–321 (1992).
T. Huynh, L. Joskowicz, C. Lassez, and J. Lassez, “Practical tools for reasoning about linear constraints,” Fundam. Inf., 3–4, 357–380 (1991).
C. Lassez and J.-L. Lassez, Quantifier Elimination for Conjunctions of Linear Constraint via a Convex Hull Algorithm: Techn. Rep., IBM T. J. Watson / Research Center, Yorktown Heights (1991).
J. L. Lassez and K. McAloon, “A canonical form of generalized linear constraints,” J. Symbolic Comput., 33, 147–160 (1992).
J.-L. Imbert, “Variable elimination for disequations in generalised liner constraint systems,” The Computer J., 36, No. 5 (1993).
Boost Libraries, www.boost.org
W. Pugh and D. Wonnacott, “Going beyond integer programming with the omega test to eliminate false data dependences,” IEEE Trans. on Parallel and Distributed Systems, 6, No. 2, 204–211 (1995).
N. Bshouty, “A subexponential exact learning algorithm for DNF using equivalence queries,” Information Processing Letters, 59, 37–39 (1996).
J. Tarui and T. Tsukiji, “Learning DNF by approximating inclusion-exclusion formulae,” in: Proc. IEEE Conf. on Comput. Complexity (1999), pp. 215–220.
A. R. Klivans and R. A. Servedio, “Learning DNF in time \( 2{O^{\left( {{n^{{{1} \left/ {3} \right.}}}} \right)}} \),” J. Comput. Syst. Sci., 68(2), 303–318 (2004).
A. B. Godlevsky and S. N. Svirgunenko, “Using linear models in optimizing parameters of time-triggered protocols,” Cybern. Syst. Analysis, 42, No. 3, 328–334 (2006).
http://www.risc.uni-linz.ac.at/projects/intas/Timisoara/Presentations/German/German.pdf.
Author information
Authors and Affiliations
Corresponding author
Additional information
Translated from Kibernetika i Sistemnyi Analiz, No. 4, pp. 123–133, July–August 2010.
Rights and permissions
About this article
Cite this article
German, V.N. Solving linear constraints over real and rational fields. Cybern Syst Anal 46, 630–638 (2010). https://doi.org/10.1007/s10559-010-9239-5
Received:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10559-010-9239-5