Algorithm and tools for constructing canonical forms of linear semi-algebraic formulas. (English. Russian original) Zbl 07044071

Cybern. Syst. Anal. 54, No. 6, 993-1002 (2018); translation from Kibern. Sist. Anal. 2018, No. 6, 159-169 (2018).
Summary: The results of testing formula simplification tools are presented in the first part of this paper. In the second part, an algorithm for constructing canonical forms of linear semi-algebraic formulas is described. The main result of the study is the definition of the canonical form of a linear semi-algebraic formula that has the property of uniqueness and other useful properties. An algorithm for constructing such a formula is described.


68W30 Symbolic computation and algebraic computation
Full Text: DOI


[1] CVC4. URL: http://cvc4.cs.stanford.edu/web/.
[2] Cimatti, Alessandro; Griggio, Alberto; Schaafsma, Bastiaan Joost; Sebastiani, Roberto, The MathSAT5 SMT Solver, 93-107, (2013), Berlin, Heidelberg · Zbl 1381.68153
[3] QEPCAD. URL: https://www.usna.edu/CS/qepcadweb/B/WhatisQEPCAD.html.
[4] Singular. URL: https://www.singular.uni-kl.de/.
[5] COCOA. URL: http://cocoa.dima.unige.it/.
[6] MiniZinc. URL: http://www.minizinc.org/.
[7] STP constraint solver. URL: http://stp.github.io/.
[8] Redlog — Computing with logic. URL: http://www.redlog.eu/.
[9] Satallax. URL: http://www.ps.uni-saarland.de/ cebrown/satallax/.
[10] Isabelle. URL: https://isabelle.in.tum.de/.
[11] E-SETHEO. URL: http://www4.informatik.tu-muenchen.de/ schulz/WORK/e-setheo.html.
[12] MiniSat. URL: http://minisat.se/.
[13] SMTInterpol an interpolating SMT solver. URL: http://ultimate.informatik.uni-freiburg.de/smtinterpol/.
[14] Paradox (theorem-prover). URL: https://wikivisually.com/wiki/Paradox_
[15] Gandalf. URL: http://deepthought.ttu.ee/it/gandalf/.
[16] Vampire. URL: http://www.vprover.org/download.cgi.
[17] QEPCAD — The solution formula construction phase. URL: https://www.usna.edu/CS/qepcadweb/B/user/Solution.html.
[18] The E theorem prover. URL: http://wwwlehre.dhbw-stuttgart.de/ sschulz/E/E.html.
[19] iProver. URL: http://www.cs.man.ac.uk/ korovink/iprover/.
[20] LEO-II. URL: http://page.mi.fu-berlin.de/cbenzmueller/leo/.
[21] Z3Prover. URL: https://github.com/Z3Prover/z3.
[22] F. Preparata and M. Shamos, Computational Geometry: An Introduction [Russian translation], Mir, Moscow (1989). · Zbl 0744.68131
[23] M. Laszlo, Computational Geometry and Computer Graphics in C ++ [Russian translation], Binom, Moscow (1997).
[24] A. S. Solodovnikov, Systems of Linear Inequalities [in Russian], Nauka, Moscow (1997).
[25] T. S. Motzkin, H. Raiffa, G. L. Thompson, and R. M. Thrall, “The double description method,” in: Matrix Games, Fizmatgiz, Moscow (1961), pp. 81-109.
[26] S. N. Chernikov, Linear Inequalities [in Russian], Nauka, Moscow (1968).
[27] Lvov, MS, Algebraic approach to the problem of solving systems of linear inequalities, Cybernetics and Systems Analysis, 46, 326-338, (2010) · Zbl 1204.68067
[28] Lvov, MS; Peschanenko, VS, Trapezoid Method for Solving Systems of Linear Inequalities and Its Implementation, Cybernetics and Systems Analysis, 48, 931-942, (2012) · Zbl 1323.68614
[29] J. Goguen and J. Meseguer, Ordered-Sorted Algebra I: Partial and Overloaded Operations, Errors and Inheritance, Computer Science Lab., SRI International, Vol. 105, No. 2, 217-273 (1987). · Zbl 0778.68056
[30] J. A. Goguen, J. W. Thatcher, and E. G. Wagner, “An initial algebra approach to the specification, correctness and implementation of abstract data types,” in: IBM Res. Rep. RC6487, Vol. 156, Yorktown Heights (1976), pp. 80-149.
[31] M. S. Lvov, “Synthesis of interpreters of algebraic operations in extensions of multisorted algebra,” The Journal of Kharkiv National University, No. 847, 221-238 (2009).
[32] The Economic Impacts of Inadequate Infrastructure for Software Testing. NIST Report. May 2002. URL: http://www.nist.gov/director/prog-ofc/report02-3.pdf.
[33] Sagdeev, RZ; Zakharov, AV, Brief history of the Phobos mission, Nature, 341, 581-585, (1989)
[34] G. N. Lewis, S. Fetter, and L. Gronlund, Casualties and Damage from Scud Attacks in the 1991 Gulf War, Defense and Arms Control Studies Program, Massachusetts Institute of Technology, Cambridge, MA (1993).
This reference list is based on information provided by the publisher or from digital mathematics libraries. Its items are heuristically matched to zbMATH identifiers and may contain data conversion errors. It attempts to reflect the references listed in the original paper as accurately as possible without claiming the completeness or perfect precision of the matching.