CSE 311: Foundations of Computing announcements Fall 2013 Reading - - PowerPoint PPT Presentation

cse 311 foundations of computing announcements
SMART_READER_LITE
LIVE PREVIEW

CSE 311: Foundations of Computing announcements Fall 2013 Reading - - PowerPoint PPT Presentation

CSE 311: Foundations of Computing announcements Fall 2013 Reading assignment Lecture 9: Set theory and functions Set theory 2.1-2.3 (both editions) set theory definition: a set is an unordered collection of objects : x is an


slide-1
SLIDE 1

CSE 311: Foundations of Computing

Fall 2013 Lecture 9: Set theory and functions

announcements

Reading assignment Set theory

2.1-2.3 (both editions)

set theory

  • Formal treatment dates from late 19th century
  • Direct ties between set theory and logic
  • Important foundational language

definition: a set is an unordered collection of objects

∈ : “x is an element of A” “x is a member of A” “x is in A” ∉ : ¬ ( ∈ )

= { 1, 2, 7, cat, dog, , } cat ∈ fish ∉

slide-2
SLIDE 2

definitions

  • A and B are equal if they have the same elements
  • A is a subset of B if every element of A is also in B

A = B ≡ ∀ x (x ∈ A ↔ x ∈ B) A ⊆ B ≡ ∀ x (x ∈ A → x ∈ B) empty set and power set

  • Empty set ∅ does not contain any elements
  • Power set of a set A = set of all subsets of A

= { ∶ ⊆ } cartesian product set operations ∪ = { ∶ ∈ ∨ ∈ } ∩ = { ∶ ∈ ∧ ∈ } ⊕ = { ∶ ∈ ⊕ ∈ } − = { ∶ ∈ ∧ ∉ }

  • $ = ∶ ∉

(with respect to universe U)

union intersection set difference symmetric difference complement

slide-3
SLIDE 3

it’s Boolean algebra again

  • Definition for ∪

∪ ∪ ∪ based on ∨ ∨ ∨ ∨

  • Definition for ∩

∩ ∩ ∩ based on ∧ ∧ ∧ ∧

  • Complement works like ¬

De Morgan’s Laws

Proof technique: To show C = D show x ∈ C → x ∈ D and x ∈ D → x ∈ C

∪ = ̅ ∩ & ∩ = ̅ ∪ & distributive laws

∩ ∪ ' = ∩ ∪ ∩ ' ∪ ∩ ' = ∪ ∩ ∪ '

C A B C A B representing sets using bits

  • Suppose universe ( is {1,2, … , *}
  • Can represent set ⊆ ( as a vector of bits:

+,+- … +. where +/ = 1 when 0 ∈ +/ = 0 when 0 ∉ – Called the characteristic vector of set B

  • Given characteristic vectors for and

– What is characteristic vector for ∪ ? ∩ ?

slide-4
SLIDE 4

bitwise operations on vectors

01101101 Java: z=x|y ∨ ∨ ∨ ∨ 00110111 01111111 00101010 Java: z=x&y ∧ ∧ ∧ ∧ 00001111 00001010 01101101 Java: z=x^y ⊕ ⊕ ⊕ ⊕ 00110111 01011010

a simple identity

  • If x and y are bits: (x ⊕ y) ⊕ y = ?
  • What if x and y are bit-vectors?

private key cryptography

  • Alice

Alice Alice Alice wants to communicate message secretly to Bob Bob Bob Bob so that eavesdropper Eve Eve Eve Eve who hears their conversation cannot tell what Alice Alice Alice Alice’s message is.

  • Alice

Alice Alice Alice and Bob Bob Bob Bob can get together and privately share a secret key K ahead of time.

  • ne-time pad
  • Alice and Bob privately share random n-bit vector K

– Eve does not know K

  • Later, Alice has n-bit message m to send to Bob

– Alice computes C = m ⊕ K – Alice sends C to Bob – Bob computes m = C ⊕ K which is (m ⊕ K) ⊕ K

  • Eve cannot figure out m from C unless she can

guess K

slide-5
SLIDE 5

unix/linux file permissions

  • ls –l

drwxr-xr-x ... Documents/

  • rw-r--r-- ... file1
  • Permissions maintained as bit vectors

– Letter means bit is 1 – “--” means bit is 0.

russell’s paradox functions review

  • A function from 2 to 3
  • an assignment of exactly one element of 3

to each element of 2.

  • We write 4 ∶ 2 → 3.
  • “Image of a” = 4(7)
  • Domain of 4: 2
  • Range of 4 = set of all images of elements of 2

image, preimage

a b c d e 1 2 3 4

slide-6
SLIDE 6

is this a function? one-to-one? onto?

a b c d e 1 2 3 4 5 6