Wojciech Czerwiński , Maciej Dębski , Tomasz Gogasz , Gordon Hoi , Sanjay Jain , Michał Skrzypczak , Frank Stephan , Christopher Tan
{"title":"Languages given by finite automata over the unary alphabet","authors":"Wojciech Czerwiński , Maciej Dębski , Tomasz Gogasz , Gordon Hoi , Sanjay Jain , Michał Skrzypczak , Frank Stephan , Christopher Tan","doi":"10.1016/j.jcss.2025.103634","DOIUrl":null,"url":null,"abstract":"<div><div>This paper studies the complexity of operations on finite automata and the complexity of their decision problems when the alphabet is unary. Let <em>n</em> denote the number of states of the input automata considered. The following main results are obtained:</div><div>(1) Equality and inclusion of NFAs can be decided within time <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>O</mi><mo>(</mo><msup><mrow><mo>(</mo><mi>n</mi><mi>log</mi><mo></mo><mi>n</mi><mo>)</mo></mrow><mrow><mn>1</mn><mo>/</mo><mn>3</mn></mrow></msup><mo>)</mo></mrow></msup></math></span>. The previous upper bound <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>O</mi><mo>(</mo><msup><mrow><mo>(</mo><mi>n</mi><mi>log</mi><mo></mo><mi>n</mi><mo>)</mo></mrow><mrow><mn>1</mn><mo>/</mo><mn>2</mn></mrow></msup><mo>)</mo></mrow></msup></math></span> was by Chrobak (1986).</div><div>(2) One can determine a UFA (unambiguous finite automata) for complement of another UFA or union of two UFAs using at most quasipolynomial number of states. However, for concatenation of two <em>n</em>-state UFAs, the worst case is a UFA having <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>Θ</mi><mo>(</mo><msup><mrow><mo>(</mo><mi>n</mi><msup><mrow><mi>log</mi></mrow><mrow><mn>2</mn></mrow></msup><mo></mo><mi>n</mi><mo>)</mo></mrow><mrow><mn>1</mn><mo>/</mo><mn>3</mn></mrow></msup><mo>)</mo></mrow></msup></math></span> states.</div><div>(3) Results when an infinite <em>ω</em>-word given by a UFA or an NFA is a member of a given regular <em>ω</em>-language are obtained.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"151 ","pages":"Article 103634"},"PeriodicalIF":1.1000,"publicationDate":"2025-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Journal of Computer and System Sciences","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0022000025000169","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"BUSINESS, FINANCE","Score":null,"Total":0}
引用次数: 0
Abstract
This paper studies the complexity of operations on finite automata and the complexity of their decision problems when the alphabet is unary. Let n denote the number of states of the input automata considered. The following main results are obtained:
(1) Equality and inclusion of NFAs can be decided within time . The previous upper bound was by Chrobak (1986).
(2) One can determine a UFA (unambiguous finite automata) for complement of another UFA or union of two UFAs using at most quasipolynomial number of states. However, for concatenation of two n-state UFAs, the worst case is a UFA having states.
(3) Results when an infinite ω-word given by a UFA or an NFA is a member of a given regular ω-language are obtained.
期刊介绍:
The Journal of Computer and System Sciences publishes original research papers in computer science and related subjects in system science, with attention to the relevant mathematical theory. Applications-oriented papers may also be accepted and they are expected to contain deep analytic evaluation of the proposed solutions.
Research areas include traditional subjects such as:
• Theory of algorithms and computability
• Formal languages
• Automata theory
Contemporary subjects such as:
• Complexity theory
• Algorithmic Complexity
• Parallel & distributed computing
• Computer networks
• Neural networks
• Computational learning theory
• Database theory & practice
• Computer modeling of complex systems
• Security and Privacy.