首页 > 最新文献

[Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science最新文献

英文 中文
New algorithms for finding irreducible polynomials over finite fields 有限域上求不可约多项式的新算法
Pub Date : 1988-10-24 DOI: 10.1109/SFCS.1988.21944
V. Shoup
An algorithm is presented for finding an irreducible polynomial of specified degree over a finite field. It is deterministic and runs in polynomial time for fields of small characteristics. A proof is given of the stronger result, that the problem of finding irreducible polynomials of specified degree over a finite field K is deterministic-polynomial-time reducible to the problem of factoring polynomials over the prime field of K.<>
给出了一种求有限域上一定次的不可约多项式的算法。它是确定性的,并且在多项式时间内运行小特征域。证明了在有限域K上求一定次的不可约多项式的问题在确定多项式时间上可约为在K的素域上分解多项式的问题
{"title":"New algorithms for finding irreducible polynomials over finite fields","authors":"V. Shoup","doi":"10.1109/SFCS.1988.21944","DOIUrl":"https://doi.org/10.1109/SFCS.1988.21944","url":null,"abstract":"An algorithm is presented for finding an irreducible polynomial of specified degree over a finite field. It is deterministic and runs in polynomial time for fields of small characteristics. A proof is given of the stronger result, that the problem of finding irreducible polynomials of specified degree over a finite field K is deterministic-polynomial-time reducible to the problem of factoring polynomials over the prime field of K.<<ETX>>","PeriodicalId":113255,"journal":{"name":"[Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129338280","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 223
Nonexpressibility of fairness and signaling 公平性和信令的不可表达性
Pub Date : 1988-10-24 DOI: 10.1109/SFCS.1988.21954
David A. McAllester, P. Panangaden, Vasant Shanbhogue
Expressiveness results for indeterminate data flow primitives are established. Choice primitives with three differing fairness assumptions are considered, and it is shown that they are strictly inequivalent in expressive power. It is also shown that the ability to announce choices enhances the expressive power of two of the primitives. These results are proved using a very crude semantics and will thus apply in any reasonable theory of process equivalence.<>
建立了不确定数据流原语的表达性结果。考虑了具有三种不同公平假设的选择原语,并证明了它们在表达能力上是严格不相等的。它还表明,宣布选择的能力增强了两个原语的表达能力。这些结果是用非常粗糙的语义证明的,因此将适用于任何合理的过程等价理论。
{"title":"Nonexpressibility of fairness and signaling","authors":"David A. McAllester, P. Panangaden, Vasant Shanbhogue","doi":"10.1109/SFCS.1988.21954","DOIUrl":"https://doi.org/10.1109/SFCS.1988.21954","url":null,"abstract":"Expressiveness results for indeterminate data flow primitives are established. Choice primitives with three differing fairness assumptions are considered, and it is shown that they are strictly inequivalent in expressive power. It is also shown that the ability to announce choices enhances the expressive power of two of the primitives. These results are proved using a very crude semantics and will thus apply in any reasonable theory of process equivalence.<<ETX>>","PeriodicalId":113255,"journal":{"name":"[Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131103962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
New upper bounds in Klee's measure problem Klee测度问题的新上界
Pub Date : 1988-10-24 DOI: 10.1109/SFCS.1988.21971
M. Overmars, C. Yap
New upper bounds are given for the measure problem of V. Klee (1977) that significantly improve the previous bounds for dimensions greater than 2. An O(n/sup d/2/ log n, n) time-space upper bound to compute the measure of a set of n boxes in Euclidean d-space is obtained. The solution requires several novel ideas including application of the inclusion/exclusion principle, the concept of trellises, streaming, and a partition of d-space.<>
对于V. Klee(1977)的测度问题,给出了新的上界,显著改进了先前的大于2维的上界。得到了一个O(n/sup / d/2/ log n, n)的时空上界,用于计算欧几里得d空间中n个盒子的测度。这个解决方案需要一些新颖的想法,包括包含/排除原则的应用、网格的概念、流和d空间的划分
{"title":"New upper bounds in Klee's measure problem","authors":"M. Overmars, C. Yap","doi":"10.1109/SFCS.1988.21971","DOIUrl":"https://doi.org/10.1109/SFCS.1988.21971","url":null,"abstract":"New upper bounds are given for the measure problem of V. Klee (1977) that significantly improve the previous bounds for dimensions greater than 2. An O(n/sup d/2/ log n, n) time-space upper bound to compute the measure of a set of n boxes in Euclidean d-space is obtained. The solution requires several novel ideas including application of the inclusion/exclusion principle, the concept of trellises, streaming, and a partition of d-space.<<ETX>>","PeriodicalId":113255,"journal":{"name":"[Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115510521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 161
Verifying temporal properties of finite-state probabilistic programs 验证有限状态概率程序的时间特性
Pub Date : 1988-10-24 DOI: 10.1109/SFCS.1988.21950
C. Courcoubetis, M. Yannakakis
The complexity of testing whether a finite-state (sequential or concurrent) probabilistic program satisfies its specification expressed in linear temporal logic. For sequential programs an exponential-time algorithm is given and it is shown that the problem is in PSPACE; this improves the previous upper bound by two exponentials and matches the known lower bound. For concurrent programs is is shown that the problem is complete in double exponential time, improving the previous upper and lower bounds by one exponential each. These questions are also addressed for specifications described by omega -automata or formulas in extended temporal logic.<>
测试有限状态(顺序或并发)概率程序是否满足线性时间逻辑表示的规范的复杂性。对于顺序程序,给出了一个指数时间算法,并证明了该问题是在PSPACE中;这将之前的上界改进了两个指数,并与已知的下界匹配。对于并发程序,证明了问题在双指数时间内完成,将上下界分别提高了一个指数。这些问题也解决了规范描述的-自动机或公式在扩展时间逻辑。
{"title":"Verifying temporal properties of finite-state probabilistic programs","authors":"C. Courcoubetis, M. Yannakakis","doi":"10.1109/SFCS.1988.21950","DOIUrl":"https://doi.org/10.1109/SFCS.1988.21950","url":null,"abstract":"The complexity of testing whether a finite-state (sequential or concurrent) probabilistic program satisfies its specification expressed in linear temporal logic. For sequential programs an exponential-time algorithm is given and it is shown that the problem is in PSPACE; this improves the previous upper bound by two exponentials and matches the known lower bound. For concurrent programs is is shown that the problem is complete in double exponential time, improving the previous upper and lower bounds by one exponential each. These questions are also addressed for specifications described by omega -automata or formulas in extended temporal logic.<<ETX>>","PeriodicalId":113255,"journal":{"name":"[Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121281588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 139
On the effects of feedback in dynamic network protocols 反馈在动态网络协议中的作用
Pub Date : 1988-10-24 DOI: 10.1109/SFCS.1988.21940
B. Awerbuch
A framework is introduced that provides a unified way for proving correctness as well as analyzing performance of a class of communication protocols called (asynchronous) reset protocols. They are logarithmic transformers, converting protocols working in a static asynchronous network into protocols working in a dynamic asynchronous network. The design of reset protocols is a classical problem in communication networking, renowned for its complexity. A paradigm is developed that gives fresh insight into this complicated problem. This additional insight leads to the development of reset protocols with complexities bounded by the communication complexity of the original protocol.<>
介绍了一个框架,该框架提供了一种统一的方法来证明被称为(异步)重置协议的一类通信协议的正确性和分析性能。它们是对数转换器,将在静态异步网络中工作的协议转换为在动态异步网络中工作的协议。重置协议的设计是通信网络中的一个经典问题,其复杂性是众所周知的。一个范例被开发出来,为这个复杂的问题提供了新的见解。这种额外的洞察力导致了重置协议的发展,其复杂性受到原始协议的通信复杂性的限制。
{"title":"On the effects of feedback in dynamic network protocols","authors":"B. Awerbuch","doi":"10.1109/SFCS.1988.21940","DOIUrl":"https://doi.org/10.1109/SFCS.1988.21940","url":null,"abstract":"A framework is introduced that provides a unified way for proving correctness as well as analyzing performance of a class of communication protocols called (asynchronous) reset protocols. They are logarithmic transformers, converting protocols working in a static asynchronous network into protocols working in a dynamic asynchronous network. The design of reset protocols is a classical problem in communication networking, renowned for its complexity. A paradigm is developed that gives fresh insight into this complicated problem. This additional insight leads to the development of reset protocols with complexities bounded by the communication complexity of the original protocol.<<ETX>>","PeriodicalId":113255,"journal":{"name":"[Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123374956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Achieving oblivious transfer using weakened security assumptions 使用弱化的安全假设实现无关转移
Pub Date : 1988-10-24 DOI: 10.1109/SFCS.1988.21920
C. Crépeau, J. Kilian
The authors present some general techniques for establishing the cryptographic strength of a wide variety of games. As case studies, they analyze some weakened versions of the standard forms of oblivious transfer. They also consider variants of oblivious transfer that are motivated by coding theory and physics. Among their results, they show that a noisy telephone line is in fact a very sophisticated cryptographic device. They also present an application to quantum cryptography.<>
作者提出了一些建立各种游戏的密码强度的一般技术。作为案例研究,他们分析了无意识迁移标准形式的一些弱化版本。他们还考虑了由编码理论和物理学驱动的遗忘迁移的变体。他们的研究结果表明,嘈杂的电话线实际上是一种非常复杂的加密设备。他们还提出了量子密码学的应用。
{"title":"Achieving oblivious transfer using weakened security assumptions","authors":"C. Crépeau, J. Kilian","doi":"10.1109/SFCS.1988.21920","DOIUrl":"https://doi.org/10.1109/SFCS.1988.21920","url":null,"abstract":"The authors present some general techniques for establishing the cryptographic strength of a wide variety of games. As case studies, they analyze some weakened versions of the standard forms of oblivious transfer. They also consider variants of oblivious transfer that are motivated by coding theory and physics. Among their results, they show that a noisy telephone line is in fact a very sophisticated cryptographic device. They also present an application to quantum cryptography.<<ETX>>","PeriodicalId":113255,"journal":{"name":"[Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122588395","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 270
Take a walk, grow a tree 散散步,种棵树
Pub Date : 1988-10-24 DOI: 10.1109/SFCS.1988.21963
S. Bhatt, Jin-Yi Cai
A simple randomized algorithm is presented for maintaining dynamically evolving binary trees on hypercube networks. The algorithm guarantees that: (1) nodes adjacent in the tree are within distance O(log log N) in an N-processor hypercube, and (2) with overwhelming probability, no hypercube processor is assigned more than O(1+M/N) tree nodes, where M is the number of nodes in the tree. The algorithm is distributed and does not require any global information. This is the first load-balancing algorithm with provably good performance. The algorithm can be used to parallelize efficiently any tree-based computation. It can also be used to maintain efficiently dynamic data structures such as quadtrees. A technique called tree surgery is introduced to deal with dependencies inherent in trees. Together with tree surgery, the study of random walks is used to analyze the algorithm.<>
提出了一种简单的维护超立方体网络上动态演化二叉树的随机化算法。该算法保证:(1)在N个处理器的超立方体中,树中相邻节点的距离在O(log log N)以内;(2)在压倒性概率下,没有一个超立方体处理器被分配超过O(1+M/N)个树节点,其中M为树中的节点数。该算法是分布式的,不需要任何全局信息。这是第一个具有良好性能的负载平衡算法。该算法可以有效地并行化任何基于树的计算。它还可以用于有效地维护动态数据结构,如四叉树。引入了一种称为树手术的技术来处理树中固有的依赖关系。结合树形手术,对随机游走进行了研究。
{"title":"Take a walk, grow a tree","authors":"S. Bhatt, Jin-Yi Cai","doi":"10.1109/SFCS.1988.21963","DOIUrl":"https://doi.org/10.1109/SFCS.1988.21963","url":null,"abstract":"A simple randomized algorithm is presented for maintaining dynamically evolving binary trees on hypercube networks. The algorithm guarantees that: (1) nodes adjacent in the tree are within distance O(log log N) in an N-processor hypercube, and (2) with overwhelming probability, no hypercube processor is assigned more than O(1+M/N) tree nodes, where M is the number of nodes in the tree. The algorithm is distributed and does not require any global information. This is the first load-balancing algorithm with provably good performance. The algorithm can be used to parallelize efficiently any tree-based computation. It can also be used to maintain efficiently dynamic data structures such as quadtrees. A technique called tree surgery is introduced to deal with dependencies inherent in trees. Together with tree surgery, the study of random walks is used to analyze the algorithm.<<ETX>>","PeriodicalId":113255,"journal":{"name":"[Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124786833","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 43
Removing randomness in parallel computation without a processor penalty 消除并行计算中的随机性,而不损害处理器
Pub Date : 1988-10-24 DOI: 10.1109/SFCS.1988.21934
M. Luby
Some general techniques are developed for removing randomness from randomized NC algorithms without a blowup in the number of processors. One of the requirements for the application of these techniques is that the analysis of the randomized algorithm uses only pairwise independence. The main new result is a parallel algorithm for the Delta +1 vertex coloring problem with running time O(log/sup 3/ nlog log n) using a linear number of processors on a concurrent-read-concurrent-write parallel random-access machine. The techniques also apply to several other problems, including the maximal-independent-set problem and the maximal-matching problem. The application of the general technique to these last two problems is mostly of academic interest, because NC algorithms using a linear number of processors that have better running times have been previously found.<>
在不增加处理器数量的情况下,开发了一些通用技术来消除随机NC算法中的随机性。应用这些技术的一个要求是,随机算法的分析只使用成对独立。主要的新结果是一个并行算法,用于Delta +1顶点着色问题,运行时间为O(log/sup 3/ nlog log n),在并发读并发写并行随机访问机上使用线性数量的处理器。这些技术也适用于其他几个问题,包括最大独立集问题和最大匹配问题。将一般技术应用于最后两个问题主要是学术兴趣,因为使用线性数量处理器的NC算法已经发现具有更好的运行时间。
{"title":"Removing randomness in parallel computation without a processor penalty","authors":"M. Luby","doi":"10.1109/SFCS.1988.21934","DOIUrl":"https://doi.org/10.1109/SFCS.1988.21934","url":null,"abstract":"Some general techniques are developed for removing randomness from randomized NC algorithms without a blowup in the number of processors. One of the requirements for the application of these techniques is that the analysis of the randomized algorithm uses only pairwise independence. The main new result is a parallel algorithm for the Delta +1 vertex coloring problem with running time O(log/sup 3/ nlog log n) using a linear number of processors on a concurrent-read-concurrent-write parallel random-access machine. The techniques also apply to several other problems, including the maximal-independent-set problem and the maximal-matching problem. The application of the general technique to these last two problems is mostly of academic interest, because NC algorithms using a linear number of processors that have better running times have been previously found.<<ETX>>","PeriodicalId":113255,"journal":{"name":"[Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127332345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 209
An approximate max-flow min-cut theorem for uniform multicommodity flow problems with applications to approximation algorithms 一致多商品流问题的近似最大流最小割定理及其在近似算法中的应用
Pub Date : 1988-10-24 DOI: 10.1109/SFCS.1988.21958
F. Leighton, Satish Rao
A multicommodity flow problem is considered where for each pair of vertices (u, v) it is required to send f half-units of commodity (u, v) from u to v and f half-units of commodity (v, u) from v to u without violating capacity constraints. The main result is an algorithm for performing the task provided that the capacity of each cut exceeds the demand across the cut by a Theta (log n) factor. The condition on cuts is required in the worst case, and is trivially within a Theta (log n) factor of optimal for any flow problem. The result can be used to construct the first polylog-times optimal approximation algorithms for a wide variety of problems, including minimum quotient separators, 1/3-2/3 separators, bifurcators, crossing number, and VLSI layout area. It can also be used to route packets efficiently in arbitrary distributed networks.<>
考虑了一个多商品流问题,其中对于每对顶点(u, v),要求在不违反容量约束的情况下,将f个半单位商品(u, v)从u发送到v,并将f个半单位商品(v, u)从v发送到u。主要结果是一个执行任务的算法,前提是每个切口的容量超过整个切口的需求一个Theta (log n)因子。在最坏的情况下,切割条件是必需的,并且对于任何流问题,切割条件通常在Theta (log n)的最优因子范围内。该结果可用于构建各种问题的第一个多倍最优逼近算法,包括最小商分隔符,1/3-2/3分隔符,分岔,交叉数和VLSI布局面积。它还可以用于在任意分布式网络中有效地路由数据包。
{"title":"An approximate max-flow min-cut theorem for uniform multicommodity flow problems with applications to approximation algorithms","authors":"F. Leighton, Satish Rao","doi":"10.1109/SFCS.1988.21958","DOIUrl":"https://doi.org/10.1109/SFCS.1988.21958","url":null,"abstract":"A multicommodity flow problem is considered where for each pair of vertices (u, v) it is required to send f half-units of commodity (u, v) from u to v and f half-units of commodity (v, u) from v to u without violating capacity constraints. The main result is an algorithm for performing the task provided that the capacity of each cut exceeds the demand across the cut by a Theta (log n) factor. The condition on cuts is required in the worst case, and is trivially within a Theta (log n) factor of optimal for any flow problem. The result can be used to construct the first polylog-times optimal approximation algorithms for a wide variety of problems, including minimum quotient separators, 1/3-2/3 separators, bifurcators, crossing number, and VLSI layout area. It can also be used to route packets efficiently in arbitrary distributed networks.<<ETX>>","PeriodicalId":113255,"journal":{"name":"[Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125963933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 515
On the complexity of omega -automata 关于自动机的复杂度
Pub Date : 1988-10-24 DOI: 10.1109/SFCS.1988.21948
S. Safra
Automata on infinite words were introduced by J.R. Buchi (1962) in order to give a decision procedure for S1S, the monadic second-order theory of one successor. D.E. Muller (1963) suggested deterministic omega -automata as a means of describing the behavior of nonstabilising circuits. R. McNaughton (1966) proved that classes of languages accepted by nondeterministic Buchi automata and by deterministic Muller automata are the same. His construction and its proof are quite complicated, and the blow-up of the construction is double exponential. The author presents a determinisation construction that is simpler and yields a single exponent upper bound for the general case. This construction is essentially optimal. It can also be used to obtain an improved complementation construction for Buchi automata that is also optimal. Both constructions can be used to improve the complexity of decision procedures that use automata-theoretic techniques.<>
J.R. Buchi(1962)引入了无限词上的自动机,给出了一后继一元二阶理论S1S的决策过程。D.E. Muller(1963)建议用确定性的欧米茄自动机来描述非稳定电路的行为。R. McNaughton(1966)证明了非确定性Buchi自动机和确定性Muller自动机所接受的语言类别是相同的。他的构造和证明相当复杂,构造的膨胀是双指数的。作者提出了一种更简单的确定结构,并对一般情况给出了单指数上界。这种结构本质上是最优的。该方法还可用于获得同样最优的布吉自动机的改进互补结构。这两种结构都可以用来提高使用自动机理论技术的决策过程的复杂性
{"title":"On the complexity of omega -automata","authors":"S. Safra","doi":"10.1109/SFCS.1988.21948","DOIUrl":"https://doi.org/10.1109/SFCS.1988.21948","url":null,"abstract":"Automata on infinite words were introduced by J.R. Buchi (1962) in order to give a decision procedure for S1S, the monadic second-order theory of one successor. D.E. Muller (1963) suggested deterministic omega -automata as a means of describing the behavior of nonstabilising circuits. R. McNaughton (1966) proved that classes of languages accepted by nondeterministic Buchi automata and by deterministic Muller automata are the same. His construction and its proof are quite complicated, and the blow-up of the construction is double exponential. The author presents a determinisation construction that is simpler and yields a single exponent upper bound for the general case. This construction is essentially optimal. It can also be used to obtain an improved complementation construction for Buchi automata that is also optimal. Both constructions can be used to improve the complexity of decision procedures that use automata-theoretic techniques.<<ETX>>","PeriodicalId":113255,"journal":{"name":"[Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1988-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128044011","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 483
期刊
[Proceedings 1988] 29th Annual Symposium on Foundations of Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1