首页 > 最新文献

Journal of the ACM (JACM)最新文献

英文 中文
On the Complexity of Hazard-free Circuits 关于无危险电路的复杂性
Pub Date : 2019-08-23 DOI: 10.1145/3320123
Christian Ikenmeyer, Balagopal Komarath, C. Lenzen, Vladimir Lysikov, A. Mokhov, Karteek Sreenivasaiah
The problem of constructing hazard-free Boolean circuits dates back to the 1940s and is an important problem in circuit design. Our main lower-bound result unconditionally shows the existence of functions whose circuit complexity is polynomially bounded while every hazard-free implementation is provably of exponential size. Previous lower bounds on the hazard-free complexity were only valid for depth 2 circuits. The same proof method yields that every subcubic implementation of Boolean matrix multiplication must have hazards. These results follow from a crucial structural insight: Hazard-free complexity is a natural generalization of monotone complexity to all (not necessarily monotone) Boolean functions. Thus, we can apply known monotone complexity lower bounds to find lower bounds on the hazard-free complexity. We also lift these methods from the monotone setting to prove exponential hazard-free complexity lower bounds for non-monotone functions. As our main upper-bound result, we show how to efficiently convert a Boolean circuit into a bounded-bit hazard-free circuit with only a polynomially large blow-up in the number of gates. Previously, the best known method yielded exponentially large circuits in the worst case, so our algorithm gives an exponential improvement. As a side result, we establish the NP-completeness of several hazard detection problems.
构造无危险布尔电路的问题可以追溯到20世纪40年代,是电路设计中的一个重要问题。我们的主要下界结果无条件地证明了电路复杂度是多项式有界的函数的存在性,而每个无害化实现都是指数大小的。之前关于无危险复杂度的下界只对深度为2的电路有效。同样的证明方法得出,布尔矩阵乘法的每一个次立方实现都有危险。这些结果来自于一个关键的结构洞察力:无危险复杂性是单调复杂性对所有(不一定是单调的)布尔函数的自然推广。因此,我们可以应用已知的单调复杂度下界来求无危险复杂度的下界。我们还将这些方法从单调集合中提出来,证明了非单调函数的指数无危险复杂度下界。作为我们的主要上界结果,我们展示了如何有效地将布尔电路转换为有界位无危险电路,仅在门的数量上出现多项式大的爆炸。以前,最著名的方法在最坏的情况下产生指数级的大电路,因此我们的算法给出了指数级的改进。作为附带结果,我们建立了几个危害检测问题的np完备性。
{"title":"On the Complexity of Hazard-free Circuits","authors":"Christian Ikenmeyer, Balagopal Komarath, C. Lenzen, Vladimir Lysikov, A. Mokhov, Karteek Sreenivasaiah","doi":"10.1145/3320123","DOIUrl":"https://doi.org/10.1145/3320123","url":null,"abstract":"The problem of constructing hazard-free Boolean circuits dates back to the 1940s and is an important problem in circuit design. Our main lower-bound result unconditionally shows the existence of functions whose circuit complexity is polynomially bounded while every hazard-free implementation is provably of exponential size. Previous lower bounds on the hazard-free complexity were only valid for depth 2 circuits. The same proof method yields that every subcubic implementation of Boolean matrix multiplication must have hazards. These results follow from a crucial structural insight: Hazard-free complexity is a natural generalization of monotone complexity to all (not necessarily monotone) Boolean functions. Thus, we can apply known monotone complexity lower bounds to find lower bounds on the hazard-free complexity. We also lift these methods from the monotone setting to prove exponential hazard-free complexity lower bounds for non-monotone functions. As our main upper-bound result, we show how to efficiently convert a Boolean circuit into a bounded-bit hazard-free circuit with only a polynomially large blow-up in the number of gates. Previously, the best known method yielded exponentially large circuits in the worst case, so our algorithm gives an exponential improvement. As a side result, we establish the NP-completeness of several hazard detection problems.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79230538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the Parameterized Complexity of Approximating Dominating Set 关于逼近支配集的参数化复杂度
Pub Date : 2019-08-12 DOI: 10.1145/3325116
S. KarthikC., Bundit Laekhanukit, Pasin Manurangsi
We study the parameterized complexity of approximating the k-Dominating Set (DomSet) problem where an integer k and a graph G on n vertices are given as input, and the goal is to find a dominating set of size at most F(k) ⋅ k whenever the graph G has a dominating set of size k. When such an algorithm runs in time T(k) ⋅ poly (n) (i.e., FPT-time) for some computable function T, it is said to be an F(k)-FPT-approximation algorithm for k-DomSet. Whether such an algorithm exists is listed in the seminal book of Downey and Fellows (2013) as one of the “most infamous” open problems in parameterized complexity. This work gives an almost complete answer to this question by showing the non-existence of such an algorithm under W[1] ≠ FPT and further providing tighter running time lower bounds under stronger hypotheses. Specifically, we prove the following for every computable functions T, F and every constant ε > 0: • Assuming W[1] ≠ FPT, there is no F(k)-FPT-approximation algorithm for k-DomSet. • Assuming the Exponential Time Hypothesis (ETH), there is no F(k)-approximation algorithm for k-DomSet that runs in T(k) ⋅ no(k) time. • Assuming the Strong Exponential Time Hypothesis (SETH), for every integer k ≥ 2, there is no F(k)-approximation algorithm for k-DomSet that runs in T(k) ⋅ nk − ε time. • Assuming the k-SUM Hypothesis, for every integer k ≥ 3, there is no F(k)-approximation algorithm for k-DomSet that runs in T(k) ⋅ n⌈ k/2 ⌉ − ε time. Previously, only constant ratio FPT-approximation algorithms were ruled out under sf W[1] ≠ FPT and (log1/4 &minus ε k)-FPT-approximation algorithms were ruled out under ETH [Chen and Lin, FOCS 2016]. Recently, the non-existence of an F(k)-FPT-approximation algorithm for any function F was shown under Gap-ETH [Chalermsook et al., FOCS 2017]. Note that, to the best of our knowledge, no running time lower bound of the form n&delta k for any absolute constant δ > 0 was known before even for any constant factor inapproximation ratio. Our results are obtained by establishing a connection between communication complexity and hardness of approximation, generalizing the ideas from a recent breakthrough work of Abboud et al. [FOCS 2017]. Specifically, we show that to prove hardness of approximation of a certain parameterized variant of the label cover problem, it suffices to devise a specific protocol for a communication problem that depends on which hypothesis we rely on. Each of these communication problems turns out to be either a well-studied problem or a variant of one; this allows us to easily apply known techniques to solve them.
研究了参数化近似k-Dominating集(DomSet)问题的复杂性,整数k和给出图G在n顶点作为输入,目标是找到一组主导的大小最多F (k)⋅k每当图G有一组主导的k大小。当这样的一个算法在时间T (k)⋅聚(n)(例如,FPT-time)对于一些可计算函数T,据说是一个F (k) -FPT-approximation k-DomSet算法。是否存在这样的算法在唐尼和费罗(2013)的开创性著作中被列为参数化复杂性中“最臭名昭著的”开放问题之一。本文给出了在W[1]≠FPT条件下不存在这种算法的基本答案,并在更强的假设条件下提供了更严格的运行时间下界。具体地说,我们证明了对于每一个可计算函数T, F和每一个常数ε > 0:•假设W[1]≠FPT,对于k- domset不存在F(k)-FPT逼近算法。•假设指数时间假设(ETH),对于k- domset,不存在运行在T(k)⋅no(k)时间内的F(k)近似算法。•假设强指数时间假设(SETH),对于每一个k≥2的整数,不存在运行在T(k)⋅nk−ε时间内的k- domset的F(k)逼近算法。•假设k- sum假设,对于每一个整数k≥3,不存在k- domset的F(k)逼近算法在T(k)⋅n (k /2)−ε时间内运行。在此之前,只有在sf W[1]≠FPT条件下排除了常数比FPT近似算法,在ETH条件下排除了(log1/4 & - ε k)-FPT近似算法[Chen and Lin, FOCS 2016]。最近,在Gap-ETH下证明了任何函数F的F(k)- fpt逼近算法不存在[Chalermsook et al., FOCS 2017]。请注意,据我们所知,对于任何δ > 0的绝对常数,甚至对于任何常数不近似比,都没有已知的运行时间n& k的下界。我们的结果是通过建立通信复杂性和近似硬度之间的联系获得的,推广了Abboud等人最近突破性工作的想法[FOCS 2017]。具体地说,我们表明,为了证明标签覆盖问题的某个参数化变体的逼近的硬度,它足以为通信问题设计一个特定的协议,这取决于我们所依赖的假设。这些交流问题中的每一个都被证明要么是一个研究得很好的问题,要么是一个问题的变体;这使得我们可以很容易地应用已知的技术来解决它们。
{"title":"On the Parameterized Complexity of Approximating Dominating Set","authors":"S. KarthikC., Bundit Laekhanukit, Pasin Manurangsi","doi":"10.1145/3325116","DOIUrl":"https://doi.org/10.1145/3325116","url":null,"abstract":"We study the parameterized complexity of approximating the k-Dominating Set (DomSet) problem where an integer k and a graph G on n vertices are given as input, and the goal is to find a dominating set of size at most F(k) ⋅ k whenever the graph G has a dominating set of size k. When such an algorithm runs in time T(k) ⋅ poly (n) (i.e., FPT-time) for some computable function T, it is said to be an F(k)-FPT-approximation algorithm for k-DomSet. Whether such an algorithm exists is listed in the seminal book of Downey and Fellows (2013) as one of the “most infamous” open problems in parameterized complexity. This work gives an almost complete answer to this question by showing the non-existence of such an algorithm under W[1] ≠ FPT and further providing tighter running time lower bounds under stronger hypotheses. Specifically, we prove the following for every computable functions T, F and every constant ε > 0: • Assuming W[1] ≠ FPT, there is no F(k)-FPT-approximation algorithm for k-DomSet. • Assuming the Exponential Time Hypothesis (ETH), there is no F(k)-approximation algorithm for k-DomSet that runs in T(k) ⋅ no(k) time. • Assuming the Strong Exponential Time Hypothesis (SETH), for every integer k ≥ 2, there is no F(k)-approximation algorithm for k-DomSet that runs in T(k) ⋅ nk − ε time. • Assuming the k-SUM Hypothesis, for every integer k ≥ 3, there is no F(k)-approximation algorithm for k-DomSet that runs in T(k) ⋅ n⌈ k/2 ⌉ − ε time. Previously, only constant ratio FPT-approximation algorithms were ruled out under sf W[1] ≠ FPT and (log1/4 &minus ε k)-FPT-approximation algorithms were ruled out under ETH [Chen and Lin, FOCS 2016]. Recently, the non-existence of an F(k)-FPT-approximation algorithm for any function F was shown under Gap-ETH [Chalermsook et al., FOCS 2017]. Note that, to the best of our knowledge, no running time lower bound of the form n&delta k for any absolute constant δ > 0 was known before even for any constant factor inapproximation ratio. Our results are obtained by establishing a connection between communication complexity and hardness of approximation, generalizing the ideas from a recent breakthrough work of Abboud et al. [FOCS 2017]. Specifically, we show that to prove hardness of approximation of a certain parameterized variant of the label cover problem, it suffices to devise a specific protocol for a communication problem that depends on which hypothesis we rely on. Each of these communication problems turns out to be either a well-studied problem or a variant of one; this allows us to easily apply known techniques to solve them.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79591434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Toward Verifying Nonlinear Integer Arithmetic 非线性整数算法的验证
Pub Date : 2019-06-14 DOI: 10.1145/3319396
P. Beame, Vincent Liew
We eliminate a key roadblock to efficient verification of nonlinear integer arithmetic using CDCL SAT solvers, by showing how to construct short resolution proofs for many properties of the most widely used multiplier circuits. Such short proofs were conjectured not to exist. More precisely, we give nO(1) size regular resolution proofs for arbitrary degree 2 identities on array, diagonal, and Booth multipliers and nO(log n) size proofs for these identities on Wallace tree multipliers.
我们通过展示如何为最广泛使用的乘法器电路的许多性质构造短分辨率证明,消除了使用CDCL SAT求解器有效验证非线性整数算法的关键障碍。这样简短的证明被认为是不存在的。更准确地说,我们给出了数组、对角线和Booth乘法器上任意2度恒等式的nO(1)大小正则分辨率证明,以及Wallace树乘法器上这些恒等式的nO(log n)大小证明。
{"title":"Toward Verifying Nonlinear Integer Arithmetic","authors":"P. Beame, Vincent Liew","doi":"10.1145/3319396","DOIUrl":"https://doi.org/10.1145/3319396","url":null,"abstract":"We eliminate a key roadblock to efficient verification of nonlinear integer arithmetic using CDCL SAT solvers, by showing how to construct short resolution proofs for many properties of the most widely used multiplier circuits. Such short proofs were conjectured not to exist. More precisely, we give nO(1) size regular resolution proofs for arbitrary degree 2 identities on array, diagonal, and Booth multipliers and nO(log n) size proofs for these identities on Wallace tree multipliers.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-06-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76599490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Nonhomogeneous Place-dependent Markov Chains, Unsynchronised AIMD, and Optimisation 非齐次位置相关马尔可夫链,非同步目标和优化
Pub Date : 2019-06-07 DOI: 10.1145/3312741
F. Wirth, S. Stüdli, Jia Yuan Yu, M. Corless, R. Shorten
A stochastic algorithm is presented for a class of optimisation problems that arise when a group of agents compete to share a single constrained resource in an optimal manner. The approach uses intermittent single-bit feedback, which indicates a constraint violation and does not require inter-agent communication. The algorithm is based on a positive matrix model of AIMD, which is extended to the nonhomogeneous Markovian case. The key feature is the assignment of back-off probabilities to the individual agents as a function of the past average access to the resource. This leads to a nonhomogeneous Markov chain in an extended state space, and we show almost sure convergence of the average access to the social optimum.
针对一类优化问题,提出了一种随机算法,该算法是在一组智能体以最优方式竞争共享单个约束资源时出现的。该方法使用间歇的单比特反馈,它指示约束违反并且不需要代理间通信。该算法基于AIMD的正矩阵模型,并将其推广到非齐次马尔可夫情况下。关键特征是将退出概率分配给单个代理,作为过去对资源的平均访问的函数。这导致了扩展状态空间中的非齐次马尔可夫链,并证明了接近社会最优的平均路径几乎肯定收敛。
{"title":"Nonhomogeneous Place-dependent Markov Chains, Unsynchronised AIMD, and Optimisation","authors":"F. Wirth, S. Stüdli, Jia Yuan Yu, M. Corless, R. Shorten","doi":"10.1145/3312741","DOIUrl":"https://doi.org/10.1145/3312741","url":null,"abstract":"A stochastic algorithm is presented for a class of optimisation problems that arise when a group of agents compete to share a single constrained resource in an optimal manner. The approach uses intermittent single-bit feedback, which indicates a constraint violation and does not require inter-agent communication. The algorithm is based on a positive matrix model of AIMD, which is extended to the nonhomogeneous Markovian case. The key feature is the assignment of back-off probabilities to the individual agents as a function of the past average access to the resource. This leads to a nonhomogeneous Markov chain in an extended state space, and we show almost sure convergence of the average access to the social optimum.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-06-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89418016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
The Salesman’s Improved Paths through Forests 推销员改良的森林之路
Pub Date : 2019-06-05 DOI: 10.1145/3326123
András Sebö, A. V. Zuylen
We give a new, strongly polynomial-time algorithm and improved analysis for the metric s-t path Traveling Salesman Problem (TSP). It finds a tour of cost less than 1.53 times the optimum of the subtour elimination linear program (LP), while known examples show that 1.5 is a lower bound for the integrality gap. A key new idea is the deletion of some edges of the spanning trees used in the best-of-many Christofides-Serdyukov-algorithm, which is then accompanied by novel arguments of the analysis: edge-deletion disconnects the trees, and the arising forests are then partly reconnected by “parity correction.” We show that the arising “connectivity correction” can be achieved for a minor extra cost. On the one hand, this algorithm and analysis extend previous tools such as the best-of-many Christofides-Serdyukov-algorithm. On the other hand, powerful new tools are solicited, such as a flow problem for analyzing the reconnection cost, and the construction of a set of more and more restrictive spanning trees, each of which can still be found by the greedy algorithm. We show that these trees, which are easy to compute, can replace the spanning trees of the best-of-many Christofides-Serdyukov-algorithm. These new methods lead to improving the integrality ratio and approximation guarantee below 1.53, as was shown in the preliminary, shortened version of this article that appeared in FOCS 2016. The algorithm and analysis have been significantly simplified in the current article, while details and explanations have been added.
针对度量s-t路径旅行商问题(TSP)给出了一种新的强多项式时间算法和改进的分析方法。结果表明,子回路消除线性规划(LP)的最优解的代价小于1.53倍,而已知的例子表明1.5是完整性缺口的下界。一个关键的新想法是删除生成树的一些边,这些边用于许多最好的克里斯托菲德-谢久科夫算法,然后伴随着分析的新论点:边的删除断开了树的连接,然后通过“奇偶校正”部分地重新连接起来。我们表明,产生的“连接性校正”可以通过少量额外成本来实现。一方面,该算法和分析扩展了以前的工具,如最佳的christofides - serdyukov算法。另一方面,我们需要强大的新工具,例如分析重连接成本的流问题,以及构建一组越来越严格的生成树,每个生成树仍然可以通过贪婪算法找到。我们证明了这些树易于计算,可以取代最优的christofides - serdyukov算法的生成树。这些新方法提高了完整性比,近似保证值低于1.53,正如本文在FOCS 2016上发表的初步缩短版所示。本文对算法和分析进行了明显的简化,并增加了细节和解释。
{"title":"The Salesman’s Improved Paths through Forests","authors":"András Sebö, A. V. Zuylen","doi":"10.1145/3326123","DOIUrl":"https://doi.org/10.1145/3326123","url":null,"abstract":"We give a new, strongly polynomial-time algorithm and improved analysis for the metric s-t path Traveling Salesman Problem (TSP). It finds a tour of cost less than 1.53 times the optimum of the subtour elimination linear program (LP), while known examples show that 1.5 is a lower bound for the integrality gap. A key new idea is the deletion of some edges of the spanning trees used in the best-of-many Christofides-Serdyukov-algorithm, which is then accompanied by novel arguments of the analysis: edge-deletion disconnects the trees, and the arising forests are then partly reconnected by “parity correction.” We show that the arising “connectivity correction” can be achieved for a minor extra cost. On the one hand, this algorithm and analysis extend previous tools such as the best-of-many Christofides-Serdyukov-algorithm. On the other hand, powerful new tools are solicited, such as a flow problem for analyzing the reconnection cost, and the construction of a set of more and more restrictive spanning trees, each of which can still be found by the greedy algorithm. We show that these trees, which are easy to compute, can replace the spanning trees of the best-of-many Christofides-Serdyukov-algorithm. These new methods lead to improving the integrality ratio and approximation guarantee below 1.53, as was shown in the preliminary, shortened version of this article that appeared in FOCS 2016. The algorithm and analysis have been significantly simplified in the current article, while details and explanations have been added.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78384653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Differential Equation Invariance Axiomatization 微分方程不变性公理化
Pub Date : 2019-05-31 DOI: 10.1145/3380825
André Platzer, Yong Kiam Tan
This article proves the completeness of an axiomatization for differential equation invariants described by Noetherian functions. First, the differential equation axioms of differential dynamic logic are shown to be complete for reasoning about analytic invariants. Completeness crucially exploits differential ghosts, which introduce additional variables that can be chosen to evolve freely along new differential equations. Cleverly chosen differential ghosts are the proof-theoretical counterpart of dark matter. They create a new hypothetical state, whose relationship to the original state variables satisfies invariants that did not exist before. The reflection of these new invariants in the original system then enables its analysis. An extended axiomatization with existence and uniqueness axioms is complete for all local progress properties, and, with a real induction axiom, is complete for all semianalytic invariants. This parsimonious axiomatization serves as the logical foundation for reasoning about invariants of differential equations. Indeed, it is precisely this logical treatment that enables the generalization of completeness to the Noetherian case.
本文证明了用诺埃尔函数描述的微分方程不变量的一个公理化的完备性。首先,证明了微分动态逻辑的微分方程公理对于解析不变量的推理是完备的。完备性至关重要地利用了微分幽灵,它引入了额外的变量,可以选择这些变量沿着新的微分方程自由演化。巧妙选择的微分幽灵是暗物质的理论证明对应物。它们创造了一个新的假设状态,它与原始状态变量的关系满足了以前不存在的不变量。这些新的不变量在原系统中的反映使其分析成为可能。一个具有存在唯一性公理的扩展公理化对所有局部进程性质是完备的,并且具有实归纳公理对所有半解析不变量是完备的。这种简洁的公理化为微分方程的不变量推理提供了逻辑基础。事实上,正是这种逻辑处理使得完备性的推广适用于诺埃尔情况。
{"title":"Differential Equation Invariance Axiomatization","authors":"André Platzer, Yong Kiam Tan","doi":"10.1145/3380825","DOIUrl":"https://doi.org/10.1145/3380825","url":null,"abstract":"This article proves the completeness of an axiomatization for differential equation invariants described by Noetherian functions. First, the differential equation axioms of differential dynamic logic are shown to be complete for reasoning about analytic invariants. Completeness crucially exploits differential ghosts, which introduce additional variables that can be chosen to evolve freely along new differential equations. Cleverly chosen differential ghosts are the proof-theoretical counterpart of dark matter. They create a new hypothetical state, whose relationship to the original state variables satisfies invariants that did not exist before. The reflection of these new invariants in the original system then enables its analysis. An extended axiomatization with existence and uniqueness axioms is complete for all local progress properties, and, with a real induction axiom, is complete for all semianalytic invariants. This parsimonious axiomatization serves as the logical foundation for reasoning about invariants of differential equations. Indeed, it is precisely this logical treatment that enables the generalization of completeness to the Noetherian case.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88215009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 30
Invited Articles Foreword 特邀文章前言
Pub Date : 2019-05-29 DOI: 10.1145/3328536
É. Tardos
The Invited Articles section of this issue consists of three papers. The first is “Shellability is NPcomplete,” by Xavier Goaoc, Pavel Paták, Zuzana Patáková, Martin Tancer, and Uli Wagner, which won the best-paper award at the 34th International Symposium on Computational Geometry (SoCG’17). We want to thank the SoGS Program Committee for their help in selecting this invited paper and editor Jean-Daniel Boissonnat for handling the paper. Next is “Towards Verifying Nonlinear Integer Arithmetic,” by Paul Beame and Vincent Liew, invited from the 39th International Conference on Computer Aided Verification (CAV’17). We want to thank the CAV Program Committee for their help in selecting this invited paper and editor Rajeev Alur for handling the paper. Last, but not least, is the paper “On the Computability of Conditional Probability,” by Nathanael L. Ackerman, Cameron E. Freer, and Daniel M. Roy, invited from the 26th Annual IEEE Symposium on Logic in Computer Science (LICS’11). We want to thank the LICS Program Committee for their help in selecting this invited paper and editor Nachum Dershowitz for handling the paper.
本期特邀文章部分由三篇论文组成。第一个是“Shellability is NPcomplete”,作者是Xavier Goaoc、Pavel Paták、Zuzana Patáková、Martin Tancer和Uli Wagner,该论文在第34届国际计算几何研讨会(SoCG ' 17)上获得了最佳论文奖。我们要感谢SoGS项目委员会在选择这篇受邀论文方面的帮助,以及编辑Jean-Daniel Boissonnat对论文的处理。接下来是Paul Beame和Vincent Liew从第39届计算机辅助验证国际会议(CAV ' 17)邀请的“迈向验证非线性整数算法”。我们要感谢CAV项目委员会帮助我们选择这篇受邀论文,并感谢编辑Rajeev Alur处理这篇论文。最后,但并非最不重要的是Nathanael L. Ackerman, Cameron E. Freer和Daniel M. Roy在第26届IEEE计算机科学逻辑研讨会(LICS ' 11)上发表的论文“On the Computability of Conditional Probability”。我们要感谢LICS项目委员会在选择这篇受邀论文方面的帮助,以及编辑Nachum Dershowitz对论文的处理。
{"title":"Invited Articles Foreword","authors":"É. Tardos","doi":"10.1145/3328536","DOIUrl":"https://doi.org/10.1145/3328536","url":null,"abstract":"The Invited Articles section of this issue consists of three papers. The first is “Shellability is NPcomplete,” by Xavier Goaoc, Pavel Paták, Zuzana Patáková, Martin Tancer, and Uli Wagner, which won the best-paper award at the 34th International Symposium on Computational Geometry (SoCG’17). We want to thank the SoGS Program Committee for their help in selecting this invited paper and editor Jean-Daniel Boissonnat for handling the paper. Next is “Towards Verifying Nonlinear Integer Arithmetic,” by Paul Beame and Vincent Liew, invited from the 39th International Conference on Computer Aided Verification (CAV’17). We want to thank the CAV Program Committee for their help in selecting this invited paper and editor Rajeev Alur for handling the paper. Last, but not least, is the paper “On the Computability of Conditional Probability,” by Nathanael L. Ackerman, Cameron E. Freer, and Daniel M. Roy, invited from the 26th Annual IEEE Symposium on Logic in Computer Science (LICS’11). We want to thank the LICS Program Committee for their help in selecting this invited paper and editor Nachum Dershowitz for handling the paper.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78362378","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From Real-time Logic to Timed Automata 从实时逻辑到定时自动机
Pub Date : 2019-05-23 DOI: 10.1145/3286976
Thomas Ferrère, O. Maler, D. Ničković, A. Pnueli
We show how to construct temporal testers for the logic MITL, a prominent linear-time logic for real-time systems. A temporal tester is a transducer that inputs a signal holding the Boolean value of atomic propositions and outputs the truth value of a formula along time. Here we consider testers over continuous-time Boolean signals that use clock variables to enforce duration constraints, as in timed automata. We first rewrite the MITL formula into a “simple” formula using a limited set of temporal modalities. We then build testers for these specific modalities and show how to compose testers for simple formulae into complex ones. Temporal testers can be turned into acceptors, yielding a compositional translation from MITL to timed automata. This construction is much simpler than previously known and remains asymptotically optimal. It supports both past and future operators and can easily be extended.
我们展示了如何为逻辑MITL构建时间测试器,这是实时系统中一个突出的线性时间逻辑。时间测试器是一个换能器,它输入包含原子命题布尔值的信号,并随时间输出公式的真值。这里我们考虑连续时间布尔信号的测试人员,使用时钟变量来强制持续时间约束,就像在时间自动机中一样。我们首先使用一组有限的时间模态将MITL公式重写为“简单”公式。然后,我们为这些特定的模式构建测试器,并展示如何将简单公式的测试器组合成复杂的公式。时间测试器可以转换为接受者,产生从MITL到时间自动机的组合转换。这种构造比以前已知的简单得多,并且仍然是渐近最优的。它支持过去和未来的运营商,并且可以很容易地扩展。
{"title":"From Real-time Logic to Timed Automata","authors":"Thomas Ferrère, O. Maler, D. Ničković, A. Pnueli","doi":"10.1145/3286976","DOIUrl":"https://doi.org/10.1145/3286976","url":null,"abstract":"We show how to construct temporal testers for the logic MITL, a prominent linear-time logic for real-time systems. A temporal tester is a transducer that inputs a signal holding the Boolean value of atomic propositions and outputs the truth value of a formula along time. Here we consider testers over continuous-time Boolean signals that use clock variables to enforce duration constraints, as in timed automata. We first rewrite the MITL formula into a “simple” formula using a limited set of temporal modalities. We then build testers for these specific modalities and show how to compose testers for simple formulae into complex ones. Temporal testers can be turned into acceptors, yielding a compositional translation from MITL to timed automata. This construction is much simpler than previously known and remains asymptotically optimal. It supports both past and future operators and can easily be extended.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89388031","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
On the Decidability of Membership in Matrix-exponential Semigroups 矩阵-指数半群中隶属性的可判定性
Pub Date : 2019-05-23 DOI: 10.1145/3286487
J. Ouaknine, Amaury Pouly, João Sousa-Pinto, J. Worrell
We consider the decidability of the membership problem for matrix-exponential semigroups: Given k∈ N and square matrices A1, … , Ak, C, all of the same dimension and with real algebraic entries, decide whether C is contained in the semigroup generated by the matrix exponentials exp (Ai t), where i∈ { 1,… ,k} and t ≥ 0. This problem can be seen as a continuous analog of Babai et al.’s and Cai et al.’s problem of solving multiplicative matrix equations and has applications to reachability analysis of linear hybrid automata and switching systems. Our main results are that the semigroup membership problem is undecidable in general, but decidable if we assume that A1, … , Ak commute. The decidability proof is by reduction to a version of integer programming that has transcendental constants. We give a decision procedure for the latter using Baker’s theorem on linear forms in logarithms of algebraic numbers, among other tools. The undecidability result is shown by reduction from Hilbert’s Tenth Problem.
考虑矩阵-指数半群的隶属性问题的可判定性:给定k∈N和具有实数代数项的相同维数的方阵A1,…,Ak, C,判断C是否包含在由矩阵指数exp (Ai)生成的半群中,其中i∈{1,…,k}且t≥0。这个问题可以看作是Babai等人和Cai等人求解乘法矩阵方程问题的连续模拟,并应用于线性混合自动机和切换系统的可达性分析。我们的主要结果是,一般情况下,半群隶属性问题是不可判定的,但如果我们假设A1,…,Ak可交换,则是可判定的。可决性证明是通过简化为具有超越常数的整数规划的一个版本。我们利用代数数对数线性形式的贝克定理,给出了后者的判定过程。通过对希尔伯特第十问题的化简,得到了不确定性的结果。
{"title":"On the Decidability of Membership in Matrix-exponential Semigroups","authors":"J. Ouaknine, Amaury Pouly, João Sousa-Pinto, J. Worrell","doi":"10.1145/3286487","DOIUrl":"https://doi.org/10.1145/3286487","url":null,"abstract":"We consider the decidability of the membership problem for matrix-exponential semigroups: Given k∈ N and square matrices A1, … , Ak, C, all of the same dimension and with real algebraic entries, decide whether C is contained in the semigroup generated by the matrix exponentials exp (Ai t), where i∈ { 1,… ,k} and t ≥ 0. This problem can be seen as a continuous analog of Babai et al.’s and Cai et al.’s problem of solving multiplicative matrix equations and has applications to reachability analysis of linear hybrid automata and switching systems. Our main results are that the semigroup membership problem is undecidable in general, but decidable if we assume that A1, … , Ak commute. The decidability proof is by reduction to a version of integer programming that has transcendental constants. We give a decision procedure for the latter using Baker’s theorem on linear forms in logarithms of algebraic numbers, among other tools. The undecidability result is shown by reduction from Hilbert’s Tenth Problem.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90225774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Bar Induction is Compatible with Constructive Type Theory 条形归纳法与建构型理论是相容的
Pub Date : 2019-04-24 DOI: 10.1145/3305261
Vincent Rahli, M. Bickford, L. Cohen, R. Constable
Powerful yet effective induction principles play an important role in computing, being a paramount component of programming languages, automated reasoning, and program verification systems. The Bar Induction (BI) principle is a fundamental concept of intuitionism, which is equivalent to the standard principle of transfinite induction. In this work, we investigate the compatibility of several variants of BI with Constructive Type Theory (CTT), a dependent type theory in the spirit of Martin-Löf’s extensional theory. We first show that CTT is compatible with a BI principle for sequences of numbers. Then, we establish the compatibility of CTT with a more general BI principle for sequences of name-free closed terms. The formalization of the latter principle within the theory involved enriching CTT’s term syntax with a limit constructor and showing that consistency is preserved. Furthermore, we provide novel insights regarding BI, such as the non-truncated version of BI on monotone bars being intuitionistically false. These enhancements are carried out formally using the Nuprl proof assistant that implements CTT and the formalization of CTT within the Coq proof assistant presented in previous works.
强大而有效的归纳原理在计算中扮演着重要的角色,是编程语言、自动推理和程序验证系统的重要组成部分。条形归纳法(BI)原理是直觉主义的一个基本概念,相当于标准的超限归纳法原理。在这项工作中,我们研究了几种BI变体与构建类型理论(CTT)的兼容性,构建类型理论是Martin-Löf的外延理论精神中的一种依赖类型理论。我们首先证明了CTT与数字序列的BI原理是兼容的。然后,我们建立了CTT与无名称闭项序列的更一般的BI原则的兼容性。在该理论中,后一原则的形式化涉及到用极限构造函数丰富CTT的术语语法,并表明保持了一致性。此外,我们提供了关于BI的新见解,例如单调条上的BI的非截断版本在直觉上是错误的。这些增强是使用实现CTT的Nuprl证明助手正式执行的,并在前面的作品中介绍的Coq证明助手中形式化CTT。
{"title":"Bar Induction is Compatible with Constructive Type Theory","authors":"Vincent Rahli, M. Bickford, L. Cohen, R. Constable","doi":"10.1145/3305261","DOIUrl":"https://doi.org/10.1145/3305261","url":null,"abstract":"Powerful yet effective induction principles play an important role in computing, being a paramount component of programming languages, automated reasoning, and program verification systems. The Bar Induction (BI) principle is a fundamental concept of intuitionism, which is equivalent to the standard principle of transfinite induction. In this work, we investigate the compatibility of several variants of BI with Constructive Type Theory (CTT), a dependent type theory in the spirit of Martin-Löf’s extensional theory. We first show that CTT is compatible with a BI principle for sequences of numbers. Then, we establish the compatibility of CTT with a more general BI principle for sequences of name-free closed terms. The formalization of the latter principle within the theory involved enriching CTT’s term syntax with a limit constructor and showing that consistency is preserved. Furthermore, we provide novel insights regarding BI, such as the non-truncated version of BI on monotone bars being intuitionistically false. These enhancements are carried out formally using the Nuprl proof assistant that implements CTT and the formalization of CTT within the Coq proof assistant presented in previous works.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2019-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88582140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
期刊
Journal of the ACM (JACM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1