首页 > 最新文献

Proceedings of the eleventh annual ACM symposium on Theory of computing最新文献

英文 中文
Computing integrated costs of sequences of operations with application to dictionaries 计算应用于字典的操作序列的综合代价
Pub Date : 1979-04-30 DOI: 10.1145/800135.804397
P. Flajolet, J. Françon, J. Vuillemin
We introduce a notion of integrated cost of a dictionary, as average cost of sequences of search, insert and delete operations. We express generating functions of these sequences in terms of continued fractions; from this we derive an explicit integral expression of integrated costs for three common representations of dictionaries.
我们引入了字典的综合代价的概念,作为查找、插入和删除操作序列的平均代价。我们用连分式表示这些序列的生成函数;由此,我们导出了字典的三种常见表示形式的集成代价的显式积分表达式。
{"title":"Computing integrated costs of sequences of operations with application to dictionaries","authors":"P. Flajolet, J. Françon, J. Vuillemin","doi":"10.1145/800135.804397","DOIUrl":"https://doi.org/10.1145/800135.804397","url":null,"abstract":"We introduce a notion of integrated cost of a dictionary, as average cost of sequences of search, insert and delete operations. We express generating functions of these sequences in terms of continued fractions; from this we derive an explicit integral expression of integrated costs for three common representations of dictionaries.","PeriodicalId":176545,"journal":{"name":"Proceedings of the eleventh annual ACM symposium on Theory of computing","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128782262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Negation can be exponentially powerful 否定可以是指数级的强大
Pub Date : 1979-04-30 DOI: 10.1145/800135.804412
L. Valiant
Among the most remarkable algorithms in algebra are Strassen's algorithm for the multiplication of matrices and the Fast Fourier Transform method for the convolution of vectors. For both of these problems the definition suggests an obvious algorithm that uses just the monotone operations + and ×. Schnorr [18] has shown that these algorithms, which use &thgr;(n3) and &THgr;(n2) operations respectively, are essentially optimal among algorithms that use only these monotone operations. By using subtraction as an additional operation and exploiting cancellations of computed terms in a very intricate way Strassen showed that a faster algorithm requiring only O(n2.81) operations is possible. The FFT method for convolution achieves O(nlog n) complexity in a similar fashion. The question arises as to whether we can expect even greater gains in computational efficiency by such judicious use of cancellations. In this paper we give a positive answer to this, by exhibiting a problem for which an exponential speedup can be attained using {+,−,×} rather than just {+,×} as operations. The problem in question is the multivariate polynomial associated with perfect matchings in planar graphs. For this a fast algorithm is implicit in the Pfaffian technique of Fisher and Kasteleyn [6,8]. The main result we provide here is the exponential lower bound in the monotone case.
代数中最引人注目的算法是用于矩阵乘法的Strassen算法和用于向量卷积的快速傅立叶变换方法。对于这两个问题,定义提出了一个明显的算法,只使用单调的+和x操作。Schnorr[18]已经证明,这些分别使用&thgr;(n3)和&thgr;(n2)运算的算法在仅使用这些单调运算的算法中本质上是最优的。通过使用减法作为一个额外的操作,并以一种非常复杂的方式利用计算项的消去,Strassen证明了一个只需要O(n2.81)次操作的更快的算法是可能的。卷积的FFT方法以类似的方式实现了O(nlog n)复杂度。问题出现了,我们是否可以期望通过这种明智的使用消去来获得更大的计算效率。在本文中,我们给出了一个肯定的答案,通过展示一个可以使用{+,−,x}而不是仅仅{+,x}作为运算来获得指数加速的问题。所讨论的问题是平面图中与完美匹配相关的多元多项式。为此,Fisher和Kasteleyn的Pfaffian技术中隐含了一种快速算法[6,8]。我们在这里提供的主要结果是单调情况下的指数下界。
{"title":"Negation can be exponentially powerful","authors":"L. Valiant","doi":"10.1145/800135.804412","DOIUrl":"https://doi.org/10.1145/800135.804412","url":null,"abstract":"Among the most remarkable algorithms in algebra are Strassen's algorithm for the multiplication of matrices and the Fast Fourier Transform method for the convolution of vectors. For both of these problems the definition suggests an obvious algorithm that uses just the monotone operations + and ×. Schnorr [18] has shown that these algorithms, which use &thgr;(n3) and &THgr;(n2) operations respectively, are essentially optimal among algorithms that use only these monotone operations. By using subtraction as an additional operation and exploiting cancellations of computed terms in a very intricate way Strassen showed that a faster algorithm requiring only O(n2.81) operations is possible. The FFT method for convolution achieves O(nlog n) complexity in a similar fashion. The question arises as to whether we can expect even greater gains in computational efficiency by such judicious use of cancellations. In this paper we give a positive answer to this, by exhibiting a problem for which an exponential speedup can be attained using {+,−,×} rather than just {+,×} as operations. The problem in question is the multivariate polynomial associated with perfect matchings in planar graphs. For this a fast algorithm is implicit in the Pfaffian technique of Fisher and Kasteleyn [6,8]. The main result we provide here is the exponential lower bound in the monotone case.","PeriodicalId":176545,"journal":{"name":"Proceedings of the eleventh annual ACM symposium on Theory of computing","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130495647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 98
Finding patterns common to a set of strings (Extended Abstract) 寻找一组字符串的共同模式(扩展抽象)
Pub Date : 1979-04-30 DOI: 10.1145/800135.804406
D. Angluin
We motivate, formalize, and study a computational problem in concrete inductive inference. A “pattern” is defined to be a concatenation of constants and variables, and the language of a pattern is defined to be the set of strings obtained by substituting constant strings for the variables. The problem we consider is, given a set of strings, find a minimal pattern language containing this set. This problem is shown to be effectively solvable in the general case and to lead to correct inference in the limit of the pattern languages. There exists a polynomial time algorithm for it in the restricted case of one-variable patterns. Inference from positive data is re-examined, and a characterization given of when it is possible for a family of recursive languages. Various collateral results about patterns and pattern languages are obtained. Section 1 is an introduction explaining the context of this work and informally describing the problem formulation. Section 2 is definitions. Section 3 is results concerning patterns and pattern languages. Section 4 concerns the abstract question of inference from positive data. Section 5 gives a polynomial time algorithm for finding minimal one-variable pattern languages compatible with a given set of strings. Section 6 contains remarks.
我们在具体归纳推理中激发、形式化并研究一个计算问题。“模式”被定义为常量和变量的连接,模式的语言被定义为通过将常量字符串替换为变量而获得的字符串集。我们考虑的问题是,给定一组字符串,找到包含该集合的最小模式语言。这个问题在一般情况下是可以有效解决的,并且在模式语言的限制下可以得到正确的推理。在单变量模式的限制情况下,存在一个多项式时间算法。从正数据的推断被重新检查,并给出一个表征,当它是可能的递归语言家族。得到了关于模式和模式语言的各种附带结果。第1节是一个介绍,解释了这项工作的背景,并非正式地描述了问题的形式。第2节是定义。第3部分是关于模式和模式语言的结果。第4节涉及从实证数据推断的抽象问题。第5节给出了一个多项式时间算法,用于查找与给定字符串集兼容的最小单变量模式语言。第6节载有备注。
{"title":"Finding patterns common to a set of strings (Extended Abstract)","authors":"D. Angluin","doi":"10.1145/800135.804406","DOIUrl":"https://doi.org/10.1145/800135.804406","url":null,"abstract":"We motivate, formalize, and study a computational problem in concrete inductive inference. A “pattern” is defined to be a concatenation of constants and variables, and the language of a pattern is defined to be the set of strings obtained by substituting constant strings for the variables. The problem we consider is, given a set of strings, find a minimal pattern language containing this set. This problem is shown to be effectively solvable in the general case and to lead to correct inference in the limit of the pattern languages. There exists a polynomial time algorithm for it in the restricted case of one-variable patterns. Inference from positive data is re-examined, and a characterization given of when it is possible for a family of recursive languages. Various collateral results about patterns and pattern languages are obtained. Section 1 is an introduction explaining the context of this work and informally describing the problem formulation. Section 2 is definitions. Section 3 is results concerning patterns and pattern languages. Section 4 concerns the abstract question of inference from positive data. Section 5 gives a polynomial time algorithm for finding minimal one-variable pattern languages compatible with a given set of strings. Section 6 contains remarks.","PeriodicalId":176545,"journal":{"name":"Proceedings of the eleventh annual ACM symposium on Theory of computing","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125835566","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 75
The recognition of Series Parallel digraphs 串并联有向图的识别
Pub Date : 1979-04-30 DOI: 10.1145/800135.804393
J. Valdes, R. Tarjan, E. Lawler
We present an algorithm that recognizes the class of General Series Parallel digraphs and runs in time proportional to the size of its input. To perform this recognition task it is necessary to compute the transitive reduction and transitive closure of any General Series Parallel digraph. Our analysis is based on the relationship between General Series Parallel digraphs and a class of well known models of electrical networks.
我们提出了一种识别一般串联并行有向图的算法,它的运行时间与输入的大小成正比。为了完成这一识别任务,需要计算任何一般串并联有向图的传递约简和传递闭包。我们的分析是基于一般串并联有向图和一类著名的电网模型之间的关系。
{"title":"The recognition of Series Parallel digraphs","authors":"J. Valdes, R. Tarjan, E. Lawler","doi":"10.1145/800135.804393","DOIUrl":"https://doi.org/10.1145/800135.804393","url":null,"abstract":"We present an algorithm that recognizes the class of General Series Parallel digraphs and runs in time proportional to the size of its input. To perform this recognition task it is necessary to compute the transitive reduction and transitive closure of any General Series Parallel digraph. Our analysis is based on the relationship between General Series Parallel digraphs and a class of well known models of electrical networks.","PeriodicalId":176545,"journal":{"name":"Proceedings of the eleventh annual ACM symposium on Theory of computing","volume":"635 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122950651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 771
On &ggr;-reducibility versus polynomial time many-one reducibility(Extended Abstract) 关于&ggr;-可约性与多项式时间多一可约性(扩展摘要)
Pub Date : 1979-04-30 DOI: 10.1145/800135.804421
T. Long
We prove that a class of functions (denoted by NPCPt), whose graphs can be accepted in non-deterministic polynomial time, can be evaluated in deterministic polynomial time if and only if &ggr;-reducibility is equivalent to polynomial time many-one reducibility. We also modify the proof technique used to obtain part of this result to obtain the stronger result that if every &ggr;-reduction can be replaced by a polynomial time Turing reduction then every function in NPCPt can be evaluated in deterministic polynomial time.
证明了一类函数(用NPCPt表示)的图在非确定多项式时间内可以被接受,当且仅当&ggr;-可约性等价于多项式时间的多一可约性时,该类函数可以在确定多项式时间内求值。我们还修改了用于获得部分结果的证明技术,以获得更强的结果,即如果每个&ggr;-约简都可以被多项式时间的图灵约简所取代,那么NPCPt中的每个函数都可以在确定性多项式时间内求值。
{"title":"On &ggr;-reducibility versus polynomial time many-one reducibility(Extended Abstract)","authors":"T. Long","doi":"10.1145/800135.804421","DOIUrl":"https://doi.org/10.1145/800135.804421","url":null,"abstract":"We prove that a class of functions (denoted by NPCPt), whose graphs can be accepted in non-deterministic polynomial time, can be evaluated in deterministic polynomial time if and only if &ggr;-reducibility is equivalent to polynomial time many-one reducibility. We also modify the proof technique used to obtain part of this result to obtain the stronger result that if every &ggr;-reduction can be replaced by a polynomial time Turing reduction then every function in NPCPt can be evaluated in deterministic polynomial time.","PeriodicalId":176545,"journal":{"name":"Proceedings of the eleventh annual ACM symposium on Theory of computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131747088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Lower bounds on the size of sweeping automata 清扫自动机大小的下界
Pub Date : 1979-04-30 DOI: 10.1145/800135.804429
M. Sipser
Establishing good lower bounds on the complexity of languages is an important area of current research in the theory of computation. However, despite much effort, fundamental questions such as P =? NP and L =? NL remain open. To resolve these questions it may be necessary to develop a deep combinatorial understanding of polynomial time or log space computations, possibly a formidable task. One avenue for approaching these problems is to study weaker models of computation for which the analogous problems may be easier to settle, perhaps yielding insight into the original problems. Sakoda and Sipser [3] raise the following question about finite automata: Is there a polynomial p, such that every n-state 2nfa (two-way nondeterministic finite automaton) has an equivalent p(n)-state 2dfa? They conjecture a negative answer to this. In this paper we take a step toward proving this conjecture by showing that 2nfa are exponentially more succinct than 2dfa of a certain restricted form.
建立良好的语言复杂度下界是当前计算理论研究的一个重要领域。然而,尽管付出了很多努力,像P =?NP和L =?NL保持开放。为了解决这些问题,可能有必要对多项式时间或对数空间计算进行深入的组合理解,这可能是一项艰巨的任务。解决这些问题的一个途径是研究较弱的计算模型,在这些模型中,类似的问题可能更容易解决,也许可以深入了解原始问题。Sakoda和Sipser[3]提出了关于有限自动机的以下问题:是否存在一个多项式p,使得每个n态2nfa(双向不确定性有限自动机)都有一个等价的p(n)态2dfa?他们推测这个问题的答案是否定的。在本文中,我们通过证明2nfa比某种限制形式的2dfa在指数上更简洁,从而向证明这个猜想迈出了一步。
{"title":"Lower bounds on the size of sweeping automata","authors":"M. Sipser","doi":"10.1145/800135.804429","DOIUrl":"https://doi.org/10.1145/800135.804429","url":null,"abstract":"Establishing good lower bounds on the complexity of languages is an important area of current research in the theory of computation. However, despite much effort, fundamental questions such as P =? NP and L =? NL remain open. To resolve these questions it may be necessary to develop a deep combinatorial understanding of polynomial time or log space computations, possibly a formidable task. One avenue for approaching these problems is to study weaker models of computation for which the analogous problems may be easier to settle, perhaps yielding insight into the original problems. Sakoda and Sipser [3] raise the following question about finite automata: Is there a polynomial p, such that every n-state 2nfa (two-way nondeterministic finite automaton) has an equivalent p(n)-state 2dfa? They conjecture a negative answer to this. In this paper we take a step toward proving this conjecture by showing that 2nfa are exponentially more succinct than 2dfa of a certain restricted form.","PeriodicalId":176545,"journal":{"name":"Proceedings of the eleventh annual ACM symposium on Theory of computing","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115904805","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 103
Deadlock-free packet switching networks 无死锁的分组交换网络
Pub Date : 1979-04-30 DOI: 10.1145/800135.804402
S. Toueg, J. Ullman
Deadlock is one of the most serious system failures that can occur in a computer system or a network. Deadlock states have been observed in existing computer networks emphasizing the need for carefully designed flow control procedures (controllers) to avoid deadlocks. Such a deadlock-free controller is readily found if we allow it global information about the overall network state. Generally, this assumption is not realistic, and we must resort to deadlock free local controllers using only packet and node information. We present here several types of such controllers, we study their relationship and give a proof of their optimality with respect to deadlock free controllers using the same set of local parameters.
死锁是计算机系统或网络中可能发生的最严重的系统故障之一。在现有的计算机网络中已经观察到死锁状态,强调需要精心设计流控制程序(控制器)来避免死锁。如果我们允许它获得关于整个网络状态的全局信息,就很容易找到这样一个无死锁的控制器。通常,这种假设是不现实的,我们必须求助于仅使用数据包和节点信息的无死锁本地控制器。本文给出了这种控制器的几种类型,研究了它们之间的关系,并证明了它们相对于使用相同局部参数集的无死锁控制器的最优性。
{"title":"Deadlock-free packet switching networks","authors":"S. Toueg, J. Ullman","doi":"10.1145/800135.804402","DOIUrl":"https://doi.org/10.1145/800135.804402","url":null,"abstract":"Deadlock is one of the most serious system failures that can occur in a computer system or a network. Deadlock states have been observed in existing computer networks emphasizing the need for carefully designed flow control procedures (controllers) to avoid deadlocks. Such a deadlock-free controller is readily found if we allow it global information about the overall network state. Generally, this assumption is not realistic, and we must resort to deadlock free local controllers using only packet and node information. We present here several types of such controllers, we study their relationship and give a proof of their optimality with respect to deadlock free controllers using the same set of local parameters.","PeriodicalId":176545,"journal":{"name":"Proceedings of the eleventh annual ACM symposium on Theory of computing","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117089499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 68
Completeness classes in algebra 代数中的完备类
Pub Date : 1979-04-30 DOI: 10.1145/800135.804419
L. Valiant
In the theory of recursive functions and computational complexity it has been demonstrated repeatedly that the natural problems tend to cluster together in “completeness classes”. These are families of problems that (A) are computationally interreducible and (B) are the hardest members of some computationally defined class. The aim of this paper is to demonstrate that for both algebraic and combinatorial problems this phenomenon exists in a form that is purely algebraic in both of the respects (A) and (B). Such computational consequences as NP-completeness are particular manifestations of something more fundamental. The core of the paper is self-contained, consisting as it does essentially of the two notions of “p-definability” and the five algebraic relations that are proved as theorems. In the remainder our aim is to elucidate the computational consequences of these basic results. Hence in the auxiliary propositions and discussion for convenience we do assume familiarity with algebraic and Boolean complexity theory.
在递归函数和计算复杂性理论中,已经多次证明自然问题倾向于聚在“完备类”中。这些问题族(A)是计算上可互约的,(B)是某些计算定义类中最难的成员。本文的目的是证明,对于代数和组合问题,这种现象在(a)和(B)两个方面都以纯代数的形式存在。np完备性等计算结果是一些更基本的东西的特殊表现。论文的核心是自成一体的,本质上由“p-可定义性”的两个概念和作为定理证明的五个代数关系组成。在其余部分中,我们的目的是阐明这些基本结果的计算结果。因此,为了方便起见,在辅助命题和讨论中,我们假设熟悉代数和布尔复杂性理论。
{"title":"Completeness classes in algebra","authors":"L. Valiant","doi":"10.1145/800135.804419","DOIUrl":"https://doi.org/10.1145/800135.804419","url":null,"abstract":"In the theory of recursive functions and computational complexity it has been demonstrated repeatedly that the natural problems tend to cluster together in “completeness classes”. These are families of problems that (A) are computationally interreducible and (B) are the hardest members of some computationally defined class. The aim of this paper is to demonstrate that for both algebraic and combinatorial problems this phenomenon exists in a form that is purely algebraic in both of the respects (A) and (B). Such computational consequences as NP-completeness are particular manifestations of something more fundamental. The core of the paper is self-contained, consisting as it does essentially of the two notions of “p-definability” and the five algebraic relations that are proved as theorems. In the remainder our aim is to elucidate the computational consequences of these basic results. Hence in the auxiliary propositions and discussion for convenience we do assume familiarity with algebraic and Boolean complexity theory.","PeriodicalId":176545,"journal":{"name":"Proceedings of the eleventh annual ACM symposium on Theory of computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127457143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 540
A completeness technique for d-axiomatizable semantics d-公理化语义的完备性技术
Pub Date : 1979-04-30 DOI: 10.1145/800135.804409
F. Berman
In this paper, we show that by dropping the restrictions on interpretations of arbitrary programs and requiring only that very natural deductive systems are sound, we get classes of semantics which give good representations of program behavior and are more well-suited for applications involving an axiomatic approach (for example program verification). In addition, by tying the restrictions on the behavior of arbitrary programs or specified axiom schema, we get both a powerful formal tool and properties more widely used specifications lack such as compactness and completeness. Completeness is a very desirable property. It is fairly straightforward to show given any reasonable deductive system D for a class of models A that Pr(D) @@@@ Th(A) . But given an application such as program verification, if it is not true that Th(A) @@@@ Pr(D) , we may be able to find correct programs which we cannot verify. In this paper we show that by using the “axiomatizability” of programming constructs, we can obtain a technique for showing completeness results for some of the more widely used variations of PDL. We begin with some definitions.
在本文中,我们表明,通过放弃对任意程序的解释的限制,并且只要求非常自然的演绎系统是健全的,我们得到了能够很好地表示程序行为的语义类,并且更适合涉及公理方法的应用(例如程序验证)。此外,通过对任意程序或指定公理模式的行为绑定限制,我们既获得了强大的形式化工具,又获得了更广泛使用的规范所缺乏的特性,如紧凑性和完备性。完备性是一个非常理想的性质。这是相当直接的证明给定任何合理的演绎系统D对于一类模型a Pr(D) @@@@ Th(a)。但是给定一个应用程序,例如程序验证,如果Th(A) @@@@ Pr(D)不是真的,我们可能能够找到我们无法验证的正确程序。在本文中,我们证明了通过使用编程构造的“公公理性”,我们可以获得一种技术来显示一些更广泛使用的PDL变体的完备性结果。我们从一些定义开始。
{"title":"A completeness technique for d-axiomatizable semantics","authors":"F. Berman","doi":"10.1145/800135.804409","DOIUrl":"https://doi.org/10.1145/800135.804409","url":null,"abstract":"In this paper, we show that by dropping the restrictions on interpretations of arbitrary programs and requiring only that very natural deductive systems are sound, we get classes of semantics which give good representations of program behavior and are more well-suited for applications involving an axiomatic approach (for example program verification). In addition, by tying the restrictions on the behavior of arbitrary programs or specified axiom schema, we get both a powerful formal tool and properties more widely used specifications lack such as compactness and completeness. Completeness is a very desirable property. It is fairly straightforward to show given any reasonable deductive system D for a class of models A that Pr(D) @@@@ Th(A) . But given an application such as program verification, if it is not true that Th(A) @@@@ Pr(D) , we may be able to find correct programs which we cannot verify. In this paper we show that by using the “axiomatizability” of programming constructs, we can obtain a technique for showing completeness results for some of the more widely used variations of PDL. We begin with some definitions.","PeriodicalId":176545,"journal":{"name":"Proceedings of the eleventh annual ACM symposium on Theory of computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125816411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Equivalence of relational database schemes 关系数据库方案的等价性
Pub Date : 1979-04-30 DOI: 10.1145/800135.804424
C. Beeri, A. Mendelzon, Y. Sagiv, J. Ullman
We investigate the question of when two database schemes embody the same information. We argue that this question reduces to the equivalence of the sets of fixed points of the project-join mappings associated with the two database schemes in question. When data dependencies are given, we need only consider those fixed points that satisfy the dependencies. A polynomial algorithm to test the equivalence of database schemes, when there are no dependencies, is given. We also provide an exponential algorithm to handle the case where there are functional and/or multivalued dependencies. Furthermore, we give a polynomial time test to determine whether a project-join mapping preserves a set of functional dependencies, and a polynomial time algorithm for equivalence of database schemes whose project-join mappings do preserve the given set of functional dependencies. Lastly, we introduce the “update sets” approach to database design as an application of these results.
我们研究了当两种数据库方案包含相同信息时的问题。我们认为,这个问题可以简化为与所讨论的两个数据库方案相关联的项目连接映射的不动点集的等价性。当数据依赖关系给定时,我们只需要考虑满足依赖关系的不动点。在不存在依赖关系的情况下,给出了一种测试数据库方案等价性的多项式算法。我们还提供了一个指数算法来处理存在函数和/或多值依赖关系的情况。此外,我们给出了一个多项式时间检验来确定项目-连接映射是否保留一组功能依赖,以及一个多项式时间算法来确定项目-连接映射是否保留给定的功能依赖集的数据库方案的等价性。最后,我们将“更新集”方法引入数据库设计,作为这些结果的应用。
{"title":"Equivalence of relational database schemes","authors":"C. Beeri, A. Mendelzon, Y. Sagiv, J. Ullman","doi":"10.1145/800135.804424","DOIUrl":"https://doi.org/10.1145/800135.804424","url":null,"abstract":"We investigate the question of when two database schemes embody the same information. We argue that this question reduces to the equivalence of the sets of fixed points of the project-join mappings associated with the two database schemes in question. When data dependencies are given, we need only consider those fixed points that satisfy the dependencies. A polynomial algorithm to test the equivalence of database schemes, when there are no dependencies, is given. We also provide an exponential algorithm to handle the case where there are functional and/or multivalued dependencies. Furthermore, we give a polynomial time test to determine whether a project-join mapping preserves a set of functional dependencies, and a polynomial time algorithm for equivalence of database schemes whose project-join mappings do preserve the given set of functional dependencies. Lastly, we introduce the “update sets” approach to database design as an application of these results.","PeriodicalId":176545,"journal":{"name":"Proceedings of the eleventh annual ACM symposium on Theory of computing","volume":"252 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1979-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133350720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 108
期刊
Proceedings of the eleventh annual ACM symposium on Theory of computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1