首页 > 最新文献

Acta Cybern.最新文献

英文 中文
Improving Saturation-based Bounded Model Checking 改进基于饱和的有界模型检查
Pub Date : 2016-06-01 DOI: 10.14232/actacyb.22.3.2016.2
D. Darvas, András Vörös, T. Bartha
Formal verification is becoming a fundamental step in assuring thecorrectness of safety-critical systems. Since these systems are oftenasynchronous and even distributed, their verification requires methodsthat can deal with huge or even infinite state spaces. Model checkingis one of the current techniques to analyse the behaviour of systems,as part of the verification process. In this paper a symbolic boundedmodel checking algorithm is presented that relies on efficient saturation-basedmethods. The previous approaches are extended with new bounded statespace exploration strategies. In addition, constrained saturationis also introduced to improve the efficiency of bounded model checking.Our measurements confirm that these approaches do not only offera solution to deal with infinite state spaces, but in many casesthey even outperform the original methods.
正式验证正在成为确保安全关键系统正确性的基本步骤。由于这些系统通常是异步的,甚至是分布式的,因此它们的验证需要能够处理巨大甚至无限状态空间的方法。模型检查是当前分析系统行为的技术之一,是验证过程的一部分。本文提出了一种基于高效饱和方法的符号有界模型检验算法。用新的有界状态空间探索策略扩展了前面的方法。此外,为了提高有界模型检验的效率,还引入了约束饱和。我们的测量证实,这些方法不仅提供了处理无限状态空间的解决方案,而且在许多情况下,它们甚至优于原始方法。
{"title":"Improving Saturation-based Bounded Model Checking","authors":"D. Darvas, András Vörös, T. Bartha","doi":"10.14232/actacyb.22.3.2016.2","DOIUrl":"https://doi.org/10.14232/actacyb.22.3.2016.2","url":null,"abstract":"Formal verification is becoming a fundamental step in assuring thecorrectness of safety-critical systems. Since these systems are oftenasynchronous and even distributed, their verification requires methodsthat can deal with huge or even infinite state spaces. Model checkingis one of the current techniques to analyse the behaviour of systems,as part of the verification process. In this paper a symbolic boundedmodel checking algorithm is presented that relies on efficient saturation-basedmethods. The previous approaches are extended with new bounded statespace exploration strategies. In addition, constrained saturationis also introduced to improve the efficiency of bounded model checking.Our measurements confirm that these approaches do not only offera solution to deal with infinite state spaces, but in many casesthey even outperform the original methods.","PeriodicalId":187125,"journal":{"name":"Acta Cybern.","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122303481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
On Cyber Attacks and the Maximum-Weight Rooted-Subtree Problem 网络攻击与最大权值根子树问题
Pub Date : 2016-06-01 DOI: 10.14232/actacyb.22.3.2016.3
G. Agnarsson, R. Greenlaw, Sanpawat Kantabutra
This paper makes three contributions to cyber-security research. First,we define a model for cyber-security systems and the concept of acyber-security attack within the model's framework. The modelhighlights the importance of game-over components - criticalsystem components which if acquired will give an adversary the abilityto defeat a system completely. The model is based on systems thatuse defense-in-depth/layered-security approaches, as many systemsdo. In the model we define the concept of penetration cost,which is the cost that must be paid in order to break into the nextlayer of security. Second, we define natural decision and optimizationproblems based on cyber-security attacks in terms of doubly weightedtrees, and analyze their complexity. More precisely, given a treeT rooted at a vertex r, a penetrating cost edge functionc on T, a target-acquisition vertex function p on T,the attacker's budget and the game-over thresholdB,G ∈ ℚ+respectively, we consider the problem of determiningthe existence of a rooted subtree T' of T within the attacker'sbudget that is, the sum of the costs of the edges in T' is lessthan or equal to B with total acquisition value more than thegame-over threshold that is, the sum of the target values of thenodes in T' is greater than or equal to G. We prove that thegeneral version of this problem is intractable, but does admit apolynomial time approximation scheme. We also analyze the complexityof three restricted versions of the problems, where the penetrationcost is the constant function, integer-valued, and rational-valuedamong a given fixed number of distinct values. Using recursion anddynamic-programming techniques, we show that for constant penetrationcosts an optimal cyber-attack strategy can be found in polynomialtime, and for integer-valued and rational-valued penetration costsoptimal cyber-attack strategies can be found in pseudo-polynomialtime. Third, we provide a list of open problems relating to the architecturaldesign of cyber-security systems and to the model.
本文对网络安全研究做出了三点贡献。首先,我们定义了一个网络安全系统模型,并在模型框架内定义了网络安全攻击的概念。该模型强调了游戏结束组件的重要性——关键的系统组件,如果获得这些组件,对手将有能力彻底击败一个系统。与许多系统一样,该模型基于使用深度防御/分层安全方法的系统。在该模型中,我们定义了渗透成本的概念,即为了突破下一层安全而必须支付的成本。其次,我们用双权树定义了基于网络安全攻击的自然决策和优化问题,并分析了它们的复杂性。更准确地说,给定一个街道根植在一个顶点r,穿透成本优势functionc T,一个目标获取顶点函数p T,攻击者的预算和游戏结束thresholdB, G∈ℚ+分别,我们考虑的问题determiningthe存在的子树T ' T在攻击者探讨罢了,边缘的成本之和T '小于或等于B收购总价值超过thegame-over阈值,我们证明了该问题的一般形式是难以处理的,但确实允许采用多项式时间逼近格式。我们还分析了三个限制版本的问题的复杂性,其中渗透成本是给定固定数量的不同值之间的常数函数,整数值和有理值。利用递归和动态规划技术,我们证明了对于常数渗透成本,可以在多项式时间内找到最优网络攻击策略;对于整数值和有理数值渗透成本,可以在伪多项式时间内找到最优网络攻击策略。第三,我们提供了与网络安全系统架构设计和模型相关的开放问题列表。
{"title":"On Cyber Attacks and the Maximum-Weight Rooted-Subtree Problem","authors":"G. Agnarsson, R. Greenlaw, Sanpawat Kantabutra","doi":"10.14232/actacyb.22.3.2016.3","DOIUrl":"https://doi.org/10.14232/actacyb.22.3.2016.3","url":null,"abstract":"This paper makes three contributions to cyber-security research. First,we define a model for cyber-security systems and the concept of acyber-security attack within the model's framework. The modelhighlights the importance of game-over components - criticalsystem components which if acquired will give an adversary the abilityto defeat a system completely. The model is based on systems thatuse defense-in-depth/layered-security approaches, as many systemsdo. In the model we define the concept of penetration cost,which is the cost that must be paid in order to break into the nextlayer of security. Second, we define natural decision and optimizationproblems based on cyber-security attacks in terms of doubly weightedtrees, and analyze their complexity. More precisely, given a treeT rooted at a vertex r, a penetrating cost edge functionc on T, a target-acquisition vertex function p on T,the attacker's budget and the game-over thresholdB,G ∈ ℚ+respectively, we consider the problem of determiningthe existence of a rooted subtree T' of T within the attacker'sbudget that is, the sum of the costs of the edges in T' is lessthan or equal to B with total acquisition value more than thegame-over threshold that is, the sum of the target values of thenodes in T' is greater than or equal to G. We prove that thegeneral version of this problem is intractable, but does admit apolynomial time approximation scheme. We also analyze the complexityof three restricted versions of the problems, where the penetrationcost is the constant function, integer-valued, and rational-valuedamong a given fixed number of distinct values. Using recursion anddynamic-programming techniques, we show that for constant penetrationcosts an optimal cyber-attack strategy can be found in polynomialtime, and for integer-valued and rational-valued penetration costsoptimal cyber-attack strategies can be found in pseudo-polynomialtime. Third, we provide a list of open problems relating to the architecturaldesign of cyber-security systems and to the model.","PeriodicalId":187125,"journal":{"name":"Acta Cybern.","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133376328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
One-Pass Reductions 一次通过的削减
Pub Date : 2016-06-01 DOI: 10.14232/actacyb.22.3.2016.6
S. Vágvölgyi
We study OI and IO one-pass reduction sequences with term rewritesystems. We present second order decidability and undecidabilityresults on recognizable tree languages and one-pass reductions. Forleft-linear TRSs, the second order OI inclusion problem and the secondorder OI reachability problem are decidable, the second order OIjoinability problem is undecidable. For right-linear TRSs, the secondorder common IO ancestor problem is undecidable.
研究了具有项重写系统的OI和IO单次约简序列。我们给出了可识别树语言和一次约简的二阶可判定性和不可判定性结果。对于左线性TRSs,二阶OI包含问题和二阶OI可达性问题是可决定的,二阶OI可合性问题是不可决定的。对于右线性trs,二阶公共IO祖先问题是不可确定的。
{"title":"One-Pass Reductions","authors":"S. Vágvölgyi","doi":"10.14232/actacyb.22.3.2016.6","DOIUrl":"https://doi.org/10.14232/actacyb.22.3.2016.6","url":null,"abstract":"We study OI and IO one-pass reduction sequences with term rewritesystems. We present second order decidability and undecidabilityresults on recognizable tree languages and one-pass reductions. Forleft-linear TRSs, the second order OI inclusion problem and the secondorder OI reachability problem are decidable, the second order OIjoinability problem is undecidable. For right-linear TRSs, the secondorder common IO ancestor problem is undecidable.","PeriodicalId":187125,"journal":{"name":"Acta Cybern.","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116717614","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Quotient Complexities of Atoms in Regular Ideal Languages 正则理想语言中原子的商复杂度
Pub Date : 2015-03-07 DOI: 10.14232/actacyb.22.2.2015.4
J. Brzozowski, Sylvie Davies
A (left) quotient of a language $L$ by a word $w$ is the language $w^{-1}L={xmid wxin L}$. The quotient complexity of a regular language $L$ is the number of quotients of $L$; it is equal to the state complexity of $L$, which is the number of states in a minimal deterministic finite automaton accepting $L$. An atom of $L$ is an equivalence class of the relation in which two words are equivalent if for each quotient, they either are both in the quotient or both not in it; hence it is a non-empty intersection of complemented and uncomplemented quotients of $L$. A right (respectively, left and two-sided) ideal is a language $L$ over an alphabet $Sigma$ that satisfies $L=LSigma^*$ (respectively, $L=Sigma^*L$ and $L=Sigma^*LSigma^*$). We compute the maximal number of atoms and the maximal quotient complexities of atoms of right, left and two-sided regular ideals.
语言$L$除以单词$w$的(左)商是语言$w^{-1}L={xmid wxin L}$。正则语言的商复杂度$L$是$L$的商的个数;它等于$L$的状态复杂度,即接受$L$的最小确定性有限自动机的状态数。$L$的原子是这样一种关系的等价类:对于每个商,两个词要么都在商中,要么都不在商中,那么它们是等价的;因此,它是$L$的补商与未补商的非空交集。理想的右(分别是,左和双面)是一种语言$L$,它基于满足$L=LSigma^*$(分别是$L=Sigma^*L$和$L=Sigma^*LSigma^*$)的字母$Sigma$。我们计算了右、左、双边正则理想的最大原子数和最大原子商复杂度。
{"title":"Quotient Complexities of Atoms in Regular Ideal Languages","authors":"J. Brzozowski, Sylvie Davies","doi":"10.14232/actacyb.22.2.2015.4","DOIUrl":"https://doi.org/10.14232/actacyb.22.2.2015.4","url":null,"abstract":"A (left) quotient of a language $L$ by a word $w$ is the language $w^{-1}L={xmid wxin L}$. The quotient complexity of a regular language $L$ is the number of quotients of $L$; it is equal to the state complexity of $L$, which is the number of states in a minimal deterministic finite automaton accepting $L$. An atom of $L$ is an equivalence class of the relation in which two words are equivalent if for each quotient, they either are both in the quotient or both not in it; hence it is a non-empty intersection of complemented and uncomplemented quotients of $L$. A right (respectively, left and two-sided) ideal is a language $L$ over an alphabet $Sigma$ that satisfies $L=LSigma^*$ (respectively, $L=Sigma^*L$ and $L=Sigma^*LSigma^*$). We compute the maximal number of atoms and the maximal quotient complexities of atoms of right, left and two-sided regular ideals.","PeriodicalId":187125,"journal":{"name":"Acta Cybern.","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117244315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Database Slicing on Relational Databases 关系数据库上的数据库切片
Pub Date : 2014-12-01 DOI: 10.14232/actacyb.21.4.2014.6
Dávid Tengeri, F. Havasi
Many software systems today use databases to permanently store their data. Testing, bug finding and migration are complex problems in the case of databases that contain many records. Here, our method can speed up these processes if we can select a smaller piece of the database (called a slice) that contains all of the records belonging to the slicing criterion. The slicing criterion might be, for example, a record which gives rise to a bug in the program. Database slicing seeks to select all the records belonging to a specific slicing criterion. Here, we introduce the concept of database slicing and describe the algorithms and data structures necessary for slicing a given database. We define the Table-based and the Record-based slicing algorithms and we empirically evaluate these methods in two scenarios by applying the slicing to the database of a real-life application and to random generated database content.
如今,许多软件系统都使用数据库来永久存储数据。在包含许多记录的数据库中,测试、查找错误和迁移是复杂的问题。在这里,如果我们可以选择包含属于切片标准的所有记录的较小的数据库片段(称为切片),我们的方法可以加快这些过程。切片标准可能是,例如,在程序中产生错误的记录。数据库切片寻求选择属于特定切片标准的所有记录。在这里,我们介绍了数据库切片的概念,并描述了对给定数据库进行切片所需的算法和数据结构。我们定义了基于表和基于记录的切片算法,并通过将切片应用于实际应用程序的数据库和随机生成的数据库内容,在两种情况下对这些方法进行了经验评估。
{"title":"Database Slicing on Relational Databases","authors":"Dávid Tengeri, F. Havasi","doi":"10.14232/actacyb.21.4.2014.6","DOIUrl":"https://doi.org/10.14232/actacyb.21.4.2014.6","url":null,"abstract":"Many software systems today use databases to permanently store their data. Testing, bug finding and migration are complex problems in the case of databases that contain many records. Here, our method can speed up these processes if we can select a smaller piece of the database (called a slice) that contains all of the records belonging to the slicing criterion. The slicing criterion might be, for example, a record which gives rise to a bug in the program. Database slicing seeks to select all the records belonging to a specific slicing criterion. Here, we introduce the concept of database slicing and describe the algorithms and data structures necessary for slicing a given database. We define the Table-based and the Record-based slicing algorithms and we empirically evaluate these methods in two scenarios by applying the slicing to the database of a real-life application and to random generated database content.","PeriodicalId":187125,"journal":{"name":"Acta Cybern.","volume":"280 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127476719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Convergence Time for Selfish Bin Packing 自私装箱的收敛时间
Pub Date : 2014-09-30 DOI: 10.1007/978-3-662-44803-8_4
G. Dósa, L. Epstein
{"title":"The Convergence Time for Selfish Bin Packing","authors":"G. Dósa, L. Epstein","doi":"10.1007/978-3-662-44803-8_4","DOIUrl":"https://doi.org/10.1007/978-3-662-44803-8_4","url":null,"abstract":"","PeriodicalId":187125,"journal":{"name":"Acta Cybern.","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121835585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
On Nonpermutational Transformation Semigroups with an Application to Syntactic Complexity 非置换变换半群在句法复杂度上的应用
Pub Date : 2014-02-28 DOI: 10.14232/actacyb.22.3.2016.9
Szabolcs Iván, J. Nagy-György
We give an upper bound of nn-1!-n-3! for the possible largestsize of a subsemigroup of the full transformational semigroup overn elements consisting only of nonpermutational transformations.As an application we gain the same upper bound for the syntacticcomplexity of generalized definite languages as well.
我们给出了n-1的上界-n-3!对于仅由非置换变换组成的全变换半群上的子半群的最大可能大小。作为一种应用,我们也得到了广义确定语言的语法复杂度的上界。
{"title":"On Nonpermutational Transformation Semigroups with an Application to Syntactic Complexity","authors":"Szabolcs Iván, J. Nagy-György","doi":"10.14232/actacyb.22.3.2016.9","DOIUrl":"https://doi.org/10.14232/actacyb.22.3.2016.9","url":null,"abstract":"We give an upper bound of nn-1!-n-3! for the possible largestsize of a subsemigroup of the full transformational semigroup overn elements consisting only of nonpermutational transformations.As an application we gain the same upper bound for the syntacticcomplexity of generalized definite languages as well.","PeriodicalId":187125,"journal":{"name":"Acta Cybern.","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133129883","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Asymptotic Proportion of Hard Instances of the Halting Problem 暂停问题难实例的渐近比例
Pub Date : 2013-07-26 DOI: 10.14232/actacyb.21.3.2014.3
A. Valmari
Although the halting problem is undecidable, imperfect testers that fail on some instances are possible. Such instances are called hard for the tester. One variant of imperfect testers replies "I don't know" on hard instances, another variant fails to halt, and yet another replies incorrectly "yes" or "no". Also the halting problem has three variants: does a given program halt on the empty input, does a given program halt when given itself as its input, or does a given program halt on a given input. The failure rate of a tester for some size is the proportion of hard instances among all instances of that size. This publication investigates the behaviour of the failure rate as the size grows without limit. Earlier results are surveyed and new results are proven. Some of them use C++ on Linux as the computational model. It turns out that the behaviour is sensitive to the details of the programming language or computational model, but in many cases it is possible to prove that the proportion of hard instances does not vanish.
虽然暂停问题是无法确定的,但不完美的测试器在某些情况下失败是可能的。这样的实例对测试人员来说是困难的。不完美测试者的一种变体在困难的情况下回答“我不知道”,另一种变体无法停止测试,还有一种变体错误地回答“是”或“否”。暂停问题也有三种变体:给定程序是否在空输入时停止,给定程序是否在给定自身作为其输入时停止,或者给定程序是否在给定输入时停止。对于某种大小的测试器的失败率是该大小的所有实例中硬实例的比例。本出版物调查了失效率的行为,随着尺寸无限制地增长。对先前的结果进行调查,并对新的结果进行验证。其中一些使用Linux上的c++作为计算模型。事实证明,行为对编程语言或计算模型的细节很敏感,但在许多情况下,有可能证明硬实例的比例并没有消失。
{"title":"Asymptotic Proportion of Hard Instances of the Halting Problem","authors":"A. Valmari","doi":"10.14232/actacyb.21.3.2014.3","DOIUrl":"https://doi.org/10.14232/actacyb.21.3.2014.3","url":null,"abstract":"Although the halting problem is undecidable, imperfect testers that fail on some instances are possible. Such instances are called hard for the tester. One variant of imperfect testers replies \"I don't know\" on hard instances, another variant fails to halt, and yet another replies incorrectly \"yes\" or \"no\". Also the halting problem has three variants: does a given program halt on the empty input, does a given program halt when given itself as its input, or does a given program halt on a given input. The failure rate of a tester for some size is the proportion of hard instances among all instances of that size. This publication investigates the behaviour of the failure rate as the size grows without limit. Earlier results are surveyed and new results are proven. Some of them use C++ on Linux as the computational model. It turns out that the behaviour is sensitive to the details of the programming language or computational model, but in many cases it is possible to prove that the proportion of hard instances does not vanish.","PeriodicalId":187125,"journal":{"name":"Acta Cybern.","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-07-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123904973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Variations of the Morse-Hedlund Theorem for k-Abelian Equivalence k-Abelian等价的Morse-Hedlund定理的变体
Pub Date : 2013-02-15 DOI: 10.14232/actacyb.23.1.2017.11
J. Karhumäki, Aleksi Saarela, L. Zamboni
In this paper we investigate local-to-global phenomena for a new family of complexity functions of infinite words indexed by k ∈ ℕ1 ∪ { + ∞ } where ℕ1 denotes the set of positive integers. Two finite words u and v in A * are said to be k-abelian equivalent if for all x ∈ A * of length less than or equal to k, the number of occurrences of x in u is equal to the number of occurrences of x in v. This defines a family of equivalence relations ~ k on A *, bridging the gap between the usual notion of abelian equivalence (when k = 1) and equality (when k = + ∞). Given an infinite word w ∈ A ω , we consider the associated complexity function (mathcal P^{(k)}_w : mathbb N_1 rightarrow mathbb N_1) which counts the number of k-abelian equivalence classes of factors of w of length n. As a whole, these complexity functions have a number of common features: Each gives a characterization of periodicity in the context of bi-infinite words, and each can be used to characterize Sturmian words in the framework of aperiodic one-sided infinite words. Nevertheless, they also exhibit a number of striking differences, the study of which is one of the main topics of our paper.
本文研究了一类新的无限词复杂度函数的局部到全局现象,其索引为k∈_1∪{+∞},其中_1为正整数集。如果对于长度小于或等于k的所有x∈A *, x在u中的出现次数等于x在v中的出现次数,则A *中的两个有限词u和v被称为k-阿贝尔等价,这定义了A *上的一系列等价关系k,弥合了通常的阿贝尔等价(当k = 1)和相等(当k = +∞)之间的差距。给定一个无限词w∈A ω,我们考虑关联的复杂度函数(mathcal P^{(k)}_w : mathbb N_1 rightarrow mathbb N_1),该函数计算长度为n的因子w的k-阿贝尔等价类的个数。总的来说,这些复杂度函数具有许多共同的特征:每个函数都给出了双无限词背景下的周期性表征,每个函数都可以用来表征非周期单侧无限词框架中的Sturmian词。然而,它们也表现出一些显著的差异,这是我们论文的主要主题之一。
{"title":"Variations of the Morse-Hedlund Theorem for k-Abelian Equivalence","authors":"J. Karhumäki, Aleksi Saarela, L. Zamboni","doi":"10.14232/actacyb.23.1.2017.11","DOIUrl":"https://doi.org/10.14232/actacyb.23.1.2017.11","url":null,"abstract":"In this paper we investigate local-to-global phenomena for a new family of complexity functions of infinite words indexed by k ∈ ℕ1 ∪ { + ∞ } where ℕ1 denotes the set of positive integers. Two finite words u and v in A * are said to be k-abelian equivalent if for all x ∈ A * of length less than or equal to k, the number of occurrences of x in u is equal to the number of occurrences of x in v. This defines a family of equivalence relations ~ k on A *, bridging the gap between the usual notion of abelian equivalence (when k = 1) and equality (when k = + ∞). Given an infinite word w ∈ A ω , we consider the associated complexity function (mathcal P^{(k)}_w : mathbb N_1 rightarrow mathbb N_1) which counts the number of k-abelian equivalence classes of factors of w of length n. As a whole, these complexity functions have a number of common features: Each gives a characterization of periodicity in the context of bi-infinite words, and each can be used to characterize Sturmian words in the framework of aperiodic one-sided infinite words. Nevertheless, they also exhibit a number of striking differences, the study of which is one of the main topics of our paper.","PeriodicalId":187125,"journal":{"name":"Acta Cybern.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114992659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
Model-Driven Diagnostics of Underperforming Communicating Systems 表现不佳的通信系统的模型驱动诊断
Pub Date : 2012-12-01 DOI: 10.14232/actacyb.20.4.2012.1
Levente Erös, Tibor Csöndes
This paper proposes methods for improving the performance of a communicatingsystem that has failed its performance test. The proposed methodsextend our earlier published model-driven performance testing method,which automatically determines whether the tested system is ableto serve the specified number of requests within a second in worstcase while serving a specified number of users simultaneously. Theunderperformance diagnostic methods presented in this paper are givenas an input the formal performance model representing the systemunder test, which was built up by our performance testing methodin the performance testing phase. The presented methods aim at improvingthe performance of the system under test to the desired level atminimal cost. One of the methods presented in this paper is a binarylinear program, while the other is a heuristic method which, accordingto our simulation results, performs efficiently.
本文提出了改进性能测试失败的通信系统性能的方法。建议的方法扩展了我们之前发布的模型驱动性能测试方法,该方法自动确定在最坏的情况下,测试系统是否能够在一秒钟内为指定数量的请求提供服务,同时同时为指定数量的用户提供服务。本文提出的性能不足诊断方法是在性能测试阶段用我们的性能测试方法建立的表征被测系统的正式性能模型的输入。所提出的方法旨在以最小的成本将被测系统的性能提高到所需的水平。本文提出的一种方法是二元线性规划,另一种方法是启发式方法,根据我们的仿真结果,启发式方法是有效的。
{"title":"Model-Driven Diagnostics of Underperforming Communicating Systems","authors":"Levente Erös, Tibor Csöndes","doi":"10.14232/actacyb.20.4.2012.1","DOIUrl":"https://doi.org/10.14232/actacyb.20.4.2012.1","url":null,"abstract":"This paper proposes methods for improving the performance of a communicatingsystem that has failed its performance test. The proposed methodsextend our earlier published model-driven performance testing method,which automatically determines whether the tested system is ableto serve the specified number of requests within a second in worstcase while serving a specified number of users simultaneously. Theunderperformance diagnostic methods presented in this paper are givenas an input the formal performance model representing the systemunder test, which was built up by our performance testing methodin the performance testing phase. The presented methods aim at improvingthe performance of the system under test to the desired level atminimal cost. One of the methods presented in this paper is a binarylinear program, while the other is a heuristic method which, accordingto our simulation results, performs efficiently.","PeriodicalId":187125,"journal":{"name":"Acta Cybern.","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114355921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
Acta Cybern.
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1