Pub Date : 1986-12-01DOI: 10.1016/S0019-9958(86)80008-0
H.L. Bodlaender , J. van Leeuwen
Parallel algorithms are normally designed for execution on networks of N processors, with N depending on the size of the problem to be solved. In practice there will be a varying problem size but a fixed network size. In Fishburn and Finkel (IEEE Trans. Comput.31 (1982), 288–295), the notion of network emulation was proposed, to obtain a structure preserving simulation of large networks on smaller networks. We present a detailed analysis of the possible emulations for some important classes of networks, namely: the shuffle-exchange network, the cube network, the ring network, and the 2-dimensional grid. We also study the possibility of cross-emulations, and characterize the networks that can be emulated at all on a given network using some class of emulation functions.
{"title":"Simulation of large networks on smaller networks","authors":"H.L. Bodlaender , J. van Leeuwen","doi":"10.1016/S0019-9958(86)80008-0","DOIUrl":"https://doi.org/10.1016/S0019-9958(86)80008-0","url":null,"abstract":"<div><p>Parallel algorithms are normally designed for execution on networks of <em>N</em> processors, with <em>N</em> depending on the size of the problem to be solved. In practice there will be a varying problem size but a fixed network size. In Fishburn and Finkel (<em>IEEE Trans. Comput.</em> <strong>31</strong> (1982), 288–295), the notion of network emulation was proposed, to obtain a structure preserving simulation of large networks on smaller networks. We present a detailed analysis of the possible emulations for some important classes of networks, namely: the shuffle-exchange network, the cube network, the ring network, and the 2-dimensional grid. We also study the possibility of cross-emulations, and characterize the networks that can be emulated at all on a given network using some class of emulation functions.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"71 3","pages":"Pages 143-180"},"PeriodicalIF":0.0,"publicationDate":"1986-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80008-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91746807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1986-12-01DOI: 10.1016/S0019-9958(86)80012-2
Hans Heller
An oracle X is constructed such that the exponential complexity class ΔEP,X2 equals the probabilistic class R(R(X)). This shows that it will be difficult to prove that ΔEP2 is different from R(R), although it seems very unlikely that these two classes are equal. The result subsumes several known results about relativized computations:
(i)
the existence of relativized polynomial hierarchies extending two levels (Long, T., 1978, Dissertation, Purdue Univ., Lafayette, Ind.; Heller, H., 1984(a), SIAM J. Comput.13, 717–725; Heller, H., 1984(b), Math. Systems Theory17, 71–84);
(ii)
the existence of an oracle X such that BPP(X) ⊄ ΔP,X2 (Stockmeyer, L., 1983, “Proc. 15th STOC” pp. 118–126),
(iii)
the existence of an oracle X such that NP(X) is polynomially Turing reducible to a sparse set (Wilson, C., 1983, “Proc. 24th FOCS,”, pp. 329–334; Immerman, N., and Mahaney, S., 1983, “Conference on Computational Complexity Theory,” Santa Barbara, March 21–25).
The result shows possible inclusion relations for nonrelativized complexity classes and points out that certain results about probabilistic complexity classes and about polynomial size circuits cannot be improved unless methods are applied which do not relativize.
{"title":"On relativized exponential and probabilistic complexity classes","authors":"Hans Heller","doi":"10.1016/S0019-9958(86)80012-2","DOIUrl":"10.1016/S0019-9958(86)80012-2","url":null,"abstract":"<div><p>An oracle <em>X</em> is constructed such that the exponential complexity class <em>Δ</em><sup>EP,<em>X</em></sup><sub>2</sub> equals the probabilistic class R(R(<em>X</em>)). This shows that it will be difficult to prove that <em>Δ</em><sup>EP</sup><sub>2</sub> is different from R(R), although it seems very unlikely that these two classes are equal. The result subsumes several known results about relativized computations:</p><ul><li><span>(i)</span><span><p>the existence of relativized polynomial hierarchies extending two levels (Long, T., 1978, Dissertation, Purdue Univ., Lafayette, Ind.; Heller, H., 1984(a), <em>SIAM J. Comput.</em> <strong>13</strong>, 717–725; Heller, H., 1984(b), <em>Math. Systems Theory</em> <strong>17</strong>, 71–84);</p></span></li><li><span>(ii)</span><span><p>the existence of an oracle <em>X</em> such that BPP(<em>X</em>) ⊄ <em>Δ<sup>P,X</sup></em><sub>2</sub> (Stockmeyer, L., 1983, “Proc. 15th STOC” pp. 118–126),</p></span></li><li><span>(iii)</span><span><p>the existence of an oracle <em>X</em> such that NP(<em>X</em>) is polynomially Turing reducible to a sparse set (Wilson, C., 1983, “Proc. 24th FOCS,”, pp. 329–334; Immerman, N., and Mahaney, S., 1983, “Conference on Computational Complexity Theory,” Santa Barbara, March 21–25).</p></span></li></ul><p>The result shows possible inclusion relations for nonrelativized complexity classes and points out that certain results about probabilistic complexity classes and about polynomial size circuits cannot be improved unless methods are applied which do not relativize.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"71 3","pages":"Pages 231-243"},"PeriodicalIF":0.0,"publicationDate":"1986-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80012-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89604663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1986-12-01DOI: 10.1016/S0019-9958(86)80013-4
{"title":"Author index for volume 71","authors":"","doi":"10.1016/S0019-9958(86)80013-4","DOIUrl":"https://doi.org/10.1016/S0019-9958(86)80013-4","url":null,"abstract":"","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"71 3","pages":"Page 244"},"PeriodicalIF":0.0,"publicationDate":"1986-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80013-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137329301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1986-12-01DOI: 10.1016/S0019-9958(86)80010-9
Chilukuri K. Mohan, Mandayam K. Srivas
The frameworks of unconditional and conditional Term Rewriting and Applicative systems are explored with the objective of using them for defining functions. In particular, a new operational semantics, Tue-Reduction, is elaborated for conditional term rewriting systems. For each framework, the concept of evaluation of terms invoking defined functions is formalized. We then discuss how it may be ensured that a function definition in each of these frameworks is meaningful, by defining restrictions that may be imposed to guarantee termination, unambiguity, and completeness of definition. The three frameworks are then compared, studying when a definition may be translated from one formalism to another.
{"title":"Function definitions in term rewriting and applicative programming","authors":"Chilukuri K. Mohan, Mandayam K. Srivas","doi":"10.1016/S0019-9958(86)80010-9","DOIUrl":"https://doi.org/10.1016/S0019-9958(86)80010-9","url":null,"abstract":"<div><p>The frameworks of unconditional and conditional Term Rewriting and Applicative systems are explored with the objective of using them for defining functions. In particular, a new operational semantics, <em>Tue-Reduction</em>, is elaborated for conditional term rewriting systems. For each framework, the concept of <em>evaluation</em> of terms invoking defined functions is formalized. We then discuss how it may be ensured that a function definition in each of these frameworks is meaningful, by defining restrictions that may be imposed to guarantee <em>termination, unambiguity</em>, and <em>completeness</em> of definition. The three frameworks are then compared, studying when a definition may be translated from one formalism to another.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"71 3","pages":"Pages 186-217"},"PeriodicalIF":0.0,"publicationDate":"1986-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80010-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91746806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1986-12-01DOI: 10.1016/S0019-9958(86)80009-2
Christos H. Papadimitriou, Mihalis Yannakakis
Galperin and Wigderson (Inform. and Control56 (1983), 183–198) showed that certain trivial graph properties become NP-complete when the graph is represented in a particular exponentially succinct way. We show that under the same representation, graph properties that are ordinarily NP-complete become complete for non-deterministic exponential time.
{"title":"A note on succinct representations of graphs","authors":"Christos H. Papadimitriou, Mihalis Yannakakis","doi":"10.1016/S0019-9958(86)80009-2","DOIUrl":"https://doi.org/10.1016/S0019-9958(86)80009-2","url":null,"abstract":"<div><p>Galperin and Wigderson (<em>Inform. and Control</em> <strong>56</strong> (1983), 183–198) showed that certain trivial graph properties become NP-complete when the graph is represented in a particular exponentially succinct way. We show that under the same representation, graph properties that are ordinarily NP-complete become complete for non-deterministic exponential time.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"71 3","pages":"Pages 181-185"},"PeriodicalIF":0.0,"publicationDate":"1986-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80009-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91708762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1986-12-01DOI: 10.1016/S0019-9958(86)80011-0
K. Culik II, J. Gruska, A. Salomaa
Systolic trellis automata are models of hexagonally connected and triangularly shaped systolic arrays. This paper studies the problems of stability, decidability, and complexity for them. The original definition of systolic trellis automata requires that an input string is fed to a specific row of processors. Here it is shown that given a homogeneous trellis automaton we can construct an equivalent one (stable or superstable) which allows to feed the input string to any sufficiently long row of processors. Moreover, some closure and decidability results for trellis automata are established and the computational complexity of languages accepted by trellis automata is investigated.
{"title":"Systolic trellis automata: Stability, decidability and complexity","authors":"K. Culik II, J. Gruska, A. Salomaa","doi":"10.1016/S0019-9958(86)80011-0","DOIUrl":"10.1016/S0019-9958(86)80011-0","url":null,"abstract":"<div><p>Systolic trellis automata are models of hexagonally connected and triangularly shaped systolic arrays. This paper studies the problems of stability, decidability, and complexity for them. The original definition of systolic trellis automata requires that an input string is fed to a specific row of processors. Here it is shown that given a homogeneous trellis automaton we can construct an equivalent one (stable or superstable) which allows to feed the input string to any sufficiently long row of processors. Moreover, some closure and decidability results for trellis automata are established and the computational complexity of languages accepted by trellis automata is investigated.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"71 3","pages":"Pages 218-230"},"PeriodicalIF":0.0,"publicationDate":"1986-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80011-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76946741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1986-10-01DOI: 10.1016/S0019-9958(86)80017-1
Hirofumi Yokouchi
This paper deals with categorical models of the λ-calculus. We generalize the inverse limit method Scott used for his construction of D∞, and introduce order-enriched ccc's, retraction map categories and ɛ-categories. An order-enriched ccc is a cartesian closed category C equipped with a partial order relation ⩽ on the set of the arrows. A retraction map category of C is R=(R, ⩽, i, j), where ⩽ is a partial order relation on the set |C| of all the objects of C, R is the category of the poset (|C|, ⩽), and i and j are functors from R to C and from Rop to C that satisfy the conditions: (1) j a, b ∘ i a, b ⩾ ida and (2) i a, b ∘ j a, b ⩽ idb for every arrow a, b: a → b in R (i.e., a⩽b). The ɛ-category E=E(C, R) of C w.r.t. R is the category whose objects are ideals of (|C|, ⩽) and whose arrows are ideals of (C, ⊑), where ⩽ is the partial order relation in R and ⊑ is the partial order relation defined by f ⊑ g iff dom(f)⩽dom(g), cod(f)⩽cod(g) in R and f⩽j a, b ∘ g ∘ i(a, b in C. We show that every ɛ-category E=E(C, R) is also an order-enriched ccc. Moreover when E and R satisfy a particular condition, E(C, R) has a reflexive object. For example, if there is an ideal U of (|C|, ⩽) satisfying the following conditions, then U is isomorphic to UU in E and a λ-algebra is constructed from E and U: (1) for every pair of a, b ∈ U, U contains ba, and (2) for every c ∈ U, there are a, b ∈ U such that c ∈ ba. We reconstruct Pω and D∞ using ɛ-categories.
本文讨论了λ微积分的范畴模型。我们推广了Scott用于构造D∞的逆极限方法,并引入了富序ccc、缩回映射范畴和i -范畴。富序ccc是在箭头集合上具有偏序关系的笛卡尔闭范畴C。收缩映射一类C R = (R,⩽,i, j),其中⩽是一个偏序关系在C | |所有对象的C, R是偏序集的类别(C | |⩽)和i和j函数子从罗普R C和C,满足条件:(1)j,我∘A, b⩾ida和(2)我,b∘j A, b⩽idb对于每一个箭头,b: A→b R(也就是说,⩽b)。的ɛ类别E = E (C, R) C R关于类别的对象是理想的(C | |⩽)和箭的理想(C,⊑),其中⩽是偏序关系在R和⊑是偏序关系定义为f⊑g iff dom (f)⩽dom (g),鳕鱼(f)⩽鳕鱼(g)在R和f⩽j a, b∘g∘我(a, b, C,我们表明,每个ɛ类别E = E (C, R)也是一个order-enriched ccc。当E和R满足特定条件时,E(C, R)有一个自反对象。例如,如果有一个理想U (|C|,≤)满足下列条件,则U与E中的UU同构,由E和U构造出λ代数:(1)对于每一对a, b∈U, U包含ba;(2)对于每一对C∈U,存在a, b∈U使得C∈ba。我们用i -范畴重构了Pω和D∞。
{"title":"Retraction map categories and their applications to the construction of lambda calculus models","authors":"Hirofumi Yokouchi","doi":"10.1016/S0019-9958(86)80017-1","DOIUrl":"10.1016/S0019-9958(86)80017-1","url":null,"abstract":"<div><p>This paper deals with categorical models of the λ-calculus. We generalize the inverse limit method Scott used for his construction of <em>D</em><sub>∞</sub>, and introduce order-enriched ccc's, retraction map categories and ɛ-categories. An order-enriched ccc is a cartesian closed category <strong>C</strong> equipped with a partial order relation ⩽ on the set of the arrows. A retraction map category of <strong>C</strong> is <strong>R</strong>=(<strong>R</strong>, ⩽, <em>i</em>, <em>j</em>), where ⩽ is a partial order relation on the set |<strong>C</strong>| of all the objects of <strong>C</strong>, <strong>R</strong> is the category of the poset (|<strong>C</strong>|, ⩽), and <em>i</em> and <em>j</em> are functors from <strong>R</strong> to <strong>C</strong> and from <strong>R</strong><sup>op</sup> to <strong>C</strong> that satisfy the conditions: (1) <em>j a</em>, <em>b</em> ∘ <em>i a</em>, <em>b</em> ⩾ id<em><sub>a</sub></em> and (2) <em>i a</em>, <em>b</em> ∘ <em>j a</em>, <em>b</em> ⩽ id<em><sub>b</sub></em> for every arrow <em>a</em>, <em>b</em>: <em>a</em> → <em>b</em> in <strong>R</strong> (i.e., <em>a</em>⩽<em>b</em>). The ɛ-category <strong>E</strong>=<strong>E</strong>(<strong>C</strong>, <strong>R</strong>) of <strong>C</strong> w.r.t. <strong>R</strong> is the category whose objects are ideals of (|<strong>C</strong>|, ⩽) and whose arrows are ideals of (<strong>C</strong>, ⊑), where ⩽ is the partial order relation in <strong>R</strong> and ⊑ is the partial order relation defined by <em>f</em> ⊑ <em>g</em> iff dom(<em>f</em>)⩽dom(<em>g</em>), cod(<em>f</em>)⩽cod(<em>g</em>) in <strong>R</strong> and <em>f</em>⩽<em>j a</em>, <em>b</em> ∘ <em>g</em> ∘ <em>i</em>(<em>a</em>, <em>b</em> in <strong>C</strong>. We show that every ɛ-category <strong>E</strong>=<strong>E</strong>(<strong>C</strong>, <strong>R</strong>) is also an order-enriched ccc. Moreover when <strong>E</strong> and <strong>R</strong> satisfy a particular condition, <strong>E</strong>(<strong>C</strong>, <strong>R</strong>) has a reflexive object. For example, if there is an ideal <em>U</em> of (|<strong>C</strong>|, ⩽) satisfying the following conditions, then <em>U</em> is isomorphic to <em>U<sup>U</sup></em> in <strong>E</strong> and a λ-algebra is constructed from <strong>E</strong> and <em>U</em>: (1) for every pair of <em>a</em>, <em>b</em> ∈ <em>U</em>, <em>U</em> contains <em>b<sup>a</sup></em>, and (2) for every <em>c</em> ∈ <em>U</em>, there are <em>a</em>, <em>b</em> ∈ <em>U</em> such that <em>c</em> ∈ <em>b<sup>a</sup></em>. We reconstruct <em>P</em><sub>ω</sub> and <em>D</em><sub>∞</sub> using ɛ-categories.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"71 1","pages":"Pages 33-86"},"PeriodicalIF":0.0,"publicationDate":"1986-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80017-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85597596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1986-10-01DOI: 10.1016/S0019-9958(86)80020-1
Marek Karpinski, Rutger Verbeek
Borodin, Cook, and Pippenger (Inform. and Control58 (1983), 96–114) proved that both probabilistic acceptors and transducers working in space S(n) ⩾ log n can be simulated by deterministic machines in O(S(n)2) space. The definition of probabilistic computations uses one-way read-only random tape. Borodin et al. asked: “Is it possible to extend our simulation results to the case of a two-way read-only oracle head?” In the same vein Furst, Lipton, and Stockmeyer (Inform. and Control64 (1985), 43–51) suggested that it could be a difference between two-way and one-way random tape: “…for space bounded probabilistic computations where the space bound is much less than the length of y, it could matter.” (y denoting the random tape inscription.) In this paper we give a full characterization of two-way random space classes that answers both questions. Karpinski and Verbeek (“There is no Polynomial Deterministic Space Simulation of Probabilistic Space with Two-way Random-Tape Generator,” Inform. and Control67 (1985), 158–162) proved that there is no polynomial deterministic space simulation of two-way random space without giving any recursive upper bound. The results of this paper solved the open questions of Karpinski and Verbeek, 1985, Karpinski and Verbeek, 1985 and gave full characterization in sense of upper and lower deterministic space classes: they are proved precisely exponentially more powerful than the corresponding one-way classes.
{"title":"On the power of two-way random generators and the impossibility of deterministic poly-space simulation","authors":"Marek Karpinski, Rutger Verbeek","doi":"10.1016/S0019-9958(86)80020-1","DOIUrl":"10.1016/S0019-9958(86)80020-1","url":null,"abstract":"<div><p>Borodin, Cook, and Pippenger (<em>Inform. and Control</em> <strong>58</strong> (1983), 96–114) proved that both probabilistic acceptors and transducers working in space <em>S</em>(<em>n</em>) ⩾ log <em>n</em> can be simulated by deterministic machines in <em>O</em>(<em>S</em>(<em>n</em>)<sup>2</sup>) space. The definition of probabilistic computations uses one-way read-only random tape. Borodin <em>et al.</em> asked: “Is it possible to extend our simulation results to the case of a two-way read-only oracle head?” In the same vein Furst, Lipton, and Stockmeyer (<em>Inform. and Control</em> <strong>64</strong> (1985), 43–51) suggested that it could be a difference between two-way and one-way random tape: “…for space bounded probabilistic computations where the space bound is much less than the length of <em>y</em>, it could matter.” (<em>y</em> denoting the random tape inscription.) In this paper we give a full characterization of two-way random space classes that answers both questions. Karpinski and Verbeek (“There is <em>no</em> Polynomial Deterministic Space Simulation of Probabilistic Space with Two-way Random-Tape Generator,” <em>Inform. and Control</em> <strong>67</strong> (1985), 158–162) proved that there is <em>no</em> polynomial deterministic space simulation of two-way random space without giving any recursive upper bound. The results of this paper solved the open questions of <span>Karpinski and Verbeek, 1985</span>, <span>Karpinski and Verbeek, 1985</span> and gave full characterization in sense of upper and lower deterministic space classes: they are proved precisely exponentially more powerful than the corresponding one-way classes.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"71 1","pages":"Pages 131-142"},"PeriodicalIF":0.0,"publicationDate":"1986-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80020-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72374302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1986-10-01DOI: 10.1016/S0019-9958(86)80016-X
Werner Damm, Andreas Goerdt
This paper gives an automata-theoretical characterization of the OI-hierarchy (Damm (1982), Engelfriet and Schmidt (1977), Wand (1975)). This hierarchy is generated by so-called level-n grammars which are natural generalizations from context free and macro grammars in that their nonterminals are treated as functionals of higher type, i.e., they are allowed to carry up to n levels of parameters. The automata model used for this characterization is the n-iterated pushdown automaton. Its characteristic feature is the storage structure which consists of a nesting of pushdowns up to nesting depth n. The equivalence proof is given constructively, its method is illustrated using examples. By viewing level-n grammars as modeling recursive procedures on higher types the iterated pushdown automation thus provides an operational model for the run-time behavior of procedures defined by recursion on higher types which makes the results of this paper interesting not only from a language theoretical point of view.
{"title":"An automata-theoretical characterization of the OI-hierarchy","authors":"Werner Damm, Andreas Goerdt","doi":"10.1016/S0019-9958(86)80016-X","DOIUrl":"10.1016/S0019-9958(86)80016-X","url":null,"abstract":"<div><p>This paper gives an automata-theoretical characterization of the OI-hierarchy (<span>Damm (1982)</span>, <span>Engelfriet and Schmidt (1977)</span>, <span>Wand (1975)</span>). This hierarchy is generated by so-called level-<em>n</em> grammars which are natural generalizations from context free and macro grammars in that their nonterminals are treated as functionals of higher type, i.e., they are allowed to carry up to <em>n</em> levels of parameters. The automata model used for this characterization is the <em>n</em>-iterated pushdown automaton. Its characteristic feature is the storage structure which consists of a nesting of pushdowns up to nesting depth <em>n</em>. The equivalence proof is given constructively, its method is illustrated using examples. By viewing level-<em>n</em> grammars as modeling recursive procedures on higher types the iterated pushdown automation thus provides an operational model for the run-time behavior of procedures defined by recursion on higher types which makes the results of this paper interesting not only from a language theoretical point of view.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"71 1","pages":"Pages 1-32"},"PeriodicalIF":0.0,"publicationDate":"1986-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80016-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79193237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}