Pub Date : 1986-07-01DOI: 10.1016/S0019-9958(86)80022-5
Paolo Atzeni, Nicola M. Morfuni
Database relations with incomplete information are considered. The no-information interpretation of null values is adopted, due to its characteristics of generality and naturalness. Coherently with the framework and its motivation, two meaningful classes of integrity constraints are studied: (a) functional dependencies, which have been widely investigated in the classical relational theory and (b) constraints on null values, which control the presence of nulls in the relations. Specifically, three types of constraints on null values are taken into account (nullfree subschemes, existence constraints, disjunctive existence constraints), and the interaction of each of them with functional dependencies is studied. In each of the three cases, the inference problem is solved, the complexity of the algorithms for its solution analyzed, and the existence of a complete axiomatization discussed.
{"title":"Functional dependencies and constraints on null values in database relations","authors":"Paolo Atzeni, Nicola M. Morfuni","doi":"10.1016/S0019-9958(86)80022-5","DOIUrl":"10.1016/S0019-9958(86)80022-5","url":null,"abstract":"<div><p>Database relations with incomplete information are considered. The no-information interpretation of null values is adopted, due to its characteristics of generality and naturalness. Coherently with the framework and its motivation, two meaningful classes of integrity constraints are studied: (a) functional dependencies, which have been widely investigated in the classical relational theory and (b) constraints on null values, which control the presence of nulls in the relations. Specifically, three types of constraints on null values are taken into account (nullfree subschemes, existence constraints, disjunctive existence constraints), and the interaction of each of them with functional dependencies is studied. In each of the three cases, the inference problem is solved, the complexity of the algorithms for its solution analyzed, and the existence of a complete axiomatization discussed.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"70 1","pages":"Pages 1-31"},"PeriodicalIF":0.0,"publicationDate":"1986-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80022-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87820193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1986-07-01DOI: 10.1016/S0019-9958(86)80025-0
Daniel N. Osherson, Michael Stob, Scott Weinstein
The aggregation problem is to design an inferential agent that makes intelligent use of the theories offered by a team of inductive inference machines working in a common environment. The present paper formulates several versions of the aggregation problem and investigates them from a recursion theoretic point of view.
{"title":"Aggregating inductive expertise","authors":"Daniel N. Osherson, Michael Stob, Scott Weinstein","doi":"10.1016/S0019-9958(86)80025-0","DOIUrl":"10.1016/S0019-9958(86)80025-0","url":null,"abstract":"<div><p>The aggregation problem is to design an inferential agent that makes intelligent use of the theories offered by a team of inductive inference machines working in a common environment. The present paper formulates several versions of the aggregation problem and investigates them from a recursion theoretic point of view.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"70 1","pages":"Pages 69-95"},"PeriodicalIF":0.0,"publicationDate":"1986-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80025-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87699462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1986-07-01DOI: 10.1016/S0019-9958(86)80023-7
Richard Cole , Uzi Vishkin
The following problem is considered: given a linked list of length n, compute the distance from each element of the linked list to the end of the list. The problem has two standard deterministic algorithms: a linear time serial algorithm, and an O(log n) time parallel algorithm using n processors. We present new deterministic parallel algorithms for the problem. Our strongest results are (1) O(log n log* n) time using n/(log n log* n) processors (this algorithm achieves optimal speed-up); (2) O(log n) time using n log(k)n/log n processors, for any fixed positive integer k. The algorithms apply a novel “random-like” deterministic technique. This technique provides for a fast and efficient breaking of an apparently symmetric situation in parallel and distributed computation.
考虑以下问题:给定一个长度为n的链表,计算链表中每个元素到链表末尾的距离。这个问题有两种标准的确定性算法:一种是线性时间序列算法,另一种是使用n个处理器的O(log n)时间并行算法。针对这一问题,我们提出了新的确定性并行算法。我们最强的结果是(1)O(log n log* n)时间使用n/(log n log* n)处理器(该算法实现了最佳加速);(2)对于任何固定的正整数k,使用n log(k)n/log n个处理器,耗时O(log n)。该算法应用了一种新颖的“随机”确定性技术。这种技术可以在并行和分布式计算中快速有效地打破明显对称的情况。
{"title":"Deterministic coin tossing with applications to optimal parallel list ranking","authors":"Richard Cole , Uzi Vishkin","doi":"10.1016/S0019-9958(86)80023-7","DOIUrl":"10.1016/S0019-9958(86)80023-7","url":null,"abstract":"<div><p>The following problem is considered: given a linked list of length <em>n</em>, compute the distance from each element of the linked list to the end of the list. The problem has two standard deterministic algorithms: a linear time serial algorithm, and an <em>O</em>(log <em>n</em>) time parallel algorithm using <em>n</em> processors. We present new deterministic parallel algorithms for the problem. Our strongest results are (1) <em>O</em>(log <em>n</em> log* <em>n</em>) time using <em>n</em>/(log <em>n</em> log* <em>n</em>) processors (this algorithm achieves optimal speed-up); (2) <em>O</em>(log <em>n</em>) time using <em>n</em> log<sup>(<em>k</em>)</sup><em>n</em>/log <em>n</em> processors, for any fixed positive integer <em>k</em>. The algorithms apply a novel “random-like” deterministic technique. This technique provides for a fast and efficient breaking of an apparently symmetric situation in parallel and distributed computation.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"70 1","pages":"Pages 32-53"},"PeriodicalIF":0.0,"publicationDate":"1986-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80023-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73500317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1986-04-01DOI: 10.1016/S0019-9958(86)80048-1
Joel I. Seiferas
For on-line recognition of the words in an arbitrary linear context-free language, there are known tight bounds on the time required by a deterministic multitape Turing machine. In terms of word length n, the time need never be worse than some constant times n2, even if only one worktape is available; and there is a linear context-free language that requires at least time proportional to n2/log n, no matter how many worktapes are available. Using Kolmogorov's notion of descriptional complexity as a tool, we present a simple proof of the latter result.
{"title":"A simplified lower bound for context-free-language recognition","authors":"Joel I. Seiferas","doi":"10.1016/S0019-9958(86)80048-1","DOIUrl":"10.1016/S0019-9958(86)80048-1","url":null,"abstract":"<div><p>For on-line recognition of the words in an arbitrary linear context-free language, there are known tight bounds on the time required by a deterministic multitape Turing machine. In terms of word length <em>n</em>, the time need never be worse than some constant times <em>n</em><sup>2</sup>, even if only one worktape is available; and there is a linear context-free language that requires at least time proportional to <em>n</em><sup>2</sup>/log <em>n</em>, no matter how many worktapes are available. Using Kolmogorov's notion of descriptional complexity as a tool, we present a simple proof of the latter result.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"69 1","pages":"Pages 255-260"},"PeriodicalIF":0.0,"publicationDate":"1986-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80048-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91330784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1986-04-01DOI: 10.1016/S0019-9958(86)80049-3
{"title":"Author index for volume 69","authors":"","doi":"10.1016/S0019-9958(86)80049-3","DOIUrl":"https://doi.org/10.1016/S0019-9958(86)80049-3","url":null,"abstract":"","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"69 1","pages":"Page 261"},"PeriodicalIF":0.0,"publicationDate":"1986-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80049-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92049874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1986-04-01DOI: 10.1016/S0019-9958(86)80045-6
Grzegorz Rozenberg, Emo Welzl
Node label controlled (NLC) grammars are graph grammars (operating on node labeled undirected graphs) which rewrite single nodes only and establish connections between the embedded graph and the neighbors of the rewritten node on the basis of the labels of the involved nodes only. They define (possibly infinite) languages of undirected node labeled graphs (or, if we just omit the labels, languages of unlabeled graphs). Here we consider a restriction of NLC grammars, so-called boundary NLC (BNLC) grammars, distinguished by the property that whenever in a graph already generated two nodes may be rewritten, then these nodes are not adjacent. The graph languages generated by this type of grammars are called BNLC languages. Although we show that this restriction leads to a smaller class of languages, still enough generative power remains to define interesting graph languages. For example, trees, complete bipartite graphs, maximal outerplanar graphs, k-trees, graphs of bandwidth ⩽k, graphs of cyclic bandwidth ⩽k, graphs of binary tree bandwidth ⩽k, graphs of cutwidth ⩽k (always for a fixed positive integer k) turn out all to be BNLC languages. We prove a number of normal forms for BNLC grammars and then we indicate their usefulness by various applications. In particular, we show that for connected graphs of bounded degree the membership problem for BNLC languages is solvable in deterministic polynomial time.
{"title":"Boundary NLC graph grammars—Basic definitions, normal forms, and complexity","authors":"Grzegorz Rozenberg, Emo Welzl","doi":"10.1016/S0019-9958(86)80045-6","DOIUrl":"10.1016/S0019-9958(86)80045-6","url":null,"abstract":"<div><p><em>Node label controlled</em> (NLC) <em>grammars</em> are graph grammars (operating on node labeled undirected graphs) which rewrite single nodes only and establish connections between the embedded graph and the neighbors of the rewritten node on the basis of the labels of the involved nodes only. They define (possibly infinite) languages of undirected node labeled graphs (or, if we just omit the labels, languages of unlabeled graphs). Here we consider a restriction of NLC grammars, so-called <em>boundary</em> NLC (BNLC) <em>grammars</em>, distinguished by the property that whenever in a graph already generated two nodes may be rewritten, then these nodes are not adjacent. The graph languages generated by this type of grammars are called BNLC <em>languages</em>. Although we show that this restriction leads to a smaller class of languages, still enough generative power remains to define interesting graph languages. For example, trees, complete bipartite graphs, maximal outerplanar graphs, <em>k</em>-trees, graphs of bandwidth ⩽<em>k</em>, graphs of cyclic bandwidth ⩽<em>k</em>, graphs of binary tree bandwidth ⩽<em>k</em>, graphs of cutwidth ⩽<em>k</em> (always for a fixed positive integer <em>k</em>) turn out all to be BNLC languages. We prove a number of normal forms for BNLC grammars and then we indicate their usefulness by various applications. In particular, we show that for connected graphs of bounded degree the membership problem for BNLC languages is solvable in deterministic polynomial time.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"69 1","pages":"Pages 136-167"},"PeriodicalIF":0.0,"publicationDate":"1986-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80045-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83614792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1986-04-01DOI: 10.1016/S0019-9958(86)80041-9
Steve Homer , John Reif
This paper considers a number of arithmetic theories and shows how the strength of these theories relates to certain open problems in complexity theory concerning the polynomial-time hierarchy. These results are proved quite generally and hold for a wide class of subrecursive hierarchies. They can be used to characterize certain properties of functions provable in these theories.
{"title":"Arithmetic theories for computational complexity problems","authors":"Steve Homer , John Reif","doi":"10.1016/S0019-9958(86)80041-9","DOIUrl":"10.1016/S0019-9958(86)80041-9","url":null,"abstract":"<div><p>This paper considers a number of arithmetic theories and shows how the strength of these theories relates to certain open problems in complexity theory concerning the polynomial-time hierarchy. These results are proved quite generally and hold for a wide class of subrecursive hierarchies. They can be used to characterize certain properties of functions provable in these theories.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"69 1","pages":"Pages 1-11"},"PeriodicalIF":0.0,"publicationDate":"1986-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80041-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87650595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1986-04-01DOI: 10.1016/S0019-9958(86)80042-0
Robert P. Daley, Carl H. Smith
The notion of the complexity of performing an inductive inference is defined. Some examples of the tradeoffs between the complexity of performing an inference and the accuracy of the inferred result are presented. An axiomatization of the notion of the complexity of inductive inference is developed and several results are presented which both resemble and contrast with results obtainable for the axiomatic computational complexity of recursive functions.
{"title":"On the complexity of inductive inference","authors":"Robert P. Daley, Carl H. Smith","doi":"10.1016/S0019-9958(86)80042-0","DOIUrl":"10.1016/S0019-9958(86)80042-0","url":null,"abstract":"<div><p>The notion of the complexity of performing an inductive inference is defined. Some examples of the tradeoffs between the complexity of performing an inference and the accuracy of the inferred result are presented. An axiomatization of the notion of the complexity of inductive inference is developed and several results are presented which both resemble and contrast with results obtainable for the axiomatic computational complexity of recursive functions.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"69 1","pages":"Pages 12-40"},"PeriodicalIF":0.0,"publicationDate":"1986-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80042-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74141191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1986-04-01DOI: 10.1016/S0019-9958(86)80047-X
P.-L. Curien
Our main aim is to present the connection between λ-calculus and Cartesian closed categories both in an untyped and purely syntactic setting. More specifically we establish a syntactic equivalence theorem between what we call categorical combinatory logic and λ-calculus with explicit products and projections, with β and η-rules as well as with surjective pairing. “Combinatory logic” is of course inspired by Curry's combinatory logic, based on the well-known S, K, I. Our combinatory logic is “categorical” because its combinators and rules are obtained by extracting untyped information from Cartesian closed categories (looking at arrows only, thus forgetting about objects). Compiling λ-calculus into these combinators happens to be natural and provokes only n log n code expansion. Moreover categorical combinatory logic is entirely faithful to β-reduction where combinatory logic needs additional rather complex and unnatural axioms to be. The connection easily extends to the corresponding typed calculi, where typed categorical combinatory logic is a free Cartesian closed category where the notion of terminal object is replaced by the explicit manipulation of applying (a function to its argument) and coupling (arguments to build datas in products). Our syntactic equivalences induce equivalences at the model level. The paper is intended as a mathematical foundation for developing implementations of functional programming languages based on a “categorical abstract machine,” as developed in a companion paper (Cousineau, Curien, and Mauny, in “Proceedings, ACM Conf. on Functional Programming Languages and Computer Architecture,” Nancy, 1985).
{"title":"Categorical combinators","authors":"P.-L. Curien","doi":"10.1016/S0019-9958(86)80047-X","DOIUrl":"10.1016/S0019-9958(86)80047-X","url":null,"abstract":"<div><p>Our main aim is to present the connection between <em>λ</em>-calculus and Cartesian closed categories both in an untyped and purely syntactic setting. More specifically we establish a syntactic equivalence theorem between what we call categorical combinatory logic and <em>λ</em>-calculus with explicit products and projections, with <em>β</em> and <em>η</em>-rules as well as with surjective pairing. “Combinatory logic” is of course inspired by Curry's combinatory logic, based on the well-known <em>S</em>, <em>K</em>, <em>I</em>. Our combinatory logic is “categorical” because its combinators and rules are obtained by extracting untyped information from Cartesian closed categories (looking at arrows only, thus forgetting about objects). Compiling <em>λ</em>-calculus into these combinators happens to be natural and provokes only <em>n</em> log <em>n</em> code expansion. Moreover categorical combinatory logic is entirely faithful to <em>β</em>-reduction where combinatory logic needs additional rather complex and unnatural axioms to be. The connection easily extends to the corresponding typed calculi, where typed categorical combinatory logic is a free Cartesian closed category where the notion of terminal object is replaced by the explicit manipulation of applying (a function to its argument) and coupling (arguments to build datas in products). Our syntactic equivalences induce equivalences at the model level. The paper is intended as a mathematical foundation for developing implementations of functional programming languages based on a “categorical abstract machine,” as developed in a companion paper (<span>Cousineau, Curien, and Mauny, <em>in</em> “Proceedings, ACM Conf. on Functional Programming Languages and Computer Architecture,” Nancy, 1985</span>).</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"69 1","pages":"Pages 188-254"},"PeriodicalIF":0.0,"publicationDate":"1986-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80047-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73755667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1986-04-01DOI: 10.1016/S0019-9958(86)80046-8
Mikhail J. Atallah, Susanne E. Hambrusch
In this paper we present techniques that result in time algorithms for computing many properties and functions of an n-node forest stored in an mesh of processors. Our algorithms include computing simple properties like the depth, the height, the number of descendents, the preorder (resp. postorder, inorder) number of every node, and a solution to the more complex problem of computing the Minimax value of a game tree. Our algorithms are asymptotically optimal since any nontrivial computation will require time on the mesh. All of our algorithms generalize to higher dimensional meshes.
{"title":"Solving tree problems on a mesh-connected processor array","authors":"Mikhail J. Atallah, Susanne E. Hambrusch","doi":"10.1016/S0019-9958(86)80046-8","DOIUrl":"https://doi.org/10.1016/S0019-9958(86)80046-8","url":null,"abstract":"<div><p>In this paper we present techniques that result in <span><math><mrow><mi>O</mi><mo>(</mo><msqrt><mi>n</mi></msqrt><mo>)</mo></mrow></math></span> time algorithms for computing many properties and functions of an <em>n</em>-node forest stored in an <span><math><mrow><msqrt><mi>n</mi></msqrt><mo>×</mo><msqrt><mi>n</mi></msqrt></mrow></math></span> mesh of processors. Our algorithms include computing simple properties like the depth, the height, the number of descendents, the preorder (resp. postorder, inorder) number of every node, and a solution to the more complex problem of computing the Minimax value of a game tree. Our algorithms are asymptotically optimal since any nontrivial computation will require <span><math><mrow><mi>Ω</mi><mo>(</mo><msqrt><mi>n</mi></msqrt><mo>)</mo></mrow></math></span> time on the mesh. All of our algorithms generalize to higher dimensional meshes.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"69 1","pages":"Pages 168-187"},"PeriodicalIF":0.0,"publicationDate":"1986-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80046-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92050864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}