Pub Date : 1986-01-01DOI: 10.1016/S0019-9958(86)80039-0
{"title":"Author index for volume 68","authors":"","doi":"10.1016/S0019-9958(86)80039-0","DOIUrl":"https://doi.org/10.1016/S0019-9958(86)80039-0","url":null,"abstract":"","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"68 1","pages":"Page 271"},"PeriodicalIF":0.0,"publicationDate":"1986-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80039-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136432913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1986-01-01DOI: 10.1016/S0019-9958(86)80035-3
Dung T. Huynh
The complexity of the normal form algorithms which transform a given polynomial ideal basis into a Gröbner basis or a given commutative Thue system into a Church-Rosser system is presently unknown. In this paper we derive a double-exponential lower bound (22nC) for the production length and cardinality of Church-Rosser commutative Thue systems, and the degree and cardinality of Gröbner bases.
{"title":"A superexponential lower bound for Gröbner bases and Church-Rosser commutative thue systems","authors":"Dung T. Huynh","doi":"10.1016/S0019-9958(86)80035-3","DOIUrl":"10.1016/S0019-9958(86)80035-3","url":null,"abstract":"<div><p>The complexity of the normal form algorithms which transform a given polynomial ideal basis into a Gröbner basis or a given commutative Thue system into a Church-Rosser system is presently unknown. In this paper we derive a double-exponential lower bound (2<sup>2<em>n</em>C</sup>) for the production length and cardinality of Church-Rosser commutative Thue systems, and the degree and cardinality of Gröbner bases.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"68 1","pages":"Pages 196-206"},"PeriodicalIF":0.0,"publicationDate":"1986-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80035-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83356963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1986-01-01DOI: 10.1016/S0019-9958(86)80028-6
Nancy A. Lynch, Nancy D. Griffeth, Michael J. Fischer, Leonidas J. Guibas
A distributed algorithm is presented, for allocating a large number of identical resources (such as airline tickets) to requests which can arrive anywhere in a distributed network. Resources, once allocated, are never returned. The algorithm searches sequentially, exhausting certain neighborhoods of the request origin before proceeding to search at greater distances. Choice of search direction is made non-deterministically. Analysis of expected response time is simplified by assuming that the search direction is chosen probabilistically, that messages require constant time, that the network is a tree with all leaves at the same distance from the root, and that requests and resources occur only at leaves. It is shown that the response time is approximated by the number of messages of one type that are sent during the execution of the algorithm, and that this number of messages is a nondecreasing function of the interarrival time for requests. Therefore, the worst case occurs when requests come in so far apart that they are processed sequentially. The expected time for the sequential case of the algorithm is analyzed by standard techniques. This time is shown to be bounded by a constant, independent of the size of the network. It follows that the expected response time for the algorithm is bounded in the same way.
{"title":"Probabilistic analysis of a network resource allocation algorithm","authors":"Nancy A. Lynch, Nancy D. Griffeth, Michael J. Fischer, Leonidas J. Guibas","doi":"10.1016/S0019-9958(86)80028-6","DOIUrl":"10.1016/S0019-9958(86)80028-6","url":null,"abstract":"<div><p>A distributed algorithm is presented, for allocating a large number of identical resources (such as airline tickets) to requests which can arrive anywhere in a distributed network. Resources, once allocated, are never returned. The algorithm searches sequentially, exhausting certain neighborhoods of the request origin before proceeding to search at greater distances. Choice of search direction is made non-deterministically. Analysis of expected response time is simplified by assuming that the search direction is chosen probabilistically, that messages require constant time, that the network is a tree with all leaves at the same distance from the root, and that requests and resources occur only at leaves. It is shown that the response time is approximated by the number of messages of one type that are sent during the execution of the algorithm, and that this number of messages is a nondecreasing function of the interarrival time for requests. Therefore, the worst case occurs when requests come in so far apart that they are processed sequentially. The expected time for the sequential case of the algorithm is analyzed by standard techniques. This time is shown to be bounded by a constant, independent of the size of the network. It follows that the expected response time for the algorithm is bounded in the same way.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"68 1","pages":"Pages 47-85"},"PeriodicalIF":0.0,"publicationDate":"1986-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80028-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83753013","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1986-01-01DOI: 10.1016/S0019-9958(86)80036-5
Peter A. Flangan
The time, space, and data complexity of an optimally data efficient isomorphism identification algorithm are presented. The data complexity, the amount of data required for an inference algorithm to terminate, is analyzed and shown to be the minimum possible for all possible isomorphism inference algorithms. The minimum data requirement is shown to be ⌈log2 (n)⌉, and a method for constructing this minimal sequence of data is presented. The average data requirement is shown to be approximately 2 log2(n). The time complexity is O(n2log2(n)) and the space requirement is O(n2)
{"title":"An optimally data efficient isomorphism inference algorithm","authors":"Peter A. Flangan","doi":"10.1016/S0019-9958(86)80036-5","DOIUrl":"10.1016/S0019-9958(86)80036-5","url":null,"abstract":"<div><p>The time, space, and data complexity of an optimally data efficient isomorphism identification algorithm are presented. The data complexity, the amount of data required for an inference algorithm to terminate, is analyzed and shown to be the minimum possible for all possible isomorphism inference algorithms. The minimum data requirement is shown to be ⌈log<sub>2</sub> (<em>n</em>)⌉, and a method for constructing this minimal sequence of data is presented. The average data requirement is shown to be approximately 2 log<sub>2</sub>(<em>n</em>). The time complexity is <em>O</em>(<em>n</em><sup>2</sup>log<sub>2</sub>(<em>n</em>)) and the space requirement is <em>O</em>(<em>n</em><sup>2</sup>)</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"68 1","pages":"Pages 207-222"},"PeriodicalIF":0.0,"publicationDate":"1986-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80036-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74865797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1986-01-01DOI: 10.1016/S0019-9958(86)80038-9
S. Graf, J. Sifakis
We present a logic, called Synchronization Tree Logic (STL), for the specification and proof of programs described in a simple term language obtained from a constant Nil by using a set A of unary operators, a binary operator + and recursion. The elements of A represent names of actions, + represents non-deterministic choice, and Nil is the program preforming no action. The language of formulas of the logic proposed, contains the term language used for the description of programs, i.e., programs are formulas of the logic. This provides a uniform frame to deal with programs and their properties as the verification of anassertion t ⊨ f (t is a program, f is a formula) is reduced to the proof of the validity of the formula t ⊃ f. We propose a sound and under some conditions complete deductive system for synchronization tree logics and discuss their relation with modal logics used for the specification of programs.
{"title":"A logic for the description of non-deterministic programs and their properties","authors":"S. Graf, J. Sifakis","doi":"10.1016/S0019-9958(86)80038-9","DOIUrl":"10.1016/S0019-9958(86)80038-9","url":null,"abstract":"<div><p>We present a logic, called <em>Synchronization Tree Logic</em> (STL), for the specification and proof of programs described in a simple term language obtained from a constant <strong>Nil</strong> by using a set <strong>A</strong> of unary operators, a binary operator <strong>+</strong> and <strong>recursion</strong>. The elements of <em>A</em> represent names of actions, + represents non-deterministic choice, and Nil is the program preforming no action. The language of formulas of the logic proposed, contains the term language used for the description of programs, i.e., programs are formulas of the logic. This provides a uniform frame to deal with programs and their properties as the verification of anassertion <strong>t</strong> ⊨ <strong>f</strong> (<em>t</em> is a program, <em>f</em> is a formula) is reduced to the proof of the validity of the formula <strong>t</strong> ⊃ <strong>f</strong>. We propose a sound and under some conditions complete deductive system for synchronization tree logics and discuss their relation with modal logics used for the specification of programs.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"68 1","pages":"Pages 254-270"},"PeriodicalIF":0.0,"publicationDate":"1986-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80038-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84919575","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Simulation of Large Networks on Smaller Networks","authors":"H. Bodlaender, J. Leeuwen","doi":"10.1007/BFb0023994","DOIUrl":"https://doi.org/10.1007/BFb0023994","url":null,"abstract":"","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"28 1","pages":"47-58"},"PeriodicalIF":0.0,"publicationDate":"1985-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89917904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1985-10-01DOI: 10.1016/S0019-9958(85)80026-7
José L. Balcázar, Josep Díaz, Joaquim Gabarró
Non-uniform complexity measures originated in automata and formal languages theory are characterized in terms of well-known uniform complexity classes. The initial index of languages is introduced by means of several computational models. It is shown to be closely related to context-free cost, boolean circuits, straight line programs, and Turing machines with sparse oracles and time or space bounds.
{"title":"Uniform characterizations of non-uniform complexity measures","authors":"José L. Balcázar, Josep Díaz, Joaquim Gabarró","doi":"10.1016/S0019-9958(85)80026-7","DOIUrl":"10.1016/S0019-9958(85)80026-7","url":null,"abstract":"<div><p>Non-uniform complexity measures originated in automata and formal languages theory are characterized in terms of well-known uniform complexity classes. The initial index of languages is introduced by means of several computational models. It is shown to be closely related to context-free cost, boolean circuits, straight line programs, and Turing machines with sparse oracles and time or space bounds.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"67 1","pages":"Pages 53-69"},"PeriodicalIF":0.0,"publicationDate":"1985-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(85)80026-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80852843","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1985-10-01DOI: 10.1016/S0019-9958(85)80036-X
Ingo Wegner
CREW-PRAM's are a powerful model of parallel computers. Lower bounds for this model are rather general. Cook, Dwork, and Reischuk upper and lower time bounds for parallel random access machines without simultaneous writes, SIAM J. Comput. (in press) proved that the CREW-PRAM complexity of Boolean functions is bounded by logb c(f), where b ≈ 4.79 and c(f) is the critical complexity of f. This lower bound is often even tight. For a class of functions F the critical complexity c(F), the minimum of all c(f) where f ∈ F, is the best general lower bound on the critical complexity of all f ∈ F. We determine the critical complexity of the set of all nondegenerate Boolean functions and all monotone nondegenerate Boolean functions up to a small additive term. And we compute exactly the critical complexity of the class of all monotone graph properties, proving partially a conjecture of Turán (1984).
CREW-PRAM是一种强大的并行计算机模型。这个模型的下界很一般。Cook, Dwork和Reischuk,无同步写入并行随机存取机的上和下时间界限,SIAM J. computer。(in press)证明了布尔函数的CREW-PRAM复杂度以logb c(f)为界,其中b≈4.79,c(f)是f的临界复杂度。这个下界通常是紧的。对于一类函数F,当F∈F时,所有c(F)的最小值c(F)是所有F∈F的临界复杂度的最佳一般下界。我们确定了所有非退化布尔函数和所有单调非退化布尔函数的集合的临界复杂度,直至一个小的加性项。我们精确地计算了所有单调图性质类的临界复杂度,部分地证明了Turán(1984)的一个猜想。
{"title":"The critical complexity of all (monotone) boolean functions and monotone graph properties","authors":"Ingo Wegner","doi":"10.1016/S0019-9958(85)80036-X","DOIUrl":"10.1016/S0019-9958(85)80036-X","url":null,"abstract":"<div><p>CREW-PRAM's are a powerful model of parallel computers. Lower bounds for this model are rather general. Cook, Dwork, and Reischuk upper and lower time bounds for parallel random access machines without simultaneous writes, <em>SIAM J. Comput.</em> (in press) proved that the CREW-PRAM complexity of Boolean functions is bounded by log<em><sub>b</sub> c</em>(<em>f</em>), where <em>b</em> ≈ 4.79 and <em>c</em>(<em>f</em>) is the critical complexity of <em>f</em>. This lower bound is often even tight. For a class of functions <em>F</em> the critical complexity <em>c</em>(<em>F</em>), the minimum of all <em>c</em>(<em>f</em>) where <em>f</em> ∈ <em>F</em>, is the best general lower bound on the critical complexity of all <em>f</em> ∈ <em>F</em>. We determine the critical complexity of the set of all nondegenerate Boolean functions and all monotone nondegenerate Boolean functions up to a small additive term. And we compute exactly the critical complexity of the class of all monotone graph properties, proving partially a conjecture of <span>Turán (1984)</span>.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"67 1","pages":"Pages 212-222"},"PeriodicalIF":0.0,"publicationDate":"1985-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(85)80036-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82787816","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1985-10-01DOI: 10.1016/S0019-9958(85)80037-1
{"title":"Author index for volume 67","authors":"","doi":"10.1016/S0019-9958(85)80037-1","DOIUrl":"https://doi.org/10.1016/S0019-9958(85)80037-1","url":null,"abstract":"","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"67 1","pages":"Page 223"},"PeriodicalIF":0.0,"publicationDate":"1985-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(85)80037-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136515132","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1985-10-01DOI: 10.1016/S0019-9958(85)80027-9
Andreas Blass, Yuri Gurevich, Dexter Kozen
The logic obtained by adding the least-fixed-point operator to first-order logic was proposed as a query language by Aho and Ullman (in “Proc. 6th ACM Sympos. on Principles of Programming Languages,” 1979, pp. 110–120) and has been studied, particularly in connection with finite models, by numerous authors. We extend to this logic, and to the logic containing the more powerful iterative-fixed-point operator, the zero-one law proved for first-order logic in (Glebskii, Kogan, Liogonki, and Talanov (1969), Kibernetika2, 31–42; Fagin (1976), J. Symbolic Logic41, 50–58). For any sentence φ of the extend logic, the proportion of models of φ among all structures with universe {1,2,…, n} approaches 0 or 1 as n tends to infinity. We also show that the problem of deciding, for any φ, whether this proportion approaches 1 is complete for exponential time, if we consider only φ's with a fixed finite vocabulary (or vocabularies of bounded arity) and complete for double-exponential time if φ is unrestricted. In addition, we establish some related results.
{"title":"A zero-one law for logic with a fixed-point operator","authors":"Andreas Blass, Yuri Gurevich, Dexter Kozen","doi":"10.1016/S0019-9958(85)80027-9","DOIUrl":"10.1016/S0019-9958(85)80027-9","url":null,"abstract":"<div><p>The logic obtained by adding the least-fixed-point operator to first-order logic was proposed as a query language by <span>Aho and Ullman (<em>in</em> “Proc. 6th ACM Sympos. on Principles of Programming Languages,” 1979, pp. 110–120)</span> and has been studied, particularly in connection with finite models, by numerous authors. We extend to this logic, and to the logic containing the more powerful iterative-fixed-point operator, the zero-one law proved for first-order logic in (<span>Glebskii, Kogan, Liogonki, and Talanov (1969)</span>, <em>Kibernetika</em> <strong>2</strong>, 31–42; <span>Fagin (1976)</span>, <em>J. Symbolic Logic</em> <strong>41</strong>, 50–58). For any sentence <em>φ</em> of the extend logic, the proportion of models of <em>φ</em> among all structures with universe {1,2,…, <em>n</em>} approaches 0 or 1 as <em>n</em> tends to infinity. We also show that the problem of deciding, for any <em>φ</em>, whether this proportion approaches 1 is complete for exponential time, if we consider only <em>φ</em>'s with a fixed finite vocabulary (or vocabularies of bounded arity) and complete for double-exponential time if φ is unrestricted. In addition, we establish some related results.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"67 1","pages":"Pages 70-90"},"PeriodicalIF":0.0,"publicationDate":"1985-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(85)80027-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87954018","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}