首页 > 最新文献

arXiv - CS - Formal Languages and Automata Theory最新文献

英文 中文
Two or three things I know about tree transducers 关于树木传感器,我知道两三件事
Pub Date : 2024-09-05 DOI: arxiv-2409.03169
Lê Thành Dũng Nguyên
You might know that the name "tree transducers" refers to various kinds ofautomata that compute functions on ranked trees, i.e. terms over a first-ordersignature. But have you ever wondered about how to remember what a macro tree transducerdoes? Or what are the connections between top-down tree(-to-string)transducers, multi bottom-up tree(-to-string) transducers, tree-walkingtransducers, (invisible) pebble tree transducers, monadic second-ordertransductions, unfoldings of rooted directed acyclic graphs (i.e. term graphs)-- and what happens when the functions that they compute are composed? The answers may be found in old papers (mostly coauthored by Engelfriet), butmaybe you can save some time by first looking at this short note.
您可能知道,"树转换器 "这个名称指的是在秩树(即一阶符号上的术语)上计算函数的各种自变量。但是,你有没有想过如何记住宏树转换器的作用?或者,自上而下的树(到字符串)转换器、多自下而上的树(到字符串)转换器、树行走转换器、(无形的)卵石树转换器、一元二阶转换器、有根有向无环图(即术语图)的展开之间有什么联系?答案也许可以在以前的论文中找到(大部分是 Engelfriet 合著的),但也许你可以先看看这篇短文,以节省一些时间。
{"title":"Two or three things I know about tree transducers","authors":"Lê Thành Dũng Nguyên","doi":"arxiv-2409.03169","DOIUrl":"https://doi.org/arxiv-2409.03169","url":null,"abstract":"You might know that the name \"tree transducers\" refers to various kinds of\u0000automata that compute functions on ranked trees, i.e. terms over a first-order\u0000signature. But have you ever wondered about how to remember what a macro tree transducer\u0000does? Or what are the connections between top-down tree(-to-string)\u0000transducers, multi bottom-up tree(-to-string) transducers, tree-walking\u0000transducers, (invisible) pebble tree transducers, monadic second-order\u0000transductions, unfoldings of rooted directed acyclic graphs (i.e. term graphs)\u0000-- and what happens when the functions that they compute are composed? The answers may be found in old papers (mostly coauthored by Engelfriet), but\u0000maybe you can save some time by first looking at this short note.","PeriodicalId":501124,"journal":{"name":"arXiv - CS - Formal Languages and Automata Theory","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142225206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
QuAK: Quantitative Automata Kit QuAK:定量自动机工具包
Pub Date : 2024-09-05 DOI: arxiv-2409.03569
Marek Chalupa, Thomas A. Henzinger, Nicolas Mazzocchi, N. Ege Saraç
System behaviors are traditionally evaluated through binary classificationsof correctness, which do not suffice for properties involving quantitativeaspects of systems and executions. Quantitative automata offer a more nuancedapproach, mapping each execution to a real number by incorporating weightedtransitions and value functions generalizing acceptance conditions. In thispaper, we introduce QuAK, the first tool designed to automate the analysis ofquantitative automata. QuAK currently supports a variety of quantitativeautomaton types, including Inf, Sup, LimInf, LimSup, LimInfAvg, and LimSupAvgautomata, and implements decision procedures for problems such as emptiness,universality, inclusion, equivalence, as well as for checking whether anautomaton is safe, live, or constant. Additionally, QuAK is able to computeextremal values when possible, construct safety-liveness decompositions, andmonitor system behaviors. We demonstrate the effectiveness of QuAK throughexperiments focusing on the inclusion, constant-function check, and monitoringproblems.
系统行为传统上是通过二元正确性分类进行评估的,这对于涉及系统和执行的定量方面的属性来说是不够的。定量自动机提供了一种更细致的方法,通过结合加权过渡和值函数概括接受条件,将每个执行映射为一个实数。在本文中,我们将介绍 QuAK,这是第一款用于自动分析定量自动机的工具。QuAK 目前支持多种定量自动机类型,包括 Inf、Sup、LimInf、LimSup、LimInfAvg 和 LimSupAvgautomata,并实现了空性、普遍性、包含性、等价性等问题的判定程序,以及自动机是否安全、有效或恒定的检查程序。此外,QuAK 还能在可能的情况下计算极值、构建安全性分解和监控系统行为。我们通过实验证明了 QuAK 的有效性,重点是包含、恒定函数检查和监控问题。
{"title":"QuAK: Quantitative Automata Kit","authors":"Marek Chalupa, Thomas A. Henzinger, Nicolas Mazzocchi, N. Ege Saraç","doi":"arxiv-2409.03569","DOIUrl":"https://doi.org/arxiv-2409.03569","url":null,"abstract":"System behaviors are traditionally evaluated through binary classifications\u0000of correctness, which do not suffice for properties involving quantitative\u0000aspects of systems and executions. Quantitative automata offer a more nuanced\u0000approach, mapping each execution to a real number by incorporating weighted\u0000transitions and value functions generalizing acceptance conditions. In this\u0000paper, we introduce QuAK, the first tool designed to automate the analysis of\u0000quantitative automata. QuAK currently supports a variety of quantitative\u0000automaton types, including Inf, Sup, LimInf, LimSup, LimInfAvg, and LimSupAvg\u0000automata, and implements decision procedures for problems such as emptiness,\u0000universality, inclusion, equivalence, as well as for checking whether an\u0000automaton is safe, live, or constant. Additionally, QuAK is able to compute\u0000extremal values when possible, construct safety-liveness decompositions, and\u0000monitor system behaviors. We demonstrate the effectiveness of QuAK through\u0000experiments focusing on the inclusion, constant-function check, and monitoring\u0000problems.","PeriodicalId":501124,"journal":{"name":"arXiv - CS - Formal Languages and Automata Theory","volume":"2013 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Normal forms in Virus Machines 病毒机器中的正则表达式
Pub Date : 2024-09-05 DOI: arxiv-2409.03327
A. Ramírez-de-Arellano, F. G. C. Cabarle, D. Orellana-Martín, M. J. Pérez-Jiménez
In the present work, we further study the computational power of virusmachines (VMs in short). VMs provide a computing paradigm inspired by thetransmission and replication networks of viruses. VMs consist of process units(called hosts) structured by a directed graph whose arcs are called channelsand an instruction graph that controls the transmissions of virus objects amonghosts. The present work complements our understanding of the computing power ofVMs by introducing normal forms; these expressions restrict the features in agiven computing model. Some of the features that we restrict in our normalforms include (a) the number of hosts, (b) the number of instructions, and (c)the number of virus objects in each host. After we recall some known results onthe computing power of VMs we give our normal forms, such as the size of theloops in the network, proving new characterisations of family of sets, such asthe finite sets, semilinear sets, or NRE.
在本研究中,我们进一步研究了病毒机器(简称 VM)的计算能力。虚拟机提供了一种计算范式,其灵感来自病毒的传输和复制网络。虚拟机由有向图(其弧称为通道)和控制主机间病毒对象传输的指令图构成的进程单元(称为主机)组成。本研究通过引入正则表达式补充了我们对虚拟机计算能力的理解;这些表达式限制了给定计算模型中的特征。我们在正则表达式中限制的一些特征包括:(a) 主机数量;(b) 指令数量;(c) 每个主机中病毒对象的数量。在回顾了关于虚拟机计算能力的一些已知结果后,我们给出了我们的正则表达式,如网络中循环的大小,证明了集合族的新特征,如有限集合、半线性集合或 NRE。
{"title":"Normal forms in Virus Machines","authors":"A. Ramírez-de-Arellano, F. G. C. Cabarle, D. Orellana-Martín, M. J. Pérez-Jiménez","doi":"arxiv-2409.03327","DOIUrl":"https://doi.org/arxiv-2409.03327","url":null,"abstract":"In the present work, we further study the computational power of virus\u0000machines (VMs in short). VMs provide a computing paradigm inspired by the\u0000transmission and replication networks of viruses. VMs consist of process units\u0000(called hosts) structured by a directed graph whose arcs are called channels\u0000and an instruction graph that controls the transmissions of virus objects among\u0000hosts. The present work complements our understanding of the computing power of\u0000VMs by introducing normal forms; these expressions restrict the features in a\u0000given computing model. Some of the features that we restrict in our normal\u0000forms include (a) the number of hosts, (b) the number of instructions, and (c)\u0000the number of virus objects in each host. After we recall some known results on\u0000the computing power of VMs we give our normal forms, such as the size of the\u0000loops in the network, proving new characterisations of family of sets, such as\u0000the finite sets, semilinear sets, or NRE.","PeriodicalId":501124,"journal":{"name":"arXiv - CS - Formal Languages and Automata Theory","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Attractor Basins in Concurrent Systems 并发系统中的吸引盆地
Pub Date : 2024-09-02 DOI: arxiv-2409.01079
Giann Karlo Aguirre Samboni, Stefan Haar, Loic Paulevé, Stefan Schwoon, Nick Würdemann
A crucial question in analyzing a concurrent system is to determine itslong-run behaviour, and in particular, whether there are irreversible choicesin its evolution, leading into parts of the reachability space from which thereis no return to other parts. Casting this problem in the unifying framework ofsafe Petri nets, our previous work has provided techniques for identifyingattractors, i.e. terminal strongly connected components of the reachabilityspace. What we aim at is to determine the attraction basins associated to thoseattractors; that is, those states from where all infinite runs are doomed toend in the given attractor, as opposed to those that are free to evolvedifferently. Here, we provide a solution for the case of safe Petri nets. Ouralgorithm uses net unfoldings and provides a map of all of those configurations(concurrent executions of the system) that lead onto cliff-edges, i.e. anymaximal extension for those configurations lies in some basin that isconsidered fatal.
分析并发系统的一个关键问题是确定其长期运行行为,特别是确定在其演化过程中是否存在不可逆转的选择,导致进入可达性空间的某些部分而无法返回其他部分。将这一问题置于安全 Petri 网的统一框架中,我们之前的工作提供了识别牵引者(即可达性空间的终端强连接部分)的技术。我们的目标是确定与这些吸引子相关的吸引盆地;也就是说,所有无限运行都注定会在给定吸引子中结束的那些状态,而不是那些可以自由演化的状态。在这里,我们为安全 Petri 网提供了一种解决方案。Ouralgorithm 使用网的展开,并提供了所有那些通向悬崖边的配置(系统的并发执行)的映射,即这些配置的任何最大扩展都位于某个盆地中,而这个盆地被认为是致命的。
{"title":"Attractor Basins in Concurrent Systems","authors":"Giann Karlo Aguirre Samboni, Stefan Haar, Loic Paulevé, Stefan Schwoon, Nick Würdemann","doi":"arxiv-2409.01079","DOIUrl":"https://doi.org/arxiv-2409.01079","url":null,"abstract":"A crucial question in analyzing a concurrent system is to determine its\u0000long-run behaviour, and in particular, whether there are irreversible choices\u0000in its evolution, leading into parts of the reachability space from which there\u0000is no return to other parts. Casting this problem in the unifying framework of\u0000safe Petri nets, our previous work has provided techniques for identifying\u0000attractors, i.e. terminal strongly connected components of the reachability\u0000space. What we aim at is to determine the attraction basins associated to those\u0000attractors; that is, those states from where all infinite runs are doomed to\u0000end in the given attractor, as opposed to those that are free to evolve\u0000differently. Here, we provide a solution for the case of safe Petri nets. Our\u0000algorithm uses net unfoldings and provides a map of all of those configurations\u0000(concurrent executions of the system) that lead onto cliff-edges, i.e. any\u0000maximal extension for those configurations lies in some basin that is\u0000considered fatal.","PeriodicalId":501124,"journal":{"name":"arXiv - CS - Formal Languages and Automata Theory","volume":"69 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Imposing Rules in Process Discovery: an Inductive Mining Approach 过程发现中的强加规则:一种归纳挖掘方法
Pub Date : 2024-08-30 DOI: arxiv-2408.17326
Ali Norouzifar, Marcus Dees, Wil van der Aalst
Process discovery aims to discover descriptive process models from eventlogs. These discovered process models depict the actual execution of a processand serve as a foundational element for conformance checking, performanceanalyses, and many other applications. While most of the current processdiscovery algorithms primarily rely on a single event log for model discovery,additional sources of information, such as process documentation and domainexperts' knowledge, remain untapped. This valuable information is oftenoverlooked in traditional process discovery approaches. In this paper, wepropose a discovery technique incorporating such knowledge in a novel inductivemining approach. This method takes a set of user-defined or discovered rules asinput and utilizes them to discover enhanced process models. Our proposedframework has been implemented and tested using several publicly availablereal-life event logs. Furthermore, to showcase the framework's effectiveness ina practical setting, we conducted a case study in collaboration with UWV, theDutch employee insurance agency.
流程发现旨在从事件日志中发现描述性流程模型。这些发现的流程模型描述了流程的实际执行情况,是一致性检查、性能分析和许多其他应用的基础元素。虽然目前大多数流程发现算法主要依赖于单个事件日志来发现模型,但其他信息源,如流程文档和领域专家的知识,仍未得到充分利用。传统的流程发现方法往往忽略了这些宝贵的信息。在本文中,我们提出了一种发现技术,在新颖的归纳式挖掘方法中融入了这些知识。这种方法将一组用户定义或发现的规则作为输入,并利用它们发现增强的流程模型。我们提出的框架已通过几个公开的真实事件日志进行了实施和测试。此外,为了展示该框架在实际环境中的有效性,我们与荷兰雇员保险机构 UWV 合作开展了一项案例研究。
{"title":"Imposing Rules in Process Discovery: an Inductive Mining Approach","authors":"Ali Norouzifar, Marcus Dees, Wil van der Aalst","doi":"arxiv-2408.17326","DOIUrl":"https://doi.org/arxiv-2408.17326","url":null,"abstract":"Process discovery aims to discover descriptive process models from event\u0000logs. These discovered process models depict the actual execution of a process\u0000and serve as a foundational element for conformance checking, performance\u0000analyses, and many other applications. While most of the current process\u0000discovery algorithms primarily rely on a single event log for model discovery,\u0000additional sources of information, such as process documentation and domain\u0000experts' knowledge, remain untapped. This valuable information is often\u0000overlooked in traditional process discovery approaches. In this paper, we\u0000propose a discovery technique incorporating such knowledge in a novel inductive\u0000mining approach. This method takes a set of user-defined or discovered rules as\u0000input and utilizes them to discover enhanced process models. Our proposed\u0000framework has been implemented and tested using several publicly available\u0000real-life event logs. Furthermore, to showcase the framework's effectiveness in\u0000a practical setting, we conducted a case study in collaboration with UWV, the\u0000Dutch employee insurance agency.","PeriodicalId":501124,"journal":{"name":"arXiv - CS - Formal Languages and Automata Theory","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Matching walks that are minimal with respect to edge inclusion 边缘包容最小的匹配行走
Pub Date : 2024-08-26 DOI: arxiv-2408.14048
Victor Marsault
In this paper we show that enumerating the set MM(G,R), defined below, cannotbe done with polynomial-delay in its input G and R, unless P=NP. R is a regularexpression over an alphabet $Sigma$, G is directed graph labeled over$Sigma$, and MM(G,R) contains walks of G. First, consider the set Match(G,R)containing all walks G labeled by a word (over $Sigma$) that conforms to $R$.In general, M(G,R) is infinite, and MM(G,R) is the finite subset of Match(G,R)of the walks that are minimal according to a well-quasi-order <. It holds w
在本文中,我们将证明枚举下面定义的集合 MM(G,R),除非 P=NP,否则无法以输入 G 和 R 的多项式延迟完成。首先,考虑集合 Match(G,R),它包含所有用符合 $R$ 的词(在 $Sigma$ 上)标注的走图 G。一般来说,M(G,R) 是无限的,MM(G,R) 是 Match(G,R) 的有限子集,它包含了根据井准阶 < 最小的行走。值得注意的是,集合 MM(G,R) 包含一些可能在多项式时间内计算出的行走。因此,任何枚举 MM(G,R) 的算法的预处理阶段并非必须解决 NP-hard问题。
{"title":"Matching walks that are minimal with respect to edge inclusion","authors":"Victor Marsault","doi":"arxiv-2408.14048","DOIUrl":"https://doi.org/arxiv-2408.14048","url":null,"abstract":"In this paper we show that enumerating the set MM(G,R), defined below, cannot\u0000be done with polynomial-delay in its input G and R, unless P=NP. R is a regular\u0000expression over an alphabet $Sigma$, G is directed graph labeled over\u0000$Sigma$, and MM(G,R) contains walks of G. First, consider the set Match(G,R)\u0000containing all walks G labeled by a word (over $Sigma$) that conforms to $R$.\u0000In general, M(G,R) is infinite, and MM(G,R) is the finite subset of Match(G,R)\u0000of the walks that are minimal according to a well-quasi-order <. It holds w<w'\u0000if the multiset of edges appearing in w is strictly included in the multiset of\u0000edges appearing in w'. Remarkably, the set MM(G,R) contains some walks that may\u0000be computed in polynomial time. Hence, it is not the case that the\u0000preprocessing phase of any algorithm enumerating MM(G,R) must solve an NP-hard\u0000problem.","PeriodicalId":501124,"journal":{"name":"arXiv - CS - Formal Languages and Automata Theory","volume":"267 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exponent-Strings and Their Edit Distance 指数字符串及其编辑距离
Pub Date : 2024-08-23 DOI: arxiv-2408.12931
Ingyu Baek
An exponent-string is an extension of traditional strings that canincorporate real-numbered exponents, indicating the quantity of characters.This novel representation overcomes the limitations of traditional discretestring by enabling precise data representation for applications such asphonetic transcription that contains sound duration. Although applications of exponent-string are focused on exponent-string withreal-numbered exponents, formal definition uses arbitrary semigroup. For anysemigroup $S$, $S$-exponent-strings are allowed to have elements of $S$ asexponents. We investigate algebraic properties of $S$-exponent-strings andfurther justify $mathbb{R}^+$-exponent-string is a natural extension of thestring. Motivated by the problem of calculating the similarity between spoken phonesequence and correct phone sequence, we develop exp-edit distance -- aspecialized metric designed to measure the similarity between$mathbb{R}^+$-exponent-strings. By extending the traditional string editdistance to handle continuous values, exp-edit distance deals with$mathbb{R}^+$-exponent-strings that embody both discrete and continuousproperties. Our exploration includes a rigorous mathematical formulation ofexp-edit distance and an algorithm to compute it.
幂级数字符串是传统字符串的扩展,它可以包含实数指数,表示字符的数量。这种新颖的表示方法克服了传统离散字符串的局限性,可以为包含声音持续时间的语音转录等应用提供精确的数据表示。虽然指数字符串的应用主要集中在有实数指数的指数字符串上,但其正式定义可使用任意半群。对于任意半群 $S$,$S$-指数字符串允许以 $S$ 的元素为幂级数。我们研究了$S$-幂级数弦的代数性质,并进一步证明$mathbb{R}^+$-幂级数弦是该弦的自然扩展。受计算口语语音序列与正确语音序列之间相似性问题的启发,我们开发了exp-edit距离--一种专门用于测量$mathbb{R}^+$-外分量-字符串之间相似性的度量。通过扩展传统的字符串编辑距离以处理连续值,exp-edit 距离可以处理同时体现离散和连续属性的元组字符串。我们的探索包括对exp-edit distance的严格数学表述以及计算它的算法。
{"title":"Exponent-Strings and Their Edit Distance","authors":"Ingyu Baek","doi":"arxiv-2408.12931","DOIUrl":"https://doi.org/arxiv-2408.12931","url":null,"abstract":"An exponent-string is an extension of traditional strings that can\u0000incorporate real-numbered exponents, indicating the quantity of characters.\u0000This novel representation overcomes the limitations of traditional discrete\u0000string by enabling precise data representation for applications such as\u0000phonetic transcription that contains sound duration. Although applications of exponent-string are focused on exponent-string with\u0000real-numbered exponents, formal definition uses arbitrary semigroup. For any\u0000semigroup $S$, $S$-exponent-strings are allowed to have elements of $S$ as\u0000exponents. We investigate algebraic properties of $S$-exponent-strings and\u0000further justify $mathbb{R}^+$-exponent-string is a natural extension of the\u0000string. Motivated by the problem of calculating the similarity between spoken phone\u0000sequence and correct phone sequence, we develop exp-edit distance -- a\u0000specialized metric designed to measure the similarity between\u0000$mathbb{R}^+$-exponent-strings. By extending the traditional string edit\u0000distance to handle continuous values, exp-edit distance deals with\u0000$mathbb{R}^+$-exponent-strings that embody both discrete and continuous\u0000properties. Our exploration includes a rigorous mathematical formulation of\u0000exp-edit distance and an algorithm to compute it.","PeriodicalId":501124,"journal":{"name":"arXiv - CS - Formal Languages and Automata Theory","volume":"5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Greybox Learning of Languages Recognizable by Event-Recording Automata 事件记录自动机可识别语言的灰箱学习
Pub Date : 2024-08-22 DOI: arxiv-2408.12551
Anirban Majumdar, Sayan Mukherjee, Jean-François Raskin
In this paper, we revisit the active learning of timed languages recognizableby event-recording automata. Our framework employs a method known as greyboxlearning, which enables the learning of event-recording automata with a minimalnumber of control states. This approach avoids learning the region automatonassociated with the language, contrasting with existing methods. We haveimplemented our greybox learning algorithm with various heuristics to maintainlow computational complexity. The efficacy of our approach is demonstratedthrough several examples.
在本文中,我们重新探讨了通过事件记录自动机识别定时语言的主动学习问题。我们的框架采用了一种称为 "灰箱学习"(greyboxlearning)的方法,这种方法能以最少的控制状态学习事件记录自动机。这种方法避免了学习与语言相关的区域自动机,与现有方法形成了鲜明对比。我们利用各种启发式方法实现了灰箱学习算法,以保持较低的计算复杂度。我们通过几个例子证明了我们方法的有效性。
{"title":"Greybox Learning of Languages Recognizable by Event-Recording Automata","authors":"Anirban Majumdar, Sayan Mukherjee, Jean-François Raskin","doi":"arxiv-2408.12551","DOIUrl":"https://doi.org/arxiv-2408.12551","url":null,"abstract":"In this paper, we revisit the active learning of timed languages recognizable\u0000by event-recording automata. Our framework employs a method known as greybox\u0000learning, which enables the learning of event-recording automata with a minimal\u0000number of control states. This approach avoids learning the region automaton\u0000associated with the language, contrasting with existing methods. We have\u0000implemented our greybox learning algorithm with various heuristics to maintain\u0000low computational complexity. The efficacy of our approach is demonstrated\u0000through several examples.","PeriodicalId":501124,"journal":{"name":"arXiv - CS - Formal Languages and Automata Theory","volume":"2 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distribution of Reconfiguration Languages maintaining Tree-like Communication Topology 保持树状通信拓扑的重构语言分布图
Pub Date : 2024-08-20 DOI: arxiv-2408.10708
Daniel Hausmann, Mathieu Lehaut, Nir Piterman
We study how to distribute trace languages in a setting where processescommunicate via reconfigurable communication channels. That is, the differentprocesses can connect and disconnect from channels at run time. We restrictattention to communication via tree-like communication architectures. Theseallow channels to connect more than two processes in a way that maintains anunderlying spanning tree and keeps communication continuous on the tree. Wemake the reconfiguration explicit in the language allowing both a centralizedautomaton as well as the distributed processes to share relevant informationabout the current communication configuration. We show that Zielonka's seminalresult regarding distribution of regular languages for asynchronous automatacan be generalized in this setting, incorporating both reconfiguration and morethan binary tree architectures.
我们研究了如何在进程通过可重新配置的通信通道进行通信的环境中分发跟踪语言。也就是说,不同进程可以在运行时连接或断开信道。我们只关注通过树状通信架构进行的通信。这些架构允许通道连接两个以上的进程,其方式是保持底层生成树,并保持树上通信的连续性。我们在语言中明确了重新配置,允许集中式自动机和分布式进程共享当前通信配置的相关信息。我们证明,Zielonka 关于异步自动机正则语言分布的开创性成果可以在这种环境中得到推广,既包括重新配置,也包括二叉树架构。
{"title":"Distribution of Reconfiguration Languages maintaining Tree-like Communication Topology","authors":"Daniel Hausmann, Mathieu Lehaut, Nir Piterman","doi":"arxiv-2408.10708","DOIUrl":"https://doi.org/arxiv-2408.10708","url":null,"abstract":"We study how to distribute trace languages in a setting where processes\u0000communicate via reconfigurable communication channels. That is, the different\u0000processes can connect and disconnect from channels at run time. We restrict\u0000attention to communication via tree-like communication architectures. These\u0000allow channels to connect more than two processes in a way that maintains an\u0000underlying spanning tree and keeps communication continuous on the tree. We\u0000make the reconfiguration explicit in the language allowing both a centralized\u0000automaton as well as the distributed processes to share relevant information\u0000about the current communication configuration. We show that Zielonka's seminal\u0000result regarding distribution of regular languages for asynchronous automata\u0000can be generalized in this setting, incorporating both reconfiguration and more\u0000than binary tree architectures.","PeriodicalId":501124,"journal":{"name":"arXiv - CS - Formal Languages and Automata Theory","volume":"69 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197226","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploring Complexity: An Extended Study of Formal Properties for Process Model Complexity Measures 探索复杂性:过程模型复杂性测量的形式属性扩展研究
Pub Date : 2024-08-19 DOI: arxiv-2408.09871
Patrizia Schalk, Adam Burke, Robert Lorenz
A good process model is expected not only to reflect the behavior of theprocess, but also to be as easy to read and understand as possible. Becausepreferences vary across different applications, numerous measures provide waysto reflect the complexity of a model with a numeric score. However, thisabundance of different complexity measures makes it difficult to select one foranalysis. Furthermore, most complexity measures are defined for BPMN or EPC,but not for workflow nets. This paper is an extended analysis of complexity measures and their formalproperties. It adapts existing complexity measures to the world of workflownets. It then compares these measures with a set of properties originallydefined for software complexity, as well as new extensions to it. We discussthe importance of the properties in theory by evaluating whether maturedcomplexity measures should fulfill them or whether they are optional. We findthat not all inspected properties are mandatory, but also demonstrate that thebehavior of evolutionary process discovery algorithms is influenced by some ofthese properties. Our findings help analysts to choose the right complexitymeasure for their use-case.
一个好的流程模型不仅要反映流程的行为,还要尽可能易于阅读和理解。由于不同应用的偏好各不相同,因此有许多测量方法可以用数字分数来反映模型的复杂性。然而,由于复杂性度量方法繁多,因此很难选择一种方法进行分析。此外,大多数复杂度测量方法都是针对 BPMN 或 EPC 定义的,而不是针对工作流网络的。本文是对复杂性度量及其形式属性的扩展分析。它将现有的复杂性度量方法应用于工作流网世界。然后,本文将这些度量与最初为软件复杂性定义的一系列属性以及新的扩展进行了比较。我们通过评估成熟的复杂性度量是否应该满足这些属性,或者这些属性是否可有可无,来讨论这些属性在理论上的重要性。我们发现,并非所有检查到的属性都是强制性的,但也证明了进化过程发现算法的行为受到其中一些属性的影响。我们的研究结果有助于分析人员根据自己的使用情况选择合适的复杂性度量。
{"title":"Exploring Complexity: An Extended Study of Formal Properties for Process Model Complexity Measures","authors":"Patrizia Schalk, Adam Burke, Robert Lorenz","doi":"arxiv-2408.09871","DOIUrl":"https://doi.org/arxiv-2408.09871","url":null,"abstract":"A good process model is expected not only to reflect the behavior of the\u0000process, but also to be as easy to read and understand as possible. Because\u0000preferences vary across different applications, numerous measures provide ways\u0000to reflect the complexity of a model with a numeric score. However, this\u0000abundance of different complexity measures makes it difficult to select one for\u0000analysis. Furthermore, most complexity measures are defined for BPMN or EPC,\u0000but not for workflow nets. This paper is an extended analysis of complexity measures and their formal\u0000properties. It adapts existing complexity measures to the world of workflow\u0000nets. It then compares these measures with a set of properties originally\u0000defined for software complexity, as well as new extensions to it. We discuss\u0000the importance of the properties in theory by evaluating whether matured\u0000complexity measures should fulfill them or whether they are optional. We find\u0000that not all inspected properties are mandatory, but also demonstrate that the\u0000behavior of evolutionary process discovery algorithms is influenced by some of\u0000these properties. Our findings help analysts to choose the right complexity\u0000measure for their use-case.","PeriodicalId":501124,"journal":{"name":"arXiv - CS - Formal Languages and Automata Theory","volume":"11 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
arXiv - CS - Formal Languages and Automata Theory
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1