You might know that the name "tree transducers" refers to various kinds of automata that compute functions on ranked trees, i.e. terms over a first-order signature. But have you ever wondered about how to remember what a macro tree transducer does? Or what are the connections between top-down tree(-to-string) transducers, multi bottom-up tree(-to-string) transducers, tree-walking transducers, (invisible) pebble tree transducers, monadic second-order transductions, unfoldings of rooted directed acyclic graphs (i.e. term graphs) -- and what happens when the functions that they compute are composed? The answers may be found in old papers (mostly coauthored by Engelfriet), but maybe you can save some time by first looking at this short note.
{"title":"Two or three things I know about tree transducers","authors":"Lê Thành Dũng Nguyên","doi":"arxiv-2409.03169","DOIUrl":"https://doi.org/arxiv-2409.03169","url":null,"abstract":"You might know that the name \"tree transducers\" refers to various kinds of\u0000automata that compute functions on ranked trees, i.e. terms over a first-order\u0000signature. But have you ever wondered about how to remember what a macro tree transducer\u0000does? Or what are the connections between top-down tree(-to-string)\u0000transducers, multi bottom-up tree(-to-string) transducers, tree-walking\u0000transducers, (invisible) pebble tree transducers, monadic second-order\u0000transductions, unfoldings of rooted directed acyclic graphs (i.e. term graphs)\u0000-- and what happens when the functions that they compute are composed? The answers may be found in old papers (mostly coauthored by Engelfriet), but\u0000maybe you can save some time by first looking at this short note.","PeriodicalId":501124,"journal":{"name":"arXiv - CS - Formal Languages and Automata Theory","volume":"28 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142225206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Marek Chalupa, Thomas A. Henzinger, Nicolas Mazzocchi, N. Ege Saraç
System behaviors are traditionally evaluated through binary classifications of correctness, which do not suffice for properties involving quantitative aspects of systems and executions. Quantitative automata offer a more nuanced approach, mapping each execution to a real number by incorporating weighted transitions and value functions generalizing acceptance conditions. In this paper, we introduce QuAK, the first tool designed to automate the analysis of quantitative automata. QuAK currently supports a variety of quantitative automaton types, including Inf, Sup, LimInf, LimSup, LimInfAvg, and LimSupAvg automata, and implements decision procedures for problems such as emptiness, universality, inclusion, equivalence, as well as for checking whether an automaton is safe, live, or constant. Additionally, QuAK is able to compute extremal values when possible, construct safety-liveness decompositions, and monitor system behaviors. We demonstrate the effectiveness of QuAK through experiments focusing on the inclusion, constant-function check, and monitoring problems.
{"title":"QuAK: Quantitative Automata Kit","authors":"Marek Chalupa, Thomas A. Henzinger, Nicolas Mazzocchi, N. Ege Saraç","doi":"arxiv-2409.03569","DOIUrl":"https://doi.org/arxiv-2409.03569","url":null,"abstract":"System behaviors are traditionally evaluated through binary classifications\u0000of correctness, which do not suffice for properties involving quantitative\u0000aspects of systems and executions. Quantitative automata offer a more nuanced\u0000approach, mapping each execution to a real number by incorporating weighted\u0000transitions and value functions generalizing acceptance conditions. In this\u0000paper, we introduce QuAK, the first tool designed to automate the analysis of\u0000quantitative automata. QuAK currently supports a variety of quantitative\u0000automaton types, including Inf, Sup, LimInf, LimSup, LimInfAvg, and LimSupAvg\u0000automata, and implements decision procedures for problems such as emptiness,\u0000universality, inclusion, equivalence, as well as for checking whether an\u0000automaton is safe, live, or constant. Additionally, QuAK is able to compute\u0000extremal values when possible, construct safety-liveness decompositions, and\u0000monitor system behaviors. We demonstrate the effectiveness of QuAK through\u0000experiments focusing on the inclusion, constant-function check, and monitoring\u0000problems.","PeriodicalId":501124,"journal":{"name":"arXiv - CS - Formal Languages and Automata Theory","volume":"2013 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Ramírez-de-Arellano, F. G. C. Cabarle, D. Orellana-Martín, M. J. Pérez-Jiménez
In the present work, we further study the computational power of virus machines (VMs in short). VMs provide a computing paradigm inspired by the transmission and replication networks of viruses. VMs consist of process units (called hosts) structured by a directed graph whose arcs are called channels and an instruction graph that controls the transmissions of virus objects among hosts. The present work complements our understanding of the computing power of VMs by introducing normal forms; these expressions restrict the features in a given computing model. Some of the features that we restrict in our normal forms include (a) the number of hosts, (b) the number of instructions, and (c) the number of virus objects in each host. After we recall some known results on the computing power of VMs we give our normal forms, such as the size of the loops in the network, proving new characterisations of family of sets, such as the finite sets, semilinear sets, or NRE.
{"title":"Normal forms in Virus Machines","authors":"A. Ramírez-de-Arellano, F. G. C. Cabarle, D. Orellana-Martín, M. J. Pérez-Jiménez","doi":"arxiv-2409.03327","DOIUrl":"https://doi.org/arxiv-2409.03327","url":null,"abstract":"In the present work, we further study the computational power of virus\u0000machines (VMs in short). VMs provide a computing paradigm inspired by the\u0000transmission and replication networks of viruses. VMs consist of process units\u0000(called hosts) structured by a directed graph whose arcs are called channels\u0000and an instruction graph that controls the transmissions of virus objects among\u0000hosts. The present work complements our understanding of the computing power of\u0000VMs by introducing normal forms; these expressions restrict the features in a\u0000given computing model. Some of the features that we restrict in our normal\u0000forms include (a) the number of hosts, (b) the number of instructions, and (c)\u0000the number of virus objects in each host. After we recall some known results on\u0000the computing power of VMs we give our normal forms, such as the size of the\u0000loops in the network, proving new characterisations of family of sets, such as\u0000the finite sets, semilinear sets, or NRE.","PeriodicalId":501124,"journal":{"name":"arXiv - CS - Formal Languages and Automata Theory","volume":"41 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197219","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Giann Karlo Aguirre Samboni, Stefan Haar, Loic Paulevé, Stefan Schwoon, Nick Würdemann
A crucial question in analyzing a concurrent system is to determine its long-run behaviour, and in particular, whether there are irreversible choices in its evolution, leading into parts of the reachability space from which there is no return to other parts. Casting this problem in the unifying framework of safe Petri nets, our previous work has provided techniques for identifying attractors, i.e. terminal strongly connected components of the reachability space. What we aim at is to determine the attraction basins associated to those attractors; that is, those states from where all infinite runs are doomed to end in the given attractor, as opposed to those that are free to evolve differently. Here, we provide a solution for the case of safe Petri nets. Our algorithm uses net unfoldings and provides a map of all of those configurations (concurrent executions of the system) that lead onto cliff-edges, i.e. any maximal extension for those configurations lies in some basin that is considered fatal.
分析并发系统的一个关键问题是确定其长期运行行为,特别是确定在其演化过程中是否存在不可逆转的选择,导致进入可达性空间的某些部分而无法返回其他部分。将这一问题置于安全 Petri 网的统一框架中,我们之前的工作提供了识别牵引者(即可达性空间的终端强连接部分)的技术。我们的目标是确定与这些吸引子相关的吸引盆地;也就是说,所有无限运行都注定会在给定吸引子中结束的那些状态,而不是那些可以自由演化的状态。在这里,我们为安全 Petri 网提供了一种解决方案。Ouralgorithm 使用网的展开,并提供了所有那些通向悬崖边的配置(系统的并发执行)的映射,即这些配置的任何最大扩展都位于某个盆地中,而这个盆地被认为是致命的。
{"title":"Attractor Basins in Concurrent Systems","authors":"Giann Karlo Aguirre Samboni, Stefan Haar, Loic Paulevé, Stefan Schwoon, Nick Würdemann","doi":"arxiv-2409.01079","DOIUrl":"https://doi.org/arxiv-2409.01079","url":null,"abstract":"A crucial question in analyzing a concurrent system is to determine its\u0000long-run behaviour, and in particular, whether there are irreversible choices\u0000in its evolution, leading into parts of the reachability space from which there\u0000is no return to other parts. Casting this problem in the unifying framework of\u0000safe Petri nets, our previous work has provided techniques for identifying\u0000attractors, i.e. terminal strongly connected components of the reachability\u0000space. What we aim at is to determine the attraction basins associated to those\u0000attractors; that is, those states from where all infinite runs are doomed to\u0000end in the given attractor, as opposed to those that are free to evolve\u0000differently. Here, we provide a solution for the case of safe Petri nets. Our\u0000algorithm uses net unfoldings and provides a map of all of those configurations\u0000(concurrent executions of the system) that lead onto cliff-edges, i.e. any\u0000maximal extension for those configurations lies in some basin that is\u0000considered fatal.","PeriodicalId":501124,"journal":{"name":"arXiv - CS - Formal Languages and Automata Theory","volume":"69 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Process discovery aims to discover descriptive process models from event logs. These discovered process models depict the actual execution of a process and serve as a foundational element for conformance checking, performance analyses, and many other applications. While most of the current process discovery algorithms primarily rely on a single event log for model discovery, additional sources of information, such as process documentation and domain experts' knowledge, remain untapped. This valuable information is often overlooked in traditional process discovery approaches. In this paper, we propose a discovery technique incorporating such knowledge in a novel inductive mining approach. This method takes a set of user-defined or discovered rules as input and utilizes them to discover enhanced process models. Our proposed framework has been implemented and tested using several publicly available real-life event logs. Furthermore, to showcase the framework's effectiveness in a practical setting, we conducted a case study in collaboration with UWV, the Dutch employee insurance agency.
{"title":"Imposing Rules in Process Discovery: an Inductive Mining Approach","authors":"Ali Norouzifar, Marcus Dees, Wil van der Aalst","doi":"arxiv-2408.17326","DOIUrl":"https://doi.org/arxiv-2408.17326","url":null,"abstract":"Process discovery aims to discover descriptive process models from event\u0000logs. These discovered process models depict the actual execution of a process\u0000and serve as a foundational element for conformance checking, performance\u0000analyses, and many other applications. While most of the current process\u0000discovery algorithms primarily rely on a single event log for model discovery,\u0000additional sources of information, such as process documentation and domain\u0000experts' knowledge, remain untapped. This valuable information is often\u0000overlooked in traditional process discovery approaches. In this paper, we\u0000propose a discovery technique incorporating such knowledge in a novel inductive\u0000mining approach. This method takes a set of user-defined or discovered rules as\u0000input and utilizes them to discover enhanced process models. Our proposed\u0000framework has been implemented and tested using several publicly available\u0000real-life event logs. Furthermore, to showcase the framework's effectiveness in\u0000a practical setting, we conducted a case study in collaboration with UWV, the\u0000Dutch employee insurance agency.","PeriodicalId":501124,"journal":{"name":"arXiv - CS - Formal Languages and Automata Theory","volume":"15 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper we show that enumerating the set MM(G,R), defined below, cannot be done with polynomial-delay in its input G and R, unless P=NP. R is a regular expression over an alphabet $Sigma$, G is directed graph labeled over $Sigma$, and MM(G,R) contains walks of G. First, consider the set Match(G,R) containing all walks G labeled by a word (over $Sigma$) that conforms to $R$. In general, M(G,R) is infinite, and MM(G,R) is the finite subset of Match(G,R) of the walks that are minimal according to a well-quasi-order <. It holds w