Pub Date : 2026-01-31DOI: 10.1007/s00236-025-00517-8
Arseny M. Shur, Mikhail Rubinchik
For an arbitrary finite family of graphs, the distance labeling problem asks to assign labels to all nodes of every graph in the family in a way that allows one to recover the distance between any two nodes of any graph from their labels. The main goal is to minimize the number of unique labels used. We study this problem for the families (mathcal {C}_n) consisting of cycles of all lengths between 3 and n. We observe that the exact solution for directed cycles is straightforward and focus on the undirected case. We design a labeling scheme requiring (frac{nsqrt{n}}{sqrt{6}}+O(n)) labels, which is almost twice less than is required by the earlier known scheme. Using the computer search, we find an optimal labeling for each (nle 17), showing that our scheme gives the results that are very close to the optimum.
{"title":"Distance labeling for families of cycles","authors":"Arseny M. Shur, Mikhail Rubinchik","doi":"10.1007/s00236-025-00517-8","DOIUrl":"10.1007/s00236-025-00517-8","url":null,"abstract":"<div><p>For an arbitrary finite family of graphs, the distance labeling problem asks to assign labels to all nodes of every graph in the family in a way that allows one to recover the distance between any two nodes of any graph from their labels. The main goal is to minimize the number of unique labels used. We study this problem for the families <span>(mathcal {C}_n)</span> consisting of cycles of all lengths between 3 and <i>n</i>. We observe that the exact solution for directed cycles is straightforward and focus on the undirected case. We design a labeling scheme requiring <span>(frac{nsqrt{n}}{sqrt{6}}+O(n))</span> labels, which is almost twice less than is required by the earlier known scheme. Using the computer search, we find an optimal labeling for each <span>(nle 17)</span>, showing that our scheme gives the results that are very close to the optimum.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"63 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2026-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146083093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-01-31DOI: 10.1007/s00236-025-00520-z
Bianca Truthe
In this paper, we continue the research on the power of contextual grammars with selection languages from subfamilies of the family of regular languages. In the past, two independent hierarchies have been obtained for external and internal contextual grammars, one based on selection languages defined by structural properties (finite, monoidal, nilpotent, combinational, definite, ordered, non-counting, power-separating, suffix-closed, commutative, circular, or union-free languages), the other one based on selection languages defined by resources (number of non-terminal symbols, production rules, or states needed for generating or accepting them). In a previous paper, the language families of these hierarchies for external contextual grammars were compared and the hierarchies merged. In the present paper, we compare the language families of these hierarchies for internal contextual grammars and merge these hierarchies.
{"title":"Internal contextual grammars with resources restricted and structure limited selection","authors":"Bianca Truthe","doi":"10.1007/s00236-025-00520-z","DOIUrl":"10.1007/s00236-025-00520-z","url":null,"abstract":"<div><p>In this paper, we continue the research on the power of contextual grammars with selection languages from subfamilies of the family of regular languages. In the past, two independent hierarchies have been obtained for external and internal contextual grammars, one based on selection languages defined by structural properties (finite, monoidal, nilpotent, combinational, definite, ordered, non-counting, power-separating, suffix-closed, commutative, circular, or union-free languages), the other one based on selection languages defined by resources (number of non-terminal symbols, production rules, or states needed for generating or accepting them). In a previous paper, the language families of these hierarchies for external contextual grammars were compared and the hierarchies merged. In the present paper, we compare the language families of these hierarchies for internal contextual grammars and merge these hierarchies.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"63 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2026-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-025-00520-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146083094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-01-31DOI: 10.1007/s00236-025-00519-6
Maria Radionova, Alexander Okhotin
This paper introduces sweeping permutation automata, which move over an input string in alternating left-to-right and right-to-left sweeps and have a bijective transition function. It is proved that these automata recognize the same family of languages as the classical one-way permutation automata (Thierrin, “Permutation automata”, Mathematical Systems Theory, 1968). The proof is constructive: an n-state two-way permutation automaton is transformed to a one-way permutation automaton with at most (F(n)=max _{k+ell =n, m leqslant ell } k cdot { ell atopwithdelims ()m} cdot {k - 1 atopwithdelims ()ell - m} cdot (ell - m)!) states (here the maximum is over all partitions of n into k states with transitions to the right and (ell) states with transitions to the left, where m states have no transitions on the left end-marker). This number of states is proved to be necessary in the worst case, and its growth rate is estimated as (F(n) = n^{frac{n}{2} - frac{1 + ln 2}{2}frac{n}{ln n}(1 + o(1))}).
{"title":"Sweeping permutation automata","authors":"Maria Radionova, Alexander Okhotin","doi":"10.1007/s00236-025-00519-6","DOIUrl":"10.1007/s00236-025-00519-6","url":null,"abstract":"<div><p>This paper introduces sweeping permutation automata, which move over an input string in alternating left-to-right and right-to-left sweeps and have a bijective transition function. It is proved that these automata recognize the same family of languages as the classical one-way permutation automata (Thierrin, “Permutation automata”, <i>Mathematical Systems Theory</i>, 1968). The proof is constructive: an <i>n</i>-state two-way permutation automaton is transformed to a one-way permutation automaton with at most <span>(F(n)=max _{k+ell =n, m leqslant ell } k cdot { ell atopwithdelims ()m} cdot {k - 1 atopwithdelims ()ell - m} cdot (ell - m)!)</span> states (here the maximum is over all partitions of <i>n</i> into <i>k</i> states with transitions to the right and <span>(ell)</span> states with transitions to the left, where <i>m</i> states have no transitions on the left end-marker). This number of states is proved to be necessary in the worst case, and its growth rate is estimated as <span>(F(n) = n^{frac{n}{2} - frac{1 + ln 2}{2}frac{n}{ln n}(1 + o(1))})</span>.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"63 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2026-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146083195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A complete weighted graph (G= (V, E, w)) is called (Delta _{beta })-metric, for some (beta ge 1/2), if G satisfies the (beta)-triangle inequality, i.e.,(w(u,v) le beta cdot (w(u,x) + w(x,v))) for all vertices (u,v,xin V). Given a (Delta _{beta })-metric graph (G=(V, E, w)), the (Delta _{beta })-Weighted Densestk-Subgraph ((Delta _{beta })-WDkS) problem is to find an induced subgraph G[C] with exactly k vertices such that the total edge weight of G[C] is maximized. For (beta = 1), this problem, (Delta)-WDkS, is known NP-hard and admits a (frac{1}{2})-approximation algorithm. In this paper, we show the NP-hardness and the inapproximability of the (Delta _{beta })-WDkS problem for any (beta> 1/2). We prove that (Delta _{beta })-WDkS can be approximated to within a factor ((frac{1}{2beta }+frac{2beta -1}{2beta cdot (2k-3)})) for any (beta> frac{1}{2}) and show that the analysis of the approximation ratio is asymptotically tight. Additionally, we describe a method to adapt any (alpha)-approximation algorithm for (Delta)-WDkS to obtain a (delta _{alpha ,beta })-approximation algorithm for (Delta _{beta })-WDkS with (delta _{alpha ,beta }> alpha) for every (beta <1). This allows for improved approximations for (Delta _{beta })-WDkS instances, offering potential enhancements to existing algorithms for this problem.
{"title":"On the hardness and approximation of the densest k-subgraph problem in parameterized metric graphs","authors":"Shih-Chia Chang, Li-Hsuan Chen, Sun-Yuan Hsieh, Ling-Ju Hung, Shih-Shun Kao, Ralf Klasing","doi":"10.1007/s00236-025-00518-7","DOIUrl":"10.1007/s00236-025-00518-7","url":null,"abstract":"<div><p>A complete weighted graph <span>(G= (V, E, w))</span> is called <span>(Delta _{beta })</span>-metric, for some <span>(beta ge 1/2)</span>, if <i>G</i> satisfies the <span>(beta)</span>-triangle inequality, <i>i.e.,</i> <span>(w(u,v) le beta cdot (w(u,x) + w(x,v)))</span> for all vertices <span>(u,v,xin V)</span>. Given a <span>(Delta _{beta })</span>-metric graph <span>(G=(V, E, w))</span>, the <span>(Delta _{beta })</span><span>-Weighted Densest</span> <i>k</i><span>-Subgraph</span> (<span>(Delta _{beta })</span>-WD<i>k</i>S) problem is to find an induced subgraph <i>G</i>[<i>C</i>] with exactly <i>k</i> vertices such that the total edge weight of <i>G</i>[<i>C</i>] is maximized. For <span>(beta = 1)</span>, this problem, <span>(Delta)</span>-WD<i>k</i>S, is known NP-hard and admits a <span>(frac{1}{2})</span>-approximation algorithm. In this paper, we show the NP-hardness and the inapproximability of the <span>(Delta _{beta })</span>-WD<i>k</i>S problem for any <span>(beta> 1/2)</span>. We prove that <span>(Delta _{beta })</span>-WD<i>k</i>S can be approximated to within a factor <span>((frac{1}{2beta }+frac{2beta -1}{2beta cdot (2k-3)}))</span> for any <span>(beta> frac{1}{2})</span> and show that the analysis of the approximation ratio is asymptotically tight. Additionally, we describe a method to adapt any <span>(alpha)</span>-approximation algorithm for <span>(Delta)</span>-WD<i>k</i>S to obtain a <span>(delta _{alpha ,beta })</span>-approximation algorithm for <span>(Delta _{beta })</span>-WD<i>k</i>S with <span>(delta _{alpha ,beta }> alpha)</span> for every <span>(beta <1)</span>. This allows for improved approximations for <span>(Delta _{beta })</span>-WD<i>k</i>S instances, offering potential enhancements to existing algorithms for this problem.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"63 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2026-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146083057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-01-08DOI: 10.1007/s00236-025-00512-z
Eirini D. Poimenidou, Marios Adamoudis, K. A. Draziotis, Kostas Tsichlas
In the present paper, we introduce a message recovery attack applicable to NTRU cryptosystem. Our methodology uses a reduction from the NTRU-lattice to a Voronoi First Kind (VFK) lattice, enabling the use of a polynomial Closest Vector Problem (CVP) exact algorithm, which is vital for successful message recovery. This approach assumes knowledge of the Most Significant Bit of the coefficients of a polynomial that is a multiple of the nonce. Finally, extensive experimental results for the NTRU-HPS variants submitted to NIST are presented. The findings highlight the need to properly protect NTRU schemes against potential leakage.
{"title":"Message recovery attack in NTRU through VFK lattices","authors":"Eirini D. Poimenidou, Marios Adamoudis, K. A. Draziotis, Kostas Tsichlas","doi":"10.1007/s00236-025-00512-z","DOIUrl":"10.1007/s00236-025-00512-z","url":null,"abstract":"<div><p>In the present paper, we introduce a message recovery attack applicable to NTRU cryptosystem. Our methodology uses a reduction from the NTRU-lattice to a Voronoi First Kind (VFK) lattice, enabling the use of a polynomial Closest Vector Problem (CVP) exact algorithm, which is vital for successful message recovery. This approach assumes knowledge of the Most Significant Bit of the coefficients of a polynomial that is a multiple of the nonce. Finally, extensive experimental results for the NTRU-HPS variants submitted to NIST are presented. The findings highlight the need to properly protect NTRU schemes against potential leakage.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"63 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2026-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145908994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-09DOI: 10.1007/s00236-025-00509-8
Ezio Bartocci, Marek Chalupa, Thomas A. Henzinger, Dejan Nickovic, Ana Oliveira da Costa
In this work, we present hypernode automata as a specification formalism for hyperproperties of systems whose executions may be misaligned among themselves, such as concurrent systems. These automata consist of nodes labeled with hypernode logic formulas and transitions marked with synchronizing actions. Hypernode logic formulas establish relations between sequences of variable values among different system executions. This logic enables both synchronous and asynchronous analysis of traces. In its asynchronous view on execution traces, hypernode formulas establish relations on the order of value changes for each variable without correlating their timing. In both views, the analysis of different execution traces is synchronized through the transitions of hypernode automata. By combining logic’s declarative nature with automata’s procedural power, hypernode automata seamlessly integrate asynchronicity requirements at the node level with synchronicity between node transitions. We show that the model-checking problem for hypernode automata is decidable for specifications where each node specifies either a synchronous or an asynchronous requirement for the system’s executions, but not both.
{"title":"Hypernode automata","authors":"Ezio Bartocci, Marek Chalupa, Thomas A. Henzinger, Dejan Nickovic, Ana Oliveira da Costa","doi":"10.1007/s00236-025-00509-8","DOIUrl":"10.1007/s00236-025-00509-8","url":null,"abstract":"<div><p>In this work, we present <i>hypernode automata</i> as a specification formalism for hyperproperties of systems whose executions may be misaligned among themselves, such as concurrent systems. These automata consist of nodes labeled with <i>hypernode logic</i> formulas and transitions marked with synchronizing actions. Hypernode logic formulas establish relations between sequences of variable values among different system executions. This logic enables both synchronous and asynchronous analysis of traces. In its asynchronous view on execution traces, hypernode formulas establish relations on the order of value changes for each variable without correlating their timing. In both views, the analysis of different execution traces is synchronized through the transitions of hypernode automata. By combining logic’s declarative nature with automata’s procedural power, hypernode automata seamlessly integrate asynchronicity requirements at the node level with synchronicity between node transitions. We show that the model-checking problem for hypernode automata is decidable for specifications where each node specifies either a synchronous or an asynchronous requirement for the system’s executions, but not both.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 4","pages":""},"PeriodicalIF":0.5,"publicationDate":"2025-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-025-00509-8.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145729622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-07DOI: 10.1007/s00236-025-00511-0
Marcos Salvatierra, Juan G. Colonna, Mario Salvatierra, Alcides de C. Amorim Neto
We present a method for finding envy-free prices in a combinatorial auction where the consumers’ number n coincides with that of distinct items for sale, each consumer can buy one single item and each item has only one unit available. This is a particular case of the unit-demand envy-free pricing problem, and was recently revisited by Arbib et al. (Discr Appl Math 261:22–27, 2019, https://doi.org/10.1016/j.dam.2018.03.034). These authors proved that using a Fibonacci heap for solving the maximum weight perfect matching and the Bellman-Ford algorithm for getting the envy-free prices, the overall time complexity for solving the problem is (O(n^3)). We propose a method based on dynamic programming design strategy that seeks the optimal envy-free prices by increasing the consumers’ utilities, which has the same cubic complexity time as the aforementioned approach, but whose theoretical and empirical results indicate that our method performs faster than the shortest paths strategy, obtaining an average time reduction in determining optimal envy-free prices of approximately 48%.
本文提出了一种在组合拍卖中寻找无嫉妒价格的方法,其中消费者的编号n与不同的待售物品的编号n一致,每个消费者可以购买一个单一的物品,每个物品只有一个单位可用。这是单位需求无嫉妒定价问题的一个特殊案例,Arbib等人最近重新研究了这个问题(Discr apple Math 261:22 - 27,2019, https://doi.org/10.1016/j.dam.2018.03.034)。这些作者证明了用斐波那契堆求解最大权值完美匹配,用Bellman-Ford算法求解无嫉妒价格,求解问题的总时间复杂度为(O(n^3))。我们提出了一种基于动态规划设计策略的方法,通过增加消费者的效用来寻求最优无嫉妒价格,该方法与上述方法具有相同的立方复杂度时间,但理论和实证结果表明,我们的方法比最短路径策略执行得更快,在确定最优无嫉妒价格时平均减少了大约48个时间%.
{"title":"An efficient alternative strategy for finding prices in envy-free perfect matchings","authors":"Marcos Salvatierra, Juan G. Colonna, Mario Salvatierra, Alcides de C. Amorim Neto","doi":"10.1007/s00236-025-00511-0","DOIUrl":"10.1007/s00236-025-00511-0","url":null,"abstract":"<div><p>We present a method for finding envy-free prices in a combinatorial auction where the consumers’ number <i>n</i> coincides with that of distinct items for sale, each consumer can buy one single item and each item has only one unit available. This is a particular case of the <i>unit-demand envy-free pricing problem</i>, and was recently revisited by Arbib et al. (Discr Appl Math 261:22–27, 2019, https://doi.org/10.1016/j.dam.2018.03.034). These authors proved that using a Fibonacci heap for solving the maximum weight perfect matching and the Bellman-Ford algorithm for getting the envy-free prices, the overall time complexity for solving the problem is <span>(O(n^3))</span>. We propose a method based on dynamic programming design strategy that seeks the optimal envy-free prices by increasing the consumers’ utilities, which has the same cubic complexity time as the aforementioned approach, but whose theoretical and empirical results indicate that our method performs faster than the shortest paths strategy, obtaining an average time reduction in determining optimal envy-free prices of approximately 48%.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 4","pages":""},"PeriodicalIF":0.5,"publicationDate":"2025-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145456228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-10-27DOI: 10.1007/s00236-025-00504-z
Arthur Correnson, Tobias Nießen, Bernd Finkbeiner, Georg Weissenbacher
Many important hyperliveness properties, such as refinement and generalized non-interference, fall into the class of (forall exists) hyperproperties, and require, for each execution trace of a system, the existence of another execution trace relating to the first one in a certain way. The alternation of quantifiers in the specification renders these hyperproperties extremely difficult to verify, or even just to test. Indeed, contrary to trace properties, where it suffices to find a single counterexample trace, refuting a (forall exists) hyperproperty requires not only to find a trace, but also a proof that no second trace exists that satisfies the specified relation with the first trace. As a consequence, automated testing of (forall exists) hyperproperties falls out of the scope of existing automated testing tools. In this paper, we present a fully automated approach to detect violations of (forall exists) hyperproperties in synchronous and asynchronous infinite-state systems. Our approach extends bug-finding techniques based on symbolic execution with support for trace quantification. We provide a prototype implementation of our approach, and demonstrate its effectiveness on a set of challenging examples.
{"title":"Symbolic execution for refuting ∀∃ hyperproperties","authors":"Arthur Correnson, Tobias Nießen, Bernd Finkbeiner, Georg Weissenbacher","doi":"10.1007/s00236-025-00504-z","DOIUrl":"10.1007/s00236-025-00504-z","url":null,"abstract":"<div><p>Many important hyperliveness properties, such as refinement and generalized non-interference, fall into the class of <span>(forall exists)</span> hyperproperties, and require, for each execution trace of a system, the existence of another execution trace relating to the first one in a certain way. The alternation of quantifiers in the specification renders these hyperproperties extremely difficult to verify, or even just to test. Indeed, contrary to trace properties, where it suffices to find a single counterexample trace, refuting a <span>(forall exists)</span> hyperproperty requires not only to find a trace, but also a proof that no second trace exists that satisfies the specified relation with the first trace. As a consequence, automated testing of <span>(forall exists)</span> hyperproperties falls out of the scope of existing automated testing tools. In this paper, we present a fully automated approach to detect violations of <span>(forall exists)</span> hyperproperties in synchronous and asynchronous infinite-state systems. Our approach extends bug-finding techniques based on symbolic execution with support for trace quantification. We provide a prototype implementation of our approach, and demonstrate its effectiveness on a set of challenging examples.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 4","pages":""},"PeriodicalIF":0.5,"publicationDate":"2025-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-025-00504-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145405627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-10-24DOI: 10.1007/s00236-025-00510-1
András Murvai, György Vaszil
We investigate the relationship of languages characterized by variants of string assembling systems and by Watson-Crick finite automata with a small number of states. Besides the general variant, we consider so-called free, and pure string assembling systems and compare their language generating power to Watson-Crick finite automata having one state (also called stateless) and two or three states in their state sets. We also study restricted variants of models that describe unary languages.
{"title":"Watson-Crick finite automata of small size and variants of string assembling systems","authors":"András Murvai, György Vaszil","doi":"10.1007/s00236-025-00510-1","DOIUrl":"10.1007/s00236-025-00510-1","url":null,"abstract":"<div><p>We investigate the relationship of languages characterized by variants of string assembling systems and by Watson-Crick finite automata with a small number of states. Besides the general variant, we consider so-called free, and pure string assembling systems and compare their language generating power to Watson-Crick finite automata having one state (also called stateless) and two or three states in their state sets. We also study restricted variants of models that describe unary languages.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 4","pages":""},"PeriodicalIF":0.5,"publicationDate":"2025-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-025-00510-1.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145352587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}