首页 > 最新文献

Acta Informatica最新文献

英文 中文
Distance labeling for families of cycles 循环族的距离标记
IF 0.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-31 DOI: 10.1007/s00236-025-00517-8
Arseny M. Shur, Mikhail Rubinchik

For an arbitrary finite family of graphs, the distance labeling problem asks to assign labels to all nodes of every graph in the family in a way that allows one to recover the distance between any two nodes of any graph from their labels. The main goal is to minimize the number of unique labels used. We study this problem for the families (mathcal {C}_n) consisting of cycles of all lengths between 3 and n. We observe that the exact solution for directed cycles is straightforward and focus on the undirected case. We design a labeling scheme requiring (frac{nsqrt{n}}{sqrt{6}}+O(n)) labels, which is almost twice less than is required by the earlier known scheme. Using the computer search, we find an optimal labeling for each (nle 17), showing that our scheme gives the results that are very close to the optimum.

对于任意有限图族,距离标注问题要求为图族中每个图的所有节点分配标签,并允许从任意图的任意两个节点的标签中恢复它们之间的距离。主要目标是尽量减少所使用的唯一标签的数量。我们研究了由3到n之间的所有长度的循环组成的族(mathcal {C}_n)的这个问题。我们观察到有向循环的精确解是直接的,并且专注于无向情况。我们设计了一个需要(frac{nsqrt{n}}{sqrt{6}}+O(n))标签的标签方案,这几乎比早期已知方案所需的标签少了两倍。使用计算机搜索,我们为每个(nle 17)找到了最优标记,表明我们的方案给出了非常接近最优的结果。
{"title":"Distance labeling for families of cycles","authors":"Arseny M. Shur,&nbsp;Mikhail Rubinchik","doi":"10.1007/s00236-025-00517-8","DOIUrl":"10.1007/s00236-025-00517-8","url":null,"abstract":"<div><p>For an arbitrary finite family of graphs, the distance labeling problem asks to assign labels to all nodes of every graph in the family in a way that allows one to recover the distance between any two nodes of any graph from their labels. The main goal is to minimize the number of unique labels used. We study this problem for the families <span>(mathcal {C}_n)</span> consisting of cycles of all lengths between 3 and <i>n</i>. We observe that the exact solution for directed cycles is straightforward and focus on the undirected case. We design a labeling scheme requiring <span>(frac{nsqrt{n}}{sqrt{6}}+O(n))</span> labels, which is almost twice less than is required by the earlier known scheme. Using the computer search, we find an optimal labeling for each <span>(nle 17)</span>, showing that our scheme gives the results that are very close to the optimum.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"63 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2026-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146083093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internal contextual grammars with resources restricted and structure limited selection 资源受限、结构选择受限的内部上下文语法
IF 0.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-31 DOI: 10.1007/s00236-025-00520-z
Bianca Truthe

In this paper, we continue the research on the power of contextual grammars with selection languages from subfamilies of the family of regular languages. In the past, two independent hierarchies have been obtained for external and internal contextual grammars, one based on selection languages defined by structural properties (finite, monoidal, nilpotent, combinational, definite, ordered, non-counting, power-separating, suffix-closed, commutative, circular, or union-free languages), the other one based on selection languages defined by resources (number of non-terminal symbols, production rules, or states needed for generating or accepting them). In a previous paper, the language families of these hierarchies for external contextual grammars were compared and the hierarchies merged. In the present paper, we compare the language families of these hierarchies for internal contextual grammars and merge these hierarchies.

在本文中,我们继续研究上下文语法从规则语言族的子族中选择语言的能力。过去,对于外部和内部上下文语法,已经获得了两个独立的层次结构,一个是基于由结构属性定义的选择语言(有限的、一元的、幂零的、组合的、确定的、有序的、非计数的、幂分离的、后缀封闭的、交换的、循环的或无联合的语言),另一个是基于由资源定义的选择语言(非终结符号的数量、产生规则或生成或接受它们所需的状态)。在之前的一篇论文中,对外部上下文语法的这些层次结构的语言族进行了比较,并对这些层次结构进行了合并。在本文中,我们比较了这些层次结构的语言族的内部上下文语法和合并这些层次结构。
{"title":"Internal contextual grammars with resources restricted and structure limited selection","authors":"Bianca Truthe","doi":"10.1007/s00236-025-00520-z","DOIUrl":"10.1007/s00236-025-00520-z","url":null,"abstract":"<div><p>In this paper, we continue the research on the power of contextual grammars with selection languages from subfamilies of the family of regular languages. In the past, two independent hierarchies have been obtained for external and internal contextual grammars, one based on selection languages defined by structural properties (finite, monoidal, nilpotent, combinational, definite, ordered, non-counting, power-separating, suffix-closed, commutative, circular, or union-free languages), the other one based on selection languages defined by resources (number of non-terminal symbols, production rules, or states needed for generating or accepting them). In a previous paper, the language families of these hierarchies for external contextual grammars were compared and the hierarchies merged. In the present paper, we compare the language families of these hierarchies for internal contextual grammars and merge these hierarchies.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"63 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2026-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-025-00520-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146083094","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sweeping permutation automata 清扫排列自动机
IF 0.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-31 DOI: 10.1007/s00236-025-00519-6
Maria Radionova, Alexander Okhotin

This paper introduces sweeping permutation automata, which move over an input string in alternating left-to-right and right-to-left sweeps and have a bijective transition function. It is proved that these automata recognize the same family of languages as the classical one-way permutation automata (Thierrin, “Permutation automata”, Mathematical Systems Theory, 1968). The proof is constructive: an n-state two-way permutation automaton is transformed to a one-way permutation automaton with at most (F(n)=max _{k+ell =n, m leqslant ell } k cdot { ell atopwithdelims ()m} cdot {k - 1 atopwithdelims ()ell - m} cdot (ell - m)!) states (here the maximum is over all partitions of n into k states with transitions to the right and (ell) states with transitions to the left, where m states have no transitions on the left end-marker). This number of states is proved to be necessary in the worst case, and its growth rate is estimated as (F(n) = n^{frac{n}{2} - frac{1 + ln 2}{2}frac{n}{ln n}(1 + o(1))}).

本文介绍了一种扫描置换自动机,它以从左到右和从右到左交替扫描的方式在输入字符串上移动,并且具有双目标转移函数。证明了这些自动机与经典的单向置换自动机(Thierrin,“置换自动机”,数学系统理论,1968)识别同一家族的语言。证明是建设性的:一个n状态的双向排列自动机被转换成一个最多有(F(n)=max _{k+ell =n, m leqslant ell } k cdot { ell atopwithdelims ()m} cdot {k - 1 atopwithdelims ()ell - m} cdot (ell - m)!)状态的单向排列自动机(这里的最大值是所有n划分为k个向右转移的状态和(ell)个向左转移的状态,其中m个状态在左端标记上没有转移)。在最坏的情况下,这一数量被证明是必要的,其增长率估计为(F(n) = n^{frac{n}{2} - frac{1 + ln 2}{2}frac{n}{ln n}(1 + o(1))})。
{"title":"Sweeping permutation automata","authors":"Maria Radionova,&nbsp;Alexander Okhotin","doi":"10.1007/s00236-025-00519-6","DOIUrl":"10.1007/s00236-025-00519-6","url":null,"abstract":"<div><p>This paper introduces sweeping permutation automata, which move over an input string in alternating left-to-right and right-to-left sweeps and have a bijective transition function. It is proved that these automata recognize the same family of languages as the classical one-way permutation automata (Thierrin, “Permutation automata”, <i>Mathematical Systems Theory</i>, 1968). The proof is constructive: an <i>n</i>-state two-way permutation automaton is transformed to a one-way permutation automaton with at most <span>(F(n)=max _{k+ell =n, m leqslant ell } k cdot { ell atopwithdelims ()m} cdot {k - 1 atopwithdelims ()ell - m} cdot (ell - m)!)</span> states (here the maximum is over all partitions of <i>n</i> into <i>k</i> states with transitions to the right and <span>(ell)</span> states with transitions to the left, where <i>m</i> states have no transitions on the left end-marker). This number of states is proved to be necessary in the worst case, and its growth rate is estimated as <span>(F(n) = n^{frac{n}{2} - frac{1 + ln 2}{2}frac{n}{ln n}(1 + o(1))})</span>.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"63 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2026-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146083195","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the hardness and approximation of the densest k-subgraph problem in parameterized metric graphs 参数化度量图中最密集k子图问题的硬度和逼近性
IF 0.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-31 DOI: 10.1007/s00236-025-00518-7
Shih-Chia Chang, Li-Hsuan Chen, Sun-Yuan Hsieh, Ling-Ju Hung, Shih-Shun Kao, Ralf Klasing

A complete weighted graph (G= (V, E, w)) is called (Delta _{beta })-metric, for some (beta ge 1/2), if G satisfies the (beta)-triangle inequality, i.e., (w(u,v) le beta cdot (w(u,x) + w(x,v))) for all vertices (u,v,xin V). Given a (Delta _{beta })-metric graph (G=(V, E, w)), the (Delta _{beta })-Weighted Densest k-Subgraph ((Delta _{beta })-WDkS) problem is to find an induced subgraph G[C] with exactly k vertices such that the total edge weight of G[C] is maximized. For (beta = 1), this problem, (Delta)-WDkS, is known NP-hard and admits a (frac{1}{2})-approximation algorithm. In this paper, we show the NP-hardness and the inapproximability of the (Delta _{beta })-WDkS problem for any (beta> 1/2). We prove that (Delta _{beta })-WDkS can be approximated to within a factor ((frac{1}{2beta }+frac{2beta -1}{2beta cdot (2k-3)})) for any (beta> frac{1}{2}) and show that the analysis of the approximation ratio is asymptotically tight. Additionally, we describe a method to adapt any (alpha)-approximation algorithm for (Delta)-WDkS to obtain a (delta _{alpha ,beta })-approximation algorithm for (Delta _{beta })-WDkS with (delta _{alpha ,beta }> alpha) for every (beta <1). This allows for improved approximations for (Delta _{beta })-WDkS instances, offering potential enhancements to existing algorithms for this problem.

一个完整的加权图(G= (V, E, w))被称为(Delta _{beta }) -metric,对于某些(beta ge 1/2),如果G满足(beta) -三角形不等式,即(w(u,v) le beta cdot (w(u,x) + w(x,v)))对于所有顶点(u,v,xin V)。给定一个(Delta _{beta }) -metric图(G=(V, E, w)), (Delta _{beta }) -Weighted denborn k- subgraph ((Delta _{beta }) -WDkS)问题是找到一个具有恰好k个顶点的诱导子图G[C],使得G[C]的总边权最大化。对于(beta = 1),这个问题(Delta) -WDkS是已知的NP-hard,并且允许使用(frac{1}{2}) -近似算法。在本文中,我们证明了对于任意(beta> 1/2), (Delta _{beta }) -WDkS问题的np -硬度和不可逼近性。证明了对于任意(beta> frac{1}{2}), (Delta _{beta }) -WDkS可以逼近到因子((frac{1}{2beta }+frac{2beta -1}{2beta cdot (2k-3)}))以内,并证明了逼近比的分析是渐近严密的。此外,我们描述了一种方法,可以将任何(alpha) -近似算法用于(Delta) -WDkS,以获得(Delta _{beta }) -WDkS的(delta _{alpha ,beta }) -近似算法,每个(beta <1)都使用(delta _{alpha ,beta }> alpha)。这允许改进(Delta _{beta }) -WDkS实例的近似,为该问题提供对现有算法的潜在增强。
{"title":"On the hardness and approximation of the densest k-subgraph problem in parameterized metric graphs","authors":"Shih-Chia Chang,&nbsp;Li-Hsuan Chen,&nbsp;Sun-Yuan Hsieh,&nbsp;Ling-Ju Hung,&nbsp;Shih-Shun Kao,&nbsp;Ralf Klasing","doi":"10.1007/s00236-025-00518-7","DOIUrl":"10.1007/s00236-025-00518-7","url":null,"abstract":"<div><p>A complete weighted graph <span>(G= (V, E, w))</span> is called <span>(Delta _{beta })</span>-metric, for some <span>(beta ge 1/2)</span>, if <i>G</i> satisfies the <span>(beta)</span>-triangle inequality, <i>i.e.,</i> <span>(w(u,v) le beta cdot (w(u,x) + w(x,v)))</span> for all vertices <span>(u,v,xin V)</span>. Given a <span>(Delta _{beta })</span>-metric graph <span>(G=(V, E, w))</span>, the <span>(Delta _{beta })</span><span>-Weighted Densest</span> <i>k</i><span>-Subgraph</span> (<span>(Delta _{beta })</span>-WD<i>k</i>S) problem is to find an induced subgraph <i>G</i>[<i>C</i>] with exactly <i>k</i> vertices such that the total edge weight of <i>G</i>[<i>C</i>] is maximized. For <span>(beta = 1)</span>, this problem, <span>(Delta)</span>-WD<i>k</i>S, is known NP-hard and admits a <span>(frac{1}{2})</span>-approximation algorithm. In this paper, we show the NP-hardness and the inapproximability of the <span>(Delta _{beta })</span>-WD<i>k</i>S problem for any <span>(beta&gt; 1/2)</span>. We prove that <span>(Delta _{beta })</span>-WD<i>k</i>S can be approximated to within a factor <span>((frac{1}{2beta }+frac{2beta -1}{2beta cdot (2k-3)}))</span> for any <span>(beta&gt; frac{1}{2})</span> and show that the analysis of the approximation ratio is asymptotically tight. Additionally, we describe a method to adapt any <span>(alpha)</span>-approximation algorithm for <span>(Delta)</span>-WD<i>k</i>S to obtain a <span>(delta _{alpha ,beta })</span>-approximation algorithm for <span>(Delta _{beta })</span>-WD<i>k</i>S with <span>(delta _{alpha ,beta }&gt; alpha)</span> for every <span>(beta &lt;1)</span>. This allows for improved approximations for <span>(Delta _{beta })</span>-WD<i>k</i>S instances, offering potential enhancements to existing algorithms for this problem.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"63 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2026-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146083057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Message recovery attack in NTRU through VFK lattices 通过VFK格的NTRU报文恢复攻击
IF 0.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2026-01-08 DOI: 10.1007/s00236-025-00512-z
Eirini D. Poimenidou, Marios Adamoudis, K. A. Draziotis, Kostas Tsichlas

In the present paper, we introduce a message recovery attack applicable to NTRU cryptosystem. Our methodology uses a reduction from the NTRU-lattice to a Voronoi First Kind (VFK) lattice, enabling the use of a polynomial Closest Vector Problem (CVP) exact algorithm, which is vital for successful message recovery. This approach assumes knowledge of the Most Significant Bit of the coefficients of a polynomial that is a multiple of the nonce. Finally, extensive experimental results for the NTRU-HPS variants submitted to NIST are presented. The findings highlight the need to properly protect NTRU schemes against potential leakage.

本文介绍了一种适用于NTRU密码系统的消息恢复攻击方法。我们的方法使用从ntrui晶格到Voronoi第一类(VFK)晶格的简化,从而可以使用多项式最接近向量问题(CVP)精确算法,这对于成功的消息恢复至关重要。这种方法假定知道nonce的倍数多项式的系数的最高有效位。最后,介绍了提交给NIST的nru - hps变体的大量实验结果。研究结果强调了适当保护NTRU计划防止潜在泄漏的必要性。
{"title":"Message recovery attack in NTRU through VFK lattices","authors":"Eirini D. Poimenidou,&nbsp;Marios Adamoudis,&nbsp;K. A. Draziotis,&nbsp;Kostas Tsichlas","doi":"10.1007/s00236-025-00512-z","DOIUrl":"10.1007/s00236-025-00512-z","url":null,"abstract":"<div><p>In the present paper, we introduce a message recovery attack applicable to NTRU cryptosystem. Our methodology uses a reduction from the NTRU-lattice to a Voronoi First Kind (VFK) lattice, enabling the use of a polynomial Closest Vector Problem (CVP) exact algorithm, which is vital for successful message recovery. This approach assumes knowledge of the Most Significant Bit of the coefficients of a polynomial that is a multiple of the nonce. Finally, extensive experimental results for the NTRU-HPS variants submitted to NIST are presented. The findings highlight the need to properly protect NTRU schemes against potential leakage.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"63 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2026-01-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145908994","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hypernode automata Hypernode自动机
IF 0.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-09 DOI: 10.1007/s00236-025-00509-8
Ezio Bartocci, Marek Chalupa, Thomas A. Henzinger, Dejan Nickovic, Ana Oliveira da Costa

In this work, we present hypernode automata as a specification formalism for hyperproperties of systems whose executions may be misaligned among themselves, such as concurrent systems. These automata consist of nodes labeled with hypernode logic formulas and transitions marked with synchronizing actions. Hypernode logic formulas establish relations between sequences of variable values among different system executions. This logic enables both synchronous and asynchronous analysis of traces. In its asynchronous view on execution traces, hypernode formulas establish relations on the order of value changes for each variable without correlating their timing. In both views, the analysis of different execution traces is synchronized through the transitions of hypernode automata. By combining logic’s declarative nature with automata’s procedural power, hypernode automata seamlessly integrate asynchronicity requirements at the node level with synchronicity between node transitions. We show that the model-checking problem for hypernode automata is decidable for specifications where each node specifies either a synchronous or an asynchronous requirement for the system’s executions, but not both.

在这项工作中,我们提出了超节点自动机作为系统的超属性的规范形式,这些系统的执行可能在它们之间不一致,例如并发系统。这些自动机由标有超级节点逻辑公式的节点和标有同步操作的转换组成。超级节点逻辑公式建立了不同系统执行中变量值序列之间的关系。该逻辑支持同步和异步跟踪分析。在执行跟踪的异步视图中,超级节点公式根据每个变量的值更改顺序建立关系,而不关联它们的时间。在这两种视图中,通过超节点自动机的转换来同步对不同执行轨迹的分析。通过将逻辑的声明性与自动机的过程性相结合,超节点自动机将节点级别的异步性需求与节点转换之间的同步性无缝地集成在一起。我们表明,对于每个节点指定系统执行的同步或异步需求(而不是两者都指定)的规范,超节点自动机的模型检查问题是可确定的。
{"title":"Hypernode automata","authors":"Ezio Bartocci,&nbsp;Marek Chalupa,&nbsp;Thomas A. Henzinger,&nbsp;Dejan Nickovic,&nbsp;Ana Oliveira da Costa","doi":"10.1007/s00236-025-00509-8","DOIUrl":"10.1007/s00236-025-00509-8","url":null,"abstract":"<div><p>In this work, we present <i>hypernode automata</i> as a specification formalism for hyperproperties of systems whose executions may be misaligned among themselves, such as concurrent systems. These automata consist of nodes labeled with <i>hypernode logic</i> formulas and transitions marked with synchronizing actions. Hypernode logic formulas establish relations between sequences of variable values among different system executions. This logic enables both synchronous and asynchronous analysis of traces. In its asynchronous view on execution traces, hypernode formulas establish relations on the order of value changes for each variable without correlating their timing. In both views, the analysis of different execution traces is synchronized through the transitions of hypernode automata. By combining logic’s declarative nature with automata’s procedural power, hypernode automata seamlessly integrate asynchronicity requirements at the node level with synchronicity between node transitions. We show that the model-checking problem for hypernode automata is decidable for specifications where each node specifies either a synchronous or an asynchronous requirement for the system’s executions, but not both.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 4","pages":""},"PeriodicalIF":0.5,"publicationDate":"2025-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-025-00509-8.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145729622","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial 2025: Going Beyond 40 社论2025:超越40岁
IF 0.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-12-08 DOI: 10.1007/s00236-025-00513-y
Henning Fernau
{"title":"Editorial 2025: Going Beyond 40","authors":"Henning Fernau","doi":"10.1007/s00236-025-00513-y","DOIUrl":"10.1007/s00236-025-00513-y","url":null,"abstract":"","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 4","pages":""},"PeriodicalIF":0.5,"publicationDate":"2025-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145730035","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient alternative strategy for finding prices in envy-free perfect matchings 在没有嫉妒的完美匹配中寻找价格的有效替代策略
IF 0.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-11-07 DOI: 10.1007/s00236-025-00511-0
Marcos Salvatierra, Juan G. Colonna, Mario Salvatierra, Alcides de C. Amorim Neto

We present a method for finding envy-free prices in a combinatorial auction where the consumers’ number n coincides with that of distinct items for sale, each consumer can buy one single item and each item has only one unit available. This is a particular case of the unit-demand envy-free pricing problem, and was recently revisited by Arbib et al. (Discr Appl Math 261:22–27, 2019, https://doi.org/10.1016/j.dam.2018.03.034). These authors proved that using a Fibonacci heap for solving the maximum weight perfect matching and the Bellman-Ford algorithm for getting the envy-free prices, the overall time complexity for solving the problem is (O(n^3)). We propose a method based on dynamic programming design strategy that seeks the optimal envy-free prices by increasing the consumers’ utilities, which has the same cubic complexity time as the aforementioned approach, but whose theoretical and empirical results indicate that our method performs faster than the shortest paths strategy, obtaining an average time reduction in determining optimal envy-free prices of approximately 48%.

本文提出了一种在组合拍卖中寻找无嫉妒价格的方法,其中消费者的编号n与不同的待售物品的编号n一致,每个消费者可以购买一个单一的物品,每个物品只有一个单位可用。这是单位需求无嫉妒定价问题的一个特殊案例,Arbib等人最近重新研究了这个问题(Discr apple Math 261:22 - 27,2019, https://doi.org/10.1016/j.dam.2018.03.034)。这些作者证明了用斐波那契堆求解最大权值完美匹配,用Bellman-Ford算法求解无嫉妒价格,求解问题的总时间复杂度为(O(n^3))。我们提出了一种基于动态规划设计策略的方法,通过增加消费者的效用来寻求最优无嫉妒价格,该方法与上述方法具有相同的立方复杂度时间,但理论和实证结果表明,我们的方法比最短路径策略执行得更快,在确定最优无嫉妒价格时平均减少了大约48个时间%.
{"title":"An efficient alternative strategy for finding prices in envy-free perfect matchings","authors":"Marcos Salvatierra,&nbsp;Juan G. Colonna,&nbsp;Mario Salvatierra,&nbsp;Alcides de C. Amorim Neto","doi":"10.1007/s00236-025-00511-0","DOIUrl":"10.1007/s00236-025-00511-0","url":null,"abstract":"<div><p>We present a method for finding envy-free prices in a combinatorial auction where the consumers’ number <i>n</i> coincides with that of distinct items for sale, each consumer can buy one single item and each item has only one unit available. This is a particular case of the <i>unit-demand envy-free pricing problem</i>, and was recently revisited by Arbib et al. (Discr Appl Math 261:22–27, 2019, https://doi.org/10.1016/j.dam.2018.03.034). These authors proved that using a Fibonacci heap for solving the maximum weight perfect matching and the Bellman-Ford algorithm for getting the envy-free prices, the overall time complexity for solving the problem is <span>(O(n^3))</span>. We propose a method based on dynamic programming design strategy that seeks the optimal envy-free prices by increasing the consumers’ utilities, which has the same cubic complexity time as the aforementioned approach, but whose theoretical and empirical results indicate that our method performs faster than the shortest paths strategy, obtaining an average time reduction in determining optimal envy-free prices of approximately 48%.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 4","pages":""},"PeriodicalIF":0.5,"publicationDate":"2025-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145456228","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Symbolic execution for refuting ∀∃ hyperproperties 用于驳斥∀超属性的符号执行
IF 0.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-27 DOI: 10.1007/s00236-025-00504-z
Arthur Correnson, Tobias Nießen, Bernd Finkbeiner, Georg Weissenbacher

Many important hyperliveness properties, such as refinement and generalized non-interference, fall into the class of (forall exists) hyperproperties, and require, for each execution trace of a system, the existence of another execution trace relating to the first one in a certain way. The alternation of quantifiers in the specification renders these hyperproperties extremely difficult to verify, or even just to test. Indeed, contrary to trace properties, where it suffices to find a single counterexample trace, refuting a (forall exists) hyperproperty requires not only to find a trace, but also a proof that no second trace exists that satisfies the specified relation with the first trace. As a consequence, automated testing of (forall exists) hyperproperties falls out of the scope of existing automated testing tools. In this paper, we present a fully automated approach to detect violations of (forall exists) hyperproperties in synchronous and asynchronous infinite-state systems. Our approach extends bug-finding techniques based on symbolic execution with support for trace quantification. We provide a prototype implementation of our approach, and demonstrate its effectiveness on a set of challenging examples.

许多重要的高活性属性,如精化和广义非干涉性,都属于(forall exists)超属性类,并且对于系统的每个执行跟踪,都要求存在另一个以某种方式与第一个执行跟踪相关的执行跟踪。规范中量词的变化使得这些超属性极难验证,甚至很难测试。实际上,与找到单个反例跟踪就足够的跟踪属性相反,反驳(forall exists)超属性不仅需要找到跟踪,还需要证明不存在满足与第一个跟踪的指定关系的第二个跟踪。因此,(forall exists)超属性的自动化测试超出了现有自动化测试工具的范围。在本文中,我们提出了一种完全自动化的方法来检测同步和异步无限状态系统中(forall exists)超属性的违反。我们的方法扩展了基于符号执行的bug查找技术,支持跟踪量化。我们提供了我们的方法的一个原型实现,并在一组具有挑战性的示例上演示了它的有效性。
{"title":"Symbolic execution for refuting ∀∃ hyperproperties","authors":"Arthur Correnson,&nbsp;Tobias Nießen,&nbsp;Bernd Finkbeiner,&nbsp;Georg Weissenbacher","doi":"10.1007/s00236-025-00504-z","DOIUrl":"10.1007/s00236-025-00504-z","url":null,"abstract":"<div><p>Many important hyperliveness properties, such as refinement and generalized non-interference, fall into the class of <span>(forall exists)</span> hyperproperties, and require, for each execution trace of a system, the existence of another execution trace relating to the first one in a certain way. The alternation of quantifiers in the specification renders these hyperproperties extremely difficult to verify, or even just to test. Indeed, contrary to trace properties, where it suffices to find a single counterexample trace, refuting a <span>(forall exists)</span> hyperproperty requires not only to find a trace, but also a proof that no second trace exists that satisfies the specified relation with the first trace. As a consequence, automated testing of <span>(forall exists)</span> hyperproperties falls out of the scope of existing automated testing tools. In this paper, we present a fully automated approach to detect violations of <span>(forall exists)</span> hyperproperties in synchronous and asynchronous infinite-state systems. Our approach extends bug-finding techniques based on symbolic execution with support for trace quantification. We provide a prototype implementation of our approach, and demonstrate its effectiveness on a set of challenging examples.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 4","pages":""},"PeriodicalIF":0.5,"publicationDate":"2025-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-025-00504-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145405627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Watson-Crick finite automata of small size and variants of string assembling systems 小尺寸的沃森-克里克有限自动机和串组合系统的变体
IF 0.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-24 DOI: 10.1007/s00236-025-00510-1
András Murvai, György Vaszil

We investigate the relationship of languages characterized by variants of string assembling systems and by Watson-Crick finite automata with a small number of states. Besides the general variant, we consider so-called free, and pure string assembling systems and compare their language generating power to Watson-Crick finite automata having one state (also called stateless) and two or three states in their state sets. We also study restricted variants of models that describe unary languages.

我们研究了以字符串组合系统的变体和具有少量状态的Watson-Crick有限自动机为特征的语言之间的关系。除了一般的变体,我们考虑了所谓的自由和纯字符串组装系统,并将其语言生成能力与具有一个状态(也称为无状态)和两个或三个状态在其状态集中的沃森-克里克有限自动机进行比较。我们还研究了描述一元语言的模型的受限变体。
{"title":"Watson-Crick finite automata of small size and variants of string assembling systems","authors":"András Murvai,&nbsp;György Vaszil","doi":"10.1007/s00236-025-00510-1","DOIUrl":"10.1007/s00236-025-00510-1","url":null,"abstract":"<div><p>We investigate the relationship of languages characterized by variants of string assembling systems and by Watson-Crick finite automata with a small number of states. Besides the general variant, we consider so-called free, and pure string assembling systems and compare their language generating power to Watson-Crick finite automata having one state (also called stateless) and two or three states in their state sets. We also study restricted variants of models that describe unary languages.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 4","pages":""},"PeriodicalIF":0.5,"publicationDate":"2025-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-025-00510-1.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145352587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Acta Informatica
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1