首页 > 最新文献

Acta Informatica最新文献

英文 中文
Explainability requirements as hyperproperties 可解释性要求作为超属性
IF 0.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-10-13 DOI: 10.1007/s00236-025-00507-w
Bernd Finkbeiner, Julian Siber

Explainability is emerging as a key requirement for autonomous systems. While many works have focused on what constitutes a valid explanation, few have considered formalizing explainability as a system property. In this work, we approach this problem from the perspective of hyperproperties. We start with a combination of three prominent flavors of modal logic and show how they can be used for specifying and verifying counterfactual explainability in multi-agent systems: With Lewis’ counterfactuals, linear-time temporal logic, and a knowledge modality, we can reason about whether agents know why a specific observation occurs, i.e., whether that observation is explainable to them. We use this logic to formalize multiple notions of explainability on the system level. We then show how this logic can be embedded into a hyperlogic. Notably, from this analysis we conclude that the model-checking problem of our logic is decidable, which paves the way for the automated verification of explainability requirements.

可解释性正成为自主系统的一个关键要求。虽然许多工作都集中在构成有效解释的内容上,但很少有人考虑将可解释性形式化为系统属性。在这项工作中,我们从超性质的角度来解决这个问题。我们从三种主要模态逻辑的组合开始,并展示了它们如何用于指定和验证多智能体系统中的反事实可解释性:通过刘易斯的反事实、线性时间-时间逻辑和知识模态,我们可以推断智能体是否知道为什么会发生特定的观察,即,该观察是否可以解释给他们。我们使用这个逻辑来形式化系统级别的可解释性的多个概念。然后,我们将展示如何将此逻辑嵌入到超逻辑中。值得注意的是,从这个分析中我们得出结论,逻辑的模型检查问题是可确定的,这为可解释性需求的自动验证铺平了道路。
{"title":"Explainability requirements as hyperproperties","authors":"Bernd Finkbeiner,&nbsp;Julian Siber","doi":"10.1007/s00236-025-00507-w","DOIUrl":"10.1007/s00236-025-00507-w","url":null,"abstract":"<div><p>Explainability is emerging as a key requirement for autonomous systems. While many works have focused on what constitutes a valid explanation, few have considered formalizing explainability as a system property. In this work, we approach this problem from the perspective of hyperproperties. We start with a combination of three prominent flavors of modal logic and show how they can be used for specifying and verifying counterfactual explainability in multi-agent systems: With Lewis’ counterfactuals, linear-time temporal logic, and a knowledge modality, we can reason about whether agents know <i>why</i> a specific observation occurs, i.e., whether that observation is <i>explainable</i> to them. We use this logic to formalize multiple notions of explainability on the system level. We then show how this logic can be embedded into a hyperlogic. Notably, from this analysis we conclude that the model-checking problem of our logic is decidable, which paves the way for the automated verification of explainability requirements.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 4","pages":""},"PeriodicalIF":0.5,"publicationDate":"2025-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-025-00507-w.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145315664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spanning cactus and spanning cactus extension of outerplanar graphs 外平面图的生成仙人掌和生成仙人掌的扩展
IF 0.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-24 DOI: 10.1007/s00236-025-00506-x
Chinmay Debnath, Alak Kumar Datta

Minimum spanning cactus and minimum spanning cactus extension problems on outerplanar graphs are studied. Linear algorithms are presented for both problems on outerplanar graphs. A partitioning technique is introduced that partitions a maximal biconnected outerplanar graph into a set of maximal star-outerplanar subgraphs and some chords. Further, the minimum spanning cacti of these star-outerplanar subgraphs can be computed and suitably combined to get a minimum spanning cactus and a minimum spanning cactus extension of a given outerplanar graph.

研究了外平面图上的最小生成仙人掌和最小生成仙人掌的可拓问题。给出了这两个问题在外平面图上的线性算法。介绍了一种将极大双连通外平面图划分为极大星-外平面子图集和若干弦的划分技术。此外,还可以计算这些星-外平面子图的最小生成仙人掌,并将其适当地组合在一起,得到给定外平面图的最小生成仙人掌和最小生成仙人掌扩展。
{"title":"Spanning cactus and spanning cactus extension of outerplanar graphs","authors":"Chinmay Debnath,&nbsp;Alak Kumar Datta","doi":"10.1007/s00236-025-00506-x","DOIUrl":"10.1007/s00236-025-00506-x","url":null,"abstract":"<div><p>Minimum spanning cactus and minimum spanning cactus extension problems on outerplanar graphs are studied. Linear algorithms are presented for both problems on outerplanar graphs. A partitioning technique is introduced that partitions a maximal biconnected outerplanar graph into a set of maximal star-outerplanar subgraphs and some chords. Further, the minimum spanning cacti of these star-outerplanar subgraphs can be computed and suitably combined to get a minimum spanning cactus and a minimum spanning cactus extension of a given outerplanar graph.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 4","pages":""},"PeriodicalIF":0.5,"publicationDate":"2025-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145122436","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shortest characteristic factors of a deterministic finite automaton and computing its positive position run by pattern set matching 确定有限自动机的最短特征因子及基于模式集匹配的正位置计算
IF 0.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-09-10 DOI: 10.1007/s00236-025-00484-0
Jan Janoušek, Štěpán Plachý

Given a deterministic finite automaton (DFA) A, we present a simple algorithm for constructing deterministic finite automata that accept the shortest forbidden factors, the shortest forbidden prefixes, the shortest forbidden suffixes, the shortest forbidden words, the shortest allowed suffixes, and the shortest allowed words of the automaton A. We refer to these sets as the shortest characteristic factors of the automaton A. If the given automaton is local, and therefore the language it accepts is strictly locally testable, the sets of its shortest characteristic factors are finite, and these automata are acyclic. Otherwise, they accept infinite languages. This approach simplifies existing methods for the extraction of forbidden factors, allows the extraction of more types of characteristic factors, and also generalizes the extraction for all classes of DFAs. Furthermore, we demonstrate that this type of extraction can be used for a sublinear run of an automaton for certain inputs. We define a positive position run of a deterministic finite automaton, representing all positions in an input string where the automaton reaches a final state. Finally, we present an algorithm for computing the positive position run of the automaton, which utilizes pattern set matching of its shortest forbidden factors and its shortest forbidden or allowed suffixes, provided that the sets are finite. We showcase the computation of the positive position run of a local automaton using backward pattern set matching, which can achieve sublinear time.

给定一个确定性有限自动机(DFA) a,我们提出了一种构造确定性有限自动机的简单算法,该自动机接受a的最短禁止因子、最短禁止前缀、最短禁止后缀、最短禁止单词、最短允许后缀和最短允许单词。我们将这些集合称为a的最短特征因子。因此它所接受的语言是严格的局部可测试的,它的最短特征因子的集合是有限的,并且这些自动机是无循环的。否则,他们接受无限的语言。该方法简化了现有的禁止因子提取方法,允许提取更多类型的特征因子,并将提取推广到所有类别的dfa。此外,我们证明了这种类型的提取可以用于对某些输入的自动机的次线性运行。我们定义一个确定性有限自动机的正位置运行,表示输入字符串中自动机达到最终状态的所有位置。最后,我们提出了一种计算自动机正位置运行的算法,该算法利用自动机的最短禁止因子和最短禁止或允许后缀的模式集匹配,假设集合是有限的。我们展示了使用反向模式集匹配计算局部自动机的正位置运行,可以实现亚线性时间。
{"title":"Shortest characteristic factors of a deterministic finite automaton and computing its positive position run by pattern set matching","authors":"Jan Janoušek,&nbsp;Štěpán Plachý","doi":"10.1007/s00236-025-00484-0","DOIUrl":"10.1007/s00236-025-00484-0","url":null,"abstract":"<div><p>Given a deterministic finite automaton (DFA) A, we present a simple algorithm for constructing deterministic finite automata that accept the shortest forbidden factors, the shortest forbidden prefixes, the shortest forbidden suffixes, the shortest forbidden words, the shortest allowed suffixes, and the shortest allowed words of the automaton A. We refer to these sets as the shortest characteristic factors of the automaton A. If the given automaton is local, and therefore the language it accepts is strictly locally testable, the sets of its shortest characteristic factors are finite, and these automata are acyclic. Otherwise, they accept infinite languages. This approach simplifies existing methods for the extraction of forbidden factors, allows the extraction of more types of characteristic factors, and also generalizes the extraction for all classes of DFAs. Furthermore, we demonstrate that this type of extraction can be used for a sublinear run of an automaton for certain inputs. We define a positive position run of a deterministic finite automaton, representing all positions in an input string where the automaton reaches a final state. Finally, we present an algorithm for computing the positive position run of the automaton, which utilizes pattern set matching of its shortest forbidden factors and its shortest forbidden or allowed suffixes, provided that the sets are finite. We showcase the computation of the positive position run of a local automaton using backward pattern set matching, which can achieve sublinear time.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 3","pages":""},"PeriodicalIF":0.5,"publicationDate":"2025-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-025-00484-0.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145021493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parameterized lower bounds for the weighted vertex cover problem in trees 树中加权顶点覆盖问题的参数化下界
IF 0.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-30 DOI: 10.1007/s00236-025-00498-8
P. Wojciechowski, K. Subramani

In this paper, we analyze the weighted partial vertex cover problem on undirected, vertex-weighted, edge-weighted trees (WPVCT). This problem has been studied in the literature from the perspectives of exact and approximation algorithms. We investigate this problem from the perspectives of parameterization and kernelization. The WPVCT problem finds applications in a number of domains including communications, logistics and data science. This problem is defined by a number of parameters (input, output and structural). We focus on the number of vertices in the optimal cover as the parameter of interest (output parameter). One of our results is a lower bound for parameterized algorithms for the WPVCT problem. A second result is a lower bound on the number of bits in a kernel for the same problem. Both these results are based on the Exponential Time Hypothesis (ETH).

本文研究了无向、顶点加权、边加权树(WPVCT)上的加权部分顶点覆盖问题。这个问题在文献中已经从精确和近似算法的角度进行了研究。我们从参数化和核化的角度来研究这个问题。WPVCT问题在许多领域都有应用,包括通信、物流和数据科学。这个问题由许多参数(输入、输出和结构)定义。我们将最优覆盖中的顶点数量作为感兴趣的参数(输出参数)。我们的结果之一是WPVCT问题的参数化算法的下界。第二个结果是同一个问题的核中位数的下界。这两个结果都是基于指数时间假设(ETH)。
{"title":"Parameterized lower bounds for the weighted vertex cover problem in trees","authors":"P. Wojciechowski,&nbsp;K. Subramani","doi":"10.1007/s00236-025-00498-8","DOIUrl":"10.1007/s00236-025-00498-8","url":null,"abstract":"<div><p>In this paper, we analyze the weighted partial vertex cover problem on undirected, vertex-weighted, edge-weighted trees (WPVCT). This problem has been studied in the literature from the perspectives of exact and approximation algorithms. We investigate this problem from the perspectives of parameterization and kernelization. The WPVCT problem finds applications in a number of domains including communications, logistics and data science. This problem is defined by a number of parameters (input, output and structural). We focus on the number of vertices in the optimal cover as the parameter of interest (output parameter). One of our results is a lower bound for parameterized algorithms for the WPVCT problem. A second result is a lower bound on the number of bits in a kernel for the same problem. Both these results are based on the Exponential Time Hypothesis (ETH).</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 3","pages":""},"PeriodicalIF":0.5,"publicationDate":"2025-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144920536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On integer linear programs for treewidth based on perfect elimination orderings (extended version) 基于完全消去序的树宽整数线性规划(扩展版)
IF 0.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-26 DOI: 10.1007/s00236-025-00505-y
Sven Mallach

We analyze integer programming formulations for determining the treewidth of a graph that are based on perfect elimination orderings. For the first time, we prove structural properties that explain their limitations in providing convenient lower bounds and show how the latter are constituted. Moreover, we investigate a flow metric approach that proved promising to achieve approximation guarantees for the pathwidth of a graph, and we show why these techniques cannot be carried over to improve the addressed treewidth formulations. In addition, we present two complementary formulations for treewidth that employ positional rather than relational variables. Via computational experiments, we provide an impression on the quality and proportionality of the lower bounds on the treewidth obtained with different relaxations of perfect elimination ordering formulations.

本文分析了基于完全消去序的图树宽度的整数规划公式。我们首次证明了结构性质,解释了它们在提供方便的下界方面的局限性,并展示了后者是如何构成的。此外,我们研究了一种流量度量方法,该方法被证明有希望实现图的路径宽度的近似保证,并且我们说明了为什么这些技术不能用于改进寻址树宽度公式。此外,我们提出了两个互补的公式为树宽度,采用位置而不是关系变量。通过计算实验,我们对完全消去排序公式的不同松弛得到的树宽下界的质量和比例性给出了印象。
{"title":"On integer linear programs for treewidth based on perfect elimination orderings (extended version)","authors":"Sven Mallach","doi":"10.1007/s00236-025-00505-y","DOIUrl":"10.1007/s00236-025-00505-y","url":null,"abstract":"<div><p>We analyze integer programming formulations for determining the treewidth of a graph that are based on perfect elimination orderings. For the first time, we prove structural properties that explain their limitations in providing convenient lower bounds and show how the latter are constituted. Moreover, we investigate a flow metric approach that proved promising to achieve approximation guarantees for the pathwidth of a graph, and we show why these techniques cannot be carried over to improve the addressed treewidth formulations. In addition, we present two complementary formulations for treewidth that employ positional rather than relational variables. Via computational experiments, we provide an impression on the quality and proportionality of the lower bounds on the treewidth obtained with different relaxations of perfect elimination ordering formulations.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 3","pages":""},"PeriodicalIF":0.5,"publicationDate":"2025-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-025-00505-y.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144897056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reasoning over n-indexed sequences in SMT 在SMT中对n索引序列进行推理
IF 0.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-21 DOI: 10.1007/s00236-025-00496-w
Hichem Rami Ait-El-Hara, François Bobot, Guillaume Bury

The SMT (Satisfiability Modulo Theories) theory of arrays is well-established and widely used, with various decision procedures and extensions developed for it. However, recent contributions suggest that developing tailored reasoning for some theories, such as sequences and strings, can be more efficient than reasoning over them through axiomatization over the theory of arrays. In this paper, we are interested in reasoning over (n)-indexed sequences as they are found in some programming languages, such as Ada. We propose an SMT theory of (n)-indexed sequences and explore different ways to represent and reason over (n)-indexed sequences using existing theories, as well as tailored calculi for this theory.

阵列的可满足模理论(SMT)已经建立并得到了广泛的应用,并发展了各种决策程序和扩展。然而,最近的贡献表明,为某些理论(如序列和字符串)开发量身定制的推理,可能比通过对数组理论的公理化进行推理更有效。在本文中,我们感兴趣的是对(n)索引序列的推理,因为它们存在于一些编程语言中,比如Ada。我们提出了一个(n) -索引序列的SMT理论,并利用现有的理论探索了对(n) -索引序列进行表示和推理的不同方法,以及为该理论量身定制的微积分。
{"title":"Reasoning over n-indexed sequences in SMT","authors":"Hichem Rami Ait-El-Hara,&nbsp;François Bobot,&nbsp;Guillaume Bury","doi":"10.1007/s00236-025-00496-w","DOIUrl":"10.1007/s00236-025-00496-w","url":null,"abstract":"<div><p>The SMT (Satisfiability Modulo Theories) theory of arrays is well-established and widely used, with various decision procedures and extensions developed for it. However, recent contributions suggest that developing tailored reasoning for some theories, such as sequences and strings, can be more efficient than reasoning over them through axiomatization over the theory of arrays. In this paper, we are interested in reasoning over <span>(n)</span>-indexed sequences as they are found in some programming languages, such as Ada. We propose an SMT theory of <span>(n)</span>-indexed sequences and explore different ways to represent and reason over <span>(n)</span>-indexed sequences using existing theories, as well as tailored calculi for this theory.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 3","pages":""},"PeriodicalIF":0.5,"publicationDate":"2025-08-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-025-00496-w.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144880893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the 3-tree core of plane graphs 关于平面图的三树核
IF 0.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-18 DOI: 10.1007/s00236-025-00503-0
Debajyoti Mondal, Md. Saidur Rahman

A drawing of a graph is a geometric representation of its vertices and edges. Plane 3-trees have been well studied in graph drawing literature. For many graph drawing styles, the aesthetic qualities achieved for plane 3-trees are much better than the ones known for general plane graphs. This motivates us to investigate whether one can find a large plane 3-tree type structure in a general plane graph, and if so, whether it can be leveraged to obtain a better drawing for the graph. We thus introduce the concept of a 3-tree core H of a 3-connected plane graph G. Here, H is an edge-labeled plane 3-tree that represents G, and the distance d between H and G is the number of vertices of G that are missing in H. As an application of this concept, we consider the planar ortho-path visibility drawing, where each vertex is drawn as an orthogonal polygonal chain on an integer grid and each edge is drawn as an orthogonal line segment between the paths corresponding to its end vertices. We show that if H has a flat visibility drawing (i.e., each ortho-path is a horizontal line segment) with height k, then G has an ortho-path visibility drawing with height (O(k2^d)). In particular, if G is a planar triangulation and not too distant from a 3-tree core, i.e., (d=O(1)), then G can be drawn with height (4n/9+O(1)) by choosing an appropriate planar embedding. This bound is interesting as it is significantly smaller than the lower bound of (2n/3+O(1)) when the ortho-path visibility drawing must respect the input embedding.

图形的绘图是其顶点和边的几何表示。平面3树在图形绘制文献中得到了很好的研究。对于许多图形绘制风格,平面3-tree所获得的美学质量比一般平面图形所获得的美学质量要好得多。这促使我们研究是否可以在一般平面图中找到一个大的平面3-tree型结构,如果可以,是否可以利用它来获得更好的图形绘制。因此,我们引入了3连通平面图G的3树核心H的概念,其中H是表示G的一棵带边标记的平面3树,H与G之间的距离d是H中缺少的G的顶点数。作为这一概念的应用,我们考虑平面正交路径可见性图,其中每个顶点绘制为整数网格上的正交多边形链,每个边绘制为与其端点对应的路径之间的正交线段。我们证明,如果H具有高度为k的平面可见性图(即,每个正交路径都是水平线段),则G具有高度为(O(k2^d))的正交路径可见性图。特别是,如果G是平面三角剖分,并且距离3树核心不太远,即(d=O(1)),则可以通过选择合适的平面嵌入来绘制高度为(4n/9+O(1))的G。这个边界很有趣,因为当正交路径可见性绘图必须尊重输入嵌入时,它明显小于(2n/3+O(1))的下界。
{"title":"On the 3-tree core of plane graphs","authors":"Debajyoti Mondal,&nbsp;Md. Saidur Rahman","doi":"10.1007/s00236-025-00503-0","DOIUrl":"10.1007/s00236-025-00503-0","url":null,"abstract":"<div><p>A drawing of a graph is a geometric representation of its vertices and edges. Plane 3-trees have been well studied in graph drawing literature. For many graph drawing styles, the aesthetic qualities achieved for plane 3-trees are much better than the ones known for general plane graphs. This motivates us to investigate whether one can find a large plane 3-tree type structure in a general plane graph, and if so, whether it can be leveraged to obtain a better drawing for the graph. We thus introduce the concept of a 3-tree core <i>H</i> of a 3-connected plane graph <i>G</i>. Here, <i>H</i> is an edge-labeled plane 3-tree that represents <i>G</i>, and the distance <i>d</i> between <i>H</i> and <i>G</i> is the number of vertices of <i>G</i> that are missing in <i>H</i>. As an application of this concept, we consider the planar ortho-path visibility drawing, where each vertex is drawn as an orthogonal polygonal chain on an integer grid and each edge is drawn as an orthogonal line segment between the paths corresponding to its end vertices. We show that if <i>H</i> has a flat visibility drawing (i.e., each ortho-path is a horizontal line segment) with height <i>k</i>, then <i>G</i> has an ortho-path visibility drawing with height <span>(O(k2^d))</span>. In particular, if <i>G</i> is a planar triangulation and not too distant from a 3-tree core, i.e., <span>(d=O(1))</span>, then <i>G</i> can be drawn with height <span>(4n/9+O(1))</span> by choosing an appropriate planar embedding. This bound is interesting as it is significantly smaller than the lower bound of <span>(2n/3+O(1))</span> when the ortho-path visibility drawing must respect the input embedding.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 3","pages":""},"PeriodicalIF":0.5,"publicationDate":"2025-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144861438","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tracy, traces, and transducers: computable counterexamples and explanations for HyperLTL model-checking Tracy,跟踪和换能器:HyperLTL模型检查的可计算反例和解释
IF 0.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-18 DOI: 10.1007/s00236-025-00499-7
Sarah Winter, Martin Zimmermann

HyperLTL model-checking enables the automated verification of information-flow properties for security-critical systems. However, it only provides a binary answer. Here, we consider the problem of computing counterexamples and explanations for HyperLTL model-checking, thereby considerably increasing its usefulness. Based on the maxim “counterexamples/explanations are Skolem functions for the existentially quantified trace variables”, we consider (Turing machine) computable Skolem functions. As not every finite transition system and formula have computable Skolem functions witnessing that the system satisfies the formula, we consider the problem of deciding whether such functions exist. Our main result shows that this problem is decidable by reducing it to solving multiplayer games with hierarchical imperfect information. Furthermore, our algorithm also computes transducers implementing such functions, if they exist.

HyperLTL模型检查支持对安全关键型系统的信息流属性进行自动验证。然而,它只提供一个二进制的答案。在这里,我们考虑计算HyperLTL模型检查的反例和解释的问题,从而大大增加了它的有用性。基于“反例/解释是存在量化轨迹变量的Skolem函数”这一准则,我们考虑图灵机的可计算Skolem函数。由于并不是每一个有限过渡系统和公式都有可计算的Skolem函数证明系统满足公式,我们考虑了判定这种函数是否存在的问题。我们的主要结果表明,这个问题可以通过将其简化为解决具有分层不完全信息的多人游戏来决定。此外,我们的算法还计算实现这些功能的传感器,如果它们存在的话。
{"title":"Tracy, traces, and transducers: computable counterexamples and explanations for HyperLTL model-checking","authors":"Sarah Winter,&nbsp;Martin Zimmermann","doi":"10.1007/s00236-025-00499-7","DOIUrl":"10.1007/s00236-025-00499-7","url":null,"abstract":"<div><p>HyperLTL model-checking enables the automated verification of information-flow properties for security-critical systems. However, it only provides a binary answer. Here, we consider the problem of computing counterexamples and explanations for HyperLTL model-checking, thereby considerably increasing its usefulness. Based on the maxim “counterexamples/explanations are Skolem functions for the existentially quantified trace variables”, we consider (Turing machine) computable Skolem functions. As not every finite transition system and formula have computable Skolem functions witnessing that the system satisfies the formula, we consider the problem of deciding whether such functions exist. Our main result shows that this problem is decidable by reducing it to solving multiplayer games with hierarchical imperfect information. Furthermore, our algorithm also computes transducers implementing such functions, if they exist.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 3","pages":""},"PeriodicalIF":0.5,"publicationDate":"2025-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-025-00499-7.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144861439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Gray-box runtime enforcement of hyperproperties 超属性的灰盒运行时强制
IF 0.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-09 DOI: 10.1007/s00236-025-00502-1
Tzu-Han Hsu, Ana Oliveira da Costa, Andrew Wintenberg, Ezio Bartocci, Borzoo Bonakdarpour

Enforcement of information-flow policies has been extensively studied by language-based approaches over the past few decades. In this paper, we propose an alternative, novel, general, and effective approach using enforcement of hyperproperties– a powerful formalism for expressing and reasoning about a wide range of information-flow security policies. We study black- vs. gray- vs. white-box enforcement of hyperproperties expressed by nondeterministic finite-word hyperautomata (NFH), where the enforcer has null, some, or complete information about the implementation of the system under scrutiny. Given an NFH, in order to generate a runtime enforcer, we reduce the problem to controller synthesis for hyperproperties and subsequently to the satisfiability problem for quantified Boolean formulas (QBFs). The resulting enforcers are transferable with low-overhead. We conduct a rich set of case studies, including information-flow control for JavaScript code, as well as synthesizing obfuscators for control plants.

在过去的几十年里,信息流策略的实施已经通过基于语言的方法得到了广泛的研究。在本文中,我们提出了一种可选的、新颖的、通用的和有效的方法,该方法使用了超特性的实施——一种用于表达和推理广泛的信息流安全策略的强大形式。我们研究由非确定性有限词超自动机(NFH)表达的超特性的黑盒、灰盒和白盒强制执行,其中强制执行器具有关于被审查的系统实现的null、一些或完整的信息。给定一个NFH,为了生成一个运行时强制器,我们将问题简化为超属性的控制器综合,然后将问题简化为量化布尔公式(QBFs)的可满足性问题。由此产生的执行者可以低开销地转移。我们进行了丰富的案例研究,包括JavaScript代码的信息流控制,以及控制工厂的合成混淆器。
{"title":"Gray-box runtime enforcement of hyperproperties","authors":"Tzu-Han Hsu,&nbsp;Ana Oliveira da Costa,&nbsp;Andrew Wintenberg,&nbsp;Ezio Bartocci,&nbsp;Borzoo Bonakdarpour","doi":"10.1007/s00236-025-00502-1","DOIUrl":"10.1007/s00236-025-00502-1","url":null,"abstract":"<div><p>Enforcement of information-flow policies has been extensively studied by language-based approaches over the past few decades. In this paper, we propose an alternative, novel, general, and effective approach using enforcement of <i>hyperproperties</i>– a powerful formalism for expressing and reasoning about a wide range of information-flow security policies. We study <i>black-</i> vs. <i>gray-</i> vs. <i>white-box</i> enforcement of hyperproperties expressed by nondeterministic finite-word hyperautomata (NFH), where the enforcer has null, some, or complete information about the implementation of the system under scrutiny. Given an NFH, in order to generate a runtime enforcer, we reduce the problem to controller synthesis for hyperproperties and subsequently to the satisfiability problem for quantified Boolean formulas (QBFs). The resulting enforcers are transferable with low-overhead. We conduct a rich set of case studies, including information-flow control for JavaScript code, as well as synthesizing obfuscators for control plants.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 3","pages":""},"PeriodicalIF":0.5,"publicationDate":"2025-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-025-00502-1.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145163654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preserving hyperproperties of programs using primitives with consensus number 2 保留使用共识数为2的原语的程序的超属性
IF 0.5 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2025-08-06 DOI: 10.1007/s00236-025-00500-3
Hagit Attiya, Armando Castañeda, Constantin Enea

When a concrete concurrent object refines another, more abstract object, the correctness of a program employing the concrete object can be verified by considering its behaviors when using the more abstract object. This approach is sound for trace properties of the program, but not for hyperproperties, including many security properties and probability distributions of events. We define strong observational refinement, a strengthening of refinement that preserves hypersafety properties, and prove that it is equivalent to the existence of forward simulations. We show that strong observational refinement generalizes strong linearizability, a restriction of linearizability, the prevalent consistency condition for implementing concurrent objects. Our results imply that strong linearizability is also equivalent to existence of forward simulations, and show that strongly linearizable implementations can be composed both horizontally and vertically. This paper also investigates whether there are wait-free strongly-linearizable implementations from realistic primitives such as test&set or fetch&add, whose consensus number is 2. We show that many objects with consensus number 1 have wait-free strongly-linearizable implementations from fetch&add. We also show that several objects with consensus number 2 have wait-free or lock-free implementations from other objects with consensus number 2. In contrast, we prove that even when fetch&add, swap and test&set primitives are used, some objects with consensus number 2 do not have lock-free strongly-linearizable implementations. This includes queues and stacks, and relaxed variants thereof.

当一个具体的并发对象精炼另一个更抽象的对象时,可以通过考虑它在使用更抽象的对象时的行为来验证使用该具体对象的程序的正确性。这种方法适用于程序的跟踪属性,但不适用于超属性,包括许多安全属性和事件的概率分布。我们定义了强观测精化,一种保留超安全特性的精化强化,并证明了它等价于正演模拟的存在。我们证明了强观测细化推广了强线性化,这是线性化的一个限制,是实现并发对象的普遍一致性条件。我们的结果表明,强线性化也等同于正演模拟的存在,并表明强线性化的实现可以在水平和垂直方向上组成。本文还研究了是否存在基于现实原语(如test&;set或fetch&;add)的无等待强线性化实现,其一致性数为2。我们展示了许多共识号为1的对象都有fetch&;add的无等待强线性实现。我们还展示了几个具有共识号为2的对象具有来自其他具有共识号为2的对象的无等待或无锁实现。相反,我们证明了即使使用了fetchadd、swap和testset原语,一些具有共识2的对象也没有无锁的强线性化实现。这包括队列和堆栈,以及它们的放松变体。
{"title":"Preserving hyperproperties of programs using primitives with consensus number 2","authors":"Hagit Attiya,&nbsp;Armando Castañeda,&nbsp;Constantin Enea","doi":"10.1007/s00236-025-00500-3","DOIUrl":"10.1007/s00236-025-00500-3","url":null,"abstract":"<div><p>When a concrete concurrent object <i>refines</i> another, more abstract object, the correctness of a program employing the concrete object can be verified by considering its behaviors when using the more abstract object. This approach is sound for <i>trace properties</i> of the program, but not for <i>hyperproperties</i>, including many security properties and probability distributions of events. We define <i>strong observational refinement</i>, a strengthening of refinement that preserves hypersafety properties, and prove that it is <i>equivalent</i> to the existence of <i>forward simulations</i>. We show that strong observational refinement generalizes <i>strong linearizability</i>, a restriction of <i>linearizability</i>, the prevalent consistency condition for implementing concurrent objects. Our results imply that strong linearizability is also equivalent to existence of forward simulations, and show that strongly linearizable implementations can be composed both horizontally and vertically. This paper also investigates whether there are wait-free strongly-linearizable implementations from realistic primitives such as test&amp;set or fetch&amp;add, whose consensus number is 2. We show that many objects with consensus number 1 have wait-free strongly-linearizable implementations from fetch&amp;add. We also show that several objects with consensus number 2 have wait-free or lock-free implementations from other objects with consensus number 2. In contrast, we prove that even when fetch&amp;add, swap and test&amp;set primitives are used, some objects with consensus number 2 do not have lock-free strongly-linearizable implementations. This includes queues and stacks, and relaxed variants thereof.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 3","pages":""},"PeriodicalIF":0.5,"publicationDate":"2025-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-025-00500-3.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145162477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Acta Informatica
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1