首页 > 最新文献

Acta Informatica最新文献

英文 中文
Discovering workflow nets of concurrent iterative processes 发现并行迭代过程的工作流网络
4区 计算机科学 Q3 Computer Science Pub Date : 2023-09-14 DOI: 10.1007/s00236-023-00445-5
Tonatiuh Tapia-Flores, Ernesto López-Mellado
Abstract A novel and efficient method for discovering concurrent workflow processes is presented. It allows building a suitable workflow net (WFN) from a large event log $$lambda $$ λ , which represents the behaviour of complex iterative processes involving concurrency. First, the t -invariants are determined from $$lambda $$ λ ; this allows computing the causal and concurrent relations between the events and the implicit causal relations between events that do not appear consecutively in $$lambda $$ λ . Then a 1-bounded WFN is built, which could be eventually adjusted if its t -invariants do not match with those computed from $$lambda $$ λ . The discovered model allows firing all the traces in $$lambda $$ λ . The procedures derived from the method are polynomial time on $$|lambda |$$ | λ | ; they have been implemented and tested on artificial logs.
摘要提出了一种新的发现并发工作流过程的有效方法。它允许从大型事件日志$$lambda $$ λ中构建合适的工作流网络(WFN),该日志表示涉及并发性的复杂迭代过程的行为。首先,t不变量由$$lambda $$ λ确定;这允许计算事件之间的因果关系和并发关系,以及在$$lambda $$ λ中不连续出现的事件之间的隐含因果关系。然后构建一个有1界的WFN,如果它的t不变量与$$lambda $$ λ计算的不变量不匹配,最终可以对其进行调整。发现的模型允许触发$$lambda $$ λ中的所有轨迹。该方法得到的程序是多项式时间$$|lambda |$$ | λ |;它们已在人工原木上实施并进行了测试。
{"title":"Discovering workflow nets of concurrent iterative processes","authors":"Tonatiuh Tapia-Flores, Ernesto López-Mellado","doi":"10.1007/s00236-023-00445-5","DOIUrl":"https://doi.org/10.1007/s00236-023-00445-5","url":null,"abstract":"Abstract A novel and efficient method for discovering concurrent workflow processes is presented. It allows building a suitable workflow net (WFN) from a large event log $$lambda $$ <mml:math xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"> <mml:mi>λ</mml:mi> </mml:math> , which represents the behaviour of complex iterative processes involving concurrency. First, the t -invariants are determined from $$lambda $$ <mml:math xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"> <mml:mi>λ</mml:mi> </mml:math> ; this allows computing the causal and concurrent relations between the events and the implicit causal relations between events that do not appear consecutively in $$lambda $$ <mml:math xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"> <mml:mi>λ</mml:mi> </mml:math> . Then a 1-bounded WFN is built, which could be eventually adjusted if its t -invariants do not match with those computed from $$lambda $$ <mml:math xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"> <mml:mi>λ</mml:mi> </mml:math> . The discovered model allows firing all the traces in $$lambda $$ <mml:math xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"> <mml:mi>λ</mml:mi> </mml:math> . The procedures derived from the method are polynomial time on $$|lambda |$$ <mml:math xmlns:mml=\"http://www.w3.org/1998/Math/MathML\"> <mml:mrow> <mml:mo>|</mml:mo> <mml:mi>λ</mml:mi> <mml:mo>|</mml:mo> </mml:mrow> </mml:math> ; they have been implemented and tested on artificial logs.","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134911044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The second step in characterizing a three-word code 描述三字代码的第二步
IF 0.6 4区 计算机科学 Q3 Computer Science Pub Date : 2023-09-08 DOI: 10.1007/s00236-023-00444-6
Chunhua Cao, Jiao Xu, Lei Liao, Di Yang, Guichuan Jia, Qian Du

In the fields of combinatorics on words and theory of codes, a two-word language ({x, y}) is a code if and only if (xy not = yx). But up to now, corresponding characterizations for a three-word language, which forms a code, have not been completely found. Let (X={x, y, z}) be a three-word language and (|x|, |y|, |z|) be their lengths. When (|x| = |y| < |z|), a necessary and sufficient condition for X to be a code was obtained in 2018. If (|x| < |y| = |z| le 2|x|), a necessary and sufficient condition for X to be a code is proposed in this paper.

在词的组合学领域和码理论中,两个词的语言({x, y})是一个码当且仅当(xy not = yx)。但是到目前为止,对于构成一个码的三字语言,还没有完全找到相应的表征。让(X={x, y, z})是一个三个单词的语言,(|x|, |y|, |z|)是它们的长度。当(|x| = |y| < |z|), 2018年获得X为代码的充分必要条件。如果(|x| < |y| = |z| le 2|x|),本文给出了X为码的充分必要条件。
{"title":"The second step in characterizing a three-word code","authors":"Chunhua Cao,&nbsp;Jiao Xu,&nbsp;Lei Liao,&nbsp;Di Yang,&nbsp;Guichuan Jia,&nbsp;Qian Du","doi":"10.1007/s00236-023-00444-6","DOIUrl":"10.1007/s00236-023-00444-6","url":null,"abstract":"<div><p>In the fields of combinatorics on words and theory of codes, a two-word language <span>({x, y})</span> is a code if and only if <span>(xy not = yx)</span>. But up to now, corresponding characterizations for a three-word language, which forms a code, have not been completely found. Let <span>(X={x, y, z})</span> be a three-word language and <span>(|x|, |y|, |z|)</span> be their lengths. When <span>(|x| = |y| &lt; |z|)</span>, a necessary and sufficient condition for <i>X</i> to be a code was obtained in 2018. If <span>(|x| &lt; |y| = |z| le 2|x|)</span>, a necessary and sufficient condition for <i>X</i> to be a code is proposed in this paper.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2023-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48790117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On first-order runtime enforcement of branching-time properties 分支时间属性的一阶运行时强制
IF 0.6 4区 计算机科学 Q3 Computer Science Pub Date : 2023-08-03 DOI: 10.1007/s00236-023-00441-9
Luca Aceto, Ian Cassar, Adrian Francalanza, Anna Ingólfsdóttir

Runtime enforcement is a dynamic analysis technique that uses monitors to enforce the behaviour specified by some correctness property on an executing system. The enforceability of a logic captures the extent to which the properties expressible via the logic can be enforced at runtime for a specified operational model of enforcing monitors. We study the enforceability of branching-time, first-order properties expressed in the Hennessy–Milner Logic with Recursion ((mu ) HML) with respect to monitors that can enforce behaviour involving events that carry data. To this end, we develop an operational framework for first-order enforcement via suppressions, insertions and replacements. We then use this model to formalise the meaning of enforcing a branching-time property. We also show that a safety syntactic fragment of the logic is enforceable within this framework by providing an automated synthesis function that generates correct suppression monitors from any formula taken from this logical fragment.

运行时强制执行是一种动态分析技术,它使用监视器在执行系统上强制执行某些正确性属性所指定的行为。逻辑的可执行性捕获了在运行时为执行监视器的指定操作模型执行可通过逻辑表示的属性的程度。我们研究了Hennessy-Milner递归逻辑((mu ) HML)中表达的分支时间一阶属性的可执行性,这些属性与可以强制涉及携带数据的事件的行为的监视器有关。为此,我们通过抑制、插入和替换开发了一种一级执行的操作框架。然后,我们使用这个模型来形式化执行分支时间属性的含义。我们还展示了逻辑的安全语法片段在此框架内是可执行的,通过提供一个自动合成功能,该功能可以从从该逻辑片段中获取的任何公式生成正确的抑制监视器。
{"title":"On first-order runtime enforcement of branching-time properties","authors":"Luca Aceto,&nbsp;Ian Cassar,&nbsp;Adrian Francalanza,&nbsp;Anna Ingólfsdóttir","doi":"10.1007/s00236-023-00441-9","DOIUrl":"10.1007/s00236-023-00441-9","url":null,"abstract":"<div><p>Runtime enforcement is a dynamic analysis technique that uses monitors to enforce the behaviour specified by some correctness property on an executing system. The enforceability of a logic captures the extent to which the properties expressible via the logic can be enforced at runtime for a specified operational model of enforcing monitors. We study the enforceability of branching-time, first-order properties expressed in the Hennessy–Milner Logic with Recursion (<span>(mu )</span> <span>HML</span>) with respect to monitors that can enforce behaviour involving events that carry data. To this end, we develop an operational framework for first-order enforcement via suppressions, insertions and replacements. We then use this model to formalise the meaning of enforcing a branching-time property. We also show that a safety syntactic fragment of the logic is enforceable within this framework by providing an automated synthesis function that generates correct suppression monitors from any formula taken from this logical fragment.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41339460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Dot to dot, simple or sophisticated: a survey on shape reconstruction algorithms 点对点,简单或复杂:形状重建算法综述
IF 0.6 4区 计算机科学 Q3 Computer Science Pub Date : 2023-08-01 DOI: 10.1007/s00236-023-00443-7
Farnaz Sheikhi, Behnam Zeraatkar, Sama Hanaie

Dot pattern points are the samples taken from all regions of a 2D object, either inside or the boundary. Given a set of dot pattern points in the plane, the shape reconstruction problem seeks to find the boundaries of the points. These boundaries are not mathematically well-defined. Hence, a superior algorithm is the one which produces the result closest to the human visual perception. There are different challenges in designing these algorithms, such as the independence from human supervision, and the ability to detect multiple components, holes and sharp corners. In this paper, we present a thorough review on the rich body of research in shape reconstruction, classify the ideas behind the algorithms, and highlight their pros and cons. Moreover, to overcome the barriers of implementing these algorithms, we provide an integrated application to visualize the outputs of the prominent algorithms for further comparison.

点图案点是从2D对象的所有区域(内部或边界)中获取的样本。给定平面上的一组点图案点,形状重建问题寻求找到点的边界。这些边界在数学上并没有明确定义。因此,最好的算法是产生最接近人类视觉感知的结果。设计这些算法面临着不同的挑战,例如不受人类监督的独立性,以及检测多个组件、孔洞和尖角的能力。在本文中,我们对形状重建的丰富研究进行了全面的回顾,对算法背后的思想进行了分类,并强调了它们的优缺点。此外,为了克服实现这些算法的障碍,我们提供了一个集成的应用程序来可视化突出算法的输出,以便进一步比较。
{"title":"Dot to dot, simple or sophisticated: a survey on shape reconstruction algorithms","authors":"Farnaz Sheikhi,&nbsp;Behnam Zeraatkar,&nbsp;Sama Hanaie","doi":"10.1007/s00236-023-00443-7","DOIUrl":"10.1007/s00236-023-00443-7","url":null,"abstract":"<div><p><i>Dot pattern</i> points are the samples taken from all regions of a 2D object, either inside or the boundary. Given a set of dot pattern points in the plane, the <i>shape reconstruction</i> problem seeks to find the boundaries of the points. These boundaries are not mathematically well-defined. Hence, a superior algorithm is the one which produces the result closest to the human visual perception. There are different challenges in designing these algorithms, such as the independence from human supervision, and the ability to detect multiple components, holes and sharp corners. In this paper, we present a thorough review on the rich body of research in shape reconstruction, classify the ideas behind the algorithms, and highlight their pros and cons. Moreover, to overcome the barriers of implementing these algorithms, we provide an integrated application to visualize the outputs of the prominent algorithms for further comparison.\u0000</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46914067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Testing membership for timed automata 时间自动机的成员关系测试
IF 0.6 4区 计算机科学 Q3 Computer Science Pub Date : 2023-07-17 DOI: 10.1007/s00236-023-00442-8
Richard Lassaigne, Michel de Rougemont

Given a timed automaton which admits thick components and a timed word w, we present a tester which decides if w is in the language of the automaton or if w is (epsilon )-far from the language, using finitely many samples taken from the weighted time distribution (mu ) associated with the input w. We introduce a distance between timed words, the timed edit distance, which generalizes the classical edit distance. A timed word w is (epsilon )-far from a timed language if its relative distance to the language is greater than (epsilon ).

给定一个允许厚分量和定时词w的定时自动机,我们提出了一个测试仪,该测试仪使用从与输入w相关的加权时间分布(mu)中提取的有限多个样本来判断w是否在自动机的语言中,或者w是否远离该语言,从而推广了经典的编辑距离。定时词w是(epsilon)-如果它与定时语言的相对距离大于(eptilon),则与定时语言相距甚远。
{"title":"Testing membership for timed automata","authors":"Richard Lassaigne,&nbsp;Michel de Rougemont","doi":"10.1007/s00236-023-00442-8","DOIUrl":"10.1007/s00236-023-00442-8","url":null,"abstract":"<div><p>Given a timed automaton which admits thick components and a timed word <i>w</i>, we present a tester which decides if <i>w</i> is in the language of the automaton or if <i>w</i> is <span>(epsilon )</span>-far from the language, using finitely many samples taken from the weighted time distribution <span>(mu )</span> associated with the input <i>w</i>. We introduce a distance between timed words, the <i>timed edit distance</i>, which generalizes the classical edit distance. A timed word <i>w</i> is <span>(epsilon )</span>-far from a timed language if its relative distance to the language is greater than <span>(epsilon )</span>.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2023-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71910443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simple chain automaton random number generator for IoT devices 物联网设备的简单链自动机随机数生成器
IF 0.6 4区 计算机科学 Q3 Computer Science Pub Date : 2023-06-08 DOI: 10.1007/s00236-023-00440-w
Pál Dömösi, Géza Horváth, Norbert Tihanyi

Random numbers are very important in many fields of computer science. Generating high-quality random numbers using only basic arithmetic operations is challenging, especially for devices with limited hardware capabilities, such as Internet of Things (IoT) devices. In this paper, we present a novel pseudorandom number generator, the simple chain automaton random number generator (SCARNG), based on compositions of abstract automata. The main advantage of the presented algorithm is its simple structure that can be implemented easily for very low computing capacity IoT systems, FPGAs or GPU hardware. The generated random numbers demonstrate promising statistical behavior and satisfy the NIST statistical suite requirements, highlighting the potential of the SCARNG for practical applications.

随机数在计算机科学的许多领域都非常重要。仅使用基本的算术运算生成高质量的随机数是具有挑战性的,特别是对于硬件功能有限的设备,例如物联网(IoT)设备。本文提出了一种新的基于抽象自动机组合的伪随机数生成器——简单链自动机随机数生成器(SCARNG)。该算法的主要优点是结构简单,可以很容易地实现非常低计算能力的物联网系统,fpga或GPU硬件。生成的随机数展示了有希望的统计行为,并满足NIST统计套件的要求,突出了SCARNG在实际应用中的潜力。
{"title":"Simple chain automaton random number generator for IoT devices","authors":"Pál Dömösi,&nbsp;Géza Horváth,&nbsp;Norbert Tihanyi","doi":"10.1007/s00236-023-00440-w","DOIUrl":"10.1007/s00236-023-00440-w","url":null,"abstract":"<div><p>Random numbers are very important in many fields of computer science. Generating high-quality random numbers using only basic arithmetic operations is challenging, especially for devices with limited hardware capabilities, such as Internet of Things (IoT) devices. In this paper, we present a novel pseudorandom number generator, the simple chain automaton random number generator (SCARNG), based on compositions of abstract automata. The main advantage of the presented algorithm is its simple structure that can be implemented easily for very low computing capacity IoT systems, FPGAs or GPU hardware. The generated random numbers demonstrate promising statistical behavior and satisfy the NIST statistical suite requirements, highlighting the potential of the SCARNG for practical applications.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2023-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-023-00440-w.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44369997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constrained polynomial zonotopes 约束多项式带拓扑
IF 0.6 4区 计算机科学 Q3 Computer Science Pub Date : 2023-05-05 DOI: 10.1007/s00236-023-00437-5
Niklas Kochdumper, Matthias Althoff

We introduce constrained polynomial zonotopes, a novel non-convex set representation that is closed under linear map, Minkowski sum, Cartesian product, convex hull, intersection, union, and quadratic as well as higher-order maps. We show that the computational complexity of the above-mentioned set operations for constrained polynomial zonotopes is at most polynomial in the representation size. The fact that constrained polynomial zonotopes are generalizations of zonotopes, polytopes, polynomial zonotopes, Taylor models, and ellipsoids further substantiates the relevance of this new set representation. In addition, the conversion from other set representations to constrained polynomial zonotopes is at most polynomial with respect to the dimension, and we present efficient methods for representation size reduction and for enclosing constrained polynomial zonotopes by simpler set representations.

我们引入了约束多项式带拓扑,这是一种新的非凸集合表示,它在线性映射、闵可夫斯基和、笛卡尔积、凸包、交、并、二次以及高阶映射下是封闭的。我们证明了上述集合运算的计算复杂度在表示大小上不超过多项式。约束多项式带共体是带共体、多边形、多项式带共体、Taylor模型和椭球体的一般化,这一事实进一步证实了这种新的集合表示的相关性。此外,从其他集合表示到约束多项式带拓扑的转换在维数上最多是多项式,我们提出了用更简单的集合表示来减小表示大小和封闭约束多项式带拓扑的有效方法。
{"title":"Constrained polynomial zonotopes","authors":"Niklas Kochdumper,&nbsp;Matthias Althoff","doi":"10.1007/s00236-023-00437-5","DOIUrl":"10.1007/s00236-023-00437-5","url":null,"abstract":"<div><p>We introduce constrained polynomial zonotopes, a novel non-convex set representation that is closed under linear map, Minkowski sum, Cartesian product, convex hull, intersection, union, and quadratic as well as higher-order maps. We show that the computational complexity of the above-mentioned set operations for constrained polynomial zonotopes is at most polynomial in the representation size. The fact that constrained polynomial zonotopes are generalizations of zonotopes, polytopes, polynomial zonotopes, Taylor models, and ellipsoids further substantiates the relevance of this new set representation. In addition, the conversion from other set representations to constrained polynomial zonotopes is at most polynomial with respect to the dimension, and we present efficient methods for representation size reduction and for enclosing constrained polynomial zonotopes by simpler set representations.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2023-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-023-00437-5.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47177535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
On the undecidability and descriptional complexity of synchronized regular expressions 同步正则表达式的不可判定性和描述复杂性
IF 0.6 4区 计算机科学 Q3 Computer Science Pub Date : 2023-04-10 DOI: 10.1007/s00236-023-00439-3
Jingnan Xie, Harry B. Hunt III

In Freydenberger (Theory Comput Syst 53(2):159–193, 2013. https://doi.org/10.1007/s00224-012-9389-0), Freydenberger shows that the set of invalid computations of an extended Turing machine can be recognized by a synchronized regular expression [as defined in Della Penna et al. (Acta Informatica 39(1):31–70, 2003. https://doi.org/10.1007/s00236-002-0099-y)]. Therefore, the widely discussed predicate “(={0,1}^*)” is not recursively enumerable for synchronized regular expressions (SRE). In this paper, we employ a stronger form of non-recursive enumerability called productiveness and show that the set of invalid computations of a deterministic Turing machine on a single input can be recognized by a synchronized regular expression. Hence, for a polynomial-time decidable subset of SRE, where each expression generates either ({0, 1}^*) or ({0, 1}^* -{w}) where (w in {0, 1}^*), the predicate “(={0,1}^*)” is productive. This result can be easily applied to other classes of language descriptors due to the simplicity of the construction in its proof. This result also implies that many computational problems, especially promise problems, for SRE are productive. These problems include language class comparison problems (e.g., does a given synchronized regular expression generate a context-free language?), and equivalence and containment problems of several types (e.g., does a given synchronized regular expression generate a language equal to a fixed unbounded regular set?). In addition, we study the descriptional complexity of SRE. A generalized method for studying trade-offs between SRE and many classes of language descriptors is established.

[j] .计算机科学,2013,(2):1 - 4。https://doi.org/10.1007/s00224-012-9389-0), Freydenberger证明了扩展图灵机的无效计算集可以通过同步正则表达式[定义在Della Penna et al.(信息学报39(1):31 - 70,2003]来识别。https://doi.org/10.1007/s00236-002-0099-y)]。因此,广泛讨论的谓词“(={0,1}^*)”对于同步正则表达式(SRE)来说是不可递归枚举的。本文采用了非递归可枚举性的一种更强的形式——生产力,并证明了确定性图灵机在单输入上的无效计算集可以被同步正则表达式识别。因此,对于SRE的多项式时间可确定子集,其中每个表达式生成({0, 1}^*)或({0, 1}^* -{w}),其中(w in {0, 1}^*),谓词“(={0,1}^*)”是有效的。由于其证明结构的简单性,该结果可以很容易地应用于其他类型的语言描述符。这一结果也意味着许多计算问题,特别是承诺问题,对于SRE是有效的。这些问题包括语言类比较问题(例如,给定的同步正则表达式是否生成与上下文无关的语言?),以及几种类型的等价和包含问题(例如,给定的同步正则表达式是否生成与固定无界正则集相等的语言?)。此外,我们还研究了SRE的描述复杂度。建立了一种通用的方法来研究SRE和多种语言描述符之间的权衡。
{"title":"On the undecidability and descriptional complexity of synchronized regular expressions","authors":"Jingnan Xie,&nbsp;Harry B. Hunt III","doi":"10.1007/s00236-023-00439-3","DOIUrl":"10.1007/s00236-023-00439-3","url":null,"abstract":"<div><p>In Freydenberger (Theory Comput Syst 53(2):159–193, 2013. https://doi.org/10.1007/s00224-012-9389-0), Freydenberger shows that the set of invalid computations of an extended Turing machine can be recognized by a synchronized regular expression [as defined in Della Penna et al. (Acta Informatica 39(1):31–70, 2003. https://doi.org/10.1007/s00236-002-0099-y)]. Therefore, the widely discussed predicate “<span>(={0,1}^*)</span>” is not recursively enumerable for synchronized regular expressions (SRE). In this paper, we employ a stronger form of non-recursive enumerability called <i>productiveness</i> and show that the set of invalid computations of a deterministic Turing machine on a single input can be recognized by a synchronized regular expression. Hence, for a polynomial-time decidable subset of SRE, where each expression generates either <span>({0, 1}^*)</span> or <span>({0, 1}^* -{w})</span> where <span>(w in {0, 1}^*)</span>, the predicate “<span>(={0,1}^*)</span>” is productive. This result can be easily applied to other classes of language descriptors due to the simplicity of the construction in its proof. This result also implies that many computational problems, especially promise problems, for SRE are productive. These problems include language class comparison problems (e.g., does a given synchronized regular expression generate a context-free language?), and equivalence and containment problems of several types (e.g., does a given synchronized regular expression generate a language equal to a fixed unbounded regular set?). In addition, we study the descriptional complexity of SRE. A generalized method for studying trade-offs between SRE and many classes of language descriptors is established.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2023-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-023-00439-3.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44264085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Toward a theory of program repair 走向程序修复理论
IF 0.6 4区 计算机科学 Q3 Computer Science Pub Date : 2023-03-27 DOI: 10.1007/s00236-023-00438-4
Besma Khaireddine, Aleksandr Zakharchenko, Matias Martinez, Ali Mili

To repair a program does not mean to make it (absolutely) correct; it only means to make it more-correct than it was originally. This is not a mundane academic distinction: given that programs typically have about a dozen faults per KLOC, it is important for program repair methods and tools to be designed in such a way that they map an incorrect program into a more-correct, albeit still potentially incorrect, program. Yet in the absence of a concept of relative correctness, many program repair methods and tools resort to approximations of absolute correctness; since these methods and tools are often validated against programs with a single fault, making them absolutely correct is indistinguishable from making them more-correct; this has contributed to conceal/obscure the absence of (and the need for) relative correctness. In this paper, we propose a theory of program repair based on a concept of relative correctness. We aspire to encourage researchers in program repair to explicitly specify what concept of relative correctness their method or tool is based upon; and to validate their method or tool by proving that it does enhance relative correctness, as defined.

修复一个程序并不意味着使它(绝对)正确;它只意味着使它比原来更正确。这不是一个普通的学术区别:考虑到程序通常每个KLOC都有大约12个错误,程序修复方法和工具的设计方式很重要,因为它们可以将不正确的程序映射到更正确的程序中,尽管可能仍然不正确。然而,由于缺乏相对正确性的概念,许多程序修复方法和工具诉诸于绝对正确性的近似;由于这些方法和工具通常是针对具有单个错误的程序进行验证的,因此使它们绝对正确与使它们更加正确是无法区分的;这有助于掩盖/模糊相对正确性的缺失(和需要)。本文提出了一种基于相对正确性概念的程序修复理论。我们渴望鼓励程序修复的研究人员明确地说明他们的方法或工具基于什么相对正确性的概念;并通过证明它们确实增强了定义的相对正确性来验证它们的方法或工具。
{"title":"Toward a theory of program repair","authors":"Besma Khaireddine,&nbsp;Aleksandr Zakharchenko,&nbsp;Matias Martinez,&nbsp;Ali Mili","doi":"10.1007/s00236-023-00438-4","DOIUrl":"10.1007/s00236-023-00438-4","url":null,"abstract":"<div><p>To repair a program does not mean to make it (absolutely) correct; it only means to make it more-correct than it was originally. This is not a mundane academic distinction: given that programs typically have about a dozen faults per KLOC, it is important for program repair methods and tools to be designed in such a way that they map an incorrect program into a more-correct, albeit still potentially incorrect, program. Yet in the absence of a concept of relative correctness, many program repair methods and tools resort to approximations of absolute correctness; since these methods and tools are often validated against programs with a single fault, making them absolutely correct is indistinguishable from making them more-correct; this has contributed to conceal/obscure the absence of (and the need for) relative correctness. In this paper, we propose a theory of program repair based on a concept of relative correctness. We aspire to encourage researchers in program repair to explicitly specify what concept of relative correctness their method or tool is based upon; and to validate their method or tool by proving that it does enhance relative correctness, as defined.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41562782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On partial information retrieval: the unconstrained 100 prisoner problem 关于部分信息检索:无约束的100名囚犯问题
IF 0.6 4区 计算机科学 Q3 Computer Science Pub Date : 2022-12-30 DOI: 10.1007/s00236-022-00436-y
Ivano Lodato, Snehal M. Shekatkar, Tian An Wong

We consider a generalization of the classical 100 prisoner problem and its variant, involving empty boxes, whereby winning probabilities for a team depend on the number of attempts, as well as on the number of winners. We call this the unconstrained 100 prisoner problem. After introducing the 3 main classes of strategies, we define a variety of ‘hybrid’ strategies and quantify their winning-efficiency. Whenever analytic results are not available, we make use of Monte Carlo simulations to estimate with high accuracy the winning probabilities. Based on the results obtained, we conjecture that all strategies, except for the strategy maximizing the winning probability of the classical (constrained) problem, converge to the random strategy under weak conditions on the number of players or empty boxes. We conclude by commenting on the possible applications of our results in understanding processes of information retrieval, such as “memory” in living organisms.

我们考虑经典的100囚犯问题及其变体的推广,包括空盒子,其中一个团队的获胜概率取决于尝试的次数,以及获胜者的数量。我们称之为无约束的100人问题。在介绍了3类主要策略之后,我们定义了各种“混合”策略,并量化了它们的获胜效率。当没有分析结果时,我们利用蒙特卡罗模拟来高精度地估计获胜概率。根据得到的结果,我们推测,除了经典(约束)问题中获胜概率最大化的策略外,所有策略在弱条件下都收敛于参与者数量或空盒子的随机策略。最后,我们评论了我们的结果在理解信息检索过程中的可能应用,例如生物体中的“记忆”。
{"title":"On partial information retrieval: the unconstrained 100 prisoner problem","authors":"Ivano Lodato,&nbsp;Snehal M. Shekatkar,&nbsp;Tian An Wong","doi":"10.1007/s00236-022-00436-y","DOIUrl":"10.1007/s00236-022-00436-y","url":null,"abstract":"<div><p>We consider a generalization of the classical 100 prisoner problem and its variant, involving empty boxes, whereby winning probabilities for a team depend on the number of attempts, as well as on the number of winners. We call this the unconstrained 100 prisoner problem. After introducing the 3 main classes of strategies, we define a variety of ‘hybrid’ strategies and quantify their winning-efficiency. Whenever analytic results are not available, we make use of Monte Carlo simulations to estimate with high accuracy the winning probabilities. Based on the results obtained, we conjecture that <i>all</i> strategies, except for the strategy maximizing the winning probability of the classical (constrained) problem, converge to the random strategy under weak conditions on the number of players or empty boxes. We conclude by commenting on the possible applications of our results in understanding processes of information retrieval, such as “memory” in living organisms.\u0000</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49279314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Acta Informatica
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1