首页 > 最新文献

Acta Informatica最新文献

英文 中文
On the undecidability and descriptional complexity of synchronized regular expressions 同步正则表达式的不可判定性和描述复杂性
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-04-10 DOI: 10.1007/s00236-023-00439-3
Jingnan Xie, Harry B. Hunt III

In Freydenberger (Theory Comput Syst 53(2):159–193, 2013. https://doi.org/10.1007/s00224-012-9389-0), Freydenberger shows that the set of invalid computations of an extended Turing machine can be recognized by a synchronized regular expression [as defined in Della Penna et al. (Acta Informatica 39(1):31–70, 2003. https://doi.org/10.1007/s00236-002-0099-y)]. Therefore, the widely discussed predicate “(={0,1}^*)” is not recursively enumerable for synchronized regular expressions (SRE). In this paper, we employ a stronger form of non-recursive enumerability called productiveness and show that the set of invalid computations of a deterministic Turing machine on a single input can be recognized by a synchronized regular expression. Hence, for a polynomial-time decidable subset of SRE, where each expression generates either ({0, 1}^*) or ({0, 1}^* -{w}) where (w in {0, 1}^*), the predicate “(={0,1}^*)” is productive. This result can be easily applied to other classes of language descriptors due to the simplicity of the construction in its proof. This result also implies that many computational problems, especially promise problems, for SRE are productive. These problems include language class comparison problems (e.g., does a given synchronized regular expression generate a context-free language?), and equivalence and containment problems of several types (e.g., does a given synchronized regular expression generate a language equal to a fixed unbounded regular set?). In addition, we study the descriptional complexity of SRE. A generalized method for studying trade-offs between SRE and many classes of language descriptors is established.

[j] .计算机科学,2013,(2):1 - 4。https://doi.org/10.1007/s00224-012-9389-0), Freydenberger证明了扩展图灵机的无效计算集可以通过同步正则表达式[定义在Della Penna et al.(信息学报39(1):31 - 70,2003]来识别。https://doi.org/10.1007/s00236-002-0099-y)]。因此,广泛讨论的谓词“(={0,1}^*)”对于同步正则表达式(SRE)来说是不可递归枚举的。本文采用了非递归可枚举性的一种更强的形式——生产力,并证明了确定性图灵机在单输入上的无效计算集可以被同步正则表达式识别。因此,对于SRE的多项式时间可确定子集,其中每个表达式生成({0, 1}^*)或({0, 1}^* -{w}),其中(w in {0, 1}^*),谓词“(={0,1}^*)”是有效的。由于其证明结构的简单性,该结果可以很容易地应用于其他类型的语言描述符。这一结果也意味着许多计算问题,特别是承诺问题,对于SRE是有效的。这些问题包括语言类比较问题(例如,给定的同步正则表达式是否生成与上下文无关的语言?),以及几种类型的等价和包含问题(例如,给定的同步正则表达式是否生成与固定无界正则集相等的语言?)。此外,我们还研究了SRE的描述复杂度。建立了一种通用的方法来研究SRE和多种语言描述符之间的权衡。
{"title":"On the undecidability and descriptional complexity of synchronized regular expressions","authors":"Jingnan Xie,&nbsp;Harry B. Hunt III","doi":"10.1007/s00236-023-00439-3","DOIUrl":"10.1007/s00236-023-00439-3","url":null,"abstract":"<div><p>In Freydenberger (Theory Comput Syst 53(2):159–193, 2013. https://doi.org/10.1007/s00224-012-9389-0), Freydenberger shows that the set of invalid computations of an extended Turing machine can be recognized by a synchronized regular expression [as defined in Della Penna et al. (Acta Informatica 39(1):31–70, 2003. https://doi.org/10.1007/s00236-002-0099-y)]. Therefore, the widely discussed predicate “<span>(={0,1}^*)</span>” is not recursively enumerable for synchronized regular expressions (SRE). In this paper, we employ a stronger form of non-recursive enumerability called <i>productiveness</i> and show that the set of invalid computations of a deterministic Turing machine on a single input can be recognized by a synchronized regular expression. Hence, for a polynomial-time decidable subset of SRE, where each expression generates either <span>({0, 1}^*)</span> or <span>({0, 1}^* -{w})</span> where <span>(w in {0, 1}^*)</span>, the predicate “<span>(={0,1}^*)</span>” is productive. This result can be easily applied to other classes of language descriptors due to the simplicity of the construction in its proof. This result also implies that many computational problems, especially promise problems, for SRE are productive. These problems include language class comparison problems (e.g., does a given synchronized regular expression generate a context-free language?), and equivalence and containment problems of several types (e.g., does a given synchronized regular expression generate a language equal to a fixed unbounded regular set?). In addition, we study the descriptional complexity of SRE. A generalized method for studying trade-offs between SRE and many classes of language descriptors is established.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"60 3","pages":"257 - 278"},"PeriodicalIF":0.6,"publicationDate":"2023-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-023-00439-3.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44264085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Toward a theory of program repair 走向程序修复理论
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-27 DOI: 10.1007/s00236-023-00438-4
Besma Khaireddine, Aleksandr Zakharchenko, Matias Martinez, Ali Mili

To repair a program does not mean to make it (absolutely) correct; it only means to make it more-correct than it was originally. This is not a mundane academic distinction: given that programs typically have about a dozen faults per KLOC, it is important for program repair methods and tools to be designed in such a way that they map an incorrect program into a more-correct, albeit still potentially incorrect, program. Yet in the absence of a concept of relative correctness, many program repair methods and tools resort to approximations of absolute correctness; since these methods and tools are often validated against programs with a single fault, making them absolutely correct is indistinguishable from making them more-correct; this has contributed to conceal/obscure the absence of (and the need for) relative correctness. In this paper, we propose a theory of program repair based on a concept of relative correctness. We aspire to encourage researchers in program repair to explicitly specify what concept of relative correctness their method or tool is based upon; and to validate their method or tool by proving that it does enhance relative correctness, as defined.

修复一个程序并不意味着使它(绝对)正确;它只意味着使它比原来更正确。这不是一个普通的学术区别:考虑到程序通常每个KLOC都有大约12个错误,程序修复方法和工具的设计方式很重要,因为它们可以将不正确的程序映射到更正确的程序中,尽管可能仍然不正确。然而,由于缺乏相对正确性的概念,许多程序修复方法和工具诉诸于绝对正确性的近似;由于这些方法和工具通常是针对具有单个错误的程序进行验证的,因此使它们绝对正确与使它们更加正确是无法区分的;这有助于掩盖/模糊相对正确性的缺失(和需要)。本文提出了一种基于相对正确性概念的程序修复理论。我们渴望鼓励程序修复的研究人员明确地说明他们的方法或工具基于什么相对正确性的概念;并通过证明它们确实增强了定义的相对正确性来验证它们的方法或工具。
{"title":"Toward a theory of program repair","authors":"Besma Khaireddine,&nbsp;Aleksandr Zakharchenko,&nbsp;Matias Martinez,&nbsp;Ali Mili","doi":"10.1007/s00236-023-00438-4","DOIUrl":"10.1007/s00236-023-00438-4","url":null,"abstract":"<div><p>To repair a program does not mean to make it (absolutely) correct; it only means to make it more-correct than it was originally. This is not a mundane academic distinction: given that programs typically have about a dozen faults per KLOC, it is important for program repair methods and tools to be designed in such a way that they map an incorrect program into a more-correct, albeit still potentially incorrect, program. Yet in the absence of a concept of relative correctness, many program repair methods and tools resort to approximations of absolute correctness; since these methods and tools are often validated against programs with a single fault, making them absolutely correct is indistinguishable from making them more-correct; this has contributed to conceal/obscure the absence of (and the need for) relative correctness. In this paper, we propose a theory of program repair based on a concept of relative correctness. We aspire to encourage researchers in program repair to explicitly specify what concept of relative correctness their method or tool is based upon; and to validate their method or tool by proving that it does enhance relative correctness, as defined.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"60 3","pages":"209 - 255"},"PeriodicalIF":0.6,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41562782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On partial information retrieval: the unconstrained 100 prisoner problem 关于部分信息检索:无约束的100名囚犯问题
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-12-30 DOI: 10.1007/s00236-022-00436-y
Ivano Lodato, Snehal M. Shekatkar, Tian An Wong

We consider a generalization of the classical 100 prisoner problem and its variant, involving empty boxes, whereby winning probabilities for a team depend on the number of attempts, as well as on the number of winners. We call this the unconstrained 100 prisoner problem. After introducing the 3 main classes of strategies, we define a variety of ‘hybrid’ strategies and quantify their winning-efficiency. Whenever analytic results are not available, we make use of Monte Carlo simulations to estimate with high accuracy the winning probabilities. Based on the results obtained, we conjecture that all strategies, except for the strategy maximizing the winning probability of the classical (constrained) problem, converge to the random strategy under weak conditions on the number of players or empty boxes. We conclude by commenting on the possible applications of our results in understanding processes of information retrieval, such as “memory” in living organisms.

我们考虑经典的100囚犯问题及其变体的推广,包括空盒子,其中一个团队的获胜概率取决于尝试的次数,以及获胜者的数量。我们称之为无约束的100人问题。在介绍了3类主要策略之后,我们定义了各种“混合”策略,并量化了它们的获胜效率。当没有分析结果时,我们利用蒙特卡罗模拟来高精度地估计获胜概率。根据得到的结果,我们推测,除了经典(约束)问题中获胜概率最大化的策略外,所有策略在弱条件下都收敛于参与者数量或空盒子的随机策略。最后,我们评论了我们的结果在理解信息检索过程中的可能应用,例如生物体中的“记忆”。
{"title":"On partial information retrieval: the unconstrained 100 prisoner problem","authors":"Ivano Lodato,&nbsp;Snehal M. Shekatkar,&nbsp;Tian An Wong","doi":"10.1007/s00236-022-00436-y","DOIUrl":"10.1007/s00236-022-00436-y","url":null,"abstract":"<div><p>We consider a generalization of the classical 100 prisoner problem and its variant, involving empty boxes, whereby winning probabilities for a team depend on the number of attempts, as well as on the number of winners. We call this the unconstrained 100 prisoner problem. After introducing the 3 main classes of strategies, we define a variety of ‘hybrid’ strategies and quantify their winning-efficiency. Whenever analytic results are not available, we make use of Monte Carlo simulations to estimate with high accuracy the winning probabilities. Based on the results obtained, we conjecture that <i>all</i> strategies, except for the strategy maximizing the winning probability of the classical (constrained) problem, converge to the random strategy under weak conditions on the number of players or empty boxes. We conclude by commenting on the possible applications of our results in understanding processes of information retrieval, such as “memory” in living organisms.\u0000</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"60 2","pages":"179 - 208"},"PeriodicalIF":0.6,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49279314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized runtime verification of message sequences in message-based systems 基于消息的系统中消息序列的分散运行时验证
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-10-10 DOI: 10.1007/s00236-022-00435-z
Mahboubeh Samadi, Fatemeh Ghassemi, Ramtin Khosravi

Message-based systems are usually distributed in nature, and distributed components collaborate via asynchronous message passing. In some cases, particular ordering among the messages may lead to violation of the desired properties such as data confidentiality. Due to the absence of a global clock and usage of off-the-shelf components, such unwanted orderings can be neither statically inspected nor verified by revising their codes at design time. We propose a choreography-based runtime verification algorithm that given an automata-based specification of unwanted message sequences detects the formation of the unwanted sequences. Our algorithm is fully decentralized in the sense that each component is equipped with a monitor, as opposed to having a centralized monitor, and also the specification of the unwanted sequences is decomposed among monitors. In this way, when a component sends a message, its monitor inspects if there is a possibility for the formation of unwanted message sequences. As there is no global clock in message-based systems, monitors cannot determine the exact ordering among messages. In such cases, they decide conservatively and declare a sequence formation even if that sequence has not been formed. We prevent such conservative declarations in our algorithm as much as possible and then characterize its operational guarantees. We evaluate the efficiency and scalability of our algorithm in terms of the communication overhead, the memory consumption, and the latency of the result declaration through simulation.

基于消息的系统本质上通常是分布式的,分布式组件通过异步消息传递进行协作。在某些情况下,消息之间的特定排序可能导致违反所需的属性,例如数据机密性。由于缺乏全局时钟和使用现成的组件,这些不需要的订单既不能静态检查,也不能通过在设计时修改其代码来验证。我们提出了一种基于编排的运行时验证算法,该算法给出了不需要的消息序列的基于自动机的规范来检测不需要的序列的形成。我们的算法是完全分散的,因为每个组件都配备了一个监视器,而不是集中式监视器,并且在监视器之间分解了不需要的序列的规范。这样,当组件发送消息时,其监视器将检查是否有可能形成不需要的消息序列。由于在基于消息的系统中没有全局时钟,因此监视器无法确定消息之间的确切顺序。在这种情况下,即使该序列尚未形成,它们也保守地决定并声明该序列的形成。我们在算法中尽可能地避免这种保守声明,然后描述其操作保证。通过模拟,我们从通信开销、内存消耗和结果声明的延迟方面评估了算法的效率和可伸缩性。
{"title":"Decentralized runtime verification of message sequences in message-based systems","authors":"Mahboubeh Samadi,&nbsp;Fatemeh Ghassemi,&nbsp;Ramtin Khosravi","doi":"10.1007/s00236-022-00435-z","DOIUrl":"10.1007/s00236-022-00435-z","url":null,"abstract":"<div><p>Message-based systems are usually distributed in nature, and distributed components collaborate via asynchronous message passing. In some cases, particular ordering among the messages may lead to violation of the desired properties such as data confidentiality. Due to the absence of a global clock and usage of off-the-shelf components, such unwanted orderings can be neither statically inspected nor verified by revising their codes at design time. We propose a choreography-based runtime verification algorithm that given an automata-based specification of unwanted message sequences detects the formation of the unwanted sequences. Our algorithm is fully decentralized in the sense that each component is equipped with a monitor, as opposed to having a centralized monitor, and also the specification of the unwanted sequences is decomposed among monitors. In this way, when a component sends a message, its monitor inspects if there is a possibility for the formation of unwanted message sequences. As there is no global clock in message-based systems, monitors cannot determine the exact ordering among messages. In such cases, they decide conservatively and declare a sequence formation even if that sequence has not been formed. We prevent such conservative declarations in our algorithm as much as possible and then characterize its operational guarantees. We evaluate the efficiency and scalability of our algorithm in terms of the communication overhead, the memory consumption, and the latency of the result declaration through simulation.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"60 2","pages":"145 - 178"},"PeriodicalIF":0.6,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46797326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Exploration of k-edge-deficient temporal graphs 缺k边时间图的探索
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-08-27 DOI: 10.1007/s00236-022-00421-5
Thomas Erlebach, Jakob T. Spooner

A temporal graph with lifetime L is a sequence of L graphs (G_1, ldots ,G_L), called layers, all of which have the same vertex set V but can have different edge sets. The underlying graph is the graph with vertex set V that contains all the edges that appear in at least one layer. The temporal graph is always connected if each layer is a connected graph, and it is k-edge-deficient if each layer contains all except at most k edges of the underlying graph. For a given start vertex s, a temporal exploration is a temporal walk that starts at s, traverses at most one edge in each layer, and visits all vertices of the temporal graph. We show that always-connected, k-edge-deficient temporal graphs with sufficient lifetime can always be explored in (O(kn log n)) time steps. We also construct always-connected, k-edge-deficient temporal graphs for which any exploration requires (varOmega (n log k)) time steps. For always-connected, 1-edge-deficient temporal graphs, we show that O(n) time steps suffice for temporal exploration.

一个生存期为L的时间图是L个图的序列(G_1, ldots ,G_L),称为层,它们都有相同的顶点集V,但可以有不同的边集。底层图是顶点集V的图,它包含至少在一个层中出现的所有边。如果每一层都是连通图,则时间图总是连通的;如果每一层包含底层图的除最多k条边以外的所有边,则时间图是缺k边的。对于给定的起始顶点s,时间探索是从s开始的时间行走,在每层中最多遍历一条边,并访问时间图的所有顶点。我们证明了具有足够寿命的总是连通的,k边缺陷的时间图总是可以在(O(kn log n))时间步长中探索。我们还构造了总是连通的、缺少k边的时间图,其中任何探索都需要(varOmega (n log k))时间步长。对于总是连通的,缺乏1边的时间图,我们证明O(n)个时间步足以进行时间探索。
{"title":"Exploration of k-edge-deficient temporal graphs","authors":"Thomas Erlebach,&nbsp;Jakob T. Spooner","doi":"10.1007/s00236-022-00421-5","DOIUrl":"10.1007/s00236-022-00421-5","url":null,"abstract":"<div><p>A temporal graph with lifetime <i>L</i> is a sequence of <i>L</i> graphs <span>(G_1, ldots ,G_L)</span>, called layers, all of which have the same vertex set <i>V</i> but can have different edge sets. The underlying graph is the graph with vertex set <i>V</i> that contains all the edges that appear in at least one layer. The temporal graph is always connected if each layer is a connected graph, and it is <i>k</i>-edge-deficient if each layer contains all except at most <i>k</i> edges of the underlying graph. For a given start vertex <i>s</i>, a temporal exploration is a temporal walk that starts at <i>s</i>, traverses at most one edge in each layer, and visits all vertices of the temporal graph. We show that always-connected, <i>k</i>-edge-deficient temporal graphs with sufficient lifetime can always be explored in <span>(O(kn log n))</span> time steps. We also construct always-connected, <i>k</i>-edge-deficient temporal graphs for which any exploration requires <span>(varOmega (n log k))</span> time steps. For always-connected, 1-edge-deficient temporal graphs, we show that <i>O</i>(<i>n</i>) time steps suffice for temporal exploration.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"59 4","pages":"387 - 407"},"PeriodicalIF":0.6,"publicationDate":"2022-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-022-00421-5.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42775206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Properties of graphs specified by a regular language 由常规语言指定的图的属性
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-08-12 DOI: 10.1007/s00236-022-00427-z
Volker Diekert, Henning Fernau, Petra Wolf

Traditionally, graph algorithms get a single graph as input, and then they should decide if this graph satisfies a certain property (varPhi ). What happens if this question is modified in a way that we get a possibly infinite family of graphs as an input, and the question is if there is a graph satisfying (varPhi ) in the family? We approach this question by using formal languages for specifying families of graphs, in particular by regular sets of words. We show that certain graph properties can be decided by studying the syntactic monoid of the specification language L if a certain torsion condition is satisfied. This condition holds trivially if L is regular. More specifically, we use a natural binary encoding of finite graphs over a binary alphabet (varSigma ), and we define a regular set (mathbb {G}subseteq varSigma ^*) such that every nonempty word (win mathbb {G}) defines a finite and nonempty graph. Also, graph properties can then be syntactically defined as languages over (varSigma ). Then, we ask whether the automaton (mathcal {A}) specifies some graph satisfying a certain property (varPhi ). Our structural results show that we can answer this question for all “typical” graph properties. In order to show our results, we split L into a finite union of subsets and every subset of this union defines in a natural way a single finite graph F where some edges and vertices are marked. The marked graph in turn defines an infinite graph (F^infty ) and therefore the family of finite subgraphs of (F^infty ) where F appears as an induced subgraph. This yields a geometric description of all graphs specified by L based on splitting L into finitely many pieces; then using the notion of graph retraction, we obtain an easily understandable description of the graphs in each piece.

传统上,图算法得到一个单一的图作为输入,然后他们应该决定这个图是否满足某个属性(varPhi )。如果这个问题被修改了,我们得到一个可能无限的图族作为输入,问题是是否有一个图族中满足(varPhi ) ?我们通过使用形式语言来指定图族,特别是正则词集来解决这个问题。我们证明了如果满足一定的扭转条件,可以通过研究规范语言L的语法单群来确定某些图的性质。如果L是正则的,这个条件一般成立。更具体地说,我们在二进制字母表(varSigma )上使用有限图的自然二进制编码,并定义一个正则集(mathbb {G}subseteq varSigma ^*),使得每个非空单词(win mathbb {G})定义一个有限和非空图。此外,图形属性可以在语法上定义为(varSigma )上的语言。然后,我们问自动机(mathcal {A})是否指定满足某一属性的某个图(varPhi )。我们的结构结果表明,我们可以对所有“典型”图属性回答这个问题。为了证明我们的结果,我们将L分割成一个子集的有限并集,这个并集的每个子集以自然的方式定义了一个有限图F,其中一些边和顶点被标记。标记的图又定义了一个无限图(F^infty ),因此定义了(F^infty )的有限子图族,其中F作为诱导子图出现。这产生了L所指定的所有图的几何描述,基于将L分成有限多块;然后利用图可收回的概念,我们得到了每个图块中易于理解的图的描述。
{"title":"Properties of graphs specified by a regular language","authors":"Volker Diekert,&nbsp;Henning Fernau,&nbsp;Petra Wolf","doi":"10.1007/s00236-022-00427-z","DOIUrl":"10.1007/s00236-022-00427-z","url":null,"abstract":"<div><p>Traditionally, graph algorithms get a single graph as input, and then they should decide if this graph satisfies a certain property <span>(varPhi )</span>. What happens if this question is modified in a way that we get a possibly infinite family of graphs as an input, and the question is if there is a graph satisfying <span>(varPhi )</span> in the family? We approach this question by using formal languages for specifying families of graphs, in particular by regular sets of words. We show that certain graph properties can be decided by studying the syntactic monoid of the specification language <i>L</i> if a certain torsion condition is satisfied. This condition holds trivially if <i>L</i> is regular. More specifically, we use a natural binary encoding of finite graphs over a binary alphabet <span>(varSigma )</span>, and we define a regular set <span>(mathbb {G}subseteq varSigma ^*)</span> such that every nonempty word <span>(win mathbb {G})</span> defines a finite and nonempty graph. Also, graph properties can then be syntactically defined as languages over <span>(varSigma )</span>. Then, we ask whether the automaton <span>(mathcal {A})</span> specifies some graph satisfying a certain property <span>(varPhi )</span>. Our structural results show that we can answer this question for all “typical” graph properties. In order to show our results, we split <i>L</i> into a finite union of subsets and every subset of this union defines in a natural way a single finite graph <i>F</i> where some edges and vertices are marked. The marked graph in turn defines an infinite graph <span>(F^infty )</span> and therefore the family of finite subgraphs of <span>(F^infty )</span> where <i>F</i> appears as an induced subgraph. This yields a geometric description of all graphs specified by <i>L</i> based on splitting <i>L</i> into finitely many pieces; then using the notion of graph retraction, we obtain an easily understandable description of the graphs in each piece.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"59 4","pages":"357 - 385"},"PeriodicalIF":0.6,"publicationDate":"2022-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-022-00427-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41686213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Preface to Klaus-Jörn Lange Festschrift 克劳斯-约恩-兰格艺术节序言
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-08-09 DOI: 10.1007/s00236-022-00426-0
Henning Fernau, Markus Holzer, Petra Wolf
{"title":"Preface to Klaus-Jörn Lange Festschrift","authors":"Henning Fernau,&nbsp;Markus Holzer,&nbsp;Petra Wolf","doi":"10.1007/s00236-022-00426-0","DOIUrl":"10.1007/s00236-022-00426-0","url":null,"abstract":"","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"59 4","pages":"285 - 287"},"PeriodicalIF":0.6,"publicationDate":"2022-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-022-00426-0.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47677865","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the decidability of finding a positive ILP-instance in a regular set of ILP-instances 关于在正则ILP实例集中找到正ILP实例的判定性
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-08-04 DOI: 10.1007/s00236-022-00429-x
Petra Wolf

The regular intersection emptiness problem for a decision problem P (({{textit{int}}_{{mathrm {Reg}}}})(P)) is to decide whether a potentially infinite regular set of encoded P-instances contains a positive one. Since ({{textit{int}}_{{mathrm {Reg}}}})(P) is decidable for some NP-complete problems and undecidable for others, its investigation provides insights in the nature of NP-complete problems. Moreover, the decidability of the ({{textit{int}}_{{mathrm {Reg}}}})-problem is usually achieved by exploiting the regularity of the set of instances; thus, it also establishes a connection to formal language and automata theory. We consider the ({{textit{int}}_{{mathrm {Reg}}}})-problem for the well-known NP-complete problem Integer Linear Programming (ILP). It is shown that any DFA that describes a set of ILP-instances (in a natural encoding) can be reduced to a finite core of instances that contains a positive one if and only if the original set of instances did. This result yields the decidability of ({{textit{int}}_{{mathrm {Reg}}}})(ILP).

决策问题P (({{textit{int}}_{{mathrm {Reg}}}}) (P))的正则相交空性问题是决定编码P-实例的潜在无限正则集是否包含一个正的P-实例。由于({{textit{int}}_{{mathrm {Reg}}}}) (P)对于某些np完全问题是可决定的,而对于其他np完全问题是不可决定的,因此对它的研究提供了对np完全问题本质的见解。此外,({{textit{int}}_{{mathrm {Reg}}}}) -问题的可判定性通常是通过利用实例集的规律性来实现的;因此,它也与形式语言和自动机理论建立了联系。我们考虑了众所周知的np完全问题整数线性规划(ILP)的({{textit{int}}_{{mathrm {Reg}}}}) -问题。证明了描述一组ilp实例(以自然编码)的任何DFA都可以简化为包含正的实例的有限核,当且仅当原始实例集包含正的实例。该结果得到({{textit{int}}_{{mathrm {Reg}}}}) (ILP)的可判定性。
{"title":"On the decidability of finding a positive ILP-instance in a regular set of ILP-instances","authors":"Petra Wolf","doi":"10.1007/s00236-022-00429-x","DOIUrl":"10.1007/s00236-022-00429-x","url":null,"abstract":"<div><p>The regular intersection emptiness problem for a decision problem <i>P</i> (<span>({{textit{int}}_{{mathrm {Reg}}}})</span>(<i>P</i>)) is to decide whether a potentially infinite regular set of encoded <i>P</i>-instances contains a positive one. Since <span>({{textit{int}}_{{mathrm {Reg}}}})</span>(<i>P</i>) is decidable for some NP-complete problems and undecidable for others, its investigation provides insights in the nature of NP-complete problems. Moreover, the decidability of the <span>({{textit{int}}_{{mathrm {Reg}}}})</span>-problem is usually achieved by exploiting the regularity of the set of instances; thus, it also establishes a connection to formal language and automata theory. We consider the <span>({{textit{int}}_{{mathrm {Reg}}}})</span>-problem for the well-known NP-complete problem <span>Integer Linear Programming</span> (<span>ILP</span>). It is shown that any DFA that describes a set of <span>ILP</span>-instances (in a natural encoding) can be reduced to a finite core of instances that contains a positive one if and only if the original set of instances did. This result yields the decidability of <span>({{textit{int}}_{{mathrm {Reg}}}})</span>(<span>ILP</span>).</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"59 4","pages":"505 - 519"},"PeriodicalIF":0.6,"publicationDate":"2022-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-022-00429-x.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41604344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pushdown automata and constant height: decidability and bounds 下推自动机与常高:可判定性与边界
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-07-27 DOI: 10.1007/s00236-022-00434-0
Giovanni Pighizzini, Luca Prigioniero

It cannot be decided whether a pushdown automaton accepts using a pushdown height, which does not depend on the input length, i.e., when it accepts using constant height. Furthermore, when a pushdown automaton accepts in constant height, the height can be arbitrarily large with respect to the size of the description of the machine, namely it does not exist any recursive function in the size of the description of the machine bounding the height of the pushdown. In contrast, in the restricted case of pushdown automata over a one-letter input alphabet, i.e., unary pushdown automata, the situation is different. First, acceptance in constant height is decidable. Moreover, in the case of acceptance in constant height, the height is at most exponential with respect to the size of the description of the pushdown automaton. We also prove a matching lower bound. Finally, if a unary pushdown automaton uses nonconstant height to accept, then the height should grow at least as the logarithm of the input length. This bound is optimal.

不能确定下推自动机是否接受使用下推高度,这与输入长度无关,即当它接受使用恒定高度时。此外,当下推自动机接受恒定高度时,高度相对于机器描述的大小可以任意大,即在机器描述的大小中不存在约束下推高度的递归函数。相反,在输入字母为一个字母的下推自动机的限制情况下,即一元下推自动机,情况就不同了。首先,恒定高度的接受度是可以确定的。此外,在接受恒定高度的情况下,高度最多与下推自动机描述的大小成指数关系。我们还证明了一个匹配的下界。最后,如果一元下推自动机使用非恒定高度来接受,那么高度应该至少随着输入长度的对数而增长。这个界是最优的。
{"title":"Pushdown automata and constant height: decidability and bounds","authors":"Giovanni Pighizzini,&nbsp;Luca Prigioniero","doi":"10.1007/s00236-022-00434-0","DOIUrl":"10.1007/s00236-022-00434-0","url":null,"abstract":"<div><p>It cannot be decided whether a pushdown automaton accepts using a pushdown height, which does not depend on the input length, i.e., when it accepts using constant height. Furthermore, when a pushdown automaton accepts in constant height, the height can be arbitrarily large with respect to the size of the description of the machine, namely it does not exist any recursive function in the size of the description of the machine bounding the height of the pushdown. In contrast, in the restricted case of pushdown automata over a one-letter input alphabet, i.e., unary pushdown automata, the situation is different. First, acceptance in constant height is decidable. Moreover, in the case of acceptance in constant height, the height is at most exponential with respect to the size of the description of the pushdown automaton. We also prove a matching lower bound. Finally, if a unary pushdown automaton uses nonconstant height to accept, then the height should grow at least as the logarithm of the input length. This bound is optimal.\u0000</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"60 2","pages":"123 - 144"},"PeriodicalIF":0.6,"publicationDate":"2022-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-022-00434-0.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42136940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The regular languages of wire linear AC0documentclass[12pt]{minimal} usepackage{amsmath} usepackage{wasysym} usepackage{amsfonts} usepackage{amssymb} usepackage{amsbsy} usepackage{mathrsfs} usepackage{upgreek} setlength{oddsidemargin}{-69pt} begin{document}$$^0$$end{document} wire linear AC0documentclass[12pt]{minimal} usepackage{amsmath} userpackage{wasysym}usepackage{amsfonts} use package{amssymb} user package{asbssy}use package{mathrsfs} usapackage{upgeek}setlength{doddsedmargin}{-69pt} begin{document}$^0$end
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-07-25 DOI: 10.1007/s00236-022-00432-2
M. Cadilhac, Charles Paperman
{"title":"The regular languages of wire linear AC0documentclass[12pt]{minimal} usepackage{amsmath} usepackage{wasysym} usepackage{amsfonts} usepackage{amssymb} usepackage{amsbsy} usepackage{mathrsfs} usepackage{upgreek} setlength{oddsidemargin}{-69pt} begin{document}$$^0$$end{document}","authors":"M. Cadilhac, Charles Paperman","doi":"10.1007/s00236-022-00432-2","DOIUrl":"https://doi.org/10.1007/s00236-022-00432-2","url":null,"abstract":"","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"59 1","pages":"321 - 336"},"PeriodicalIF":0.6,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49470798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Acta Informatica
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1