首页 > 最新文献

Acta Informatica最新文献

英文 中文
New families of Laplacian borderenergetic graphs 拉普拉斯边能图新族
IF 0.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-02-26 DOI: 10.1007/s00236-024-00454-y
Cahit Dede

Laplacian matrix and its spectrum are commonly used for giving a measure in networks in order to analyse its topological properties. In this paper, Laplacian matrix of graphs and their spectrum are studied. Laplacian energy of a graph G of order n is defined as ( mathrm{{LE}}(G) = sum _{i=1}^n|lambda _i(L)-{bar{d}}|), where (lambda _i(L)) is the i-th eigenvalue of Laplacian matrix of G, and ({bar{d}}) is their average. If (mathrm{{LE}}(G) = mathrm{{LE}}(K_n)) for the complete graph (K_n) of order n, then G is known as L-borderenergetic graph. In the first part of this paper, we construct three infinite families of non-complete disconnected L-borderenergetic graphs: (Lambda _1 = { G_{b,j,k} = [(((j-2)k-2j+2)b+1)K_{(j-1)k-(j-2)}] cup b(K_j times K_k)| b,j,k in {{mathbb {Z}}}^+}), ( Lambda _2 = {G_{2,b} = [K_6 nabla b(K_2 times K_3)] cup (4b-2)K_9 | bin {{mathbb {Z}}}^+ }), ( Lambda _3 = {G_{3,b} = [bK_8 nabla b(K_2 times K_4)] cup (14b-4)K_{8b+6} | bin {{mathbb {Z}}}^+ }), where (nabla ) is join operator and (times ) is direct product operator on graphs. Then, in the second part of this work, we construct new infinite families of non-complete connected L-borderenergetic graphs (Omega _1= {K_2 nabla overline{aK_2^r} vert ain {{mathbb {Z}}}^+}), (Omega _2 = {overline{aK_3 cup 2(K_2times K_3)}vert ain {{mathbb {Z}}}^+ }) and (Omega _3 = {overline{aK_5 cup (K_3times K_3)}vert ain {{mathbb {Z}}}^+ }), where ({overline{G}}) is the complement operator on G.

拉普拉斯矩阵及其频谱通常用于给出网络的度量,以分析其拓扑特性。本文研究了图的拉普拉斯矩阵及其谱。阶数为 n 的图 G 的拉普拉卡能量定义为 ( mathrm{{LE}}(G) = sum _{i=1}^n|lambda _i(L)-{bar{d}}|), 其中 (lambda _i(L)) 是 G 的拉普拉卡矩阵的第 i 个特征值,({bar{d}}) 是它们的平均值。如果对于阶数为 n 的完整图 (K_n/),(mathrm{{LE}}(G) = mathrm{{LE}}(K_n)),则 G 被称为 L 边能图。在本文的第一部分,我们构建了三个无穷族的非完全互不连接的 L-borderenergetic 图:(Lambda _1 = { G_{b,j,k} = [(((j-2)k-2j+2)b+1)K_{(j-1)k-(j-2)}] cup b(K_j times K_k)| b,j,k in {{mathbb {Z}}}^+}), ( Lambda _2 = {G_{2、b} = [K_6 nabla b(K_2 times K_3)] cup (4b-2)K_9 | bin {{mathbb {Z}}}^+ }),( ( Lambda _3 = {G_{3,b} = [bK_8 nabla b(K_2 times K_4)] cup (14b-4)K_{8b+6}| bin {{mathbb {Z}}^+ }),其中 (nabla )是连接算子,(times )是图上的直接积算子。然后,在这项工作的第二部分,我们构建了新的无穷族非完全连通 L 边能图 (Omega _1= {K_2 nabla overline{aK_2^r} vert ain {{mathbb {Z}}}^+})、(Omega _2 = {overline{aK_3 cup 2(K_2times K_3)}vert ain {{mathbb {Z}}}^+ }) and(Omega _3 = {overline{aK_5 cup (K_3times K_3)}vert ain {{mathbb {Z}}}^+ })、其中 ({overline{G}}) 是 G 上的补算子。
{"title":"New families of Laplacian borderenergetic graphs","authors":"Cahit Dede","doi":"10.1007/s00236-024-00454-y","DOIUrl":"10.1007/s00236-024-00454-y","url":null,"abstract":"<div><p>Laplacian matrix and its spectrum are commonly used for giving a measure in networks in order to analyse its topological properties. In this paper, Laplacian matrix of graphs and their spectrum are studied. Laplacian energy of a graph <i>G</i> of order <i>n</i> is defined as <span>( mathrm{{LE}}(G) = sum _{i=1}^n|lambda _i(L)-{bar{d}}|)</span>, where <span>(lambda _i(L))</span> is the <i>i</i>-th eigenvalue of Laplacian matrix of <i>G</i>, and <span>({bar{d}})</span> is their average. If <span>(mathrm{{LE}}(G) = mathrm{{LE}}(K_n))</span> for the complete graph <span>(K_n)</span> of order <i>n</i>, then <i>G</i> is known as <i>L</i>-borderenergetic graph. In the first part of this paper, we construct three infinite families of non-complete disconnected <i>L</i>-borderenergetic graphs: <span>(Lambda _1 = { G_{b,j,k} = [(((j-2)k-2j+2)b+1)K_{(j-1)k-(j-2)}] cup b(K_j times K_k)| b,j,k in {{mathbb {Z}}}^+})</span>, <span>( Lambda _2 = {G_{2,b} = [K_6 nabla b(K_2 times K_3)] cup (4b-2)K_9 | bin {{mathbb {Z}}}^+ })</span>, <span>( Lambda _3 = {G_{3,b} = [bK_8 nabla b(K_2 times K_4)] cup (14b-4)K_{8b+6} | bin {{mathbb {Z}}}^+ })</span>, where <span>(nabla )</span> is join operator and <span>(times )</span> is direct product operator on graphs. Then, in the second part of this work, we construct new infinite families of non-complete connected <i>L</i>-borderenergetic graphs <span>(Omega _1= {K_2 nabla overline{aK_2^r} vert ain {{mathbb {Z}}}^+})</span>, <span>(Omega _2 = {overline{aK_3 cup 2(K_2times K_3)}vert ain {{mathbb {Z}}}^+ })</span> and <span>(Omega _3 = {overline{aK_5 cup (K_3times K_3)}vert ain {{mathbb {Z}}}^+ })</span>, where <span>({overline{G}})</span> is the complement operator on <i>G</i>.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"61 2","pages":"115 - 129"},"PeriodicalIF":0.4,"publicationDate":"2024-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140006220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximating subset sum ratio via partition computations 通过分区计算逼近子集和比率
IF 0.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2024-01-12 DOI: 10.1007/s00236-023-00451-7
Giannis Alonistiotis, Antonis Antonopoulos, Nikolaos Melissinos, Aris Pagourtzis, Stavros Petsalakis, Manolis Vasilakis

We present a new FPTAS for the Subset Sum Ratio problem, which, given a set of integers, asks for two disjoint subsets such that the ratio of their sums is as close to 1 as possible. Our scheme makes use of exact and approximate algorithms for Partition, and clearly showcases the close relationship between the two algorithmic problems. Depending on the relationship between the size of the input set n and the error margin (varepsilon ), we improve upon the best currently known algorithm of Melissinos and Pagourtzis [COCOON 2018] of complexity (mathcal {O} (n^4 / varepsilon )). In particular, the exponent of n in our proposed scheme may decrease down to 2, depending on the Partition algorithm used.

我们针对子集和比问题提出了一种新的 FPTAS,在给定一个整数集合的情况下,要求找出两个不相交的子集,使它们的和之比尽可能接近 1。我们的方案利用了分治的精确算法和近似算法,清楚地展示了这两个算法问题之间的密切关系。根据输入集 n 的大小与误差幅度 (varepsilon )之间的关系,我们改进了 Melissinos 和 Pagourtzis [COCOON 2018] 目前已知的最佳算法,其复杂度为 (mathcal {O} (n^4 / varepsilon ))。特别是,在我们提出的方案中,n 的指数可能会下降到 2,这取决于所使用的 Partition 算法。
{"title":"Approximating subset sum ratio via partition computations","authors":"Giannis Alonistiotis,&nbsp;Antonis Antonopoulos,&nbsp;Nikolaos Melissinos,&nbsp;Aris Pagourtzis,&nbsp;Stavros Petsalakis,&nbsp;Manolis Vasilakis","doi":"10.1007/s00236-023-00451-7","DOIUrl":"10.1007/s00236-023-00451-7","url":null,"abstract":"<div><p>We present a new FPTAS for the <span>Subset Sum Ratio</span> problem, which, given a set of integers, asks for two disjoint subsets such that the ratio of their sums is as close to 1 as possible. Our scheme makes use of exact and approximate algorithms for <span>Partition</span>, and clearly showcases the close relationship between the two algorithmic problems. Depending on the relationship between the size of the input set <i>n</i> and the error margin <span>(varepsilon )</span>, we improve upon the best currently known algorithm of Melissinos and Pagourtzis [COCOON 2018] of complexity <span>(mathcal {O} (n^4 / varepsilon ))</span>. In particular, the exponent of <i>n</i> in our proposed scheme may decrease down to 2, depending on the <span>Partition</span> algorithm used.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"61 2","pages":"101 - 113"},"PeriodicalIF":0.4,"publicationDate":"2024-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-023-00451-7.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139459074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Neighborhood mutual remainder: self-stabilizing distributed implementation and applications 邻域互余:自稳定分布式实现与应用
IF 0.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-18 DOI: 10.1007/s00236-023-00450-8
Shlomi Dolev, Sayaka Kamei, Yoshiaki Katayama, Fukuhito Ooshita, Koichi Wada

Motivated by the need to convert move-atomic assumption in LOOK-COMPUTE-MOVE (LCM) robot algorithms to be implemented in existing distributed systems, we define a new distributed fundamental task, the neighborhood mutual remainder (NMR). Consider a situation where each process has a set of operations (O_p) and executes each operation in (O_p) infinitely often in distributed systems. Then, let (O_esubset O_p) be a subset of operations, which a process cannot execute, while its closed neighborhood executes operations in (O_psetminus O_e). The NMR is defined for such a situation. A distributed algorithm that satisfies the NMR requirement should satisfy the following two properties: (1) Liveness is satisfied if a process executes each operation in (O_p) infinitely often and (2) safety is satisfied if, when each process executes operations in (O_e), no process in its closed neighborhood executes operations in (O_psetminus O_e). We formalize the concept of NMR and give a simple self-stabilizing algorithm using the pigeon-hole principle to demonstrate the design paradigm to achieve NMR. A self-stabilizing algorithm tolerates transient faults (e.g., message loss, memory corruption, etc.) by its ability to converge from an arbitrary configuration to the legitimate one. In addition, we present an application of NMR to an LCM robot system for implementing a move-atomic property, where robots possess an independent clock that is advanced at the same speed. It is the first self-stabilizing implementation of the LCM synchronization for environments where each robot can have limited visibility and lights.

摘要 由于需要将 LOOK-COMPUTE-MOVE(LCM)机器人算法中的移动原子假设在现有分布式系统中实现,我们定义了一种新的分布式基本任务--邻域互余(NMR)。考虑这样一种情况:在分布式系统中,每个进程都有一组操作 (O_p),并且无限频繁地执行 (O_p)中的每个操作。那么,让 (O_esubset O_p) 是一个操作子集,进程不能执行它,而它的封闭邻域执行 (O_psetminus O_e) 中的操作。NMR 就是针对这种情况定义的。满足NMR要求的分布式算法应该满足以下两个特性:(1)如果一个进程无限频繁地执行(O_p )中的每一个操作,则满足有效性;(2)如果当每个进程执行(O_e )中的操作时,其封闭邻域中没有进程执行(O_psetminus O_e )中的操作,则满足安全性。我们正式提出了 NMR 概念,并利用鸽子洞原理给出了一个简单的自稳定算法,以演示实现 NMR 的设计范式。自稳定算法通过从任意配置收敛到合法配置的能力来容忍瞬时故障(如信息丢失、内存损坏等)。此外,我们还介绍了 NMR 在 LCM 机器人系统中的应用,该系统可实现移动原子特性,即机器人拥有以相同速度前进的独立时钟。这是 LCM 同步的首次自稳定实现,适用于每个机器人的能见度和灯光都有限的环境。
{"title":"Neighborhood mutual remainder: self-stabilizing distributed implementation and applications","authors":"Shlomi Dolev,&nbsp;Sayaka Kamei,&nbsp;Yoshiaki Katayama,&nbsp;Fukuhito Ooshita,&nbsp;Koichi Wada","doi":"10.1007/s00236-023-00450-8","DOIUrl":"10.1007/s00236-023-00450-8","url":null,"abstract":"<div><p>Motivated by the need to convert move-atomic assumption in <i>LOOK-COMPUTE-MOVE</i> (LCM) robot algorithms to be implemented in existing distributed systems, we define a new distributed fundamental task, the neighborhood mutual remainder (NMR). Consider a situation where each process has a set of operations <span>(O_p)</span> and executes each operation in <span>(O_p)</span> infinitely often in distributed systems. Then, let <span>(O_esubset O_p)</span> be a subset of operations, which a process cannot execute, while its closed neighborhood executes operations in <span>(O_psetminus O_e)</span>. The NMR is defined for such a situation. A distributed algorithm that satisfies the NMR requirement should satisfy the following two properties: (1) Liveness is satisfied if a process executes each operation in <span>(O_p)</span> infinitely often and (2) safety is satisfied if, when each process executes operations in <span>(O_e)</span>, no process in its closed neighborhood executes operations in <span>(O_psetminus O_e)</span>. We formalize the concept of NMR and give a simple self-stabilizing algorithm using the pigeon-hole principle to demonstrate the design paradigm to achieve NMR. A self-stabilizing algorithm tolerates transient faults (e.g., message loss, memory corruption, etc.) by its ability to converge from an arbitrary configuration to the legitimate one. In addition, we present an application of NMR to an LCM robot system for implementing a move-atomic property, where robots possess an independent clock that is advanced at the same speed. It is the first self-stabilizing implementation of the LCM synchronization for environments where each robot can have limited visibility and lights.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"61 1","pages":"83 - 100"},"PeriodicalIF":0.4,"publicationDate":"2023-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138745976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
n-PS-codes, 2-infix-outfix codes and some related classes of codes n-PS 码、2-后缀码和一些相关的码类
IF 0.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-15 DOI: 10.1007/s00236-023-00449-1
Haiyan Liu, Rongdong Cui, Tianjie Zhang

In this paper, n-PS-codes, 2-infix-outfix codes and some related classes of codes are investigated where (nge 1). The classes of n-PS-codes and 2-infix-outfix codes are generalizations of classes of prefix codes and suffix codes, and infix codes and outfix codes, respectively. The closure properties of n-PS-codes and g-3-PS-codes under composition are discussed where (nge 1), and the condition under which the class of 2-infix-outfix codes is closed under composition is provided.

摘要 本文研究了n-PS码、2-前缀-后缀码和一些相关的码类,其中 (nge 1) .n-PS码和2-后缀-后缀码分别是前缀码和后缀码、后缀码和后缀码的一般化。讨论了n-PS编码和g-3-PS编码在组成条件下的闭合性质,其中(nge 1) ,并提供了2-后缀-后缀编码类在组成条件下闭合的条件。
{"title":"n-PS-codes, 2-infix-outfix codes and some related classes of codes","authors":"Haiyan Liu,&nbsp;Rongdong Cui,&nbsp;Tianjie Zhang","doi":"10.1007/s00236-023-00449-1","DOIUrl":"10.1007/s00236-023-00449-1","url":null,"abstract":"<div><p>In this paper, <i>n</i>-PS-codes, 2-infix-outfix codes and some related classes of codes are investigated where <span>(nge 1)</span>. The classes of <i>n</i>-PS-codes and 2-infix-outfix codes are generalizations of classes of prefix codes and suffix codes, and infix codes and outfix codes, respectively. The closure properties of <i>n</i>-PS-codes and <i>g</i>-3-PS-codes under composition are discussed where <span>(nge 1)</span>, and the condition under which the class of 2-infix-outfix codes is closed under composition is provided.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"61 1","pages":"67 - 81"},"PeriodicalIF":0.4,"publicationDate":"2023-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138689500","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Balancing m-ary search trees with compressions on the fringe 用边缘压缩平衡 mary 搜索树
IF 0.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-15 DOI: 10.1007/s00236-023-00448-2
Shuyang Gao, Leen Hatem, Hosam Mahmoud

We investigate the performance of random m-ary trees grown under an algorithm that perfectly balances k levels, whenever the opportunity arises in a fringe subtree. The average-case analysis shows that considerable saving in space and search time is achieved by such a fringe balancing algorithm.

我们研究了在一种算法下生长的随机 mary 树的性能,这种算法能在边缘子树出现机会时完美地平衡 k 层。平均情况分析表明,这种边缘平衡算法大大节省了空间和搜索时间。
{"title":"Balancing m-ary search trees with compressions on the fringe","authors":"Shuyang Gao,&nbsp;Leen Hatem,&nbsp;Hosam Mahmoud","doi":"10.1007/s00236-023-00448-2","DOIUrl":"10.1007/s00236-023-00448-2","url":null,"abstract":"<div><p>We investigate the performance of random <i>m</i>-ary trees grown under an algorithm that perfectly balances <i>k</i> levels, whenever the opportunity arises in a fringe subtree. The average-case analysis shows that considerable saving in space and search time is achieved by such <b>a</b> fringe balancing algorithm.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"61 1","pages":"53 - 66"},"PeriodicalIF":0.4,"publicationDate":"2023-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138689160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editorial 2023: changes and invariants 编辑2023:变化与不变
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-03 DOI: 10.1007/s00236-023-00447-3
Henning Fernau
{"title":"Editorial 2023: changes and invariants","authors":"Henning Fernau","doi":"10.1007/s00236-023-00447-3","DOIUrl":"10.1007/s00236-023-00447-3","url":null,"abstract":"","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"60 4","pages":"331 - 333"},"PeriodicalIF":0.6,"publicationDate":"2023-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-023-00447-3.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"71908571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A decision procedure for string constraints with string/integer conversion and flat regular constraints 带字符串/整数转换和平面正则约束的字符串约束决策程序
IF 0.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-24 DOI: 10.1007/s00236-023-00446-4
Hao Wu, Yu-Fang Chen, Zhilin Wu, Bican Xia, Naijun Zhan

String constraint solving is the core of various testing and verification approaches for scripting languages. Among algorithms for solving string constraints, flattening is a well-known approach that is particularly useful in handling satisfiable instances. As string/integer conversion is an important function appearing in almost all scripting languages, Abdulla et al. extended the flattening approach to this function recently. However, their approach supports only a special flattening pattern and leaves the support of the general flat regular constraints as an open problem. In this paper, we fill the gap by proposing a complete flattening approach for the string/integer conversion. The approach is built upon a new quantifier elimination procedure for the linear-exponential arithmetic (namely, the extension of Presburger arithmetic with exponential functions, denoted by ExpPA) improved from the one proposed by Cherlin and Point in 1986. We analyze the complexity of our quantifier elimination procedure and show that the decision problem for existential ExpPA formulas is in 3-EXPTIME. Up to our knowledge, this is the first elementary complexity upper bound for this problem. While the quantifier elimination procedure is too expensive to be implemented efficiently, we propose various optimizations and provide a prototypical implementation. We evaluate the performance of our implementation on the benchmarks that are generated from the string hash functions as well as randomly. The experimental results show that our implementation outperforms the state-of-the-art solvers.

字符串约束求解是脚本语言各种测试和验证方法的核心。在解决字符串约束的算法中,扁平化是一种著名的方法,在处理可满足实例时特别有用。由于字符串/整数转换是几乎所有脚本语言中都会出现的重要函数,Abdulla 等人最近将扁平化方法扩展到了这一函数。然而,他们的方法只支持一种特殊的扁平化模式,而对一般扁平正则约束的支持仍是一个悬而未决的问题。在本文中,我们提出了一种完整的字符串/整数转换扁平化方法,填补了这一空白。这种方法建立在一种新的线性-指数算术(即用指数函数对普雷斯伯格算术进行扩展,用 ExpPA 表示)的量词消除程序之上,该程序由 Cherlin 和 Point 在 1986 年提出的程序改进而来。我们分析了我们的量词消除程序的复杂性,并证明存在 ExpPA 公式的判定问题在 3-EXPTIME 内。据我们所知,这是该问题的第一个基本复杂度上界。虽然量词消除过程过于昂贵,无法高效实现,但我们提出了各种优化方案,并提供了一个原型实现。我们在由字符串哈希函数和随机生成的基准上评估了我们的实现性能。实验结果表明,我们的实现优于最先进的求解器。
{"title":"A decision procedure for string constraints with string/integer conversion and flat regular constraints","authors":"Hao Wu,&nbsp;Yu-Fang Chen,&nbsp;Zhilin Wu,&nbsp;Bican Xia,&nbsp;Naijun Zhan","doi":"10.1007/s00236-023-00446-4","DOIUrl":"10.1007/s00236-023-00446-4","url":null,"abstract":"<div><p>String constraint solving is the core of various testing and verification approaches for scripting languages. Among algorithms for solving string constraints, flattening is a well-known approach that is particularly useful in handling satisfiable instances. As string/integer conversion is an important function appearing in almost all scripting languages, Abdulla et al. extended the flattening approach to this function recently. However, their approach supports only a special flattening pattern and leaves the support of the general flat regular constraints as an open problem. In this paper, we fill the gap by proposing a complete flattening approach for the string/integer conversion. The approach is built upon a new quantifier elimination procedure for the linear-exponential arithmetic (namely, the extension of Presburger arithmetic with exponential functions, denoted by <span>ExpPA</span>) improved from the one proposed by Cherlin and Point in 1986. We analyze the complexity of our quantifier elimination procedure and show that the decision problem for existential <span>ExpPA</span> formulas is in 3-EXPTIME. Up to our knowledge, this is the first elementary complexity upper bound for this problem. While the quantifier elimination procedure is too expensive to be implemented efficiently, we propose various optimizations and provide a prototypical implementation. We evaluate the performance of our implementation on the benchmarks that are generated from the string hash functions as well as randomly. The experimental results show that our implementation outperforms the state-of-the-art solvers.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"61 1","pages":"23 - 52"},"PeriodicalIF":0.4,"publicationDate":"2023-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135268450","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Discovering workflow nets of concurrent iterative processes 发现并发迭代过程的工作流网络
IF 0.4 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-14 DOI: 10.1007/s00236-023-00445-5
Tonatiuh Tapia-Flores, Ernesto López-Mellado

A novel and efficient method for discovering concurrent workflow processes is presented. It allows building a suitable workflow net (WFN) from a large event log (lambda ), which represents the behaviour of complex iterative processes involving concurrency. First, the t-invariants are determined from (lambda ); this allows computing the causal and concurrent relations between the events and the implicit causal relations between events that do not appear consecutively in (lambda ). Then a 1-bounded WFN is built, which could be eventually adjusted if its t-invariants do not match with those computed from (lambda ). The discovered model allows firing all the traces in (lambda ). The procedures derived from the method are polynomial time on (|lambda |); they have been implemented and tested on artificial logs.

本文介绍了一种发现并发工作流流程的高效新方法。该方法允许从大型事件日志(lambda )中构建一个合适的工作流网(WFN),该工作流网代表了涉及并发的复杂迭代流程的行为。首先,从 (lambda )中确定 t-变量;这样就可以计算事件之间的因果关系和并发关系,以及在 (lambda )中没有连续出现的事件之间的隐含因果关系。然后建立一个 1-bounded WFN,如果它的 t-invariants 与从(lambda )中计算出的 t-invariants 不匹配,那么最终可以对它进行调整。被发现的模型允许触发所有的轨迹。从该方法中得出的程序在 (|lambda |) 上是多项式时间;它们已在人工日志上实现并进行了测试。
{"title":"Discovering workflow nets of concurrent iterative processes","authors":"Tonatiuh Tapia-Flores,&nbsp;Ernesto López-Mellado","doi":"10.1007/s00236-023-00445-5","DOIUrl":"10.1007/s00236-023-00445-5","url":null,"abstract":"<div><p>A novel and efficient method for discovering concurrent workflow processes is presented. It allows building a suitable workflow net (WFN) from a large event log <span>(lambda )</span>, which represents the behaviour of complex iterative processes involving concurrency. First, the <i>t</i>-invariants are determined from <span>(lambda )</span>; this allows computing the causal and concurrent relations between the events and the implicit causal relations between events that do not appear consecutively in <span>(lambda )</span>. Then a 1-bounded WFN is built, which could be eventually adjusted if its <i>t</i>-invariants do not match with those computed from <span>(lambda )</span>. The discovered model allows firing all the traces in <span>(lambda )</span>. The procedures derived from the method are polynomial time on <span>(|lambda |)</span>; they have been implemented and tested on artificial logs.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"61 1","pages":"1 - 21"},"PeriodicalIF":0.4,"publicationDate":"2023-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-023-00445-5.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134911044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The second step in characterizing a three-word code 描述三字代码的第二步
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-09-08 DOI: 10.1007/s00236-023-00444-6
Chunhua Cao, Jiao Xu, Lei Liao, Di Yang, Guichuan Jia, Qian Du

In the fields of combinatorics on words and theory of codes, a two-word language ({x, y}) is a code if and only if (xy not = yx). But up to now, corresponding characterizations for a three-word language, which forms a code, have not been completely found. Let (X={x, y, z}) be a three-word language and (|x|, |y|, |z|) be their lengths. When (|x| = |y| < |z|), a necessary and sufficient condition for X to be a code was obtained in 2018. If (|x| < |y| = |z| le 2|x|), a necessary and sufficient condition for X to be a code is proposed in this paper.

在词的组合学领域和码理论中,两个词的语言({x, y})是一个码当且仅当(xy not = yx)。但是到目前为止,对于构成一个码的三字语言,还没有完全找到相应的表征。让(X={x, y, z})是一个三个单词的语言,(|x|, |y|, |z|)是它们的长度。当(|x| = |y| < |z|), 2018年获得X为代码的充分必要条件。如果(|x| < |y| = |z| le 2|x|),本文给出了X为码的充分必要条件。
{"title":"The second step in characterizing a three-word code","authors":"Chunhua Cao,&nbsp;Jiao Xu,&nbsp;Lei Liao,&nbsp;Di Yang,&nbsp;Guichuan Jia,&nbsp;Qian Du","doi":"10.1007/s00236-023-00444-6","DOIUrl":"10.1007/s00236-023-00444-6","url":null,"abstract":"<div><p>In the fields of combinatorics on words and theory of codes, a two-word language <span>({x, y})</span> is a code if and only if <span>(xy not = yx)</span>. But up to now, corresponding characterizations for a three-word language, which forms a code, have not been completely found. Let <span>(X={x, y, z})</span> be a three-word language and <span>(|x|, |y|, |z|)</span> be their lengths. When <span>(|x| = |y| &lt; |z|)</span>, a necessary and sufficient condition for <i>X</i> to be a code was obtained in 2018. If <span>(|x| &lt; |y| = |z| le 2|x|)</span>, a necessary and sufficient condition for <i>X</i> to be a code is proposed in this paper.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"60 4","pages":"453 - 465"},"PeriodicalIF":0.6,"publicationDate":"2023-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48790117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On first-order runtime enforcement of branching-time properties 分支时间属性的一阶运行时强制
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-08-03 DOI: 10.1007/s00236-023-00441-9
Luca Aceto, Ian Cassar, Adrian Francalanza, Anna Ingólfsdóttir

Runtime enforcement is a dynamic analysis technique that uses monitors to enforce the behaviour specified by some correctness property on an executing system. The enforceability of a logic captures the extent to which the properties expressible via the logic can be enforced at runtime for a specified operational model of enforcing monitors. We study the enforceability of branching-time, first-order properties expressed in the Hennessy–Milner Logic with Recursion ((mu ) HML) with respect to monitors that can enforce behaviour involving events that carry data. To this end, we develop an operational framework for first-order enforcement via suppressions, insertions and replacements. We then use this model to formalise the meaning of enforcing a branching-time property. We also show that a safety syntactic fragment of the logic is enforceable within this framework by providing an automated synthesis function that generates correct suppression monitors from any formula taken from this logical fragment.

运行时强制执行是一种动态分析技术,它使用监视器在执行系统上强制执行某些正确性属性所指定的行为。逻辑的可执行性捕获了在运行时为执行监视器的指定操作模型执行可通过逻辑表示的属性的程度。我们研究了Hennessy-Milner递归逻辑((mu ) HML)中表达的分支时间一阶属性的可执行性,这些属性与可以强制涉及携带数据的事件的行为的监视器有关。为此,我们通过抑制、插入和替换开发了一种一级执行的操作框架。然后,我们使用这个模型来形式化执行分支时间属性的含义。我们还展示了逻辑的安全语法片段在此框架内是可执行的,通过提供一个自动合成功能,该功能可以从从该逻辑片段中获取的任何公式生成正确的抑制监视器。
{"title":"On first-order runtime enforcement of branching-time properties","authors":"Luca Aceto,&nbsp;Ian Cassar,&nbsp;Adrian Francalanza,&nbsp;Anna Ingólfsdóttir","doi":"10.1007/s00236-023-00441-9","DOIUrl":"10.1007/s00236-023-00441-9","url":null,"abstract":"<div><p>Runtime enforcement is a dynamic analysis technique that uses monitors to enforce the behaviour specified by some correctness property on an executing system. The enforceability of a logic captures the extent to which the properties expressible via the logic can be enforced at runtime for a specified operational model of enforcing monitors. We study the enforceability of branching-time, first-order properties expressed in the Hennessy–Milner Logic with Recursion (<span>(mu )</span> <span>HML</span>) with respect to monitors that can enforce behaviour involving events that carry data. To this end, we develop an operational framework for first-order enforcement via suppressions, insertions and replacements. We then use this model to formalise the meaning of enforcing a branching-time property. We also show that a safety syntactic fragment of the logic is enforceable within this framework by providing an automated synthesis function that generates correct suppression monitors from any formula taken from this logical fragment.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"60 4","pages":"385 - 451"},"PeriodicalIF":0.6,"publicationDate":"2023-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41339460","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Acta Informatica
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1