首页 > 最新文献

Acta Informatica最新文献

英文 中文
Reoptimization of parameterized problems 参数化问题的再优化
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-07-25 DOI: 10.1007/s00236-022-00428-y
Hans-Joachim Böckenhauer, Elisabet Burjons, Martin Raszyk, Peter Rossmanith

Parameterized complexity allows us to analyze the time complexity of problems with respect to a natural parameter depending on the problem. Reoptimization looks for solutions or approximations for problem instances when given solutions to neighboring instances. We combine both techniques, in order to better classify the complexity of problems in the parameterized setting. Specifically, we see that some problems in the class of compositional problems, which do not have polynomial kernels under standard complexity-theoretic assumptions, do have polynomial kernels under the reoptimization model for some local modifications. We also observe that, for some other local modifications, these same problems do not have polynomial kernels unless (mathbf{NP}subseteq mathbf{coNP/poly}). We find examples of compositional problems, whose reoptimization versions do not have polynomial kernels under any of the considered local modifications. Finally, in another negative result, we prove that the reoptimization version of Connected Vertex Cover does not have a polynomial kernel unless Set Cover has a polynomial compression. In a different direction, looking at problems with polynomial kernels, we find that the reoptimization version of Vertex Cover has a polynomial kernel of size (varvec{2k+1}) using crown decompositions only, which improves the size of the kernel achievable with this technique in the classic problem.

参数化复杂度允许我们根据问题的自然参数来分析问题的时间复杂度。当给定相邻实例的解时,重新优化寻找问题实例的解或近似值。我们将这两种技术结合起来,以便在参数化设置中更好地分类问题的复杂性。具体来说,我们发现在标准复杂性理论假设下不具有多项式核的组合问题,在局部修正的再优化模型下具有多项式核。我们还观察到,对于其他一些局部修正,这些相同的问题没有多项式核,除非(mathbf{NP}subseteq mathbf{coNP/poly})。我们找到了组合问题的例子,这些问题的再优化版本在任何考虑的局部修改下都不具有多项式核。最后,在另一个否定的结果中,我们证明了连通顶点覆盖的再优化版本不具有多项式核,除非集合覆盖具有多项式压缩。在另一个方向上,看看多项式核的问题,我们发现顶点覆盖的再优化版本只有一个大小为(varvec{2k+1})的多项式核,这提高了用这种技术在经典问题中可以实现的核的大小。
{"title":"Reoptimization of parameterized problems","authors":"Hans-Joachim Böckenhauer,&nbsp;Elisabet Burjons,&nbsp;Martin Raszyk,&nbsp;Peter Rossmanith","doi":"10.1007/s00236-022-00428-y","DOIUrl":"10.1007/s00236-022-00428-y","url":null,"abstract":"<div><p>Parameterized complexity allows us to analyze the time complexity of problems with respect to a natural parameter depending on the problem. Reoptimization looks for solutions or approximations for problem instances when given solutions to neighboring instances. We combine both techniques, in order to better classify the complexity of problems in the parameterized setting. Specifically, we see that some problems in the class of compositional problems, which do not have polynomial kernels under standard complexity-theoretic assumptions, do have polynomial kernels under the reoptimization model for some local modifications. We also observe that, for some other local modifications, these same problems do not have polynomial kernels unless <span>(mathbf{NP}subseteq mathbf{coNP/poly})</span>. We find examples of compositional problems, whose reoptimization versions do not have polynomial kernels under any of the considered local modifications. Finally, in another negative result, we prove that the reoptimization version of <span>Connected Vertex Cover</span> does not have a polynomial kernel unless <span>Set Cover</span> has a polynomial compression. In a different direction, looking at problems with polynomial kernels, we find that the reoptimization version of <span>Vertex Cover</span> has a polynomial kernel of size <span>(varvec{2k+1})</span> using crown decompositions only, which improves the size of the kernel achievable with this technique in the classic problem.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"59 4","pages":"427 - 450"},"PeriodicalIF":0.6,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-022-00428-y.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"40334166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
The regular languages of wire linear AC(^0) 有线线性AC(^0)的正则语言
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-07-25 DOI: 10.1007/s00236-022-00432-2
Michaël Cadilhac, Charles Paperman

In this paper, the regular languages of wire linear (hbox {AC}^0)are characterized as the languages expressible in the two-variable fragment of first-order logic with regular predicates, (mathrm{FO}^2[mathrm{reg}]). Additionally, they are characterized as the languages recognized by the algebraic class (mathbf {QLDA}). The class is shown to be decidable and examples of languages in and outside of it are presented.

在本文中,有线线性(hbox{AC}^0)的正则语言被刻画为可在具有正则谓词的一阶逻辑的双变量片段中表达的语言,(mathrm{FO}^2[mathrm{reg}])。此外,它们被描述为代数类(mathbf{QLDA})所识别的语言。该类被证明是可判定的,并给出了类内外语言的例子。
{"title":"The regular languages of wire linear AC(^0)","authors":"Michaël Cadilhac,&nbsp;Charles Paperman","doi":"10.1007/s00236-022-00432-2","DOIUrl":"10.1007/s00236-022-00432-2","url":null,"abstract":"<div><p>In this paper, the regular languages of wire linear <span>(hbox {AC}^0)</span>are characterized as the languages expressible in the two-variable fragment of first-order logic with regular predicates, <span>(mathrm{FO}^2[mathrm{reg}])</span>. Additionally, they are characterized as the languages recognized by the algebraic class <span>(mathbf {QLDA})</span>. The class is shown to be decidable and examples of languages in and outside of it are presented.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"59 4","pages":"321 - 336"},"PeriodicalIF":0.6,"publicationDate":"2022-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50102664","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Careful synchronization of partial deterministic finite automata 部分确定性有限自动机的谨慎同步
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-07-22 DOI: 10.1007/s00236-022-00433-1
Hanan Shabana, M. V. Volkov

We approach the task of computing a carefully synchronizing word of minimum length for a given partial deterministic automaton, encoding the problem as an instance of SAT and invoking a SAT solver. Our experiments demonstrate that this approach gives satisfactory results for automata with up to 100 states even if very modest computational resources are used. We compare our results with the ones obtained by the first author for exact synchronization, which is another version of synchronization studied in the literature, and draw some theoretical conclusions.

我们处理的任务是为给定的部分确定性自动机计算一个最小长度的仔细同步字,将问题编码为SAT实例,并调用SAT求解器。我们的实验表明,即使使用了非常有限的计算资源,这种方法也能为多达100个状态的自动机提供令人满意的结果。我们将我们的结果与第一作者获得的精确同步的结果进行了比较,并得出了一些理论结论。精确同步是文献中研究的同步的另一个版本。
{"title":"Careful synchronization of partial deterministic finite automata","authors":"Hanan Shabana,&nbsp;M. V. Volkov","doi":"10.1007/s00236-022-00433-1","DOIUrl":"10.1007/s00236-022-00433-1","url":null,"abstract":"<div><p>We approach the task of computing a carefully synchronizing word of minimum length for a given partial deterministic automaton, encoding the problem as an instance of SAT and invoking a SAT solver. Our experiments demonstrate that this approach gives satisfactory results for automata with up to 100 states even if very modest computational resources are used. We compare our results with the ones obtained by the first author for exact synchronization, which is another version of synchronization studied in the literature, and draw some theoretical conclusions.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"59 4","pages":"479 - 504"},"PeriodicalIF":0.6,"publicationDate":"2022-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50042538","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Operational complexity and pumping lemmas 操作复杂性和泵浦引理
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-07-20 DOI: 10.1007/s00236-022-00431-3
Jürgen Dassow, Ismaël Jecker

The well-known pumping lemma for regular languages states that, for any regular language L, there is a constant p (depending on L) such that the following holds: If (win L) and (vert wvert ge p), then there are words (xin V^{*}), (yin V^+), and (zin V^{*}) such that (w=xyz) and (xy^tzin L) for (tge 0). The minimal pumping constant ({{{,mathrm{mpc},}}(L)}) of L is the minimal number p for which the conditions of the pumping lemma are satisfied. We investigate the behaviour of ({{{,mathrm{mpc},}}}) with respect to operations, i. e., for an n-ary regularity preserving operation (circ ), we study the set ({g_{circ }^{{{,mathrm{mpc},}}}(k_1,k_2,ldots ,k_n)}) of all numbers k such that there are regular languages (L_1,L_2,ldots ,L_n) with ({{{,mathrm{mpc},}}(L_i)=k_i}) for (1le ile n) and ({{{,mathrm{mpc},}}(circ (L_1,L_2,ldots ,L_n)=~k}). With respect to Kleene closure, complement, reversal, prefix and suffix-closure, circular shift, union, intersection, set-subtraction, symmetric difference,and concatenation, we determine ({g_{circ }^{{{,mathrm{mpc},}}}(k_1,k_2,ldots ,k_n)}) completely. Furthermore, we give some results with respect to the minimal pumping length where, in addition, (vert xyvert le p) has to hold.

众所周知的正则语言抽吸引理指出,对于任何正则语言L,都存在一个常数p(取决于L),使得以下条件成立:如果(win L)和(vert wvert ge p),则存在单词(xin V^{*})、(yin V^+)和(zin V^{*}),使得(tge 0)对应(w=xyz)和(xy^tzin L)。L的最小抽运常数({{{,mathrm{mpc},}}(L)})是满足抽运引理条件的最小数p。我们研究了({{{,mathrm{mpc},}}})在操作方面的行为,即,对于一个n元正则性保持操作(circ ),我们研究了所有数字k的集合({g_{circ }^{{{,mathrm{mpc},}}}(k_1,k_2,ldots ,k_n)}),使得(1le ile n)和({{{,mathrm{mpc},}}(circ (L_1,L_2,ldots ,L_n)=~k})都有正则语言(L_1,L_2,ldots ,L_n)和({{{,mathrm{mpc},}}(L_i)=k_i})。对于Kleene闭包、补包、反转、前缀和后缀闭包、圆移位、并并、交集、集减法、对称差分和连接,我们完全确定了({g_{circ }^{{{,mathrm{mpc},}}}(k_1,k_2,ldots ,k_n)})。此外,我们给出了一些关于最小泵浦长度的结果,此外,(vert xyvert le p)必须保持不变。
{"title":"Operational complexity and pumping lemmas","authors":"Jürgen Dassow,&nbsp;Ismaël Jecker","doi":"10.1007/s00236-022-00431-3","DOIUrl":"10.1007/s00236-022-00431-3","url":null,"abstract":"<div><p>The well-known pumping lemma for regular languages states that, for any regular language <i>L</i>, there is a constant <i>p</i> (depending on <i>L</i>) such that the following holds: If <span>(win L)</span> and <span>(vert wvert ge p)</span>, then there are words <span>(xin V^{*})</span>, <span>(yin V^+)</span>, and <span>(zin V^{*})</span> such that <span>(w=xyz)</span> and <span>(xy^tzin L)</span> for <span>(tge 0)</span>. The minimal pumping constant <span>({{{,mathrm{mpc},}}(L)})</span> of <i>L</i> is the minimal number <i>p</i> for which the conditions of the pumping lemma are satisfied. We investigate the behaviour of <span>({{{,mathrm{mpc},}}})</span> with respect to operations, i. e., for an <i>n</i>-ary regularity preserving operation <span>(circ )</span>, we study the set <span>({g_{circ }^{{{,mathrm{mpc},}}}(k_1,k_2,ldots ,k_n)})</span> of all numbers <i>k</i> such that there are regular languages <span>(L_1,L_2,ldots ,L_n)</span> with <span>({{{,mathrm{mpc},}}(L_i)=k_i})</span> for <span>(1le ile n)</span> and <span>({{{,mathrm{mpc},}}(circ (L_1,L_2,ldots ,L_n)=~k})</span>. With respect to Kleene closure, complement, reversal, prefix and suffix-closure, circular shift, union, intersection, set-subtraction, symmetric difference,and concatenation, we determine <span>({g_{circ }^{{{,mathrm{mpc},}}}(k_1,k_2,ldots ,k_n)})</span> completely. Furthermore, we give some results with respect to the minimal pumping length where, in addition, <span>(vert xyvert le p)</span> has to hold.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"59 4","pages":"337 - 355"},"PeriodicalIF":0.6,"publicationDate":"2022-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-022-00431-3.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43609320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Weighted throughput in a single machine preemptive scheduling with continuous controllable processing times 具有连续可控处理时间的单机抢占调度中的加权吞吐量
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-07-19 DOI: 10.1007/s00236-022-00430-4
Asaf Levin, Tal Shusterman

We consider the problem of weighted throughput in the single machine preemptive scheduling with continuous controllable processing times. A set of tasks can be scheduled on a single machine. Each task j is associated with a nonnegative weight (w_{j}), a release date, a due date, and an interval of possible processing times. A task j can either be scheduled with a total processing time (p_j) which is in the given interval, or rejected (not participating in the schedule). The reward for processing j for (p_{j}) time units is (w_{j}p_{j}), and we are interested in constructing a feasible preemptive schedule such that the sum of rewards is maximized. We present a dynamic programming algorithm that solves the problem in pseudo-polynomial time and use it to obtain an FPTAS. Afterward, as our main contribution we propose an interesting efficient frontier approach for improved complexity bounds.

研究了处理时间连续可控的单机抢占调度中的加权吞吐量问题。可以在一台机器上调度一组任务。每个任务j都与一个非负权重(w_{j})、一个发布日期、一个到期日期和一个可能的处理时间间隔相关联。任务j可以使用给定间隔内的总处理时间(p_j)进行调度,也可以拒绝(不参与调度)。对于(p_{j})时间单位处理j的奖励是(w_{j}p_{j}),我们感兴趣的是构建一个可行的抢占式调度,使奖励总和最大化。提出了一种动态规划算法,该算法在伪多项式时间内解决了这一问题,并利用该算法得到了一个FPTAS。之后,作为我们的主要贡献,我们提出了一个有趣的有效的边界方法来改进复杂性边界。
{"title":"Weighted throughput in a single machine preemptive scheduling with continuous controllable processing times","authors":"Asaf Levin,&nbsp;Tal Shusterman","doi":"10.1007/s00236-022-00430-4","DOIUrl":"10.1007/s00236-022-00430-4","url":null,"abstract":"<div><p>We consider the problem of weighted throughput in the single machine preemptive scheduling with continuous controllable processing times. A set of tasks can be scheduled on a single machine. Each task <i>j</i> is associated with a nonnegative weight <span>(w_{j})</span>, a release date, a due date, and an interval of possible processing times. A task <i>j</i> can either be scheduled with a total processing time <span>(p_j)</span> which is in the given interval, or rejected (not participating in the schedule). The reward for processing <i>j</i> for <span>(p_{j})</span> time units is <span>(w_{j}p_{j})</span>, and we are interested in constructing a feasible preemptive schedule such that the sum of rewards is maximized. We present a dynamic programming algorithm that solves the problem in pseudo-polynomial time and use it to obtain an FPTAS. Afterward, as our main contribution we propose an interesting efficient frontier approach for improved complexity bounds.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"60 2","pages":"101 - 122"},"PeriodicalIF":0.6,"publicationDate":"2022-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44782247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Alternating complexity of counting first-order logic for the subword order 子字顺序的一阶逻辑计数的交替复杂性
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-06-26 DOI: 10.1007/s00236-022-00424-2
Dietrich Kuske, Christian Schwarz

This paper considers the structure consisting of the set of all words over a given alphabet together with the subword relation, regular predicates, and constants for every word. We are interested in the counting extension of first-order logic by threshold counting quantifiers. The main result shows that the two-variable fragment of this logic can be decided in twofold exponential alternating time with linearly many alternations (and therefore in particular in twofold exponential space as announced in the conference version (Kuske and Schwarz, in: MFCS’20, Leibniz International Proceedings in Informatics (LIPIcs) vol. 170, pp 56:1–56:13. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020) of this paper) provided the regular predicates are restricted to piecewise testable ones. This result improves prior insights by Karandikar and Schnoebelen by extending the logic and saving one exponent in the space bound. Its proof consists of two main parts: First, we provide a quantifier elimination procedure that results in a formula with constants of bounded length (this generalises the procedure by Karandikar and Schnoebelen for first-order logic). From this, it follows that quantification in formulas can be restricted to words of bounded length, i.e., the second part of the proof is an adaptation of the method by Ferrante and Rackoff to counting logic and deviates significantly from the path of reasoning by Karandikar and Schnoebelen.

本文考虑了由给定字母表上所有单词的集合以及每个单词的子词关系、规则谓词和常量组成的结构。我们感兴趣的是通过阈值计数量词对一阶逻辑的计数扩展。主要结果表明,该逻辑的双变量片段可以在具有线性多变化的双指数交替时间中确定(因此特别是在会议版本中宣布的双指数空间中)(Kuske和Schwarz, in: MFCS ' 20, Leibniz International Proceedings in Informatics (LIPIcs) vol. 170, pp 56:1-56:13)。Schloss Dagstuhl - Leibniz-Zentrum fr Informatik, 2020)提供了正则谓词限制为分段可测试的谓词。这个结果改进了Karandikar和Schnoebelen先前的见解,扩展了逻辑并在空间界中节省了一个指数。它的证明由两个主要部分组成:首先,我们提供了一个量词消去过程,得到一个有界长度常数的公式(这推广了Karandikar和Schnoebelen在一阶逻辑中的过程)。由此可以得出,公式中的量化可以被限制在有界长度的词中,即证明的第二部分是Ferrante和Rackoff对计数逻辑方法的改编,明显偏离了Karandikar和Schnoebelen的推理路径。
{"title":"Alternating complexity of counting first-order logic for the subword order","authors":"Dietrich Kuske,&nbsp;Christian Schwarz","doi":"10.1007/s00236-022-00424-2","DOIUrl":"10.1007/s00236-022-00424-2","url":null,"abstract":"<div><p>This paper considers the structure consisting of the set of all words over a given alphabet together with the subword relation, regular predicates, and constants for every word. We are interested in the counting extension of first-order logic by threshold counting quantifiers. The main result shows that the two-variable fragment of this logic can be decided in twofold exponential alternating time with linearly many alternations (and therefore in particular in twofold exponential space as announced in the conference version (Kuske and Schwarz, in: MFCS’20, Leibniz International Proceedings in Informatics (LIPIcs) vol. 170, pp 56:1–56:13. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020) of this paper) provided the regular predicates are restricted to piecewise testable ones. This result improves prior insights by Karandikar and Schnoebelen by extending the logic and saving one exponent in the space bound. Its proof consists of two main parts: First, we provide a quantifier elimination procedure that results in a formula with constants of bounded length (this generalises the procedure by Karandikar and Schnoebelen for first-order logic). From this, it follows that quantification in formulas can be restricted to words of bounded length, i.e., the second part of the proof is an adaptation of the method by Ferrante and Rackoff to counting logic and deviates significantly from the path of reasoning by Karandikar and Schnoebelen.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"60 1","pages":"79 - 100"},"PeriodicalIF":0.6,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-022-00424-2.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42991457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Lamplighter groups and automata 点灯组和自动机
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-06-08 DOI: 10.1007/s00236-022-00423-3
Sanjay Jain, Birzhan Moldagaliyev, F. Stephan, Tien Dat Tran
{"title":"Lamplighter groups and automata","authors":"Sanjay Jain, Birzhan Moldagaliyev, F. Stephan, Tien Dat Tran","doi":"10.1007/s00236-022-00423-3","DOIUrl":"https://doi.org/10.1007/s00236-022-00423-3","url":null,"abstract":"","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"59 1","pages":"451 - 478"},"PeriodicalIF":0.6,"publicationDate":"2022-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52289547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lamplighter groups and automata 点灯组和自动机
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-06-08 DOI: 10.1007/s00236-022-00423-3
Sanjay Jain, Birzhan Moldagaliyev, Frank Stephan, Tien Dat Tran

This paper investigates presentations of lamplighter groups using computational models from automata theory. The present work shows that if G can be presented such that the full group operation is recognised by a transducer, then the same is true for the lamplighter group (G wr {{mathbb {Z}}}) of G. Furthermore, Cayley presentations, where only multiplications with constants are recognised by transducers, are used to study generalised lamplighter groups of the form (G wr {{mathbb {Z}}}^d) and (G wr F_d), where (F_d) is the free group over d generators. Additionally, ({{mathbb {Z}}}_k wr {{mathbb {Z}}}^2) and ({{mathbb {Z}}}_k wr {F_d}) are shown to be Cayley tree automatic.

本文利用自动机理论的计算模型研究了点灯组的表示。目前的工作表明,如果G可以被呈现,使得整个群操作被换能器识别,那么G的点灯群(G wr {{mathbb {Z}}})也是如此。此外,Cayley表示,其中只有带有常数的乘法被换能器识别,用于研究形式为(G wr {{mathbb {Z}}}^d)和(G wr F_d)的广义点灯群,其中(F_d)是d个发生器上的自由群。此外,({{mathbb {Z}}}_k wr {{mathbb {Z}}}^2)和({{mathbb {Z}}}_k wr {F_d})显示为Cayley树自动。
{"title":"Lamplighter groups and automata","authors":"Sanjay Jain,&nbsp;Birzhan Moldagaliyev,&nbsp;Frank Stephan,&nbsp;Tien Dat Tran","doi":"10.1007/s00236-022-00423-3","DOIUrl":"10.1007/s00236-022-00423-3","url":null,"abstract":"<div><p>This paper investigates presentations of lamplighter groups using computational models from automata theory. The present work shows that if <i>G</i> can be presented such that the full group operation is recognised by a transducer, then the same is true for the lamplighter group <span>(G wr {{mathbb {Z}}})</span> of <i>G</i>. Furthermore, Cayley presentations, where only multiplications with constants are recognised by transducers, are used to study generalised lamplighter groups of the form <span>(G wr {{mathbb {Z}}}^d)</span> and <span>(G wr F_d)</span>, where <span>(F_d)</span> is the free group over <i>d</i> generators. Additionally, <span>({{mathbb {Z}}}_k wr {{mathbb {Z}}}^2)</span> and <span>({{mathbb {Z}}}_k wr {F_d})</span> are shown to be Cayley tree automatic.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"59 4","pages":"451 - 478"},"PeriodicalIF":0.6,"publicationDate":"2022-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50014521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Depth-first search in directed planar graphs, revisited 有向平面图中的深度优先搜索,重访
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-06-04 DOI: 10.1007/s00236-022-00425-1
Eric Allender, Archit Chauhan, Samir Datta

We present an algorithm for constructing a depth-first search tree in planar digraphs; the algorithm can be implemented in the complexity class (text{ AC}^1(text{ UL }cap text{ co-UL})), which is contained in (text{ AC}^2). Prior to this (for more than a quarter-century), the fastest uniform deterministic parallel algorithm for this problem had a runtime of (O(log ^{10}n)) (corresponding to the complexity class (text{ AC}^{10}subseteq text{ NC}^{11})). We also consider the problem of computing depth-first search trees in other classes of graphs and obtain additional new upper bounds.

提出了一种构造平面有向图中深度优先搜索树的算法;该算法可以在复杂度类(text{ AC}^1(text{ UL }cap text{ co-UL}))中实现,该复杂度类包含在(text{ AC}^2)中。在此之前(超过四分之一个世纪),这个问题最快的统一确定性并行算法的运行时为(O(log ^{10}n))(对应于复杂度类(text{ AC}^{10}subseteq text{ NC}^{11}))。我们还考虑了在其他类型的图中计算深度优先搜索树的问题,并获得了新的上界。
{"title":"Depth-first search in directed planar graphs, revisited","authors":"Eric Allender,&nbsp;Archit Chauhan,&nbsp;Samir Datta","doi":"10.1007/s00236-022-00425-1","DOIUrl":"10.1007/s00236-022-00425-1","url":null,"abstract":"<div><p>We present an algorithm for constructing a depth-first search tree in planar digraphs; the algorithm can be implemented in the complexity class <span>(text{ AC}^1(text{ UL }cap text{ co-UL}))</span>, which is contained in <span>(text{ AC}^2)</span>. Prior to this (for more than a quarter-century), the fastest uniform deterministic parallel algorithm for this problem had a runtime of <span>(O(log ^{10}n))</span> (corresponding to the complexity class <span>(text{ AC}^{10}subseteq text{ NC}^{11})</span>). We also consider the problem of computing depth-first search trees in other classes of graphs and obtain additional new upper bounds.\u0000</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"59 4","pages":"289 - 319"},"PeriodicalIF":0.6,"publicationDate":"2022-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45032441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secret-shared RAM indefinite private and secure RAM execution of perfectly unrevealed programs 秘密共享RAM完全未公开程序的无限私人和安全RAM执行
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-04-20 DOI: 10.1007/s00236-022-00422-4
Shlomi Dolev, Yin Li

Secure and private computations over random access machine (RAM) are preferred over computations with circuits or Turing machines. Secure RAM executions become more and more important in the scope of avoiding information leakage when executing programs over a single computer, as well as the clouds. In this paper, we proposed a novel scheme for evaluating RAM programs without revealing any information on the computation, including the program, the data, and the result. We use Shamir Secret Sharing to share all the program instructions and the private string matching technique to ensure the execution of the right instruction sequence. We stress that our scheme obtains information-theoretical security and does not rely on any computational hardness assumptions.

随机存取机(RAM)上的安全和私有计算优于电路或图灵机的计算。在单台计算机和云上执行程序时,为了避免信息泄漏,安全RAM执行变得越来越重要。在本文中,我们提出了一种新的方案来评估RAM程序,而不透露任何有关计算的信息,包括程序,数据和结果。我们使用Shamir秘密共享来共享所有的程序指令,并使用私有字符串匹配技术来确保正确的指令序列的执行。我们强调,我们的方案获得信息理论上的安全性,不依赖于任何计算硬度假设。
{"title":"Secret-shared RAM indefinite private and secure RAM execution of perfectly unrevealed programs","authors":"Shlomi Dolev,&nbsp;Yin Li","doi":"10.1007/s00236-022-00422-4","DOIUrl":"10.1007/s00236-022-00422-4","url":null,"abstract":"<div><p>Secure and private computations over random access machine (RAM) are preferred over computations with circuits or Turing machines. Secure RAM executions become more and more important in the scope of avoiding information leakage when executing programs over a single computer, as well as the clouds. In this paper, we proposed a novel scheme for evaluating RAM programs without revealing any information on the computation, including the program, the data, and the result. We use Shamir Secret Sharing to share all the program instructions and the private string matching technique to ensure the execution of the right instruction sequence. We stress that our scheme obtains information-theoretical security and does not rely on any computational hardness assumptions.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"60 1","pages":"59 - 78"},"PeriodicalIF":0.6,"publicationDate":"2022-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-022-00422-4.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46502702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Acta Informatica
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1