Pub Date : 2022-07-20DOI: 10.1007/s00236-022-00431-3
Jürgen Dassow, Ismaël Jecker
The well-known pumping lemma for regular languages states that, for any regular language L, there is a constant p (depending on L) such that the following holds: If (win L) and (vert wvert ge p), then there are words (xin V^{*}), (yin V^+), and (zin V^{*}) such that (w=xyz) and (xy^tzin L) for (tge 0). The minimal pumping constant ({{{,mathrm{mpc},}}(L)}) of L is the minimal number p for which the conditions of the pumping lemma are satisfied. We investigate the behaviour of ({{{,mathrm{mpc},}}}) with respect to operations, i. e., for an n-ary regularity preserving operation (circ ), we study the set ({g_{circ }^{{{,mathrm{mpc},}}}(k_1,k_2,ldots ,k_n)}) of all numbers k such that there are regular languages (L_1,L_2,ldots ,L_n) with ({{{,mathrm{mpc},}}(L_i)=k_i}) for (1le ile n) and ({{{,mathrm{mpc},}}(circ (L_1,L_2,ldots ,L_n)=~k}). With respect to Kleene closure, complement, reversal, prefix and suffix-closure, circular shift, union, intersection, set-subtraction, symmetric difference,and concatenation, we determine ({g_{circ }^{{{,mathrm{mpc},}}}(k_1,k_2,ldots ,k_n)}) completely. Furthermore, we give some results with respect to the minimal pumping length where, in addition, (vert xyvert le p) has to hold.
众所周知的正则语言抽吸引理指出,对于任何正则语言L,都存在一个常数p(取决于L),使得以下条件成立:如果(win L)和(vert wvert ge p),则存在单词(xin V^{*})、(yin V^+)和(zin V^{*}),使得(tge 0)对应(w=xyz)和(xy^tzin L)。L的最小抽运常数({{{,mathrm{mpc},}}(L)})是满足抽运引理条件的最小数p。我们研究了({{{,mathrm{mpc},}}})在操作方面的行为,即,对于一个n元正则性保持操作(circ ),我们研究了所有数字k的集合({g_{circ }^{{{,mathrm{mpc},}}}(k_1,k_2,ldots ,k_n)}),使得(1le ile n)和({{{,mathrm{mpc},}}(circ (L_1,L_2,ldots ,L_n)=~k})都有正则语言(L_1,L_2,ldots ,L_n)和({{{,mathrm{mpc},}}(L_i)=k_i})。对于Kleene闭包、补包、反转、前缀和后缀闭包、圆移位、并并、交集、集减法、对称差分和连接,我们完全确定了({g_{circ }^{{{,mathrm{mpc},}}}(k_1,k_2,ldots ,k_n)})。此外,我们给出了一些关于最小泵浦长度的结果,此外,(vert xyvert le p)必须保持不变。
{"title":"Operational complexity and pumping lemmas","authors":"Jürgen Dassow, Ismaël Jecker","doi":"10.1007/s00236-022-00431-3","DOIUrl":"10.1007/s00236-022-00431-3","url":null,"abstract":"<div><p>The well-known pumping lemma for regular languages states that, for any regular language <i>L</i>, there is a constant <i>p</i> (depending on <i>L</i>) such that the following holds: If <span>(win L)</span> and <span>(vert wvert ge p)</span>, then there are words <span>(xin V^{*})</span>, <span>(yin V^+)</span>, and <span>(zin V^{*})</span> such that <span>(w=xyz)</span> and <span>(xy^tzin L)</span> for <span>(tge 0)</span>. The minimal pumping constant <span>({{{,mathrm{mpc},}}(L)})</span> of <i>L</i> is the minimal number <i>p</i> for which the conditions of the pumping lemma are satisfied. We investigate the behaviour of <span>({{{,mathrm{mpc},}}})</span> with respect to operations, i. e., for an <i>n</i>-ary regularity preserving operation <span>(circ )</span>, we study the set <span>({g_{circ }^{{{,mathrm{mpc},}}}(k_1,k_2,ldots ,k_n)})</span> of all numbers <i>k</i> such that there are regular languages <span>(L_1,L_2,ldots ,L_n)</span> with <span>({{{,mathrm{mpc},}}(L_i)=k_i})</span> for <span>(1le ile n)</span> and <span>({{{,mathrm{mpc},}}(circ (L_1,L_2,ldots ,L_n)=~k})</span>. With respect to Kleene closure, complement, reversal, prefix and suffix-closure, circular shift, union, intersection, set-subtraction, symmetric difference,and concatenation, we determine <span>({g_{circ }^{{{,mathrm{mpc},}}}(k_1,k_2,ldots ,k_n)})</span> completely. Furthermore, we give some results with respect to the minimal pumping length where, in addition, <span>(vert xyvert le p)</span> has to hold.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-022-00431-3.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43609320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-07-19DOI: 10.1007/s00236-022-00430-4
Asaf Levin, Tal Shusterman
We consider the problem of weighted throughput in the single machine preemptive scheduling with continuous controllable processing times. A set of tasks can be scheduled on a single machine. Each task j is associated with a nonnegative weight (w_{j}), a release date, a due date, and an interval of possible processing times. A task j can either be scheduled with a total processing time (p_j) which is in the given interval, or rejected (not participating in the schedule). The reward for processing j for (p_{j}) time units is (w_{j}p_{j}), and we are interested in constructing a feasible preemptive schedule such that the sum of rewards is maximized. We present a dynamic programming algorithm that solves the problem in pseudo-polynomial time and use it to obtain an FPTAS. Afterward, as our main contribution we propose an interesting efficient frontier approach for improved complexity bounds.
{"title":"Weighted throughput in a single machine preemptive scheduling with continuous controllable processing times","authors":"Asaf Levin, Tal Shusterman","doi":"10.1007/s00236-022-00430-4","DOIUrl":"10.1007/s00236-022-00430-4","url":null,"abstract":"<div><p>We consider the problem of weighted throughput in the single machine preemptive scheduling with continuous controllable processing times. A set of tasks can be scheduled on a single machine. Each task <i>j</i> is associated with a nonnegative weight <span>(w_{j})</span>, a release date, a due date, and an interval of possible processing times. A task <i>j</i> can either be scheduled with a total processing time <span>(p_j)</span> which is in the given interval, or rejected (not participating in the schedule). The reward for processing <i>j</i> for <span>(p_{j})</span> time units is <span>(w_{j}p_{j})</span>, and we are interested in constructing a feasible preemptive schedule such that the sum of rewards is maximized. We present a dynamic programming algorithm that solves the problem in pseudo-polynomial time and use it to obtain an FPTAS. Afterward, as our main contribution we propose an interesting efficient frontier approach for improved complexity bounds.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44782247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-26DOI: 10.1007/s00236-022-00424-2
Dietrich Kuske, Christian Schwarz
This paper considers the structure consisting of the set of all words over a given alphabet together with the subword relation, regular predicates, and constants for every word. We are interested in the counting extension of first-order logic by threshold counting quantifiers. The main result shows that the two-variable fragment of this logic can be decided in twofold exponential alternating time with linearly many alternations (and therefore in particular in twofold exponential space as announced in the conference version (Kuske and Schwarz, in: MFCS’20, Leibniz International Proceedings in Informatics (LIPIcs) vol. 170, pp 56:1–56:13. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020) of this paper) provided the regular predicates are restricted to piecewise testable ones. This result improves prior insights by Karandikar and Schnoebelen by extending the logic and saving one exponent in the space bound. Its proof consists of two main parts: First, we provide a quantifier elimination procedure that results in a formula with constants of bounded length (this generalises the procedure by Karandikar and Schnoebelen for first-order logic). From this, it follows that quantification in formulas can be restricted to words of bounded length, i.e., the second part of the proof is an adaptation of the method by Ferrante and Rackoff to counting logic and deviates significantly from the path of reasoning by Karandikar and Schnoebelen.
{"title":"Alternating complexity of counting first-order logic for the subword order","authors":"Dietrich Kuske, Christian Schwarz","doi":"10.1007/s00236-022-00424-2","DOIUrl":"10.1007/s00236-022-00424-2","url":null,"abstract":"<div><p>This paper considers the structure consisting of the set of all words over a given alphabet together with the subword relation, regular predicates, and constants for every word. We are interested in the counting extension of first-order logic by threshold counting quantifiers. The main result shows that the two-variable fragment of this logic can be decided in twofold exponential alternating time with linearly many alternations (and therefore in particular in twofold exponential space as announced in the conference version (Kuske and Schwarz, in: MFCS’20, Leibniz International Proceedings in Informatics (LIPIcs) vol. 170, pp 56:1–56:13. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020) of this paper) provided the regular predicates are restricted to piecewise testable ones. This result improves prior insights by Karandikar and Schnoebelen by extending the logic and saving one exponent in the space bound. Its proof consists of two main parts: First, we provide a quantifier elimination procedure that results in a formula with constants of bounded length (this generalises the procedure by Karandikar and Schnoebelen for first-order logic). From this, it follows that quantification in formulas can be restricted to words of bounded length, i.e., the second part of the proof is an adaptation of the method by Ferrante and Rackoff to counting logic and deviates significantly from the path of reasoning by Karandikar and Schnoebelen.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-022-00424-2.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42991457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-08DOI: 10.1007/s00236-022-00423-3
Sanjay Jain, Birzhan Moldagaliyev, F. Stephan, Tien Dat Tran
{"title":"Lamplighter groups and automata","authors":"Sanjay Jain, Birzhan Moldagaliyev, F. Stephan, Tien Dat Tran","doi":"10.1007/s00236-022-00423-3","DOIUrl":"https://doi.org/10.1007/s00236-022-00423-3","url":null,"abstract":"","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52289547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-08DOI: 10.1007/s00236-022-00423-3
Sanjay Jain, Birzhan Moldagaliyev, Frank Stephan, Tien Dat Tran
This paper investigates presentations of lamplighter groups using computational models from automata theory. The present work shows that if G can be presented such that the full group operation is recognised by a transducer, then the same is true for the lamplighter group (G wr {{mathbb {Z}}}) of G. Furthermore, Cayley presentations, where only multiplications with constants are recognised by transducers, are used to study generalised lamplighter groups of the form (G wr {{mathbb {Z}}}^d) and (G wr F_d), where (F_d) is the free group over d generators. Additionally, ({{mathbb {Z}}}_k wr {{mathbb {Z}}}^2) and ({{mathbb {Z}}}_k wr {F_d}) are shown to be Cayley tree automatic.
{"title":"Lamplighter groups and automata","authors":"Sanjay Jain, Birzhan Moldagaliyev, Frank Stephan, Tien Dat Tran","doi":"10.1007/s00236-022-00423-3","DOIUrl":"10.1007/s00236-022-00423-3","url":null,"abstract":"<div><p>This paper investigates presentations of lamplighter groups using computational models from automata theory. The present work shows that if <i>G</i> can be presented such that the full group operation is recognised by a transducer, then the same is true for the lamplighter group <span>(G wr {{mathbb {Z}}})</span> of <i>G</i>. Furthermore, Cayley presentations, where only multiplications with constants are recognised by transducers, are used to study generalised lamplighter groups of the form <span>(G wr {{mathbb {Z}}}^d)</span> and <span>(G wr F_d)</span>, where <span>(F_d)</span> is the free group over <i>d</i> generators. Additionally, <span>({{mathbb {Z}}}_k wr {{mathbb {Z}}}^2)</span> and <span>({{mathbb {Z}}}_k wr {F_d})</span> are shown to be Cayley tree automatic.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50014521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-06-04DOI: 10.1007/s00236-022-00425-1
Eric Allender, Archit Chauhan, Samir Datta
We present an algorithm for constructing a depth-first search tree in planar digraphs; the algorithm can be implemented in the complexity class (text{ AC}^1(text{ UL }cap text{ co-UL})), which is contained in (text{ AC}^2). Prior to this (for more than a quarter-century), the fastest uniform deterministic parallel algorithm for this problem had a runtime of (O(log ^{10}n)) (corresponding to the complexity class (text{ AC}^{10}subseteq text{ NC}^{11})). We also consider the problem of computing depth-first search trees in other classes of graphs and obtain additional new upper bounds.
{"title":"Depth-first search in directed planar graphs, revisited","authors":"Eric Allender, Archit Chauhan, Samir Datta","doi":"10.1007/s00236-022-00425-1","DOIUrl":"10.1007/s00236-022-00425-1","url":null,"abstract":"<div><p>We present an algorithm for constructing a depth-first search tree in planar digraphs; the algorithm can be implemented in the complexity class <span>(text{ AC}^1(text{ UL }cap text{ co-UL}))</span>, which is contained in <span>(text{ AC}^2)</span>. Prior to this (for more than a quarter-century), the fastest uniform deterministic parallel algorithm for this problem had a runtime of <span>(O(log ^{10}n))</span> (corresponding to the complexity class <span>(text{ AC}^{10}subseteq text{ NC}^{11})</span>). We also consider the problem of computing depth-first search trees in other classes of graphs and obtain additional new upper bounds.\u0000</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45032441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-20DOI: 10.1007/s00236-022-00422-4
Shlomi Dolev, Yin Li
Secure and private computations over random access machine (RAM) are preferred over computations with circuits or Turing machines. Secure RAM executions become more and more important in the scope of avoiding information leakage when executing programs over a single computer, as well as the clouds. In this paper, we proposed a novel scheme for evaluating RAM programs without revealing any information on the computation, including the program, the data, and the result. We use Shamir Secret Sharing to share all the program instructions and the private string matching technique to ensure the execution of the right instruction sequence. We stress that our scheme obtains information-theoretical security and does not rely on any computational hardness assumptions.
{"title":"Secret-shared RAM indefinite private and secure RAM execution of perfectly unrevealed programs","authors":"Shlomi Dolev, Yin Li","doi":"10.1007/s00236-022-00422-4","DOIUrl":"10.1007/s00236-022-00422-4","url":null,"abstract":"<div><p>Secure and private computations over random access machine (RAM) are preferred over computations with circuits or Turing machines. Secure RAM executions become more and more important in the scope of avoiding information leakage when executing programs over a single computer, as well as the clouds. In this paper, we proposed a novel scheme for evaluating RAM programs without revealing any information on the computation, including the program, the data, and the result. We use Shamir Secret Sharing to share all the program instructions and the private string matching technique to ensure the execution of the right instruction sequence. We stress that our scheme obtains information-theoretical security and does not rely on any computational hardness assumptions.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-022-00422-4.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46502702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-04-08DOI: 10.1007/s00236-022-00417-1
Rob van Glabbeek
This paper introduces the counterpart of strong bisimilarity for labelled transition systems extended with timeout transitions. It supports this concept through a modal characterisation, congruence results for a standard process algebra with recursion, and a complete axiomatisation.
{"title":"Reactive bisimulation semantics for a process algebra with timeouts","authors":"Rob van Glabbeek","doi":"10.1007/s00236-022-00417-1","DOIUrl":"10.1007/s00236-022-00417-1","url":null,"abstract":"<div><p>This paper introduces the counterpart of strong bisimilarity for labelled transition systems extended with timeout transitions. It supports this concept through a modal characterisation, congruence results for a standard process algebra with recursion, and a complete axiomatisation.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-022-00417-1.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47949564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Programs are often subjected to significant optimizing and parallelizing transformations based on extensive dependence analysis. Formal validation of such transformations needs modelling paradigms which can capture both control and data dependences in the program vividly. Being value-based with an inherent scope of capturing parallelism, the untimed coloured Petri net (CPN) models, reported in the literature, fit the bill well; accordingly, they are likely to be more convenient as the intermediate representations (IRs) of both the source and the transformed codes for translation validation than strictly sequential variable-based IRs like sequential control flow graphs (CFGs). In this work, an efficient path-based equivalence checking method for CPN models of programs on integers is presented. Extensive experimentation has been carried out on several sequential and parallel examples. Complexity and correctness issues have been treated rigorously for the method.
{"title":"Translation validation of coloured Petri net models of programs on integers","authors":"Soumyadip Bandyopadhyay, Dipankar Sarkar, Chittaranjan Mandal, Holger Giese","doi":"10.1007/s00236-022-00419-z","DOIUrl":"10.1007/s00236-022-00419-z","url":null,"abstract":"<div><p>Programs are often subjected to significant optimizing and parallelizing transformations based on extensive dependence analysis. Formal validation of such transformations needs modelling paradigms which can capture both control and data dependences in the program vividly. Being value-based with an inherent scope of capturing parallelism, the untimed coloured Petri net (CPN) models, reported in the literature, fit the bill well; accordingly, they are likely to be more convenient as the intermediate representations (IRs) of both the source and the transformed codes for translation validation than strictly sequential variable-based IRs like sequential control flow graphs (CFGs). In this work, an <i>efficient</i> path-based equivalence checking method for CPN models of programs on integers is presented. Extensive experimentation has been carried out on several sequential and parallel examples. Complexity and correctness issues have been treated rigorously for the method.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-022-00419-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42594701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-03-30DOI: 10.1007/s00236-022-00420-6
Philip Bille, Inge Li Gørtz
Given a regular expression R and a string Q, the regular expression parsing problem is to determine if Q matches R and if so, determine how it matches, i.e., by a mapping of the characters of Q to the characters in R. Regular expression parsing makes finding matches of a regular expression even more useful by allowing us to directly extract subpatterns of the match, e.g., for extracting IP-addresses from internet traffic analysis or extracting subparts of genomes from genetic data bases. We present a new general techniques for efficiently converting a large class of algorithms that determine if a string Q matches regular expression R into algorithms that can construct a corresponding mapping. As a consequence, we obtain the first efficient linear space solutions for regular expression parsing.
{"title":"From regular expression matching to parsing","authors":"Philip Bille, Inge Li Gørtz","doi":"10.1007/s00236-022-00420-6","DOIUrl":"10.1007/s00236-022-00420-6","url":null,"abstract":"<div><p>Given a regular expression <i>R</i> and a string <i>Q</i>, the regular expression parsing problem is to determine if <i>Q</i> matches <i>R</i> and if so, determine how it matches, i.e., by a mapping of the characters of <i>Q</i> to the characters in <i>R</i>. Regular expression parsing makes finding matches of a regular expression even more useful by allowing us to directly extract subpatterns of the match, e.g., for extracting IP-addresses from internet traffic analysis or extracting subparts of genomes from genetic data bases. We present a new general techniques for efficiently converting a large class of algorithms that determine if a string <i>Q</i> matches regular expression <i>R</i> into algorithms that can construct a corresponding mapping. As a consequence, we obtain the first efficient linear space solutions for regular expression parsing.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44390261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}