首页 > 最新文献

Acta Informatica最新文献

英文 中文
Operational complexity and pumping lemmas 操作复杂性和泵浦引理
IF 0.6 4区 计算机科学 Q3 Computer Science Pub Date : 2022-07-20 DOI: 10.1007/s00236-022-00431-3
Jürgen Dassow, Ismaël Jecker

The well-known pumping lemma for regular languages states that, for any regular language L, there is a constant p (depending on L) such that the following holds: If (win L) and (vert wvert ge p), then there are words (xin V^{*}), (yin V^+), and (zin V^{*}) such that (w=xyz) and (xy^tzin L) for (tge 0). The minimal pumping constant ({{{,mathrm{mpc},}}(L)}) of L is the minimal number p for which the conditions of the pumping lemma are satisfied. We investigate the behaviour of ({{{,mathrm{mpc},}}}) with respect to operations, i. e., for an n-ary regularity preserving operation (circ ), we study the set ({g_{circ }^{{{,mathrm{mpc},}}}(k_1,k_2,ldots ,k_n)}) of all numbers k such that there are regular languages (L_1,L_2,ldots ,L_n) with ({{{,mathrm{mpc},}}(L_i)=k_i}) for (1le ile n) and ({{{,mathrm{mpc},}}(circ (L_1,L_2,ldots ,L_n)=~k}). With respect to Kleene closure, complement, reversal, prefix and suffix-closure, circular shift, union, intersection, set-subtraction, symmetric difference,and concatenation, we determine ({g_{circ }^{{{,mathrm{mpc},}}}(k_1,k_2,ldots ,k_n)}) completely. Furthermore, we give some results with respect to the minimal pumping length where, in addition, (vert xyvert le p) has to hold.

众所周知的正则语言抽吸引理指出,对于任何正则语言L,都存在一个常数p(取决于L),使得以下条件成立:如果(win L)和(vert wvert ge p),则存在单词(xin V^{*})、(yin V^+)和(zin V^{*}),使得(tge 0)对应(w=xyz)和(xy^tzin L)。L的最小抽运常数({{{,mathrm{mpc},}}(L)})是满足抽运引理条件的最小数p。我们研究了({{{,mathrm{mpc},}}})在操作方面的行为,即,对于一个n元正则性保持操作(circ ),我们研究了所有数字k的集合({g_{circ }^{{{,mathrm{mpc},}}}(k_1,k_2,ldots ,k_n)}),使得(1le ile n)和({{{,mathrm{mpc},}}(circ (L_1,L_2,ldots ,L_n)=~k})都有正则语言(L_1,L_2,ldots ,L_n)和({{{,mathrm{mpc},}}(L_i)=k_i})。对于Kleene闭包、补包、反转、前缀和后缀闭包、圆移位、并并、交集、集减法、对称差分和连接,我们完全确定了({g_{circ }^{{{,mathrm{mpc},}}}(k_1,k_2,ldots ,k_n)})。此外,我们给出了一些关于最小泵浦长度的结果,此外,(vert xyvert le p)必须保持不变。
{"title":"Operational complexity and pumping lemmas","authors":"Jürgen Dassow,&nbsp;Ismaël Jecker","doi":"10.1007/s00236-022-00431-3","DOIUrl":"10.1007/s00236-022-00431-3","url":null,"abstract":"<div><p>The well-known pumping lemma for regular languages states that, for any regular language <i>L</i>, there is a constant <i>p</i> (depending on <i>L</i>) such that the following holds: If <span>(win L)</span> and <span>(vert wvert ge p)</span>, then there are words <span>(xin V^{*})</span>, <span>(yin V^+)</span>, and <span>(zin V^{*})</span> such that <span>(w=xyz)</span> and <span>(xy^tzin L)</span> for <span>(tge 0)</span>. The minimal pumping constant <span>({{{,mathrm{mpc},}}(L)})</span> of <i>L</i> is the minimal number <i>p</i> for which the conditions of the pumping lemma are satisfied. We investigate the behaviour of <span>({{{,mathrm{mpc},}}})</span> with respect to operations, i. e., for an <i>n</i>-ary regularity preserving operation <span>(circ )</span>, we study the set <span>({g_{circ }^{{{,mathrm{mpc},}}}(k_1,k_2,ldots ,k_n)})</span> of all numbers <i>k</i> such that there are regular languages <span>(L_1,L_2,ldots ,L_n)</span> with <span>({{{,mathrm{mpc},}}(L_i)=k_i})</span> for <span>(1le ile n)</span> and <span>({{{,mathrm{mpc},}}(circ (L_1,L_2,ldots ,L_n)=~k})</span>. With respect to Kleene closure, complement, reversal, prefix and suffix-closure, circular shift, union, intersection, set-subtraction, symmetric difference,and concatenation, we determine <span>({g_{circ }^{{{,mathrm{mpc},}}}(k_1,k_2,ldots ,k_n)})</span> completely. Furthermore, we give some results with respect to the minimal pumping length where, in addition, <span>(vert xyvert le p)</span> has to hold.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-07-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-022-00431-3.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43609320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Weighted throughput in a single machine preemptive scheduling with continuous controllable processing times 具有连续可控处理时间的单机抢占调度中的加权吞吐量
IF 0.6 4区 计算机科学 Q3 Computer Science Pub Date : 2022-07-19 DOI: 10.1007/s00236-022-00430-4
Asaf Levin, Tal Shusterman

We consider the problem of weighted throughput in the single machine preemptive scheduling with continuous controllable processing times. A set of tasks can be scheduled on a single machine. Each task j is associated with a nonnegative weight (w_{j}), a release date, a due date, and an interval of possible processing times. A task j can either be scheduled with a total processing time (p_j) which is in the given interval, or rejected (not participating in the schedule). The reward for processing j for (p_{j}) time units is (w_{j}p_{j}), and we are interested in constructing a feasible preemptive schedule such that the sum of rewards is maximized. We present a dynamic programming algorithm that solves the problem in pseudo-polynomial time and use it to obtain an FPTAS. Afterward, as our main contribution we propose an interesting efficient frontier approach for improved complexity bounds.

研究了处理时间连续可控的单机抢占调度中的加权吞吐量问题。可以在一台机器上调度一组任务。每个任务j都与一个非负权重(w_{j})、一个发布日期、一个到期日期和一个可能的处理时间间隔相关联。任务j可以使用给定间隔内的总处理时间(p_j)进行调度,也可以拒绝(不参与调度)。对于(p_{j})时间单位处理j的奖励是(w_{j}p_{j}),我们感兴趣的是构建一个可行的抢占式调度,使奖励总和最大化。提出了一种动态规划算法,该算法在伪多项式时间内解决了这一问题,并利用该算法得到了一个FPTAS。之后,作为我们的主要贡献,我们提出了一个有趣的有效的边界方法来改进复杂性边界。
{"title":"Weighted throughput in a single machine preemptive scheduling with continuous controllable processing times","authors":"Asaf Levin,&nbsp;Tal Shusterman","doi":"10.1007/s00236-022-00430-4","DOIUrl":"10.1007/s00236-022-00430-4","url":null,"abstract":"<div><p>We consider the problem of weighted throughput in the single machine preemptive scheduling with continuous controllable processing times. A set of tasks can be scheduled on a single machine. Each task <i>j</i> is associated with a nonnegative weight <span>(w_{j})</span>, a release date, a due date, and an interval of possible processing times. A task <i>j</i> can either be scheduled with a total processing time <span>(p_j)</span> which is in the given interval, or rejected (not participating in the schedule). The reward for processing <i>j</i> for <span>(p_{j})</span> time units is <span>(w_{j}p_{j})</span>, and we are interested in constructing a feasible preemptive schedule such that the sum of rewards is maximized. We present a dynamic programming algorithm that solves the problem in pseudo-polynomial time and use it to obtain an FPTAS. Afterward, as our main contribution we propose an interesting efficient frontier approach for improved complexity bounds.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44782247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Alternating complexity of counting first-order logic for the subword order 子字顺序的一阶逻辑计数的交替复杂性
IF 0.6 4区 计算机科学 Q3 Computer Science Pub Date : 2022-06-26 DOI: 10.1007/s00236-022-00424-2
Dietrich Kuske, Christian Schwarz

This paper considers the structure consisting of the set of all words over a given alphabet together with the subword relation, regular predicates, and constants for every word. We are interested in the counting extension of first-order logic by threshold counting quantifiers. The main result shows that the two-variable fragment of this logic can be decided in twofold exponential alternating time with linearly many alternations (and therefore in particular in twofold exponential space as announced in the conference version (Kuske and Schwarz, in: MFCS’20, Leibniz International Proceedings in Informatics (LIPIcs) vol. 170, pp 56:1–56:13. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020) of this paper) provided the regular predicates are restricted to piecewise testable ones. This result improves prior insights by Karandikar and Schnoebelen by extending the logic and saving one exponent in the space bound. Its proof consists of two main parts: First, we provide a quantifier elimination procedure that results in a formula with constants of bounded length (this generalises the procedure by Karandikar and Schnoebelen for first-order logic). From this, it follows that quantification in formulas can be restricted to words of bounded length, i.e., the second part of the proof is an adaptation of the method by Ferrante and Rackoff to counting logic and deviates significantly from the path of reasoning by Karandikar and Schnoebelen.

本文考虑了由给定字母表上所有单词的集合以及每个单词的子词关系、规则谓词和常量组成的结构。我们感兴趣的是通过阈值计数量词对一阶逻辑的计数扩展。主要结果表明,该逻辑的双变量片段可以在具有线性多变化的双指数交替时间中确定(因此特别是在会议版本中宣布的双指数空间中)(Kuske和Schwarz, in: MFCS ' 20, Leibniz International Proceedings in Informatics (LIPIcs) vol. 170, pp 56:1-56:13)。Schloss Dagstuhl - Leibniz-Zentrum fr Informatik, 2020)提供了正则谓词限制为分段可测试的谓词。这个结果改进了Karandikar和Schnoebelen先前的见解,扩展了逻辑并在空间界中节省了一个指数。它的证明由两个主要部分组成:首先,我们提供了一个量词消去过程,得到一个有界长度常数的公式(这推广了Karandikar和Schnoebelen在一阶逻辑中的过程)。由此可以得出,公式中的量化可以被限制在有界长度的词中,即证明的第二部分是Ferrante和Rackoff对计数逻辑方法的改编,明显偏离了Karandikar和Schnoebelen的推理路径。
{"title":"Alternating complexity of counting first-order logic for the subword order","authors":"Dietrich Kuske,&nbsp;Christian Schwarz","doi":"10.1007/s00236-022-00424-2","DOIUrl":"10.1007/s00236-022-00424-2","url":null,"abstract":"<div><p>This paper considers the structure consisting of the set of all words over a given alphabet together with the subword relation, regular predicates, and constants for every word. We are interested in the counting extension of first-order logic by threshold counting quantifiers. The main result shows that the two-variable fragment of this logic can be decided in twofold exponential alternating time with linearly many alternations (and therefore in particular in twofold exponential space as announced in the conference version (Kuske and Schwarz, in: MFCS’20, Leibniz International Proceedings in Informatics (LIPIcs) vol. 170, pp 56:1–56:13. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020) of this paper) provided the regular predicates are restricted to piecewise testable ones. This result improves prior insights by Karandikar and Schnoebelen by extending the logic and saving one exponent in the space bound. Its proof consists of two main parts: First, we provide a quantifier elimination procedure that results in a formula with constants of bounded length (this generalises the procedure by Karandikar and Schnoebelen for first-order logic). From this, it follows that quantification in formulas can be restricted to words of bounded length, i.e., the second part of the proof is an adaptation of the method by Ferrante and Rackoff to counting logic and deviates significantly from the path of reasoning by Karandikar and Schnoebelen.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-022-00424-2.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42991457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Lamplighter groups and automata 点灯组和自动机
IF 0.6 4区 计算机科学 Q3 Computer Science Pub Date : 2022-06-08 DOI: 10.1007/s00236-022-00423-3
Sanjay Jain, Birzhan Moldagaliyev, F. Stephan, Tien Dat Tran
{"title":"Lamplighter groups and automata","authors":"Sanjay Jain, Birzhan Moldagaliyev, F. Stephan, Tien Dat Tran","doi":"10.1007/s00236-022-00423-3","DOIUrl":"https://doi.org/10.1007/s00236-022-00423-3","url":null,"abstract":"","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52289547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Lamplighter groups and automata 点灯组和自动机
IF 0.6 4区 计算机科学 Q3 Computer Science Pub Date : 2022-06-08 DOI: 10.1007/s00236-022-00423-3
Sanjay Jain, Birzhan Moldagaliyev, Frank Stephan, Tien Dat Tran

This paper investigates presentations of lamplighter groups using computational models from automata theory. The present work shows that if G can be presented such that the full group operation is recognised by a transducer, then the same is true for the lamplighter group (G wr {{mathbb {Z}}}) of G. Furthermore, Cayley presentations, where only multiplications with constants are recognised by transducers, are used to study generalised lamplighter groups of the form (G wr {{mathbb {Z}}}^d) and (G wr F_d), where (F_d) is the free group over d generators. Additionally, ({{mathbb {Z}}}_k wr {{mathbb {Z}}}^2) and ({{mathbb {Z}}}_k wr {F_d}) are shown to be Cayley tree automatic.

本文利用自动机理论的计算模型研究了点灯组的表示。目前的工作表明,如果G可以被呈现,使得整个群操作被换能器识别,那么G的点灯群(G wr {{mathbb {Z}}})也是如此。此外,Cayley表示,其中只有带有常数的乘法被换能器识别,用于研究形式为(G wr {{mathbb {Z}}}^d)和(G wr F_d)的广义点灯群,其中(F_d)是d个发生器上的自由群。此外,({{mathbb {Z}}}_k wr {{mathbb {Z}}}^2)和({{mathbb {Z}}}_k wr {F_d})显示为Cayley树自动。
{"title":"Lamplighter groups and automata","authors":"Sanjay Jain,&nbsp;Birzhan Moldagaliyev,&nbsp;Frank Stephan,&nbsp;Tien Dat Tran","doi":"10.1007/s00236-022-00423-3","DOIUrl":"10.1007/s00236-022-00423-3","url":null,"abstract":"<div><p>This paper investigates presentations of lamplighter groups using computational models from automata theory. The present work shows that if <i>G</i> can be presented such that the full group operation is recognised by a transducer, then the same is true for the lamplighter group <span>(G wr {{mathbb {Z}}})</span> of <i>G</i>. Furthermore, Cayley presentations, where only multiplications with constants are recognised by transducers, are used to study generalised lamplighter groups of the form <span>(G wr {{mathbb {Z}}}^d)</span> and <span>(G wr F_d)</span>, where <span>(F_d)</span> is the free group over <i>d</i> generators. Additionally, <span>({{mathbb {Z}}}_k wr {{mathbb {Z}}}^2)</span> and <span>({{mathbb {Z}}}_k wr {F_d})</span> are shown to be Cayley tree automatic.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50014521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Depth-first search in directed planar graphs, revisited 有向平面图中的深度优先搜索,重访
IF 0.6 4区 计算机科学 Q3 Computer Science Pub Date : 2022-06-04 DOI: 10.1007/s00236-022-00425-1
Eric Allender, Archit Chauhan, Samir Datta

We present an algorithm for constructing a depth-first search tree in planar digraphs; the algorithm can be implemented in the complexity class (text{ AC}^1(text{ UL }cap text{ co-UL})), which is contained in (text{ AC}^2). Prior to this (for more than a quarter-century), the fastest uniform deterministic parallel algorithm for this problem had a runtime of (O(log ^{10}n)) (corresponding to the complexity class (text{ AC}^{10}subseteq text{ NC}^{11})). We also consider the problem of computing depth-first search trees in other classes of graphs and obtain additional new upper bounds.

提出了一种构造平面有向图中深度优先搜索树的算法;该算法可以在复杂度类(text{ AC}^1(text{ UL }cap text{ co-UL}))中实现,该复杂度类包含在(text{ AC}^2)中。在此之前(超过四分之一个世纪),这个问题最快的统一确定性并行算法的运行时为(O(log ^{10}n))(对应于复杂度类(text{ AC}^{10}subseteq text{ NC}^{11}))。我们还考虑了在其他类型的图中计算深度优先搜索树的问题,并获得了新的上界。
{"title":"Depth-first search in directed planar graphs, revisited","authors":"Eric Allender,&nbsp;Archit Chauhan,&nbsp;Samir Datta","doi":"10.1007/s00236-022-00425-1","DOIUrl":"10.1007/s00236-022-00425-1","url":null,"abstract":"<div><p>We present an algorithm for constructing a depth-first search tree in planar digraphs; the algorithm can be implemented in the complexity class <span>(text{ AC}^1(text{ UL }cap text{ co-UL}))</span>, which is contained in <span>(text{ AC}^2)</span>. Prior to this (for more than a quarter-century), the fastest uniform deterministic parallel algorithm for this problem had a runtime of <span>(O(log ^{10}n))</span> (corresponding to the complexity class <span>(text{ AC}^{10}subseteq text{ NC}^{11})</span>). We also consider the problem of computing depth-first search trees in other classes of graphs and obtain additional new upper bounds.\u0000</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45032441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secret-shared RAM indefinite private and secure RAM execution of perfectly unrevealed programs 秘密共享RAM完全未公开程序的无限私人和安全RAM执行
IF 0.6 4区 计算机科学 Q3 Computer Science Pub Date : 2022-04-20 DOI: 10.1007/s00236-022-00422-4
Shlomi Dolev, Yin Li

Secure and private computations over random access machine (RAM) are preferred over computations with circuits or Turing machines. Secure RAM executions become more and more important in the scope of avoiding information leakage when executing programs over a single computer, as well as the clouds. In this paper, we proposed a novel scheme for evaluating RAM programs without revealing any information on the computation, including the program, the data, and the result. We use Shamir Secret Sharing to share all the program instructions and the private string matching technique to ensure the execution of the right instruction sequence. We stress that our scheme obtains information-theoretical security and does not rely on any computational hardness assumptions.

随机存取机(RAM)上的安全和私有计算优于电路或图灵机的计算。在单台计算机和云上执行程序时,为了避免信息泄漏,安全RAM执行变得越来越重要。在本文中,我们提出了一种新的方案来评估RAM程序,而不透露任何有关计算的信息,包括程序,数据和结果。我们使用Shamir秘密共享来共享所有的程序指令,并使用私有字符串匹配技术来确保正确的指令序列的执行。我们强调,我们的方案获得信息理论上的安全性,不依赖于任何计算硬度假设。
{"title":"Secret-shared RAM indefinite private and secure RAM execution of perfectly unrevealed programs","authors":"Shlomi Dolev,&nbsp;Yin Li","doi":"10.1007/s00236-022-00422-4","DOIUrl":"10.1007/s00236-022-00422-4","url":null,"abstract":"<div><p>Secure and private computations over random access machine (RAM) are preferred over computations with circuits or Turing machines. Secure RAM executions become more and more important in the scope of avoiding information leakage when executing programs over a single computer, as well as the clouds. In this paper, we proposed a novel scheme for evaluating RAM programs without revealing any information on the computation, including the program, the data, and the result. We use Shamir Secret Sharing to share all the program instructions and the private string matching technique to ensure the execution of the right instruction sequence. We stress that our scheme obtains information-theoretical security and does not rely on any computational hardness assumptions.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-022-00422-4.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46502702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reactive bisimulation semantics for a process algebra with timeouts 带有超时的进程代数的响应式双模拟语义
IF 0.6 4区 计算机科学 Q3 Computer Science Pub Date : 2022-04-08 DOI: 10.1007/s00236-022-00417-1
Rob van Glabbeek

This paper introduces the counterpart of strong bisimilarity for labelled transition systems extended with timeout transitions. It supports this concept through a modal characterisation, congruence results for a standard process algebra with recursion, and a complete axiomatisation.

本文介绍了带超时过渡扩展的标记过渡系统的强双相似对应。它通过模态刻画、递归过程代数的同余结果和完全公理化来支持这一概念。
{"title":"Reactive bisimulation semantics for a process algebra with timeouts","authors":"Rob van Glabbeek","doi":"10.1007/s00236-022-00417-1","DOIUrl":"10.1007/s00236-022-00417-1","url":null,"abstract":"<div><p>This paper introduces the counterpart of strong bisimilarity for labelled transition systems extended with timeout transitions. It supports this concept through a modal characterisation, congruence results for a standard process algebra with recursion, and a complete axiomatisation.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-022-00417-1.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47949564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Translation validation of coloured Petri net models of programs on integers 整数上程序的彩色Petri网模型的翻译验证
IF 0.6 4区 计算机科学 Q3 Computer Science Pub Date : 2022-04-06 DOI: 10.1007/s00236-022-00419-z
Soumyadip Bandyopadhyay, Dipankar Sarkar, Chittaranjan Mandal, Holger Giese

Programs are often subjected to significant optimizing and parallelizing transformations based on extensive dependence analysis. Formal validation of such transformations needs modelling paradigms which can capture both control and data dependences in the program vividly. Being value-based with an inherent scope of capturing parallelism, the untimed coloured Petri net (CPN) models, reported in the literature, fit the bill well; accordingly, they are likely to be more convenient as the intermediate representations (IRs) of both the source and the transformed codes for translation validation than strictly sequential variable-based IRs like sequential control flow graphs (CFGs). In this work, an efficient path-based equivalence checking method for CPN models of programs on integers is presented. Extensive experimentation has been carried out on several sequential and parallel examples. Complexity and correctness issues have been treated rigorously for the method.

基于广泛的依赖性分析,程序经常需要进行重要的优化和并行化转换。这种转换的形式化验证需要建模范例,它可以生动地捕获程序中的控制和数据依赖关系。文献中报道的非定时彩色Petri网(CPN)模型是基于捕获并行性的固有范围的值,很好地符合要求;因此,作为源代码和转换后的代码的中间表示(ir),它们可能比严格顺序的基于变量的ir(如顺序控制流图(cfg))更方便用于翻译验证。本文提出了一种有效的基于路径的整数规划CPN模型等价性检验方法。在几个顺序和并行的例子上进行了大量的实验。该方法严格处理了复杂性和正确性问题。
{"title":"Translation validation of coloured Petri net models of programs on integers","authors":"Soumyadip Bandyopadhyay,&nbsp;Dipankar Sarkar,&nbsp;Chittaranjan Mandal,&nbsp;Holger Giese","doi":"10.1007/s00236-022-00419-z","DOIUrl":"10.1007/s00236-022-00419-z","url":null,"abstract":"<div><p>Programs are often subjected to significant optimizing and parallelizing transformations based on extensive dependence analysis. Formal validation of such transformations needs modelling paradigms which can capture both control and data dependences in the program vividly. Being value-based with an inherent scope of capturing parallelism, the untimed coloured Petri net (CPN) models, reported in the literature, fit the bill well; accordingly, they are likely to be more convenient as the intermediate representations (IRs) of both the source and the transformed codes for translation validation than strictly sequential variable-based IRs like sequential control flow graphs (CFGs). In this work, an <i>efficient</i> path-based equivalence checking method for CPN models of programs on integers is presented. Extensive experimentation has been carried out on several sequential and parallel examples. Complexity and correctness issues have been treated rigorously for the method.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-022-00419-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42594701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From regular expression matching to parsing 从正则表达式匹配到解析
IF 0.6 4区 计算机科学 Q3 Computer Science Pub Date : 2022-03-30 DOI: 10.1007/s00236-022-00420-6
Philip Bille, Inge Li Gørtz

Given a regular expression R and a string Q, the regular expression parsing problem is to determine if Q matches R and if so, determine how it matches, i.e., by a mapping of the characters of Q to the characters in R. Regular expression parsing makes finding matches of a regular expression even more useful by allowing us to directly extract subpatterns of the match, e.g., for extracting IP-addresses from internet traffic analysis or extracting subparts of genomes from genetic data bases. We present a new general techniques for efficiently converting a large class of algorithms that determine if a string Q matches regular expression R into algorithms that can construct a corresponding mapping. As a consequence, we obtain the first efficient linear space solutions for regular expression parsing.

给定正则表达式R和一个字符串Q,正则表达式解析问题是确定如果Q R和匹配如果是,确定如何匹配,也就是说,一个映射的字符问的字符在R .正则表达式解析找到匹配的正则表达式更有用让我们直接提取的子模式匹配,例如,从互联网流量中提取ip地址的分析或提取部分基因组的基因数据基地。我们提出了一种新的通用技术,用于有效地将一大类确定字符串Q是否与正则表达式R匹配的算法转换为可以构造相应映射的算法。因此,我们获得了正则表达式解析的第一个有效的线性空间解。
{"title":"From regular expression matching to parsing","authors":"Philip Bille,&nbsp;Inge Li Gørtz","doi":"10.1007/s00236-022-00420-6","DOIUrl":"10.1007/s00236-022-00420-6","url":null,"abstract":"<div><p>Given a regular expression <i>R</i> and a string <i>Q</i>, the regular expression parsing problem is to determine if <i>Q</i> matches <i>R</i> and if so, determine how it matches, i.e., by a mapping of the characters of <i>Q</i> to the characters in <i>R</i>. Regular expression parsing makes finding matches of a regular expression even more useful by allowing us to directly extract subpatterns of the match, e.g., for extracting IP-addresses from internet traffic analysis or extracting subparts of genomes from genetic data bases. We present a new general techniques for efficiently converting a large class of algorithms that determine if a string <i>Q</i> matches regular expression <i>R</i> into algorithms that can construct a corresponding mapping. As a consequence, we obtain the first efficient linear space solutions for regular expression parsing.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44390261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
Acta Informatica
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1