Journal of the ACM (JACM)最新文献

筛选
英文 中文
Game Semantics for Interface Middleweight Java 中量级Java接口的游戏语义
Journal of the ACM (JACM) Pub Date : 2020-12-10 DOI: 10.1145/3428676
A. Murawski, N. Tzevelekos
{"title":"Game Semantics for Interface Middleweight Java","authors":"A. Murawski, N. Tzevelekos","doi":"10.1145/3428676","DOIUrl":"https://doi.org/10.1145/3428676","url":null,"abstract":"We consider an object calculus in which open terms interact with the environment through interfaces. The calculus is intended to capture the essence of contextual interactions of Middleweight Java code. Using game semantics, we provide fully abstract models for the induced notions of contextual approximation and equivalence. These are the first denotational models of this kind.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":"163 1","pages":"1 - 51"},"PeriodicalIF":0.0,"publicationDate":"2020-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76626794","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
String Diagram Rewrite Theory I: Rewriting with Frobenius Structure 弦图改写理论1:用Frobenius结构改写
Journal of the ACM (JACM) Pub Date : 2020-12-03 DOI: 10.1145/3502719
F. Bonchi, F. Gadducci, A. Kissinger, P. Sobocinski, F. Zanasi
{"title":"String Diagram Rewrite Theory I: Rewriting with Frobenius Structure","authors":"F. Bonchi, F. Gadducci, A. Kissinger, P. Sobocinski, F. Zanasi","doi":"10.1145/3502719","DOIUrl":"https://doi.org/10.1145/3502719","url":null,"abstract":"String diagrams are a powerful and intuitive graphical syntax, originating in theoretical physics and later formalised in the context of symmetric monoidal categories. In recent years, they have found application in the modelling of various computational structures, in fields as diverse as Computer Science, Physics, Control Theory, Linguistics, and Biology. In several of these proposals, transformations of systems are modelled as rewrite rules of diagrams. These developments require a mathematical foundation for string diagram rewriting: whereas rewrite theory for terms is well-understood, the two-dimensional nature of string diagrams poses quite a few additional challenges. This work systematises and expands a series of recent conference papers, laying down such a foundation. As a first step, we focus on the case of rewrite systems for string diagrammatic theories that feature a Frobenius algebra. This common structure provides a more permissive notion of composition than the usual one available in monoidal categories, and has found many applications in areas such as concurrency, quantum theory, and electrical circuits. Notably, this structure provides an exact correspondence between the syntactic notion of string diagrams modulo Frobenius structure and the combinatorial structure of hypergraphs. Our work introduces a combinatorial interpretation of string diagram rewriting modulo Frobenius structures in terms of double-pushout hypergraph rewriting. We prove this interpretation to be sound and complete and we also show that the approach can be generalised to rewriting modulo multiple Frobenius structures. As a proof of concept, we show how to derive from these results a termination strategy for Interacting Bialgebras, an important rewrite theory in the study of quantum circuits and signal flow graphs.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":"61 1","pages":"1 - 58"},"PeriodicalIF":0.0,"publicationDate":"2020-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73607232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 29
Enhanced Phase Clocks, Population Protocols, and Fast Space Optimal Leader Election 增强相位时钟,人口协议和快速空间最优领导者选举
Journal of the ACM (JACM) Pub Date : 2020-11-17 DOI: 10.1145/3424659
L. Gąsieniec, Grzegorz Stachowiak
{"title":"Enhanced Phase Clocks, Population Protocols, and Fast Space Optimal Leader Election","authors":"L. Gąsieniec, Grzegorz Stachowiak","doi":"10.1145/3424659","DOIUrl":"https://doi.org/10.1145/3424659","url":null,"abstract":"The model of population protocols refers to the growing in popularity theoretical framework suitable for studying pairwise interactions within a large collection of simple indistinguishable entities, frequently called agents. In this article, the emphasis is on the space complexity of fast leader election in population protocols governed by the random scheduler, which uniformly at random selects pairwise interactions between n agents. One of the main results of this article is the first fast space optimal leader election protocol, which works with high probability. The new protocol operates in parallel time O(log2 n) equivalent to O(nlog2 n) sequential pairwise interactions with each agent’s memory space limited to O(log log n) states. This double logarithmic space utilisation matches asymptotically the lower bound ½log log n on the number of states utilised by agents in any leader election algorithm with the running time o(npolylog n); see Reference [7]. Our new solution expands also on the classical concept of phase clocks used to synchronise and to coordinate computations in distributed algorithms. In particular, we formalise the concept and provide a rigorous analysis of phase clocks operating in nested modes. Our arguments are also valid for phase clocks propelled by multiple leaders. The combination of the two results in the first time-space efficient leader election algorithm. We also provide a complete formal argumentation, indicating that our solution is always correct, fast, and it works with high probability.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":"80 1","pages":"1 - 21"},"PeriodicalIF":0.0,"publicationDate":"2020-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83471134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A Constant-factor Approximation Algorithm for the Asymmetric Traveling Salesman Problem 非对称旅行商问题的常因子逼近算法
Journal of the ACM (JACM) Pub Date : 2020-11-03 DOI: 10.1145/3424306
O. Svensson, Jakub Tarnawski, László A. Végh
{"title":"A Constant-factor Approximation Algorithm for the Asymmetric Traveling Salesman Problem","authors":"O. Svensson, Jakub Tarnawski, László A. Végh","doi":"10.1145/3424306","DOIUrl":"https://doi.org/10.1145/3424306","url":null,"abstract":"We give a constant-factor approximation algorithm for the asymmetric traveling salesman problem (ATSP). Our approximation guarantee is analyzed with respect to the standard LP relaxation, and thus our result confirms the conjectured constant integrality gap of that relaxation. The main idea of our approach is a reduction to Subtour Partition Cover, an easier problem obtained by significantly relaxing the general connectivity requirements into local connectivity conditions. We first show that any algorithm for Subtour Partition Cover can be turned into an algorithm for ATSP while only losing a small constant factor in the performance guarantee. Next, we present a reduction from general ATSP instances to structured instances, on which we then solve Subtour Partition Cover, yielding our constant-factor approximation algorithm for ATSP.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":"3 1","pages":"1 - 53"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74861238","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
Invited Articles Foreword 特邀文章前言
Journal of the ACM (JACM) Pub Date : 2020-11-03 DOI: 10.1145/3429262
Éva Tardos
{"title":"Invited Articles Foreword","authors":"Éva Tardos","doi":"10.1145/3429262","DOIUrl":"https://doi.org/10.1145/3429262","url":null,"abstract":"The Invited Article section of this issue consists of three articles. The first is “Approximating Edit Distance within Constant Factor in Truly Sub-quadratic Time,” by Diptarka Chakraborty, Debarati Das, Elazar Goldenberg, Michael Koucky, and Michal Saks, which won the best paper award at the 59th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2018). We want to thank the FOCS’18 Program Committee for their help in selecting this invited article and editor Avi Wigderson for handling the article. The second is “A Constant-factor Approximation Algorithm for the Asymmetric Traveling Salesman Problem,” by Ola Svensson, Jakub Tarnawski, and László Végh, which won the best paper award at the 50th Annual ACM Symposium on the Theory of Computing (STOC’18). We want to thank the STOC’18 Program Committee for their help in selecting this invited article and editor Nikhil Bansal for handling the article. The third is “Polynomiality for Bin Packing with a Constant Number of Item Types.” by Michael X. Goemans and Thomas Rothvoss, which won the best paper award at the 2014 Annual ACM-SIAM Symposium on Discrete Algorithms (SODA’14). We want to thank the SODA’14 Program Committee for their help in selecting this invited article.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":"1 1","pages":"1 - 1"},"PeriodicalIF":0.0,"publicationDate":"2020-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89926069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semantic Optimization of Conjunctive Queries 连接查询的语义优化
Journal of the ACM (JACM) Pub Date : 2020-10-28 DOI: 10.1145/3424908
P. Barceló, Diego Figueira, G. Gottlob, Andreas Pieris
{"title":"Semantic Optimization of Conjunctive Queries","authors":"P. Barceló, Diego Figueira, G. Gottlob, Andreas Pieris","doi":"10.1145/3424908","DOIUrl":"https://doi.org/10.1145/3424908","url":null,"abstract":"This work deals with the problem of semantic optimization of the central class of conjunctive queries (CQs). Since CQ evaluation is NP-complete, a long line of research has focussed on identifying fragments of CQs that can be efficiently evaluated. One of the most general restrictions corresponds to generalized hypetreewidth bounded by a fixed constant k ≥ 1; the associated fragment is denoted GHWk. A CQ is semantically in GHWk if it is equivalent to a CQ in GHWk. The problem of checking whether a CQ is semantically in GHWk has been studied in the constraint-free case, and it has been shown to be NP-complete. However, in case the database is subject to constraints such as tuple-generating dependencies (TGDs) that can express, e.g., inclusion dependencies, or equality-generating dependencies (EGDs) that capture, e.g., key dependencies, a CQ may turn out to be semantically in GHWk under the constraints, while not being semantically in GHWk without the constraints. This opens avenues to new query optimization techniques. In this article, we initiate and develop the theory of semantic optimization of CQs under constraints. More precisely, we study the following natural problem: Given a CQ and a set of constraints, is the query semantically in GHWk, for a fixed k ≥ 1, under the constraints, or, in other words, is the query equivalent to one that belongs to GHWk over all those databases that satisfy the constraints? We show that, contrary to what one might expect, decidability of CQ containment is a necessary but not a sufficient condition for the decidability of the problem in question. In particular, we show that checking whether a CQ is semantically in GHW1 is undecidable in the presence of full TGDs (i.e., Datalog rules) or EGDs. In view of the above negative results, we focus on the main classes of TGDs for which CQ containment is decidable and that do not capture the class of full TGDs, i.e., guarded, non-recursive, and sticky sets of TGDs, and show that the problem in question is decidable, while its complexity coincides with the complexity of CQ containment. We also consider key dependencies over unary and binary relations, and we show that the problem in question is decidable in elementary time. Furthermore, we investigate whether being semantically in GHWk alleviates the cost of query evaluation. Finally, in case a CQ is not semantically in GHWk, we discuss how it can be approximated via a CQ that falls in GHWk in an optimal way. Such approximations might help finding “quick” answers to the input query when exact evaluation is intractable.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":"43 1","pages":"1 - 60"},"PeriodicalIF":0.0,"publicationDate":"2020-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83040169","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Invited Articles Foreword 特邀文章前言
Journal of the ACM (JACM) Pub Date : 2020-09-19 DOI: 10.1145/3418066
Éva Tardos
{"title":"Invited Articles Foreword","authors":"Éva Tardos","doi":"10.1145/3418066","DOIUrl":"https://doi.org/10.1145/3418066","url":null,"abstract":"","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":"1 1","pages":"1 - 1"},"PeriodicalIF":0.0,"publicationDate":"2020-09-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76014106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Universally Composable Security 普遍可组合安全性
Journal of the ACM (JACM) Pub Date : 2020-09-16 DOI: 10.1145/3402457
R. Canetti
{"title":"Universally Composable Security","authors":"R. Canetti","doi":"10.1145/3402457","DOIUrl":"https://doi.org/10.1145/3402457","url":null,"abstract":"This work presents a general framework for describing cryptographic protocols and analyzing their security. The framework allows specifying the security requirements of practically any cryptographic task in a unified and systematic way. Furthermore, in this framework the security of protocols is preserved under a general composition operation, called universal composition. The proposed framework with its security-preserving composition operation allows for modular design and analysis of complex cryptographic protocols from simpler building blocks. Moreover, within this framework, protocols are guaranteed to maintain their security in any context, even in the presence of an unbounded number of arbitrary protocol sessions that run concurrently in an adversarially controlled manner. This is a useful guarantee, which allows arguing about the security of cryptographic protocols in complex and unpredictable environments such as modern communication networks.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":"7 1","pages":"1 - 94"},"PeriodicalIF":0.0,"publicationDate":"2020-09-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"78965261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 62
Forcing and Calculi for Hybrid Logics 混合逻辑的强制与演算
Journal of the ACM (JACM) Pub Date : 2020-08-06 DOI: 10.1145/3400294
Daniel Găină
{"title":"Forcing and Calculi for Hybrid Logics","authors":"Daniel Găină","doi":"10.1145/3400294","DOIUrl":"https://doi.org/10.1145/3400294","url":null,"abstract":"The definition of institution formalizes the intuitive notion of logic in a category-based setting. Similarly, the concept of stratified institution provides an abstract approach to Kripke semantics. This includes hybrid logics, a type of modal logics expressive enough to allow references to the nodes/states/worlds of the models regarded as relational structures, or multi-graphs. Applications of hybrid logics involve many areas of research, such as computational linguistics, transition systems, knowledge representation, artificial intelligence, biomedical informatics, semantic networks, and ontologies. The present contribution sets a unified foundation for developing formal verification methodologies to reason about Kripke structures by defining proof calculi for a multitude of hybrid logics in the framework of stratified institutions. To prove completeness, the article introduces a forcing technique for stratified institutions with nominal and frame extraction and studies a forcing property based on syntactic consistency. The proof calculus is shown to be complete and the significance of the general results is exhibited on a couple of benchmark examples of hybrid logical systems.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":"27 1","pages":"1 - 55"},"PeriodicalIF":0.0,"publicationDate":"2020-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82079511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Simple and Approximately Optimal Mechanism for an Additive Buyer 一个简单的近似最优的增材购买者机制
Journal of the ACM (JACM) Pub Date : 2020-06-16 DOI: 10.1145/3398745
Moshe Babaioff, Nicole Immorlica, Brendan Lucier, S. Weinberg
{"title":"A Simple and Approximately Optimal Mechanism for an Additive Buyer","authors":"Moshe Babaioff, Nicole Immorlica, Brendan Lucier, S. Weinberg","doi":"10.1145/3398745","DOIUrl":"https://doi.org/10.1145/3398745","url":null,"abstract":"We consider a monopolist seller with n heterogeneous items, facing a single buyer. The buyer has a value for each item drawn independently according to (non-identical) distributions, and her value for a set of items is additive. The seller aims to maximize his revenue. We suggest using the a priori better of two simple pricing methods: selling the items separately, each at its optimal price, and bundling together, in which the entire set of items is sold as one bundle at its optimal price. We show that for any distribution, this mechanism achieves a constant-factor approximation to the optimal revenue. Beyond its simplicity, this is the first computationally tractable mechanism to obtain a constant-factor approximation for this multi-parameter problem. We additionally discuss extensions to multiple buyers and to valuations that are correlated across items.","PeriodicalId":17199,"journal":{"name":"Journal of the ACM (JACM)","volume":"10 1","pages":"1 - 40"},"PeriodicalIF":0.0,"publicationDate":"2020-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82433638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 220
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信