信息与控制Pub Date : 1986-12-01DOI: 10.1016/S0019-9958(86)80008-0
H.L. Bodlaender , J. van Leeuwen
{"title":"Simulation of large networks on smaller networks","authors":"H.L. Bodlaender , J. van Leeuwen","doi":"10.1016/S0019-9958(86)80008-0","DOIUrl":"https://doi.org/10.1016/S0019-9958(86)80008-0","url":null,"abstract":"<div><p>Parallel algorithms are normally designed for execution on networks of <em>N</em> processors, with <em>N</em> depending on the size of the problem to be solved. In practice there will be a varying problem size but a fixed network size. In Fishburn and Finkel (<em>IEEE Trans. Comput.</em> <strong>31</strong> (1982), 288–295), the notion of network emulation was proposed, to obtain a structure preserving simulation of large networks on smaller networks. We present a detailed analysis of the possible emulations for some important classes of networks, namely: the shuffle-exchange network, the cube network, the ring network, and the 2-dimensional grid. We also study the possibility of cross-emulations, and characterize the networks that can be emulated at all on a given network using some class of emulation functions.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"71 3","pages":"Pages 143-180"},"PeriodicalIF":0.0,"publicationDate":"1986-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80008-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91746807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
信息与控制Pub Date : 1986-12-01DOI: 10.1016/S0019-9958(86)80012-2
Hans Heller
{"title":"On relativized exponential and probabilistic complexity classes","authors":"Hans Heller","doi":"10.1016/S0019-9958(86)80012-2","DOIUrl":"10.1016/S0019-9958(86)80012-2","url":null,"abstract":"<div><p>An oracle <em>X</em> is constructed such that the exponential complexity class <em>Δ</em><sup>EP,<em>X</em></sup><sub>2</sub> equals the probabilistic class R(R(<em>X</em>)). This shows that it will be difficult to prove that <em>Δ</em><sup>EP</sup><sub>2</sub> is different from R(R), although it seems very unlikely that these two classes are equal. The result subsumes several known results about relativized computations:</p><ul><li><span>(i)</span><span><p>the existence of relativized polynomial hierarchies extending two levels (Long, T., 1978, Dissertation, Purdue Univ., Lafayette, Ind.; Heller, H., 1984(a), <em>SIAM J. Comput.</em> <strong>13</strong>, 717–725; Heller, H., 1984(b), <em>Math. Systems Theory</em> <strong>17</strong>, 71–84);</p></span></li><li><span>(ii)</span><span><p>the existence of an oracle <em>X</em> such that BPP(<em>X</em>) ⊄ <em>Δ<sup>P,X</sup></em><sub>2</sub> (Stockmeyer, L., 1983, “Proc. 15th STOC” pp. 118–126),</p></span></li><li><span>(iii)</span><span><p>the existence of an oracle <em>X</em> such that NP(<em>X</em>) is polynomially Turing reducible to a sparse set (Wilson, C., 1983, “Proc. 24th FOCS,”, pp. 329–334; Immerman, N., and Mahaney, S., 1983, “Conference on Computational Complexity Theory,” Santa Barbara, March 21–25).</p></span></li></ul><p>The result shows possible inclusion relations for nonrelativized complexity classes and points out that certain results about probabilistic complexity classes and about polynomial size circuits cannot be improved unless methods are applied which do not relativize.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"71 3","pages":"Pages 231-243"},"PeriodicalIF":0.0,"publicationDate":"1986-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80012-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89604663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
信息与控制Pub Date : 1986-12-01DOI: 10.1016/S0019-9958(86)80013-4
{"title":"Author index for volume 71","authors":"","doi":"10.1016/S0019-9958(86)80013-4","DOIUrl":"https://doi.org/10.1016/S0019-9958(86)80013-4","url":null,"abstract":"","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"71 3","pages":"Page 244"},"PeriodicalIF":0.0,"publicationDate":"1986-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80013-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137329301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
信息与控制Pub Date : 1986-12-01DOI: 10.1016/S0019-9958(86)80010-9
Chilukuri K. Mohan, Mandayam K. Srivas
{"title":"Function definitions in term rewriting and applicative programming","authors":"Chilukuri K. Mohan, Mandayam K. Srivas","doi":"10.1016/S0019-9958(86)80010-9","DOIUrl":"https://doi.org/10.1016/S0019-9958(86)80010-9","url":null,"abstract":"<div><p>The frameworks of unconditional and conditional Term Rewriting and Applicative systems are explored with the objective of using them for defining functions. In particular, a new operational semantics, <em>Tue-Reduction</em>, is elaborated for conditional term rewriting systems. For each framework, the concept of <em>evaluation</em> of terms invoking defined functions is formalized. We then discuss how it may be ensured that a function definition in each of these frameworks is meaningful, by defining restrictions that may be imposed to guarantee <em>termination, unambiguity</em>, and <em>completeness</em> of definition. The three frameworks are then compared, studying when a definition may be translated from one formalism to another.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"71 3","pages":"Pages 186-217"},"PeriodicalIF":0.0,"publicationDate":"1986-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80010-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91746806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
信息与控制Pub Date : 1986-12-01DOI: 10.1016/S0019-9958(86)80009-2
Christos H. Papadimitriou, Mihalis Yannakakis
{"title":"A note on succinct representations of graphs","authors":"Christos H. Papadimitriou, Mihalis Yannakakis","doi":"10.1016/S0019-9958(86)80009-2","DOIUrl":"https://doi.org/10.1016/S0019-9958(86)80009-2","url":null,"abstract":"<div><p>Galperin and Wigderson (<em>Inform. and Control</em> <strong>56</strong> (1983), 183–198) showed that certain trivial graph properties become NP-complete when the graph is represented in a particular exponentially succinct way. We show that under the same representation, graph properties that are ordinarily NP-complete become complete for non-deterministic exponential time.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"71 3","pages":"Pages 181-185"},"PeriodicalIF":0.0,"publicationDate":"1986-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80009-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91708762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
信息与控制Pub Date : 1986-12-01DOI: 10.1016/S0019-9958(86)80011-0
K. Culik II, J. Gruska, A. Salomaa
{"title":"Systolic trellis automata: Stability, decidability and complexity","authors":"K. Culik II, J. Gruska, A. Salomaa","doi":"10.1016/S0019-9958(86)80011-0","DOIUrl":"10.1016/S0019-9958(86)80011-0","url":null,"abstract":"<div><p>Systolic trellis automata are models of hexagonally connected and triangularly shaped systolic arrays. This paper studies the problems of stability, decidability, and complexity for them. The original definition of systolic trellis automata requires that an input string is fed to a specific row of processors. Here it is shown that given a homogeneous trellis automaton we can construct an equivalent one (stable or superstable) which allows to feed the input string to any sufficiently long row of processors. Moreover, some closure and decidability results for trellis automata are established and the computational complexity of languages accepted by trellis automata is investigated.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"71 3","pages":"Pages 218-230"},"PeriodicalIF":0.0,"publicationDate":"1986-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80011-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76946741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
信息与控制Pub Date : 1986-10-01DOI: 10.1016/S0019-9958(86)80017-1
Hirofumi Yokouchi
{"title":"Retraction map categories and their applications to the construction of lambda calculus models","authors":"Hirofumi Yokouchi","doi":"10.1016/S0019-9958(86)80017-1","DOIUrl":"10.1016/S0019-9958(86)80017-1","url":null,"abstract":"<div><p>This paper deals with categorical models of the λ-calculus. We generalize the inverse limit method Scott used for his construction of <em>D</em><sub>∞</sub>, and introduce order-enriched ccc's, retraction map categories and ɛ-categories. An order-enriched ccc is a cartesian closed category <strong>C</strong> equipped with a partial order relation ⩽ on the set of the arrows. A retraction map category of <strong>C</strong> is <strong>R</strong>=(<strong>R</strong>, ⩽, <em>i</em>, <em>j</em>), where ⩽ is a partial order relation on the set |<strong>C</strong>| of all the objects of <strong>C</strong>, <strong>R</strong> is the category of the poset (|<strong>C</strong>|, ⩽), and <em>i</em> and <em>j</em> are functors from <strong>R</strong> to <strong>C</strong> and from <strong>R</strong><sup>op</sup> to <strong>C</strong> that satisfy the conditions: (1) <em>j a</em>, <em>b</em> ∘ <em>i a</em>, <em>b</em> ⩾ id<em><sub>a</sub></em> and (2) <em>i a</em>, <em>b</em> ∘ <em>j a</em>, <em>b</em> ⩽ id<em><sub>b</sub></em> for every arrow <em>a</em>, <em>b</em>: <em>a</em> → <em>b</em> in <strong>R</strong> (i.e., <em>a</em>⩽<em>b</em>). The ɛ-category <strong>E</strong>=<strong>E</strong>(<strong>C</strong>, <strong>R</strong>) of <strong>C</strong> w.r.t. <strong>R</strong> is the category whose objects are ideals of (|<strong>C</strong>|, ⩽) and whose arrows are ideals of (<strong>C</strong>, ⊑), where ⩽ is the partial order relation in <strong>R</strong> and ⊑ is the partial order relation defined by <em>f</em> ⊑ <em>g</em> iff dom(<em>f</em>)⩽dom(<em>g</em>), cod(<em>f</em>)⩽cod(<em>g</em>) in <strong>R</strong> and <em>f</em>⩽<em>j a</em>, <em>b</em> ∘ <em>g</em> ∘ <em>i</em>(<em>a</em>, <em>b</em> in <strong>C</strong>. We show that every ɛ-category <strong>E</strong>=<strong>E</strong>(<strong>C</strong>, <strong>R</strong>) is also an order-enriched ccc. Moreover when <strong>E</strong> and <strong>R</strong> satisfy a particular condition, <strong>E</strong>(<strong>C</strong>, <strong>R</strong>) has a reflexive object. For example, if there is an ideal <em>U</em> of (|<strong>C</strong>|, ⩽) satisfying the following conditions, then <em>U</em> is isomorphic to <em>U<sup>U</sup></em> in <strong>E</strong> and a λ-algebra is constructed from <strong>E</strong> and <em>U</em>: (1) for every pair of <em>a</em>, <em>b</em> ∈ <em>U</em>, <em>U</em> contains <em>b<sup>a</sup></em>, and (2) for every <em>c</em> ∈ <em>U</em>, there are <em>a</em>, <em>b</em> ∈ <em>U</em> such that <em>c</em> ∈ <em>b<sup>a</sup></em>. We reconstruct <em>P</em><sub>ω</sub> and <em>D</em><sub>∞</sub> using ɛ-categories.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"71 1","pages":"Pages 33-86"},"PeriodicalIF":0.0,"publicationDate":"1986-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80017-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85597596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
信息与控制Pub Date : 1986-10-01DOI: 10.1016/S0019-9958(86)80020-1
Marek Karpinski, Rutger Verbeek
{"title":"On the power of two-way random generators and the impossibility of deterministic poly-space simulation","authors":"Marek Karpinski, Rutger Verbeek","doi":"10.1016/S0019-9958(86)80020-1","DOIUrl":"10.1016/S0019-9958(86)80020-1","url":null,"abstract":"<div><p>Borodin, Cook, and Pippenger (<em>Inform. and Control</em> <strong>58</strong> (1983), 96–114) proved that both probabilistic acceptors and transducers working in space <em>S</em>(<em>n</em>) ⩾ log <em>n</em> can be simulated by deterministic machines in <em>O</em>(<em>S</em>(<em>n</em>)<sup>2</sup>) space. The definition of probabilistic computations uses one-way read-only random tape. Borodin <em>et al.</em> asked: “Is it possible to extend our simulation results to the case of a two-way read-only oracle head?” In the same vein Furst, Lipton, and Stockmeyer (<em>Inform. and Control</em> <strong>64</strong> (1985), 43–51) suggested that it could be a difference between two-way and one-way random tape: “…for space bounded probabilistic computations where the space bound is much less than the length of <em>y</em>, it could matter.” (<em>y</em> denoting the random tape inscription.) In this paper we give a full characterization of two-way random space classes that answers both questions. Karpinski and Verbeek (“There is <em>no</em> Polynomial Deterministic Space Simulation of Probabilistic Space with Two-way Random-Tape Generator,” <em>Inform. and Control</em> <strong>67</strong> (1985), 158–162) proved that there is <em>no</em> polynomial deterministic space simulation of two-way random space without giving any recursive upper bound. The results of this paper solved the open questions of <span>Karpinski and Verbeek, 1985</span>, <span>Karpinski and Verbeek, 1985</span> and gave full characterization in sense of upper and lower deterministic space classes: they are proved precisely exponentially more powerful than the corresponding one-way classes.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"71 1","pages":"Pages 131-142"},"PeriodicalIF":0.0,"publicationDate":"1986-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80020-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72374302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
信息与控制Pub Date : 1986-10-01DOI: 10.1016/S0019-9958(86)80016-X
Werner Damm, Andreas Goerdt
{"title":"An automata-theoretical characterization of the OI-hierarchy","authors":"Werner Damm, Andreas Goerdt","doi":"10.1016/S0019-9958(86)80016-X","DOIUrl":"10.1016/S0019-9958(86)80016-X","url":null,"abstract":"<div><p>This paper gives an automata-theoretical characterization of the OI-hierarchy (<span>Damm (1982)</span>, <span>Engelfriet and Schmidt (1977)</span>, <span>Wand (1975)</span>). This hierarchy is generated by so-called level-<em>n</em> grammars which are natural generalizations from context free and macro grammars in that their nonterminals are treated as functionals of higher type, i.e., they are allowed to carry up to <em>n</em> levels of parameters. The automata model used for this characterization is the <em>n</em>-iterated pushdown automaton. Its characteristic feature is the storage structure which consists of a nesting of pushdowns up to nesting depth <em>n</em>. The equivalence proof is given constructively, its method is illustrated using examples. By viewing level-<em>n</em> grammars as modeling recursive procedures on higher types the iterated pushdown automation thus provides an operational model for the run-time behavior of procedures defined by recursion on higher types which makes the results of this paper interesting not only from a language theoretical point of view.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":"71 1","pages":"Pages 1-32"},"PeriodicalIF":0.0,"publicationDate":"1986-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80016-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79193237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}