信息与控制最新文献

筛选
英文 中文
Cumulative subject index volumes 68–71 累计主题索引卷68-71
信息与控制 Pub Date : 1986-12-01 DOI: 10.1016/S0019-9958(86)80014-6
{"title":"Cumulative subject index volumes 68–71","authors":"","doi":"10.1016/S0019-9958(86)80014-6","DOIUrl":"https://doi.org/10.1016/S0019-9958(86)80014-6","url":null,"abstract":"","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1986-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80014-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137329302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Simulation of large networks on smaller networks 在小型网络上模拟大型网络
信息与控制 Pub Date : 1986-12-01 DOI: 10.1016/S0019-9958(86)80008-0
H.L. Bodlaender , J. van Leeuwen
{"title":"Simulation of large networks on smaller networks","authors":"H.L. Bodlaender ,&nbsp;J. van Leeuwen","doi":"10.1016/S0019-9958(86)80008-0","DOIUrl":"https://doi.org/10.1016/S0019-9958(86)80008-0","url":null,"abstract":"<div><p>Parallel algorithms are normally designed for execution on networks of <em>N</em> processors, with <em>N</em> depending on the size of the problem to be solved. In practice there will be a varying problem size but a fixed network size. In Fishburn and Finkel (<em>IEEE Trans. Comput.</em> <strong>31</strong> (1982), 288–295), the notion of network emulation was proposed, to obtain a structure preserving simulation of large networks on smaller networks. We present a detailed analysis of the possible emulations for some important classes of networks, namely: the shuffle-exchange network, the cube network, the ring network, and the 2-dimensional grid. We also study the possibility of cross-emulations, and characterize the networks that can be emulated at all on a given network using some class of emulation functions.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1986-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80008-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91746807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On relativized exponential and probabilistic complexity classes 关于相对指数和概率复杂度类
信息与控制 Pub Date : 1986-12-01 DOI: 10.1016/S0019-9958(86)80012-2
Hans Heller
{"title":"On relativized exponential and probabilistic complexity classes","authors":"Hans Heller","doi":"10.1016/S0019-9958(86)80012-2","DOIUrl":"10.1016/S0019-9958(86)80012-2","url":null,"abstract":"<div><p>An oracle <em>X</em> is constructed such that the exponential complexity class <em>Δ</em><sup>EP,<em>X</em></sup><sub>2</sub> equals the probabilistic class R(R(<em>X</em>)). This shows that it will be difficult to prove that <em>Δ</em><sup>EP</sup><sub>2</sub> is different from R(R), although it seems very unlikely that these two classes are equal. The result subsumes several known results about relativized computations:</p><ul><li><span>(i)</span><span><p>the existence of relativized polynomial hierarchies extending two levels (Long, T., 1978, Dissertation, Purdue Univ., Lafayette, Ind.; Heller, H., 1984(a), <em>SIAM J. Comput.</em> <strong>13</strong>, 717–725; Heller, H., 1984(b), <em>Math. Systems Theory</em> <strong>17</strong>, 71–84);</p></span></li><li><span>(ii)</span><span><p>the existence of an oracle <em>X</em> such that BPP(<em>X</em>) ⊄ <em>Δ<sup>P,X</sup></em><sub>2</sub> (Stockmeyer, L., 1983, “Proc. 15th STOC” pp. 118–126),</p></span></li><li><span>(iii)</span><span><p>the existence of an oracle <em>X</em> such that NP(<em>X</em>) is polynomially Turing reducible to a sparse set (Wilson, C., 1983, “Proc. 24th FOCS,”, pp. 329–334; Immerman, N., and Mahaney, S., 1983, “Conference on Computational Complexity Theory,” Santa Barbara, March 21–25).</p></span></li></ul><p>The result shows possible inclusion relations for nonrelativized complexity classes and points out that certain results about probabilistic complexity classes and about polynomial size circuits cannot be improved unless methods are applied which do not relativize.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1986-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80012-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89604663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 79
Author index for volume 71 第71卷作者索引
信息与控制 Pub Date : 1986-12-01 DOI: 10.1016/S0019-9958(86)80013-4
{"title":"Author index for volume 71","authors":"","doi":"10.1016/S0019-9958(86)80013-4","DOIUrl":"https://doi.org/10.1016/S0019-9958(86)80013-4","url":null,"abstract":"","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1986-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80013-4","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"137329301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Function definitions in term rewriting and applicative programming 术语重写和应用程序设计中的函数定义
信息与控制 Pub Date : 1986-12-01 DOI: 10.1016/S0019-9958(86)80010-9
Chilukuri K. Mohan, Mandayam K. Srivas
{"title":"Function definitions in term rewriting and applicative programming","authors":"Chilukuri K. Mohan,&nbsp;Mandayam K. Srivas","doi":"10.1016/S0019-9958(86)80010-9","DOIUrl":"https://doi.org/10.1016/S0019-9958(86)80010-9","url":null,"abstract":"<div><p>The frameworks of unconditional and conditional Term Rewriting and Applicative systems are explored with the objective of using them for defining functions. In particular, a new operational semantics, <em>Tue-Reduction</em>, is elaborated for conditional term rewriting systems. For each framework, the concept of <em>evaluation</em> of terms invoking defined functions is formalized. We then discuss how it may be ensured that a function definition in each of these frameworks is meaningful, by defining restrictions that may be imposed to guarantee <em>termination, unambiguity</em>, and <em>completeness</em> of definition. The three frameworks are then compared, studying when a definition may be translated from one formalism to another.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1986-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80010-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91746806","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A note on succinct representations of graphs 关于图的简洁表示的注释
信息与控制 Pub Date : 1986-12-01 DOI: 10.1016/S0019-9958(86)80009-2
Christos H. Papadimitriou, Mihalis Yannakakis
{"title":"A note on succinct representations of graphs","authors":"Christos H. Papadimitriou,&nbsp;Mihalis Yannakakis","doi":"10.1016/S0019-9958(86)80009-2","DOIUrl":"https://doi.org/10.1016/S0019-9958(86)80009-2","url":null,"abstract":"<div><p>Galperin and Wigderson (<em>Inform. and Control</em> <strong>56</strong> (1983), 183–198) showed that certain trivial graph properties become NP-complete when the graph is represented in a particular exponentially succinct way. We show that under the same representation, graph properties that are ordinarily NP-complete become complete for non-deterministic exponential time.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1986-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80009-2","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91708762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 186
Systolic trellis automata: Stability, decidability and complexity 收缩网格自动机:稳定性、可决定性和复杂性
信息与控制 Pub Date : 1986-12-01 DOI: 10.1016/S0019-9958(86)80011-0
K. Culik II, J. Gruska, A. Salomaa
{"title":"Systolic trellis automata: Stability, decidability and complexity","authors":"K. Culik II,&nbsp;J. Gruska,&nbsp;A. Salomaa","doi":"10.1016/S0019-9958(86)80011-0","DOIUrl":"10.1016/S0019-9958(86)80011-0","url":null,"abstract":"<div><p>Systolic trellis automata are models of hexagonally connected and triangularly shaped systolic arrays. This paper studies the problems of stability, decidability, and complexity for them. The original definition of systolic trellis automata requires that an input string is fed to a specific row of processors. Here it is shown that given a homogeneous trellis automaton we can construct an equivalent one (stable or superstable) which allows to feed the input string to any sufficiently long row of processors. Moreover, some closure and decidability results for trellis automata are established and the computational complexity of languages accepted by trellis automata is investigated.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1986-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80011-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76946741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Retraction map categories and their applications to the construction of lambda calculus models 缩回图类别及其在构造λ演算模型中的应用
信息与控制 Pub Date : 1986-10-01 DOI: 10.1016/S0019-9958(86)80017-1
Hirofumi Yokouchi
{"title":"Retraction map categories and their applications to the construction of lambda calculus models","authors":"Hirofumi Yokouchi","doi":"10.1016/S0019-9958(86)80017-1","DOIUrl":"10.1016/S0019-9958(86)80017-1","url":null,"abstract":"<div><p>This paper deals with categorical models of the λ-calculus. We generalize the inverse limit method Scott used for his construction of <em>D</em><sub>∞</sub>, and introduce order-enriched ccc's, retraction map categories and ɛ-categories. An order-enriched ccc is a cartesian closed category <strong>C</strong> equipped with a partial order relation ⩽ on the set of the arrows. A retraction map category of <strong>C</strong> is <strong>R</strong>=(<strong>R</strong>, ⩽, <em>i</em>, <em>j</em>), where ⩽ is a partial order relation on the set |<strong>C</strong>| of all the objects of <strong>C</strong>, <strong>R</strong> is the category of the poset (|<strong>C</strong>|, ⩽), and <em>i</em> and <em>j</em> are functors from <strong>R</strong> to <strong>C</strong> and from <strong>R</strong><sup>op</sup> to <strong>C</strong> that satisfy the conditions: (1) <em>j a</em>, <em>b</em> ∘ <em>i a</em>, <em>b</em> ⩾ id<em><sub>a</sub></em> and (2) <em>i a</em>, <em>b</em> ∘ <em>j a</em>, <em>b</em> ⩽ id<em><sub>b</sub></em> for every arrow <em>a</em>, <em>b</em>: <em>a</em> → <em>b</em> in <strong>R</strong> (i.e., <em>a</em>⩽<em>b</em>). The ɛ-category <strong>E</strong>=<strong>E</strong>(<strong>C</strong>, <strong>R</strong>) of <strong>C</strong> w.r.t. <strong>R</strong> is the category whose objects are ideals of (|<strong>C</strong>|, ⩽) and whose arrows are ideals of (<strong>C</strong>, ⊑), where ⩽ is the partial order relation in <strong>R</strong> and ⊑ is the partial order relation defined by <em>f</em> ⊑ <em>g</em> iff dom(<em>f</em>)⩽dom(<em>g</em>), cod(<em>f</em>)⩽cod(<em>g</em>) in <strong>R</strong> and <em>f</em>⩽<em>j a</em>, <em>b</em> ∘ <em>g</em> ∘ <em>i</em>(<em>a</em>, <em>b</em> in <strong>C</strong>. We show that every ɛ-category <strong>E</strong>=<strong>E</strong>(<strong>C</strong>, <strong>R</strong>) is also an order-enriched ccc. Moreover when <strong>E</strong> and <strong>R</strong> satisfy a particular condition, <strong>E</strong>(<strong>C</strong>, <strong>R</strong>) has a reflexive object. For example, if there is an ideal <em>U</em> of (|<strong>C</strong>|, ⩽) satisfying the following conditions, then <em>U</em> is isomorphic to <em>U<sup>U</sup></em> in <strong>E</strong> and a λ-algebra is constructed from <strong>E</strong> and <em>U</em>: (1) for every pair of <em>a</em>, <em>b</em> ∈ <em>U</em>, <em>U</em> contains <em>b<sup>a</sup></em>, and (2) for every <em>c</em> ∈ <em>U</em>, there are <em>a</em>, <em>b</em> ∈ <em>U</em> such that <em>c</em> ∈ <em>b<sup>a</sup></em>. We reconstruct <em>P</em><sub>ω</sub> and <em>D</em><sub>∞</sub> using ɛ-categories.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1986-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80017-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85597596","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the power of two-way random generators and the impossibility of deterministic poly-space simulation 关于双向随机发生器的功率和确定性多空间仿真的不可能性
信息与控制 Pub Date : 1986-10-01 DOI: 10.1016/S0019-9958(86)80020-1
Marek Karpinski, Rutger Verbeek
{"title":"On the power of two-way random generators and the impossibility of deterministic poly-space simulation","authors":"Marek Karpinski,&nbsp;Rutger Verbeek","doi":"10.1016/S0019-9958(86)80020-1","DOIUrl":"10.1016/S0019-9958(86)80020-1","url":null,"abstract":"<div><p>Borodin, Cook, and Pippenger (<em>Inform. and Control</em> <strong>58</strong> (1983), 96–114) proved that both probabilistic acceptors and transducers working in space <em>S</em>(<em>n</em>) ⩾ log <em>n</em> can be simulated by deterministic machines in <em>O</em>(<em>S</em>(<em>n</em>)<sup>2</sup>) space. The definition of probabilistic computations uses one-way read-only random tape. Borodin <em>et al.</em> asked: “Is it possible to extend our simulation results to the case of a two-way read-only oracle head?” In the same vein Furst, Lipton, and Stockmeyer (<em>Inform. and Control</em> <strong>64</strong> (1985), 43–51) suggested that it could be a difference between two-way and one-way random tape: “…for space bounded probabilistic computations where the space bound is much less than the length of <em>y</em>, it could matter.” (<em>y</em> denoting the random tape inscription.) In this paper we give a full characterization of two-way random space classes that answers both questions. Karpinski and Verbeek (“There is <em>no</em> Polynomial Deterministic Space Simulation of Probabilistic Space with Two-way Random-Tape Generator,” <em>Inform. and Control</em> <strong>67</strong> (1985), 158–162) proved that there is <em>no</em> polynomial deterministic space simulation of two-way random space without giving any recursive upper bound. The results of this paper solved the open questions of <span>Karpinski and Verbeek, 1985</span>, <span>Karpinski and Verbeek, 1985</span> and gave full characterization in sense of upper and lower deterministic space classes: they are proved precisely exponentially more powerful than the corresponding one-way classes.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1986-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80020-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72374302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An automata-theoretical characterization of the OI-hierarchy oi层次结构的自动机理论表征
信息与控制 Pub Date : 1986-10-01 DOI: 10.1016/S0019-9958(86)80016-X
Werner Damm, Andreas Goerdt
{"title":"An automata-theoretical characterization of the OI-hierarchy","authors":"Werner Damm,&nbsp;Andreas Goerdt","doi":"10.1016/S0019-9958(86)80016-X","DOIUrl":"10.1016/S0019-9958(86)80016-X","url":null,"abstract":"<div><p>This paper gives an automata-theoretical characterization of the OI-hierarchy (<span>Damm (1982)</span>, <span>Engelfriet and Schmidt (1977)</span>, <span>Wand (1975)</span>). This hierarchy is generated by so-called level-<em>n</em> grammars which are natural generalizations from context free and macro grammars in that their nonterminals are treated as functionals of higher type, i.e., they are allowed to carry up to <em>n</em> levels of parameters. The automata model used for this characterization is the <em>n</em>-iterated pushdown automaton. Its characteristic feature is the storage structure which consists of a nesting of pushdowns up to nesting depth <em>n</em>. The equivalence proof is given constructively, its method is illustrated using examples. By viewing level-<em>n</em> grammars as modeling recursive procedures on higher types the iterated pushdown automation thus provides an operational model for the run-time behavior of procedures defined by recursion on higher types which makes the results of this paper interesting not only from a language theoretical point of view.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1986-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80016-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79193237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 71
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信