信息与控制Pub Date : 1986-07-01DOI: 10.1016/S0019-9958(86)80022-5
Paolo Atzeni, Nicola M. Morfuni
{"title":"Functional dependencies and constraints on null values in database relations","authors":"Paolo Atzeni, Nicola M. Morfuni","doi":"10.1016/S0019-9958(86)80022-5","DOIUrl":"10.1016/S0019-9958(86)80022-5","url":null,"abstract":"<div><p>Database relations with incomplete information are considered. The no-information interpretation of null values is adopted, due to its characteristics of generality and naturalness. Coherently with the framework and its motivation, two meaningful classes of integrity constraints are studied: (a) functional dependencies, which have been widely investigated in the classical relational theory and (b) constraints on null values, which control the presence of nulls in the relations. Specifically, three types of constraints on null values are taken into account (nullfree subschemes, existence constraints, disjunctive existence constraints), and the interaction of each of them with functional dependencies is studied. In each of the three cases, the inference problem is solved, the complexity of the algorithms for its solution analyzed, and the existence of a complete axiomatization discussed.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1986-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80022-5","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87820193","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
信息与控制Pub Date : 1986-07-01DOI: 10.1016/S0019-9958(86)80025-0
Daniel N. Osherson, Michael Stob, Scott Weinstein
{"title":"Aggregating inductive expertise","authors":"Daniel N. Osherson, Michael Stob, Scott Weinstein","doi":"10.1016/S0019-9958(86)80025-0","DOIUrl":"10.1016/S0019-9958(86)80025-0","url":null,"abstract":"<div><p>The aggregation problem is to design an inferential agent that makes intelligent use of the theories offered by a team of inductive inference machines working in a common environment. The present paper formulates several versions of the aggregation problem and investigates them from a recursion theoretic point of view.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1986-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80025-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87699462","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
信息与控制Pub Date : 1986-07-01DOI: 10.1016/S0019-9958(86)80023-7
Richard Cole , Uzi Vishkin
{"title":"Deterministic coin tossing with applications to optimal parallel list ranking","authors":"Richard Cole , Uzi Vishkin","doi":"10.1016/S0019-9958(86)80023-7","DOIUrl":"10.1016/S0019-9958(86)80023-7","url":null,"abstract":"<div><p>The following problem is considered: given a linked list of length <em>n</em>, compute the distance from each element of the linked list to the end of the list. The problem has two standard deterministic algorithms: a linear time serial algorithm, and an <em>O</em>(log <em>n</em>) time parallel algorithm using <em>n</em> processors. We present new deterministic parallel algorithms for the problem. Our strongest results are (1) <em>O</em>(log <em>n</em> log* <em>n</em>) time using <em>n</em>/(log <em>n</em> log* <em>n</em>) processors (this algorithm achieves optimal speed-up); (2) <em>O</em>(log <em>n</em>) time using <em>n</em> log<sup>(<em>k</em>)</sup><em>n</em>/log <em>n</em> processors, for any fixed positive integer <em>k</em>. The algorithms apply a novel “random-like” deterministic technique. This technique provides for a fast and efficient breaking of an apparently symmetric situation in parallel and distributed computation.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1986-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80023-7","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73500317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
信息与控制Pub Date : 1986-04-01DOI: 10.1016/S0019-9958(86)80048-1
Joel I. Seiferas
{"title":"A simplified lower bound for context-free-language recognition","authors":"Joel I. Seiferas","doi":"10.1016/S0019-9958(86)80048-1","DOIUrl":"10.1016/S0019-9958(86)80048-1","url":null,"abstract":"<div><p>For on-line recognition of the words in an arbitrary linear context-free language, there are known tight bounds on the time required by a deterministic multitape Turing machine. In terms of word length <em>n</em>, the time need never be worse than some constant times <em>n</em><sup>2</sup>, even if only one worktape is available; and there is a linear context-free language that requires at least time proportional to <em>n</em><sup>2</sup>/log <em>n</em>, no matter how many worktapes are available. Using Kolmogorov's notion of descriptional complexity as a tool, we present a simple proof of the latter result.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1986-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80048-1","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91330784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
信息与控制Pub Date : 1986-04-01DOI: 10.1016/S0019-9958(86)80049-3
{"title":"Author index for volume 69","authors":"","doi":"10.1016/S0019-9958(86)80049-3","DOIUrl":"https://doi.org/10.1016/S0019-9958(86)80049-3","url":null,"abstract":"","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1986-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80049-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92049874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
信息与控制Pub Date : 1986-04-01DOI: 10.1016/S0019-9958(86)80045-6
Grzegorz Rozenberg, Emo Welzl
{"title":"Boundary NLC graph grammars—Basic definitions, normal forms, and complexity","authors":"Grzegorz Rozenberg, Emo Welzl","doi":"10.1016/S0019-9958(86)80045-6","DOIUrl":"10.1016/S0019-9958(86)80045-6","url":null,"abstract":"<div><p><em>Node label controlled</em> (NLC) <em>grammars</em> are graph grammars (operating on node labeled undirected graphs) which rewrite single nodes only and establish connections between the embedded graph and the neighbors of the rewritten node on the basis of the labels of the involved nodes only. They define (possibly infinite) languages of undirected node labeled graphs (or, if we just omit the labels, languages of unlabeled graphs). Here we consider a restriction of NLC grammars, so-called <em>boundary</em> NLC (BNLC) <em>grammars</em>, distinguished by the property that whenever in a graph already generated two nodes may be rewritten, then these nodes are not adjacent. The graph languages generated by this type of grammars are called BNLC <em>languages</em>. Although we show that this restriction leads to a smaller class of languages, still enough generative power remains to define interesting graph languages. For example, trees, complete bipartite graphs, maximal outerplanar graphs, <em>k</em>-trees, graphs of bandwidth ⩽<em>k</em>, graphs of cyclic bandwidth ⩽<em>k</em>, graphs of binary tree bandwidth ⩽<em>k</em>, graphs of cutwidth ⩽<em>k</em> (always for a fixed positive integer <em>k</em>) turn out all to be BNLC languages. We prove a number of normal forms for BNLC grammars and then we indicate their usefulness by various applications. In particular, we show that for connected graphs of bounded degree the membership problem for BNLC languages is solvable in deterministic polynomial time.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1986-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80045-6","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83614792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
信息与控制Pub Date : 1986-04-01DOI: 10.1016/S0019-9958(86)80041-9
Steve Homer , John Reif
{"title":"Arithmetic theories for computational complexity problems","authors":"Steve Homer , John Reif","doi":"10.1016/S0019-9958(86)80041-9","DOIUrl":"10.1016/S0019-9958(86)80041-9","url":null,"abstract":"<div><p>This paper considers a number of arithmetic theories and shows how the strength of these theories relates to certain open problems in complexity theory concerning the polynomial-time hierarchy. These results are proved quite generally and hold for a wide class of subrecursive hierarchies. They can be used to characterize certain properties of functions provable in these theories.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1986-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80041-9","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87650595","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
信息与控制Pub Date : 1986-04-01DOI: 10.1016/S0019-9958(86)80042-0
Robert P. Daley, Carl H. Smith
{"title":"On the complexity of inductive inference","authors":"Robert P. Daley, Carl H. Smith","doi":"10.1016/S0019-9958(86)80042-0","DOIUrl":"10.1016/S0019-9958(86)80042-0","url":null,"abstract":"<div><p>The notion of the complexity of performing an inductive inference is defined. Some examples of the tradeoffs between the complexity of performing an inference and the accuracy of the inferred result are presented. An axiomatization of the notion of the complexity of inductive inference is developed and several results are presented which both resemble and contrast with results obtainable for the axiomatic computational complexity of recursive functions.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1986-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80042-0","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74141191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
信息与控制Pub Date : 1986-04-01DOI: 10.1016/S0019-9958(86)80047-X
P.-L. Curien
{"title":"Categorical combinators","authors":"P.-L. Curien","doi":"10.1016/S0019-9958(86)80047-X","DOIUrl":"10.1016/S0019-9958(86)80047-X","url":null,"abstract":"<div><p>Our main aim is to present the connection between <em>λ</em>-calculus and Cartesian closed categories both in an untyped and purely syntactic setting. More specifically we establish a syntactic equivalence theorem between what we call categorical combinatory logic and <em>λ</em>-calculus with explicit products and projections, with <em>β</em> and <em>η</em>-rules as well as with surjective pairing. “Combinatory logic” is of course inspired by Curry's combinatory logic, based on the well-known <em>S</em>, <em>K</em>, <em>I</em>. Our combinatory logic is “categorical” because its combinators and rules are obtained by extracting untyped information from Cartesian closed categories (looking at arrows only, thus forgetting about objects). Compiling <em>λ</em>-calculus into these combinators happens to be natural and provokes only <em>n</em> log <em>n</em> code expansion. Moreover categorical combinatory logic is entirely faithful to <em>β</em>-reduction where combinatory logic needs additional rather complex and unnatural axioms to be. The connection easily extends to the corresponding typed calculi, where typed categorical combinatory logic is a free Cartesian closed category where the notion of terminal object is replaced by the explicit manipulation of applying (a function to its argument) and coupling (arguments to build datas in products). Our syntactic equivalences induce equivalences at the model level. The paper is intended as a mathematical foundation for developing implementations of functional programming languages based on a “categorical abstract machine,” as developed in a companion paper (<span>Cousineau, Curien, and Mauny, <em>in</em> “Proceedings, ACM Conf. on Functional Programming Languages and Computer Architecture,” Nancy, 1985</span>).</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1986-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80047-X","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73755667","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
信息与控制Pub Date : 1986-04-01DOI: 10.1016/S0019-9958(86)80046-8
Mikhail J. Atallah, Susanne E. Hambrusch
{"title":"Solving tree problems on a mesh-connected processor array","authors":"Mikhail J. Atallah, Susanne E. Hambrusch","doi":"10.1016/S0019-9958(86)80046-8","DOIUrl":"https://doi.org/10.1016/S0019-9958(86)80046-8","url":null,"abstract":"<div><p>In this paper we present techniques that result in <span><math><mrow><mi>O</mi><mo>(</mo><msqrt><mi>n</mi></msqrt><mo>)</mo></mrow></math></span> time algorithms for computing many properties and functions of an <em>n</em>-node forest stored in an <span><math><mrow><msqrt><mi>n</mi></msqrt><mo>×</mo><msqrt><mi>n</mi></msqrt></mrow></math></span> mesh of processors. Our algorithms include computing simple properties like the depth, the height, the number of descendents, the preorder (resp. postorder, inorder) number of every node, and a solution to the more complex problem of computing the Minimax value of a game tree. Our algorithms are asymptotically optimal since any nontrivial computation will require <span><math><mrow><mi>Ω</mi><mo>(</mo><msqrt><mi>n</mi></msqrt><mo>)</mo></mrow></math></span> time on the mesh. All of our algorithms generalize to higher dimensional meshes.</p></div>","PeriodicalId":38164,"journal":{"name":"信息与控制","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"1986-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1016/S0019-9958(86)80046-8","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92050864","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}