{"title":"Computable soft separation axioms","authors":"S. M. Elsayed, Keng Meng Ng","doi":"10.1017/s0960129523000336","DOIUrl":"https://doi.org/10.1017/s0960129523000336","url":null,"abstract":"Abstract Soft sets were introduced as a means to study objects that are not defined in an absolute way and have found applications in numerous areas of mathematics, decision theory, and in statistical applications. Soft topological spaces were first considered in Shabir and Naz ((2011). Computers & Mathematics with Applications 61 (7) 1786–1799) and soft separation axioms for soft topological spaces were studied in El-Shafei et al. ((2018). Filomat 32 (13) 4755–4771), El-Shafei and Al-Shami ((2020). Computational and Applied Mathematics 39 (3) 1–17), Al-shami ((2021). Mathematical Problems in Engineering 2021 ). In this paper, we introduce the effective versions of soft separation axioms. Specifically, we focus our attention on computable u-soft and computable p-soft separation axioms and investigate various relations between them. We also compare the effective and classical versions of these soft separation axioms.","PeriodicalId":49855,"journal":{"name":"Mathematical Structures in Computer Science","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135969273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Constrained read-once refutations in UTVPI constraint systems: A parallel perspective","authors":"K. Subramani, Piotr Wojciechowski","doi":"10.1017/s0960129523000300","DOIUrl":"https://doi.org/10.1017/s0960129523000300","url":null,"abstract":"Abstract In this paper, we analyze two types of refutations for Unit Two Variable Per Inequality (UTVPI) constraints. A UTVPI constraint is a linear inequality of the form: $a_{i}cdot x_{i}+a_{j} cdot x_{j} le b_{k}$ , where $a_{i},a_{j}in {0,1,-1}$ and $b_{k} in mathbb{Z}$ . A conjunction of such constraints is called a UTVPI constraint system (UCS) and can be represented in matrix form as: ${bf A cdot x le b}$ . UTVPI constraints are used in many domains including operations research and program verification. We focus on two variants of read-once refutation (ROR). An ROR is a refutation in which each constraint is used at most once. A literal-once refutation (LOR), a more restrictive form of ROR, is a refutation in which each literal ( $x_i$ or $-x_i$ ) is used at most once. First, we examine the constraint-required read-once refutation (CROR) problem and the constraint-required literal-once refutation (CLOR) problem. In both of these problems, we are given a set of constraints that must be used in the refutation. RORs and LORs are incomplete since not every system of linear constraints is guaranteed to have such a refutation. This is still true even when we restrict ourselves to UCSs. In this paper, we provide NC reductions between the CROR and CLOR problems in UCSs and the minimum weight perfect matching problem. The reductions used in this paper assume a CREW PRAM model of parallel computation. As a result, the reductions establish that, from the perspective of parallel algorithms, the CROR and CLOR problems in UCSs are equivalent to matching. In particular, if an NC algorithm exists for either of these problems, then there is an NC algorithm for matching.","PeriodicalId":49855,"journal":{"name":"Mathematical Structures in Computer Science","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135981574","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Special issue on homotopy type theory 2019 vol. 2","authors":"Dan Licata, Peter LeFanu Lumsdaine","doi":"10.1017/s0960129523000221","DOIUrl":"https://doi.org/10.1017/s0960129523000221","url":null,"abstract":"","PeriodicalId":49855,"journal":{"name":"Mathematical Structures in Computer Science","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135254529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preface to the special issue on metric and differential semantics","authors":"U. Dal Lago, Francesco Gavazzo, Paolo Pistone","doi":"10.1017/s0960129523000270","DOIUrl":"https://doi.org/10.1017/s0960129523000270","url":null,"abstract":"","PeriodicalId":49855,"journal":{"name":"Mathematical Structures in Computer Science","volume":"1 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"57258874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Not every countable complete distributive lattice is sober","authors":"Hualin Miao, Xiaoyong Xi, Qingguo Li, Dongsheng Zhao","doi":"10.1017/s0960129523000269","DOIUrl":"https://doi.org/10.1017/s0960129523000269","url":null,"abstract":"\u0000 The study of the sobriety of Scott spaces has got a relatively long history in domain theory. Lawson and Hoffmann independently proved that the Scott space of every continuous directed complete poset (usually called domain) is sober. Johnstone constructed the first directed complete poset whose Scott space is non-sober. Soon after, Isbell gave a complete lattice with a non-sober Scott space. Based on Isbell’s example, Xu, Xi, and Zhao showed that there is even a complete Heyting algebra whose Scott space is non-sober. Achim Jung then asked whether every countable complete lattice has a sober Scott space. The main aim of this paper is to answer Jung’s problem by constructing a countable complete lattice whose Scott space is non-sober. This lattice is then modified to obtain a countable distributive complete lattice with a non-sober Scott space. In addition, we prove that the topology of the product space \u0000 \u0000 \u0000 \u0000$Sigma Ptimes Sigma Q$\u0000\u0000 \u0000 coincides with the Scott topology of the product poset \u0000 \u0000 \u0000 \u0000$Ptimes Q$\u0000\u0000 \u0000 if the set Id(P) and Id(Q) of all incremental ideals of posets P and Q are both countable. Based on this, it is deduced that a directed complete poset P has a sober Scott space, if Id(P) is countable and \u0000 \u0000 \u0000 \u0000$Sigma P$\u0000\u0000 \u0000 is coherent and well filtered. In particular, every complete lattice L with Id(L) countable has a sober Scott space.","PeriodicalId":49855,"journal":{"name":"Mathematical Structures in Computer Science","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47701224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scott topology on Smyth power posets","authors":"Xiaoquan Xu, Xinpeng Wen, Xiaoyong Xi","doi":"10.1017/s0960129523000257","DOIUrl":"https://doi.org/10.1017/s0960129523000257","url":null,"abstract":"\u0000\t <jats:p>For a <jats:inline-formula>\u0000\t <jats:alternatives>\u0000\t\t<jats:inline-graphic xmlns:xlink=\"http://www.w3.org/1999/xlink\" mime-subtype=\"png\" xlink:href=\"S0960129523000257_inline1.png\" />\u0000\t\t<jats:tex-math>\u0000$T_0$\u0000</jats:tex-math>\u0000\t </jats:alternatives>\u0000\t </jats:inline-formula> space <jats:italic>X</jats:italic>, let <jats:inline-formula>\u0000\t <jats:alternatives>\u0000\t\t<jats:inline-graphic xmlns:xlink=\"http://www.w3.org/1999/xlink\" mime-subtype=\"png\" xlink:href=\"S0960129523000257_inline2.png\" />\u0000\t\t<jats:tex-math>\u0000$mathsf{K}(X)$\u0000</jats:tex-math>\u0000\t </jats:alternatives>\u0000\t </jats:inline-formula> be the poset of all nonempty compact saturated subsets of <jats:italic>X</jats:italic> endowed with the Smyth order <jats:inline-formula>\u0000\t <jats:alternatives>\u0000\t\t<jats:inline-graphic xmlns:xlink=\"http://www.w3.org/1999/xlink\" mime-subtype=\"png\" xlink:href=\"S0960129523000257_inline3.png\" />\u0000\t\t<jats:tex-math>\u0000$sqsubseteq$\u0000</jats:tex-math>\u0000\t </jats:alternatives>\u0000\t </jats:inline-formula>. <jats:inline-formula>\u0000\t <jats:alternatives>\u0000\t\t<jats:inline-graphic xmlns:xlink=\"http://www.w3.org/1999/xlink\" mime-subtype=\"png\" xlink:href=\"S0960129523000257_inline4.png\" />\u0000\t\t<jats:tex-math>\u0000$(mathsf{K}(X), sqsubseteq)$\u0000</jats:tex-math>\u0000\t </jats:alternatives>\u0000\t </jats:inline-formula> (shortly <jats:inline-formula>\u0000\t <jats:alternatives>\u0000\t\t<jats:inline-graphic xmlns:xlink=\"http://www.w3.org/1999/xlink\" mime-subtype=\"png\" xlink:href=\"S0960129523000257_inline5.png\" />\u0000\t\t<jats:tex-math>\u0000$mathsf{K}(X)$\u0000</jats:tex-math>\u0000\t </jats:alternatives>\u0000\t </jats:inline-formula>) is called the Smyth power poset of <jats:italic>X</jats:italic>. In this paper, we mainly discuss some basic properties of the Scott topology on Smyth power posets. It is proved that for a well-filtered space <jats:italic>X</jats:italic>, its Smyth power poset <jats:inline-formula>\u0000\t <jats:alternatives>\u0000\t\t<jats:inline-graphic xmlns:xlink=\"http://www.w3.org/1999/xlink\" mime-subtype=\"png\" xlink:href=\"S0960129523000257_inline6.png\" />\u0000\t\t<jats:tex-math>\u0000$mathsf{K}(X)$\u0000</jats:tex-math>\u0000\t </jats:alternatives>\u0000\t </jats:inline-formula> with the Scott topology is still well-filtered, and a <jats:inline-formula>\u0000\t <jats:alternatives>\u0000\t\t<jats:inline-graphic xmlns:xlink=\"http://www.w3.org/1999/xlink\" mime-subtype=\"png\" xlink:href=\"S0960129523000257_inline7.png\" />\u0000\t\t<jats:tex-math>\u0000$T_0$\u0000</jats:tex-math>\u0000\t </jats:alternatives>\u0000\t </jats:inline-formula> space <jats:italic>Y</jats:italic> is well-filtered iff the Smyth power poset <jats:inline-formula>\u0000\t <jats:alternatives>\u0000\t\t<jats:inline-graphic xmlns:xlink=\"http://www.w3.org/1999/xlink\" mime-subtype=\"png\" xlink:href=\"S0960129523000257_inline8.png\" />\u0000\t\t<jats:tex-math>\u0000$mathsf{K}(Y)$\u0000</jats:tex-math>\u0000\t </jats:alternatives>\u0000\t </jats:inline-formula> with the Scott topology is well-filtered and the upper Vietoris topology is coarser than the Scott topology on <jats:inline-formula>\u0000\t ","PeriodicalId":49855,"journal":{"name":"Mathematical Structures in Computer Science","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-07-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47692020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
D. Annenkov, Paolo Capriotti, Nicolai Kraus, Christian Sattler
{"title":"Two-level type theory and applications - ERRATUM","authors":"D. Annenkov, Paolo Capriotti, Nicolai Kraus, Christian Sattler","doi":"10.1017/s096012952300021x","DOIUrl":"https://doi.org/10.1017/s096012952300021x","url":null,"abstract":"\u0000 We define and develop two-level type theory (2LTT), a version of Martin-Löf type theory which combines two different type theories. We refer to them as the ‘inner’ and the ‘outer’ type theory. In our case of interest, the inner theory is homotopy type theory (HoTT) which may include univalent universes and higher inductive types. The outer theory is a traditional form of type theory validating uniqueness of identity proofs (UIP). One point of view on it is as internalised meta-theory of the inner type theory. There are two motivations for 2LTT. Firstly, there are certain results about HoTT which are of meta-theoretic nature, such as the statement that semisimplicial types up to level n can be constructed in HoTT for any externally fixed natural number n. Such results cannot be expressed in HoTT itself, but they can be formalised and proved in 2LTT, where n will be a variable in the outer theory. This point of view is inspired by observations about conservativity of presheaf models. Secondly, 2LTT is a framework which is suitable for formulating additional axioms that one might want to add to HoTT. This idea is heavily inspired by Voevodsky’s Homotopy Type System (HTS), which constitutes one specific instance of a 2LTT. HTS has an axiom ensuring that the type of natural numbers behaves like the external natural numbers, which allows the construction of a universe of semisimplicial types. In 2LTT, this axiom can be assumed by postulating that the inner and outer natural numbers types are isomorphic. After defining 2LTT, we set up a collection of tools with the goal of making 2LTT a convenient language for future developments. As a first such application, we develop the theory of Reedy fibrant diagrams in the style of Shulman. Continuing this line of thought, we suggest a definition of \u0000 \u0000 \u0000 \u0000$(infty,1)$\u0000\u0000 \u0000 -category and give some examples.","PeriodicalId":49855,"journal":{"name":"Mathematical Structures in Computer Science","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-07-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43600185","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A (machine-oriented) logic based on pattern matching","authors":"Tim Lethen","doi":"10.1017/s0960129523000191","DOIUrl":"https://doi.org/10.1017/s0960129523000191","url":null,"abstract":"\u0000 Robinson’s unification algorithm can be identified as the underlying machinery of both C. Meredith’s rule D (condensed detachment) in propositional logic and of the construction of principal types in lambda calculus and combinatory logic. In combinatory logic, it also plays a crucial role in the construction of Meyer, Bunder & Powers’ Fool’s model. This paper now considers pattern matching, the unidirectional variant of unification, as a basis for logical inference, typing, and a very simple and natural model for untyped combinatory logic. An analysis of the new typing scheme will enable us to characterize a large class of terms of combinatory logic which do not change their principal type when being weakly reduced. We also consider the question whether the major or the minor premisse should be used as the fixed pattern.","PeriodicalId":49855,"journal":{"name":"Mathematical Structures in Computer Science","volume":" ","pages":""},"PeriodicalIF":0.5,"publicationDate":"2023-07-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42973210","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Robustness, Scott continuity, and computability","authors":"Amin Farjudian, Eugenio Moggi","doi":"10.1017/s0960129523000233","DOIUrl":"https://doi.org/10.1017/s0960129523000233","url":null,"abstract":"Abstract Robustness is a property of system analyses, namely monotonic maps from the complete lattice of subsets of a (system’s state) space to the two-point lattice. The definition of robustness requires the space to be a metric space. Robust analyses cannot discriminate between a subset of the metric space and its closure; therefore, one can restrict to the complete lattice of closed subsets. When the metric space is compact, the complete lattice of closed subsets ordered by reverse inclusion is $omega$ -continuous, and robust analyses are exactly the Scott-continuous maps. Thus, one can also ask whether a robust analysis is computable (with respect to a countable base). The main result of this paper establishes a relation between robustness and Scott continuity when the metric space is not compact. The key idea is to replace the metric space with a compact Hausdorff space, and relate robustness and Scott continuity by an adjunction between the complete lattice of closed subsets of the metric space and the $omega$ -continuous lattice of closed subsets of the compact Hausdorff space. We demonstrate the applicability of this result with several examples involving Banach spaces.","PeriodicalId":49855,"journal":{"name":"Mathematical Structures in Computer Science","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135046364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Up-to techniques for behavioural metrics via fibrations","authors":"Filippo Bonchi, Barbara König, Daniela Petrisan","doi":"10.1017/s0960129523000166","DOIUrl":"https://doi.org/10.1017/s0960129523000166","url":null,"abstract":"Abstract Up-to techniques are a well-known method for enhancing coinductive proofs of behavioural equivalences. We introduce up-to techniques for behavioural metrics between systems modelled as coalgebras, and we provide abstract results to prove their soundness in a compositional way. In order to obtain a general framework, we need a systematic way to lift functors: we show that the Wasserstein lifting of a functor, introduced in a previous work, corresponds to a change of base in a fibrational sense. This observation enables us to reuse existing results about soundness of up-to techniques in a fibrational setting. We focus on the fibrations of predicates and relations valued in a quantale. To illustrate our approach, we provide an example on distances between regular languages.","PeriodicalId":49855,"journal":{"name":"Mathematical Structures in Computer Science","volume":"235 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135945989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}