Information and Computation最新文献

筛选
英文 中文
Minimal session types for the π-calculus π微积分的最小会话类型
IF 1 4区 计算机科学
Information and Computation Pub Date : 2024-01-26 DOI: 10.1016/j.ic.2024.105148
Alen Arslanagić, Jorge A. Pérez, Anda-Amelia Palamariuc
{"title":"Minimal session types for the π-calculus","authors":"Alen Arslanagić,&nbsp;Jorge A. Pérez,&nbsp;Anda-Amelia Palamariuc","doi":"10.1016/j.ic.2024.105148","DOIUrl":"10.1016/j.ic.2024.105148","url":null,"abstract":"<div><p>Session types are a type-based approach to correct message-passing programs. A session type specifies a channel's protocol as <em>sequences</em> of exchanges. Aiming to uncover the essential notions of session-based concurrency, prior work defined <em>minimal</em> session types (MSTs), a formulation of session types without the sequentiality construct, and showed a <em>minimality result</em>: every process typable with standard session types can be transformed into a process typable using MSTs. Such a minimality result was proven for a higher-order session <em>π</em>-calculus, in which values are abstractions (functions from names to processes).</p><p>In this paper, we study MSTs but now for the session <em>π</em>-calculus, the (first-order) language in which values are names and for which session types have been more widely studied. We first show that a new minimality result can be obtained by composing known results. Then, we develop optimizations of this new minimality result and prove also a dynamic correctness guarantee.</p></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"297 ","pages":"Article 105148"},"PeriodicalIF":1.0,"publicationDate":"2024-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0890540124000130/pdfft?md5=dca6052b3b897a7e1a5f44fb0794f9e3&pid=1-s2.0-S0890540124000130-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139578405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Solving mean-payoff games via quasi dominions 通过准统治权解决均值报酬博弈
IF 1 4区 计算机科学
Information and Computation Pub Date : 2024-01-26 DOI: 10.1016/j.ic.2024.105151
Massimo Benerecetti , Daniele Dell'Erba , Fabio Mogavero
{"title":"Solving mean-payoff games via quasi dominions","authors":"Massimo Benerecetti ,&nbsp;Daniele Dell'Erba ,&nbsp;Fabio Mogavero","doi":"10.1016/j.ic.2024.105151","DOIUrl":"10.1016/j.ic.2024.105151","url":null,"abstract":"<div><p>We propose a novel algorithm for the solution of <em>mean-payoff games</em> that merges together two seemingly unrelated concepts introduced in the context of parity games, namely <em>small progress measures</em> and <em>quasi dominions</em>. We show that the integration of the two notions can be highly beneficial and significantly speeds up convergence to the problem solution. Experiments show that the resulting algorithm performs orders of magnitude better than the asymptotically-best solution algorithm currently known, without sacrificing on the worst-case complexity.</p></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"297 ","pages":"Article 105151"},"PeriodicalIF":1.0,"publicationDate":"2024-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0890540124000166/pdfft?md5=306a43f9ff3894332e824e402752e4b7&pid=1-s2.0-S0890540124000166-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139578549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constructions of several special classes of cubic bent functions outside the completed Maiorana-McFarland class 在完整的 Maiorana-McFarland 类之外构建几类特殊的立方弯曲函数
IF 1 4区 计算机科学
Information and Computation Pub Date : 2024-01-24 DOI: 10.1016/j.ic.2024.105149
Fengrong Zhang , Enes Pasalic , Amar Bapić , Baocang Wang
{"title":"Constructions of several special classes of cubic bent functions outside the completed Maiorana-McFarland class","authors":"Fengrong Zhang ,&nbsp;Enes Pasalic ,&nbsp;Amar Bapić ,&nbsp;Baocang Wang","doi":"10.1016/j.ic.2024.105149","DOIUrl":"10.1016/j.ic.2024.105149","url":null,"abstract":"<div><p>We show that the direct sum, under more relaxed conditions compared to those of Polujan and Pott (2020), can generate bent functions provably outside the completed Maiorana-McFarland class (<span><math><msup><mrow><mi>MM</mi></mrow><mrow><mi>#</mi></mrow></msup></math></span>). We also show that the indirect sum method of generating bent functions, by imposing certain conditions (which are completely absent if only the bentness of the resulting function is required) on the initial bent functions, can be employed in the design of bent functions outside <span><math><msup><mrow><mi>MM</mi></mrow><mrow><mi>#</mi></mrow></msup></math></span>. Furthermore, applying this method to suitably chosen bent functions we construct several generic classes of homogeneous cubic bent functions (considered as a difficult problem) that might possess additional properties (namely without affine derivatives and/or outside <span><math><msup><mrow><mi>MM</mi></mrow><mrow><mi>#</mi></mrow></msup></math></span>). Our results significantly improve upon the best known instances of this type of bent functions given by Polujan and Pott (2020), and additionally we provide a solution to an open problem presented in their paper.</p></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"297 ","pages":"Article 105149"},"PeriodicalIF":1.0,"publicationDate":"2024-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139560114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximating the directed path partition problem 近似有向路径分割问题
IF 1 4区 计算机科学
Information and Computation Pub Date : 2024-01-19 DOI: 10.1016/j.ic.2024.105150
Yong Chen , Zhi-Zhong Chen , Curtis Kennedy , Guohui Lin , Yao Xu , An Zhang
{"title":"Approximating the directed path partition problem","authors":"Yong Chen ,&nbsp;Zhi-Zhong Chen ,&nbsp;Curtis Kennedy ,&nbsp;Guohui Lin ,&nbsp;Yao Xu ,&nbsp;An Zhang","doi":"10.1016/j.ic.2024.105150","DOIUrl":"10.1016/j.ic.2024.105150","url":null,"abstract":"<div><p>Given a digraph <span><math><mi>G</mi><mo>=</mo><mo>(</mo><mi>V</mi><mo>,</mo><mi>E</mi><mo>)</mo></math></span>, the <em>k</em>-path partition problem aims to find a minimum collection of vertex-disjoint directed paths, of order at most <em>k</em>, to cover all the vertices. The problem has various applications. Its special case on undirected graphs is NP-hard when <span><math><mi>k</mi><mo>≥</mo><mn>3</mn></math></span>, and has received much study recently from the approximation algorithm perspective. However, the general problem on digraphs is seemingly untouched in the literature. We fill the gap with the first <span><math><mi>k</mi><mo>/</mo><mn>2</mn></math></span>-approximation algorithm, based on a novel concept of enlarging walk to minimize the number of singletons. Secondly, for <span><math><mi>k</mi><mo>=</mo><mn>3</mn></math></span>, we define a second novel kind of enlarging walks to greedily reduce the number of 2-paths in the 3-path partition and propose an improved 13/9-approximation algorithm. Lastly, for any <span><math><mi>k</mi><mo>≥</mo><mn>7</mn></math></span>, we present an improved <span><math><mo>(</mo><mi>k</mi><mo>+</mo><mn>2</mn><mo>)</mo><mo>/</mo><mn>3</mn></math></span>-approximation algorithm built on the maximum path-cycle cover followed by a careful 2-cycle elimination process.</p></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"297 ","pages":"Article 105150"},"PeriodicalIF":1.0,"publicationDate":"2024-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0890540124000154/pdfft?md5=0dde1df73fe58468b9370f19cea306f4&pid=1-s2.0-S0890540124000154-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139495707","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Projection theorems using effective dimension 使用有效尺寸的投影定理
IF 1 4区 计算机科学
Information and Computation Pub Date : 2024-01-17 DOI: 10.1016/j.ic.2024.105137
Neil Lutz , D.M. Stull
{"title":"Projection theorems using effective dimension","authors":"Neil Lutz ,&nbsp;D.M. Stull","doi":"10.1016/j.ic.2024.105137","DOIUrl":"10.1016/j.ic.2024.105137","url":null,"abstract":"<div><p>In this paper we use the theory of computing to study fractal dimensions of projections in Euclidean spaces. A fundamental result in fractal geometry is Marstrand's projection theorem, which states that for every analytic set <em>E</em>, for almost every line <em>L</em>, the Hausdorff dimension of the orthogonal projection of <em>E</em> onto <em>L</em> is maximal.</p><p>We use Kolmogorov complexity to give two new results on the Hausdorff and packing dimensions of orthogonal projections onto lines. The first shows that the conclusion of Marstrand's theorem holds whenever the Hausdorff and packing dimensions agree on the set <em>E</em>, even if <em>E</em> is not analytic. Our second result gives a lower bound on the packing dimension of projections of arbitrary sets. Finally, we give a new proof of Marstrand's theorem using the theory of computing.</p></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"297 ","pages":"Article 105137"},"PeriodicalIF":1.0,"publicationDate":"2024-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139495704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The reflective higher-order calculus: Encodability, typability and separation 反射式高阶微积分:可编码性、可类型性和分离性
IF 1 4区 计算机科学
Information and Computation Pub Date : 2024-01-12 DOI: 10.1016/j.ic.2024.105138
Stian Lybech
{"title":"The reflective higher-order calculus: Encodability, typability and separation","authors":"Stian Lybech","doi":"10.1016/j.ic.2024.105138","DOIUrl":"10.1016/j.ic.2024.105138","url":null,"abstract":"<div><p>The <em>ρ</em>-calculus (Reflective Higher-Order Calculus) of Meredith and Radestock is a <em>π</em>-calculus-like language with unusual features, notably, structured names, runtime generation of free names, and the lack of a scoping operator. These features pose interesting difficulties for proofs of encodability, type system soundness and separation results. We describe two errors in a previous attempt to encode the <em>π</em>-calculus in the <em>ρ</em>-calculus by Meredith and Radestock. Then we give a new encoding and prove its correctness, using a set of encodability criteria close to those of Gorla, and discuss the adaptations necessary to work with a calculus with runtime generation of structured names. We create a simple type system for the <em>ρ</em>-calculus to show that the encoding is well-typed, and discuss the limitations that must be imposed when working with structured names. Lastly we prove a separation result, showing that the <em>ρ</em>-calculus cannot be encoded in the <em>π</em>-calculus.</p></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"297 ","pages":"Article 105138"},"PeriodicalIF":1.0,"publicationDate":"2024-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139459973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Growth and irreducibility in path-incompressible trees 路径不可压缩树的生长和不可还原性
IF 1 4区 计算机科学
Information and Computation Pub Date : 2024-01-09 DOI: 10.1016/j.ic.2024.105136
George Barmpalias, Xiaoyan Zhang
{"title":"Growth and irreducibility in path-incompressible trees","authors":"George Barmpalias,&nbsp;Xiaoyan Zhang","doi":"10.1016/j.ic.2024.105136","DOIUrl":"10.1016/j.ic.2024.105136","url":null,"abstract":"<div><p>We study randomness-preserving transformations of path-incompressible trees, namely trees of finite randomness deficiency. We characterize their branching density, and show: (a) sparse perfect path-incompressible trees can be effectively densified, almost surely; (b) there exists a path-incompressible tree with infinitely many paths which does not compute any perfect path-incompressible tree with computable oracle-use.</p></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"297 ","pages":"Article 105136"},"PeriodicalIF":1.0,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139413172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cost-asymmetric memory hard password hashing 成本不对称内存硬密码散列
IF 1 4区 计算机科学
Information and Computation Pub Date : 2024-01-04 DOI: 10.1016/j.ic.2023.105134
Wenjie Bai, Jeremiah Blocki, Mohammad Hassan Ameri
{"title":"Cost-asymmetric memory hard password hashing","authors":"Wenjie Bai,&nbsp;Jeremiah Blocki,&nbsp;Mohammad Hassan Ameri","doi":"10.1016/j.ic.2023.105134","DOIUrl":"10.1016/j.ic.2023.105134","url":null,"abstract":"<div><p>In the past decade billions of user passwords have been exposed to the dangerous threat of offline password cracking<span> attacks. An offline attacker who has stolen the cryptographic hash<span> of a user's password can check as many password guesses as s/he likes limited only by the resources that s/he is willing to invest to crack the password. Pepper and key-stretching are two techniques that have been proposed to deter an offline attacker by increasing guessing costs. Pepper ensures that the cost of rejecting an incorrect password guess is higher than the (expected) cost of verifying a correct password guess. This is useful because most of the offline attacker's guesses will be incorrect. Unfortunately, as we observe the traditional peppering defense seems to be incompatible with modern memory hard key-stretching algorithms such as Argon2 or Scrypt. We introduce an alternative to pepper which we call Cost-Asymmetric Memory Hard Password Authentication which benefits from the same cost-asymmetry as the classical peppering defense i.e., the cost of rejecting an incorrect password guess is larger than the expected cost to authenticate a correct password guess. When configured properly we prove that our mechanism can only reduce the percentage of user passwords that are cracked by a rational offline attacker whose goal is to maximize (expected) profit i.e., the total value of cracked passwords minus the total guessing costs. We evaluate the effectiveness of our mechanism on empirical password datasets against a rational offline attacker. Our empirical analysis shows that our mechanism can reduce the percentage of user passwords that are cracked by a rational attacker by up to 10%.</span></span></p></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"297 ","pages":"Article 105134"},"PeriodicalIF":1.0,"publicationDate":"2024-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139093385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The membership problem for subsemigroups of GL2(Z) is NP-complete GL2(Z) 子半群的成员资格问题是 NP-完全的
IF 1 4区 计算机科学
Information and Computation Pub Date : 2024-01-01 DOI: 10.1016/j.ic.2023.105132
Paul C. Bell , Mika Hirvensalo , Igor Potapov
{"title":"The membership problem for subsemigroups of GL2(Z) is NP-complete","authors":"Paul C. Bell ,&nbsp;Mika Hirvensalo ,&nbsp;Igor Potapov","doi":"10.1016/j.ic.2023.105132","DOIUrl":"10.1016/j.ic.2023.105132","url":null,"abstract":"<div><p>We show that the problem of determining if the identity matrix belongs to a finitely generated semigroup of <span><math><mn>2</mn><mo>×</mo><mn>2</mn></math></span> matrices from the General Linear Group <span><math><msub><mrow><mtext>GL</mtext></mrow><mrow><mn>2</mn></mrow></msub><mo>(</mo><mi>Z</mi><mo>)</mo></math></span> is solvable in <strong>NP</strong>. We extend this to prove that the membership problem is decidable in <strong>NP</strong> for <span><math><msub><mrow><mtext>GL</mtext></mrow><mrow><mn>2</mn></mrow></msub><mo>(</mo><mi>Z</mi><mo>)</mo></math></span> and for any arbitrary regular expression over matrices from the Special Linear group <span><math><msub><mrow><mtext>SL</mtext></mrow><mrow><mn>2</mn></mrow></msub><mo>(</mo><mi>Z</mi><mo>)</mo></math></span>. We show that determining if a given finite set of matrices from <span><math><msub><mrow><mtext>SL</mtext></mrow><mrow><mn>2</mn></mrow></msub><mo>(</mo><mi>Z</mi><mo>)</mo></math></span> or the modular group <span><math><msub><mrow><mtext>PSL</mtext></mrow><mrow><mn>2</mn></mrow></msub><mo>(</mo><mi>Z</mi><mo>)</mo></math></span> generates a group or a free semigroup are decidable in <strong>NP</strong>. Previous algorithms, shown in 2005 by Choffrut and Karhumäki, were in <strong>EXPSPACE</strong>. Our algorithm is based on new techniques allowing us to operate on compressed word representations of matrices without explicit expansions. When combined with known <strong>NP</strong>-hard lower bounds, this proves that the membership problem over <span><math><msub><mrow><mtext>GL</mtext></mrow><mrow><mn>2</mn></mrow></msub><mo>(</mo><mi>Z</mi><mo>)</mo></math></span> is <strong>NP</strong>-complete, and the group problem and the non-freeness problem in <span><math><msub><mrow><mtext>SL</mtext></mrow><mrow><mn>2</mn></mrow></msub><mo>(</mo><mi>Z</mi><mo>)</mo></math></span> are <strong>NP</strong>-complete. <span><sup>1</sup></span></p></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"296 ","pages":"Article 105132"},"PeriodicalIF":1.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0890540123001359/pdfft?md5=59ba4ebf4d7f374b59781f7656883bdb&pid=1-s2.0-S0890540123001359-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139031197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Special Issue on 13th International Conference on Security and Cryptography for Networks (SCN 2022) 第 13 届网络安全与密码学国际会议(SCN 2022)特刊
IF 1 4区 计算机科学
Information and Computation Pub Date : 2024-01-01 DOI: 10.1016/j.ic.2023.105135
Clemente Galdi , Stanislaw Jarecki
{"title":"Special Issue on 13th International Conference on Security and Cryptography for Networks (SCN 2022)","authors":"Clemente Galdi ,&nbsp;Stanislaw Jarecki","doi":"10.1016/j.ic.2023.105135","DOIUrl":"https://doi.org/10.1016/j.ic.2023.105135","url":null,"abstract":"","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"296 ","pages":"Article 105135"},"PeriodicalIF":1.0,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139433906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信