Information and Computation最新文献

筛选
英文 中文
A linear exponential comonad in s-finite transition kernels and probabilistic coherent spaces s-有限跃迁核和概率相干空间中的线性指数公数
IF 1 4区 计算机科学
Information and Computation Pub Date : 2023-10-13 DOI: 10.1016/j.ic.2023.105109
Masahiro Hamano
{"title":"A linear exponential comonad in s-finite transition kernels and probabilistic coherent spaces","authors":"Masahiro Hamano","doi":"10.1016/j.ic.2023.105109","DOIUrl":"https://doi.org/10.1016/j.ic.2023.105109","url":null,"abstract":"<div><p>This paper concerns a stochastic construction of probabilistic coherent spaces by employing novel ingredients (i) linear exponential comonad arising properly in the measure-theory (ii) continuous orthogonality between measures and measurable functions.</p><p>A linear exponential comonad is constructed over a symmetric monoidal category of transition kernels, relaxing Markov kernels of Panangaden's stochastic relations into s-finite kernels. The model supports an orthogonality in terms of an integral between measures and measurable functions, which can be seen as a continuous extension of Girard-Danos-Ehrhard's linear duality for probabilistic coherent spaces. The orthogonality is formulated by a Hyland-Schalk double glueing construction, into which our measure theoretic monoidal comonad structure is accommodated. As an application to countable measurable spaces, a dagger compact closed category is obtained, whose double glueing gives rise to the familiar category of probabilistic coherent spaces.</p></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"295 ","pages":"Article 105109"},"PeriodicalIF":1.0,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0890540123001128/pdfft?md5=e5df7885cdba0fd27e3bf8ca2af68829&pid=1-s2.0-S0890540123001128-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91968654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Swendsen-Wang dynamics for the ferromagnetic Ising model with external fields 带外场的铁磁Ising模型的Swendsen-Wang动力学
IF 1 4区 计算机科学
Information and Computation Pub Date : 2023-10-01 DOI: 10.1016/j.ic.2023.105066
Weiming Feng, Heng Guo, Jiaheng Wang
{"title":"Swendsen-Wang dynamics for the ferromagnetic Ising model with external fields","authors":"Weiming Feng,&nbsp;Heng Guo,&nbsp;Jiaheng Wang","doi":"10.1016/j.ic.2023.105066","DOIUrl":"https://doi.org/10.1016/j.ic.2023.105066","url":null,"abstract":"<div><p>We study the sampling problem for the ferromagnetic Ising model with consistent external fields, and in particular, Swendsen-Wang dynamics on this model. We introduce a new grand model unifying two closely related models: the subgraph world and the random cluster model. Through this new viewpoint, we show:</p><ul><li><span>(1)</span><span><p>polynomial mixing time bounds for Swendsen-Wang dynamics and (edge-flipping) Glauber dynamics of the random cluster model, generalising the bounds and simplifying the proofs for the no-field case by Guo and Jerrum (2018);</p></span></li><li><span>(2)</span><span><p>near linear mixing time for the two dynamics above if the maximum degree is bounded and all fields are (consistent and) bounded away from 1.</p></span></li></ul></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"294 ","pages":"Article 105066"},"PeriodicalIF":1.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49871259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Combinatory categorial grammars as generators of weighted forests 作为加权森林生成器的组合范畴语法
IF 1 4区 计算机科学
Information and Computation Pub Date : 2023-10-01 DOI: 10.1016/j.ic.2023.105075
Andreas Maletti, Lena Katharina Schiffer
{"title":"Combinatory categorial grammars as generators of weighted forests","authors":"Andreas Maletti,&nbsp;Lena Katharina Schiffer","doi":"10.1016/j.ic.2023.105075","DOIUrl":"https://doi.org/10.1016/j.ic.2023.105075","url":null,"abstract":"<div><p>Combinatory Categorial Grammar (CCG) is an extension of categorial grammar that is well-established in computational linguistics<span>. It is mildly context-sensitive, so it is efficiently parsable and reaches an expressiveness that is suitable for describing natural languages. Weighted CCG (wCCG) are introduced as a natural extension of CCG with weights taken from an arbitrary commutative semiring. Their expressive power<span> is compared to other weighted formalisms with special emphasis on the weighted forests generated by wCCG since the ability to express the underlying syntactic structure<span> of an input sentence is a vital feature of CCG in the area of natural language processing<span>. Building on recent results for the expressivity in the unweighted setting, the corresponding results are derived for the weighted setting for any commutative semiring. More precisely, the weighted forests generatable by wCCG are also generatable by weighted simple monadic context-free tree grammar (wsCFTG). If the rule system is restricted to application rules and composition rules of first degree, then the generatable weighted forests are exactly the regular weighted forests. Finally, when only application rules are allowed, then a proper subset of the regular weighted forests is generatable.</span></span></span></span></p></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"294 ","pages":"Article 105075"},"PeriodicalIF":1.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49870999","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Modelling mutual exclusion in a process algebra with time-outs 具有超时的过程代数中互斥的建模
IF 1 4区 计算机科学
Information and Computation Pub Date : 2023-10-01 DOI: 10.1016/j.ic.2023.105079
Rob van Glabbeek
{"title":"Modelling mutual exclusion in a process algebra with time-outs","authors":"Rob van Glabbeek","doi":"10.1016/j.ic.2023.105079","DOIUrl":"https://doi.org/10.1016/j.ic.2023.105079","url":null,"abstract":"<div><p>I show that in a standard process algebra extended with time-outs one can correctly model mutual exclusion in such a way that starvation-freedom holds without assuming fairness or justness, even when one makes the problem more challenging by assuming memory accesses to be atomic. This can be achieved only when dropping the requirement of speed independence.</p></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"294 ","pages":"Article 105079"},"PeriodicalIF":1.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49871264","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficient construction of the BWT for repetitive text using string compression 使用字符串压缩高效构建重复文本的BWT
IF 1 4区 计算机科学
Information and Computation Pub Date : 2023-10-01 DOI: 10.1016/j.ic.2023.105088
Diego Díaz-Domínguez , Gonzalo Navarro
{"title":"Efficient construction of the BWT for repetitive text using string compression","authors":"Diego Díaz-Domínguez ,&nbsp;Gonzalo Navarro","doi":"10.1016/j.ic.2023.105088","DOIUrl":"https://doi.org/10.1016/j.ic.2023.105088","url":null,"abstract":"<div><p>We present a new semi-external algorithm that builds the Burrows–Wheeler transform variant of Bauer et al. (a.k.a., BCR BWT) in linear expected time. Our method uses compression techniques to reduce computational costs when the input is massive and repetitive. Concretely, we build on induced suffix sorting (ISS) and resort to run-length and grammar compression to maintain our intermediate results in compact form. Our compression format not only saves space but also speeds up the required computations. Our experiments show important space and computation time savings when the text is repetitive. In moderate-size collections of real human genome assemblies (14.2 GB - 75.05 GB), our memory peak is, on average, 1.7x smaller than the peak of the state-of-the-art BCR BWT construction algorithm (<span>ropebwt2</span>), while running 5x faster. Our current implementation was also able to compute the BCR BWT of 400 real human genome assemblies (1.2 TB) in 41.21 hours using 118.83 GB of working memory (around 10% of the input size). Interestingly, the results we report in the 1.2 TB file are dominated by the difficulties of scanning huge files under memory constraints (specifically, I/O operations). This fact indicates we can perform much better with a more careful implementation of our method, thus scaling to even bigger sizes efficiently.</p></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"294 ","pages":"Article 105088"},"PeriodicalIF":1.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49871265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Building a small and informative phylogenetic supertree 建立一个小而信息丰富的系统发育超树
IF 1 4区 计算机科学
Information and Computation Pub Date : 2023-10-01 DOI: 10.1016/j.ic.2023.105082
Jesper Jansson , Konstantinos Mampentzidis , Sandhya T.P.
{"title":"Building a small and informative phylogenetic supertree","authors":"Jesper Jansson ,&nbsp;Konstantinos Mampentzidis ,&nbsp;Sandhya T.P.","doi":"10.1016/j.ic.2023.105082","DOIUrl":"https://doi.org/10.1016/j.ic.2023.105082","url":null,"abstract":"<div><p><span>We combine two fundamental optimization problems related to the construction of phylogenetic trees called </span><em>maximum rooted triplets consistency</em> and <em>minimally resolved supertree</em> into a new problem, which we call <em>q-maximum rooted triplets consistency</em> (<em>q</em>-MAXRTC). It takes as input a set <span><math><mi>R</mi></math></span> of rooted, binary phylogenetic trees with three leaves each and asks for a phylogenetic tree with exactly <em>q</em> internal nodes that contains the largest possible number of trees from <span><math><mi>R</mi></math></span>. We prove that <em>q</em><span>-MAXRTC is NP-hard to approximate within a constant, develop polynomial-time approximation algorithms for different values of </span><em>q</em>, and show experimentally that representing a phylogenetic tree by one having much fewer nodes typically does not destroy too much branching information. To demonstrate the algorithmic advantage of using trees with few internal nodes, we also propose a new algorithm for computing the <em>rooted triplet distance</em> that is faster than the existing algorithms when restricted to such trees.</p></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"294 ","pages":"Article 105082"},"PeriodicalIF":1.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49871271","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A strengthened eCK secure identity based authenticated key agreement protocol based on the standard CDH assumption 基于标准CDH假设的基于强化eCK安全身份的认证密钥协议
IF 1 4区 计算机科学
Information and Computation Pub Date : 2023-10-01 DOI: 10.1016/j.ic.2023.105067
Renu Mary Daniel , Anitha Thomas , Elijah Blessing Rajsingh , Salaja Silas
{"title":"A strengthened eCK secure identity based authenticated key agreement protocol based on the standard CDH assumption","authors":"Renu Mary Daniel ,&nbsp;Anitha Thomas ,&nbsp;Elijah Blessing Rajsingh ,&nbsp;Salaja Silas","doi":"10.1016/j.ic.2023.105067","DOIUrl":"https://doi.org/10.1016/j.ic.2023.105067","url":null,"abstract":"<div><p><span>An Authenticated Key Agreement (AKA) protocol enables two communicating parties to compute a session key with equal partnership, such that each entity is assured of the authenticity of its peer. Identity-based AKA (ID-AKA) protocols facilitate implicit authentication of the participating entities, without certificate verification. However, most of the existing ID-AKA schemes are proven secure based on the strong Gap Diffie-Hellman (GDH) assumption. Currently, there are no known implementation methods to realize the GDH assumption without using </span>bilinear pairings<span>. Further, none of the existing ID-AKA protocols have provable security against practical attacks due to intermediate result leakages. To this end, we propose a purely pairing-free ID-AKA protocol based on the Computational Diffie-Hellman assumption. The protocol offers provable security under the strengthened eCK (seCK) model that captures attacks resulting from intermediate result leakages. Comparative analysis with other ID-AKA protocols suggests that the proposed protocol satisfies stronger security requirements, without the gap assumption.</span></p></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"294 ","pages":"Article 105067"},"PeriodicalIF":1.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49871261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Further improvements for SAT in terms of formula length SAT在公式长度方面的进一步改进
IF 1 4区 计算机科学
Information and Computation Pub Date : 2023-10-01 DOI: 10.1016/j.ic.2023.105085
Junqiang Peng, Mingyu Xiao
{"title":"Further improvements for SAT in terms of formula length","authors":"Junqiang Peng,&nbsp;Mingyu Xiao","doi":"10.1016/j.ic.2023.105085","DOIUrl":"https://doi.org/10.1016/j.ic.2023.105085","url":null,"abstract":"<div><p><span><span>In this paper, we prove that the general CNF </span>satisfiability problem can be solved in </span><span><math><msup><mrow><mi>O</mi></mrow><mrow><mo>⁎</mo></mrow></msup><mo>(</mo><msup><mrow><mn>1.0638</mn></mrow><mrow><mi>L</mi></mrow></msup><mo>)</mo></math></span> time, where <em>L</em> is the length of the input CNF-formula (i.e., the total number of literals in the formula), which improves the previous result of <span><math><msup><mrow><mi>O</mi></mrow><mrow><mo>⁎</mo></mrow></msup><mo>(</mo><msup><mrow><mn>1.0652</mn></mrow><mrow><mi>L</mi></mrow></msup><mo>)</mo></math></span><span> obtained in 2009. Our algorithm was analyzed by using the measure-and-conquer method. Our improvements are mainly attributed to the following two points: we carefully design branching rules to deal with degree-5 and degree-4 variables to avoid previous bottlenecks; we show that some worst cases will not always happen, and then we can use an amortized technique to get further improvements. In our analyses, we provide some general frameworks for analysis and several lower bounds on the decreasing of the measure to simplify the arguments. These techniques may be used to analyze more algorithms based on the measure-and-conquer method.</span></p></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"294 ","pages":"Article 105085"},"PeriodicalIF":1.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49871266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Achieving sequenced SQL with log-segmented timestamps 使用日志分段时间戳实现有序的SQL
IF 1 4区 计算机科学
Information and Computation Pub Date : 2023-10-01 DOI: 10.1016/j.ic.2023.105065
Curtis E. Dyreson , M.A. Manazir Ahsan
{"title":"Achieving sequenced SQL with log-segmented timestamps","authors":"Curtis E. Dyreson ,&nbsp;M.A. Manazir Ahsan","doi":"10.1016/j.ic.2023.105065","DOIUrl":"https://doi.org/10.1016/j.ic.2023.105065","url":null,"abstract":"<div><p><span>In a period-timestamped, relational temporal database, each tuple is timestamped with a period. The timestamp records when the tuple is “alive” in some temporal dimension. </span><em>Sequenced semantics</em><span> is a special semantics for evaluating a query in a temporal database. The semantics stipulates that the query must, in effect, be evaluated simultaneously in each time instant using the tuples alive at that instant. Previous research has proposed changes to a database management system's<span><span> query evaluation engine to support sequenced semantics. We show how to achieve sequenced semantics without modifying a query evaluation engine. Our technique has two pillars. First we use log-segmented timestamps to record a tuple's lifetime. A log-segmented timestamp divides the time-line into segments of known length. Any temporal period can be represented by a small number of such segments. Second, by taking advantage of the properties of log-segmented timestamps, we translate a sequenced query to a non-temporal query, using the operations already present in an unmodified, non-temporal query evaluation engine. The paper provides translations for both relational algebra and </span>SQL. We experimentally evaluate the SQL translation. The primary contribution of this paper is how to implement sequenced semantics using log-segmented timestamped tuples in a generic SQL DBMS.</span></span></p></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"294 ","pages":"Article 105065"},"PeriodicalIF":1.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49871268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Abstract interpretation, Hoare logic, and incorrectness logic for quantum programs 量子程序的抽象解释、霍尔逻辑和错误逻辑
IF 1 4区 计算机科学
Information and Computation Pub Date : 2023-10-01 DOI: 10.1016/j.ic.2023.105077
Yuan Feng, Sanjiang Li
{"title":"Abstract interpretation, Hoare logic, and incorrectness logic for quantum programs","authors":"Yuan Feng,&nbsp;Sanjiang Li","doi":"10.1016/j.ic.2023.105077","DOIUrl":"https://doi.org/10.1016/j.ic.2023.105077","url":null,"abstract":"<div><p><span>Abstract interpretation, Hoare logic, and incorrectness (or reverse Hoare) logic are powerful techniques for static analysis of computer programs. They have all been successfully extended to the quantum setting, but developed largely in parallel. This paper explores the relationship between these techniques in the context of verifying quantum while-programs, where the abstract domain and the set of assertions for </span>quantum states are well-structured. We show that any complete quantum abstract interpretation induces a quantum Hoare logic and a quantum incorrectness logic, both being sound and relatively complete. Moreover, the induced logic systems operate in a forward manner, making them more suitable for certain applications. Conversely, any sound and relatively complete quantum Hoare logic or incorrectness logic induces a complete quantum abstract interpretation. As an application, we show the non-existence of any sound and relatively complete quantum Hoare logic or incorrectness logic if tuples of local subspaces are taken as assertions.</p></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"294 ","pages":"Article 105077"},"PeriodicalIF":1.0,"publicationDate":"2023-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49871258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信