Acta Informatica最新文献

筛选
英文 中文
Gray-box runtime enforcement of hyperproperties 超属性的灰盒运行时强制
IF 0.5 4区 计算机科学
Acta Informatica Pub Date : 2025-08-09 DOI: 10.1007/s00236-025-00502-1
Tzu-Han Hsu, Ana Oliveira da Costa, Andrew Wintenberg, Ezio Bartocci, Borzoo Bonakdarpour
{"title":"Gray-box runtime enforcement of hyperproperties","authors":"Tzu-Han Hsu,&nbsp;Ana Oliveira da Costa,&nbsp;Andrew Wintenberg,&nbsp;Ezio Bartocci,&nbsp;Borzoo Bonakdarpour","doi":"10.1007/s00236-025-00502-1","DOIUrl":"10.1007/s00236-025-00502-1","url":null,"abstract":"<div><p>Enforcement of information-flow policies has been extensively studied by language-based approaches over the past few decades. In this paper, we propose an alternative, novel, general, and effective approach using enforcement of <i>hyperproperties</i>– a powerful formalism for expressing and reasoning about a wide range of information-flow security policies. We study <i>black-</i> vs. <i>gray-</i> vs. <i>white-box</i> enforcement of hyperproperties expressed by nondeterministic finite-word hyperautomata (NFH), where the enforcer has null, some, or complete information about the implementation of the system under scrutiny. Given an NFH, in order to generate a runtime enforcer, we reduce the problem to controller synthesis for hyperproperties and subsequently to the satisfiability problem for quantified Boolean formulas (QBFs). The resulting enforcers are transferable with low-overhead. We conduct a rich set of case studies, including information-flow control for JavaScript code, as well as synthesizing obfuscators for control plants.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 3","pages":""},"PeriodicalIF":0.5,"publicationDate":"2025-08-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-025-00502-1.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145163654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preserving hyperproperties of programs using primitives with consensus number 2 保留使用共识数为2的原语的程序的超属性
IF 0.5 4区 计算机科学
Acta Informatica Pub Date : 2025-08-06 DOI: 10.1007/s00236-025-00500-3
Hagit Attiya, Armando Castañeda, Constantin Enea
{"title":"Preserving hyperproperties of programs using primitives with consensus number 2","authors":"Hagit Attiya,&nbsp;Armando Castañeda,&nbsp;Constantin Enea","doi":"10.1007/s00236-025-00500-3","DOIUrl":"10.1007/s00236-025-00500-3","url":null,"abstract":"<div><p>When a concrete concurrent object <i>refines</i> another, more abstract object, the correctness of a program employing the concrete object can be verified by considering its behaviors when using the more abstract object. This approach is sound for <i>trace properties</i> of the program, but not for <i>hyperproperties</i>, including many security properties and probability distributions of events. We define <i>strong observational refinement</i>, a strengthening of refinement that preserves hypersafety properties, and prove that it is <i>equivalent</i> to the existence of <i>forward simulations</i>. We show that strong observational refinement generalizes <i>strong linearizability</i>, a restriction of <i>linearizability</i>, the prevalent consistency condition for implementing concurrent objects. Our results imply that strong linearizability is also equivalent to existence of forward simulations, and show that strongly linearizable implementations can be composed both horizontally and vertically. This paper also investigates whether there are wait-free strongly-linearizable implementations from realistic primitives such as test&amp;set or fetch&amp;add, whose consensus number is 2. We show that many objects with consensus number 1 have wait-free strongly-linearizable implementations from fetch&amp;add. We also show that several objects with consensus number 2 have wait-free or lock-free implementations from other objects with consensus number 2. In contrast, we prove that even when fetch&amp;add, swap and test&amp;set primitives are used, some objects with consensus number 2 do not have lock-free strongly-linearizable implementations. This includes queues and stacks, and relaxed variants thereof.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 3","pages":""},"PeriodicalIF":0.5,"publicationDate":"2025-08-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-025-00500-3.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145162477","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Novel tree-search method for synthesizing SMT strategies 一种新的SMT策略合成树搜索方法
IF 0.5 4区 计算机科学
Acta Informatica Pub Date : 2025-08-04 DOI: 10.1007/s00236-025-00495-x
Zhengyang John Lu, Joel Day, Piyush Jha, Paul Sarnighausen-Cahn, Stefan Siemer, Florin Manea, Vijay Ganesh
{"title":"Novel tree-search method for synthesizing SMT strategies","authors":"Zhengyang John Lu,&nbsp;Joel Day,&nbsp;Piyush Jha,&nbsp;Paul Sarnighausen-Cahn,&nbsp;Stefan Siemer,&nbsp;Florin Manea,&nbsp;Vijay Ganesh","doi":"10.1007/s00236-025-00495-x","DOIUrl":"10.1007/s00236-025-00495-x","url":null,"abstract":"<div><p>Modern SMT solvers, such as Z3, allow solver users to customize strategies to improve performance on their specific use cases. However, handcrafting an optimized strategy for a specific class of SMT instances remains a complex and demanding task for both solver developers and users alike. In this paper, we address the problem of automated SMT strategy synthesis via a novel method based on Monte-Carlo Tree Search (MCTS). We formulate strategy synthesis as a sequential decision-making process, where the search tree corresponds to the strategy space. Subsequently, we employ MCTS to navigate this vast search space. Compared to the conventional MCTS, we introduce two heuristics—layered and staged search—that enable our method to identify effective strategies with lower costs. We implement our method, dubbed Z3alpha, upon the Z3 SMT solver. Our experiments demonstrate that Z3alpha outperforms the default Z3 solver and the state-of-the-art synthesis tool Fastsmt on the majority of the evaluated benchmark sets, while producing more interpretable strategies than FastSMT. At SMT-COMP’24, among the 16 participating logics, Z3alpha improved upon the default Z3 in 12 cases and helped solve hundreds more instances in QF_NIA and QF_NRA, winning their respective divisions.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 3","pages":""},"PeriodicalIF":0.5,"publicationDate":"2025-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-025-00495-x.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145161738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correction: Directed capacity-preserving subgraphs: hardness and exact polynomial algorithms 修正:有向容量保持子图:硬度和精确多项式算法
IF 0.5 4区 计算机科学
Acta Informatica Pub Date : 2025-07-04 DOI: 10.1007/s00236-025-00493-z
Markus Chimani, Max Ilsen
{"title":"Correction: Directed capacity-preserving subgraphs: hardness and exact polynomial algorithms","authors":"Markus Chimani,&nbsp;Max Ilsen","doi":"10.1007/s00236-025-00493-z","DOIUrl":"10.1007/s00236-025-00493-z","url":null,"abstract":"","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 3","pages":""},"PeriodicalIF":0.5,"publicationDate":"2025-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-025-00493-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145161928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Primitive Deficiency of two Primitive Strings 两个原弦的原缺
IF 0.5 4区 计算机科学
Acta Informatica Pub Date : 2025-06-27 DOI: 10.1007/s00236-025-00494-y
Othman Echi
{"title":"The Primitive Deficiency of two Primitive Strings","authors":"Othman Echi","doi":"10.1007/s00236-025-00494-y","DOIUrl":"10.1007/s00236-025-00494-y","url":null,"abstract":"<div><p>Let <span>(Sigma )</span> be an alphabet of size at least 2, and let <span>(textbf{Q}(Sigma ))</span> denote the set of all primitive strings over <span>(Sigma )</span>. Let <i>p</i> and <i>q</i> be two distinct primitive strings over <span>(Sigma )</span>. In 1967, Lentin and Schützenberger proved that the language <span>(p^+q^+:= {p^n q^m: m, n in mathbb {N} setminus {0}})</span> contains at most one periodic string. Moreover, if <span>(p^n q^m)</span> is periodic, then either <span>(n = 1)</span> or <span>(m = 1)</span>. They also showed that if <span>(pq^m)</span> is periodic, then </p><div><div><span>$$begin{aligned} m le dfrac{2|p|}{|q|} + 3. end{aligned}$$</span></div></div><p>The aim of this paper is to provide a complete characterization of all pairs of distinct primitive strings <i>p</i> and <i>q</i> such that <span>(pq^m)</span> is periodic. As a consequence, we show that if <span>(|p| &gt;|q|)</span> and <span>(pq^m)</span> is periodic, and if <i>t</i> is the quotient of the integer division of|<i>p</i>| by|<i>q</i>|, then </p><div><div><span>$$begin{aligned} m le t + 2. end{aligned}$$</span></div></div><p>Furthermore, if <i>t</i> and <i>i</i> are integers such that <span>(t ge 2)</span> and <span>(1 le i le t + 2)</span>, we show that there exist two primitive strings <i>p</i> and <i>q</i> with <span>(|p| &gt;|q|)</span> such that <i>t</i> is the quotient of the integer division of|<i>p</i>| by|<i>q</i>|, and <span>(pq^i)</span> is periodic.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 3","pages":""},"PeriodicalIF":0.5,"publicationDate":"2025-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145169414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Data reduction for directed feedback vertex set on graphs without long induced cycles 无长诱导循环图上有向反馈顶点集的数据约简
IF 0.5 4区 计算机科学
Acta Informatica Pub Date : 2025-06-03 DOI: 10.1007/s00236-025-00490-2
Jona Dirks, Enna Gerhard, Mario Grobler, Amer E. Mouawad, Sebastian Siebertz
{"title":"Data reduction for directed feedback vertex set on graphs without long induced cycles","authors":"Jona Dirks,&nbsp;Enna Gerhard,&nbsp;Mario Grobler,&nbsp;Amer E. Mouawad,&nbsp;Sebastian Siebertz","doi":"10.1007/s00236-025-00490-2","DOIUrl":"10.1007/s00236-025-00490-2","url":null,"abstract":"&lt;div&gt;&lt;p&gt;We study reduction rules for &lt;span&gt;Directed Feedback Vertex Set (DFVS)&lt;/span&gt; on directed graphs without long cycles. A &lt;span&gt;DFVS&lt;/span&gt; instance without cycles longer than &lt;i&gt;d&lt;/i&gt; naturally corresponds to an instance of &lt;i&gt;d&lt;/i&gt;&lt;span&gt;-Hitting Set&lt;/span&gt;, however, enumerating all cycles in an &lt;i&gt;n&lt;/i&gt;-vertex graph and then kernelizing the resulting &lt;i&gt;d&lt;/i&gt;&lt;span&gt;-Hitting Set&lt;/span&gt; instance can be too costly, as already enumerating all cycles can take time &lt;span&gt;(Omega (n^d))&lt;/span&gt;. To the best of our knowledge, the kernelization of &lt;span&gt;DFVS&lt;/span&gt; on graphs without long cycles has not been studied in the literature, except for very restricted cases, e.g., for tournaments, in which all induced cycles are of length three. We show that the natural reduction rule to delete all vertices and edges that do not lie on induced cycles cannot be implemented efficiently, that is, it is &lt;i&gt;W&lt;/i&gt;[1]-hard (with respect to parameter &lt;i&gt;d&lt;/i&gt;) to decide if a vertex or edge lies on an induced cycle of length at most &lt;i&gt;d&lt;/i&gt; even on graphs that become acyclic after the deletion of a single vertex or edge. Based on different reduction rules we then show how to compute a kernel with at most &lt;span&gt;(2^dk^d)&lt;/span&gt; vertices and at most &lt;span&gt;(d^{3d}k^d)&lt;/span&gt; induced cycles of length at most &lt;i&gt;d&lt;/i&gt; (which however, cannot be enumerated efficiently), where &lt;i&gt;k&lt;/i&gt; is the size of a minimum directed feedback vertex set. We then study classes of graphs whose underlying undirected graphs have bounded expansion or are nowhere dense. These are very general classes of sparse graphs, containing e.g. classes excluding a minor or a topological minor. We prove that for every class &lt;span&gt;(mathscr {C} )&lt;/span&gt; with bounded expansion there is a function &lt;span&gt;(f_mathscr {C} (d))&lt;/span&gt; such that for graphs &lt;span&gt;(Gin mathscr {C} )&lt;/span&gt; without induced cycles of length greater than &lt;i&gt;d&lt;/i&gt; we can compute a kernel with &lt;span&gt;(f_mathscr {C} (d)cdot k)&lt;/span&gt; vertices in time &lt;span&gt;(f_mathscr {C} (d)cdot n^{mathcal {O}(1)})&lt;/span&gt;. For every nowhere dense class &lt;span&gt;(mathscr {C} )&lt;/span&gt; there is a function &lt;span&gt;(f_mathscr {C} (d,varepsilon ))&lt;/span&gt; such that for graphs &lt;span&gt;(Gin mathscr {C} )&lt;/span&gt; without induced cycles of length greater than &lt;i&gt;d&lt;/i&gt; we can compute a kernel with &lt;span&gt;(f_mathscr {C} (d,varepsilon )cdot k^{1+varepsilon })&lt;/span&gt; vertices for any &lt;span&gt;(varepsilon &gt;0)&lt;/span&gt; in time &lt;span&gt;(f_mathscr {C} (d,varepsilon )cdot n^{mathcal {O}(1)})&lt;/span&gt;. The most restricted classes we consider are strongly connected planar graphs without any (induced or non-induced) long cycles. We show that these classes have treewidth &lt;span&gt;(mathcal {O}(d))&lt;/span&gt; and hence &lt;span&gt;DFVS&lt;/span&gt; on planar graphs without cycles of length greater than &lt;i&gt;d&lt;/i&gt; can be solved in time &lt;span&gt;(2^{mathcal {O}(d)}cdot n^{mathcal {O}(1)})&lt;/span&gt;. We finally present a new data reduction rule for general &lt;span&gt;DFVS&lt;/span&gt; and prove that the rule together with a few standard ","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 2","pages":""},"PeriodicalIF":0.5,"publicationDate":"2025-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-025-00490-2.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145161722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exact and parameterized algorithms for choosability 精确和参数化算法的可选择性。
IF 0.5 4区 计算机科学
Acta Informatica Pub Date : 2025-05-30 DOI: 10.1007/s00236-025-00492-0
Ivan Bliznets, Jesper Nederlof
{"title":"Exact and parameterized algorithms for choosability","authors":"Ivan Bliznets,&nbsp;Jesper Nederlof","doi":"10.1007/s00236-025-00492-0","DOIUrl":"10.1007/s00236-025-00492-0","url":null,"abstract":"<div><p>In the C<span>hoosability</span> problem (or list chromatic number problem), for a given graph <i>G</i>, we need to find the smallest <i>k</i> such that <i>G</i> admits a list coloring for any list assignment where all lists contain at least <i>k</i> colors. The problem is tightly connected with the well-studied C<span>oloring</span> and L<span>ist </span> C<span>oloring</span> problems. However, the knowledge of the complexity landscape for the C<span>hoosability</span> problem is pretty scarce. Moreover, most of the known results only provide lower bounds for its computational complexity and do not provide ways to cope with the intractability. The main objective of our paper is to construct the first non-trivial exact exponential algorithms for the C<span>hoosability</span> problem, and complete the picture with parameterized results. Specifically, we present the first single-exponential algorithm for the decision version of the problem with fixed <i>k</i>. This result answers an implicit question from Eppstein on a stackexchange thread discussing upper bounds on the union of lists assigned to vertices. We also present a <span>(2^{n^2} poly(n))</span> time algorithm for the general C<span>hoosability</span> problem. In the parameterized setting, we give a polynomial kernel for the problem parameterized by vertex cover, and algorithms that run in FPT time when parameterized by a size of a clique-modulator and by the dual parameterization <span>(n-k)</span>. Additionally, we show that C<span>hoosability</span> admits a significant running time improvement if it is parameterized by cutwidth in comparison with the parameterization by treewidth studied by Marx and Mitsou [ICALP’16]. On the negative side, we provide a lower bound parameterized by a size of a modulator to split graphs under assumption of the Exponential Time Hypothesis.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 2","pages":""},"PeriodicalIF":0.5,"publicationDate":"2025-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC12125139/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144198053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Effects on distance energy of some special complete multipartite graphs by embedding an edge 嵌入边对几种特殊完全多部图距离能量的影响
IF 0.4 4区 计算机科学
Acta Informatica Pub Date : 2025-05-22 DOI: 10.1007/s00236-025-00491-1
Masood Ur Rehman, Muhammad Ajmal
{"title":"Effects on distance energy of some special complete multipartite graphs by embedding an edge","authors":"Masood Ur Rehman,&nbsp;Muhammad Ajmal","doi":"10.1007/s00236-025-00491-1","DOIUrl":"10.1007/s00236-025-00491-1","url":null,"abstract":"<div><p>The distance energy of a simple undirected graph <span>(mathcal {G})</span>, denoted by <span>(mathcal {E}_D(mathcal {G}))</span>, is the sum of the absolute values of the eigenvalues of the distance matrix <span>(D(mathcal {G}))</span> of <span>(mathcal {G})</span>. In this paper, we study the effects on distance energy of some special complete <i>t</i>-partite graphs due to embedding an edge. This paper is motivated by the study in a 2022 paper by Wang and Meng.\u0000</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 2","pages":""},"PeriodicalIF":0.4,"publicationDate":"2025-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144108446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Row-column combination of Dyck words Dyck单词的行-列组合
IF 0.4 4区 计算机科学
Acta Informatica Pub Date : 2025-05-22 DOI: 10.1007/s00236-025-00489-9
Stefano Crespi Reghizzi, Antonio Restivo, Pierluigi San Pietro
{"title":"Row-column combination of Dyck words","authors":"Stefano Crespi Reghizzi,&nbsp;Antonio Restivo,&nbsp;Pierluigi San Pietro","doi":"10.1007/s00236-025-00489-9","DOIUrl":"10.1007/s00236-025-00489-9","url":null,"abstract":"<div><p>We extend the notion of the Dyck language from words to two-dimensional arrays of symbols, i.e., pictures, using the row-column combination (also known as the crossword) of two Dyck languages over the same alphabet. In a Dyck crossword picture, each column and each row must be a word from the respective Dyck language. The pairing of open and closed parentheses in a Dyck word can be represented by edges connecting corresponding cells in the same row or column. This defines a <i>matching graph</i>, which serves as the two-dimensional analogue of the syntactic tree of a Dyck word. A matching graph is partitioned into simple circuits of unbounded length (always a multiple of four), whose labels form a regular language. These circuits exhibit a wide variety of forms and labelings, which we illustrate and partially classify. With a two-letter alphabet, a Dyck crossword is necessarily empty. The minimal non-trivial case, requiring an alphabet of size four, already generates all possible forms of matching graphs and is the primary focus of our study. We prove that the only picture with a single matching circuit (i.e., a Hamiltonian cycle) has size 2 by 2. Two key properties of Dyck words–cancellation and well-nesting–can be generalized to two dimensions, leading to two alternative definitions of 2D Dyck languages: <i>neutralizable </i> and <i>well-nested</i>. These languages are special cases of Dyck crossword pictures called quaternate, where all circuits have length 4 (i.e., are rectangles). This results in a strict language inclusion hierarchy: well-nested <span>(subset )</span> neutralizable <span>(subset )</span> quaternate <span>(subset )</span> Dyck crosswords. When the alphabet size exceeds four, not all combinations of row and column Dyck languages yield non-empty crosswords. To identify productive combinations, we introduce an <i>alphabetic graph</i>, where nodes represent alphabet symbols and edges represent their couplings. A matching circuit corresponds to the unrolling of an alphabetic graph circuit. Finally, we prove that Dyck crosswords are not tiling-recognizable, as expected for a definition extending Dyck word languages to pictures.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 2","pages":""},"PeriodicalIF":0.4,"publicationDate":"2025-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-025-00489-9.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144117700","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deterministic real-time tree-walking-storage automata 确定性实时树行走存储自动机
IF 0.4 4区 计算机科学
Acta Informatica Pub Date : 2025-05-03 DOI: 10.1007/s00236-025-00488-w
Martin Kutrib, Uwe Meyer
{"title":"Deterministic real-time tree-walking-storage automata","authors":"Martin Kutrib,&nbsp;Uwe Meyer","doi":"10.1007/s00236-025-00488-w","DOIUrl":"10.1007/s00236-025-00488-w","url":null,"abstract":"<div><p>We study deterministic tree-walking-storage automata, which are finite-state devices equipped with a tree-like storage. These automata are generalized stack automata, where the linear stack storage is replaced by a non-linear tree-like stack. Therefore, tree-walking-storage automata have the ability to explore the interior of the tree storage without altering the contents, with the possible moves of the tree pointer corresponding to those of tree-walking automata. In addition, a tree-walking-storage automaton can append (push) non-existent descendants to a tree node and remove (pop) leaves from the tree. Here we are particularly considering the capacities of deterministic tree-walking-storage automata working in real time. It is shown that even the non-erasing variant can accept rather complicated unary languages as, for example, the language of words whose lengths are powers of two, or the language of words whose lengths are double Fibonacci numbers. Comparing the computational capacities with automata from the classical automata hierarchy, we derive that the family of languages accepted by real-time deterministic (non-erasing) tree-walking-storage automata is located between the regular and the deterministic context-sensitive languages. Moreover, the families are incomparable with the families of context-free and growing context-sensitive languages. It turns out that the devices under consideration accept unary languages in non-erasing mode that cannot be accepted by any classical stack automaton, even in erasing mode and arbitrary time. Basic closure properties of the induced families of languages are shown. In particular, we consider Boolean operations and AFL operations. It turns out that the two families in question have the same properties and, in particular, share all but one of these closure properties with the important family of deterministic context-free languages. Then, we consider the computational capacity of the counterpart to counter- and stack-counter automata, where the set of stack symbols is a singleton. Finally, we explore several decidability problems and show, that even for devices with a single tree symbol, the problems are all non-semidecidable by reductions of non-semidecidable problems of Turing machines.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 2","pages":""},"PeriodicalIF":0.4,"publicationDate":"2025-05-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-025-00488-w.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143900799","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书