Acta InformaticaPub Date : 2023-05-05DOI: 10.1007/s00236-023-00437-5
Niklas Kochdumper, Matthias Althoff
{"title":"Constrained polynomial zonotopes","authors":"Niklas Kochdumper, Matthias Althoff","doi":"10.1007/s00236-023-00437-5","DOIUrl":"10.1007/s00236-023-00437-5","url":null,"abstract":"<div><p>We introduce constrained polynomial zonotopes, a novel non-convex set representation that is closed under linear map, Minkowski sum, Cartesian product, convex hull, intersection, union, and quadratic as well as higher-order maps. We show that the computational complexity of the above-mentioned set operations for constrained polynomial zonotopes is at most polynomial in the representation size. The fact that constrained polynomial zonotopes are generalizations of zonotopes, polytopes, polynomial zonotopes, Taylor models, and ellipsoids further substantiates the relevance of this new set representation. In addition, the conversion from other set representations to constrained polynomial zonotopes is at most polynomial with respect to the dimension, and we present efficient methods for representation size reduction and for enclosing constrained polynomial zonotopes by simpler set representations.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"60 3","pages":"279 - 316"},"PeriodicalIF":0.6,"publicationDate":"2023-05-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-023-00437-5.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47177535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Acta InformaticaPub Date : 2023-05-01DOI: 10.4049/jimmunol.2300035
Barton F Haynes
{"title":"HIV Never Sleeps: Evidence to Support Early Antiretroviral Treatment.","authors":"Barton F Haynes","doi":"10.4049/jimmunol.2300035","DOIUrl":"10.4049/jimmunol.2300035","url":null,"abstract":"","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"28 1","pages":"1181-1182"},"PeriodicalIF":0.0,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"72984401","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Acta InformaticaPub Date : 2023-04-10DOI: 10.1007/s00236-023-00439-3
Jingnan Xie, Harry B. Hunt III
{"title":"On the undecidability and descriptional complexity of synchronized regular expressions","authors":"Jingnan Xie, Harry B. Hunt III","doi":"10.1007/s00236-023-00439-3","DOIUrl":"10.1007/s00236-023-00439-3","url":null,"abstract":"<div><p>In Freydenberger (Theory Comput Syst 53(2):159–193, 2013. https://doi.org/10.1007/s00224-012-9389-0), Freydenberger shows that the set of invalid computations of an extended Turing machine can be recognized by a synchronized regular expression [as defined in Della Penna et al. (Acta Informatica 39(1):31–70, 2003. https://doi.org/10.1007/s00236-002-0099-y)]. Therefore, the widely discussed predicate “<span>(={0,1}^*)</span>” is not recursively enumerable for synchronized regular expressions (SRE). In this paper, we employ a stronger form of non-recursive enumerability called <i>productiveness</i> and show that the set of invalid computations of a deterministic Turing machine on a single input can be recognized by a synchronized regular expression. Hence, for a polynomial-time decidable subset of SRE, where each expression generates either <span>({0, 1}^*)</span> or <span>({0, 1}^* -{w})</span> where <span>(w in {0, 1}^*)</span>, the predicate “<span>(={0,1}^*)</span>” is productive. This result can be easily applied to other classes of language descriptors due to the simplicity of the construction in its proof. This result also implies that many computational problems, especially promise problems, for SRE are productive. These problems include language class comparison problems (e.g., does a given synchronized regular expression generate a context-free language?), and equivalence and containment problems of several types (e.g., does a given synchronized regular expression generate a language equal to a fixed unbounded regular set?). In addition, we study the descriptional complexity of SRE. A generalized method for studying trade-offs between SRE and many classes of language descriptors is established.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"60 3","pages":"257 - 278"},"PeriodicalIF":0.6,"publicationDate":"2023-04-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-023-00439-3.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44264085","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Acta InformaticaPub Date : 2023-03-27DOI: 10.1007/s00236-023-00438-4
Besma Khaireddine, Aleksandr Zakharchenko, Matias Martinez, Ali Mili
{"title":"Toward a theory of program repair","authors":"Besma Khaireddine, Aleksandr Zakharchenko, Matias Martinez, Ali Mili","doi":"10.1007/s00236-023-00438-4","DOIUrl":"10.1007/s00236-023-00438-4","url":null,"abstract":"<div><p>To repair a program does not mean to make it (absolutely) correct; it only means to make it more-correct than it was originally. This is not a mundane academic distinction: given that programs typically have about a dozen faults per KLOC, it is important for program repair methods and tools to be designed in such a way that they map an incorrect program into a more-correct, albeit still potentially incorrect, program. Yet in the absence of a concept of relative correctness, many program repair methods and tools resort to approximations of absolute correctness; since these methods and tools are often validated against programs with a single fault, making them absolutely correct is indistinguishable from making them more-correct; this has contributed to conceal/obscure the absence of (and the need for) relative correctness. In this paper, we propose a theory of program repair based on a concept of relative correctness. We aspire to encourage researchers in program repair to explicitly specify what concept of relative correctness their method or tool is based upon; and to validate their method or tool by proving that it does enhance relative correctness, as defined.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"60 3","pages":"209 - 255"},"PeriodicalIF":0.6,"publicationDate":"2023-03-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41562782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Acta InformaticaPub Date : 2022-12-30DOI: 10.1007/s00236-022-00436-y
Ivano Lodato, Snehal M. Shekatkar, Tian An Wong
{"title":"On partial information retrieval: the unconstrained 100 prisoner problem","authors":"Ivano Lodato, Snehal M. Shekatkar, Tian An Wong","doi":"10.1007/s00236-022-00436-y","DOIUrl":"10.1007/s00236-022-00436-y","url":null,"abstract":"<div><p>We consider a generalization of the classical 100 prisoner problem and its variant, involving empty boxes, whereby winning probabilities for a team depend on the number of attempts, as well as on the number of winners. We call this the unconstrained 100 prisoner problem. After introducing the 3 main classes of strategies, we define a variety of ‘hybrid’ strategies and quantify their winning-efficiency. Whenever analytic results are not available, we make use of Monte Carlo simulations to estimate with high accuracy the winning probabilities. Based on the results obtained, we conjecture that <i>all</i> strategies, except for the strategy maximizing the winning probability of the classical (constrained) problem, converge to the random strategy under weak conditions on the number of players or empty boxes. We conclude by commenting on the possible applications of our results in understanding processes of information retrieval, such as “memory” in living organisms.\u0000</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"60 2","pages":"179 - 208"},"PeriodicalIF":0.6,"publicationDate":"2022-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49279314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Decentralized runtime verification of message sequences in message-based systems","authors":"Mahboubeh Samadi, Fatemeh Ghassemi, Ramtin Khosravi","doi":"10.1007/s00236-022-00435-z","DOIUrl":"10.1007/s00236-022-00435-z","url":null,"abstract":"<div><p>Message-based systems are usually distributed in nature, and distributed components collaborate via asynchronous message passing. In some cases, particular ordering among the messages may lead to violation of the desired properties such as data confidentiality. Due to the absence of a global clock and usage of off-the-shelf components, such unwanted orderings can be neither statically inspected nor verified by revising their codes at design time. We propose a choreography-based runtime verification algorithm that given an automata-based specification of unwanted message sequences detects the formation of the unwanted sequences. Our algorithm is fully decentralized in the sense that each component is equipped with a monitor, as opposed to having a centralized monitor, and also the specification of the unwanted sequences is decomposed among monitors. In this way, when a component sends a message, its monitor inspects if there is a possibility for the formation of unwanted message sequences. As there is no global clock in message-based systems, monitors cannot determine the exact ordering among messages. In such cases, they decide conservatively and declare a sequence formation even if that sequence has not been formed. We prevent such conservative declarations in our algorithm as much as possible and then characterize its operational guarantees. We evaluate the efficiency and scalability of our algorithm in terms of the communication overhead, the memory consumption, and the latency of the result declaration through simulation.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"60 2","pages":"145 - 178"},"PeriodicalIF":0.6,"publicationDate":"2022-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46797326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Acta InformaticaPub Date : 2022-08-27DOI: 10.1007/s00236-022-00421-5
Thomas Erlebach, Jakob T. Spooner
{"title":"Exploration of k-edge-deficient temporal graphs","authors":"Thomas Erlebach, Jakob T. Spooner","doi":"10.1007/s00236-022-00421-5","DOIUrl":"10.1007/s00236-022-00421-5","url":null,"abstract":"<div><p>A temporal graph with lifetime <i>L</i> is a sequence of <i>L</i> graphs <span>(G_1, ldots ,G_L)</span>, called layers, all of which have the same vertex set <i>V</i> but can have different edge sets. The underlying graph is the graph with vertex set <i>V</i> that contains all the edges that appear in at least one layer. The temporal graph is always connected if each layer is a connected graph, and it is <i>k</i>-edge-deficient if each layer contains all except at most <i>k</i> edges of the underlying graph. For a given start vertex <i>s</i>, a temporal exploration is a temporal walk that starts at <i>s</i>, traverses at most one edge in each layer, and visits all vertices of the temporal graph. We show that always-connected, <i>k</i>-edge-deficient temporal graphs with sufficient lifetime can always be explored in <span>(O(kn log n))</span> time steps. We also construct always-connected, <i>k</i>-edge-deficient temporal graphs for which any exploration requires <span>(varOmega (n log k))</span> time steps. For always-connected, 1-edge-deficient temporal graphs, we show that <i>O</i>(<i>n</i>) time steps suffice for temporal exploration.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"59 4","pages":"387 - 407"},"PeriodicalIF":0.6,"publicationDate":"2022-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-022-00421-5.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42775206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Acta InformaticaPub Date : 2022-08-12DOI: 10.1007/s00236-022-00427-z
Volker Diekert, Henning Fernau, Petra Wolf
{"title":"Properties of graphs specified by a regular language","authors":"Volker Diekert, Henning Fernau, Petra Wolf","doi":"10.1007/s00236-022-00427-z","DOIUrl":"10.1007/s00236-022-00427-z","url":null,"abstract":"<div><p>Traditionally, graph algorithms get a single graph as input, and then they should decide if this graph satisfies a certain property <span>(varPhi )</span>. What happens if this question is modified in a way that we get a possibly infinite family of graphs as an input, and the question is if there is a graph satisfying <span>(varPhi )</span> in the family? We approach this question by using formal languages for specifying families of graphs, in particular by regular sets of words. We show that certain graph properties can be decided by studying the syntactic monoid of the specification language <i>L</i> if a certain torsion condition is satisfied. This condition holds trivially if <i>L</i> is regular. More specifically, we use a natural binary encoding of finite graphs over a binary alphabet <span>(varSigma )</span>, and we define a regular set <span>(mathbb {G}subseteq varSigma ^*)</span> such that every nonempty word <span>(win mathbb {G})</span> defines a finite and nonempty graph. Also, graph properties can then be syntactically defined as languages over <span>(varSigma )</span>. Then, we ask whether the automaton <span>(mathcal {A})</span> specifies some graph satisfying a certain property <span>(varPhi )</span>. Our structural results show that we can answer this question for all “typical” graph properties. In order to show our results, we split <i>L</i> into a finite union of subsets and every subset of this union defines in a natural way a single finite graph <i>F</i> where some edges and vertices are marked. The marked graph in turn defines an infinite graph <span>(F^infty )</span> and therefore the family of finite subgraphs of <span>(F^infty )</span> where <i>F</i> appears as an induced subgraph. This yields a geometric description of all graphs specified by <i>L</i> based on splitting <i>L</i> into finitely many pieces; then using the notion of graph retraction, we obtain an easily understandable description of the graphs in each piece.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"59 4","pages":"357 - 385"},"PeriodicalIF":0.6,"publicationDate":"2022-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-022-00427-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41686213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Acta InformaticaPub Date : 2022-08-04DOI: 10.1007/s00236-022-00429-x
Petra Wolf
{"title":"On the decidability of finding a positive ILP-instance in a regular set of ILP-instances","authors":"Petra Wolf","doi":"10.1007/s00236-022-00429-x","DOIUrl":"10.1007/s00236-022-00429-x","url":null,"abstract":"<div><p>The regular intersection emptiness problem for a decision problem <i>P</i> (<span>({{textit{int}}_{{mathrm {Reg}}}})</span>(<i>P</i>)) is to decide whether a potentially infinite regular set of encoded <i>P</i>-instances contains a positive one. Since <span>({{textit{int}}_{{mathrm {Reg}}}})</span>(<i>P</i>) is decidable for some NP-complete problems and undecidable for others, its investigation provides insights in the nature of NP-complete problems. Moreover, the decidability of the <span>({{textit{int}}_{{mathrm {Reg}}}})</span>-problem is usually achieved by exploiting the regularity of the set of instances; thus, it also establishes a connection to formal language and automata theory. We consider the <span>({{textit{int}}_{{mathrm {Reg}}}})</span>-problem for the well-known NP-complete problem <span>Integer Linear Programming</span> (<span>ILP</span>). It is shown that any DFA that describes a set of <span>ILP</span>-instances (in a natural encoding) can be reduced to a finite core of instances that contains a positive one if and only if the original set of instances did. This result yields the decidability of <span>({{textit{int}}_{{mathrm {Reg}}}})</span>(<span>ILP</span>).</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"59 4","pages":"505 - 519"},"PeriodicalIF":0.6,"publicationDate":"2022-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-022-00429-x.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41604344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}