Acta Informatica最新文献

筛选
英文 中文
Lamplighter groups and automata 点灯组和自动机
IF 0.6 4区 计算机科学
Acta Informatica Pub Date : 2022-06-08 DOI: 10.1007/s00236-022-00423-3
Sanjay Jain, Birzhan Moldagaliyev, Frank Stephan, Tien Dat Tran
{"title":"Lamplighter groups and automata","authors":"Sanjay Jain,&nbsp;Birzhan Moldagaliyev,&nbsp;Frank Stephan,&nbsp;Tien Dat Tran","doi":"10.1007/s00236-022-00423-3","DOIUrl":"10.1007/s00236-022-00423-3","url":null,"abstract":"<div><p>This paper investigates presentations of lamplighter groups using computational models from automata theory. The present work shows that if <i>G</i> can be presented such that the full group operation is recognised by a transducer, then the same is true for the lamplighter group <span>(G wr {{mathbb {Z}}})</span> of <i>G</i>. Furthermore, Cayley presentations, where only multiplications with constants are recognised by transducers, are used to study generalised lamplighter groups of the form <span>(G wr {{mathbb {Z}}}^d)</span> and <span>(G wr F_d)</span>, where <span>(F_d)</span> is the free group over <i>d</i> generators. Additionally, <span>({{mathbb {Z}}}_k wr {{mathbb {Z}}}^2)</span> and <span>({{mathbb {Z}}}_k wr {F_d})</span> are shown to be Cayley tree automatic.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"59 4","pages":"451 - 478"},"PeriodicalIF":0.6,"publicationDate":"2022-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50014521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Depth-first search in directed planar graphs, revisited 有向平面图中的深度优先搜索,重访
IF 0.6 4区 计算机科学
Acta Informatica Pub Date : 2022-06-04 DOI: 10.1007/s00236-022-00425-1
Eric Allender, Archit Chauhan, Samir Datta
{"title":"Depth-first search in directed planar graphs, revisited","authors":"Eric Allender,&nbsp;Archit Chauhan,&nbsp;Samir Datta","doi":"10.1007/s00236-022-00425-1","DOIUrl":"10.1007/s00236-022-00425-1","url":null,"abstract":"<div><p>We present an algorithm for constructing a depth-first search tree in planar digraphs; the algorithm can be implemented in the complexity class <span>(text{ AC}^1(text{ UL }cap text{ co-UL}))</span>, which is contained in <span>(text{ AC}^2)</span>. Prior to this (for more than a quarter-century), the fastest uniform deterministic parallel algorithm for this problem had a runtime of <span>(O(log ^{10}n))</span> (corresponding to the complexity class <span>(text{ AC}^{10}subseteq text{ NC}^{11})</span>). We also consider the problem of computing depth-first search trees in other classes of graphs and obtain additional new upper bounds.\u0000</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"59 4","pages":"289 - 319"},"PeriodicalIF":0.6,"publicationDate":"2022-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45032441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secret-shared RAM indefinite private and secure RAM execution of perfectly unrevealed programs 秘密共享RAM完全未公开程序的无限私人和安全RAM执行
IF 0.6 4区 计算机科学
Acta Informatica Pub Date : 2022-04-20 DOI: 10.1007/s00236-022-00422-4
Shlomi Dolev, Yin Li
{"title":"Secret-shared RAM indefinite private and secure RAM execution of perfectly unrevealed programs","authors":"Shlomi Dolev,&nbsp;Yin Li","doi":"10.1007/s00236-022-00422-4","DOIUrl":"10.1007/s00236-022-00422-4","url":null,"abstract":"<div><p>Secure and private computations over random access machine (RAM) are preferred over computations with circuits or Turing machines. Secure RAM executions become more and more important in the scope of avoiding information leakage when executing programs over a single computer, as well as the clouds. In this paper, we proposed a novel scheme for evaluating RAM programs without revealing any information on the computation, including the program, the data, and the result. We use Shamir Secret Sharing to share all the program instructions and the private string matching technique to ensure the execution of the right instruction sequence. We stress that our scheme obtains information-theoretical security and does not rely on any computational hardness assumptions.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"60 1","pages":"59 - 78"},"PeriodicalIF":0.6,"publicationDate":"2022-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-022-00422-4.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46502702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reactive bisimulation semantics for a process algebra with timeouts 带有超时的进程代数的响应式双模拟语义
IF 0.6 4区 计算机科学
Acta Informatica Pub Date : 2022-04-08 DOI: 10.1007/s00236-022-00417-1
Rob van Glabbeek
{"title":"Reactive bisimulation semantics for a process algebra with timeouts","authors":"Rob van Glabbeek","doi":"10.1007/s00236-022-00417-1","DOIUrl":"10.1007/s00236-022-00417-1","url":null,"abstract":"<div><p>This paper introduces the counterpart of strong bisimilarity for labelled transition systems extended with timeout transitions. It supports this concept through a modal characterisation, congruence results for a standard process algebra with recursion, and a complete axiomatisation.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"60 1","pages":"11 - 57"},"PeriodicalIF":0.6,"publicationDate":"2022-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-022-00417-1.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47949564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Translation validation of coloured Petri net models of programs on integers 整数上程序的彩色Petri网模型的翻译验证
IF 0.6 4区 计算机科学
Acta Informatica Pub Date : 2022-04-06 DOI: 10.1007/s00236-022-00419-z
Soumyadip Bandyopadhyay, Dipankar Sarkar, Chittaranjan Mandal, Holger Giese
{"title":"Translation validation of coloured Petri net models of programs on integers","authors":"Soumyadip Bandyopadhyay,&nbsp;Dipankar Sarkar,&nbsp;Chittaranjan Mandal,&nbsp;Holger Giese","doi":"10.1007/s00236-022-00419-z","DOIUrl":"10.1007/s00236-022-00419-z","url":null,"abstract":"<div><p>Programs are often subjected to significant optimizing and parallelizing transformations based on extensive dependence analysis. Formal validation of such transformations needs modelling paradigms which can capture both control and data dependences in the program vividly. Being value-based with an inherent scope of capturing parallelism, the untimed coloured Petri net (CPN) models, reported in the literature, fit the bill well; accordingly, they are likely to be more convenient as the intermediate representations (IRs) of both the source and the transformed codes for translation validation than strictly sequential variable-based IRs like sequential control flow graphs (CFGs). In this work, an <i>efficient</i> path-based equivalence checking method for CPN models of programs on integers is presented. Extensive experimentation has been carried out on several sequential and parallel examples. Complexity and correctness issues have been treated rigorously for the method.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"59 6","pages":"725 - 759"},"PeriodicalIF":0.6,"publicationDate":"2022-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-022-00419-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42594701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
From regular expression matching to parsing 从正则表达式匹配到解析
IF 0.6 4区 计算机科学
Acta Informatica Pub Date : 2022-03-30 DOI: 10.1007/s00236-022-00420-6
Philip Bille, Inge Li Gørtz
{"title":"From regular expression matching to parsing","authors":"Philip Bille,&nbsp;Inge Li Gørtz","doi":"10.1007/s00236-022-00420-6","DOIUrl":"10.1007/s00236-022-00420-6","url":null,"abstract":"<div><p>Given a regular expression <i>R</i> and a string <i>Q</i>, the regular expression parsing problem is to determine if <i>Q</i> matches <i>R</i> and if so, determine how it matches, i.e., by a mapping of the characters of <i>Q</i> to the characters in <i>R</i>. Regular expression parsing makes finding matches of a regular expression even more useful by allowing us to directly extract subpatterns of the match, e.g., for extracting IP-addresses from internet traffic analysis or extracting subparts of genomes from genetic data bases. We present a new general techniques for efficiently converting a large class of algorithms that determine if a string <i>Q</i> matches regular expression <i>R</i> into algorithms that can construct a corresponding mapping. As a consequence, we obtain the first efficient linear space solutions for regular expression parsing.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"59 6","pages":"709 - 724"},"PeriodicalIF":0.6,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44390261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
(mathcal {L})-reduction computation revisited 重新讨论(mathcal{L})-归约计算
IF 0.6 4区 计算机科学
Acta Informatica Pub Date : 2022-03-24 DOI: 10.1007/s00236-022-00418-0
Kaoru Fujioka, Fumiya Okubo, Takashi Yokomori
{"title":"(mathcal {L})-reduction computation revisited","authors":"Kaoru Fujioka,&nbsp;Fumiya Okubo,&nbsp;Takashi Yokomori","doi":"10.1007/s00236-022-00418-0","DOIUrl":"10.1007/s00236-022-00418-0","url":null,"abstract":"<div><p>Let <i>K</i> and <i>L</i> be two languages over <span>(Sigma )</span> and <span>(Gamma )</span> (with <span>(Gamma subset Sigma )</span>), respectively. Then, the <i>L</i>-reduction of <i>K</i>, denoted by <span>(K%,L)</span>, is defined by <span>({ u_0u_1cdots u_n in (Sigma - Gamma )^* mid u_0v_1u_1 cdots v_nu_n in K, v_i in L (1le i le n) })</span>. This is extended to language classes as follows: <span>({mathcal {K}}% {mathcal {L}}={K%L mid K in {mathcal {K}}, , L in {mathcal {L}} })</span>. In this paper, we investigate the computing powers of <span>(mathcal {K}%,mathcal {L})</span> in which <span>(mathcal {K})</span> ranges among various classes of <span>(mathcal {INS}^i_{!!j})</span> and min-<span>(mathcal {LIN})</span>, while <span>(mathcal {L})</span> is taken as <span>(mathcal {DYCK})</span> and <span>(mathcal {F})</span>, where <span>(mathcal {INS}^i_{!!j})</span>: the class of insertion languages of weight (<i>j</i>, <i>i</i>), min-<span>(mathcal {LIN})</span>: the class of minimal linear languages, <span>(mathcal {DYCK})</span>: the class of Dyck languages, and <span>(mathcal {F})</span>: the class of finite languages. The obtained results include:</p><ul>\u0000 <li>\u0000 <p><span>(mathcal {INS}^1_1,%,mathcal {DYCK}=mathcal {RE})</span></p>\u0000 </li>\u0000 <li>\u0000 <p><span>(mathcal {INS}^0_i,%,mathcal {F}= mathcal {INS}^1_j,%,mathcal {F}=mathcal {CF})</span> (for <span>(ige 3)</span> and <span>(jge 1)</span>)</p>\u0000 </li>\u0000 <li>\u0000 <p><span>(mathcal {INS}^0_2,%,mathcal {DYCK}=mathcal {INS}^0_2)</span></p>\u0000 </li>\u0000 <li>\u0000 <p>min-<span>(mathcal {LIN},%,mathcal {F}_1=mathcal {LIN})</span></p>\u0000 </li>\u0000 </ul><p> where <span>(mathcal {RE})</span>, <span>(mathcal {CF})</span>, <span>(mathcal {LIN})</span>, <span>(mathcal {F}_1)</span> are classes of recursively enumerable, of context-free, of linear languages, and of singleton languages over unary alphabet, respectively. Further, we provide a very simple alternative proof for the known result min-<span>(mathcal {LIN},%,mathcal {DYCK}_2=mathcal {RE})</span>. We also show that with a certain condition, for the class of context-sensitive languages <span>(mathcal {CS})</span>, there exists no <span>(mathcal {K})</span> such that <span>(mathcal {K}%,mathcal {DYCK}=mathcal {CS})</span>, which is in marked contrast to the characterization results mentioned above for other classes in Chomsky hierarchy. It should be remarked from the viewpoint of molecular computing theory that the notion of <i>L</i>-reduction is naturally motivated by a molecular biological functioning well-known as RNA splicing occurring in most eukaryotic genes.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"59 4","pages":"409 - 426"},"PeriodicalIF":0.6,"publicationDate":"2022-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50102392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ldocumentclass[12pt]{minimal} usepackage{amsmath} usepackage{wasysym} usepackage{amsfonts} usepackage{amssymb} usepackage{amsbsy} usepackage{mathrsfs} usepackage{upgreek} setlength{oddsidemargin}{-69pt} begin{document}$$mathcal {L}$$end{document}-reduction computation revisited Ldocumentclass[12pt]{minimal} usepackage{amsmath} usepackage{wasysym} usepackage{amsfonts} usepackage{amssymb} usepackage{amsbsy} usepackage{mathrsfs} usepackage{upgreek} setlength{oddsidemargin}{-69pt} begin{document}$$mathcal {L}$$end{document}-reduction computation revisited
IF 0.6 4区 计算机科学
Acta Informatica Pub Date : 2022-03-24 DOI: 10.1007/s00236-022-00418-0
Kaoru Fujioka, Fumiya Okubo, T. Yokomori
{"title":"Ldocumentclass[12pt]{minimal} usepackage{amsmath} usepackage{wasysym} usepackage{amsfonts} usepackage{amssymb} usepackage{amsbsy} usepackage{mathrsfs} usepackage{upgreek} setlength{oddsidemargin}{-69pt} begin{document}$$mathcal {L}$$end{document}-reduction computation revisited","authors":"Kaoru Fujioka, Fumiya Okubo, T. Yokomori","doi":"10.1007/s00236-022-00418-0","DOIUrl":"https://doi.org/10.1007/s00236-022-00418-0","url":null,"abstract":"","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"59 1","pages":"409 - 426"},"PeriodicalIF":0.6,"publicationDate":"2022-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46875681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Minimum status of trees with a given degree sequence 具有给定度序列的树的最小状态
IF 0.6 4区 计算机科学
Acta Informatica Pub Date : 2022-02-17 DOI: 10.1007/s00236-022-00416-2
Haiyan Guo, Bo Zhou
{"title":"Minimum status of trees with a given degree sequence","authors":"Haiyan Guo,&nbsp;Bo Zhou","doi":"10.1007/s00236-022-00416-2","DOIUrl":"10.1007/s00236-022-00416-2","url":null,"abstract":"<div><p>The minimum status (or its normalized version called proximity) is a well-known concept in communication network theory. We determine the trees minimizing the minimum status among trees with a given degree sequence, and we show that the trees maximizing the minimum status among trees with a given degree sequence must be caterpillars with specific properties.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"60 1","pages":"1 - 10"},"PeriodicalIF":0.6,"publicationDate":"2022-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45578220","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On Huang and Wong’s algorithm for generalized binary split trees 广义二叉树的Huang和Wong算法
IF 0.6 4区 计算机科学
Acta Informatica Pub Date : 2022-02-14 DOI: 10.1007/s00236-021-00411-z
Marek Chrobak, Mordecai Golin, J. Ian Munro, Neal E. Young
{"title":"On Huang and Wong’s algorithm for generalized binary split trees","authors":"Marek Chrobak,&nbsp;Mordecai Golin,&nbsp;J. Ian Munro,&nbsp;Neal E. Young","doi":"10.1007/s00236-021-00411-z","DOIUrl":"10.1007/s00236-021-00411-z","url":null,"abstract":"<div><p>Huang and Wong (Acta Inform 21(1):113–123, 1984) proposed a polynomial-time dynamic-programming algorithm for computing optimal generalized binary split trees. We show that their algorithm is incorrect. Thus, it remains open whether such trees can be computed in polynomial time. Spuler (Optimal search trees using two-way key comparisons, PhD thesis, 1994) proposed modifying Huang and Wong’s algorithm to obtain an algorithm for a different problem: computing optimal two-way comparison search trees. We show that the dynamic program underlying Spuler’s algorithm is not valid, in that it does not satisfy the necessary optimal-substructure property and its proposed recurrence relation is incorrect. It remains unknown whether the algorithm is guaranteed to compute a correct overall solution.\u0000</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"59 6","pages":"687 - 708"},"PeriodicalIF":0.6,"publicationDate":"2022-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-021-00411-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43409449","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信