Acta InformaticaPub Date : 2022-07-19DOI: 10.1007/s00236-022-00430-4
Asaf Levin, Tal Shusterman
{"title":"Weighted throughput in a single machine preemptive scheduling with continuous controllable processing times","authors":"Asaf Levin, Tal Shusterman","doi":"10.1007/s00236-022-00430-4","DOIUrl":"10.1007/s00236-022-00430-4","url":null,"abstract":"<div><p>We consider the problem of weighted throughput in the single machine preemptive scheduling with continuous controllable processing times. A set of tasks can be scheduled on a single machine. Each task <i>j</i> is associated with a nonnegative weight <span>(w_{j})</span>, a release date, a due date, and an interval of possible processing times. A task <i>j</i> can either be scheduled with a total processing time <span>(p_j)</span> which is in the given interval, or rejected (not participating in the schedule). The reward for processing <i>j</i> for <span>(p_{j})</span> time units is <span>(w_{j}p_{j})</span>, and we are interested in constructing a feasible preemptive schedule such that the sum of rewards is maximized. We present a dynamic programming algorithm that solves the problem in pseudo-polynomial time and use it to obtain an FPTAS. Afterward, as our main contribution we propose an interesting efficient frontier approach for improved complexity bounds.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"60 2","pages":"101 - 122"},"PeriodicalIF":0.6,"publicationDate":"2022-07-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44782247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Acta InformaticaPub Date : 2022-06-26DOI: 10.1007/s00236-022-00424-2
Dietrich Kuske, Christian Schwarz
{"title":"Alternating complexity of counting first-order logic for the subword order","authors":"Dietrich Kuske, Christian Schwarz","doi":"10.1007/s00236-022-00424-2","DOIUrl":"10.1007/s00236-022-00424-2","url":null,"abstract":"<div><p>This paper considers the structure consisting of the set of all words over a given alphabet together with the subword relation, regular predicates, and constants for every word. We are interested in the counting extension of first-order logic by threshold counting quantifiers. The main result shows that the two-variable fragment of this logic can be decided in twofold exponential alternating time with linearly many alternations (and therefore in particular in twofold exponential space as announced in the conference version (Kuske and Schwarz, in: MFCS’20, Leibniz International Proceedings in Informatics (LIPIcs) vol. 170, pp 56:1–56:13. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2020) of this paper) provided the regular predicates are restricted to piecewise testable ones. This result improves prior insights by Karandikar and Schnoebelen by extending the logic and saving one exponent in the space bound. Its proof consists of two main parts: First, we provide a quantifier elimination procedure that results in a formula with constants of bounded length (this generalises the procedure by Karandikar and Schnoebelen for first-order logic). From this, it follows that quantification in formulas can be restricted to words of bounded length, i.e., the second part of the proof is an adaptation of the method by Ferrante and Rackoff to counting logic and deviates significantly from the path of reasoning by Karandikar and Schnoebelen.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"60 1","pages":"79 - 100"},"PeriodicalIF":0.6,"publicationDate":"2022-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-022-00424-2.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42991457","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Acta InformaticaPub Date : 2022-06-08DOI: 10.1007/s00236-022-00423-3
Sanjay Jain, Birzhan Moldagaliyev, F. Stephan, Tien Dat Tran
{"title":"Lamplighter groups and automata","authors":"Sanjay Jain, Birzhan Moldagaliyev, F. Stephan, Tien Dat Tran","doi":"10.1007/s00236-022-00423-3","DOIUrl":"https://doi.org/10.1007/s00236-022-00423-3","url":null,"abstract":"","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"59 1","pages":"451 - 478"},"PeriodicalIF":0.6,"publicationDate":"2022-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"52289547","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Acta InformaticaPub Date : 2022-06-08DOI: 10.1007/s00236-022-00423-3
Sanjay Jain, Birzhan Moldagaliyev, Frank Stephan, Tien Dat Tran
{"title":"Lamplighter groups and automata","authors":"Sanjay Jain, Birzhan Moldagaliyev, Frank Stephan, Tien Dat Tran","doi":"10.1007/s00236-022-00423-3","DOIUrl":"10.1007/s00236-022-00423-3","url":null,"abstract":"<div><p>This paper investigates presentations of lamplighter groups using computational models from automata theory. The present work shows that if <i>G</i> can be presented such that the full group operation is recognised by a transducer, then the same is true for the lamplighter group <span>(G wr {{mathbb {Z}}})</span> of <i>G</i>. Furthermore, Cayley presentations, where only multiplications with constants are recognised by transducers, are used to study generalised lamplighter groups of the form <span>(G wr {{mathbb {Z}}}^d)</span> and <span>(G wr F_d)</span>, where <span>(F_d)</span> is the free group over <i>d</i> generators. Additionally, <span>({{mathbb {Z}}}_k wr {{mathbb {Z}}}^2)</span> and <span>({{mathbb {Z}}}_k wr {F_d})</span> are shown to be Cayley tree automatic.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"59 4","pages":"451 - 478"},"PeriodicalIF":0.6,"publicationDate":"2022-06-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50014521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Acta InformaticaPub Date : 2022-06-04DOI: 10.1007/s00236-022-00425-1
Eric Allender, Archit Chauhan, Samir Datta
{"title":"Depth-first search in directed planar graphs, revisited","authors":"Eric Allender, Archit Chauhan, Samir Datta","doi":"10.1007/s00236-022-00425-1","DOIUrl":"10.1007/s00236-022-00425-1","url":null,"abstract":"<div><p>We present an algorithm for constructing a depth-first search tree in planar digraphs; the algorithm can be implemented in the complexity class <span>(text{ AC}^1(text{ UL }cap text{ co-UL}))</span>, which is contained in <span>(text{ AC}^2)</span>. Prior to this (for more than a quarter-century), the fastest uniform deterministic parallel algorithm for this problem had a runtime of <span>(O(log ^{10}n))</span> (corresponding to the complexity class <span>(text{ AC}^{10}subseteq text{ NC}^{11})</span>). We also consider the problem of computing depth-first search trees in other classes of graphs and obtain additional new upper bounds.\u0000</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"59 4","pages":"289 - 319"},"PeriodicalIF":0.6,"publicationDate":"2022-06-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45032441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Acta InformaticaPub Date : 2022-04-20DOI: 10.1007/s00236-022-00422-4
Shlomi Dolev, Yin Li
{"title":"Secret-shared RAM indefinite private and secure RAM execution of perfectly unrevealed programs","authors":"Shlomi Dolev, Yin Li","doi":"10.1007/s00236-022-00422-4","DOIUrl":"10.1007/s00236-022-00422-4","url":null,"abstract":"<div><p>Secure and private computations over random access machine (RAM) are preferred over computations with circuits or Turing machines. Secure RAM executions become more and more important in the scope of avoiding information leakage when executing programs over a single computer, as well as the clouds. In this paper, we proposed a novel scheme for evaluating RAM programs without revealing any information on the computation, including the program, the data, and the result. We use Shamir Secret Sharing to share all the program instructions and the private string matching technique to ensure the execution of the right instruction sequence. We stress that our scheme obtains information-theoretical security and does not rely on any computational hardness assumptions.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"60 1","pages":"59 - 78"},"PeriodicalIF":0.6,"publicationDate":"2022-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-022-00422-4.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46502702","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Acta InformaticaPub Date : 2022-04-08DOI: 10.1007/s00236-022-00417-1
Rob van Glabbeek
{"title":"Reactive bisimulation semantics for a process algebra with timeouts","authors":"Rob van Glabbeek","doi":"10.1007/s00236-022-00417-1","DOIUrl":"10.1007/s00236-022-00417-1","url":null,"abstract":"<div><p>This paper introduces the counterpart of strong bisimilarity for labelled transition systems extended with timeout transitions. It supports this concept through a modal characterisation, congruence results for a standard process algebra with recursion, and a complete axiomatisation.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"60 1","pages":"11 - 57"},"PeriodicalIF":0.6,"publicationDate":"2022-04-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-022-00417-1.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47949564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Translation validation of coloured Petri net models of programs on integers","authors":"Soumyadip Bandyopadhyay, Dipankar Sarkar, Chittaranjan Mandal, Holger Giese","doi":"10.1007/s00236-022-00419-z","DOIUrl":"10.1007/s00236-022-00419-z","url":null,"abstract":"<div><p>Programs are often subjected to significant optimizing and parallelizing transformations based on extensive dependence analysis. Formal validation of such transformations needs modelling paradigms which can capture both control and data dependences in the program vividly. Being value-based with an inherent scope of capturing parallelism, the untimed coloured Petri net (CPN) models, reported in the literature, fit the bill well; accordingly, they are likely to be more convenient as the intermediate representations (IRs) of both the source and the transformed codes for translation validation than strictly sequential variable-based IRs like sequential control flow graphs (CFGs). In this work, an <i>efficient</i> path-based equivalence checking method for CPN models of programs on integers is presented. Extensive experimentation has been carried out on several sequential and parallel examples. Complexity and correctness issues have been treated rigorously for the method.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"59 6","pages":"725 - 759"},"PeriodicalIF":0.6,"publicationDate":"2022-04-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-022-00419-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42594701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Acta InformaticaPub Date : 2022-03-30DOI: 10.1007/s00236-022-00420-6
Philip Bille, Inge Li Gørtz
{"title":"From regular expression matching to parsing","authors":"Philip Bille, Inge Li Gørtz","doi":"10.1007/s00236-022-00420-6","DOIUrl":"10.1007/s00236-022-00420-6","url":null,"abstract":"<div><p>Given a regular expression <i>R</i> and a string <i>Q</i>, the regular expression parsing problem is to determine if <i>Q</i> matches <i>R</i> and if so, determine how it matches, i.e., by a mapping of the characters of <i>Q</i> to the characters in <i>R</i>. Regular expression parsing makes finding matches of a regular expression even more useful by allowing us to directly extract subpatterns of the match, e.g., for extracting IP-addresses from internet traffic analysis or extracting subparts of genomes from genetic data bases. We present a new general techniques for efficiently converting a large class of algorithms that determine if a string <i>Q</i> matches regular expression <i>R</i> into algorithms that can construct a corresponding mapping. As a consequence, we obtain the first efficient linear space solutions for regular expression parsing.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"59 6","pages":"709 - 724"},"PeriodicalIF":0.6,"publicationDate":"2022-03-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44390261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Acta InformaticaPub Date : 2022-03-24DOI: 10.1007/s00236-022-00418-0
Kaoru Fujioka, Fumiya Okubo, Takashi Yokomori
{"title":"(mathcal {L})-reduction computation revisited","authors":"Kaoru Fujioka, Fumiya Okubo, Takashi Yokomori","doi":"10.1007/s00236-022-00418-0","DOIUrl":"10.1007/s00236-022-00418-0","url":null,"abstract":"<div><p>Let <i>K</i> and <i>L</i> be two languages over <span>(Sigma )</span> and <span>(Gamma )</span> (with <span>(Gamma subset Sigma )</span>), respectively. Then, the <i>L</i>-reduction of <i>K</i>, denoted by <span>(K%,L)</span>, is defined by <span>({ u_0u_1cdots u_n in (Sigma - Gamma )^* mid u_0v_1u_1 cdots v_nu_n in K, v_i in L (1le i le n) })</span>. This is extended to language classes as follows: <span>({mathcal {K}}% {mathcal {L}}={K%L mid K in {mathcal {K}}, , L in {mathcal {L}} })</span>. In this paper, we investigate the computing powers of <span>(mathcal {K}%,mathcal {L})</span> in which <span>(mathcal {K})</span> ranges among various classes of <span>(mathcal {INS}^i_{!!j})</span> and min-<span>(mathcal {LIN})</span>, while <span>(mathcal {L})</span> is taken as <span>(mathcal {DYCK})</span> and <span>(mathcal {F})</span>, where <span>(mathcal {INS}^i_{!!j})</span>: the class of insertion languages of weight (<i>j</i>, <i>i</i>), min-<span>(mathcal {LIN})</span>: the class of minimal linear languages, <span>(mathcal {DYCK})</span>: the class of Dyck languages, and <span>(mathcal {F})</span>: the class of finite languages. The obtained results include:</p><ul>\u0000 <li>\u0000 <p><span>(mathcal {INS}^1_1,%,mathcal {DYCK}=mathcal {RE})</span></p>\u0000 </li>\u0000 <li>\u0000 <p><span>(mathcal {INS}^0_i,%,mathcal {F}= mathcal {INS}^1_j,%,mathcal {F}=mathcal {CF})</span> (for <span>(ige 3)</span> and <span>(jge 1)</span>)</p>\u0000 </li>\u0000 <li>\u0000 <p><span>(mathcal {INS}^0_2,%,mathcal {DYCK}=mathcal {INS}^0_2)</span></p>\u0000 </li>\u0000 <li>\u0000 <p>min-<span>(mathcal {LIN},%,mathcal {F}_1=mathcal {LIN})</span></p>\u0000 </li>\u0000 </ul><p> where <span>(mathcal {RE})</span>, <span>(mathcal {CF})</span>, <span>(mathcal {LIN})</span>, <span>(mathcal {F}_1)</span> are classes of recursively enumerable, of context-free, of linear languages, and of singleton languages over unary alphabet, respectively. Further, we provide a very simple alternative proof for the known result min-<span>(mathcal {LIN},%,mathcal {DYCK}_2=mathcal {RE})</span>. We also show that with a certain condition, for the class of context-sensitive languages <span>(mathcal {CS})</span>, there exists no <span>(mathcal {K})</span> such that <span>(mathcal {K}%,mathcal {DYCK}=mathcal {CS})</span>, which is in marked contrast to the characterization results mentioned above for other classes in Chomsky hierarchy. It should be remarked from the viewpoint of molecular computing theory that the notion of <i>L</i>-reduction is naturally motivated by a molecular biological functioning well-known as RNA splicing occurring in most eukaryotic genes.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"59 4","pages":"409 - 426"},"PeriodicalIF":0.6,"publicationDate":"2022-03-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"50102392","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}