id
stringlengths
9
10
submitter
stringlengths
2
52
authors
stringlengths
4
6.51k
title
stringlengths
4
246
comments
stringlengths
1
523
journal-ref
stringlengths
4
345
doi
stringlengths
11
120
report-no
stringlengths
2
243
categories
stringlengths
5
98
license
stringclasses
9 values
abstract
stringlengths
33
3.33k
versions
list
update_date
timestamp[s]
authors_parsed
list
prediction
stringclasses
1 value
probability
float64
0.95
1
2306.12552
Yunxiang Zhang
Yunxiang Zhang, Xiaojun Wan
SituatedGen: Incorporating Geographical and Temporal Contexts into Generative Commonsense Reasoning
null
null
null
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Recently, commonsense reasoning in text generation has attracted much attention. Generative commonsense reasoning is the task that requires machines, given a group of keywords, to compose a single coherent sentence with commonsense plausibility. While existing datasets targeting generative commonsense reasoning focus on everyday scenarios, it is unclear how well machines reason under specific geographical and temporal contexts. We formalize this challenging task as SituatedGen, where machines with commonsense should generate a pair of contrastive sentences given a group of keywords including geographical or temporal entities. We introduce a corresponding English dataset consisting of 8,268 contrastive sentence pairs, which are built upon several existing commonsense reasoning benchmarks with minimal manual labor. Experiments show that state-of-the-art generative language models struggle to generate sentences with commonsense plausibility and still lag far behind human performance. Our dataset is publicly available at https://github.com/yunx-z/situated_gen.
[ { "version": "v1", "created": "Wed, 21 Jun 2023 20:36:55 GMT" } ]
2023-06-23T00:00:00
[ [ "Zhang", "Yunxiang", "" ], [ "Wan", "Xiaojun", "" ] ]
new_dataset
0.989812
2306.12567
Koji Mineshima
Risako Ando, Takanobu Morishita, Hirohiko Abe, Koji Mineshima, Mitsuhiro Okada
Evaluating Large Language Models with NeuBAROCO: Syllogistic Reasoning Ability and Human-like Biases
To appear in Proceedings of the 4th Natural Logic Meets Machine Learning Workshop (NALOMA IV)
null
null
null
cs.CL cs.AI
http://creativecommons.org/licenses/by/4.0/
This paper investigates whether current large language models exhibit biases in logical reasoning, similar to humans. Specifically, we focus on syllogistic reasoning, a well-studied form of inference in the cognitive science of human deduction. To facilitate our analysis, we introduce a dataset called NeuBAROCO, originally designed for psychological experiments that assess human logical abilities in syllogistic reasoning. The dataset consists of syllogistic inferences in both English and Japanese. We examine three types of biases observed in human syllogistic reasoning: belief biases, conversion errors, and atmosphere effects. Our findings demonstrate that current large language models struggle more with problems involving these three types of biases.
[ { "version": "v1", "created": "Wed, 21 Jun 2023 21:04:11 GMT" } ]
2023-06-23T00:00:00
[ [ "Ando", "Risako", "" ], [ "Morishita", "Takanobu", "" ], [ "Abe", "Hirohiko", "" ], [ "Mineshima", "Koji", "" ], [ "Okada", "Mitsuhiro", "" ] ]
new_dataset
0.998702
2306.12611
David Eppstein
David Eppstein and Rose McCarty
Geometric Graphs with Unbounded Flip-Width
10 pages, 7 figures. To appear at CCCG 2023
null
null
null
cs.CG math.CO
http://creativecommons.org/licenses/by/4.0/
We consider the flip-width of geometric graphs, a notion of graph width recently introduced by Toru\'nczyk. We prove that many different types of geometric graphs have unbounded flip-width. These include interval graphs, permutation graphs, circle graphs, intersection graphs of axis-aligned line segments or axis-aligned unit squares, unit distance graphs, unit disk graphs, visibility graphs of simple polygons, $\beta$-skeletons, 4-polytopes, rectangle of influence graphs, and 3d Delaunay triangulations.
[ { "version": "v1", "created": "Thu, 22 Jun 2023 00:16:13 GMT" } ]
2023-06-23T00:00:00
[ [ "Eppstein", "David", "" ], [ "McCarty", "Rose", "" ] ]
new_dataset
0.993021
2306.12612
Nicholas Barbara
Nicholas H. Barbara, Max Revay, Ruigang Wang, Jing Cheng, Ian R. Manchester
RobustNeuralNetworks.jl: a Package for Machine Learning and Data-Driven Control with Certified Robustness
null
null
null
null
cs.LG cs.SY eess.SY
http://creativecommons.org/licenses/by/4.0/
Neural networks are typically sensitive to small input perturbations, leading to unexpected or brittle behaviour. We present RobustNeuralNetworks.jl: a Julia package for neural network models that are constructed to naturally satisfy a set of user-defined robustness constraints. The package is based on the recently proposed Recurrent Equilibrium Network (REN) and Lipschitz-Bounded Deep Network (LBDN) model classes, and is designed to interface directly with Julia's most widely-used machine learning package, Flux.jl. We discuss the theory behind our model parameterization, give an overview of the package, and provide a tutorial demonstrating its use in image classification, reinforcement learning, and nonlinear state-observer design.
[ { "version": "v1", "created": "Thu, 22 Jun 2023 00:23:37 GMT" } ]
2023-06-23T00:00:00
[ [ "Barbara", "Nicholas H.", "" ], [ "Revay", "Max", "" ], [ "Wang", "Ruigang", "" ], [ "Cheng", "Jing", "" ], [ "Manchester", "Ian R.", "" ] ]
new_dataset
0.999368
2306.12649
Tomohiro Motoda
Shusei Nagato, Tomohiro Motoda, Takao Nishi, Petit Damien, Takuya Kiyokawa, Weiwei Wan, Kensuke Harada
Probabilistic Slide-support Manipulation Planning in Clutter
IEEE/RSJ International Conference on Intelligent Robots and Systems (IROS 2023) (Accepted)
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
To safely and efficiently extract an object from the clutter, this paper presents a bimanual manipulation planner in which one hand of the robot is used to slide the target object out of the clutter while the other hand is used to support the surrounding objects to prevent the clutter from collapsing. Our method uses a neural network to predict the physical phenomena of the clutter when the target object is moved. We generate the most efficient action based on the Monte Carlo tree search.The grasping and sliding actions are planned to minimize the number of motion sequences to pick the target object. In addition, the object to be supported is determined to minimize the position change of surrounding objects. Experiments with a real bimanual robot confirmed that the robot could retrieve the target object, reducing the total number of motion sequences and improving safety.
[ { "version": "v1", "created": "Thu, 22 Jun 2023 03:33:42 GMT" } ]
2023-06-23T00:00:00
[ [ "Nagato", "Shusei", "" ], [ "Motoda", "Tomohiro", "" ], [ "Nishi", "Takao", "" ], [ "Damien", "Petit", "" ], [ "Kiyokawa", "Takuya", "" ], [ "Wan", "Weiwei", "" ], [ "Harada", "Kensuke", "" ] ]
new_dataset
0.952468
2306.12679
Zeinab Rajabi Dr
Mojtaba Mazoochi (ICT Research Institute, Tehran, Iran), Leyla Rabiei (Iran Telecommunication Research Center (ITRC), Tehran, Iran), Farzaneh Rahmani (Iran Telecommunication Research Center (ITRC), Tehran, Iran), Zeinab Rajabi (Iran Telecommunication Research Center (ITRC), Tehran, Iran)
Constructing Colloquial Dataset for Persian Sentiment Analysis of Social Microblogs
null
null
null
null
cs.CL
http://creativecommons.org/licenses/by-nc-nd/4.0/
Introduction: Microblogging websites have massed rich data sources for sentiment analysis and opinion mining. In this regard, sentiment classification has frequently proven inefficient because microblog posts typically lack syntactically consistent terms and representatives since users on these social networks do not like to write lengthy statements. Also, there are some limitations to low-resource languages. The Persian language has exceptional characteristics and demands unique annotated data and models for the sentiment analysis task, which are distinctive from text features within the English dialect. Method: This paper first constructs a user opinion dataset called ITRC-Opinion by collaborative environment and insource way. Our dataset contains 60,000 informal and colloquial Persian texts from social microblogs such as Twitter and Instagram. Second, this study proposes a new deep convolutional neural network (CNN) model for more effective sentiment analysis of colloquial text in social microblog posts. The constructed datasets are used to evaluate the presented model. Furthermore, some models, such as LSTM, CNN-RNN, BiLSTM, and BiGRU with different word embeddings, including Fasttext, Glove, and Word2vec, investigated our dataset and evaluated the results. Results: The results demonstrate the benefit of our dataset and the proposed model (72% accuracy), displaying meaningful improvement in sentiment classification performance.
[ { "version": "v1", "created": "Thu, 22 Jun 2023 05:51:22 GMT" } ]
2023-06-23T00:00:00
[ [ "Mazoochi", "Mojtaba", "", "ICT Research Institute, Tehran, Iran" ], [ "Rabiei", "Leyla", "", "Iran Telecommunication Research Center" ], [ "Rahmani", "Farzaneh", "", "Iran Telecommunication Research Center" ], [ "Rajabi", "Zeinab", "", "Iran Telecommunication Research Center" ] ]
new_dataset
0.995356
2306.12705
Guanqun Cao
Guanqun Cao, Jiaqi Jiang, Danushka Bollegala, Min Li and Shan Luo
Multimodal Zero-Shot Learning for Tactile Texture Recognition
Under review at Robotics and Autonomous Systems
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Tactile sensing plays an irreplaceable role in robotic material recognition. It enables robots to distinguish material properties such as their local geometry and textures, especially for materials like textiles. However, most tactile recognition methods can only classify known materials that have been touched and trained with tactile data, yet cannot classify unknown materials that are not trained with tactile data. To solve this problem, we propose a tactile zero-shot learning framework to recognise unknown materials when they are touched for the first time without requiring training tactile samples. The visual modality, providing tactile cues from sight, and semantic attributes, giving high-level characteristics, are combined together to bridge the gap between touched classes and untouched classes. A generative model is learnt to synthesise tactile features according to corresponding visual images and semantic embeddings, and then a classifier can be trained using the synthesised tactile features of untouched materials for zero-shot recognition. Extensive experiments demonstrate that our proposed multimodal generative model can achieve a high recognition accuracy of 83.06% in classifying materials that were not touched before. The robotic experiment demo and the dataset are available at https://sites.google.com/view/multimodalzsl.
[ { "version": "v1", "created": "Thu, 22 Jun 2023 07:24:56 GMT" } ]
2023-06-23T00:00:00
[ [ "Cao", "Guanqun", "" ], [ "Jiang", "Jiaqi", "" ], [ "Bollegala", "Danushka", "" ], [ "Li", "Min", "" ], [ "Luo", "Shan", "" ] ]
new_dataset
0.990166
2306.12759
Ana\"is Villedieu
Michael Huber, Martin N\"ollenburg, Ana\"is Villedieu
MySemCloud: Semantic-aware Word Cloud Editing
Appeared at PacificVis 2023
null
10.1109/PacificVis56936.2023.00024
null
cs.HC cs.GR
http://creativecommons.org/licenses/by/4.0/
Word clouds are a popular text visualization technique that summarize an input text by displaying its most important words in a compact image. The traditional layout methods do not take proximity effects between words into account; this has been improved in semantic word clouds, where relative word placement is controlled by edges in a word similarity graph. We introduce MySemCloud, a new human-in-the-loop tool to visualize and edit semantic word clouds. MySemCloud lets users perform computer-assisted local moves of words, which improve or at least retain the semantic quality. To achieve this, we construct a word similarity graph on which a system of forces is applied to generate a compact initial layout with good semantic quality. The force system also allows us to maintain these attributes after each user interaction, as well as preserve the user's mental map. The tool provides algorithmic support for the editing operations to help the user enhance the semantic quality of the visualization, while adjusting it to their personal preference. We show that MySemCloud provides high user satisfaction as well as permits users to create layouts of higher quality than state-of-the-art semantic word cloud generation tools.
[ { "version": "v1", "created": "Thu, 22 Jun 2023 09:28:36 GMT" } ]
2023-06-23T00:00:00
[ [ "Huber", "Michael", "" ], [ "Nöllenburg", "Martin", "" ], [ "Villedieu", "Anaïs", "" ] ]
new_dataset
0.994038
2306.12785
Mohammad Reza Hasanabadi
Mohammad Reza Hasanabadi Majid Behdad Davood Gharavian
MFCCGAN: A Novel MFCC-Based Speech Synthesizer Using Adversarial Learning
ICASSP 2023 - 2023 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
null
10.1109/ICASSP49357.2023.10095873
null
cs.SD cs.AI eess.AS
http://creativecommons.org/publicdomain/zero/1.0/
In this paper, we introduce MFCCGAN as a novel speech synthesizer based on adversarial learning that adopts MFCCs as input and generates raw speech waveforms. Benefiting the GAN model capabilities, it produces speech with higher intelligibility than a rule-based MFCC-based speech synthesizer WORLD. We evaluated the model based on a popular intrusive objective speech intelligibility measure (STOI) and quality (NISQA score). Experimental results show that our proposed system outperforms Librosa MFCC- inversion (by an increase of about 26% up to 53% in STOI and 16% up to 78% in NISQA score) and a rise of about 10% in intelligibility and about 4% in naturalness in comparison with conventional rule-based vocoder WORLD that used in the CycleGAN-VC family. However, WORLD needs additional data like F0. Finally, using perceptual loss in discriminators based on STOI could improve the quality more. WebMUSHRA-based subjective tests also show the quality of the proposed approach.
[ { "version": "v1", "created": "Thu, 22 Jun 2023 10:29:24 GMT" } ]
2023-06-23T00:00:00
[ [ "Gharavian", "Mohammad Reza Hasanabadi Majid Behdad Davood", "" ] ]
new_dataset
0.993101
2306.12792
Shir Rorberg
Shir Rorberg, Amir Vaxman, Mirela Ben-Chen
BPM: Blended Piecewise Moebius Maps
null
null
null
null
cs.GR
http://creativecommons.org/licenses/by-nc-sa/4.0/
We propose a novel Moebius interpolator that takes as an input a discrete map between the vertices of two planar triangle meshes, and outputs a smooth map on the input domain. The output map interpolates the discrete map, is continuous between triangles, and has low quasi-conformal distortion when the input map is discrete conformal. Our map leads to considerably smoother texture transfer compared to the alternatives, even on very coarse triangulations. Furthermore, our approach has a closed-form expression, is local, applicable to any discrete map, and leads to smooth results even for extreme deformations. Finally, by working with local intrinsic coordinates, our approach is easily generalizable to discrete maps between a surface triangle mesh and a planar mesh, i.e., a planar parameterization. We compare our method with existing approaches, and demonstrate better texture transfer results, and lower quasi-conformal errors.
[ { "version": "v1", "created": "Thu, 22 Jun 2023 10:47:52 GMT" } ]
2023-06-23T00:00:00
[ [ "Rorberg", "Shir", "" ], [ "Vaxman", "Amir", "" ], [ "Ben-Chen", "Mirela", "" ] ]
new_dataset
0.988633
2306.12819
Aya Mohamed
Aya Mohamed, Dagmar Auer, Daniel Hofer, Josef K\"ung
XACML Extension for Graphs: Flexible Authorization Policy Specification and Datastore-independent Enforcement
Extended version of an accepted paper at the 20th International Conference on Security and Cryptography (SECRYPT), 2023
null
null
null
cs.CR
http://creativecommons.org/licenses/by-nc-nd/4.0/
The increasing use of graph-structured data for business- and privacy-critical applications requires sophisticated, flexible and fine-grained authorization and access control. Currently, role-based access control is supported in graph databases, where access to objects is restricted via roles. This does not take special properties of graphs into account such as vertices and edges along the path between a given subject and resource. In previous iterations of our research, we started to design an authorization policy language and access control model, which considers the specification of graph paths and enforces them in the multi-model database ArangoDB. Since this approach is promising to consider graph characteristics in data protection, we improve the language in this work to provide flexible path definitions and specifying edges as protected resources. Furthermore, we introduce a method for a datastore-independent policy enforcement. Besides discussing the latest work in our XACML4G model, which is an extension to the Extensible Access Control Markup Language (XACML), we demonstrate our prototypical implementation with a real case and give an outlook on performance.
[ { "version": "v1", "created": "Thu, 22 Jun 2023 11:35:22 GMT" } ]
2023-06-23T00:00:00
[ [ "Mohamed", "Aya", "" ], [ "Auer", "Dagmar", "" ], [ "Hofer", "Daniel", "" ], [ "Küng", "Josef", "" ] ]
new_dataset
0.999091
2306.12845
Damien Chablat
Huiping Shen, Zhongqiu Du, Damien Chablat (LS2N - \'equipe ReV, LS2N), Ju Li, Guanglei Wu
A new 3-DOF 2T1R parallel mechanism: Topology design and kinematics
IDETC-CIE 2023 International Design Engineering Technical Conferences & Computers and Information in Engineering Conference, ASME, Aug 2023, Boston, France
null
null
null
cs.RO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This article presents a new three-degree-of-freedom (3-DOF) parallel mechanism (PM) with two translations and one rotation (2T1R), designed based on the topological design theory of the parallel mechanism using position and orientation characteristics (POC). The PM is primarily intended for use in package sorting and delivery. The mobile platform of the PM moves along a translation axis, picks up objects from a conveyor belt, and tilts them to either side of the axis. We first calculate the PM's topological characteristics, such as the degree of freedom (DOF) and the degree of coupling, and provide its topological analytical formula to represent the topological information of the PM. Next, we solve the direct and inverse kinematic models based on the kinematic modelling principle using the topological features. The models are purely analytic and are broken down into a series of quadratic equations, making them suitable for use in an industrial robot. We also study the singular configurations to identify the serial and parallel singularities. Using the decoupling properties, we size the mechanism to address the package sorting and depositing problem using an algebraic approach. To determine the smallest segment lengths, we use a cylindrical algebraic decomposition to solve a system with inequalities.
[ { "version": "v1", "created": "Thu, 22 Jun 2023 12:34:30 GMT" } ]
2023-06-23T00:00:00
[ [ "Shen", "Huiping", "", "LS2N - équipe ReV, LS2N" ], [ "Du", "Zhongqiu", "", "LS2N - équipe ReV, LS2N" ], [ "Chablat", "Damien", "", "LS2N - équipe ReV, LS2N" ], [ "Li", "Ju", "" ], [ "Wu", "Guanglei", "" ] ]
new_dataset
0.998752
2306.12925
Paul Rubenstein
Paul K. Rubenstein, Chulayuth Asawaroengchai, Duc Dung Nguyen, Ankur Bapna, Zal\'an Borsos, F\'elix de Chaumont Quitry, Peter Chen, Dalia El Badawy, Wei Han, Eugene Kharitonov, Hannah Muckenhirn, Dirk Padfield, James Qin, Danny Rozenberg, Tara Sainath, Johan Schalkwyk, Matt Sharifi, Michelle Tadmor Ramanovich, Marco Tagliasacchi, Alexandru Tudor, Mihajlo Velimirovi\'c, Damien Vincent, Jiahui Yu, Yongqiang Wang, Vicky Zayats, Neil Zeghidour, Yu Zhang, Zhishuai Zhang, Lukas Zilka, Christian Frank
AudioPaLM: A Large Language Model That Can Speak and Listen
Technical report
null
null
null
cs.CL cs.AI cs.SD eess.AS stat.ML
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce AudioPaLM, a large language model for speech understanding and generation. AudioPaLM fuses text-based and speech-based language models, PaLM-2 [Anil et al., 2023] and AudioLM [Borsos et al., 2022], into a unified multimodal architecture that can process and generate text and speech with applications including speech recognition and speech-to-speech translation. AudioPaLM inherits the capability to preserve paralinguistic information such as speaker identity and intonation from AudioLM and the linguistic knowledge present only in text large language models such as PaLM-2. We demonstrate that initializing AudioPaLM with the weights of a text-only large language model improves speech processing, successfully leveraging the larger quantity of text training data used in pretraining to assist with the speech tasks. The resulting model significantly outperforms existing systems for speech translation tasks and has the ability to perform zero-shot speech-to-text translation for many languages for which input/target language combinations were not seen in training. AudioPaLM also demonstrates features of audio language models, such as transferring a voice across languages based on a short spoken prompt. We release examples of our method at https://google-research.github.io/seanet/audiopalm/examples
[ { "version": "v1", "created": "Thu, 22 Jun 2023 14:37:54 GMT" } ]
2023-06-23T00:00:00
[ [ "Rubenstein", "Paul K.", "" ], [ "Asawaroengchai", "Chulayuth", "" ], [ "Nguyen", "Duc Dung", "" ], [ "Bapna", "Ankur", "" ], [ "Borsos", "Zalán", "" ], [ "Quitry", "Félix de Chaumont", "" ], [ "Chen", "Peter", "" ], [ "Badawy", "Dalia El", "" ], [ "Han", "Wei", "" ], [ "Kharitonov", "Eugene", "" ], [ "Muckenhirn", "Hannah", "" ], [ "Padfield", "Dirk", "" ], [ "Qin", "James", "" ], [ "Rozenberg", "Danny", "" ], [ "Sainath", "Tara", "" ], [ "Schalkwyk", "Johan", "" ], [ "Sharifi", "Matt", "" ], [ "Ramanovich", "Michelle Tadmor", "" ], [ "Tagliasacchi", "Marco", "" ], [ "Tudor", "Alexandru", "" ], [ "Velimirović", "Mihajlo", "" ], [ "Vincent", "Damien", "" ], [ "Yu", "Jiahui", "" ], [ "Wang", "Yongqiang", "" ], [ "Zayats", "Vicky", "" ], [ "Zeghidour", "Neil", "" ], [ "Zhang", "Yu", "" ], [ "Zhang", "Zhishuai", "" ], [ "Zilka", "Lukas", "" ], [ "Frank", "Christian", "" ] ]
new_dataset
0.989416
2306.12935
Simon Fowler
Simon Fowler, Duncan Paul Attard, Franciszek Sowul, Simon J. Gay, Phil Trinder
Special Delivery: Programming with Mailbox Types (Extended Version)
Extended version of paper accepted to ICFP'23
null
null
null
cs.PL
http://creativecommons.org/licenses/by/4.0/
The asynchronous and unidirectional communication model supported by mailboxes is a key reason for the success of actor languages like Erlang and Elixir for implementing reliable and scalable distributed systems. While many actors may send messages to some actor, only the actor may (selectively) receive from its mailbox. Although actors eliminate many of the issues stemming from shared memory concurrency, they remain vulnerable to communication errors such as protocol violations and deadlocks. Mailbox types are a novel behavioural type system for mailboxes first introduced for a process calculus by de'Liguoro and Padovani in 2018, which capture the contents of a mailbox as a commutative regular expression. Due to aliasing and nested evaluation contexts, moving from a process calculus to a programming language is challenging. This paper presents Pat, the first programming language design incorporating mailbox types, and describes an algorithmic type system. We make essential use of quasi-linear typing to tame some of the complexity introduced by aliasing. Our algorithmic type system is necessarily co-contextual, achieved through a novel use of backwards bidirectional typing, and we prove it sound and complete with respect to our declarative type system. We implement a prototype type checker, and use it to demonstrate the expressiveness of Pat on a factory automation case study and a series of examples from the Savina actor benchmark suite.
[ { "version": "v1", "created": "Thu, 22 Jun 2023 14:48:48 GMT" } ]
2023-06-23T00:00:00
[ [ "Fowler", "Simon", "" ], [ "Attard", "Duncan Paul", "" ], [ "Sowul", "Franciszek", "" ], [ "Gay", "Simon J.", "" ], [ "Trinder", "Phil", "" ] ]
new_dataset
0.959381
2306.12957
Luca Lanzend\"orfer
Luca A. Lanzend\"orfer, Roger Wattenhofer
Siamese SIREN: Audio Compression with Implicit Neural Representations
Published as a workshop paper at ICML 2023 neural compression workshop
null
null
null
cs.SD cs.AI cs.LG eess.AS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Implicit Neural Representations (INRs) have emerged as a promising method for representing diverse data modalities, including 3D shapes, images, and audio. While recent research has demonstrated successful applications of INRs in image and 3D shape compression, their potential for audio compression remains largely unexplored. Motivated by this, we present a preliminary investigation into the use of INRs for audio compression. Our study introduces Siamese SIREN, a novel approach based on the popular SIREN architecture. Our experimental results indicate that Siamese SIREN achieves superior audio reconstruction fidelity while utilizing fewer network parameters compared to previous INR architectures.
[ { "version": "v1", "created": "Thu, 22 Jun 2023 15:16:06 GMT" } ]
2023-06-23T00:00:00
[ [ "Lanzendörfer", "Luca A.", "" ], [ "Wattenhofer", "Roger", "" ] ]
new_dataset
0.98477
2306.12992
Kailun Yang
Qi Jiang, Shaohua Gao, Yao Gao, Kailun Yang, Zhonghua Yi, Hao Shi, Lei Sun, Kaiwei Wang
Minimalist and High-Quality Panoramic Imaging with PSF-aware Transformers
The dataset and code will be available at https://github.com/zju-jiangqi/PCIE-PART
null
null
null
cs.CV eess.IV physics.optics
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
High-quality panoramic images with a Field of View (FoV) of 360-degree are essential for contemporary panoramic computer vision tasks. However, conventional imaging systems come with sophisticated lens designs and heavy optical components. This disqualifies their usage in many mobile and wearable applications where thin and portable, minimalist imaging systems are desired. In this paper, we propose a Panoramic Computational Imaging Engine (PCIE) to address minimalist and high-quality panoramic imaging. With less than three spherical lenses, a Minimalist Panoramic Imaging Prototype (MPIP) is constructed based on the design of the Panoramic Annular Lens (PAL), but with low-quality imaging results due to aberrations and small image plane size. We propose two pipelines, i.e. Aberration Correction (AC) and Super-Resolution and Aberration Correction (SR&AC), to solve the image quality problems of MPIP, with imaging sensors of small and large pixel size, respectively. To provide a universal network for the two pipelines, we leverage the information from the Point Spread Function (PSF) of the optical system and design a PSF-aware Aberration-image Recovery Transformer (PART), in which the self-attention calculation and feature extraction are guided via PSF-aware mechanisms. We train PART on synthetic image pairs from simulation and put forward the PALHQ dataset to fill the gap of real-world high-quality PAL images for low-level vision. A comprehensive variety of experiments on synthetic and real-world benchmarks demonstrates the impressive imaging results of PCIE and the effectiveness of plug-and-play PSF-aware mechanisms. We further deliver heuristic experimental findings for minimalist and high-quality panoramic imaging. Our dataset and code will be available at https://github.com/zju-jiangqi/PCIE-PART.
[ { "version": "v1", "created": "Thu, 22 Jun 2023 15:47:58 GMT" } ]
2023-06-23T00:00:00
[ [ "Jiang", "Qi", "" ], [ "Gao", "Shaohua", "" ], [ "Gao", "Yao", "" ], [ "Yang", "Kailun", "" ], [ "Yi", "Zhonghua", "" ], [ "Shi", "Hao", "" ], [ "Sun", "Lei", "" ], [ "Wang", "Kaiwei", "" ] ]
new_dataset
0.997562
2306.13039
Omid Tavallaie
Omid Tavallaie, Seid Miad Zandavi, Hamed Haddadi, and Albert Y. Zomaya
GT-TSCH: Game-Theoretic Distributed TSCH Scheduler for Low-Power IoT Networks
43rd IEEE International Conference on Distributed Computing Systems
null
null
null
cs.NI
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Time-Slotted Channel Hopping (TSCH) is a synchronous medium access mode of the IEEE 802.15.4e standard designed for providing low-latency and highly-reliable end-to-end communication. TSCH constructs a communication schedule by combining frequency channel hopping with Time Division Multiple Access (TDMA). In recent years, IETF designed several standards to define general mechanisms for the implementation of TSCH. However, the problem of updating the TSCH schedule according to the changes of the wireless link quality and node's traffic load left unresolved. In this paper, we use non-cooperative game theory to propose GT-TSCH, a distributed TSCH scheduler designed for low-power IoT applications. By considering selfish behavior of nodes in packet forwarding, GT-TSCH updates the TSCH schedule in a distributed approach with low control overhead by monitoring the queue length, the place of the node in the Directed Acyclic Graph (DAG) topology, the quality of the wireless link, and the data packet generation rate. We prove the existence and uniqueness of Nash equilibrium in our game model and we find the optimal number of TSCH Tx timeslots to update the TSCH slotframe. To examine the performance of our contribution, we implement GT-TSCH on Zolertia Firefly IoT motes and the Contiki-NG Operating System (OS). The evaluation results reveal that GT-TSCH improves performance in terms of throughput and end-to-end delay compared to the state-of-the-art method.
[ { "version": "v1", "created": "Thu, 22 Jun 2023 17:01:59 GMT" } ]
2023-06-23T00:00:00
[ [ "Tavallaie", "Omid", "" ], [ "Zandavi", "Seid Miad", "" ], [ "Haddadi", "Hamed", "" ], [ "Zomaya", "Albert Y.", "" ] ]
new_dataset
0.999517
2306.13053
Chung-Wei Lee
Chung-Wei Lee, Qinghua Liu, Yasin Abbasi-Yadkori, Chi Jin, Tor Lattimore, Csaba Szepesv\'ari
Context-lumpable stochastic bandits
null
null
null
null
cs.LG
http://creativecommons.org/licenses/by/4.0/
We consider a contextual bandit problem with $S $ contexts and $A $ actions. In each round $t=1,2,\dots$ the learner observes a random context and chooses an action based on its past experience. The learner then observes a random reward whose mean is a function of the context and the action for the round. Under the assumption that the contexts can be lumped into $r\le \min\{S ,A \}$ groups such that the mean reward for the various actions is the same for any two contexts that are in the same group, we give an algorithm that outputs an $\epsilon$-optimal policy after using at most $\widetilde O(r (S +A )/\epsilon^2)$ samples with high probability and provide a matching $\widetilde\Omega(r (S +A )/\epsilon^2)$ lower bound. In the regret minimization setting, we give an algorithm whose cumulative regret up to time $T$ is bounded by $\widetilde O(\sqrt{r^3(S +A )T})$. To the best of our knowledge, we are the first to show the near-optimal sample complexity in the PAC setting and $\widetilde O(\sqrt{{poly}(r)(S+K)T})$ minimax regret in the online setting for this problem. We also show our algorithms can be applied to more general low-rank bandits and get improved regret bounds in some scenarios.
[ { "version": "v1", "created": "Thu, 22 Jun 2023 17:20:30 GMT" } ]
2023-06-23T00:00:00
[ [ "Lee", "Chung-Wei", "" ], [ "Liu", "Qinghua", "" ], [ "Abbasi-Yadkori", "Yasin", "" ], [ "Jin", "Chi", "" ], [ "Lattimore", "Tor", "" ], [ "Szepesvári", "Csaba", "" ] ]
new_dataset
0.984112
1212.0020
Dan HERNEST gm
Dan Hernest and Trifon Trifonov
Modal Functional (Dialectica) Interpretation
null
Logical Methods in Computer Science, Volume 17, Issue 4 (October 25, 2021) lmcs:7132
10.46298/lmcs-17(4:3)2021
null
cs.LO math.LO
http://creativecommons.org/licenses/by/4.0/
We adapt our light Dialectica interpretation to usual and light modal formulas (with universal quantification on boolean and natural variables) and prove it sound for a non-standard modal arithmetic based on Goedel's T and classical S4. The range of this light modal Dialectica is the usual (non-modal) classical Arithmetic in all finite types (with booleans); the propositional kernel of its domain is Boolean and not S4. The `heavy' modal Dialectica interpretation is a new technique, as it cannot be simulated within our previous light Dialectica. The synthesized functionals are at least as good as before, while the translation process is improved. Through our modal Dialectica, the existence of a realizer for the defining axiom of classical S5 reduces to the Drinking Principle (cf. Smullyan).
[ { "version": "v1", "created": "Fri, 30 Nov 2012 21:32:52 GMT" }, { "version": "v2", "created": "Mon, 22 Apr 2013 08:58:08 GMT" }, { "version": "v3", "created": "Fri, 27 Mar 2015 02:21:54 GMT" }, { "version": "v4", "created": "Fri, 11 Sep 2015 16:37:30 GMT" }, { "version": "v5", "created": "Wed, 20 Jan 2021 19:08:12 GMT" }, { "version": "v6", "created": "Tue, 31 Aug 2021 16:02:47 GMT" }, { "version": "v7", "created": "Tue, 21 Sep 2021 13:59:02 GMT" }, { "version": "v8", "created": "Fri, 22 Oct 2021 17:03:57 GMT" } ]
2023-06-22T00:00:00
[ [ "Hernest", "Dan", "" ], [ "Trifonov", "Trifon", "" ] ]
new_dataset
0.989711
1404.4250
Dmitry N. Kozlov
Dmitry N. Kozlov
Witness structures and immediate snapshot complexes
full paper version of the 1st part of the preprint arXiv:1402.4707; to appear in DMTCS
Discrete Mathematics & Theoretical Computer Science, Vol. 19 no. 3, Distributed Computing and Networking (November 28, 2017) dmtcs:3122
10.23638/DMTCS-19-3-12
null
cs.DC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper we introduce and study a new family of combinatorial simplicial complexes, which we call immediate snapshot complexes. Our construction and terminology is strongly motivated by theoretical distributed computing, as these complexes are combinatorial models of the standard protocol complexes associated to immediate snapshot read/write shared memory communication model. In order to define the immediate snapshot complexes we need a new combinatorial object, which we call a witness structure. These objects are indexing the simplices in the immediate snapshot complexes, while a special operation on them, called ghosting, describes the combinatorics of taking simplicial boundary. In general, we develop the theory of witness structures and use it to prove several combinatorial as well as topological properties of the immediate snapshot complexes.
[ { "version": "v1", "created": "Wed, 16 Apr 2014 14:06:12 GMT" }, { "version": "v2", "created": "Mon, 30 Nov 2015 11:29:40 GMT" }, { "version": "v3", "created": "Sun, 5 Feb 2017 08:39:38 GMT" }, { "version": "v4", "created": "Fri, 24 Nov 2017 13:13:08 GMT" } ]
2023-06-22T00:00:00
[ [ "Kozlov", "Dmitry N.", "" ] ]
new_dataset
0.979009
1404.7458
Daniel Krenn
Clemens Heuberger, Daniel Krenn, Sara Kropf
Automata in SageMath---Combinatorics meet Theoretical Computer Science
null
Discrete Mathematics & Theoretical Computer Science, Vol. 18 no. 3, Analysis of Algorithms (May 10, 2016) dmtcs:1352
10.46298/dmtcs.1352
null
cs.FL math.CO
http://creativecommons.org/licenses/by/4.0/
The new finite state machine package in the mathematics software system SageMath is presented and illustrated by many examples. Several combinatorial problems, in particular digit problems, are introduced, modeled by automata and transducers and solved using SageMath. In particular, we compute the asymptotic Hamming weight of a non-adjacent-form-like digit expansion, which was not known before.
[ { "version": "v1", "created": "Tue, 29 Apr 2014 18:56:19 GMT" }, { "version": "v2", "created": "Tue, 12 Jan 2016 10:08:19 GMT" }, { "version": "v3", "created": "Wed, 13 Apr 2016 12:29:53 GMT" }, { "version": "v4", "created": "Thu, 5 May 2016 17:46:57 GMT" } ]
2023-06-22T00:00:00
[ [ "Heuberger", "Clemens", "" ], [ "Krenn", "Daniel", "" ], [ "Kropf", "Sara", "" ] ]
new_dataset
0.998504
1407.0334
Abuzer Yakaryilmaz
G\"okalp Demirci and Mika Hirvensalo and Klaus Reinhardt and A. C. Cem Say and Abuzer Yakary{\i}lmaz
Alternating, private alternating, and quantum alternating realtime automata
null
Logical Methods in Computer Science, Volume 15, Issue 3 (August 28, 2019) lmcs:4664
10.23638/LMCS-15(3:22)2019
null
cs.FL cs.CC cs.LO quant-ph
http://creativecommons.org/licenses/by/4.0/
We present new results on realtime alternating, private alternating, and quantum alternating automaton models. Firstly, we show that the emptiness problem for alternating one-counter automata on unary alphabets is undecidable. Then, we present two equivalent definitions of realtime private alternating finite automata (PAFAs). We show that the emptiness problem is undecidable for PAFAs. Furthermore, PAFAs can recognize some nonregular unary languages, including the unary squares language, which seems to be difficult even for some classical counter automata with two-way input. Regarding quantum finite automata (QFAs), we show that the emptiness problem is undecidable both for universal QFAs on general alphabets, and for alternating QFAs with two alternations on unary alphabets. On the other hand, the same problem is decidable for nondeterministic QFAs on general alphabets. We also show that the unary squares language is recognized by alternating QFAs with two alternations.
[ { "version": "v1", "created": "Tue, 1 Jul 2014 17:52:47 GMT" }, { "version": "v2", "created": "Sat, 30 Jun 2018 19:41:14 GMT" }, { "version": "v3", "created": "Tue, 12 Mar 2019 10:26:09 GMT" }, { "version": "v4", "created": "Mon, 29 Jul 2019 08:15:53 GMT" }, { "version": "v5", "created": "Tue, 27 Aug 2019 10:48:22 GMT" } ]
2023-06-22T00:00:00
[ [ "Demirci", "Gökalp", "" ], [ "Hirvensalo", "Mika", "" ], [ "Reinhardt", "Klaus", "" ], [ "Say", "A. C. Cem", "" ], [ "Yakaryılmaz", "Abuzer", "" ] ]
new_dataset
0.992064
1409.7542
Pierre Clairambault
Simon Castellan (LIP), Pierre Clairambault (LIP, PLUME), Glynn Winskel
Thin Games with Symmetry and Concurrent Hyland-Ong Games
null
Logical Methods in Computer Science, Volume 15, Issue 1 (March 4, 2019) lmcs:3891
10.23638/LMCS-15(1:18)2019
null
cs.LO math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We build a cartesian closed category, called Cho, based on event structures. It allows an interpretation of higher-order stateful concurrent programs that is refined and precise: on the one hand it is conservative with respect to standard Hyland-Ong games when interpreting purely functional programs as innocent strategies, while on the other hand it is much more expressive. The interpretation of programs constructs compositionally a representation of their execution that exhibits causal dependencies and remembers the points of non-deterministic branching.The construction is in two stages. First, we build a compact closed category Tcg. It is a variant of Rideau and Winskel's category CG, with the difference that games and strategies in Tcg are equipped with symmetry to express that certain events are essentially the same. This is analogous to the underlying category of AJM games enriching simple games with an equivalence relations on plays. Building on this category, we construct the cartesian closed category Cho as having as objects the standard arenas of Hyland-Ong games, with strategies, represented by certain events structures, playing on games with symmetry obtained as expanded forms of these arenas.To illustrate and give an operational light on these constructions, we interpret (a close variant of) Idealized Parallel Algol in Cho.
[ { "version": "v1", "created": "Fri, 26 Sep 2014 11:39:59 GMT" }, { "version": "v2", "created": "Fri, 6 Jan 2017 15:32:10 GMT" }, { "version": "v3", "created": "Wed, 30 Aug 2017 09:05:16 GMT" }, { "version": "v4", "created": "Thu, 20 Dec 2018 09:48:49 GMT" }, { "version": "v5", "created": "Fri, 1 Mar 2019 15:33:48 GMT" } ]
2023-06-22T00:00:00
[ [ "Castellan", "Simon", "", "LIP" ], [ "Clairambault", "Pierre", "", "LIP, PLUME" ], [ "Winskel", "Glynn", "" ] ]
new_dataset
0.998144
1510.08566
J\"urgen Koslowski
Giorgi Japaridze (Department of Computing Sciences, Villanova University)
Build your own clarithmetic II: Soundness
null
Logical Methods in Computer Science, Volume 12, Issue 3 (April 27, 2017) lmcs:2028
10.2168/LMCS-12(3:12)2016
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Clarithmetics are number theories based on computability logic (see http://www.csc.villanova.edu/~japaridz/CL/ ). Formulas of these theories represent interactive computational problems, and their "truth" is understood as existence of an algorithmic solution. Various complexity constraints on such solutions induce various versions of clarithmetic. The present paper introduces a parameterized/schematic version CLA11(P1,P2,P3,P4). By tuning the three parameters P1,P2,P3 in an essentially mechanical manner, one automatically obtains sound and complete theories with respect to a wide range of target tricomplexity classes, i.e. combinations of time (set by P3), space (set by P2) and so called amplitude (set by P1) complexities. Sound in the sense that every theorem T of the system represents an interactive number-theoretic computational problem with a solution from the given tricomplexity class and, furthermore, such a solution can be automatically extracted from a proof of T. And complete in the sense that every interactive number-theoretic problem with a solution from the given tricomplexity class is represented by some theorem of the system. Furthermore, through tuning the 4th parameter P4, at the cost of sacrificing recursive axiomatizability but not simplicity or elegance, the above extensional completeness can be strengthened to intensional completeness, according to which every formula representing a problem with a solution from the given tricomplexity class is a theorem of the system. This article is published in two parts. The previous Part I has introduced the system and proved its completeness, while the present Part II is devoted to proving soundness.
[ { "version": "v1", "created": "Thu, 29 Oct 2015 05:33:15 GMT" }, { "version": "v2", "created": "Wed, 22 Jun 2016 12:21:10 GMT" }, { "version": "v3", "created": "Mon, 1 Aug 2016 11:04:23 GMT" }, { "version": "v4", "created": "Wed, 21 Sep 2016 13:46:11 GMT" } ]
2023-06-22T00:00:00
[ [ "Japaridze", "Giorgi", "", "Department of Computing Sciences, Villanova\n University" ] ]
new_dataset
0.997678
1511.01807
Thorsten Wissmann
Prateek Karandikar and Philippe Schnoebelen
The height of piecewise-testable languages and the complexity of the logic of subwords
This article is a full version of "The height of piecewise-testable languages with applications in logical complexity", in Proc. CSL 2016, LIPiCS 62:37
Logical Methods in Computer Science, Volume 15, Issue 2 (April 30, 2019) lmcs:4850
10.23638/LMCS-15(2:6)2019
null
cs.LO cs.FL
http://creativecommons.org/licenses/by/4.0/
The height of a piecewise-testable language $L$ is the maximum length of the words needed to define $L$ by excluding and requiring given subwords. The height of $L$ is an important descriptive complexity measure that has not yet been investigated in a systematic way. This article develops a series of new techniques for bounding the height of finite languages and of languages obtained by taking closures by subwords, superwords and related operations. As an application of these results, we show that $\mathsf{FO}^2(A^*,\sqsubseteq)$, the two-variable fragment of the first-order logic of sequences with the subword ordering, can only express piecewise-testable properties and has elementary complexity.
[ { "version": "v1", "created": "Thu, 5 Nov 2015 16:45:19 GMT" }, { "version": "v2", "created": "Fri, 8 Jul 2016 09:54:48 GMT" }, { "version": "v3", "created": "Thu, 20 Sep 2018 18:09:58 GMT" }, { "version": "v4", "created": "Sun, 28 Apr 2019 13:39:56 GMT" } ]
2023-06-22T00:00:00
[ [ "Karandikar", "Prateek", "" ], [ "Schnoebelen", "Philippe", "" ] ]
new_dataset
0.994509
1511.07180
Florin Manea
Marius Dumitran, Pawe{\l} Gawrychowski and Florin Manea
Longest Gapped Repeats and Palindromes
This is an extension of the conference papers "Longest $\alpha$-Gapped Repeat and Palindrome", presented by the second and third authors at FCT 2015, and "Longest Gapped Repeats and Palindromes", presented by the first and third authors at MFCS 2015
Discrete Mathematics & Theoretical Computer Science, Vol. 19 no. 4, FCT '15, special issue FCT'15 (October 13, 2017) dmtcs:1337
10.23638/DMTCS-19-4-4
null
cs.DS
http://creativecommons.org/licenses/by/4.0/
A gapped repeat (respectively, palindrome) occurring in a word $w$ is a factor $uvu$ (respectively, $u^Rvu$) of $w$. In such a repeat (palindrome) $u$ is called the arm of the repeat (respectively, palindrome), while $v$ is called the gap. We show how to compute efficiently, for every position $i$ of the word $w$, the longest gapped repeat and palindrome occurring at that position, provided that the length of the gap is subject to various types of restrictions. That is, that for each position $i$ we compute the longest prefix $u$ of $w[i..n]$ such that $uv$ (respectively, $u^Rv$) is a suffix of $w[1..i-1]$ (defining thus a gapped repeat $uvu$ -- respectively, palindrome $u^Rvu$), and the length of $v$ is subject to the aforementioned restrictions.
[ { "version": "v1", "created": "Mon, 23 Nov 2015 11:19:00 GMT" }, { "version": "v2", "created": "Tue, 28 Feb 2017 17:50:14 GMT" }, { "version": "v3", "created": "Thu, 29 Jun 2017 15:02:47 GMT" }, { "version": "v4", "created": "Wed, 11 Oct 2017 09:40:01 GMT" } ]
2023-06-22T00:00:00
[ [ "Dumitran", "Marius", "" ], [ "Gawrychowski", "Paweł", "" ], [ "Manea", "Florin", "" ] ]
new_dataset
0.999638
1512.06788
Victor Yodaiken
Victor Yodaiken
State machines for large scale computer software and systems
This is a duplicate
null
null
null
cs.FL
http://creativecommons.org/licenses/by-nc-nd/4.0/
This paper introduces techniques for specifying behavior, architecture, and abstract properties of large scale computer software and hardware purely in terms of ordinary deterministic state machines. The goal is to be able to work with specifications ranging from operating systems to databases and real-time control. State machines with output are represented as maps from finite sequences of events to outputs so that f(s) is the output in the state reached by following s from a initial state. Composite sequence maps correspond to state machine products. The methods used here can specify or constrain both system behavior and system design. Motivating examples presented range from simple counters to distributed consensus algorithms and real-time circuits. The approach is intended to facilitate "back of the envelope" descriptions of devices and software and also to allow for detailed hierarchical specifications of behavior and architecture. The mathematical approach is based on both primitive recursion on sequences \cite{PeterComputer} and automata products with feedback \cite{Gecseg}, adapted to Moore type state machines. No formal methods or other metamathematical techniques are employed and although parallel and concurrent composite systems are easy to specify, it is not necessary to make any particular communication scheme primitive. State machines are not augmented or extended - even the most complex composite systems are modeled by ordinary deterministic state machines which have a rich mathematical theory related to semigroups.
[ { "version": "v1", "created": "Mon, 21 Dec 2015 19:58:09 GMT" }, { "version": "v2", "created": "Sat, 20 Feb 2016 21:49:57 GMT" }, { "version": "v3", "created": "Mon, 17 Jan 2022 22:09:17 GMT" }, { "version": "v4", "created": "Wed, 21 Jun 2023 08:36:06 GMT" } ]
2023-06-22T00:00:00
[ [ "Yodaiken", "Victor", "" ] ]
new_dataset
0.995814
1602.04860
Thorsten Wissmann
G. A. Kavvos
Dual-Context Calculi for Modal Logic
Full version of article previously presented at LICS 2017 (see arXiv:1602.04860v4 or doi: 10.1109/LICS.2017.8005089)
Logical Methods in Computer Science, Volume 16, Issue 3 (August 19, 2020) lmcs:4740
10.23638/LMCS-16(3:10)2020
null
cs.LO
http://creativecommons.org/licenses/by/4.0/
We present natural deduction systems and associated modal lambda calculi for the necessity fragments of the normal modal logics K, T, K4, GL and S4. These systems are in the dual-context style: they feature two distinct zones of assumptions, one of which can be thought as modal, and the other as intuitionistic. We show that these calculi have their roots in in sequent calculi. We then investigate their metatheory, equip them with a confluent and strongly normalizing notion of reduction, and show that they coincide with the usual Hilbert systems up to provability. Finally, we investigate a categorical semantics which interprets the modality as a product-preserving functor.
[ { "version": "v1", "created": "Mon, 15 Feb 2016 23:03:24 GMT" }, { "version": "v2", "created": "Sat, 7 Jan 2017 13:03:59 GMT" }, { "version": "v3", "created": "Fri, 3 Mar 2017 16:21:21 GMT" }, { "version": "v4", "created": "Wed, 16 Aug 2017 00:04:52 GMT" }, { "version": "v5", "created": "Sun, 5 Aug 2018 00:13:05 GMT" }, { "version": "v6", "created": "Mon, 30 Mar 2020 15:55:37 GMT" }, { "version": "v7", "created": "Sun, 2 Aug 2020 14:14:00 GMT" }, { "version": "v8", "created": "Tue, 18 Aug 2020 13:43:05 GMT" } ]
2023-06-22T00:00:00
[ [ "Kavvos", "G. A.", "" ] ]
new_dataset
0.999521
1607.03286
Christoph Rauch
Weng Kin Ho, Jean Goubault-Larrecq, Achim Jung, and Xiaoyong Xi
The Ho-Zhao Problem
19 pages, 4 figures
Logical Methods in Computer Science, Volume 14, Issue 1 (January 17, 2018) lmcs:1529
10.23638/LMCS-14(1:7)2018
null
cs.LO
http://creativecommons.org/licenses/by/4.0/
Given a poset $P$, the set, $\Gamma(P)$, of all Scott closed sets ordered by inclusion forms a complete lattice. A subcategory $\mathbf{C}$ of $\mathbf{Pos}_d$ (the category of posets and Scott-continuous maps) is said to be $\Gamma$-faithful if for any posets $P$ and $Q$ in $\mathbf{C}$, $\Gamma(P) \cong \Gamma(Q)$ implies $P \cong Q$. It is known that the category of all continuous dcpos and the category of bounded complete dcpos are $\Gamma$-faithful, while $\mathbf{Pos}_d$ is not. Ho & Zhao (2009) asked whether the category $\mathbf{DCPO}$ of dcpos is $\Gamma$-faithful. In this paper, we answer this question in the negative by exhibiting a counterexample. To achieve this, we introduce a new subcategory of dcpos which is $\Gamma$-faithful. This subcategory subsumes all currently known $\Gamma$-faithful subcategories. With this new concept in mind, we construct the desired counterexample which relies heavily on Johnstone's famous dcpo which is not sober in its Scott topology.
[ { "version": "v1", "created": "Tue, 12 Jul 2016 09:43:22 GMT" }, { "version": "v2", "created": "Wed, 20 Dec 2017 15:31:03 GMT" }, { "version": "v3", "created": "Tue, 16 Jan 2018 16:00:29 GMT" } ]
2023-06-22T00:00:00
[ [ "Ho", "Weng Kin", "" ], [ "Goubault-Larrecq", "Jean", "" ], [ "Jung", "Achim", "" ], [ "Xi", "Xiaoyong", "" ] ]
new_dataset
0.98272
1609.05792
Christopher Duffy
C. Duffy, T.F. Lidbetter, M.E. Messinger, R.J. Nowakowski
A Variation on Chip-Firing: the diffusion game
18 pages, 3 figures
Discrete Mathematics & Theoretical Computer Science, Vol. 20 no. 1, Graph Theory (January 17, 2018) dmtcs:2039
10.23638/DMTCS-20-1-4
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce a natural variant of the parallel chip-firing game, called the diffusion game. Chips are initially assigned to vertices of a graph. At every step, all vertices simultaneously send one chip to each neighbour with fewer chips. As the dynamics of the parallel chip-firing game occur on a finite set the process is inherently periodic. However the diffusion game is not obviously periodic: even if $2|E(G)|$ chips are assigned to vertices of graph G, there may exist time steps where some vertices have a negative number of chips. We investigate the process, prove periodicity for a number of graph classes, and pose some questions for future research.
[ { "version": "v1", "created": "Mon, 19 Sep 2016 15:42:33 GMT" }, { "version": "v2", "created": "Tue, 18 Apr 2017 00:06:38 GMT" }, { "version": "v3", "created": "Thu, 14 Dec 2017 17:15:59 GMT" }, { "version": "v4", "created": "Tue, 9 Jan 2018 19:59:56 GMT" }, { "version": "v5", "created": "Mon, 15 Jan 2018 16:54:56 GMT" } ]
2023-06-22T00:00:00
[ [ "Duffy", "C.", "" ], [ "Lidbetter", "T. F.", "" ], [ "Messinger", "M. E.", "" ], [ "Nowakowski", "R. J.", "" ] ]
new_dataset
0.998109
1610.05115
Timothy Highley Jr.
Timothy Highley, Hoang Le
Tropical Vertex-Disjoint Cycles of a Vertex-Colored Digraph: Barter Exchange with Multiple Items Per Agent
Published in Discrete Mathematics and Theoretical Computer Science
Discrete Mathematics & Theoretical Computer Science, vol. 20 no. 2, Analysis of Algorithms (July 31, 2018) dmtcs:3186
10.23638/DMTCS-20-2-1
null
cs.DS cs.CC
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In a barter exchange market, agents bring items and seek to exchange their items with one another. Agents may agree to a k-way exchange involving a cycle of k agents. A barter exchange market can be represented by a digraph where the vertices represent items and the edges out of a vertex indicate the items that an agent is willing to accept in exchange for that item. It is known that the problem of finding a set of vertex-disjoint cycles with the maximum total number of vertices (MAX-SIZE-EXCHANGE) can be solved in polynomial time. We consider a barter exchange where each agent may bring multiple items, and items of the same agent are represented by vertices with the same color. A set of cycles is said to be tropical if for every color there is a cycle that contains a vertex of that color. We show that the problem of determining whether there exists a tropical set of vertex-disjoint cycles in a digraph (TROPICAL-EXCHANGE) is NP-complete and APX-hard. This is equivalent to determining whether it is possible to arrange an exchange of items among agents such that every agent trades away at least one item. TROPICAL-MAX-SIZE-EXCHANGE is a similar problem, where the goal is to find a set of vertex-disjoint cycles that contains the maximum number of vertices and also contains all of the colors in the graph. We show that this problem is likewise NP-complete and APX-hard. For the restricted case where there are at most two vertices of each color (corresponding to a restriction that each agent may bring at most two items), both problems remain NP-hard but are in APX. Finally, we consider MAX-SIZE-TROPICAL-EXCHANGE, where the set of cycles must primarily include as many colors as possible and secondarily include as many vertices as possible. We show that this problem is NP-hard.
[ { "version": "v1", "created": "Fri, 14 Oct 2016 01:10:21 GMT" }, { "version": "v2", "created": "Fri, 10 Mar 2017 18:25:43 GMT" }, { "version": "v3", "created": "Thu, 3 Aug 2017 20:16:11 GMT" }, { "version": "v4", "created": "Fri, 6 Apr 2018 21:54:41 GMT" }, { "version": "v5", "created": "Wed, 18 Jul 2018 03:36:20 GMT" } ]
2023-06-22T00:00:00
[ [ "Highley", "Timothy", "" ], [ "Le", "Hoang", "" ] ]
new_dataset
0.99973
1611.05672
Thorsten Wissmann
Andrej Dudenhefner, Moritz Martens, Jakob Rehof
The Algebraic Intersection Type Unification Problem
null
Logical Methods in Computer Science, Volume 13, Issue 3 (August 15, 2017) lmcs:2543
10.23638/LMCS-13(3:9)2017
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The algebraic intersection type unification problem is an important component in proof search related to several natural decision problems in intersection type systems. It is unknown and remains open whether the algebraic intersection type unification problem is decidable. We give the first nontrivial lower bound for the problem by showing (our main result) that it is exponential time hard. Furthermore, we show that this holds even under rank 1 solutions (substitutions whose codomains are restricted to contain rank 1 types). In addition, we provide a fixed-parameter intractability result for intersection type matching (one-sided unification), which is known to be NP-complete. We place the algebraic intersection type unification problem in the context of unification theory. The equational theory of intersection types can be presented as an algebraic theory with an ACI (associative, commutative, and idempotent) operator (intersection type) combined with distributivity properties with respect to a second operator (function type). Although the problem is algebraically natural and interesting, it appears to occupy a hitherto unstudied place in the theory of unification, and our investigation of the problem suggests that new methods are required to understand the problem. Thus, for the lower bound proof, we were not able to reduce from known results in ACI-unification theory and use game-theoretic methods for two-player tiling games.
[ { "version": "v1", "created": "Thu, 17 Nov 2016 13:13:18 GMT" }, { "version": "v2", "created": "Tue, 22 Nov 2016 08:50:51 GMT" }, { "version": "v3", "created": "Wed, 26 Apr 2017 11:31:52 GMT" }, { "version": "v4", "created": "Tue, 20 Jun 2017 21:24:17 GMT" }, { "version": "v5", "created": "Mon, 14 Aug 2017 09:32:51 GMT" } ]
2023-06-22T00:00:00
[ [ "Dudenhefner", "Andrej", "" ], [ "Martens", "Moritz", "" ], [ "Rehof", "Jakob", "" ] ]
new_dataset
0.988934
1611.08738
Thorsten Wissmann
Georgios Kourtis, Ian Pratt-Hartmann
Adding Path-Functional Dependencies to the Guarded Two-Variable Fragment with Counting
null
Logical Methods in Computer Science, Volume 13, Issue 4 (October 30, 2017) lmcs:2557
10.23638/LMCS-13(4:4)2017
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The satisfiability and finite satisfiability problems for the two-variable guarded fragment of first-order logic with counting quantifiers, a database, and path-functional dependencies are both ExpTime-complete.
[ { "version": "v1", "created": "Sat, 26 Nov 2016 20:15:47 GMT" }, { "version": "v2", "created": "Wed, 14 Jun 2017 13:26:56 GMT" }, { "version": "v3", "created": "Fri, 27 Oct 2017 08:53:22 GMT" } ]
2023-06-22T00:00:00
[ [ "Kourtis", "Georgios", "" ], [ "Pratt-Hartmann", "Ian", "" ] ]
new_dataset
0.962901
1611.08800
Ale\v{s} Bizjak
Davide Bresolin, Emilio Mu\~noz-Velasco, Guido Sciavicco
On Sub-Propositional Fragments of Modal Logic
null
Logical Methods in Computer Science, Volume 14, Issue 2 (June 22, 2018) lmcs:2550
10.23638/LMCS-14(2:16)2018
null
cs.LO
http://creativecommons.org/licenses/by/4.0/
In this paper, we consider the well-known modal logics $\mathbf{K}$, $\mathbf{T}$, $\mathbf{K4}$, and $\mathbf{S4}$, and we study some of their sub-propositional fragments, namely the classical Horn fragment, the Krom fragment, the so-called core fragment, defined as the intersection of the Horn and the Krom fragments, plus their sub-fragments obtained by limiting the use of boxes and diamonds in clauses. We focus, first, on the relative expressive power of such languages: we introduce a suitable measure of expressive power, and we obtain a complex hierarchy that encompasses all fragments of the considered logics. Then, after observing the low expressive power, in particular, of the Horn fragments without diamonds, we study the computational complexity of their satisfiability problem, proving that, in general, it becomes polynomial.
[ { "version": "v1", "created": "Sun, 27 Nov 2016 07:41:06 GMT" }, { "version": "v2", "created": "Mon, 17 Jul 2017 15:24:40 GMT" }, { "version": "v3", "created": "Fri, 2 Feb 2018 14:06:22 GMT" }, { "version": "v4", "created": "Thu, 21 Jun 2018 16:03:13 GMT" } ]
2023-06-22T00:00:00
[ [ "Bresolin", "Davide", "" ], [ "Muñoz-Velasco", "Emilio", "" ], [ "Sciavicco", "Guido", "" ] ]
new_dataset
0.999014
1611.09633
Christoph Rauch
Dmitriy Traytel
Formal Languages, Formally and Coinductively
Extended version of homonymous FSCD 2016 paper
Logical Methods in Computer Science, Volume 13, Issue 3 (September 19, 2017) lmcs:2564
10.23638/LMCS-13(3:28)2017
null
cs.LO cs.PL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Traditionally, formal languages are defined as sets of words. More recently, the alternative coalgebraic or coinductive representation as infinite tries, i.e., prefix trees branching over the alphabet, has been used to obtain compact and elegant proofs of classic results in language theory. In this article, we study this representation in the Isabelle proof assistant. We define regular operations on infinite tries and prove the axioms of Kleene algebra for those operations. Thereby, we exercise corecursion and coinduction and confirm the coinductive view being profitable in formalizations, as it improves over the set-of-words view with respect to proof automation.
[ { "version": "v1", "created": "Tue, 29 Nov 2016 13:56:39 GMT" }, { "version": "v2", "created": "Sat, 13 May 2017 22:58:31 GMT" }, { "version": "v3", "created": "Mon, 18 Sep 2017 12:53:01 GMT" } ]
2023-06-22T00:00:00
[ [ "Traytel", "Dmitriy", "" ] ]
new_dataset
0.955852
1611.09907
Haiko M\"uller
Isolde Adler, Ngoc Khang Le, Haiko M\"uller, Marko Radovanovi\'c, Nicolas Trotignon, Kristina Vu\v{s}kovi\'c
On rank-width of even-hole-free graphs
12 pages, 2 figures
Discrete Mathematics & Theoretical Computer Science, Vol. 19 no. 1, Graph Theory (October 5, 2017) dmtcs:2575
10.23638/DMTCS-19-1-24
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a class of (diamond, even hole)-free graphs with no clique cutset that has unbounded rank-width. In general, even-hole-free graphs have unbounded rank-width, because chordal graphs are even-hole-free. A.A. da Silva, A. Silva and C. Linhares-Sales (2010) showed that planar even-hole-free graphs have bounded rank-width, and N.K. Le (2016) showed that even-hole-free graphs with no star cutset have bounded rank-width. A natural question is to ask, whether even-hole-free graphs with no clique cutsets have bounded rank-width. Our result gives a negative answer. Hence we cannot apply Courcelle and Makowsky's meta-theorem which would provide efficient algorithms for a large number of problems, including the maximum independent set problem, whose complexity remains open for (diamond, even hole)-free graphs.
[ { "version": "v1", "created": "Tue, 29 Nov 2016 21:56:38 GMT" }, { "version": "v2", "created": "Mon, 31 Jul 2017 10:49:47 GMT" }, { "version": "v3", "created": "Fri, 1 Sep 2017 12:56:36 GMT" } ]
2023-06-22T00:00:00
[ [ "Adler", "Isolde", "" ], [ "Le", "Ngoc Khang", "" ], [ "Müller", "Haiko", "" ], [ "Radovanović", "Marko", "" ], [ "Trotignon", "Nicolas", "" ], [ "Vušković", "Kristina", "" ] ]
new_dataset
0.973908
1611.10208
Konstantinos Georgiou
Konstantinos Georgiou, George Karakostas, Evangelos Kranakis
Search-and-Fetch with 2 Robots on a Disk: Wireless and Face-to-Face Communication Models
26 Pages, 6 Figures. This is the full version of the paper with the same title which will appear in the proceedings of the 6th International Conference on Operations Research and Enterprise Systems (ICORES), February 23-25, 2017, Porto, Portugal
Discrete Mathematics & Theoretical Computer Science, Vol. 21 no. 3 , Distributed Computing and Networking (June 13, 2019) dmtcs:4884
10.23638/DMTCS-21-3-20
null
cs.DS
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We initiate the study of a new problem on searching and fetching in a distributed environment concerning treasure-evacuation from a unit disk. A treasure and an exit are located at unknown positions on the perimeter of a disk and at known arc distance. A team of two robots start from the center of the disk, and their goal is to fetch the treasure to the exit. At any time the robots can move anywhere they choose on the disk, independently of each other, with the same speed. A robot detects an interesting point (treasure or exit) only if it passes over the exact location of that point. We are interested in designing distributed algorithms that minimize the worst-case treasure-evacuation time, i.e. the time it takes for the treasure to be discovered and brought (fetched) to the exit by any of the robots. The communication protocol between the robots is either wireless, where information is shared at any time, or face-to-face (i.e. non-wireless), where information can be shared only if the robots meet. For both models we obtain upper bounds for fetching the treasure to the exit. Our main technical contribution pertains to the face-to-face model. More specifically, we demonstrate how robots can exchange information without meeting, effectively achieving a highly efficient treasure-evacuation protocol which is minimally affected by the lack of distant communication. Finally, we complement our positive results above by providing a lower bound in the face-to-face model.
[ { "version": "v1", "created": "Wed, 30 Nov 2016 15:13:11 GMT" }, { "version": "v2", "created": "Wed, 10 Oct 2018 15:04:04 GMT" }, { "version": "v3", "created": "Thu, 11 Oct 2018 13:54:27 GMT" }, { "version": "v4", "created": "Thu, 23 May 2019 15:47:16 GMT" }, { "version": "v5", "created": "Fri, 24 May 2019 17:29:30 GMT" }, { "version": "v6", "created": "Wed, 29 May 2019 20:47:51 GMT" } ]
2023-06-22T00:00:00
[ [ "Georgiou", "Konstantinos", "" ], [ "Karakostas", "George", "" ], [ "Kranakis", "Evangelos", "" ] ]
new_dataset
0.951427
1702.01804
Christoph Rauch
Paul Brunet and Damien Pous
Petri Automata
null
Logical Methods in Computer Science, Volume 13, Issue 3 (September 26, 2017) lmcs:3125
10.23638/LMCS-13(3:33)2017
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Kleene algebra axioms are complete with respect to both language models and binary relation models. In particular, two regular expressions recognise the same language if and only if they are universally equivalent in the model of binary relations. We consider Kleene allegories, i.e., Kleene algebras with two additional operations and a constant which are natural in binary relation models: intersection, converse, and the full relation. While regular languages are closed under those operations, the above characterisation breaks. Putting together a few results from the literature, we give a characterisation in terms of languages of directed and labelled graphs. By taking inspiration from Petri nets, we design a finite automata model, Petri automata, allowing to recognise such graphs. We prove a Kleene theorem for this automata model: the sets of graphs recognisable by Petri automata are precisely the sets of graphs definable through the extended regular expressions we consider. Petri automata allow us to obtain decidability of identity-free relational Kleene lattices, i.e., the equational theory generated by binary relations on the signature of regular expressions with intersection, but where one forbids unit. This restriction is used to ensure that the corresponding graphs are acyclic. We actually show that this decision problem is EXPSPACE-complete.
[ { "version": "v1", "created": "Mon, 6 Feb 2017 21:58:26 GMT" }, { "version": "v2", "created": "Wed, 2 Aug 2017 09:49:13 GMT" }, { "version": "v3", "created": "Mon, 25 Sep 2017 16:35:36 GMT" } ]
2023-06-22T00:00:00
[ [ "Brunet", "Paul", "" ], [ "Pous", "Damien", "" ] ]
new_dataset
0.98964
1702.08841
Luca Reggio
Mai Gehrke, Daniela Petrisan, Luca Reggio
Quantifiers on languages and codensity monads
30 pages. Presentation improved and details of several proofs added. The main results are unchanged
Math. Struct. Comp. Sci. 30 (2020) 1054-1088
10.1017/S0960129521000074
null
cs.LO cs.FL math.CT math.GN math.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper contributes to the techniques of topo-algebraic recognition for languages beyond the regular setting as they relate to logic on words. In particular, we provide a general construction on recognisers corresponding to adding one layer of various kinds of quantifiers and prove a corresponding Reutenauer-type theorem. Our main tools are codensity monads and duality theory. Our construction hinges on a measure-theoretic characterisation of the profinite monad of the free S-semimodule monad for finite and commutative semirings S, which generalises our earlier insight that the Vietoris monad on Boolean spaces is the codensity monad of the finite powerset functor.
[ { "version": "v1", "created": "Tue, 28 Feb 2017 16:22:56 GMT" }, { "version": "v2", "created": "Wed, 29 Aug 2018 12:52:36 GMT" }, { "version": "v3", "created": "Wed, 22 May 2019 18:02:25 GMT" } ]
2023-06-22T00:00:00
[ [ "Gehrke", "Mai", "" ], [ "Petrisan", "Daniela", "" ], [ "Reggio", "Luca", "" ] ]
new_dataset
0.950476
1703.09034
Christoph Rauch
Bart Jacobs
A Recipe for State-and-Effect Triangles
null
Logical Methods in Computer Science, Volume 13, Issue 2 (May 17, 2017) lmcs:3223
10.23638/LMCS-13(2:6)2017
null
cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the semantics of programming languages one can view programs as state transformers, or as predicate transformers. Recently the author has introduced state-and-effect triangles which capture this situation categorically, involving an adjunction between state- and predicate-transformers. The current paper exploits a classical result in category theory, part of Jon Beck's monadicity theorem, to systematically construct such a state-and-effect triangle from an adjunction. The power of this construction is illustrated in many examples, covering many monads occurring in program semantics, including (probabilistic) power domains.
[ { "version": "v1", "created": "Mon, 27 Mar 2017 12:39:34 GMT" }, { "version": "v2", "created": "Mon, 15 May 2017 15:16:12 GMT" }, { "version": "v3", "created": "Tue, 16 May 2017 09:21:30 GMT" } ]
2023-06-22T00:00:00
[ [ "Jacobs", "Bart", "" ] ]
new_dataset
0.985685
1704.03772
Luigi Santocanale
Maria Jo\~ao Gouveia and Luigi Santocanale
$\aleph_1$ and the modal $\mu$-calculus
null
Logical Methods in Computer Science, Volume 15, Issue 4 (October 15, 2019) lmcs:4356
10.23638/LMCS-15(4:1)2019
null
cs.LO math.LO
http://creativecommons.org/licenses/by/4.0/
For a regular cardinal $\kappa$, a formula of the modal $\mu$-calculus is $\kappa$-continuous in a variable x if, on every model, its interpretation as a unary function of x is monotone and preserves unions of $\kappa$-directed sets. We define the fragment $C_{\aleph_1}(x)$ of the modal $\mu$-calculus and prove that all the formulas in this fragment are $\aleph_1$-continuous. For each formula $\phi(x)$ of the modal $\mu$-calculus, we construct a formula $\psi(x) \in C_{\aleph_1 }(x)$ such that $\phi(x)$ is $\kappa$-continuous, for some $\kappa$, if and only if $\phi(x)$ is equivalent to $\psi(x)$. Consequently, we prove that (i) the problem whether a formula is $\kappa$-continuous for some $\kappa$ is decidable, (ii) up to equivalence, there are only two fragments determined by continuity at some regular cardinal: the fragment $C_{\aleph_0}(x)$ studied by Fontaine and the fragment $C_{\aleph_1}(x)$. We apply our considerations to the problem of characterizing closure ordinals of formulas of the modal $\mu$-calculus. An ordinal $\alpha$ is the closure ordinal of a formula $\phi(x)$ if its interpretation on every model converges to its least fixed-point in at most $\alpha$ steps and if there is a model where the convergence occurs exactly in $\alpha$ steps. We prove that $\omega_1$, the least uncountable ordinal, is such a closure ordinal. Moreover we prove that closure ordinals are closed under ordinal sum. Thus, any formal expression built from 0, 1, $\omega$, $\omega_1$ by using the binary operator symbol + gives rise to a closure ordinal.
[ { "version": "v1", "created": "Wed, 12 Apr 2017 14:37:19 GMT" }, { "version": "v2", "created": "Wed, 7 Mar 2018 22:14:54 GMT" }, { "version": "v3", "created": "Wed, 27 Mar 2019 16:38:05 GMT" }, { "version": "v4", "created": "Thu, 3 Oct 2019 11:39:15 GMT" } ]
2023-06-22T00:00:00
[ [ "Gouveia", "Maria João", "" ], [ "Santocanale", "Luigi", "" ] ]
new_dataset
0.987815
1707.08757
EPTCS
Philippe Mongin (CNRS and HEC Paris)
Bayesian Decision Theory and Stochastic Independence
In Proceedings TARK 2017, arXiv:1707.08250
Philos. sci. 87 (2020) 152-178
10.1086/706083
null
cs.GT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Stochastic independence has a complex status in probability theory. It is not part of the definition of a probability measure, but it is nonetheless an essential property for the mathematical development of this theory. Bayesian decision theorists such as Savage can be criticized for being silent about stochastic independence. From their current preference axioms, they can derive no more than the definitional properties of a probability measure. In a new framework of twofold uncertainty, we introduce preference axioms that entail not only these definitional properties, but also the stochastic independence of the two sources of uncertainty. This goes some way towards filling a curious lacuna in Bayesian decision theory.
[ { "version": "v1", "created": "Thu, 27 Jul 2017 07:52:58 GMT" } ]
2023-06-22T00:00:00
[ [ "Mongin", "Philippe", "", "CNRS and HEC Paris" ] ]
new_dataset
0.985841
1708.04632
Didem G\"oz\"upek
T{\i}naz Ekim, Didem G\"oz\"upek, Ademir Hujdurovi\'c, Martin Milani\v{c}
On Almost Well-Covered Graphs of Girth at Least 6
null
Discrete Mathematics & Theoretical Computer Science, vol. 20 no. 2, Graph Theory (November 20, 2018) dmtcs:4514
10.23638/DMTCS-20-2-17
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We consider a relaxation of the concept of well-covered graphs, which are graphs with all maximal independent sets of the same size. The extent to which a graph fails to be well-covered can be measured by its independence gap, defined as the difference between the maximum and minimum sizes of a maximal independent set in $G$. While the well-covered graphs are exactly the graphs of independence gap zero, we investigate in this paper graphs of independence gap one, which we also call almost well-covered graphs. Previous works due to Finbow et al. (1994) and Barbosa et al. (2013) have implications for the structure of almost well-covered graphs of girth at least $k$ for $k\in \{7,8\}$. We focus on almost well-covered graphs of girth at least $6$. We show that every graph in this class has at most two vertices each of which is adjacent to exactly $2$ leaves. We give efficiently testable characterizations of almost well-covered graphs of girth at least $6$ having exactly one or exactly two such vertices. Building on these results, we develop a polynomial-time recognition algorithm of almost well-covered $\{C_3,C_4,C_5,C_7\}$-free graphs.
[ { "version": "v1", "created": "Tue, 15 Aug 2017 18:12:14 GMT" }, { "version": "v2", "created": "Thu, 17 May 2018 10:19:07 GMT" }, { "version": "v3", "created": "Wed, 24 Oct 2018 18:50:16 GMT" }, { "version": "v4", "created": "Sat, 17 Nov 2018 06:28:51 GMT" } ]
2023-06-22T00:00:00
[ [ "Ekim", "Tınaz", "" ], [ "Gözüpek", "Didem", "" ], [ "Hujdurović", "Ademir", "" ], [ "Milanič", "Martin", "" ] ]
new_dataset
0.970903
1708.05486
Rodrigo Silveira
Rodrigo I. Silveira, Bettina Speckmann and Kevin Verbeek
Non-crossing paths with geographic constraints
Full version of paper in Proc. 25th International Symposium on Graph Drawing and Network Visualization (GD 2017), to appear in Discrete Mathematics & Theoretical Computer Science
Discrete Mathematics & Theoretical Computer Science, Vol. 21 no. 3 , Discrete Algorithms (May 23, 2019) dmtcs:4334
10.23638/DMTCS-21-3-15
null
cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A geographic network is a graph whose vertices are restricted to lie in a prescribed region in the plane. In this paper we begin to study the following fundamental problem for geographic networks: can a given geographic network be drawn without crossings? We focus on the seemingly simple setting where each region is a vertical segment, and one wants to connect pairs of segments with a path that lies inside the convex hull of the two segments. We prove that when paths must be drawn as straight line segments, it is NP-complete to determine if a crossing-free solution exists, even if all vertical segments have unit length. In contrast, we show that when paths must be monotone curves, the question can be answered in polynomial time. In the more general case of paths that can have any shape, we show that the problem is polynomial under certain assumptions.
[ { "version": "v1", "created": "Fri, 18 Aug 2017 02:32:35 GMT" }, { "version": "v2", "created": "Wed, 28 Feb 2018 09:10:18 GMT" }, { "version": "v3", "created": "Fri, 25 Jan 2019 20:25:28 GMT" }, { "version": "v4", "created": "Tue, 21 May 2019 13:23:18 GMT" } ]
2023-06-22T00:00:00
[ [ "Silveira", "Rodrigo I.", "" ], [ "Speckmann", "Bettina", "" ], [ "Verbeek", "Kevin", "" ] ]
new_dataset
0.992444
1710.07476
Alexander Pilz
Alexander Pilz
Planar 3-SAT with a Clause/Variable Cycle
Implementing style of DMTCS journal
Discrete Mathematics & Theoretical Computer Science, Vol. 21 no. 3 , Discrete Algorithms (June 5, 2019) dmtcs:4742
10.23638/DMTCS-21-3-18
null
cs.CC cs.CG
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In the Planar 3-SAT problem, we are given a 3-SAT formula together with its incidence graph, which is planar, and are asked whether this formula is satisfiable. Since Lichtenstein's proof that this problem is NP-complete, it has been used as a starting point for a large number of reductions. In the course of this research, different restrictions on the incidence graph of the formula have been devised, for which the problem also remains hard. In this paper, we investigate the restriction in which we require that the incidence graph can be augmented by the edges of a Hamiltonian cycle that first passes through all variables and then through all clauses, in a way that the resulting graph is still planar. We show that the problem of deciding satisfiability of a 3-SAT formula remains NP-complete even if the incidence graph is restricted in that way and the Hamiltonian cycle is given. This complements previous results demanding cycles only through either the variables or clauses. The problem remains hard for monotone formulas, as well as for instances with exactly three distinct variables per clause. In the course of this investigation, we show that monotone instances of Planar 3-SAT with exactly three distinct variables per clause are always satisfiable, thus settling the question by Darmann, D\"ocker, and Dorn on the complexity of this problem variant in a surprising way.
[ { "version": "v1", "created": "Fri, 20 Oct 2017 10:39:42 GMT" }, { "version": "v2", "created": "Mon, 7 May 2018 12:16:52 GMT" }, { "version": "v3", "created": "Wed, 25 Jul 2018 11:07:44 GMT" }, { "version": "v4", "created": "Tue, 22 Jan 2019 19:02:40 GMT" }, { "version": "v5", "created": "Sun, 28 Apr 2019 16:15:25 GMT" }, { "version": "v6", "created": "Mon, 27 May 2019 19:15:18 GMT" } ]
2023-06-22T00:00:00
[ [ "Pilz", "Alexander", "" ] ]
new_dataset
0.999559
1710.08748
Thorsten Wissmann
Diego Figueira, Luc Segoufin
Bottom-up automata on data trees and vertical XPath
null
Logical Methods in Computer Science, Volume 13, Issue 4 (November 6, 2017) lmcs:4044
10.23638/LMCS-13(4:5)2017
null
cs.DB
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A data tree is a finite tree whose every node carries a label from a finite alphabet and a datum from some infinite domain. We introduce a new model of automata over unranked data trees with a decidable emptiness problem. It is essentially a bottom-up alternating automaton with one register that can store one data value and can be used to perform equality tests with the data values occurring within the subtree of the current node. We show that it captures the expressive power of the vertical fragment of XPath - containing the child, descendant, parent and ancestor axes - obtaining thus a decision procedure for its satisfiability problem.
[ { "version": "v1", "created": "Tue, 24 Oct 2017 13:04:12 GMT" }, { "version": "v2", "created": "Fri, 3 Nov 2017 11:41:58 GMT" } ]
2023-06-22T00:00:00
[ [ "Figueira", "Diego", "" ], [ "Segoufin", "Luc", "" ] ]
new_dataset
0.996715
1710.10706
Sebastian Enqvist
Sebastian Enqvist and Yde Venema
Disjunctive bases: normal forms and model theory for modal logics
This is a corrected version of the paper arXiv:1710.10706 published originally on 26/3, 2019
Logical Methods in Computer Science, Volume 15, Issue 1 (August 23, 2022) lmcs:4038
10.23638/LMCS-15(1:30)2019
null
cs.LO
http://creativecommons.org/licenses/by/4.0/
We present the concept of a disjunctive basis as a generic framework for normal forms in modal logic based on coalgebra. Disjunctive bases were defined in previous work on completeness for modal fixpoint logics, where they played a central role in the proof of a generic completeness theorem for coalgebraic mu-calculi. Believing the concept has a much wider significance, here we investigate it more thoroughly in its own right. We show that the presence of a disjunctive basis at the "one-step" level entails a number of good properties for a coalgebraic mu-calculus, in particular, a simulation theorem showing that every alternating automaton can be transformed into an equivalent nondeterministic one. Based on this, we prove a Lyndon theorem for the full fixpoint logic, its fixpoint-free fragment and its one-step fragment, and a Uniform Interpolation result, for both the full mu-calculus and its fixpoint-free fragment. We also raise the questions, when a disjunctive basis exists, and how disjunctive bases are related to Moss' coalgebraic "nabla" modalities. Nabla formulas provide disjunctive bases for many coalgebraic modal logics, but there are cases where disjunctive bases give useful normal forms even when nabla formulas fail to do so, our prime example being graded modal logic. We also show that disjunctive bases are preserved by forming sums, products and compositions of coalgebraic modal logics, providing tools for modular construction of modal logics admitting disjunctive bases. Finally, we consider the problem of giving a category-theoretic formulation of disjunctive bases, and provide a partial solution.
[ { "version": "v1", "created": "Sun, 29 Oct 2017 22:16:41 GMT" }, { "version": "v2", "created": "Tue, 31 Jul 2018 22:14:24 GMT" }, { "version": "v3", "created": "Wed, 30 Jan 2019 10:53:16 GMT" }, { "version": "v4", "created": "Mon, 25 Feb 2019 17:06:22 GMT" }, { "version": "v5", "created": "Wed, 6 Mar 2019 14:48:11 GMT" }, { "version": "v6", "created": "Tue, 26 Mar 2019 13:35:31 GMT" }, { "version": "v7", "created": "Fri, 19 Aug 2022 20:53:56 GMT" } ]
2023-06-22T00:00:00
[ [ "Enqvist", "Sebastian", "" ], [ "Venema", "Yde", "" ] ]
new_dataset
0.993751
1711.03876
Ale\v{s} Bizjak
Alexander Rabinovich
A Proof of Stavi's Theorem
arXiv admin note: text overlap with arXiv:1401.2580
Logical Methods in Computer Science, Volume 14, Issue 1 (March 6, 2018) lmcs:4061
10.23638/LMCS-14(1:20)2018
null
cs.LO
http://creativecommons.org/licenses/by/4.0/
Kamp's theorem established the expressive equivalence of the temporal logic with Until and Since and the First-Order Monadic Logic of Order (FOMLO) over the Dedekind-complete time flows. However, this temporal logic is not expressively complete for FOMLO over the rationals. Stavi introduced two additional modalities and proved that the temporal logic with Until, Since and Stavi's modalities is expressively equivalent to FOMLO over all linear orders. We present a simple proof of Stavi's theorem.
[ { "version": "v1", "created": "Thu, 9 Nov 2017 16:14:46 GMT" }, { "version": "v2", "created": "Mon, 5 Mar 2018 09:09:08 GMT" } ]
2023-06-22T00:00:00
[ [ "Rabinovich", "Alexander", "" ] ]
new_dataset
0.996978
1801.00285
Thorsten Wissmann
Paula Severi
A Light Modality for Recursion
32 pages 1 figure in pdf format
Logical Methods in Computer Science, Volume 15, Issue 1 (February 5, 2019) lmcs:4174
10.23638/LMCS-15(1:8)2019
null
cs.LO cs.PL
http://creativecommons.org/licenses/by/4.0/
We investigate the interplay between a modality for controlling the behaviour of recursive functional programs on infinite structures which are completely silent in the syntax. The latter means that programs do not contain "marks" showing the application of the introduction and elimination rules for the modality. This shifts the burden of controlling recursion from the programmer to the compiler. To do this, we introduce a typed lambda calculus a la Curry with a silent modality and guarded recursive types. The typing discipline guarantees normalisation and can be transformed into an algorithm which infers the type of a program.
[ { "version": "v1", "created": "Sun, 31 Dec 2017 14:02:33 GMT" }, { "version": "v2", "created": "Sun, 25 Feb 2018 16:16:44 GMT" }, { "version": "v3", "created": "Wed, 2 May 2018 10:41:17 GMT" }, { "version": "v4", "created": "Mon, 23 Jul 2018 19:54:35 GMT" }, { "version": "v5", "created": "Sat, 2 Feb 2019 13:57:14 GMT" } ]
2023-06-22T00:00:00
[ [ "Severi", "Paula", "" ] ]
new_dataset
0.999122
1801.01231
Amar Hadzihasanovic
Giovanni de Felice, Amar Hadzihasanovic, Kang Feng Ng
A diagrammatic calculus of fermionic quantum circuits
null
Logical Methods in Computer Science, Volume 15, Issue 3 (September 2, 2019) lmcs:5143
10.23638/LMCS-15(3:26)2019
null
cs.LO quant-ph
http://creativecommons.org/licenses/by/4.0/
We introduce the fermionic ZW calculus, a string-diagrammatic language for fermionic quantum computing (FQC). After defining a fermionic circuit model, we present the basic components of the calculus, together with their interpretation, and show how the main physical gates of interest in FQC can be represented in our language. We then list our axioms, and derive some additional equations. We prove that the axioms provide a complete equational axiomatisation of the monoidal category whose objects are systems of finitely many local fermionic modes (LFMs), with maps that preserve or reverse the parity of states, and the tensor product as monoidal product. We achieve this through a procedure that rewrites any diagram in a normal form. As an example, we show how the statistics of a fermionic Mach-Zehnder interferometer can be calculated in the diagrammatic language. We conclude by giving a diagrammatic treatment of the dual-rail encoding, a standard method in optical quantum computing used to perform universal quantum computation.
[ { "version": "v1", "created": "Thu, 4 Jan 2018 02:43:52 GMT" }, { "version": "v2", "created": "Wed, 30 Jan 2019 04:48:02 GMT" }, { "version": "v3", "created": "Tue, 25 Jun 2019 02:10:21 GMT" }, { "version": "v4", "created": "Thu, 4 Jul 2019 23:55:05 GMT" }, { "version": "v5", "created": "Fri, 30 Aug 2019 13:44:44 GMT" } ]
2023-06-22T00:00:00
[ [ "de Felice", "Giovanni", "" ], [ "Hadzihasanovic", "Amar", "" ], [ "Ng", "Kang Feng", "" ] ]
new_dataset
0.999691
1801.08707
Victor Marsault
Victor Marsault
On p/q-recognisable sets
null
Logical Methods in Computer Science, Volume 17, Issue 3 (July 28, 2021) lmcs:6834
10.46298/lmcs-17(3:12)2021
null
cs.LO cs.DM cs.FL
http://creativecommons.org/licenses/by/4.0/
Let p/q be a rational number. Numeration in base p/q is defined by a function that evaluates each finite word over A_p={0,1,...,p-1} to some rational number. We let N_p/q denote the image of this evaluation function. In particular, N_p/q contains all nonnegative integers and the literature on base p/q usually focuses on the set of words that are evaluated to nonnegative integers; it is a rather chaotic language which is not context-free. On the contrary, we study here the subsets of (N_p/q)^d that are p/q-recognisable, i.e. realised by finite automata over (A_p)^d. First, we give a characterisation of these sets as those definable in a first-order logic, similar to the one given by the B\"uchi-Bruy\`ere Theorem for integer bases numeration systems. Second, we show that the natural order relation and the modulo-q operator are not p/q-recognisable.
[ { "version": "v1", "created": "Fri, 26 Jan 2018 08:21:30 GMT" }, { "version": "v2", "created": "Tue, 1 Sep 2020 08:33:36 GMT" }, { "version": "v3", "created": "Tue, 13 Apr 2021 14:20:21 GMT" }, { "version": "v4", "created": "Tue, 6 Jul 2021 14:18:45 GMT" }, { "version": "v5", "created": "Tue, 27 Jul 2021 13:49:07 GMT" } ]
2023-06-22T00:00:00
[ [ "Marsault", "Victor", "" ] ]
new_dataset
0.997402
1802.00061
Thorsten Wissmann
Max S. New and Daniel R. Licata
Call-by-name Gradual Type Theory
null
Logical Methods in Computer Science, Volume 16, Issue 1 (January 31, 2020) lmcs:5154
10.23638/LMCS-16(1:7)2020
null
cs.PL
http://creativecommons.org/licenses/by/4.0/
We present gradual type theory, a logic and type theory for call-by-name gradual typing. We define the central constructions of gradual typing (the dynamic type, type casts and type error) in a novel way, by universal properties relative to new judgments for gradual type and term dynamism, which were developed in blame calculi and to state the "gradual guarantee" theorem of gradual typing. Combined with the ordinary extensionality ($\eta$) principles that type theory provides, we show that most of the standard operational behavior of casts is uniquely determined by the gradual guarantee. This provides a semantic justification for the definitions of casts, and shows that non-standard definitions of casts must violate these principles. Our type theory is the internal language of a certain class of preorder categories called equipments. We give a general construction of an equipment interpreting gradual type theory from a 2-category representing non-gradual types and programs, which is a semantic analogue of Findler and Felleisen's definitions of contracts, and use it to build some concrete domain-theoretic models of gradual typing.
[ { "version": "v1", "created": "Wed, 31 Jan 2018 20:48:35 GMT" }, { "version": "v2", "created": "Fri, 23 Mar 2018 20:26:53 GMT" }, { "version": "v3", "created": "Thu, 31 Jan 2019 20:46:48 GMT" }, { "version": "v4", "created": "Mon, 5 Aug 2019 18:35:46 GMT" }, { "version": "v5", "created": "Mon, 6 Jan 2020 17:19:47 GMT" }, { "version": "v6", "created": "Wed, 29 Jan 2020 19:50:44 GMT" } ]
2023-06-22T00:00:00
[ [ "New", "Max S.", "" ], [ "Licata", "Daniel R.", "" ] ]
new_dataset
0.997456
1802.02191
Kuen-Bang Hou (Favonia)
Ulrik Buchholtz, Kuen-Bang Hou (Favonia)
Cellular Cohomology in Homotopy Type Theory
null
Logical Methods in Computer Science, Volume 16, Issue 2 (June 1, 2020) lmcs:5274
10.23638/LMCS-16(2:7)2020
null
cs.LO math.AT
http://creativecommons.org/licenses/by/4.0/
We present a development of cellular cohomology in homotopy type theory. Cohomology associates to each space a sequence of abelian groups capturing part of its structure, and has the advantage over homotopy groups in that these abelian groups of many common spaces are easier to compute. Cellular cohomology is a special kind of cohomology designed for cell complexes: these are built in stages by attaching spheres of progressively higher dimension, and cellular cohomology defines the groups out of the combinatorial description of how spheres are attached. Our main result is that for finite cell complexes, a wide class of cohomology theories (including the ones defined through Eilenberg-MacLane spaces) can be calculated via cellular cohomology. This result was formalized in the Agda proof assistant.
[ { "version": "v1", "created": "Tue, 6 Feb 2018 20:06:39 GMT" }, { "version": "v2", "created": "Sat, 9 Mar 2019 23:06:15 GMT" }, { "version": "v3", "created": "Tue, 17 Dec 2019 19:20:07 GMT" }, { "version": "v4", "created": "Fri, 29 May 2020 11:24:09 GMT" } ]
2023-06-22T00:00:00
[ [ "Buchholtz", "Ulrik", "", "Favonia" ], [ "Hou", "Kuen-Bang", "", "Favonia" ] ]
new_dataset
0.997883
1802.09377
Benedikt Pago
Erich Gr\"adel and Martin Grohe and Benedikt Pago and Wied Pakusa
A Finite-Model-Theoretic View on Propositional Proof Complexity
null
Logical Methods in Computer Science, Volume 15, Issue 1 (June 14, 2022) lmcs:4320
10.23638/LMCS-15(1:4)2019
null
cs.LO
http://creativecommons.org/licenses/by/4.0/
We establish new, and surprisingly tight, connections between propositional proof complexity and finite model theory. Specifically, we show that the power of several propositional proof systems, such as Horn resolution, bounded-width resolution, and the monomial calculus of bounded degree, can be characterised in a precise sense by variants of fixed-point logics that are of fundamental importance in descriptive complexity theory. Our main results are that Horn resolution has the same expressive power as least fixed-point logic, that bounded-width resolution captures existential least fixed-point logic, and that the polynomial calculus with bounded degree over the rationals solves precisely the problems definable in fixed-point logic with counting. We also study the bounded-degree polynomial calculus. Over the rationals, it captures fixed-point logic with counting if we restrict the bit-complexity of the coefficients. For unrestricted coefficients, we can only say that the bounded-degree polynomial calculus is at most as powerful as bounded variable infinitary counting logic, but a precise logical characterisation of its power remains an open problem. These connections between logics and proof systems allow us to establish finite-model-theoretic tools for proving lower bounds for the polynomial calculus over the rationals and also over finite fields. This is a corrected version of the paper (arXiv:1802.09377) published originally on January 23, 2019.
[ { "version": "v1", "created": "Mon, 26 Feb 2018 15:07:07 GMT" }, { "version": "v2", "created": "Tue, 21 Aug 2018 13:52:45 GMT" }, { "version": "v3", "created": "Mon, 21 Jan 2019 12:04:50 GMT" }, { "version": "v4", "created": "Thu, 9 Jun 2022 14:06:50 GMT" }, { "version": "v5", "created": "Mon, 13 Jun 2022 11:38:38 GMT" } ]
2023-06-22T00:00:00
[ [ "Grädel", "Erich", "" ], [ "Grohe", "Martin", "" ], [ "Pago", "Benedikt", "" ], [ "Pakusa", "Wied", "" ] ]
new_dataset
0.996721
1803.09639
Laurent Beaudou
Laurent Beaudou and Richard C. Brewster
On the multipacking number of grid graphs
null
Discrete Mathematics & Theoretical Computer Science, Vol. 21 no. 3 , Graph Theory (June 20, 2019) dmtcs:4452
10.23638/DMTCS-21-3-23
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In 2001, Erwin introduced broadcast domination in graphs. It is a variant of classical domination where selected vertices may have different domination powers. The minimum cost of a dominating broadcast in a graph $G$ is denoted $\gamma_b(G)$. The dual of this problem is called multipacking: a multipacking is a set $M$ of vertices such that for any vertex $v$ and any positive integer $r$, the ball of radius $r$ around $v$ contains at most $r$ vertices of $M$ . The maximum size of a multipacking in a graph $G$ is denoted mp(G). Naturally mp(G) $\leq \gamma_b(G)$. Earlier results by Farber and by Lubiw show that broadcast and multipacking numbers are equal for strongly chordal graphs. In this paper, we show that all large grids (height at least 4 and width at least 7), which are far from being chordal, have their broadcast and multipacking numbers equal.
[ { "version": "v1", "created": "Mon, 26 Mar 2018 14:59:29 GMT" }, { "version": "v2", "created": "Mon, 25 Feb 2019 19:39:30 GMT" }, { "version": "v3", "created": "Thu, 28 Feb 2019 07:34:52 GMT" }, { "version": "v4", "created": "Tue, 5 Mar 2019 07:56:09 GMT" }, { "version": "v5", "created": "Mon, 17 Jun 2019 08:05:17 GMT" } ]
2023-06-22T00:00:00
[ [ "Beaudou", "Laurent", "" ], [ "Brewster", "Richard C.", "" ] ]
new_dataset
0.9795
1805.03740
Benedikt Ahrens
Benedikt Ahrens, Andr\'e Hirschowitz, Ambroise Lafont, Marco Maggesi
Presentable signatures and initial semantics
null
Logical Methods in Computer Science, Volume 17, Issue 2 (May 26, 2021) lmcs:5136
10.23638/LMCS-17(2:17)2021
null
cs.LO cs.PL
http://creativecommons.org/licenses/by/4.0/
We present a device for specifying and reasoning about syntax for datatypes, programming languages, and logic calculi. More precisely, we study a notion of "signature" for specifying syntactic constructions. In the spirit of Initial Semantics, we define the "syntax generated by a signature" to be the initial object -- if it exists -- in a suitable category of models. In our framework, the existence of an associated syntax to a signature is not automatically guaranteed. We identify, via the notion of presentation of a signature, a large class of signatures that do generate a syntax. Our (presentable) signatures subsume classical algebraic signatures (i.e., signatures for languages with variable binding, such as the pure lambda calculus) and extend them to include several other significant examples of syntactic constructions. One key feature of our notions of signature, syntax, and presentation is that they are highly compositional, in the sense that complex examples can be obtained by gluing simpler ones. Moreover, through the Initial Semantics approach, our framework provides, beyond the desired algebra of terms, a well-behaved substitution and the induction and recursion principles associated to the syntax. This paper builds upon ideas from a previous attempt by Hirschowitz-Maggesi, which, in turn, was directly inspired by some earlier work of Ghani-Uustalu-Hamana and Matthes-Uustalu. The main results presented in the paper are computer-checked within the UniMath system.
[ { "version": "v1", "created": "Wed, 9 May 2018 21:32:06 GMT" }, { "version": "v2", "created": "Tue, 29 Jan 2019 14:48:29 GMT" }, { "version": "v3", "created": "Thu, 26 Mar 2020 16:07:36 GMT" }, { "version": "v4", "created": "Sun, 2 May 2021 13:48:54 GMT" }, { "version": "v5", "created": "Tue, 25 May 2021 11:17:37 GMT" } ]
2023-06-22T00:00:00
[ [ "Ahrens", "Benedikt", "" ], [ "Hirschowitz", "André", "" ], [ "Lafont", "Ambroise", "" ], [ "Maggesi", "Marco", "" ] ]
new_dataset
0.996671
1805.11988
Ale\v{s} Bizjak
Cl\'ement Aubert and Marc Bagnol
Unification and Logarithmic Space
arXiv admin note: text overlap with arXiv:1402.4327
Logical Methods in Computer Science, Volume 14, Issue 3 (July 31, 2018) lmcs:4552
10.23638/LMCS-14(3:6)2018
null
cs.LO
http://creativecommons.org/licenses/by/4.0/
We present an algebraic characterization of the complexity classes Logspace and Nlogspace, using an algebra with a composition law based on unification. This new bridge between unification and complexity classes is rooted in proof theory and more specifically linear logic and geometry of interaction. We show how to build a model of computation in the unification algebra and then, by means of a syntactic representation of finite permutations in the algebra, we prove that whether an observation (the algebraic counterpart of a program) accepts a word can be decided within logarithmic space. Finally, we show that the construction naturally corresponds to pointer machines, a convenient way of understanding logarithmic space computation.
[ { "version": "v1", "created": "Tue, 29 May 2018 15:10:53 GMT" }, { "version": "v2", "created": "Mon, 30 Jul 2018 09:58:50 GMT" } ]
2023-06-22T00:00:00
[ [ "Aubert", "Clément", "" ], [ "Bagnol", "Marc", "" ] ]
new_dataset
0.995013
1807.00663
Pascal Caron
Pascal Caron, Edwin Hamel-De le court, Jean-Gabriel Luque, Bruno Patrou
New tools for state complexity
18 pages
Discrete Mathematics & Theoretical Computer Science, vol. 22 no. 1, Automata, Logic and Semantics (March 16, 2020) dmtcs:4835
10.23638/DMTCS-22-1-9
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A monster is an automaton in which every function from states to states is represented by at least one letter. A modifier is a set of functions allowing one to transform a set of automata into one automaton. We revisit some language transformation algorithms in terms of modifier and monster. These new theoretical concepts allow one to find easily some state complexities. We illustrate this by retrieving the state complexity of the Star of Intersection and the one of the Square root operation.
[ { "version": "v1", "created": "Mon, 2 Jul 2018 13:54:36 GMT" }, { "version": "v2", "created": "Mon, 17 Sep 2018 13:30:15 GMT" }, { "version": "v3", "created": "Tue, 24 Sep 2019 08:25:20 GMT" }, { "version": "v4", "created": "Mon, 6 Jan 2020 15:23:42 GMT" }, { "version": "v5", "created": "Mon, 20 Jan 2020 09:13:44 GMT" }, { "version": "v6", "created": "Mon, 2 Mar 2020 09:47:17 GMT" } ]
2023-06-22T00:00:00
[ [ "Caron", "Pascal", "" ], [ "court", "Edwin Hamel-De le", "" ], [ "Luque", "Jean-Gabriel", "" ], [ "Patrou", "Bruno", "" ] ]
new_dataset
0.975217
1807.00893
Blaise Genest
Nathalie Bertrand and Miheer Dewaskar and Blaise Genest and Hugo Gimbert and Adwait Amit Godbole
Controlling a population
This is a journal version of the extended abstract arXiv:1707.02058 which appeared in Concur 2017, together with proofs
Logical Methods in Computer Science, Volume 15, Issue 3 (July 29, 2019) lmcs:4662
10.23638/LMCS-15(3:6)2019
null
cs.FL cs.SY eess.SY
http://creativecommons.org/licenses/by/4.0/
We introduce a new setting where a population of agents, each modelled by a finite-state system, are controlled uniformly: the controller applies the same action to every agent. The framework is largely inspired by the control of a biological system, namely a population of yeasts, where the controller may only change the environment common to all cells. We study a synchronisation problem for such populations: no matter how individual agents react to the actions of the controller, the controller aims at driving all agents synchronously to a target state. The agents are naturally represented by a non-deterministic finite state automaton (NFA), the same for every agent, and the whole system is encoded as a 2-player game. The first player (Controller) chooses actions, and the second player (Agents) resolves non-determinism for each agent. The game with m agents is called the m -population game. This gives rise to a parameterized control problem (where control refers to 2 player games), namely the population control problem: can Controller control the m-population game for all m in N whatever Agents does?
[ { "version": "v1", "created": "Mon, 2 Jul 2018 21:15:17 GMT" }, { "version": "v2", "created": "Thu, 7 Mar 2019 16:59:29 GMT" }, { "version": "v3", "created": "Fri, 26 Jul 2019 13:40:58 GMT" } ]
2023-06-22T00:00:00
[ [ "Bertrand", "Nathalie", "" ], [ "Dewaskar", "Miheer", "" ], [ "Genest", "Blaise", "" ], [ "Gimbert", "Hugo", "" ], [ "Godbole", "Adwait Amit", "" ] ]
new_dataset
0.967879
1808.08710
Laurent Beaudou
Laurent Beaudou, Giacomo Kahn and Matthieu Rosenfeld
Bisplit graphs satisfy the Chen-Chv\'atal conjecture
null
Discrete Mathematics & Theoretical Computer Science, vol. 21 no. 1, ICGT 2018 (May 29, 2019) dmtcs:4813
10.23638/DMTCS-21-1-5
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
In this paper, we give a lengthy proof of a small result! A graph is bisplit if its vertex set can be partitioned into three stable sets with two of them inducing a complete bipartite graph. We prove that these graphs satisfy the Chen-Chv\'atal conjecture: their metric space (in the usual sense) has a universal line (in an unusual sense) or at least as many lines as the number of vertices.
[ { "version": "v1", "created": "Mon, 27 Aug 2018 07:19:53 GMT" }, { "version": "v2", "created": "Tue, 28 Aug 2018 07:31:17 GMT" }, { "version": "v3", "created": "Thu, 7 Mar 2019 08:13:12 GMT" }, { "version": "v4", "created": "Thu, 23 May 2019 13:13:31 GMT" } ]
2023-06-22T00:00:00
[ [ "Beaudou", "Laurent", "" ], [ "Kahn", "Giacomo", "" ], [ "Rosenfeld", "Matthieu", "" ] ]
new_dataset
0.999329
1809.09033
Olivier Carton
Olivier Carton and Luc Boasson
Transfinite Lyndon words
null
Logical Methods in Computer Science, Volume 16, Issue 4 (November 10, 2020) lmcs:4851
10.23638/LMCS-16(4:9)2020
null
cs.FL
http://creativecommons.org/licenses/by/4.0/
In this paper, we extend the notion of Lyndon word to transfinite words. We prove two main results. We first show that, given a transfinite word, there exists a unique factorization in Lyndon words that are densely non-increasing, a relaxation of the condition used in the case of finite words. In the annex, we prove that the factorization of a rational word has a special form and that it can be computed from a rational expression describing the word.
[ { "version": "v1", "created": "Mon, 24 Sep 2018 16:20:26 GMT" }, { "version": "v2", "created": "Tue, 18 Feb 2020 18:16:05 GMT" }, { "version": "v3", "created": "Tue, 25 Aug 2020 09:05:29 GMT" }, { "version": "v4", "created": "Wed, 26 Aug 2020 13:08:53 GMT" }, { "version": "v5", "created": "Fri, 28 Aug 2020 06:55:43 GMT" }, { "version": "v6", "created": "Mon, 9 Nov 2020 14:47:58 GMT" } ]
2023-06-22T00:00:00
[ [ "Carton", "Olivier", "" ], [ "Boasson", "Luc", "" ] ]
new_dataset
0.999564
1810.12896
Alexandre Talon
Micha\"el Rao and Alexandre Talon
The 2-domination and Roman domination numbers of grid graphs
11 pages, 5 figures, presented at ICGT 2018 The program that led to the results is included in the Source directory (see Other formats) Accepted in DMTCS vol 21. Journal version with their template
Discrete Mathematics & Theoretical Computer Science, vol. 21 no. 1, ICGT 2018 (May 23, 2019) dmtcs:4952
10.23638/DMTCS-21-1-9
null
cs.DM math.CO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We investigate the 2-domination number for grid graphs, that is the size of a smallest set $D$ of vertices of the grid such that each vertex of the grid belongs to $D$ or has at least two neighbours in $D$. We give a closed formula giving the 2-domination number of any $n \!\times\! m$ grid, hereby confirming the results found by Lu and Xu, and Shaheen et al. for $n \leq 4$ and slightly correct the value of Shaheen et al. for $n = 5$. The proof relies on some dynamic programming algorithms, using transfer matrices in (min,+)-algebra. We also apply the method to solve the Roman domination problem on grid graphs.
[ { "version": "v1", "created": "Tue, 30 Oct 2018 17:47:09 GMT" }, { "version": "v2", "created": "Thu, 1 Nov 2018 17:40:24 GMT" }, { "version": "v3", "created": "Tue, 16 Apr 2019 15:40:28 GMT" }, { "version": "v4", "created": "Fri, 17 May 2019 14:15:52 GMT" } ]
2023-06-22T00:00:00
[ [ "Rao", "Michaël", "" ], [ "Talon", "Alexandre", "" ] ]
new_dataset
0.993569
1901.03366
Philipp Hieronymi
Alexi Block Gorman, Philipp Hieronymi, Elliot Kaplan, Ruoyu Meng, Erik Walsberg, Zihe Wang, Ziqin Xiong, Hongru Yang
Continuous Regular Functions
null
Logical Methods in Computer Science, Volume 16, Issue 1 (February 14, 2020) lmcs:5301
10.23638/LMCS-16(1:17)2020
null
cs.LO math.LO
http://creativecommons.org/licenses/by/4.0/
Following Chaudhuri, Sankaranarayanan, and Vardi, we say that a function $f:[0,1] \to [0,1]$ is $r$-regular if there is a B\"{u}chi automaton that accepts precisely the set of base $r \in \mathbb{N}$ representations of elements of the graph of $f$. We show that a continuous $r$-regular function $f$ is locally affine away from a nowhere dense, Lebesgue null, subset of $[0,1]$. As a corollary we establish that every differentiable $r$-regular function is affine. It follows that checking whether an $r$-regular function is differentiable is in $\operatorname{PSPACE}$. Our proofs rely crucially on connections between automata theory and metric geometry developed by Charlier, Leroy, and Rigo.
[ { "version": "v1", "created": "Thu, 10 Jan 2019 20:08:05 GMT" }, { "version": "v2", "created": "Mon, 16 Sep 2019 21:41:08 GMT" }, { "version": "v3", "created": "Thu, 13 Feb 2020 10:12:11 GMT" } ]
2023-06-22T00:00:00
[ [ "Gorman", "Alexi Block", "" ], [ "Hieronymi", "Philipp", "" ], [ "Kaplan", "Elliot", "" ], [ "Meng", "Ruoyu", "" ], [ "Walsberg", "Erik", "" ], [ "Wang", "Zihe", "" ], [ "Xiong", "Ziqin", "" ], [ "Yang", "Hongru", "" ] ]
new_dataset
0.990357
1901.03571
Mickael Randour
Thomas Brihaye, Florent Delgrange, Youssouf Oualhadj, and Mickael Randour
Life is Random, Time is Not: Markov Decision Processes with Window Objectives
null
Logical Methods in Computer Science, Volume 16, Issue 4 (December 14, 2020) lmcs:5968
10.23638/LMCS-16(4:13)2020
null
cs.LO cs.AI cs.FL cs.GT math.PR
http://creativecommons.org/licenses/by/4.0/
The window mechanism was introduced by Chatterjee et al. to strengthen classical game objectives with time bounds. It permits to synthesize system controllers that exhibit acceptable behaviors within a configurable time frame, all along their infinite execution, in contrast to the traditional objectives that only require correctness of behaviors in the limit. The window concept has proved its interest in a variety of two-player zero-sum games because it enables reasoning about such time bounds in system specifications, but also thanks to the increased tractability that it usually yields. In this work, we extend the window framework to stochastic environments by considering Markov decision processes. A fundamental problem in this context is the threshold probability problem: given an objective it aims to synthesize strategies that guarantee satisfying runs with a given probability. We solve it for the usual variants of window objectives, where either the time frame is set as a parameter, or we ask if such a time frame exists. We develop a generic approach for window-based objectives and instantiate it for the classical mean-payoff and parity objectives, already considered in games. Our work paves the way to a wide use of the window mechanism in stochastic models.
[ { "version": "v1", "created": "Fri, 11 Jan 2019 12:20:34 GMT" }, { "version": "v2", "created": "Wed, 3 Jul 2019 16:52:04 GMT" }, { "version": "v3", "created": "Wed, 11 Dec 2019 09:11:52 GMT" }, { "version": "v4", "created": "Thu, 2 Apr 2020 13:53:51 GMT" }, { "version": "v5", "created": "Thu, 10 Dec 2020 19:59:49 GMT" } ]
2023-06-22T00:00:00
[ [ "Brihaye", "Thomas", "" ], [ "Delgrange", "Florent", "" ], [ "Oualhadj", "Youssouf", "" ], [ "Randour", "Mickael", "" ] ]
new_dataset
0.999481
1901.06547
Mat\v{e}j Dost\'al
Marta B\'ilkov\'a, Mat\v{e}j Dost\'al
Moss' logic for ordered coalgebras
null
Logical Methods in Computer Science, Volume 18, Issue 3 (August 9, 2022) lmcs:5158
10.46298/lmcs-18(3:18)2022
null
cs.LO
http://creativecommons.org/licenses/by/4.0/
We present a finitary version of Moss' coalgebraic logic for $T$-coalgebras, where $T$ is a locally monotone endofunctor of the category of posets and monotone maps. The logic uses a single cover modality whose arity is given by the least finitary subfunctor of the dual of the coalgebra functor $T_\omega^\partial$, and the semantics of the modality is given by relation lifting. For the semantics to work, $T$ is required to preserve exact squares. For the finitary setting to work, $T_\omega^\partial$ is required to preserve finite intersections. We develop a notion of a base for subobjects of $T_\omega X$. This in particular allows us to talk about the finite poset of subformulas for a given formula. The notion of a base is introduced generally for a category equipped with a suitable factorisation system. We prove that the resulting logic has the Hennessy-Milner property for the notion of similarity based on the notion of relation lifting. We define a sequent proof system for the logic, and prove its completeness.
[ { "version": "v1", "created": "Sat, 19 Jan 2019 16:14:25 GMT" }, { "version": "v2", "created": "Wed, 16 Dec 2020 16:24:01 GMT" }, { "version": "v3", "created": "Mon, 14 Jun 2021 16:09:52 GMT" }, { "version": "v4", "created": "Mon, 25 Jul 2022 12:06:16 GMT" }, { "version": "v5", "created": "Sat, 6 Aug 2022 12:49:05 GMT" } ]
2023-06-22T00:00:00
[ [ "Bílková", "Marta", "" ], [ "Dostál", "Matěj", "" ] ]
new_dataset
0.990198
1902.08345
Thorsten Wissmann
Mauricio Ayala-Rinc\'on, Maribel Fern\'andez and Daniele Nantes-Sobrinho
On Nominal Syntax and Permutation Fixed Points
null
Logical Methods in Computer Science, Volume 16, Issue 1 (February 17, 2020) lmcs:5209
10.23638/LMCS-16(1:19)2020
null
cs.LO
http://creativecommons.org/licenses/by/4.0/
We propose a new axiomatisation of the alpha-equivalence relation for nominal terms, based on a primitive notion of fixed-point constraint. We show that the standard freshness relation between atoms and terms can be derived from the more primitive notion of permutation fixed-point, and use this result to prove the correctness of the new $\alpha$-equivalence axiomatisation. This gives rise to a new notion of nominal unification, where solutions for unification problems are pairs of a fixed-point context and a substitution. Although it may seem less natural than the standard notion of nominal unifier based on freshness constraints, the notion of unifier based on fixed-point constraints behaves better when equational theories are considered: for example, nominal unification remains finitary in the presence of commutativity, whereas it becomes infinitary when unifiers are expressed using freshness contexts. We provide a definition of $\alpha$-equivalence modulo equational theories that take into account A, C and AC theories. Based on this notion of equivalence, we show that C-unification is finitary and we provide a sound and complete C-unification algorithm, as a first step towards the development of nominal unification modulo AC and other equational theories with permutative properties.
[ { "version": "v1", "created": "Fri, 22 Feb 2019 02:48:02 GMT" }, { "version": "v2", "created": "Sun, 28 Jul 2019 02:32:47 GMT" }, { "version": "v3", "created": "Mon, 23 Dec 2019 14:38:23 GMT" }, { "version": "v4", "created": "Fri, 14 Feb 2020 08:25:52 GMT" } ]
2023-06-22T00:00:00
[ [ "Ayala-Rincón", "Mauricio", "" ], [ "Fernández", "Maribel", "" ], [ "Nantes-Sobrinho", "Daniele", "" ] ]
new_dataset
0.987197
1902.10654
Thorsten Wissmann
Karoliina Lehtinen and Udi Boker
Register Games
null
Logical Methods in Computer Science, Volume 16, Issue 2 (May 19, 2020) lmcs:5217
10.23638/LMCS-16(2:6)2020
null
cs.FL
http://creativecommons.org/licenses/by/4.0/
The complexity of parity games is a long standing open problem that saw a major breakthrough in 2017 when two quasi-polynomial algorithms were published. This article presents a third, independent approach to solving parity games in quasi-polynomial time, based on the notion of register game, a parameterised variant of a parity game. The analysis of register games leads to a quasi-polynomial algorithm for parity games, a polynomial algorithm for restricted classes of parity games and a novel measure of complexity, the register index, which aims to capture the combined complexity of the priority assignement and the underlying game graph. We further present a translation of alternating parity word automata into alternating weak automata with only a quasi-polynomial increase in size, based on register games; this improves on the previous exponential translation. We also use register games to investigate the parity index hierarchy: while for words the index hierarchy of alternating parity automata collapses to the weak level, and for trees it is strict, for structures between trees and words, it collapses logarithmically, in the sense that any parity tree automaton of size n is equivalent, on these particular classes of structures, to an automaton with a number of priorities logarithmic in n.
[ { "version": "v1", "created": "Wed, 27 Feb 2019 17:39:31 GMT" }, { "version": "v2", "created": "Thu, 28 Feb 2019 10:08:52 GMT" }, { "version": "v3", "created": "Fri, 1 Mar 2019 09:14:55 GMT" }, { "version": "v4", "created": "Thu, 3 Oct 2019 14:54:20 GMT" }, { "version": "v5", "created": "Wed, 8 Apr 2020 15:45:36 GMT" }, { "version": "v6", "created": "Thu, 23 Apr 2020 13:44:55 GMT" }, { "version": "v7", "created": "Mon, 18 May 2020 13:22:34 GMT" } ]
2023-06-22T00:00:00
[ [ "Lehtinen", "Karoliina", "" ], [ "Boker", "Udi", "" ] ]
new_dataset
0.95459
1903.09905
Tim Smith
Tim Smith
A Characterization of Morphic Words with Polynomial Growth
null
Discrete Mathematics & Theoretical Computer Science, vol. 22 no. 1, Automata, Logic and Semantics (February 6, 2020) dmtcs:5324
10.23638/DMTCS-22-1-3
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A morphic word is obtained by iterating a morphism to generate an infinite word, and then applying a coding. We characterize morphic words with polynomial growth in terms of a new type of infinite word called a $\textit{zigzag word}$. A zigzag word is represented by an initial string, followed by a finite list of terms, each of which repeats for each $n \geq 1$ in one of three ways: it grows forward [$t(1)\ t(2)\ \dotsm\ t(n)]$, backward [$t(n)\ \dotsm\ t(2)\ t(1)$], or just occurs once [$t$]. Each term can recursively contain subterms with their own forward and backward repetitions. We show that an infinite word is morphic with growth $\Theta(n^k)$ iff it is a zigzag word of depth $k$. As corollaries, we obtain that the morphic words with growth $O(n)$ are exactly the ultimately periodic words, and the morphic words with growth $O(n^2)$ are exactly the multilinear words.
[ { "version": "v1", "created": "Sun, 24 Mar 2019 00:24:05 GMT" }, { "version": "v2", "created": "Thu, 31 Oct 2019 15:36:58 GMT" }, { "version": "v3", "created": "Sat, 1 Feb 2020 19:31:13 GMT" }, { "version": "v4", "created": "Tue, 4 Feb 2020 18:00:42 GMT" } ]
2023-06-22T00:00:00
[ [ "Smith", "Tim", "" ] ]
new_dataset
0.958817
1904.01381
Abuzer Yakaryilmaz
Aleksejs Naumovs, Maksims Dimitrijevs, and Abuzer Yakary{\i}lmaz
The minimal probabilistic and quantum finite automata recognizing uncountably many languages with fixed cutpoints
12 pages, minor revisions, changing the format to "dmtcs-episciences" style
Discrete Mathematics & Theoretical Computer Science, vol. 22 no. 1, Automata, Logic and Semantics (April 30, 2020) dmtcs:5450
10.23638/DMTCS-22-1-13
null
cs.FL cs.CC quant-ph
http://creativecommons.org/licenses/by/4.0/
It is known that 2-state binary and 3-state unary probabilistic finite automata and 2-state unary quantum finite automata recognize uncountably many languages with cutpoints. These results have been obtained by associating each recognized language with a cutpoint and then by using the fact that there are uncountably many cutpoints. In this note, we prove the same results for fixed cutpoints: each recognized language is associated with an automaton (i.e., algorithm), and the proofs use the fact that there are uncountably many automata. For each case, we present a new construction.
[ { "version": "v1", "created": "Tue, 2 Apr 2019 12:52:20 GMT" }, { "version": "v2", "created": "Fri, 10 May 2019 10:52:53 GMT" }, { "version": "v3", "created": "Thu, 2 Apr 2020 16:22:43 GMT" }, { "version": "v4", "created": "Tue, 28 Apr 2020 12:36:57 GMT" } ]
2023-06-22T00:00:00
[ [ "Naumovs", "Aleksejs", "" ], [ "Dimitrijevs", "Maksims", "" ], [ "Yakaryılmaz", "Abuzer", "" ] ]
new_dataset
0.999196
1904.02564
Antoine Amarilli
Joachim Parrow, Johannes Borgstr\"om, Lars-Henrik Eriksson, Ram\=unas Forsberg Gutkovas, Tjark Weber
Modal Logics for Nominal Transition Systems
null
Logical Methods in Computer Science, Volume 17, Issue 1 (January 28, 2021) lmcs:5353
10.23638/LMCS-17(1:6)2021
null
cs.LO
http://creativecommons.org/licenses/by/4.0/
We define a general notion of transition system where states and action labels can be from arbitrary nominal sets, actions may bind names, and state predicates from an arbitrary logic define properties of states. A Hennessy-Milner logic for these systems is introduced, and proved adequate and expressively complete for bisimulation equivalence. A main technical novelty is the use of finitely supported infinite conjunctions. We show how to treat different bisimulation variants such as early, late, open and weak in a systematic way, explore the folklore theorem that state predicates can be replaced by actions, and make substantial comparisons with related work. The main definitions and theorems have been formalised in Nominal Isabelle.
[ { "version": "v1", "created": "Thu, 4 Apr 2019 14:11:42 GMT" }, { "version": "v2", "created": "Thu, 26 Mar 2020 15:33:10 GMT" }, { "version": "v3", "created": "Wed, 27 Jan 2021 09:44:32 GMT" } ]
2023-06-22T00:00:00
[ [ "Parrow", "Joachim", "" ], [ "Borgström", "Johannes", "" ], [ "Eriksson", "Lars-Henrik", "" ], [ "Gutkovas", "Ramūnas Forsberg", "" ], [ "Weber", "Tjark", "" ] ]
new_dataset
0.993728
1905.00559
Heiko Vogler
Joost Engelfriet and Heiko Vogler
A B\"uchi-Elgot-Trakhtenbrot theorem for automata with MSO graph storage
null
Discrete Mathematics & Theoretical Computer Science, vol. 22 no. 4, Automata, Logic and Semantics (August 27, 2020) dmtcs:5424
10.23638/DMTCS-22-4-3
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We introduce MSO graph storage types, and call a storage type MSO-expressible if it is isomorphic to some MSO graph storage type. An MSO graph storage type has MSO-definable sets of graphs as storage configurations and as storage transformations. We consider sequential automata with MSO graph storage and associate with each such automaton a string language (in the usual way) and a graph language; a graph is accepted by the automaton if it represents a correct sequence of storage configurations for a given input string. For each MSO graph storage type, we define an MSO logic which is a subset of the usual MSO logic on graphs. We prove a B\"uchi-Elgot-Trakhtenbrot theorem, both for the string case and the graph case. Moreover, we prove that (i) each MSO graph transduction can be used as storage transformation in an MSO graph storage type, (ii) every automatic storage type is MSO-expressible, and (iii) the pushdown operator on storage types preserves the property of MSO-expressibility. Thus, the iterated pushdown storage types are MSO-expressible.
[ { "version": "v1", "created": "Thu, 2 May 2019 03:03:44 GMT" }, { "version": "v2", "created": "Thu, 7 Nov 2019 14:51:48 GMT" }, { "version": "v3", "created": "Wed, 1 Jul 2020 12:11:53 GMT" }, { "version": "v4", "created": "Thu, 20 Aug 2020 16:04:42 GMT" } ]
2023-06-22T00:00:00
[ [ "Engelfriet", "Joost", "" ], [ "Vogler", "Heiko", "" ] ]
new_dataset
0.984993
1905.03588
Antoine Amarilli
Milad Aghajohari and Guy Avni and Thomas A. Henzinger
Determinacy in Discrete-Bidding Infinite-Duration Games
null
Logical Methods in Computer Science, Volume 17, Issue 1 (February 3, 2021) lmcs:5977
10.23638/LMCS-17(1:10)2021
null
cs.GT cs.LO
http://creativecommons.org/licenses/by/4.0/
In two-player games on graphs, the players move a token through a graph to produce an infinite path, which determines the winner of the game. Such games are central in formal methods since they model the interaction between a non-terminating system and its environment. In bidding games the players bid for the right to move the token: in each round, the players simultaneously submit bids, and the higher bidder moves the token and pays the other player. Bidding games are known to have a clean and elegant mathematical structure that relies on the ability of the players to submit arbitrarily small bids. Many applications, however, require a fixed granularity for the bids, which can represent, for example, the monetary value expressed in cents. We study, for the first time, the combination of discrete-bidding and infinite-duration games. Our most important result proves that these games form a large determined subclass of concurrent games, where determinacy is the strong property that there always exists exactly one player who can guarantee winning the game. In particular, we show that, in contrast to non-discrete bidding games, the mechanism with which tied bids are resolved plays an important role in discrete-bidding games. We study several natural tie-breaking mechanisms and show that, while some do not admit determinacy, most natural mechanisms imply determinacy for every pair of initial budgets.
[ { "version": "v1", "created": "Thu, 9 May 2019 13:08:10 GMT" }, { "version": "v2", "created": "Thu, 4 Jul 2019 08:17:05 GMT" }, { "version": "v3", "created": "Mon, 16 Dec 2019 13:56:15 GMT" }, { "version": "v4", "created": "Thu, 17 Sep 2020 07:23:25 GMT" }, { "version": "v5", "created": "Fri, 25 Dec 2020 08:32:17 GMT" }, { "version": "v6", "created": "Mon, 1 Feb 2021 19:37:17 GMT" } ]
2023-06-22T00:00:00
[ [ "Aghajohari", "Milad", "" ], [ "Avni", "Guy", "" ], [ "Henzinger", "Thomas A.", "" ] ]
new_dataset
0.999235
1906.04199
Vrunda Dave
V. Dave, E. Filiot, S. Krishna and N. Lhote
Synthesis of Computable Regular Functions of Infinite Words
null
Logical Methods in Computer Science, Volume 18, Issue 2 (June 29, 2022) lmcs:7592
10.46298/lmcs-18(2:23)2022
null
cs.FL cs.LO
http://creativecommons.org/licenses/by/4.0/
Regular functions from infinite words to infinite words can be equivalently specified by MSO-transducers, streaming $\omega$-string transducers as well as deterministic two-way transducers with look-ahead. In their one-way restriction, the latter transducers define the class of rational functions. Even though regular functions are robustly characterised by several finite-state devices, even the subclass of rational functions may contain functions which are not computable (by a Turing machine with infinite input). This paper proposes a decision procedure for the following synthesis problem: given a regular function $f$ (equivalently specified by one of the aforementioned transducer model), is $f$ computable and if it is, synthesize a Turing machine computing it. For regular functions, we show that computability is equivalent to continuity, and therefore the problem boils down to deciding continuity. We establish a generic characterisation of continuity for functions preserving regular languages under inverse image (such as regular functions). We exploit this characterisation to show the decidability of continuity (and hence computability) of rational and regular functions. For rational functions, we show that this can be done in $\mathsf{NLogSpace}$ (it was already known to be in $\mathsf{PTime}$ by Prieur). In a similar fashion, we also effectively characterise uniform continuity of regular functions, and relate it to the notion of uniform computability, which offers stronger efficiency guarantees.
[ { "version": "v1", "created": "Wed, 15 May 2019 11:35:35 GMT" }, { "version": "v2", "created": "Tue, 15 Jun 2021 14:37:13 GMT" }, { "version": "v3", "created": "Wed, 16 Feb 2022 12:04:14 GMT" }, { "version": "v4", "created": "Mon, 25 Apr 2022 17:13:29 GMT" }, { "version": "v5", "created": "Tue, 28 Jun 2022 11:41:33 GMT" } ]
2023-06-22T00:00:00
[ [ "Dave", "V.", "" ], [ "Filiot", "E.", "" ], [ "Krishna", "S.", "" ], [ "Lhote", "N.", "" ] ]
new_dataset
0.985146
1906.09503
Vladimir Zamdzhiev
Bert Lindenhovius and Michael Mislove and Vladimir Zamdzhiev
LNL-FPC: The Linear/Non-linear Fixpoint Calculus
null
Logical Methods in Computer Science, Volume 17, Issue 2 (April 22, 2021) lmcs:5703
10.23638/LMCS-17(2:9)2021
null
cs.PL cs.LO math.CT
http://creativecommons.org/licenses/by/4.0/
We describe a type system with mixed linear and non-linear recursive types called LNL-FPC (the linear/non-linear fixpoint calculus). The type system supports linear typing, which enhances the safety properties of programs, but also supports non-linear typing as well, which makes the type system more convenient for programming. Just as in FPC, we show that LNL-FPC supports type-level recursion, which in turn induces term-level recursion. We also provide sound and computationally adequate categorical models for LNL-FPC that describe the categorical structure of the substructural operations of Intuitionistic Linear Logic at all non-linear types, including the recursive ones. In order to do so, we describe a new technique for solving recursive domain equations within cartesian categories by constructing the solutions over pre-embeddings. The type system also enjoys implicit weakening and contraction rules that we are able to model by identifying the canonical comonoid structure of all non-linear types. We also show that the requirements of our abstract model are reasonable by constructing a large class of concrete models that have found applications not only in classical functional programming, but also in emerging programming paradigms that incorporate linear types, such as quantum programming and circuit description programming languages.
[ { "version": "v1", "created": "Sat, 22 Jun 2019 20:50:27 GMT" }, { "version": "v2", "created": "Wed, 21 Aug 2019 14:30:24 GMT" }, { "version": "v3", "created": "Mon, 25 May 2020 23:21:45 GMT" }, { "version": "v4", "created": "Wed, 17 Mar 2021 20:37:57 GMT" }, { "version": "v5", "created": "Tue, 23 Mar 2021 15:07:34 GMT" }, { "version": "v6", "created": "Wed, 21 Apr 2021 06:44:05 GMT" } ]
2023-06-22T00:00:00
[ [ "Lindenhovius", "Bert", "" ], [ "Mislove", "Michael", "" ], [ "Zamdzhiev", "Vladimir", "" ] ]
new_dataset
0.989229
1907.13115
Tom\'a\v{s} Masopust
Tom\'a\v{s} Masopust and Markus Kr\"otzsch
Partially Ordered Automata and Piecewise Testability
arXiv admin note: text overlap with arXiv:1704.07860
Logical Methods in Computer Science, Volume 17, Issue 2 (May 11, 2021) lmcs:5900
10.23638/LMCS-17(2:14)2021
null
cs.LO cs.FL
http://creativecommons.org/licenses/by/4.0/
Partially ordered automata are automata where the transition relation induces a partial order on states. The expressive power of partially ordered automata is closely related to the expressivity of fragments of first-order logic on finite words or, equivalently, to the language classes of the levels of the Straubing-Th\'erien hierarchy. Several fragments (levels) have been intensively investigated under various names. For instance, the fragment of first-order formulae with a single existential block of quantifiers in prenex normal form is known as piecewise testable languages or $J$-trivial languages. These languages are characterized by confluent partially ordered DFAs or by complete, confluent, and self-loop-deterministic partially ordered NFAs (ptNFAs for short). In this paper, we study the complexity of basic questions for several types of partially ordered automata on finite words; namely, the questions of inclusion, equivalence, and ($k$-)piecewise testability. The lower-bound complexity boils down to the complexity of universality. The universality problem asks whether a system recognizes all words over its alphabet. For ptNFAs, the complexity of universality decreases if the alphabet is fixed, but it is open if the alphabet may grow with the number of states. We show that deciding universality for general ptNFAs is as hard as for general NFAs. Our proof is a novel and nontrivial extension of our recent construction for self-loop-deterministic partially ordered NFAs, a model strictly more expressive than ptNFAs. We provide a comprehensive picture of the complexities of the problems of inclusion, equivalence, and ($k$-)piecewise testability for the considered types of automata.
[ { "version": "v1", "created": "Mon, 29 Jul 2019 10:50:26 GMT" }, { "version": "v2", "created": "Sun, 29 Sep 2019 18:03:19 GMT" }, { "version": "v3", "created": "Fri, 8 Nov 2019 16:33:55 GMT" }, { "version": "v4", "created": "Sun, 5 Jul 2020 20:42:56 GMT" }, { "version": "v5", "created": "Fri, 16 Apr 2021 20:04:03 GMT" }, { "version": "v6", "created": "Wed, 21 Apr 2021 20:17:12 GMT" }, { "version": "v7", "created": "Mon, 10 May 2021 13:46:30 GMT" } ]
2023-06-22T00:00:00
[ [ "Masopust", "Tomáš", "" ], [ "Krötzsch", "Markus", "" ] ]
new_dataset
0.994725
1910.06057
Matthias Hoelzel
Matthias Hoelzel and Richard Wilke
On the Union Closed Fragment of Existential Second-Order Logic and Logics with Team Semantics
null
Logical Methods in Computer Science, Volume 17, Issue 3 (July 30, 2021) lmcs:6501
10.46298/lmcs-17(3:14)2021
null
cs.LO
http://creativecommons.org/licenses/by/4.0/
We present syntactic characterisations for the union closed fragments of existential second-order logic and of logics with team semantics. Since union closure is a semantical and undecidable property, the normal form we introduce enables the handling and provides a better understanding of this fragment. We also introduce inclusion-exclusion games that turn out to be precisely the corresponding model-checking games. These games are not only interesting in their own right, but they also are a key factor towards building a bridge between the semantic and syntactic fragments. On the level of logics with team semantics we additionally present restrictions of inclusion-exclusion logic to capture the union closed fragment. Moreover, we define a team based atom that when adding it to first-order logic also precisely captures the union closed fragment of existential second-order logic which answers an open question by Galliani and Hella.
[ { "version": "v1", "created": "Mon, 14 Oct 2019 11:53:22 GMT" }, { "version": "v2", "created": "Thu, 21 May 2020 22:19:28 GMT" }, { "version": "v3", "created": "Mon, 11 Jan 2021 11:00:22 GMT" }, { "version": "v4", "created": "Thu, 29 Jul 2021 07:27:10 GMT" } ]
2023-06-22T00:00:00
[ [ "Hoelzel", "Matthias", "" ], [ "Wilke", "Richard", "" ] ]
new_dataset
0.996657
2001.00758
Mateus de Oliveira
Mateus de Oliveira Oliveira
On Supergraphs Satisfying CMSO Properties
null
Logical Methods in Computer Science, Volume 17, Issue 4 (November 29, 2021) lmcs:6016
10.46298/lmcs-17(4:14)2021
null
cs.LO
http://creativecommons.org/licenses/by/4.0/
Let CMSO denote the counting monadic second order logic of graphs. We give a constructive proof that for some computable function $f$, there is an algorithm $\mathfrak{A}$ that takes as input a CMSO sentence $\varphi$, a positive integer $t$, and a connected graph $G$ of maximum degree at most $\Delta$, and determines, in time $f(|\varphi|,t)\cdot 2^{O(\Delta \cdot t)}\cdot |G|^{O(t)}$, whether $G$ has a supergraph $G'$ of treewidth at most $t$ such that $G'\models \varphi$. The algorithmic metatheorem described above sheds new light on certain unresolved questions within the framework of graph completion algorithms. In particular, using this metatheorem, we provide an explicit algorithm that determines, in time $f(d)\cdot 2^{O(\Delta \cdot d)}\cdot |G|^{O(d)}$, whether a connected graph of maximum degree $\Delta$ has a planar supergraph of diameter at most $d$. Additionally, we show that for each fixed $k$, the problem of determining whether $G$ has an $k$-outerplanar supergraph of diameter at most $d$ is strongly uniformly fixed parameter tractable with respect to the parameter $d$. This result can be generalized in two directions. First, the diameter parameter can be replaced by any contraction-closed effectively CMSO-definable parameter $\mathbf{p}$. Examples of such parameters are vertex-cover number, dominating number, and many other contraction-bidimensional parameters. In the second direction, the planarity requirement can be relaxed to bounded genus, and more generally, to bounded local treewidth.
[ { "version": "v1", "created": "Fri, 3 Jan 2020 08:21:11 GMT" }, { "version": "v2", "created": "Mon, 3 Feb 2020 00:23:13 GMT" }, { "version": "v3", "created": "Mon, 13 Sep 2021 13:00:10 GMT" }, { "version": "v4", "created": "Mon, 25 Oct 2021 01:36:58 GMT" }, { "version": "v5", "created": "Thu, 25 Nov 2021 07:50:40 GMT" } ]
2023-06-22T00:00:00
[ [ "Oliveira", "Mateus de Oliveira", "" ] ]
new_dataset
0.9948
2001.07658
Tim A. C. Willemse
Jan Friso Groote and Tim A. C. Willemse
A symmetric protocol to establish service level agreements
null
Logical Methods in Computer Science, Volume 16, Issue 3 (September 30, 2020) lmcs:6044
10.23638/LMCS-16(3:19)2020
null
cs.LO
http://creativecommons.org/licenses/by/4.0/
We present a symmetrical protocol to repeatedly negotiate a desired service level between two parties, where the service levels are taken from some totally ordered finite domain. The agreed service level is selected from levels dynamically proposed by both parties and parties can only decrease the desired service level during a negotiation. The correctness of the protocol is stated using modal formulas and its behaviour is explained using behavioural reductions of the external behaviour modulo weak trace equivalence and divergence-preserving branching bisimulation. Our protocol originates from an industrial use case and it turned out to be remarkably tricky to design correctly.
[ { "version": "v1", "created": "Tue, 21 Jan 2020 17:17:57 GMT" }, { "version": "v2", "created": "Fri, 17 Jul 2020 13:29:22 GMT" }, { "version": "v3", "created": "Fri, 11 Sep 2020 12:42:47 GMT" }, { "version": "v4", "created": "Mon, 28 Sep 2020 20:52:35 GMT" } ]
2023-06-22T00:00:00
[ [ "Groote", "Jan Friso", "" ], [ "Willemse", "Tim A. C.", "" ] ]
new_dataset
0.998
2001.08478
Joerg Endrullis
J\"org Endrullis, Jan Willem Klop, Roy Overbeek
Star Games and Hydras
null
Logical Methods in Computer Science, Volume 17, Issue 2 (May 27, 2021) lmcs:6056
10.23638/LMCS-17(2:20)2021
null
cs.LO
http://creativecommons.org/licenses/by/4.0/
The recursive path ordering is an established and crucial tool in term rewriting to prove termination. We revisit its presentation by means of some simple rules on trees (or corresponding terms) equipped with a 'star' as control symbol, signifying a command to make that tree (or term) smaller in the order being defined. This leads to star games that are very convenient for proving termination of many rewriting tasks. For instance, using already the simplest star game on finite unlabeled trees, we obtain a very direct proof of termination of the famous Hydra battle, direct in the sense that there is not the usual mention of ordinals. We also include an alternative road to setting up the star games, using a proof method of Buchholz, adapted by van Oostrom, resulting in a quantitative version of the star as control symbol. We conclude with a number of questions and future research directions.
[ { "version": "v1", "created": "Thu, 23 Jan 2020 12:55:27 GMT" }, { "version": "v2", "created": "Wed, 19 Aug 2020 13:55:07 GMT" }, { "version": "v3", "created": "Wed, 21 Apr 2021 16:17:29 GMT" }, { "version": "v4", "created": "Wed, 26 May 2021 10:35:16 GMT" } ]
2023-06-22T00:00:00
[ [ "Endrullis", "Jörg", "" ], [ "Klop", "Jan Willem", "" ], [ "Overbeek", "Roy", "" ] ]
new_dataset
0.987824
2002.01415
Arlene Casey J
Arlene Casey, Mike Bennett, Richard Tobin, Claire Grover, Iona Walker, Lukas Engelmann, Beatrice Alex
Plague Dot Text: Text mining and annotation of outbreak reports of the Third Plague Pandemic (1894-1952)
Journal of Data Mining & Digital Humanities 2021
Journal of Data Mining & Digital Humanities, HistoInformatics, HistoInformatics (January 20, 2021) jdmdh:6071
10.46298/jdmdh.6071
null
cs.CL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The design of models that govern diseases in population is commonly built on information and data gathered from past outbreaks. However, epidemic outbreaks are never captured in statistical data alone but are communicated by narratives, supported by empirical observations. Outbreak reports discuss correlations between populations, locations and the disease to infer insights into causes, vectors and potential interventions. The problem with these narratives is usually the lack of consistent structure or strong conventions, which prohibit their formal analysis in larger corpora. Our interdisciplinary research investigates more than 100 reports from the third plague pandemic (1894-1952) evaluating ways of building a corpus to extract and structure this narrative information through text mining and manual annotation. In this paper we discuss the progress of our ongoing exploratory project, how we enhance optical character recognition (OCR) methods to improve text capture, our approach to structure the narratives and identify relevant entities in the reports. The structured corpus is made available via Solr enabling search and analysis across the whole collection for future research dedicated, for example, to the identification of concepts. We show preliminary visualisations of the characteristics of causation and differences with respect to gender as a result of syntactic-category-dependent corpus statistics. Our goal is to develop structured accounts of some of the most significant concepts that were used to understand the epidemiology of the third plague pandemic around the globe. The corpus enables researchers to analyse the reports collectively allowing for deep insights into the global epidemiological consideration of plague in the early twentieth century.
[ { "version": "v1", "created": "Tue, 4 Feb 2020 17:16:36 GMT" }, { "version": "v2", "created": "Thu, 14 May 2020 19:16:54 GMT" }, { "version": "v3", "created": "Mon, 11 Jan 2021 11:08:08 GMT" } ]
2023-06-22T00:00:00
[ [ "Casey", "Arlene", "" ], [ "Bennett", "Mike", "" ], [ "Tobin", "Richard", "" ], [ "Grover", "Claire", "" ], [ "Walker", "Iona", "" ], [ "Engelmann", "Lukas", "" ], [ "Alex", "Beatrice", "" ] ]
new_dataset
0.998368
2002.01455
Martin Kreuzer
Julian Danner and Martin Kreuzer
A fault attack on the Niederreiter cryptosystem using binary irreducible Goppa codes
20 pages
journal of Groups, complexity, cryptology, Volume 12, Issue 1 (March 20, 2020) gcc:6074
10.46298/jgcc.2020.12.1.6074
null
cs.IT math.AG math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
A fault injection framework for the decryption algorithm of the Niederreiter public-key cryptosystem using binary irreducible Goppa codes and classical decoding techniques is described. In particular, we obtain low-degree polynomial equations in parts of the secret key. For the resulting system of polynomial equations, we present an efficient solving strategy and show how to extend certain solutions to alternative secret keys. We also provide estimates for the expected number of required fault injections, apply the framework to state-of-the-art security levels, and propose countermeasures against this type of fault attack.
[ { "version": "v1", "created": "Tue, 4 Feb 2020 18:33:27 GMT" }, { "version": "v2", "created": "Thu, 19 Mar 2020 10:50:00 GMT" } ]
2023-06-22T00:00:00
[ [ "Danner", "Julian", "" ], [ "Kreuzer", "Martin", "" ] ]
new_dataset
0.999319
2003.14342
Gabriel Nivasch
Jeff Erickson, Gabriel Nivasch, Junyan Xu
Fusible numbers and Peano Arithmetic
null
Logical Methods in Computer Science, Volume 18, Issue 3 (July 28, 2022) lmcs:8555
10.46298/lmcs-18(3:6)2022
null
cs.LO math.CO math.LO
http://creativecommons.org/licenses/by/4.0/
Inspired by a mathematical riddle involving fuses, we define the "fusible numbers" as follows: $0$ is fusible, and whenever $x,y$ are fusible with $|y-x|<1$, the number $(x+y+1)/2$ is also fusible. We prove that the set of fusible numbers, ordered by the usual order on $\mathbb R$, is well-ordered, with order type $\varepsilon_0$. Furthermore, we prove that the density of the fusible numbers along the real line grows at an incredibly fast rate: Letting $g(n)$ be the largest gap between consecutive fusible numbers in the interval $[n,\infty)$, we have $g(n)^{-1} \ge F_{\varepsilon_0}(n-c)$ for some constant $c$, where $F_\alpha$ denotes the fast-growing hierarchy. Finally, we derive some true statements that can be formulated but not proven in Peano Arithmetic, of a different flavor than previously known such statements: PA cannot prove the true statement "For every natural number $n$ there exists a smallest fusible number larger than $n$." Also, consider the algorithm "$M(x)$: if $x<0$ return $-x$, else return $M(x-M(x-1))/2$." Then $M$ terminates on real inputs, although PA cannot prove the statement "$M$ terminates on all natural inputs."
[ { "version": "v1", "created": "Tue, 31 Mar 2020 16:25:09 GMT" }, { "version": "v2", "created": "Thu, 2 Apr 2020 17:41:44 GMT" }, { "version": "v3", "created": "Wed, 9 Sep 2020 07:46:22 GMT" }, { "version": "v4", "created": "Sat, 2 Oct 2021 19:11:02 GMT" }, { "version": "v5", "created": "Tue, 5 Oct 2021 15:59:44 GMT" }, { "version": "v6", "created": "Tue, 15 Feb 2022 13:18:42 GMT" }, { "version": "v7", "created": "Mon, 21 Feb 2022 09:39:15 GMT" }, { "version": "v8", "created": "Fri, 27 May 2022 13:08:24 GMT" }, { "version": "v9", "created": "Wed, 27 Jul 2022 15:06:06 GMT" } ]
2023-06-22T00:00:00
[ [ "Erickson", "Jeff", "" ], [ "Nivasch", "Gabriel", "" ], [ "Xu", "Junyan", "" ] ]
new_dataset
0.999038
2004.13472
Peng Fu
Peng Fu, Kohei Kishida, Peter Selinger
Linear Dependent Type Theory for Quantum Programming Languages
null
Logical Methods in Computer Science, Volume 18, Issue 3 (September 7, 2022) lmcs:6930
10.46298/lmcs-18(3:28)2022
null
cs.PL cs.LO math.CT quant-ph
http://creativecommons.org/licenses/by/4.0/
Modern quantum programming languages integrate quantum resources and classical control. They must, on the one hand, be linearly typed to reflect the no-cloning property of quantum resources. On the other hand, high-level and practical languages should also support quantum circuits as first-class citizens, as well as families of circuits that are indexed by some classical parameters. Quantum programming languages thus need linear dependent type theory. This paper defines a general semantic structure for such a type theory via certain fibrations of monoidal categories. The categorical model of the quantum circuit description language Proto-Quipper-M by Rios and Selinger (2017) constitutes an example of such a fibration, which means that the language can readily be integrated with dependent types. We then devise both a general linear dependent type system and a dependently typed extension of Proto-Quipper-M, and provide them with operational semantics as well as a prototype implementation.
[ { "version": "v1", "created": "Tue, 28 Apr 2020 13:11:06 GMT" }, { "version": "v2", "created": "Fri, 27 Nov 2020 18:38:54 GMT" }, { "version": "v3", "created": "Thu, 2 Dec 2021 18:24:22 GMT" }, { "version": "v4", "created": "Fri, 27 May 2022 17:45:18 GMT" }, { "version": "v5", "created": "Fri, 17 Jun 2022 16:14:19 GMT" }, { "version": "v6", "created": "Tue, 6 Sep 2022 14:00:55 GMT" } ]
2023-06-22T00:00:00
[ [ "Fu", "Peng", "" ], [ "Kishida", "Kohei", "" ], [ "Selinger", "Peter", "" ] ]
new_dataset
0.985322
2006.12207
Francesco Dolce
Francesco Dolce and Edita Pelantov\'a
On morphisms preserving palindromic richness
null
Fundamenta Informaticae, Volume 185, Issue 1 (March 10, 2022) fi:7243
null
null
cs.FL cs.DM
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
It is known that each word of length $n$ contains at most $n+1$ distinct palindromes. A finite rich word is a word with maximal number of palindromic factors. The definition of palindromic richness can be naturally extended to infinite words. Sturmian words and Rote complementary symmetric sequences form two classes of binary rich words, while episturmian words and words coding symmetric $d$-interval exchange transformations give us other examples on larger alphabets. In this paper we look for morphisms of the free monoid, which allow us to construct new rich words from already known rich words. We focus on morphisms in Class $P_{ret}$. This class contains morphisms injective on the alphabet and satisfying a particular palindromicity property: for every morphism $\varphi$ in the class there exists a palindrome $w$ such that $\varphi(a)w$ is a first complete return word to $w$ for each letter $a$. We characterize $P_{ret}$ morphisms which preserve richness over a binary alphabet. We also study marked $P_{ret}$ morphisms acting on alphabets with more letters. In particular we show that every Arnoux-Rauzy morphism is conjugated to a morphism in Class $P_{ret}$ and that it preserves richness.
[ { "version": "v1", "created": "Mon, 22 Jun 2020 13:01:15 GMT" }, { "version": "v2", "created": "Wed, 3 Mar 2021 10:49:46 GMT" }, { "version": "v3", "created": "Mon, 21 Feb 2022 11:26:31 GMT" }, { "version": "v4", "created": "Fri, 4 Mar 2022 20:14:50 GMT" } ]
2023-06-22T00:00:00
[ [ "Dolce", "Francesco", "" ], [ "Pelantová", "Edita", "" ] ]
new_dataset
0.996677
2006.13635
Dan Frumin
Dan Frumin, Robbert Krebbers, Lars Birkedal
ReLoC Reloaded: A Mechanized Relational Logic for Fine-Grained Concurrency and Logical Atomicity
null
Logical Methods in Computer Science, Volume 17, Issue 3 (July 21, 2021) lmcs:6598
10.46298/lmcs-17(3:9)2021
null
cs.LO cs.PL
http://creativecommons.org/licenses/by/4.0/
We present a new version of ReLoC: a relational separation logic for proving refinements of programs with higher-order state, fine-grained concurrency, polymorphism and recursive types. The core of ReLoC is its refinement judgment $e \precsim e' : \tau$, which states that a program $e$ refines a program $e'$ at type $\tau$. ReLoC provides type-directed structural rules and symbolic execution rules in separation-logic style for manipulating the judgment, whereas in prior work on refinements for languages with higher-order state and concurrency, such proofs were carried out by unfolding the judgment into its definition in the model. ReLoC's abstract proof rules make it simpler to carry out refinement proofs, and enable us to generalize the notion of logically atomic specifications to the relational case, which we call logically atomic relational specifications. We build ReLoC on top of the Iris framework for separation logic in Coq, allowing us to leverage features of Iris to prove soundness of ReLoC, and to carry out refinement proofs in ReLoC. We implement tactics for interactive proofs in ReLoC, allowing us to mechanize several case studies in Coq, and thereby demonstrate the practicality of ReLoC. ReLoC Reloaded extends ReLoC (LICS'18) with various technical improvements, a new Coq mechanization, and support for Iris's prophecy variables. The latter allows us to carry out refinement proofs that involve reasoning about the program's future. We also expand ReLoC's notion of logically atomic relational specifications with a new flavor based on the HOCAP pattern by Svendsen et al.
[ { "version": "v1", "created": "Wed, 24 Jun 2020 11:15:20 GMT" }, { "version": "v2", "created": "Fri, 15 Jan 2021 17:40:07 GMT" }, { "version": "v3", "created": "Tue, 20 Jul 2021 16:55:56 GMT" } ]
2023-06-22T00:00:00
[ [ "Frumin", "Dan", "" ], [ "Krebbers", "Robbert", "" ], [ "Birkedal", "Lars", "" ] ]
new_dataset
0.999534
2006.16129
Philippe Malbos
Cameron Calk, Eric Goubault, Philippe Malbos, Georg Struth
Algebraic coherent confluence and higher globular Kleene algebras
null
Logical Methods in Computer Science, Volume 18, Issue 4 (November 28, 2022) lmcs:6743
10.46298/lmcs-18(4:9)2022
null
cs.LO math.CT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We extend the formalisation of confluence results in Kleene algebras to a formalisation of coherent confluence proofs. For this, we introduce the structure of higher globular Kleene algebra, a higher-dimensional generalisation of modal and concurrent Kleene algebra. We calculate a coherent Church-Rosser theorem and a coherent Newman's lemma in higher Kleene algebras by equational reasoning. We instantiate these results in the context of higher rewriting systems modelled by polygraphs.
[ { "version": "v1", "created": "Mon, 29 Jun 2020 15:47:06 GMT" }, { "version": "v2", "created": "Wed, 26 Aug 2020 14:08:52 GMT" }, { "version": "v3", "created": "Thu, 7 Apr 2022 17:38:54 GMT" }, { "version": "v4", "created": "Tue, 19 Jul 2022 14:18:16 GMT" }, { "version": "v5", "created": "Thu, 24 Nov 2022 14:53:24 GMT" } ]
2023-06-22T00:00:00
[ [ "Calk", "Cameron", "" ], [ "Goubault", "Eric", "" ], [ "Malbos", "Philippe", "" ], [ "Struth", "Georg", "" ] ]
new_dataset
0.997262
2007.15478
Anthony W. Lin
Anthony W. Lin and Rupak Majumdar
Quadratic Word Equations with Length Constraints, Counter Systems, and Presburger Arithmetic with Divisibility
arXiv admin note: substantial text overlap with arXiv:1805.06701
Logical Methods in Computer Science, Volume 17, Issue 4 (October 29, 2021) lmcs:6693
10.46298/lmcs-17(4:4)2021
null
cs.LO cs.FL
http://creativecommons.org/licenses/by/4.0/
Word equations are a crucial element in the theoretical foundation of constraint solving over strings. A word equation relates two words over string variables and constants. Its solution amounts to a function mapping variables to constant strings that equate the left and right hand sides of the equation. While the problem of solving word equations is decidable, the decidability of the problem of solving a word equation with a length constraint (i.e., a constraint relating the lengths of words in the word equation) has remained a long-standing open problem. We focus on the subclass of quadratic word equations, i.e., in which each variable occurs at most twice. We first show that the length abstractions of solutions to quadratic word equations are in general not Presburger-definable. We then describe a class of counter systems with Presburger transition relations which capture the length abstraction of a quadratic word equation with regular constraints. We provide an encoding of the effect of a simple loop of the counter systems in the existential theory of Presburger Arithmetic with divisibility (PAD). Since PAD is decidable (NP-hard and is in NEXP), we obtain a decision procedure for quadratic words equations with length constraints for which the associated counter system is flat (i.e., all nodes belong to at most one cycle). In particular, we show a decidability result (in fact, also an NP algorithm with a PAD oracle) for a recently proposed NP-complete fragment of word equations called regular-oriented word equations, when augmented with length constraints. We extend this decidability result (in fact, with a complexity upper bound of PSPACE with a PAD oracle) in the presence of regular constraints.
[ { "version": "v1", "created": "Thu, 30 Jul 2020 14:18:25 GMT" }, { "version": "v2", "created": "Mon, 3 Aug 2020 22:42:24 GMT" }, { "version": "v3", "created": "Mon, 7 Jun 2021 13:30:42 GMT" }, { "version": "v4", "created": "Mon, 27 Sep 2021 08:45:49 GMT" }, { "version": "v5", "created": "Wed, 6 Oct 2021 09:07:48 GMT" }, { "version": "v6", "created": "Thu, 28 Oct 2021 14:21:13 GMT" } ]
2023-06-22T00:00:00
[ [ "Lin", "Anthony W.", "" ], [ "Majumdar", "Rupak", "" ] ]
new_dataset
0.997865
2010.15030
Jonas Kastberg Hinrichsen
Jonas Kastberg Hinrichsen, Jesper Bengtson and Robbert Krebbers
Actris 2.0: Asynchronous Session-Type Based Reasoning in Separation Logic
null
Logical Methods in Computer Science, Volume 18, Issue 2 (June 10, 2022) lmcs:6869
10.46298/lmcs-18(2:16)2022
null
cs.LO cs.PL
http://creativecommons.org/licenses/by/4.0/
Message passing is a useful abstraction for implementing concurrent programs. For real-world systems, however, it is often combined with other programming and concurrency paradigms, such as higher-order functions, mutable state, shared-memory concurrency, and locks. We present Actris: a logic for proving functional correctness of programs that use a combination of the aforementioned features. Actris combines the power of modern concurrent separation logics with a first-class protocol mechanism -- based on session types -- for reasoning about message passing in the presence of other concurrency paradigms. We show that Actris provides a suitable level of abstraction by proving functional correctness of a variety of examples, including a channel-based merge sort, a channel-based load-balancing mapper, and a variant of the map-reduce model, using concise specifications. While Actris was already presented in a conference paper (POPL'20), this paper expands the prior presentation significantly. Moreover, it extends Actris to Actris 2.0 with a notion of subprotocols -- based on session-type subtyping -- that permits additional flexibility when composing channel endpoints, and that takes full advantage of the asynchronous semantics of message passing in Actris. Soundness of Actris 2.0 is proven using a model of its protocol mechanism in the Iris framework. We have mechanised the theory of Actris, together with custom tactics, as well as all examples in the paper, in the Coq proof assistant.
[ { "version": "v1", "created": "Wed, 28 Oct 2020 15:06:50 GMT" }, { "version": "v2", "created": "Mon, 11 Oct 2021 09:32:10 GMT" }, { "version": "v3", "created": "Wed, 20 Oct 2021 09:24:24 GMT" }, { "version": "v4", "created": "Tue, 15 Mar 2022 11:09:29 GMT" }, { "version": "v5", "created": "Wed, 8 Jun 2022 18:13:38 GMT" } ]
2023-06-22T00:00:00
[ [ "Hinrichsen", "Jonas Kastberg", "" ], [ "Bengtson", "Jesper", "" ], [ "Krebbers", "Robbert", "" ] ]
new_dataset
0.999639
2011.14303
Naoki Kobayashi
Yo Mitani, Naoki Kobayashi and Takeshi Tsukada
A Probabilistic Higher-order Fixpoint Logic
null
Logical Methods in Computer Science, Volume 17, Issue 4 (December 2, 2021) lmcs:6939
10.46298/lmcs-17(4:15)2021
null
cs.LO
http://creativecommons.org/licenses/by/4.0/
We introduce PHFL, a probabilistic extension of higher-order fixpoint logic, which can also be regarded as a higher-order extension of probabilistic temporal logics such as PCTL and the $\mu^p$-calculus. We show that PHFL is strictly more expressive than the $\mu^p$-calculus, and that the PHFL model-checking problem for finite Markov chains is undecidable even for the $\mu$-only, order-1 fragment of PHFL. Furthermore the full PHFL is far more expressive: we give a translation from Lubarsky's $\mu$-arithmetic to PHFL, which implies that PHFL model checking is $\Pi^1_1$-hard and $\Sigma^1_1$-hard. As a positive result, we characterize a decidable fragment of the PHFL model-checking problems using a novel type system.
[ { "version": "v1", "created": "Sun, 29 Nov 2020 07:31:00 GMT" }, { "version": "v2", "created": "Wed, 16 Jun 2021 14:01:59 GMT" }, { "version": "v3", "created": "Wed, 13 Oct 2021 10:11:59 GMT" }, { "version": "v4", "created": "Wed, 1 Dec 2021 08:34:17 GMT" } ]
2023-06-22T00:00:00
[ [ "Mitani", "Yo", "" ], [ "Kobayashi", "Naoki", "" ], [ "Tsukada", "Takeshi", "" ] ]
new_dataset
0.962487
2011.15021
Daniel Gratzer
Daniel Gratzer, G.A. Kavvos, Andreas Nuyts, Lars Birkedal
Multimodal Dependent Type Theory
null
Logical Methods in Computer Science, Volume 17, Issue 3 (July 28, 2021) lmcs:7571
10.46298/lmcs-17(3:11)2021
null
cs.LO
http://creativecommons.org/licenses/by/4.0/
We introduce MTT, a dependent type theory which supports multiple modalities. MTT is parametrized by a mode theory which specifies a collection of modes, modalities, and transformations between them. We show that different choices of mode theory allow us to use the same type theory to compute and reason in many modal situations, including guarded recursion, axiomatic cohesion, and parametric quantification. We reproduce examples from prior work in guarded recursion and axiomatic cohesion, thereby demonstrating that MTT constitutes a simple and usable syntax whose instantiations intuitively correspond to previous handcrafted modal type theories. In some cases, instantiating MTT to a particular situation unearths a previously unknown type theory that improves upon prior systems. Finally, we investigate the metatheory of MTT. We prove the consistency of MTT and establish canonicity through an extension of recent type-theoretic gluing techniques. These results hold irrespective of the choice of mode theory, and thus apply to a wide variety of modal situations.
[ { "version": "v1", "created": "Mon, 30 Nov 2020 17:23:34 GMT" }, { "version": "v2", "created": "Tue, 1 Jun 2021 13:08:02 GMT" }, { "version": "v3", "created": "Tue, 27 Jul 2021 13:34:30 GMT" } ]
2023-06-22T00:00:00
[ [ "Gratzer", "Daniel", "" ], [ "Kavvos", "G. A.", "" ], [ "Nuyts", "Andreas", "" ], [ "Birkedal", "Lars", "" ] ]
new_dataset
0.985643
2102.11025
Emiliano Lorini
Emiliano Lorini
A Qualitative Theory of Cognitive Attitudes and their Change
Under consideration in Theory and Practice of Logic Programming (TPLP)
Theory and Practice of Logic Programming 21 (2021) 428-458
10.1017/S1471068421000053
null
cs.AI cs.LO
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
We present a general logical framework for reasoning about agents' cognitive attitudes of both epistemic type and motivational type. We show that it allows us to express a variety of relevant concepts for qualitative decision theory including the concepts of knowledge, belief, strong belief, conditional belief, desire, conditional desire, strong desire and preference. We also present two extensions of the logic, one by the notion of choice and the other by dynamic operators for belief change and desire change, and we apply the former to the analysis of single-stage games under incomplete information. We provide sound and complete axiomatizations for the basic logic and for its two extensions. The paper is under consideration in Theory and Practice of Logic Programming (TPLP).
[ { "version": "v1", "created": "Tue, 16 Feb 2021 10:28:49 GMT" } ]
2023-06-22T00:00:00
[ [ "Lorini", "Emiliano", "" ] ]
new_dataset
0.993678
2106.05473
Richard Garner
Richard Garner
Stream processors and comodels
null
Logical Methods in Computer Science, Volume 19, Issue 1 (January 12, 2023) lmcs:9204
10.46298/lmcs-19(1:2)2023
null
cs.LO math.CT
http://creativecommons.org/licenses/by/4.0/
In 2009, Hancock, Pattinson and Ghani gave a coalgebraic characterisation of stream processors $A^\mathbb{N} \to B^\mathbb{N}$ drawing on ideas of Brouwerian constructivism. Their stream processors have an intensional character; in this paper, we give a corresponding coalgebraic characterisation of extensional stream processors, i.e., the set of continuous functions $A^\mathbb{N} \to B^\mathbb{N}$. Our account sites both our result and that of op. cit. within the apparatus of comodels for algebraic effects originating with Power-Shkaravska. Within this apparatus, the distinction between intensional and extensional equivalence for stream processors arises in the same way as the the distinction between bisimulation and trace equivalence for labelled transition systems and probabilistic generative systems.
[ { "version": "v1", "created": "Thu, 10 Jun 2021 03:23:11 GMT" }, { "version": "v2", "created": "Tue, 1 Mar 2022 21:49:27 GMT" }, { "version": "v3", "created": "Sun, 4 Dec 2022 21:05:09 GMT" }, { "version": "v4", "created": "Fri, 9 Dec 2022 01:13:10 GMT" }, { "version": "v5", "created": "Wed, 11 Jan 2023 15:37:37 GMT" } ]
2023-06-22T00:00:00
[ [ "Garner", "Richard", "" ] ]
new_dataset
0.965869
2108.13113
Samuel Pastva
Nikola Bene\v{s}, Lubo\v{s} Brim, Samuel Pastva, David \v{S}afr\'anek
BDD-Based Algorithm for SCC Decomposition of Edge-Coloured Graphs
null
Logical Methods in Computer Science, Volume 18, Issue 1 (March 10, 2022) lmcs:8427
10.46298/lmcs-18(1:38)2022
null
cs.DS
http://creativecommons.org/licenses/by/4.0/
Edge-coloured directed graphs provide an essential structure for modelling and analysis of complex systems arising in many scientific disciplines (e.g. feature-oriented systems, gene regulatory networks, etc.). One of the fundamental problems for edge-coloured graphs is the detection of strongly connected components, or SCCs. The size of edge-coloured graphs appearing in practice can be enormous both in the number of vertices and colours. The large number of vertices prevents us from analysing such graphs using explicit SCC detection algorithms, such as Tarjan's, which motivates the use of a symbolic approach. However, the large number of colours also renders existing symbolic SCC detection algorithms impractical. This paper proposes a novel algorithm that symbolically computes all the monochromatic strongly connected components of an edge-coloured graph. In the worst case, the algorithm performs $O(p \cdot n \cdot log~n)$ symbolic steps, where $p$ is the number of colours and $n$ is the number of vertices. We evaluate the algorithm using an experimental implementation based on binary decision diagrams (BDDs). Specifically, we use our implementation to explore the SCCs of a large collection of coloured graphs (up to $2^{48}$) obtained from Boolean networks -- a modelling framework commonly appearing in systems biology.
[ { "version": "v1", "created": "Mon, 30 Aug 2021 10:47:07 GMT" }, { "version": "v2", "created": "Wed, 23 Feb 2022 14:21:27 GMT" }, { "version": "v3", "created": "Wed, 9 Mar 2022 18:09:10 GMT" } ]
2023-06-22T00:00:00
[ [ "Beneš", "Nikola", "" ], [ "Brim", "Luboš", "" ], [ "Pastva", "Samuel", "" ], [ "Šafránek", "David", "" ] ]
new_dataset
0.991491
2110.05412
Michael Mislove
Vikraman Choudhury, Marcelo Fiore
Free Commutative Monoids in Homotopy Type Theory
Appeared in MFPS'22
Electronic Notes in Theoretical Informatics and Computer Science, Volume 1 - Proceedings of MFPS XXXVIII (February 22, 2023) entics:10492
10.46298/entics.10492
null
cs.LO math.CO math.CT math.LO
http://creativecommons.org/licenses/by-nc-sa/4.0/
We develop a constructive theory of finite multisets in Homotopy Type Theory, defining them as free commutative monoids. After recalling basic structural properties of the free commutative-monoid construction, we formalise and establish the categorical universal property of two, necessarily equivalent, algebraic presentations of free commutative monoids using 1-HITs. These presentations correspond to two different equational theories invariably including commutation axioms. In this setting, we prove important structural combinatorial properties of finite multisets. These properties are established in full generality without assuming decidable equality on the carrier set. As an application, we present a constructive formalisation of the relational model of classical linear logic and its differential structure. This leads to constructively establishing that free commutative monoids are conical refinement monoids. Thereon we obtain a characterisation of the equality type of finite multisets and a new presentation of the free commutative-monoid construction as a set-quotient of the list construction. These developments crucially rely on the commutation relation of creation/annihilation operators associated with the free commutative-monoid construction seen as a combinatorial Fock space.
[ { "version": "v1", "created": "Mon, 11 Oct 2021 16:59:16 GMT" }, { "version": "v2", "created": "Thu, 15 Dec 2022 13:11:21 GMT" }, { "version": "v3", "created": "Tue, 7 Feb 2023 16:46:30 GMT" }, { "version": "v4", "created": "Wed, 15 Feb 2023 22:09:19 GMT" }, { "version": "v5", "created": "Mon, 20 Feb 2023 15:48:12 GMT" } ]
2023-06-22T00:00:00
[ [ "Choudhury", "Vikraman", "" ], [ "Fiore", "Marcelo", "" ] ]
new_dataset
0.981442
2111.04083
Bruno Courcelle
Bruno Courcelle
Order-theoretic trees: monadic second-order descriptions and regularity
32 pages, 6 figures
Fundamenta Informaticae, Volume 186, Issues 1-4: Trakhtenbrot's centenary (October 21, 2022) fi:8690
null
null
cs.LO cs.DM
http://creativecommons.org/licenses/by/4.0/
An order-theoretic forest is a countable partial order such that the set of elements larger than any element is linearly ordered. It is an order-theoretic tree if any two elements have an upper-bound. The order type of a branch can be any countable linear order. Such generalized infinite trees yield convenient definitions of the rank-width and the modular decomposition of countable graphs. We define an algebra based on only four operations that generate up to isomorphism and via infinite terms these order-theoretic trees and forests. We prove that the associated regular objects, those defined by regular terms, are exactly the ones that are the unique models of monadic second-order sentences.
[ { "version": "v1", "created": "Sun, 7 Nov 2021 13:21:46 GMT" }, { "version": "v2", "created": "Fri, 7 Jan 2022 16:02:50 GMT" }, { "version": "v3", "created": "Sat, 27 Aug 2022 18:02:08 GMT" }, { "version": "v4", "created": "Mon, 3 Oct 2022 19:19:37 GMT" } ]
2023-06-22T00:00:00
[ [ "Courcelle", "Bruno", "" ] ]
new_dataset
0.967552
2111.09993
Sourav Halder
Sourav Halder, Jun Yamasaki, Shashank Acharya, Wenjun Kou, Guy Elisha, Dustin A. Carlson, Peter J. Kahrilas, John E. Pandolfino, Neelesh A. Patankar
Esophageal virtual disease landscape using mechanics-informed machine learning
26 pages, 17 figures
Artificial Intelligence in Medicine. 134 (2022) 102435
10.1016/j.artmed.2022.102435
null
cs.LG eess.IV physics.med-ph
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
The pathogenesis of esophageal disorders is related to the esophageal wall mechanics. Therefore, to understand the underlying fundamental mechanisms behind various esophageal disorders, it is crucial to map the esophageal wall mechanics-based parameters onto physiological and pathophysiological conditions corresponding to altered bolus transit and supraphysiologic IBP. In this work, we present a hybrid framework that combines fluid mechanics and machine learning to identify the underlying physics of the various esophageal disorders and maps them onto a parameter space which we call the virtual disease landscape (VDL). A one-dimensional inverse model processes the output from an esophageal diagnostic device called endoscopic functional lumen imaging probe (EndoFLIP) to estimate the mechanical "health" of the esophagus by predicting a set of mechanics-based parameters such as esophageal wall stiffness, muscle contraction pattern and active relaxation of esophageal walls. The mechanics-based parameters were then used to train a neural network that consists of a variational autoencoder (VAE) that generates a latent space and a side network that predicts mechanical work metrics for estimating esophagogastric junction motility. The latent vectors along with a set of discrete mechanics-based parameters define the VDL and form clusters corresponding to the various esophageal disorders. The VDL not only distinguishes different disorders but can also be used to predict disease progression in time. Finally, we also demonstrate the clinical applicability of this framework for estimating the effectiveness of a treatment and track patient condition after a treatment.
[ { "version": "v1", "created": "Fri, 19 Nov 2021 01:02:14 GMT" } ]
2023-06-22T00:00:00
[ [ "Halder", "Sourav", "" ], [ "Yamasaki", "Jun", "" ], [ "Acharya", "Shashank", "" ], [ "Kou", "Wenjun", "" ], [ "Elisha", "Guy", "" ], [ "Carlson", "Dustin A.", "" ], [ "Kahrilas", "Peter J.", "" ], [ "Pandolfino", "John E.", "" ], [ "Patankar", "Neelesh A.", "" ] ]
new_dataset
0.997948
2204.00905
Joydeb Pal
Sanjit Bhowmick, Alexandre Fotue Tabue, Joydeb Pal
On the $\ell$-DLIPs of codes over finite commutative rings
null
null
null
null
cs.IT math.IT
http://creativecommons.org/licenses/by/4.0/
Generalizing the linear complementary duals, the linear complementary pairs and the hull of codes, we introduce the concept of $\ell$-dimension linear intersection pairs ($\ell$-DLIPs) of codes over a finite commutative ring $(R)$, for some positive integer $\ell$. In this paper, we study $\ell$-DLIP of codes over $R$ in a very general setting by a uniform method. Besides, we provide a necessary and sufficient condition for the existence of a non-free (or free) $\ell$-DLIP of codes over a finite commutative Frobenius ring. In addition, we obtain a generator set of the intersection of two constacyclic codes over a finite chain ring, which helps us to get an important characterization of $\ell$-DLIP of constacyclic codes. Finally, the $\ell$-DLIP of constacyclic codes over a finite chain ring are used to construct new entanglement-assisted quantum error correcting (EAQEC) codes.
[ { "version": "v1", "created": "Sat, 2 Apr 2022 17:20:14 GMT" }, { "version": "v2", "created": "Wed, 21 Jun 2023 06:49:39 GMT" } ]
2023-06-22T00:00:00
[ [ "Bhowmick", "Sanjit", "" ], [ "Tabue", "Alexandre Fotue", "" ], [ "Pal", "Joydeb", "" ] ]
new_dataset
0.967709
2204.14153
Michael Mislove
Stefan Zetzsche, Alexandra Silva, Matteo Sammartino
Guarded Kleene Algebra with Tests: Automata Learning
null
Electronic Notes in Theoretical Informatics and Computer Science, Volume 1 - Proceedings of MFPS XXXVIII (February 28, 2023) entics:10505
10.46298/entics.10505
null
cs.FL
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
Guarded Kleene Algebra with Tests (GKAT) is the fragment of Kleene Algebra with Tests (KAT) that arises by replacing the union and iteration operations of KAT with predicate-guarded variants. GKAT is more efficiently decidable than KAT and expressive enough to model simple imperative programs, making it attractive for applications to e.g. network verification. In this paper, we further explore GKAT's automata theory, and present GL*, an algorithm for learning the GKAT automaton representation of a black-box, by observing its behaviour. A complexity analysis shows that it is more efficient to learn a representation of a GKAT program with GL* than with Angluin's existing L* algorithm. We implement GL* and L* in OCaml and compare their performances on example programs.
[ { "version": "v1", "created": "Fri, 29 Apr 2022 15:18:15 GMT" }, { "version": "v2", "created": "Thu, 23 Jun 2022 15:00:44 GMT" }, { "version": "v3", "created": "Fri, 16 Dec 2022 02:50:14 GMT" }, { "version": "v4", "created": "Sun, 5 Feb 2023 23:29:31 GMT" }, { "version": "v5", "created": "Wed, 15 Feb 2023 21:44:28 GMT" }, { "version": "v6", "created": "Mon, 20 Feb 2023 16:18:57 GMT" }, { "version": "v7", "created": "Tue, 21 Feb 2023 18:16:22 GMT" } ]
2023-06-22T00:00:00
[ [ "Zetzsche", "Stefan", "" ], [ "Silva", "Alexandra", "" ], [ "Sammartino", "Matteo", "" ] ]
new_dataset
0.984432
2207.09934
Oskar Natan
Oskar Natan and Jun Miura
DeepIPC: Deeply Integrated Perception and Control for an Autonomous Vehicle in Real Environments
Submitted to Robotics and Autonomous Systems
null
null
null
cs.RO cs.AI cs.CV
http://creativecommons.org/licenses/by-nc-sa/4.0/
We propose DeepIPC, an end-to-end autonomous driving model that handles both perception and control tasks in driving a vehicle. The model consists of two main parts, perception and controller modules. The perception module takes an RGBD image to perform semantic segmentation and bird's eye view (BEV) semantic mapping along with providing their encoded features. Meanwhile, the controller module processes these features with the measurement of GNSS locations and angular speed to estimate waypoints that come with latent features. Then, two different agents are used to translate waypoints and latent features into a set of navigational controls to drive the vehicle. The model is evaluated by predicting driving records and performing automated driving under various conditions in real environments. The experimental results show that DeepIPC achieves the best drivability and multi-task performance even with fewer parameters compared to the other models. Codes will be published at https://github.com/oskarnatan/DeepIPC.
[ { "version": "v1", "created": "Wed, 20 Jul 2022 14:20:35 GMT" }, { "version": "v2", "created": "Tue, 2 Aug 2022 09:08:51 GMT" }, { "version": "v3", "created": "Wed, 14 Dec 2022 14:08:57 GMT" }, { "version": "v4", "created": "Wed, 5 Apr 2023 15:15:08 GMT" }, { "version": "v5", "created": "Wed, 21 Jun 2023 11:31:28 GMT" } ]
2023-06-22T00:00:00
[ [ "Natan", "Oskar", "" ], [ "Miura", "Jun", "" ] ]
new_dataset
0.997856
2209.05403
Hao Xu
Hao Xu, Kai-Kit Wong, Giuseppe Caire
MAC Wiretap Channels with Confidential and Open Messages: Improved Achievable Region and Low-complexity Precoder Design
50 pages, 7 figures
null
null
null
cs.IT math.IT
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
This paper investigates the achievable region and precoder design for multiple access wiretap (MAC-WT) channels, where each user transmits both secret and open (i.e., non-confidential) messages. All these messages are intended for the legitimate receiver (or Bob for brevity) and the eavesdropper (Eve) is interested only in the secret messages of all users. By allowing users with zero secret message rate to act as conventional MAC channel users with no wiretapping, we show that the achievable region of the discrete memoryless (DM) MAC-WT channel given in [1] can be enlarged. In [1], the achievability was proven by considering the two-user case, making it possible to prove a key auxiliary lemma by directly using the Fourier-Motzkin elimination procedure. However, this approach does not generalize to the case with any number of users. In this paper, we provide a new region that generally enlarges that in [1] and provide general achievability proof.
[ { "version": "v1", "created": "Mon, 12 Sep 2022 16:54:26 GMT" }, { "version": "v2", "created": "Wed, 21 Jun 2023 15:30:25 GMT" } ]
2023-06-22T00:00:00
[ [ "Xu", "Hao", "" ], [ "Wong", "Kai-Kit", "" ], [ "Caire", "Giuseppe", "" ] ]
new_dataset
0.99012