scispace - formally typeset
Search or ask a question

Showing papers in "Information & Computation in 2011"


Journal ArticleDOI
TL;DR: It is argued that when electorates follow the canonical political science model of societal preferences the complexity shield never existed in the first place and it is shown that for electorates having single-peaked preferences, many existing NP-hardness results on manipulation and control evaporate.
Abstract: Much work has been devoted, during the past 20years, to using complexity to protect elections from manipulation and control. Many ''complexity shield'' results have been obtained-results showing that the attacker's task can be made NP-hard. Recently there has been much focus on whether such worst-case hardness protections can be bypassed by frequently correct heuristics or by approximations. This paper takes a very different approach: We argue that when electorates follow the canonical political science model of societal preferences the complexity shield never existed in the first place. In particular, we show that for electorates having single-peaked preferences, many existing NP-hardness results on manipulation and control evaporate.

146 citations


Journal ArticleDOI
TL;DR: This paper tours a fragment of a vast literature documenting the importance of deterministic, nondeterministic, and alternating finite automata as an enormously valuable concept, and discusses developments relevant to infinite automata related problems like simulation of and by several types of finite Automata.
Abstract: Finite automata are probably best known for being equivalent to right-linear context-free grammars and, thus, for capturing the lowest level of the Chomsky-hierarchy, the family of regular languages. Over the last half century, a vast literature documenting the importance of deterministic, nondeterministic, and alternating finite automata as an enormously valuable concept has been developed. In the present paper, we tour a fragment of this literature. Mostly, we discuss developments relevant to finite automata related problems like, for example, (i) simulation of and by several types of finite automata, (ii) standard automata problems such as fixed and general membership, emptiness, universality, equivalence, and related problems, and (iii) minimization and approximation. We thus come across descriptional and computational complexity issues of finite automata. We do not prove these results but we merely draw attention to the big picture and some of the main ideas involved.

142 citations


Journal ArticleDOI
TL;DR: It turns out that these automata are equal in power to their probabilistic counterparts, and this fact does not change when the QFA model is augmented to allow general measurements and mixed states.
Abstract: We prove the following facts about the language recognition power of quantum Turing machines (QTMs) in the unbounded error setting: QTMs are strictly more powerful than probabilistic Turing machines for any common space bound s satisfying s(n)=o(loglogn). For ''one-way'' Turing machines, where the input tape head is not allowed to move left, the above result holds for s(n)=o(logn). We also give a characterization for the class of languages recognized with unbounded error by real-time quantum finite automata (QFAs) with restricted measurements. It turns out that these automata are equal in power to their probabilistic counterparts, and this fact does not change when the QFA model is augmented to allow general measurements and mixed states. Unlike the case with classical finite automata, when the QFA tape head is allowed to remain stationary in some steps, more languages become recognizable. We define and use a QTM model that generalizes the other variants introduced earlier in the study of quantum space complexity.

124 citations


Journal ArticleDOI
TL;DR: In this article, the authors studied the complexity of several coloring problems on graphs, parameterized by the treewidth of the graph, and showed that the list coloring problem is W[1]-hard.
Abstract: In this paper, we study the complexity of several coloring problems on graphs, parameterized by the treewidth of the graph.1.The List Coloring problem takes as input a graph G, together with an assignment to each vertex v of a set of colors C"v. The problem is to determine whether it is possible to choose a color for vertex v from the set of permitted colors C"v, for each vertex, so that the obtained coloring of G is proper. We show that this problem is W[1]-hard, parameterized by the treewidth of G. The closely related Precoloring Extension problem is also shown to be W[1]-hard, parameterized by treewidth. 2.An equitable coloring of a graph G is a proper coloring of the vertices where the numbers of vertices having any two distinct colors differs by at most one. We show that the problem is hard for W[1], parameterized by the treewidth plus the number of colors. We also show that a list-based variation, List Equitable Coloring is W[1]-hard for forests, parameterized by the number of colors on the lists. 3.The list chromatic number@g"l(G) of a graph G is defined to be the smallest positive integer r, such that for every assignment to the vertices v of G, of a list L"v of colors, where each list has length at least r, there is a choice of one color from each vertex list L"v yielding a proper coloring of G. We show that the problem of determining whether @g"l(G)=

112 citations


Journal ArticleDOI
TL;DR: A probabilistic version of coherence spaces is studied and it is shown that these objects provide a model of linear logic and the semantics of Probabilistic PCF closed terms of ground type is given.
Abstract: We study a probabilistic version of coherence spaces and show that these objects provide a model of linear logic. We build a model of the pure lambda-calculus in this setting and show how to interpret a probabilistic version of the functional language PCF. We give a probabilistic interpretation of the semantics of probabilistic PCF closed terms of ground type. Last we suggest a generalization of this approach, using Banach spaces.

110 citations


Journal ArticleDOI
TL;DR: This paper gives an overview of several recent methods that give lower bounds on the treewidth of graphs.
Abstract: For several applications, it is important to be able to compute the treewidth of a given graph and to find tree decompositions of small width reasonably fast. Good lower bounds on the treewidth of a graph can, amongst others, help to speed up branch and bound algorithms that compute the treewidth of a graph exactly. A high lower bound for a specific graph instance can tell that a dynamic programming approach for solving a problem is infeasible for this instance. This paper gives an overview of several recent methods that give lower bounds on the treewidth of graphs.

89 citations


Journal ArticleDOI
TL;DR: A taxonomy of logical characterizations of relations on image-finite and image-infinite probabilistic automata is developed for modeling concurrent systems with random phenomena arising in many applications ranging from artificial intelligence, security, systems biology to performance modeling.
Abstract: Probabilistic automata exhibit both probabilistic and non-deterministic choice. They are therefore a powerful semantic foundation for modeling concurrent systems with random phenomena arising in many applications ranging from artificial intelligence, security, systems biology to performance modeling. Several variations of bisimulation and simulation relations have proved to be useful as means to abstract and compare different automata. This paper develops a taxonomy of logical characterizations of these relations on image-finite and image-infinite probabilistic automata.

70 citations


Journal ArticleDOI
TL;DR: In this article, a new relation between terms called nominal abstraction is proposed to enable the definition of relations that embody dynamic aspects related to binding, a capability needed in many reasoning tasks.
Abstract: Recursive relational specifications are commonly used to describe the computational structure of formal systems. Recent research in proof theory has identified two features that facilitate direct, logic-based reasoning about such descriptions: the interpretation of atomic judgments through recursive definitions and an encoding of binding constructs via generic judgments. However, logics encompassing these two features do not currently allow for the definition of relations that embody dynamic aspects related to binding, a capability needed in many reasoning tasks. We propose a new relation between terms called nominal abstraction as a means for overcoming this deficiency. We incorporate nominal abstraction into a rich logic also including definitions, generic quantification, induction, and co-induction that we then prove to be consistent. We present examples to show that this logic can provide elegant treatments of binding contexts that appear in many proofs, such as those establishing properties of typing calculi and of arbitrarily cascading substitutions that play a role in reducibility arguments.

52 citations


Journal ArticleDOI
TL;DR: This work considers a class of infinite-state stochastic games generated by stateless pushdown automata (or, equivalently, 1-exit recursive state machines), where the winning objective is specified by a regular set of target configurations and a qualitative probability constraint '>0 or '=1'.
Abstract: We consider a class of infinite-state stochastic games generated by stateless pushdown automata (or, equivalently, 1-exit recursive state machines), where the winning objective is specified by a regular set of target configurations and a qualitative probability constraint '>0' or '=1'. The goal of one player is to maximize the probability of reaching the target set so that the constraint is satisfied, while the other player aims at the opposite. We show that the winner in such games can be determined in P for the '>0' constraint, and in [email protected]?co-NP for the '=1' constraint. Further, we prove that the winning regions for both players are regular, and we design algorithms which compute the associated finite-state automata. Finally, we show that winning strategies can be synthesized effectively.

50 citations


Journal ArticleDOI
TL;DR: A deterministic black box solution for online approximate matching that shows the space overhead is linear in the pattern size, which it is shown is optimal for any deterministic algorithm.
Abstract: We present a deterministic black box solution for online approximate matching. Given a pattern of length m and a streaming text of length n that arrives one character at a time, the task is to report the distance between the pattern and a sliding window of the text as soon as the new character arrives. Our solution requires O(@S"j"="1^l^o^g^"^2^mT(n,2^j^-^1)/n) time for each input character, where T(n,m) is the total running time of the best offline algorithm. The types of approximation that are supported include exact matching with wildcards, matching under the Hamming norm, approximating the Hamming norm, k-mismatch and numerical measures such as the L"2 and L"1 norms. For these examples, the resulting online algorithms take O(log^2m), O(mlogm), O(log^2m/@e^2), O(klogklogm), O(log^2m) and O(mlogm) time per character, respectively. The space overhead is linear in the pattern size, which we show is optimal for any deterministic algorithm.

34 citations


Journal ArticleDOI
TL;DR: A systematic way to generate languages of (generalised) regular expressions, and sound and complete axiomatizations thereof, for a wide variety of quantitative systems, to deal with quantitative systems.
Abstract: We present a systematic way to generate (1) languages of (generalised) regular expressions, and (2) sound and complete axiomatizations thereof, for a wide variety of quantitative systems. Our quantitative systems include weighted versions of automata and transition systems, in which transitions are assigned a value in a monoid that represents cost, duration, probability, etc. Such systems are represented as coalgebras and (1) and (2) above are derived in a modular fashion from the underlying (functor) type of these coalgebras. In previous work, we applied a similar approach to a class of systems (without weights) that generalizes both the results of Kleene (on rational languages and DFA's) and Milner (on regular behaviours and finite LTS's), and includes many other systems such as Mealy and Moore machines. In the present paper, we extend this framework to deal with quantitative systems. As a consequence, our results now include languages and axiomatizations, both existing and new ones, for many different kinds of probabilistic systems.

Journal ArticleDOI
TL;DR: It is proved that if a set of redexes U has a complete development, then all complete developments of U end in the same term and that any tiling diagram involving strongly convergent reductions S and T can be completed iff at least one of S/T and T/S is strongly Convergent.
Abstract: We define infinitary Combinatory Reduction Systems (iCRSs), thus providing the first notion of infinitary higher-order rewriting. The systems defined are sufficiently general that ordinary infinitary term rewriting and infinitary @l-calculus are special cases. Furthermore, we generalise a number of known results from first-order infinitary rewriting and infinitary @l-calculus to iCRSs. In particular, for fully-extended, left-linear iCRSs we prove the well-known compression property, and for orthogonal iCRSs we prove that (1) if a set of redexes U has a complete development, then all complete developments of U end in the same term and that (2) any tiling diagram involving strongly convergent reductions S and T can be completed iff at least one of S/T and T/S is strongly convergent. We also prove an ancillary result of independent interest: a set of redexes in an orthogonal iCRS has a complete development iff the set has the so-called finite jumps property.

Journal ArticleDOI
TL;DR: This work compares the expressive power of a class of well-structured transition systems that includes relational automata (extensions of), Petri nets, lossy channel systems, constrained multiset rewriting systems, and data nets and considers two types of accepting conditions: coverability and reachability of a fixed a priori configuration.
Abstract: We compare the expressive power of a class of well-structured transition systems that includes relational automata (extensions of), Petri nets, lossy channel systems, constrained multiset rewriting systems, and data nets. For each one of these models we study the class of languages generated by labeled transition systems describing their semantics. We consider here two types of accepting conditions: coverability and reachability of a fixed a priori configuration. In both cases we obtain a strict hierarchy in which constrained multiset rewriting systems is the most expressive model.

Journal ArticleDOI
TL;DR: A version of constructive linear-time temporal logic with the ''next'' temporal operator with natural deduction, sequent calculus and Hilbert-style proof systems for constructive LTL with conjunction, disjunction and falsehood, which considers Kripke semantics and proves soundness and completeness.
Abstract: In this paper we study a version of constructive linear-time temporal logic (LTL) with the ''next'' temporal operator The logic is originally due to Davies, who has shown that the proof system of the logic corresponds to a type system for binding-time analysis via the Curry-Howard isomorphism However, he did not investigate the logic itself in detail; he has proved only that the logic augmented with negation and classical reasoning is equivalent to (the ''next'' fragment of) the standard formulation of classical linear-time temporal logic We give natural deduction, sequent calculus and Hilbert-style proof systems for constructive LTL with conjunction, disjunction and falsehood, and show that the sequent calculus enjoys cut elimination Moreover, we also consider Kripke semantics and prove soundness and completeness One distinguishing feature of this logic is that distributivity of the ''next'' operator over disjunction ''@?(A@?B)@?@?A@?@?B'' is rejected in view of a type-theoretic interpretation

Journal ArticleDOI
TL;DR: This paper presents a space-efficient algorithm to construct the LZ-index in O(u(log@s+loglogu)) time and requiring 4|LZ|(1+o(1)) bits of main memory, that is, asymptotically the same space of the final index.
Abstract: A compressed full-text self-index is a data structure that replaces a text and in addition gives indexed access to it, while taking space proportional to the compressed text size. This is very important nowadays, since one can accommodate the index of very large texts entirely in main memory, avoiding the slower access to secondary storage. In particular, the LZ-index [G. Navarro, Indexing text using the Ziv-Lempel trie, Journal of Discrete Algorithms (JDA) 2 (1) (2004) 87-114] stands out for its good performance at extracting text passages and locating pattern occurrences. Given a text T[1..u] over an alphabet of size @s, the LZ-index requires 4|LZ|(1+o(1)) bits of space, where |LZ| is the size of the LZ78-compression of T. This can be bounded by |LZ|=uH"k(T)+o(ulog@s), where H"k(T) is the k-th order empirical entropy of T, for any k=o(log"@su). The LZ-index is built in O(ulog@s) time, yet requiring O(ulogu) bits of main memory in the worst case. In practice, the LZ-index occupies 1.0-1.5 times the text size (and replaces the text), but its construction requires around 5 times the text size. This limits its applicability to medium-sized texts. In this paper we present a space-efficient algorithm to construct the LZ-index in O(u(log@s+loglogu)) time and requiring 4|LZ|(1+o(1)) bits of main memory, that is, asymptotically the same space of the final index. We also adapt our algorithm to construct more recent reduced versions of the LZ-index, which occupy from 1 to 3 times |LZ|(1+o(1)) bits, and show that these can also be built using asymptotically the same space of the final index. Finally, we study an alternative model in which we are given only a limited amount of main memory to carry out the indexing process (less than that required by the final index), and must use the disk for the rest. We show how to build all the LZ-index variants in O(u(log@s+loglogu)) time, and within |LZ|(1+o(1)) bits of main memory, that is, asymptotically just the space to hold the LZ78-compressed text. Our experimental results show that our method is efficient in practice, needing an amount of memory close to that of the final index, and being competitive with the best construction times of other compressed indexes.

Journal ArticleDOI
TL;DR: In this paper, the authors focus on a simple type of tiling, named regional, and define the corresponding regional tile grammars, which can be unified and extended using an approach, whereby the right part of a rule is formalized by means of a finite set of permitted tiles.
Abstract: Several old and recent classes of picture grammars, that variously extend context-free string grammars in two dimensions, are based on rules that rewrite arrays of pixels. Such grammars can be unified and extended using an approach, whereby the right part of a rule is formalized by means of a finite set of permitted tiles. We focus on a simple type of tiling, named regional, and define the corresponding regional tile grammars. They include both Siromoneyʼs (or Matzʼs) Kolam grammars and their generalization by Průsa, as well as Drewesʼs grid grammars. Regionally defined pictures can be recognized with polynomial-time complexity by an algorithm extending the CKY one for strings. Regional tile grammars and languages are strictly included into our previous tile grammars and languages, and are incomparable with Giammarresi–Restivo tiling systems (or Wang systems).

Journal ArticleDOI
TL;DR: Blass and Gurevich (1984) showed that the conditions on equivalence relations-having an FP canonical form, having an FP complete invariant, and being in P-are distinct, and that this question requires non-relativizing techniques to resolve.
Abstract: To determine if two lists of numbers are the same set, we sort both lists and see if we get the same result. The sorted list is a canonical form for the equivalence relation of set equality. Other canonical forms arise in graph isomorphism algorithms. To determine if two graphs are cospectral (have the same eigenvalues), we compute their characteristic polynomials and see if they are equal; the characteristic polynomial is a complete invariant for cospectrality. Finally, an equivalence relation may be decidable in P without either a complete invariant or canonical form. Blass and Gurevich (1984) asked whether these conditions on equivalence relations-having an FP canonical form, having an FP complete invariant, and being in P-are distinct. They showed that this question requires non-relativizing techniques to resolve. We extend their results, and give new connections to probabilistic and quantum computation.

Journal ArticleDOI
TL;DR: It is shown that if L=NL, then each unary 2nfa can be converted into an equivalent 2dfa (a deterministic two-way automaton), keeping the number of states polynomial, showing a connection between the standard logarithmic space complexity and the state complexity of two- way unary automata.
Abstract: We show that if L=NL (the classical logarithmic space classes), then each unary 2nfa (a two-way nondeterministic finite automaton) can be converted into an equivalent 2dfa (a deterministic two-way automaton), keeping the number of states polynomial. (Unlike other results of this kind, here the deterministic simulation is valid for inputs of all lengths, not only polynomially long ones.) This shows a connection between the standard logarithmic space complexity and the state complexity of two-way unary automata: it indicates that L could be separated from NL by proving a superpolynomial gap, in the number of states, for the conversion from unary 2nfas to 2dfa. Moreover, without any unproven assumptions, we show that each n-state unary 2nfa can be simulated by an equivalent 2ufa (an unambiguous 2nfa) with a polynomial number of states.

Journal ArticleDOI
TL;DR: A proof showing that generalized comtraces can be represented by generalized stratified order structures is shown.
Abstract: Comtraces (combined traces) are extensions of Mazurkiewicz traces that can model the ''not later than'' relationship. In this paper, we first introduce the novel notion of generalized comtraces, extensions of comtraces that can additionally model the ''non-simultaneously'' relationship. Then we study some basic algebraic properties and canonical representations of comtraces and generalized comtraces. Finally we analyze the relationship between generalized comtraces and generalized stratified order structures. The major technical contribution of this paper is a proof showing that generalized comtraces can be represented by generalized stratified order structures.

Journal ArticleDOI
TL;DR: In this paper, it was shown that the Hennessy-Milner logic does not characterize state bisimulation in non-analytic measurable spaces and, under current foundations of Mathematics, such logical characterization is unprovable for spaces that are projections of a coanalytic set.
Abstract: We quickly review labelled Markov processes (LMP) and provide a counterexample showing that in general measurable spaces, event bisimilarity and state bisimilarity differ in LMP. This shows that the Hennessy-Milner logic proposed by Desharnais does not characterize state bisimulation in non-analytic measurable spaces. Furthermore we show that, under current foundations of Mathematics, such logical characterization is unprovable for spaces that are projections of a coanalytic set. Underlying this construction there is a proof that stationary Markov processes over general measurable spaces do not have semi-pullbacks.

Journal ArticleDOI
TL;DR: It is proved that the languages of deterministic timed automata cannot, and that one-clock deterministic timing automata can be distinguished from each other using strings in length bounded by a polynomial.
Abstract: We develop theory on the efficiency of identifying (learning) timed automata. In particular, we show that: (i) deterministic timed automata cannot be identified efficiently in the limit from labeled data and (ii) that one-clock deterministic timed automata can be identified efficiently in the limit from labeled data. We prove these results based on the distinguishability of these classes of timed automata. More specifically, we prove that the languages of deterministic timed automata cannot, and that one-clock deterministic timed automata can be distinguished from each other using strings in length bounded by a polynomial. In addition, we provide an algorithm that identifies one-clock deterministic timed automata efficiently from labeled data.Our results have interesting consequences for the power of clocks that are interesting also out of the scope of the identification problem.

Journal ArticleDOI
TL;DR: It is shown that CK admits of a cut-free Gentzen sequent calculus G-CK which has (i) a local interpretation in constructive Kripke models and (ii) does not require explicit world labels.
Abstract: This paper extends previous work on the modal logic CK as a reference system, both proof-theoretically and model-theoretically, for a correspondence theory of constructive modal logics. First, the fundamental nature of CK is discussed and compared with the intuitionistic modal logic IK which is traditionally taken to be the base line. Then, it is shown, that CK admits of a cut-free Gentzen sequent calculus G-CK which has (i) a local interpretation in constructive Kripke models and (ii) does not require explicit world labels. Finally, the paper demonstrates how non-classical modal logics such as IK, CS4, CL, or [email protected]?s deontic system of 2-sequents arise as theories of CK, presented both as special rules and as frame classes.

Journal ArticleDOI
TL;DR: This work studies the conversion of self-verifying automata to deterministic automata from a descriptional complexity point of view and the main result is the exact cost of such a simulation.
Abstract: Self-verifying automata are a special variant of finite automata with a symmetric kind of nondeterminism. We study the conversion of self-verifying automata to deterministic automata from a descriptional complexity point of view. The main result is the exact cost, in terms of the number of states, of such a simulation.

Journal ArticleDOI
TL;DR: This work studies queries defined by deterministic nested word automata, which subsume large streamable fragments of XPath subject to schema restrictions by DTDs modulo P-time translations, and shows that bounded and k-bounded delay and concurrency of such automata-defined queries are all decidable in polynomial time in the size of the automaton.
Abstract: Query answering algorithms on Xml streams check answer candidates on the fly in order to avoid the unnecessary buffering whenever possible. The delay and concurrency of a query are two measures for the degree of their streamability. They count the maximal number of stream elements during the life time for some query answer, and respectively, the maximal number of simultaneously alive answer candidates of a query. We study queries defined by deterministic nested word automata, which subsume large streamable fragments of XPath subject to schema restrictions by DTDs modulo P-time translations. We show that bounded and k-bounded delay and concurrency of such automata-defined queries are all decidable in polynomial time in the size of the automaton. Our results are obtained by P-time reduction to the bounded valuedness problem for recognizable relations between unranked trees, a problem that we show to be decidable in P-time.

Journal ArticleDOI
TL;DR: The class of rigid tree automata (RTA), an extension of standard bottom-up automata on ranked trees with distinguished states called rigid, is introduced, enabling the extension of model checking procedures based on finite tree Automata techniques, in particular for the verification of communicating processes with several local non-rewritable memories, like security protocols.
Abstract: We introduce the class of rigid tree automata (RTA), an extension of standard bottom-up automata on ranked trees with distinguished states called rigid. Rigid states define a restriction on the computation of RTA on trees: RTA can test for equality in subtrees reaching the same rigid state. RTA are able to perform local and global tests of equality between subtrees, non-linear tree pattern matching, and some inequality and disequality tests as well. Properties like determinism, pumping lemma, Boolean closure, and several decision problems are studied in detail. In particular, the emptiness problem is shown decidable in linear time for RTA whereas membership of a given tree to the language of a given RTA is NP-complete. Our main result is the decidability of whether a given tree belongs to the rewrite closure of an RTA language under a restricted family of term rewriting systems, whereas this closure is not an RTA language. This result, one of the first on rewrite closure of languages of tree automata with constraints, is enabling the extension of model checking procedures based on finite tree automata techniques, in particular for the verification of communicating processes with several local non-rewritable memories, like security protocols. Finally, a comparison of RTA with several classes of tree automata with local and global equality tests, with dag automata and Horn clause formalisms is also provided.

Journal ArticleDOI
TL;DR: It is shown that reactive links provide an alternative representation of total linear size for the language and can be used to reduce dramatically their state number both in the deterministic case and the non-deterministic case.
Abstract: A reactive automaton has extra links whose role is to change the behaviour of the automaton. We show that these links do not increase the expressiveness of finite automata but that they can be used to reduce dramatically their state number both in the deterministic case and the non-deterministic case. Typical examples of regular expressions associated with deterministic automata of exponential size according to the length of the expression show that reactive links provide an alternative representation of total linear size for the language.

Journal ArticleDOI
TL;DR: The restriction considered here concerns the length of all prefixes and suffixes that are added to the current word by hairpin completion that cannot be longer than a given constant.
Abstract: Hairpin completion is a formal operation inspired from biochemistry. Here we consider a restricted variant of hairpin completion called bounded hairpin completion. Applied to a word encoding a single stranded molecule x such that either a suffix or a prefix of x is complementary to a subword of x, hairpin completion produces a new word z, which is a prolongation of x to the right or to the left by annealing.Although this operation is a purely mathematical one and the biological reality is just a source of inspiration, it seems rather unrealistic to impose no restriction on the length of the prefix or suffix added by the hairpin completion. The restriction considered here concerns the length of all prefixes and suffixes that are added to the current word by hairpin completion. They cannot be longer than a given constant. Closure properties of some classes of formal languages under the non-iterated and iterated bounded hairpin completion are investigated. We consider the bounded hairpin completion distance between two words and generalize this distance to languages and discuss algorithms for computing them. Finally also the inverse operation, namely bounded hairpin reduction, as well as the set of all primitive bounded hairpin roots of a regular language are considered.

Journal ArticleDOI
TL;DR: An overview of how the main properties of first order term rewriting systems are classified in these hierarchies is given, including properties related to normalization, weak normalization and dependency problems, and propertiesrelated to confluence (confluence, local confluence and the unique normal form property).
Abstract: Undecidability of various properties of first-order term rewriting systems is well-known. An undecidable property can be classified by the complexity of the formula defining it. This classification gives rise to a hierarchy of distinct levels of undecidability, starting from the arithmetical hierarchy classifying properties using first order arithmetical formulas, and continuing into the analytic hierarchy, where quantification over function variables is allowed. In this paper we give an overview of how the main properties of first order term rewriting systems are classified in these hierarchies. We consider properties related to normalization (strong normalization, weak normalization and dependency problems) and properties related to confluence (confluence, local confluence and the unique normal form property). For all of these we distinguish between the single term version and the uniform version. Where appropriate, we also distinguish between ground and open terms. Most uniform properties are @P"2^0-complete. The particular problem of local confluence turns out to be @P"2^0-complete for ground terms, but only @P"2^0-complete (and thereby recursively enumerable) for open terms. The most surprising result concerns dependency pair problems without minimality flag: we prove this problem to be @P"1^1-complete, hence not in the arithmetical hierarchy, but properly in the analytic hierarchy. Some of our results are new or have appeared in our earlier publications. Others are based on folklore constructions, and are included for completeness as their precise classifications have hardly been noticed previously.

Journal ArticleDOI
TL;DR: This work presents a tree isomorphism algorithm for MUL trees to reduce redundant parts of these trees, and shows how the speciation signal contained in a MUL tree can be represented by a linear set of triplets.
Abstract: Gene trees are leaf-labeled trees inferred from molecular sequences. Because of gene duplication events arising in genomes, some species host several copies of the same gene, hence individual gene trees usually have several leaves labeled with identical species names. Dealing with such multi-labeled gene trees (MUL trees) is a substantial problem in phylogenomics, e.g. current supertree methods do not handle MUL trees, which restricts studies aimed at building the Tree of Life to a very small core of mono-copy genes. We propose to tackle this problem by mainly transforming a collection of MUL trees into a collection of trees, each containing single copies of labels. To achieve that aim, we provide several fast algorithmic building stones and describe how they fit in a general framework to build a species tree. First, we propose to separately preprocess each MUL tree in order to remove its redundant parts with respect to speciation events. For this purpose, we present a tree isomorphism algorithm for MUL trees to reduce redundant parts of these trees. Second, we show how the speciation signal contained in a MUL tree can be represented by a linear set of triplets. When this set is topologically coherent (compatible), we show that it can be used to produce a single-copy gene tree to replace the MUL tree while preserving the information it contains on speciation events. As an alternative approach, we propose to extract from each MUL tree a maximum size subtree that is free of duplication events. The algorithms are finally applied in a supertree analysis of hogenom, a database of homologous genes from fully sequenced genomes.

Journal ArticleDOI
TL;DR: The extraction procedure for space-bounded complexity is used to establish zero- one laws for the strong dimensions of complexity classes within ESPACE and the unbounded extraction procedure yields a zero-one law for the constructive strong dimensions for Turing degrees.
Abstract: We apply results on extracting randomness from independent sources to ''extract'' Kolmogorov complexity For any @a,@e>0, given a string x with K(x)>@a|x|, we show how to use a constant number of advice bits to efficiently compute another string y, |y|=@W(|x|), with K(y)>(1-@e)|y| This result holds for both unbounded and space-bounded Kolmogorov complexity We use the extraction procedure for space-bounded complexity to establish zero-one laws for the strong dimensions of complexity classes within ESPACE The unbounded extraction procedure yields a zero-one law for the constructive strong dimensions of Turing degrees