301 research outputs found
Cost Automata, Safe Schemes, and Downward Closures
Higher-order recursion schemes are an expressive formalism used to define languages of possibly infinite ranked trees. They extend regular and context-free grammars, and are equivalent to simply typed ?Y-calculus and collapsible pushdown automata. In this work we prove, under a syntactical constraint called safety, decidability of the model-checking problem for recursion schemes against properties defined by alternating B-automata, an extension of alternating parity automata for infinite trees with a boundedness acceptance condition. We then exploit this result to show how to compute downward closures of languages of finite trees recognized by safe recursion schemes
Phase Transition of the 2-Choices Dynamics on Core-Periphery Networks
Consider the following process on a network: Each agent initially holds
either opinion blue or red; then, in each round, each agent looks at two random
neighbors and, if the two have the same opinion, the agent adopts it. This
process is known as the 2-Choices dynamics and is arguably the most basic
non-trivial opinion dynamics modeling voting behavior on social networks.
Despite its apparent simplicity, 2-Choices has been analytically characterized
only on networks with a strong expansion property -- under assumptions on the
initial configuration that establish it as a fast majority consensus protocol.
In this work, we aim at contributing to the understanding of the 2-Choices
dynamics by considering its behavior on a class of networks with core-periphery
structure, a well-known topological assumption in social networks. In a
nutshell, assume that a densely-connected subset of agents, the core, holds a
different opinion from the rest of the network, the periphery. Then, depending
on the strength of the cut between the core and the periphery, a
phase-transition phenomenon occurs: Either the core's opinion rapidly spreads
among the rest of the network, or a metastability phase takes place, in which
both opinions coexist in the network for superpolynomial time. The interest of
our result is twofold. On the one hand, by looking at the 2-Choices dynamics as
a simplistic model of competition among opinions in social networks, our
theorem sheds light on the influence of the core on the rest of the network, as
a function of the core's connectivity towards the latter. On the other hand, to
the best of our knowledge, we provide the first analytical result which shows a
heterogeneous behavior of a simple dynamics as a function of structural
parameters of the network. Finally, we validate our theoretical predictions
with extensive experiments on real networks
Unboundedness Problems for Machines with Reversal-Bounded Counters
We consider a general class of decision problems concerning formal languages, called (one-dimensional) unboundedness predicates, for automata that feature reversal-bounded counters (RBCA). We show that each problem in this class reduces-non-deterministically in polynomial time to the same problem for just nite automata. We also show an analogous reduction for automata that have access to both a push- down stack and reversal-bounded counters (PRBCA). This allows us to answer several open questions: For example, we settle the complexity of deciding whether a given (P)RBCA language L is bounded, meaning whether there exist words w1, . . . , wn with L â w1â · · · wnâ . For PRBCA, even decidability was open. Our methods also show that there is no language of a (P)RBCA of intermediate growth. Part of our proof is likely of independent interest: We show that one can translate an RBCA into a machine with Z-counters in logarithmic space
Directed Regular and Context-Free Languages
We study the problem of deciding whether a given language is directed. A
language is \emph{directed} if every pair of words in have a common
(scattered) superword in . Deciding directedness is a fundamental problem in
connection with ideal decompositions of downward closed sets. Another
motivation is that deciding whether two \emph{directed} context-free languages
have the same downward closures can be decided in polynomial time, whereas for
general context-free languages, this problem is known to be coNEXP-complete.
We show that the directedness problem for regular languages, given as NFAs,
belongs to , and thus polynomial time. Moreover, it is NL-complete for
fixed alphabet sizes. Furthermore, we show that for context-free languages, the
directedness problem is PSPACE-complete
Embeddings of Schatten Norms with Applications to Data Streams
A_poly(nd) in R^{n x d}, suppose we want to construct a linear map L such that L(A_i) in R^{n\u27 x d\u27} for each i, where n\u27 = 1. Then how large do n\u27 and d\u27 need to be as a function of D_{p,q}?
We nearly resolve this question for every p, q >= 1, for the case where L(A_i) can be expressed as R*A_i*S, where R and S are arbitrary matrices that are allowed to depend on A_1, ... ,A_t, that is, L(A_i) can be implemented by left and right matrix multiplication. Namely, for every p, q >= 1, we provide nearly matching upper and lower bounds on the size of n\u27 and d\u27 as a function of D_{p,q}. Importantly, our upper bounds are oblivious, meaning that R and S do not depend on the A_i, while our lower bounds hold even if R and S depend on the A_i. As an application of our upper bounds, we answer a recent open question of Blasiok et al. about space-approximation trade-offs for the Schatten 1-norm, showing in a data stream it is possible to estimate the Schatten-1 norm up to a factor of D >= 1 using O~(min(n, d)^2/D^4) space
Sensitivity of Counting Queries
In the context of statistical databases, the release of accurate statistical information about the collected data often puts at risk the privacy of the individual contributors. The goal of differential privacy is to maximise the utility of a query while protecting the individual records in the database. A natural way to achieve differential privacy is to add statistical noise to the result of the query.
In this context, a mechanism for releasing statistical information is thus a trade-off between utility and privacy. In order to balance these two "conflicting" requirements, privacy preserving mechanisms calibrate the added noise to the so-called sensitivity of the query, and thus a precise estimate of the sensitivity of the query is necessary to determine the amplitude of the noise to be added.
In this paper, we initiate a systematic study of sensitivity of counting queries over relational databases. We first observe that the sensitivity of a Relational Algebra query with counting is not computable in general, and that while the sensitivity of Conjunctive Queries with counting is computable, it becomes unbounded as soon as the query includes a join. We then consider restricted classes of databases (databases with constraints), and study the problem of computing the sensitivity of a query given such constraints. We are able to establish bounds on the sensitivity of counting conjunctive queries over constrained databases. The kind of constraints studied here are: functional dependencies and cardinality dependencies. The latter is a natural generalisation of functional dependencies that allows us to provide tight bounds on the sensitivity of counting conjunctive queries
Priority Downward Closures
When a system sends messages through a lossy channel, then the language encoding all sequences of messages can be abstracted by its downward closure, i.e. the set of all (not necessarily contiguous) subwords. This is useful because even if the system has infinitely many states, its downward closure is a regular language. However, if the channel has congestion control based on priorities assigned to the messages, then we need a finer abstraction: The downward closure with respect to the priority embedding. As for subword-based downward closures, one can also show that these priority downward closures are always regular.
While computing finite automata for the subword-based downward closure is well understood, nothing is known in the case of priorities. We initiate the study of this problem and provide algorithms to compute priority downward closures for regular languages, one-counter languages, and context-free languages
- âŠ