2,310 research outputs found
A Fragment of Dependence Logic Capturing Polynomial Time
In this paper we study the expressive power of Horn-formulae in dependence
logic and show that they can express NP-complete problems. Therefore we define
an even smaller fragment D-Horn* and show that over finite successor structures
it captures the complexity class P of all sets decidable in polynomial time.
Furthermore we study the question which of our results can ge generalized to
the case of open formulae of D-Horn* and so-called downwards monotone
polynomial time properties of teams
Querying the Guarded Fragment
Evaluating a Boolean conjunctive query Q against a guarded first-order theory
F is equivalent to checking whether "F and not Q" is unsatisfiable. This
problem is relevant to the areas of database theory and description logic.
Since Q may not be guarded, well known results about the decidability,
complexity, and finite-model property of the guarded fragment do not obviously
carry over to conjunctive query answering over guarded theories, and had been
left open in general. By investigating finite guarded bisimilar covers of
hypergraphs and relational structures, and by substantially generalising
Rosati's finite chase, we prove for guarded theories F and (unions of)
conjunctive queries Q that (i) Q is true in each model of F iff Q is true in
each finite model of F and (ii) determining whether F implies Q is
2EXPTIME-complete. We further show the following results: (iii) the existence
of polynomial-size conformal covers of arbitrary hypergraphs; (iv) a new proof
of the finite model property of the clique-guarded fragment; (v) the small
model property of the guarded fragment with optimal bounds; (vi) a
polynomial-time solution to the canonisation problem modulo guarded
bisimulation, which yields (vii) a capturing result for guarded bisimulation
invariant PTIME.Comment: This is an improved and extended version of the paper of the same
title presented at LICS 201
Combined FO rewritability for conjunctive query answering in DL-Lite
Standard description logic (DL) reasoning services such as satisfiability and subsumption mainly aim to support TBox design. When the design stage is over and the TBox is used in an actual application, it is usually combined with instance data stored in an ABox, and therefore query answering becomes the most importan
On paths-based criteria for polynomial time complexity in proof-nets
Girard's Light linear logic (LLL) characterized polynomial time in the
proof-as-program paradigm with a bound on cut elimination. This logic relied on
a stratification principle and a "one-door" principle which were generalized
later respectively in the systems L^4 and L^3a. Each system was brought with
its own complex proof of Ptime soundness.
In this paper we propose a broad sufficient criterion for Ptime soundness for
linear logic subsystems, based on the study of paths inside the proof-nets,
which factorizes proofs of soundness of existing systems and may be used for
future systems. As an additional gain, our bound stands for any reduction
strategy whereas most bounds in the literature only stand for a particular
strategy.Comment: Long version of a conference pape
Meta-Kernelization with Structural Parameters
Meta-kernelization theorems are general results that provide polynomial
kernels for large classes of parameterized problems. The known
meta-kernelization theorems, in particular the results of Bodlaender et al.
(FOCS'09) and of Fomin et al. (FOCS'10), apply to optimization problems
parameterized by solution size. We present the first meta-kernelization
theorems that use a structural parameters of the input and not the solution
size. Let C be a graph class. We define the C-cover number of a graph to be a
the smallest number of modules the vertex set can be partitioned into, such
that each module induces a subgraph that belongs to the class C. We show that
each graph problem that can be expressed in Monadic Second Order (MSO) logic
has a polynomial kernel with a linear number of vertices when parameterized by
the C-cover number for any fixed class C of bounded rank-width (or
equivalently, of bounded clique-width, or bounded Boolean width). Many graph
problems such as Independent Dominating Set, c-Coloring, and c-Domatic Number
are covered by this meta-kernelization result. Our second result applies to MSO
expressible optimization problems, such as Minimum Vertex Cover, Minimum
Dominating Set, and Maximum Clique. We show that these problems admit a
polynomial annotated kernel with a linear number of vertices
Complexity Thresholds in Inclusion Logic
Logics with team semantics provide alternative means for logical
characterization of complexity classes. Both dependence and independence logic
are known to capture non-deterministic polynomial time, and the frontiers of
tractability in these logics are relatively well understood. Inclusion logic is
similar to these team-based logical formalisms with the exception that it
corresponds to deterministic polynomial time in ordered models. In this article
we examine connections between syntactical fragments of inclusion logic and
different complexity classes in terms of two computational problems: maximal
subteam membership and the model checking problem for a fixed inclusion logic
formula. We show that very simple quantifier-free formulae with one or two
inclusion atoms generate instances of these problems that are complete for
(non-deterministic) logarithmic space and polynomial time. Furthermore, we
present a fragment of inclusion logic that captures non-deterministic
logarithmic space in ordered models
A Survey of Symbolic Execution Techniques
Many security and software testing applications require checking whether
certain properties of a program hold for any possible usage scenario. For
instance, a tool for identifying software vulnerabilities may need to rule out
the existence of any backdoor to bypass a program's authentication. One
approach would be to test the program using different, possibly random inputs.
As the backdoor may only be hit for very specific program workloads, automated
exploration of the space of possible inputs is of the essence. Symbolic
execution provides an elegant solution to the problem, by systematically
exploring many possible execution paths at the same time without necessarily
requiring concrete inputs. Rather than taking on fully specified input values,
the technique abstractly represents them as symbols, resorting to constraint
solvers to construct actual instances that would cause property violations.
Symbolic execution has been incubated in dozens of tools developed over the
last four decades, leading to major practical breakthroughs in a number of
prominent software reliability applications. The goal of this survey is to
provide an overview of the main ideas, challenges, and solutions developed in
the area, distilling them for a broad audience.
The present survey has been accepted for publication at ACM Computing
Surveys. If you are considering citing this survey, we would appreciate if you
could use the following BibTeX entry: http://goo.gl/Hf5FvcComment: This is the authors pre-print copy. If you are considering citing
this survey, we would appreciate if you could use the following BibTeX entry:
http://goo.gl/Hf5Fv
- …