52 research outputs found

    The Parametric Complexity of Lossy Counter Machines

    Get PDF
    The reachability problem in lossy counter machines is the best-known ACKERMANN-complete problem and has been used to establish most of the ACKERMANN-hardness statements in the literature. This hides however a complexity gap when the number of counters is fixed. We close this gap and prove F_d-completeness for machines with d counters, which provides the first known uncontrived problems complete for the fast-growing complexity classes at levels 3 < d < omega. We develop for this an approach through antichain factorisations of bad sequences and analysing the length of controlled antichains

    Measuring concurrency in CCS

    Get PDF
    A research report submitted to the Faculty of Science, University of the Witwatersrand, Johannesburg, in partial fulfilment of the requirements for the degree of Master of ScienceThis research report investigates the application of Charron-Bost's measure of currency m to Milner's Calculus of Communicating Systems (CCS). The aim of this is twofold: first to evaluate the measure m in terms of criteria gathered from the literature: and second to determine the feasiblllty of measuring concurrency in CCS and hence provide a new tool for understanding concurrency using CCS. The approach taken is to identify the differences hetween the message-passing formalism in which the measure m is defined, and CCS and to modify this formalism to-enable the mapping of CCS agents to it. A software tool, the Concurrency Measurement Tool, is developed to permit experimentation with chosen CCS agents. These experiments show that the measure m, although intuitively appealing, is defined by an algebraic expression that is ill-behaved. A new measure is defined and it is shown that it matches the evaluation criteria better than m, although it is still not ideal. This work demonstrates that it is feasible to measure concurrency in CCS and that a methodology has been developed for evaluating concurrency measures.Andrew Chakane 201

    Posets with Interfaces for Concurrent Kleene Algebra

    Full text link
    We introduce posets with interfaces (iposets) and generalise the serial composition of posets to a new gluing composition of iposets. In partial order semantics of concurrency, this amounts to designate events that continue their execution across components. Alternatively, in terms of decomposing concurrent systems, it allows cutting through some events, whereas serial composition may cut through edges only. We show that iposets under gluing composition form a category, extending the monoid of posets under serial composition, and a 2-category when enriched with a subsumption order and a suitable parallel composition as a lax tensor. This generalises the interchange monoids used in concurrent Kleene algebra. We also consider gp-iposets, which are generated from singletons by finitary gluing and parallel compositions. We show that the class includes the series-parallel posets as well as the interval orders, which are also well studied in concurrency theory. Finally, we show that not all posets are gp-iposets, exposing several posets that cannot occur as induced substructures of gp-iposets

    Closure and Decision Properties for Higher-Dimensional Automata

    Full text link
    In this paper we develop the language theory of higher-dimensional automata (HDAs). Regular languages of HDAs are sets of finite interval partially ordered multisets (pomsets) with interfaces (iiPoms). We first show a pumping lemma which allows us to expose a class of non-regular languages. We also give an example of a regular language with unbounded ambiguity. Concerning decision and closure properties, we show that inclusion of regular languages is decidable (hence is emptiness), and that intersections of regular languages are again regular. On the other hand, complements of regular languages are not regular. We introduce a width-bounded complement and show that width-bounded complements of regular languages are again regular

    A Myhill-Nerode Theorem for Higher-Dimensional Automata

    Full text link
    We establish a Myhill-Nerode type theorem for higher-dimensional automata (HDAs), stating that a language is regular precisely if it has finite prefix quotient. HDAs extend standard automata with additional structure, making it possible to distinguish between interleavings and concurrency. We also introduce deterministic HDAs and show that not all HDAs are determinizable, that is, there exist regular languages that cannot be recognised by a deterministic HDA. Using our theorem, we develop an internal characterisation of deterministic languages

    Ackermannian and Primitive-Recursive Bounds with Dickson's Lemma

    Full text link
    Dickson's Lemma is a simple yet powerful tool widely used in termination proofs, especially when dealing with counters or related data structures. However, most computer scientists do not know how to derive complexity upper bounds from such termination proofs, and the existing literature is not very helpful in these matters. We propose a new analysis of the length of bad sequences over (N^k,\leq) and explain how one may derive complexity upper bounds from termination proofs. Our upper bounds improve earlier results and are essentially tight

    Relational geometry modelling execution of structured programs

    Get PDF
    We discuss some twists around Concurrent Kleene Algebra (CKA). First, a new model of CKA represents a trace of a concurrent program as a diagram in a two-dimensional non-metric finite geometry, namely, program actions by points, objects and threads by vertical lines, transactions by horizontal lines, communications and resource sharing by sloping lines. While we had already sketched this earlier, we fully formalise it here in terms of the algebra of binary relations. Second, we present a new definition technique for partial operators, namely an assume/claim style akin to rely/guarantee program specification. This admits a general refinement order with Top and Bottom as well as proofs of the CKA laws. Finally, we give a short perspective on the geometric representation of some standard concurrent programming concepts

    Efficient and Generic Algorithms for Quantitative Attack Tree Analysis

    Get PDF
    Numerous analysis methods for quantitative attack tree analysis have been proposed. These algorithms compute relevant security metrics, i.e. performance indicators that quantify how good the security of a system is; typical metrics being the most likely attack, the cheapest, or the most damaging one. However, existing methods are only geared towards specific metrics or do not work on general attack trees. This paper classifies attack trees in two dimensions: proper trees vs. directed acyclic graphs (i.e. with shared subtrees); and static vs. dynamic gates. For three out of these four classes, we propose novel algorithms that work over a generic attribute domain, encompassing a large number of concrete security metrics defined on the attack tree semantics; dynamic attack trees with directed acyclic graph structure are left as an open problem. We also analyse the computational complexity of our methods.Comment: Funding: ERC Consolidator (Grant Number: 864075), and European Union (Grant Number: 101067199-ProSVED), in IEEE Transactions on Dependable and Secure Computing, 2022. arXiv admin note: substantial text overlap with arXiv:2105.0751

    The Universality Problem

    Get PDF
    The theme of this thesis is to explore the universality problem in set theory in connection to model theory, to present some methods for finding universality results, to analyse how these methods were applied, to mention some results and to emphasise some philosophical interrogations that these aspects entail. A fundamental aspect of the universality problem is to find what determines the existence of universal objects. That means that we have to take into consideration and examine the methods that we use in proving their existence or nonexistence, the role of cardinal arithmetic, combinatorics etc. The proof methods used in the mathematical part will be mostly set-theoretic, but some methods from model theory and category theory will also be present. A graph might be the simplest, but it is also one of the most useful notions in mathematics. We show that there is a faithful functor F from the category L of linear orders to the category G of graphs that preserves model theoretic-related universality results (classes of objects having universal models in exactly the same cardinals, and also having the same universality spectrum). Trees constitute combinatorial objects and have a central role in set theory. The universality of trees is connected to the universality of linear orders, but it also seems to present more challenges, which we survey and present some results. We show that there is no embedding between an ℵ2-Souslin tree and a non-special wide ℵ2 tree T with no cofinal branches. Furthermore, using the notion of ascent path, we prove that the class of non-special ℵ2-Souslin tree with an ω-ascent path a has maximal complexity number, 2ℵ2 = ℵ3. Within the general framework of the universality problem in set theory and model theory, while emphasising their approaches and their connections with regard to this topic, we examine the possibility of drawing some philosophical conclusions connected to, among others, the notions of mathematical knowledge, mathematical object and proof
    corecore