15,611 research outputs found
Formal Languages in Dynamical Systems
We treat here the interrelation between formal languages and those dynamical
systems that can be described by cellular automata (CA). There is a well-known
injective map which identifies any CA-invariant subshift with a central formal
language. However, in the special case of a symbolic dynamics, i.e. where the
CA is just the shift map, one gets a stronger result: the identification map
can be extended to a functor between the categories of symbolic dynamics and
formal languages. This functor additionally maps topological conjugacies
between subshifts to empty-string-limited generalized sequential machines
between languages. If the periodic points form a dense set, a case which arises
in a commonly used notion of chaotic dynamics, then an even more natural map to
assign a formal language to a subshift is offered. This map extends to a
functor, too. The Chomsky hierarchy measuring the complexity of formal
languages can be transferred via either of these functors from formal languages
to symbolic dynamics and proves to be a conjugacy invariant there. In this way
it acquires a dynamical meaning. After reviewing some results of the complexity
of CA-invariant subshifts, special attention is given to a new kind of
invariant subshift: the trapped set, which originates from the theory of
chaotic scattering and for which one can study complexity transitions.Comment: 23 pages, LaTe
Combining Insertion and Deletion in RNA-editing Preserves Regularity
Inspired by RNA-editing as occurs in transcriptional processes in the living
cell, we introduce an abstract notion of string adjustment, called guided
rewriting. This formalism allows simultaneously inserting and deleting
elements. We prove that guided rewriting preserves regularity: for every
regular language its closure under guided rewriting is regular too. This
contrasts an earlier abstraction of RNA-editing separating insertion and
deletion for which it was proved that regularity is not preserved. The
particular automaton construction here relies on an auxiliary notion of slice
sequence which enables to sweep from left to right through a completed rewrite
sequence.Comment: In Proceedings MeCBIC 2012, arXiv:1211.347
Synthesising Graphical Theories
In recent years, diagrammatic languages have been shown to be a powerful and
expressive tool for reasoning about physical, logical, and semantic processes
represented as morphisms in a monoidal category. In particular, categorical
quantum mechanics, or "Quantum Picturalism", aims to turn concrete features of
quantum theory into abstract structural properties, expressed in the form of
diagrammatic identities. One way we search for these properties is to start
with a concrete model (e.g. a set of linear maps or finite relations) and start
composing generators into diagrams and looking for graphical identities.
Naively, we could automate this procedure by enumerating all diagrams up to a
given size and check for equalities, but this is intractable in practice
because it produces far too many equations. Luckily, many of these identities
are not primitive, but rather derivable from simpler ones. In 2010, Johansson,
Dixon, and Bundy developed a technique called conjecture synthesis for
automatically generating conjectured term equations to feed into an inductive
theorem prover. In this extended abstract, we adapt this technique to
diagrammatic theories, expressed as graph rewrite systems, and demonstrate its
application by synthesising a graphical theory for studying entangled quantum
states.Comment: 10 pages, 22 figures. Shortened and one theorem adde
String rewriting for Double Coset Systems
In this paper we show how string rewriting methods can be applied to give a
new method of computing double cosets. Previous methods for double cosets were
enumerative and thus restricted to finite examples. Our rewriting methods do
not suffer this restriction and we present some examples of infinite double
coset systems which can now easily be solved using our approach. Even when both
enumerative and rewriting techniques are present, our rewriting methods will be
competitive because they i) do not require the preliminary calculation of
cosets; and ii) as with single coset problems, there are many examples for
which rewriting is more effective than enumeration.
Automata provide the means for identifying expressions for normal forms in
infinite situations and we show how they may be constructed in this setting.
Further, related results on logged string rewriting for monoid presentations
are exploited to show how witnesses for the computations can be provided and
how information about the subgroups and the relations between them can be
extracted. Finally, we discuss how the double coset problem is a special case
of the problem of computing induced actions of categories which demonstrates
that our rewriting methods are applicable to a much wider class of problems
than just the double coset problem.Comment: accepted for publication by the Journal of Symbolic Computatio
Length-Based Attacks for Certain Group Based Encryption Rewriting Systems
In this note, we describe a probabilistic attack on public key cryptosystems
based on the word/conjugacy problems for finitely presented groups of the type
proposed recently by Anshel, Anshel and Goldfeld. In such a scheme, one makes
use of the property that in the given group the word problem has a polynomial
time solution, while the conjugacy problem has no known polynomial solution. An
example is the braid group from topology in which the word problem is solvable
in polynomial time while the only known solutions to the conjugacy problem are
exponential. The attack in this paper is based on having a canonical
representative of each string relative to which a length function may be
computed. Hence the term length attack. Such canonical representatives are
known to exist for the braid group
- …