959 research outputs found
Simulation Subsumption or Déjà vu on the Web
Simulation unification is a special kind of unification adapted to retrieving semi-structured data on the Web. This article introduces simulation subsumption, or containment, that is, query subsumption under simulation unification. Simulation subsumption is crucial in general for query optimization, in particular for optimizing pattern-based search engines, and for the termination of recursive rule-based web languages such as the XML and RDF query language Xcerpt. This paper first motivates and formalizes simulation subsumption. Then, it establishes decidability of simulation subsumption for advanced query patterns featuring descendant constructs, regular expressions, negative subterms (or subterm exclusions), and multiple variable occurrences. Finally, we show that subsumption between two query terms can be decided in O(n!n) where n is the sum of the sizes of both query terms
On Pebble Automata for Data Languages with Decidable Emptiness Problem
In this paper we study a subclass of pebble automata (PA) for data languages
for which the emptiness problem is decidable. Namely, we introduce the
so-called top view weak PA. Roughly speaking, top view weak PA are weak PA
where the equality test is performed only between the data values seen by the
two most recently placed pebbles. The emptiness problem for this model is
decidable. We also show that it is robust: alternating, nondeterministic and
deterministic top view weak PA have the same recognition power. Moreover, this
model is strong enough to accept all data languages expressible in Linear
Temporal Logic with the future-time operators, augmented with one register
freeze quantifier.Comment: An extended abstract of this work has been published in the
proceedings of the 34th International Symposium on Mathematical Foundations
of Computer Science (MFCS) 2009}, Springer, Lecture Notes in Computer Science
5734, pages 712-72
Generating resources through co-evolution of entrepreneurs and ecosystems
Purpose – The emerging perspectives of entrepreneurial ecosystems, bricolage and effectuationhighlight the interaction between the entrepreneur and the surrounding community, and its potentialfor creative resource acquisition and utilization. However, empirical work on how this process actuallyunfolds remains scarce. This paper aims to study the interaction between the opportunity constructionprocess and the development of resources in the surrounding ecosystem.
Design/methodology/approach – This paper is a qualitative analysis of the extreme case of AaltoEntrepreneurship Society (Aaltoes), a newly founded organization successfully promotingentrepreneurship within a university merger with virtually no resources, based on interviews of six keycontributors and four stakeholder organisations.
Findings – The opportunity construction process both supported and was supported by two keyresource generating mechanisms. Formulating and opportunistically reformulating the agenda forincreasing potential synergy laid the groundwork for mutual benefit. Proactive concretization enhancedboth initial resource allocation and sustaining input to the process through offering tangible instancesof specific opportunities and feedback.
Research limitations/implications – Although based on a single case study in a university setting,proactive concretization emerges as a promising direction for further investigations of the benefits anddynamics of entrepreneur– ecosystem interaction in the opportunity construction process.
Practical implications – Intentionally creating beneficial entrepreneur– ecosystem interaction andteaching proactive concretization becomes a key goal for educators of entrepreneurship.
Originality/value – The paper extends an understanding of creative resource generation and utilizationin the opportunity construction process. The role of proactive concretization was emphasized in theinteraction of the entrepreneur and the ecosystem, creating virtuous spirals of entrepreneurial activity.Peer reviewe
New predictions for radiation-driven, steady-state mass-loss and wind-momentum from hot, massive stars II. A grid of O-type stars in the Galaxy and the Magellanic Clouds
Reliable predictions of mass-loss rates are important for massive-star
evolution computations. We aim to provide predictions for mass-loss rates and
wind-momentum rates of O-type stars, carefully studying the behaviour of these
winds as functions of stellar parameters like luminosity and metallicity. We
use newly developed steady-state models of radiation-driven winds to compute
the global properties of a grid of O-stars. The self-consistent models are
calculated by means of an iterative solution to the equation of motion using
full NLTE radiative transfer in the co-moving frame to compute the radiative
acceleration. In order to study winds in different galactic environments, the
grid covers main-sequence stars, giants and supergiants in the Galaxy and both
Magellanic Clouds. We find a strong dependence of mass-loss on both luminosity
and metallicity. Mean values across the grid are
and , however we also find a somewhat stronger
dependence on metallicity for lower luminosities. Similarly, the mass
loss-luminosity relation is somewhat steeper for the SMC than for the Galaxy.
In addition, the computed rates are systematically lower (by a factor 2 and
more) than those commonly used in stellar-evolution calculations. Overall, our
results agree well with observations in the Galaxy that account properly for
wind-clumping, with empirical vs. scaling relations, and
with observations of O-dwarfs in the SMC. Our results provide simple fit
relations for mass-loss rates and wind momenta of massive O-stars stars as
functions of luminosity and metallicity, valid in the range \,K. Due to the systematically lower , our new models
suggest that new rates might be needed in evolution simulations of massive
stars.Comment: Accepted for publication in A&A. 16 pages, 13 figure
Spotting Trees with Few Leaves
We show two results related to the Hamiltonicity and -Path algorithms in
undirected graphs by Bj\"orklund [FOCS'10], and Bj\"orklund et al., [arXiv'10].
First, we demonstrate that the technique used can be generalized to finding
some -vertex tree with leaves in an -vertex undirected graph in
time. It can be applied as a subroutine to solve the
-Internal Spanning Tree (-IST) problem in
time using polynomial space, improving upon previous algorithms for this
problem. In particular, for the first time we break the natural barrier of
. Second, we show that the iterated random bipartition employed by
the algorithm can be improved whenever the host graph admits a vertex coloring
with few colors; it can be an ordinary proper vertex coloring, a fractional
vertex coloring, or a vector coloring. In effect, we show improved bounds for
-Path and Hamiltonicity in any graph of maximum degree
or with vector chromatic number at most 8
Algorithmic Analysis of Array-Accessing Programs
For programs whose data variables range over Boolean or finite domains, program verification is decidable, and this forms the basis of recent tools for software model checking. In this paper, we consider algorithmic verification of programs that use Boolean variables, and in addition, access a single array whose length is potentially unbounded, and whose elements range over pairs from Σ × D, where Σ is a finite alphabet and D is a potentially unbounded data domain. We show that the reachability problem, while undecidable in general, is (1) Pspace-complete for programs in which the array-accessing for-loops are not nested, (2) solvable in Ex-pspace for programs with arbitrarily nested loops if array elements range over a finite data domain, and (3) decidable for a restricted class of programs with doubly-nested loops. The third result establishes connections to automata and logics defining languages over data words
Crime in Maine 2014
Automata over infinite alphabets have recently come to be studied extensively
as potentially useful tools for solving problems in verification and database
theory. One popular model of automata studied is the Class Memory Automata
(CMA), for which the emptiness problem is equivalent to Petri Net Reachability.
We identify a restriction - which we call weakness - of CMA, and show that
their emptiness problem is equivalent to Petri Net Coverability. Further, we
show that in the deterministic case they are closed under all Boolean
operations. We clarify the connections between weak CMA and existing automata
over data languages. We also extend CMA to operate over multiple levels of
nested data values, and show that while these have undecidable emptiness in
general, adding the weakness constraint recovers decidability of emptiness, via
reduction to coverability in well-structured transition systems. We also
examine connections with existing automata over nested data.Comment: Preprint of LATA'15 pape
How should we theorize algorithms? Five ideal types in analyzing algorithmic normativities
This is the final version. Available on open access from SAGE Publications via the DOI in this recordThe power of algorithms has become a familiar topic in society, media, and the social sciences. It is increasingly common to argue that, for instance, algorithms automate inequality, that they are biased black boxes that reproduce racism, or that they control our money and information. Implicit in many of these discussions is that algorithms are permeated with normativities, and that these normativities shape society. The aim of this editorial is double: First, it contributes to a more nuanced discussion about algorithms by discussing how we, as social scientists, think about algorithms in relation to five theoretical ideal types. For instance, what does it mean to go under the hood of the algorithm and what does it mean to stay above it? Second, it introduces the contributions to this special theme by situating them in relation to these five ideal types. By doing this, the editorial aims to contribute to an increased analytical awareness of how algorithms are theorized in society and culture. The articles in the special theme deal with algorithms in different settings, ranging from farming, schools, and self-tracking to AIDS, nuclear power plants, and surveillance. The contributions thus explore, both theoretically and empirically, different settings where algorithms are intertwined with normativities.Riksbankens jubileumsfon
An automaton over data words that captures EMSO logic
We develop a general framework for the specification and implementation of
systems whose executions are words, or partial orders, over an infinite
alphabet. As a model of an implementation, we introduce class register
automata, a one-way automata model over words with multiple data values. Our
model combines register automata and class memory automata. It has natural
interpretations. In particular, it captures communicating automata with an
unbounded number of processes, whose semantics can be described as a set of
(dynamic) message sequence charts. On the specification side, we provide a
local existential monadic second-order logic that does not impose any
restriction on the number of variables. We study the realizability problem and
show that every formula from that logic can be effectively, and in elementary
time, translated into an equivalent class register automaton
Lower Bounds for the Graph Homomorphism Problem
The graph homomorphism problem (HOM) asks whether the vertices of a given
-vertex graph can be mapped to the vertices of a given -vertex graph
such that each edge of is mapped to an edge of . The problem
generalizes the graph coloring problem and at the same time can be viewed as a
special case of the -CSP problem. In this paper, we prove several lower
bound for HOM under the Exponential Time Hypothesis (ETH) assumption. The main
result is a lower bound .
This rules out the existence of a single-exponential algorithm and shows that
the trivial upper bound is almost asymptotically
tight.
We also investigate what properties of graphs and make it difficult
to solve HOM. An easy observation is that an upper
bound can be improved to where
is the minimum size of a vertex cover of . The second
lower bound shows that the upper bound is
asymptotically tight. As to the properties of the "right-hand side" graph ,
it is known that HOM can be solved in time and
where is the maximum degree of
and is the treewidth of . This gives
single-exponential algorithms for graphs of bounded maximum degree or bounded
treewidth. Since the chromatic number does not exceed
and , it is natural to ask whether similar
upper bounds with respect to can be obtained. We provide a negative
answer to this question by establishing a lower bound for any
function . We also observe that similar lower bounds can be obtained for
locally injective homomorphisms.Comment: 19 page
- …