958 research outputs found

    On Pebble Automata for Data Languages with Decidable Emptiness Problem

    Get PDF
    In this paper we study a subclass of pebble automata (PA) for data languages for which the emptiness problem is decidable. Namely, we introduce the so-called top view weak PA. Roughly speaking, top view weak PA are weak PA where the equality test is performed only between the data values seen by the two most recently placed pebbles. The emptiness problem for this model is decidable. We also show that it is robust: alternating, nondeterministic and deterministic top view weak PA have the same recognition power. Moreover, this model is strong enough to accept all data languages expressible in Linear Temporal Logic with the future-time operators, augmented with one register freeze quantifier.Comment: An extended abstract of this work has been published in the proceedings of the 34th International Symposium on Mathematical Foundations of Computer Science (MFCS) 2009}, Springer, Lecture Notes in Computer Science 5734, pages 712-72

    Simulation Subsumption or Déjà vu on the Web

    Get PDF
    Simulation unification is a special kind of unification adapted to retrieving semi-structured data on the Web. This article introduces simulation subsumption, or containment, that is, query subsumption under simulation unification. Simulation subsumption is crucial in general for query optimization, in particular for optimizing pattern-based search engines, and for the termination of recursive rule-based web languages such as the XML and RDF query language Xcerpt. This paper first motivates and formalizes simulation subsumption. Then, it establishes decidability of simulation subsumption for advanced query patterns featuring descendant constructs, regular expressions, negative subterms (or subterm exclusions), and multiple variable occurrences. Finally, we show that subsumption between two query terms can be decided in O(n!n) where n is the sum of the sizes of both query terms

    Generating resources through co-evolution of entrepreneurs and ecosystems

    Get PDF
    Purpose – The emerging perspectives of entrepreneurial ecosystems, bricolage and effectuationhighlight the interaction between the entrepreneur and the surrounding community, and its potentialfor creative resource acquisition and utilization. However, empirical work on how this process actuallyunfolds remains scarce. This paper aims to study the interaction between the opportunity constructionprocess and the development of resources in the surrounding ecosystem. Design/methodology/approach – This paper is a qualitative analysis of the extreme case of AaltoEntrepreneurship Society (Aaltoes), a newly founded organization successfully promotingentrepreneurship within a university merger with virtually no resources, based on interviews of six keycontributors and four stakeholder organisations. Findings – The opportunity construction process both supported and was supported by two keyresource generating mechanisms. Formulating and opportunistically reformulating the agenda forincreasing potential synergy laid the groundwork for mutual benefit. Proactive concretization enhancedboth initial resource allocation and sustaining input to the process through offering tangible instancesof specific opportunities and feedback. Research limitations/implications – Although based on a single case study in a university setting,proactive concretization emerges as a promising direction for further investigations of the benefits anddynamics of entrepreneur– ecosystem interaction in the opportunity construction process. Practical implications – Intentionally creating beneficial entrepreneur– ecosystem interaction andteaching proactive concretization becomes a key goal for educators of entrepreneurship. Originality/value – The paper extends an understanding of creative resource generation and utilizationin the opportunity construction process. The role of proactive concretization was emphasized in theinteraction of the entrepreneur and the ecosystem, creating virtuous spirals of entrepreneurial activity.Peer reviewe

    Spotting Trees with Few Leaves

    Full text link
    We show two results related to the Hamiltonicity and kk-Path algorithms in undirected graphs by Bj\"orklund [FOCS'10], and Bj\"orklund et al., [arXiv'10]. First, we demonstrate that the technique used can be generalized to finding some kk-vertex tree with ll leaves in an nn-vertex undirected graph in O(1.657k2l/2)O^*(1.657^k2^{l/2}) time. It can be applied as a subroutine to solve the kk-Internal Spanning Tree (kk-IST) problem in O(min(3.455k,1.946n))O^*(\min(3.455^k, 1.946^n)) time using polynomial space, improving upon previous algorithms for this problem. In particular, for the first time we break the natural barrier of O(2n)O^*(2^n). Second, we show that the iterated random bipartition employed by the algorithm can be improved whenever the host graph admits a vertex coloring with few colors; it can be an ordinary proper vertex coloring, a fractional vertex coloring, or a vector coloring. In effect, we show improved bounds for kk-Path and Hamiltonicity in any graph of maximum degree Δ=4,,12\Delta=4,\ldots,12 or with vector chromatic number at most 8

    New predictions for radiation-driven, steady-state mass-loss and wind-momentum from hot, massive stars II. A grid of O-type stars in the Galaxy and the Magellanic Clouds

    Full text link
    Reliable predictions of mass-loss rates are important for massive-star evolution computations. We aim to provide predictions for mass-loss rates and wind-momentum rates of O-type stars, carefully studying the behaviour of these winds as functions of stellar parameters like luminosity and metallicity. We use newly developed steady-state models of radiation-driven winds to compute the global properties of a grid of O-stars. The self-consistent models are calculated by means of an iterative solution to the equation of motion using full NLTE radiative transfer in the co-moving frame to compute the radiative acceleration. In order to study winds in different galactic environments, the grid covers main-sequence stars, giants and supergiants in the Galaxy and both Magellanic Clouds. We find a strong dependence of mass-loss on both luminosity and metallicity. Mean values across the grid are M˙L2.2\dot{M}\sim L_{\ast}^{2.2} and M˙Z0.95\dot{M}\sim Z_{\ast}^{0.95}, however we also find a somewhat stronger dependence on metallicity for lower luminosities. Similarly, the mass loss-luminosity relation is somewhat steeper for the SMC than for the Galaxy. In addition, the computed rates are systematically lower (by a factor 2 and more) than those commonly used in stellar-evolution calculations. Overall, our results agree well with observations in the Galaxy that account properly for wind-clumping, with empirical M˙\dot{M} vs. ZZ_\ast scaling relations, and with observations of O-dwarfs in the SMC. Our results provide simple fit relations for mass-loss rates and wind momenta of massive O-stars stars as functions of luminosity and metallicity, valid in the range Teff=2800045000T_{\rm eff} = 28000 - 45000\,K. Due to the systematically lower M˙\dot{M}, our new models suggest that new rates might be needed in evolution simulations of massive stars.Comment: Accepted for publication in A&A. 16 pages, 13 figure

    Algorithmic Analysis of Array-Accessing Programs

    Get PDF
    For programs whose data variables range over Boolean or finite domains, program verification is decidable, and this forms the basis of recent tools for software model checking. In this paper, we consider algorithmic verification of programs that use Boolean variables, and in addition, access a single array whose length is potentially unbounded, and whose elements range over pairs from Σ × D, where Σ is a finite alphabet and D is a potentially unbounded data domain. We show that the reachability problem, while undecidable in general, is (1) Pspace-complete for programs in which the array-accessing for-loops are not nested, (2) solvable in Ex-pspace for programs with arbitrarily nested loops if array elements range over a finite data domain, and (3) decidable for a restricted class of programs with doubly-nested loops. The third result establishes connections to automata and logics defining languages over data words

    Crime in Maine 2014

    Get PDF
    Automata over infinite alphabets have recently come to be studied extensively as potentially useful tools for solving problems in verification and database theory. One popular model of automata studied is the Class Memory Automata (CMA), for which the emptiness problem is equivalent to Petri Net Reachability. We identify a restriction - which we call weakness - of CMA, and show that their emptiness problem is equivalent to Petri Net Coverability. Further, we show that in the deterministic case they are closed under all Boolean operations. We clarify the connections between weak CMA and existing automata over data languages. We also extend CMA to operate over multiple levels of nested data values, and show that while these have undecidable emptiness in general, adding the weakness constraint recovers decidability of emptiness, via reduction to coverability in well-structured transition systems. We also examine connections with existing automata over nested data.Comment: Preprint of LATA'15 pape

    An automaton over data words that captures EMSO logic

    Full text link
    We develop a general framework for the specification and implementation of systems whose executions are words, or partial orders, over an infinite alphabet. As a model of an implementation, we introduce class register automata, a one-way automata model over words with multiple data values. Our model combines register automata and class memory automata. It has natural interpretations. In particular, it captures communicating automata with an unbounded number of processes, whose semantics can be described as a set of (dynamic) message sequence charts. On the specification side, we provide a local existential monadic second-order logic that does not impose any restriction on the number of variables. We study the realizability problem and show that every formula from that logic can be effectively, and in elementary time, translated into an equivalent class register automaton

    How should we theorize algorithms? Five ideal types in analyzing algorithmic normativities

    Get PDF
    This is the final version. Available on open access from SAGE Publications via the DOI in this recordThe power of algorithms has become a familiar topic in society, media, and the social sciences. It is increasingly common to argue that, for instance, algorithms automate inequality, that they are biased black boxes that reproduce racism, or that they control our money and information. Implicit in many of these discussions is that algorithms are permeated with normativities, and that these normativities shape society. The aim of this editorial is double: First, it contributes to a more nuanced discussion about algorithms by discussing how we, as social scientists, think about algorithms in relation to five theoretical ideal types. For instance, what does it mean to go under the hood of the algorithm and what does it mean to stay above it? Second, it introduces the contributions to this special theme by situating them in relation to these five ideal types. By doing this, the editorial aims to contribute to an increased analytical awareness of how algorithms are theorized in society and culture. The articles in the special theme deal with algorithms in different settings, ranging from farming, schools, and self-tracking to AIDS, nuclear power plants, and surveillance. The contributions thus explore, both theoretically and empirically, different settings where algorithms are intertwined with normativities.Riksbankens jubileumsfon

    Lower Bounds for the Graph Homomorphism Problem

    Full text link
    The graph homomorphism problem (HOM) asks whether the vertices of a given nn-vertex graph GG can be mapped to the vertices of a given hh-vertex graph HH such that each edge of GG is mapped to an edge of HH. The problem generalizes the graph coloring problem and at the same time can be viewed as a special case of the 22-CSP problem. In this paper, we prove several lower bound for HOM under the Exponential Time Hypothesis (ETH) assumption. The main result is a lower bound 2Ω(nloghloglogh)2^{\Omega\left( \frac{n \log h}{\log \log h}\right)}. This rules out the existence of a single-exponential algorithm and shows that the trivial upper bound 2O(nlogh)2^{{\mathcal O}(n\log{h})} is almost asymptotically tight. We also investigate what properties of graphs GG and HH make it difficult to solve HOM(G,H)(G,H). An easy observation is that an O(hn){\mathcal O}(h^n) upper bound can be improved to O(hvc(G)){\mathcal O}(h^{\operatorname{vc}(G)}) where vc(G)\operatorname{vc}(G) is the minimum size of a vertex cover of GG. The second lower bound hΩ(vc(G))h^{\Omega(\operatorname{vc}(G))} shows that the upper bound is asymptotically tight. As to the properties of the "right-hand side" graph HH, it is known that HOM(G,H)(G,H) can be solved in time (f(Δ(H)))n(f(\Delta(H)))^n and (f(tw(H)))n(f(\operatorname{tw}(H)))^n where Δ(H)\Delta(H) is the maximum degree of HH and tw(H)\operatorname{tw}(H) is the treewidth of HH. This gives single-exponential algorithms for graphs of bounded maximum degree or bounded treewidth. Since the chromatic number χ(H)\chi(H) does not exceed tw(H)\operatorname{tw}(H) and Δ(H)+1\Delta(H)+1, it is natural to ask whether similar upper bounds with respect to χ(H)\chi(H) can be obtained. We provide a negative answer to this question by establishing a lower bound (f(χ(H)))n(f(\chi(H)))^n for any function ff. We also observe that similar lower bounds can be obtained for locally injective homomorphisms.Comment: 19 page
    corecore