This document is also available as
PostScript
and
DVI.
- RS-99-57
-
PostScript,
PDF,
DVI.
Peter D. Mosses.
A Modular SOS for ML Concurrency Primitives.
December 1999.
22 pp.
Abstract: Modularity is an important pragmatic aspect of
semantic descriptions. In denotational semantics, the issue of modularity has
received much attention, and appropriate abstractions have been introduced,
so that definitions of semantic functions may be independent of the details
of how computations are modelled. In structural operational semantics (SOS),
however, this issue has largely been neglected, and SOS descriptions of
programming languages typically exhibit rather poor modularity--for
instance, extending the described language may entail a complete
reformulation of the description of the original constructs.
A
proposal has recently been made for a modular approach to SOS, called MSOS.
The basic definitions of the Modular SOS framework are recalled here, but the
reader is referred to other papers for a full introduction. This paper
focusses on illustrating the applicability of Modular SOS, by using it to
give a description of a sublanguage of Concurrent ML (CML); the transition
rules for the purely functional constructs do not have to be reformulated at
all when adding references and/or processes. The paper concludes by comparing
the MSOS description with previous operational descriptions of similar
languages.
The reader is assumed to be familiar with conventional SOS,
with the concepts of functional programming languages such as Standard ML,
and with fundamental notions of concurrency.
- RS-99-56
-
PostScript,
PDF,
DVI.
Peter D. Mosses.
A Modular SOS for Action Notation.
December 1999.
39 pp. Full version of paper appearing in Mosses and Watt, editors,
Second International Workshop on Action Semantics, AS '99
Proceedings, BRICS Notes Series NS-99-3, 1999, pages 131-142.
Abstract: Modularity is an important pragmatic aspect of
semantic descriptions: good modularity is needed to allow the reuse of
existing descriptions when extending or changing the described language. In
denotational semantics, the issue of modularity has received much attention,
and appropriate abstractions have been introduced, so that definitions of
semantic functions may be independent of the details of how computations are
modelled. In structural operational semantics (SOS), however, this issue has
largely been neglected, and SOS descriptions of programming languages
typically exhibit rather poor modularity; the original SOS given for Action
Notation (the notation for the semantic entities used in action semantics)
suffered from the same problem.
This paper recalls a recent proposal,
called MSOS, for obtaining a high degree of modularity in SOS, and presents
an MSOS description of Action Notation. Due to its modularity, the MSOS
description pin-points some complications in the design of Action Notation,
and should facilitate the design of an improved version of the notation. It
also provides a major example of the applicability of the MSOS
framework.
The reader is assumed to be familiar with conventional SOS
and with the basic concepts and constructs of Action Notation. The
description of Action Notation is formulated almost entirely in CASL,
the common algebraic specification language.
- RS-99-55
-
PostScript,
PDF,
DVI.
Peter D. Mosses.
Logical Specification of Operational Semantics.
December 1999.
18 pp. Invited paper. Appears in Flum, Rodríguez-Artalejo and
Mario, editors, European Association for Computer Science Logic: 13th
International Workshop, CSL '99 Proceedings, LNCS 1683, 1999, pages
32-49.
Abstract: Various logic-based frameworks have been proposed for
specifying the operational semantics of programming languages and concurrent
systems, including inference systems in the styles advocated by Plotkin and
by Kahn, Horn logic, equational specifications, reduction systems for
evaluation contexts, rewriting logic, and tile logic.
We consider the
relationship between these frameworks, and assess their respective merits and
drawbacks--especially with regard to the modularity of specifications, which
is a crucial feature for scaling up to practical applications. We also report
on recent work towards the use of the Maude system (which provides an
efficient implementation of rewriting logic) as a meta-tool for operational
semantics.
- RS-99-54
-
PostScript,
PDF,
DVI.
Peter D. Mosses.
Foundations of Modular SOS.
December 1999.
17 pp. Full version of paper appearing in Kutyowski, Pacholski
and Wierzbicki, editors, Mathematical Foundations of Computer Science:
24th International Symposium, MFCS '99 Proceedings, LNCS 1672, 1999, pages
70-80.
Abstract: A novel form of labelled transition system is
proposed, where the labels are the arrows of a category, and adjacent labels
in computations are required to be composable. Such transition systems
provide the foundations for modular SOS descriptions of programming
languages.
Three fundamental ways of transforming label categories,
analogous to monad transformers, are provided, and it is shown that their
applications preserve computations in modular SOS. The approach is
illustrated with fragments taken from a modular SOS for ML concurrency
primitives.
- RS-99-53
-
PostScript,
PDF.
Torsten K. Iversen, Kåre J.
Kristoffersen, Kim G. Larsen, Morten Laursen, Rune G. Madsen, Steffen K.
Mortensen, Paul Pettersson, and Chris B. Thomasen.
Model-Checking Real-Time Control Programs -- Verifying LEGO
Mindstorms Systems Using UPPAAL.
December 1999.
9 pp. Appears in Toetenel, editor, 12th Euromicro Conference on
Real-Time Systems, ECRTS '00 Proceedings, 2000, pages 147-155.
Abstract: In this paper, we present a method for automatic
verification of real-time control programs running on LEGO
R RCXTM bricks using
the verification tool UPPAAL. The control programs, consisting of a
number of tasks running concurrently, are automatically translated into the
timed automata model of UPPAAL. The fixed scheduling algorithm used by
the LEGOR
RCXTM processor is modeled in UPPAAL,
and supply of similar (sufficient) timed automata models for the environment
allows analysis of the overall real-time system using the tools of UPPAAL. To illustrate our techniques we have constructed, modeled and
verified a machine for sorting LEGOR
bricks by color.
- RS-99-52
-
PostScript,
PDF,
DVI.
Jesper G. Henriksen, Madhavan Mukund,
K. Narayan Kumar, and P. S. Thiagarajan.
Towards a Theory of Regular MSC Languages.
December 1999.
43 pp.
Abstract: Message Sequence Charts (MSCs) are an attractive
visual formalism widely used to capture system requirements during the early
design stages in domains such as telecommunication software. It is fruitful
to have mechanisms for specifying and reasoning about collections of MSCs so
that errors can be detected even at the requirements level. We propose,
accordingly, a notion of regularity for collections of MSCs and explore
its basic properties. In particular, we provide an automata-theoretic
characterization of regular MSC languages in terms of finite-state
distributed automata called bounded message-passing automata. These automata
consist of a set of sequential processes that communicate with each other by
sending and receiving messages over bounded FIFO channels. We also provide a
logical characterization in terms of a natural monadic second-order logic
interpreted over MSCs.
A commonly used technique to generate a
collection of MSCs is to use a Message Sequence Graph (MSG). We show that the
class of languages arising from the so-called locally synchronized MSGs
constitute a proper subclass of the languages which are regular in our sense.
In fact, we characterize the locally synchronized MSG languages as the
subclass of regular MSC languages that are finitely generated.
- RS-99-51
-
PostScript,
PDF,
DVI.
Olivier Danvy.
Formalizing Implementation Strategies for First-Class
Continuations.
December 1999.
16 pp. Appears in Smolka, editor, Programming Languages and
Systems: Ninth European Symposium on Programming, ESOP '00 Proceedings,
LNCS 1782, 2000pp. 88-103.
Abstract: We present the first formalization of implementation
strategies for first-class continuations. The formalization hinges on
abstract machines for continuation-passing style (CPS) programs with a
special treatment for the current continuation, accounting for the essence of
first-class continuations. These abstract machines are proven equivalent to a
standard, substitution-based abstract machine. The proof techniques work
uniformly for various representations of continuations. As a byproduct, we
also present a formal proof of the two folklore theorems that one
continuation identifier is enough for second-class continuations and that
second-class continuations are stackable.
A large body of work exists
on implementing continuations, but it is predominantly empirical and
implementation-oriented. In contrast, our formalization abstracts the essence
of first-class continuations and provides a uniform setting for specifying
and formalizing their representation.
- RS-99-50
-
PostScript,
PDF,
DVI.
Gerth Stølting Brodal and Srinivasan
Venkatesh.
Improved Bounds for Dictionary Look-up with One Error.
December 1999.
5 pp. Appears in Information Processing Letters
75(1-2):57-59, 2000.
Abstract: Given a dictionary of binary strings each of
length , we consider the problem of designing a data structure for
that supports -queries; given a binary query string of
length , a -query reports if there exists a string in within
Hamming distance of . We construct a data structure for the case
, that requires space and has query time in a
cell probe model with word size . This generalizes and improves the
previous bounds of Yao and Yao for the problem in the bit probe model.
- RS-99-49
-
PostScript,
PDF,
DVI.
Alexander A. Ageev and Maxim I.
Sviridenko.
An Approximation Algorithm for Hypergraph Max -Cut with Given
Sizes of Parts.
December 1999.
12 pp. Appears in Paterson, editor, Eighteenth Annual European
Symposiumon on Algorithms, ESA '00 Proceedings, LNCS 1879, 2000, pages
32-49.
Abstract: In this paper we demonstrate that the pipage rounding
technique can be applied to the Hypergraph Max -Cut problem with given
sizes of parts. We present a polynomial time approximation algorithm and
prove that its performance guarantee is tight.
- RS-99-48
-
PostScript,
PDF.
Rasmus Pagh.
Faster Deterministic Dictionaries.
December 1999.
14 pp. Appears in Shmoys, editor, The Eleventh Annual
ACM-SIAM Symposium on Discrete Algorithms, SODA '00 Proceedings, 2000,
pages 487-493. Journal version in Journal of Algorithms, 41(1):69-85,
2001, with the title Deterministic Dictionaries.
Abstract: We consider static dictionaries over the universe
on a unit-cost RAM with word size . Construction of a static
dictionary with linear space consumption and constant lookup time can be done
in linear expected time by a randomized algorithm. In contrast, the best
previous deterministic algorithm for constructing such a dictionary with
elements runs in time
for . This paper
narrows the gap between deterministic and randomized algorithms
exponentially, from the factor of to an factor. The
algorithm is weakly non-uniform, i.e. requires certain precomputed constants
dependent on . A by-product of the result is a lookup time vs insertion
time trade-off for dynamic dictionaries, which is optimal for a realistic
class of deterministic hashing schemes.
- RS-99-47
-
PostScript,
PDF,
DVI.
Peter Bro Miltersen and Vinodchandran N.
Variyam.
Derandomizing Arthur-Merlin Games using Hitting Sets.
December 1999.
21 pp. Appears in Beame, editor, 40th Annual Symposium on
Foundations of Computer Science, FOCS '99 Proceedings, 1999, pages 71-80.
Abstract: We prove that AM (and hence Graph
Nonisomorphism) is in NP if for some , some language in
NE coNE requires nondeterministic circuits of size
. This improves recent results of Arvind and Köbler and
of Klivans and Van Melkebeek who proved the same conclusion, but under
stronger hardness assumptions, namely, either the existence of a language in
NE coNE which cannot be approximated by
nondeterministic circuits of size less than
or the existence
of a language in NE coNE which requires oracle
circuits of size
with oracle gates for SAT
(satisfiability).
The previous results on derandomizing AM
were based on pseudorandom generators. In contrast, our approach is based on
a strengthening of Andreev, Clementi and Rolim's hitting set approach to
derandomization. As a spin-off, we show that this approach is strong enough
to give an easy (if the existence of explicit dispersers can be assumed
known) proof of the following implication: For some , if there is
a language in E which requires nondeterministic circuits of size
, then P=BPP. This differs from Impagliazzo
and Wigderson's theorem ``only'' by replacing deterministic circuits with
nondeterministic ones.
- RS-99-46
-
PostScript,
PDF,
DVI.
Peter Bro Miltersen, Vinodchandran N.
Variyam, and Osamu Watanabe.
Super-Polynomial Versus Half-Exponential Circuit Size in the
Exponential Hierarchy.
December 1999.
14 pp. Appears in Asano, Imai, Lee, Nakano and Tokuyama, editors,
Computing and Combinatorics: 5th Annual International Conference,
COCOON '99 Proceedings, LNCS 1627, 1999, pages 210-220.
Abstract: Lower bounds on circuit size were previously
established for functions in ,
,
,
and
. We investigate the general question: Given a
time bound . What is the best circuit size lower bound that can be
shown for the classes
,
using the techniques currently known?
For the classes
,
and
, the answer we get is ``half-exponential''. Informally, a function
is said to be half-exponential if composed with itself is
exponential.
- RS-99-45
-
PostScript,
PDF,
DVI.
Torben Amtoft.
Partial Evaluation for Constraint-Based Program Analyses.
December 1999.
13 pp.
Abstract: We report on a case study in the application of
partial evaluation, initiated by the desire to speed up a constraint-based
algorithm for control-flow analysis. We designed and implemented a dedicated
partial evaluator, able to specialize the analysis wrt. a given constraint
graph and thus remove the interpretive overhead, and measured it with
Feeley's Scheme benchmarks. Even though the gain turned out to be pretty
limited, our investigation yielded valuable feed back in that it provided a
better understanding of the analysis, leading us to (re)invent an incremental
version. We believe this phenomenon to be a quite frequent spin-off from
using partial evaluation, since the removal of interpretive overhead will
make the flow of control more explicit and hence pinpoint the sources of
inefficiency. Finally, we observed that partial evaluation in our case yields
such regular, low-level specialized programs that it begs for runtime code
generation.
- RS-99-44
-
PostScript,
PDF,
DVI.
Uwe Nestmann, Hans Hüttel, Josva
Kleist, and Massimo Merro.
Aliasing Models for Mobile Objects.
December 1999.
ii+46 pp. Appears in Information and Computation 172:1-31,
2002. An extended abstract of this revision, entitled Aliasing Models
for Object Migration, appeared as Distinguished Paper in Amestoy, Berger,
Daydé, Duff, Frayssé, Giraud and Daniel, editors, 5th
International Euro-Par Conference, EURO-PAR '99 Proceedings, LNCS 1685,
1999, pages 1353-1368, which in turn is a revised part of another paper
called Migration = Cloning ; Aliasing that appeared in Cardelli,
editor, Foundations of Object-Oriented Languages: 6th International
Conference, FOOL6 Informal Proceedings, 1999 and as such supersedes the
corresponding part of the earlier BRICS report RS-98-33.
Abstract: In Obliq, a lexically scoped, distributed,
object-oriented programming language, object migration was suggested as the
creation of a copy of an object's state at the target site, followed by
turning the object itself into an alias, also called surrogate, for the
remote copy. We consider the creation of object surrogates as an abstraction
of the above-mentioned style of migration. We introduce Øjeblik, a typed
distribution-free subset of Obliq, and provide four different
configuration-style semantics, which only differ in the respective aliasing model. We show that two of the semantics, one of which matches
Obliq's implementation, render migration unsafe, while our new proposal
allows for safe migration at least for a large class of program contexts. In
addition, we propose a type system that allows a programmer to statically
guarantee that programs belong to that class. Our work suggests a
straightforward repair of Obliq's aliasing model.
- RS-99-43
-
PostScript,
PDF,
DVI.
Uwe Nestmann.
What is a `Good' Encoding of Guarded Choice?
December 1999.
ii+34 pp. Appears in Information and Computation, 156:287-319,
2000. This revised report supersedes the earlier BRICS report RS-97-45.
Abstract: We study two encodings of the asynchronous
-calculus with input-guarded choice into its choice-free
fragment. One encoding is divergence-free, but refines the atomic commitment
of choice into gradual commitment. The other preserves atomicity, but
introduces divergence. The divergent encoding is fully abstract with respect
to weak bisimulation, but the more natural divergence-free encoding is not.
Instead, we show that it is fully abstract with respect to coupled
simulation, a slightly coarser--but still coinductively
defined--equivalence that does not enforce bisimilarity of internal
branching decisions. The correctness proofs for the two choice encodings
introduce a novel proof technique exploiting the properties of explicit decodings from translations to source terms.
- RS-99-42
-
PostScript,
PDF,
DVI.
Uwe Nestmann and Benjamin C. Pierce.
Decoding Choice Encodings.
December 1999.
ii+62 pp. Appears in Journal of Information and Computation,
163:1-59, 2000. An extended abstract appeared in Montanari and Sassone,
editors, Concurrency Theory: 7th International Conference, CONCUR '96
Proceedings, LNCS 1119, 1996, pages 179-194.
Abstract: We study two encodings of the asynchronous
-calculus with input-guarded choice into its choice-free
fragment. One encoding is divergence-free, but refines the atomic commitment
of choice into gradual commitment. The other preserves atomicity, but
introduces divergence. The divergent encoding is fully abstract with respect
to weak bisimulation, but the more natural divergence-free encoding is not.
Instead, we show that it is fully abstract with respect to coupled
simulation, a slightly coarser--but still coinductively
defined--equivalence that does not enforce bisimilarity of internal
branching decisions. The correctness proofs for the two choice encodings
introduce a novel proof technique exploiting the properties of explicit decodings from translations to source terms.
- RS-99-41
-
PostScript,
PDF.
Nicky O. Bodentien, Jacob Vestergaard,
Jakob Friis, Kåre J. Kristoffersen, and Kim G. Larsen.
Verification of State/Event Systems by Quotienting.
December 1999.
17 pp. Presented at Nordic Workshop in Programming Theory,
Uppsala, Sweden, October 6-8, 1999.
Abstract: A rather new approach towards compositional
verification of concurrent systems is the quotient technique, where
components are gradually removed from the concurrent system while
transforming the specification accordingly. When the intermediate
specifications can be kept small, the state explosion problem is avoided and
there are already promising experimental results for systems with an
interleaving semantics, including real-time systems. This paper extends the
quotienting approach to deal with a synchronous framework in the shape of
state/event systems with acyclic dependencies. A state/event system is a
concurrent system with a set of interdependent components operating
synchronously according to stimuli provided by an environment. We introduce
Left Restricting state/event systems as a key notion for state/event systems
with acyclic dependencies. Two families of modal logics, and
, specifically designed for expressing reachability properties
of dependency closed and not dependency closed subsystems are introduced. Two
quotient constructions for moving components from dependency closed and not
dependency closed subsystems into the specification are presented and their
correctness are justified in a formal proof. Furthermore, heuristics for
minimizing formulae are proposed and the techniques are demonstrated on a
Duplo train example.
- RS-99-40
-
PostScript,
PDF,
DVI.
Bernd Grobauer and Zhe Yang.
The Second Futamura Projection for Type-Directed Partial
Evaluation.
November 1999.
44 pp. Extended version of an article appearing in Lawall, editor,
ACM SIGPLAN Workshop on Partial Evaluation and Semantics-Based Program
Manipulation, PEPM '00 Proceedings, 2000, pages 22-32. A revised and
extended version appears in Higher-Order and Symbolic Computation
14(2-3):173-219 (2001) and Also available as BRICS Report RS-00-44.
Abstract: A generating extension of a program specializes it
with respect to some specified part of the input. A generating extension of a
program can be formed trivially by applying a partial evaluator to the
program; the second Futamura projection describes the automatic generation of
non-trivial generating extensions by applying a partial evaluator to itself
with respect to the programs. We derive an ML implementation of the second
Futamura projection for Type-Directed Partial Evaluation (TDPE). Due to the
differences between `traditional', syntax-directed partial evaluation and
TDPE, this derivation involves several conceptual and technical steps. These
include a suitable formulation of the second Futamura projection and
techniques for making TDPE amenable to self-application. In the context of
the second Futamura projection, we also compare and relate TDPE with
conventional offline partial evaluation. We demonstrate our technique with
several examples, including compiler generation for Tiny, a prototypical
imperative language.
- RS-99-39
-
PostScript,
PDF,
DVI.
Romeo Rizzi.
On the Steiner Tree -Approximation for
Quasi-Bipartite Graphs.
November 1999.
6 pp.
Abstract: Let be an undirected simple graph and
be a non-negative weighting of the edges of .
Assume is partitioned as . A Steiner tree is any tree
of such that every node in is incident with at least one edge of .
The metric Steiner tree problem asks for a Steiner tree of minimum
weight, given that is a metric. When is a stable set of , then
is called quasi-bipartite. In a SODA '99 paper, Rajagopalan
and Vazirani introduced the notion of quasi-bipartiteness and gave a
approximation algorithm for the metric Steiner tree
problem, when is quasi-bipartite. In this paper, we simplify and
strengthen the result of Rajagopalan and Vazirani. We also show how classical
bit scaling techniques can be adapted to the design of approximation
algorithms.
- RS-99-38
-
PostScript,
PDF.
Romeo Rizzi.
Linear Time Recognition of -Indifferent Graphs.
November 1999.
11 pp. Appears in Discrete Mathematics, 239(1-3):161-169,
2001.
Abstract: A simple graph is -indifferent if it admits
a total order on its nodes such that every chordless path with nodes
and edges has or . -indifferent
graphs generalize indifferent graphs and are perfectly orderable. Recently,
Hoàng, Maffray and Noy gave a characterization of -indifferent
graphs in terms of forbidden induced subgraphs. We clarify their proof and
describe a linear time algorithm to recognize -indifferent graphs. When
the input is a -indifferent graph, then the algorithm computes an order
as above.
- RS-99-37
-
PostScript,
PDF,
DVI.
Tibor Jordán.
Constrained Edge-Splitting Problems.
November 1999.
23 pp. A preliminary version with the title Edge-Splitting
Problems with Demands appeared in Cornujols, Burkard and Wöginger,
editors, Integer Programming and Combinatorial Optimization: 7th
International Conference, IPCO '99 Proceedings, LNCS 1610, 1999, pages
273-288.
Abstract: Splitting off two edges in a graph means
deleting and adding a new edge . Let be
-edge-connected in () and let be even. Lovász
proved that the edges incident to can be split off in pairs in a such a
way that the resulting graph on vertex set is -edge-connected. In this
paper we investigate the existence of such complete splitting sequences when
the set of split edges has to meet additional requirements. We prove
structural properties of the set of those pairs of neighbours of
for which splitting off destroys -edge-connectivity. This leads to
a new method for solving problems of this type.
By applying this
method we obtain a short proof for a recent result of Nagamochi and Eades on
planarity-preserving complete splitting sequences and prove the following new
results: let and be two graphs on the same set of vertices and
suppose that their sets of edges incident to coincide. Let () be
-edge-connected (-edge-connected, respectively) in and let
be even. Then there exists a pair which can be split off in both
graphs preserving -edge-connectivity (-edge-connectivity, resp.) in
, provided . If and are both even then such a pair
always exists. Using these edge-splitting results and the polymatroid
intersection theorem we give a polynomial algorithm for the problem of
simultaneously augmenting the edge-connectivity of two graphs by adding a
(common) set of new edges of (almost) minimum size.
- RS-99-36
-
PostScript,
PDF,
DVI.
Gian Luca Cattani and Glynn Winskel.
Presheaf Models for CCS-like Languages.
November 1999.
ii+46 pp.
Abstract: The aim of this paper is to harness the mathematical
machinery around presheaves for the purposes of process calculi. Joyal,
Nielsen and Winskel proposed a general definition of bisimulation from open
maps. Here we show that open-map bisimulations within a range of presheaf
models are congruences for a general process language, in which CCS and
related languages are easily encoded. The results are then transferred to
traditional models for processes. By first establishing the congruence
results for presheaf models, abstract, general proofs of congruence
properties can be provided and the awkwardness caused through traditional
models not always possessing the cartesian liftings, used in the break-down
of process operations, are side-stepped. The abstract results are applied to
show that hereditary history-preserving bisimulation is a congruence for
CCS-like languages to which is added a refinement operator on event
structures as proposed by van Glabbeek and Goltz.
- RS-99-35
-
PostScript,
PDF,
DVI.
Tibor Jordán and Zoltán Szigeti.
Detachments Preserving Local Edge-Connectivity of Graphs.
November 1999.
16 pp.
Abstract: Let be a graph and let
be a set of positive integers with . An
-detachment splits into a set of independent vertices
with , . Given a requirement
function on pairs of vertices of , an -detachment is
called -admissible if the detached graph satisfies
for every pair . Here
denotes the local edge-connectivity between and in graph .
We prove that an -admissible -detachment exists if and only if (a)
, and (b)
hold for every .
The
special case of this characterization when
for each
pair in was conjectured by B. Fleiner. Our result is a common
generalization of a theorem of W. Mader on edge splittings preserving local
edge-connectivity and a result of B. Fleiner on detachments preserving global
edge-connectivity. Other corollaries include previous results of
L. Lovász and C. J. St. A. Nash-Williams on edge splittings and
detachments, respectively. As a new application, we extend a theorem of
A. Frank on local edge-connectivity augmentation to the case when stars of
given degrees are added.
- RS-99-34
-
PostScript,
PDF.
Flemming Friche Rodler.
Wavelet Based 3D Compression for Very Large Volume Data
Supporting Fast Random Access.
October 1999.
36 pp. Extended version of paper appearing in 7th Pacific
Conference on Computer Graphics and Applications, PG '99 Proceedings,
1999, pages 108-117.
Abstract: We propose a wavelet based method for compressing
volumetric data with little loss in quality. The method supports fast
random access to individual voxels within the compressed volume. Such a
method is important since storing and visualising very large volumes impose
heavy demands on internal memory and external storage facilities making it
accessible only to users with huge and expensive computers. This problem is
not likely to become less in the future. Experimental results on the CT
dataset of the Visible Human have shown that our method provides very high
compression rates with fairly fast random access.
- RS-99-33
-
PostScript,
PDF,
DVI.
Luca Aceto, Zoltán Ésik, and Anna
Ingólfsdóttir.
The Max-Plus Algebra of the Natural Numbers has no Finite
Equational Basis.
October 1999.
25 pp. A revised version of this paper appears Theoretical
Computer Science 293(1):169-188, 17 January 2003.
Abstract: This paper shows that the collection of identities
which hold in the algebra N of the natural numbers with constant zero,
and binary operations of sum and maximum is not finitely based. Moreover, it
is proven that, for every , the equations in at most variables that
hold in N do not form an equational basis. As a stepping stone in the
proof of these facts, several results of independent interest are obtained.
In particular, explicit descriptions of the free algebras in the variety
generated by N are offered. Such descriptions are based upon a
geometric characterisation of the equations that hold in N, which also
yields that the equational theory of N is decidable in exponential
time.
- RS-99-32
-
PostScript,
PDF.
Luca Aceto and François Laroussinie.
Is your Model Checker on Time? -- On the Complexity of Model
Checking for Timed Modal Logics.
October 1999.
11 pp. Appears in Kutyowski, Pacholski and Wierzbicki, editors,
Mathematical Foundations of Computer Science: 24th International
Symposium, MFCS '99 Proceedings, LNCS 1672, 1999, pages 125-136.
Abstract: This paper studies the structural complexity of model
checking for (variations on) the specification formalisms used in the tools
CMC and UPPAAL, and fragments of a timed alternation-free
-calculus. For each of the logics we study, we characterize the
computational complexity of model checking, as well as its specification and
program complexity, using timed automata as our system model.
- RS-99-31
-
PostScript,
PDF,
DVI.
Ulrich Kohlenbach.
Foundational and Mathematical Uses of Higher Types.
September 1999.
34 pp. A revised version appears in W. Sieg et al. (eds.), Reflections on the Foundations of Mathematics. Essays in Honor of Solomon
Feferman, Lecture Notes in Logic 15, A. K. Peters, Ltd., pp. 92-116, 2002.
Abstract: In this paper we develop mathematically strong
systems of analysis in higher types which, nevertheless, are
proof-theoretically weak, i.e. conservative over elementary resp. primitive
recursive arithmetic. These systems are based on non-collapsing hierarchies
-WKL-WKL of principles which generalize (and for
coincide with) the so-called `weak' König's lemma WKL (which has
been studied extensively in the context of second order arithmetic) to
logically more complex tree predicates. Whereas the second order context used
in the program of reverse mathematics requires an encoding of higher
analytical concepts like continuous functions
between
Polish spaces , the more flexible language of our systems allows to
treat such objects directly. This is of relevance as the encoding of used
in reverse mathematics tacitly yields a constructively enriched notion of
continuous functions which e.g. for
can be seen (in our higher order context) to be equivalent to the
existence of a continuous modulus of pointwise continuity. For the direct
representation of the existence of such a modulus is independent even of
full arithmetic in all finite types E-PA plus quantifier-free
choice, as we show using a priority construction due to L. Harrington. The
usual WKL-based proofs of properties of given in reverse mathematics make
use of the enrichment provided by codes of , and WKL does not seem to be
sufficient to obtain similar results for the direct representation of in
our setting. However, it turns out that -WKL is sufficient.
Our conservation results for -WKL-WKL are
proved via a new elimination result for a strong non-standard principle of
uniform -boundedness which we introduced in 1996 and which
implies the WKL-extensions studied in this paper.
- RS-99-30
-
PostScript,
PDF,
DVI.
Luca Aceto, Willem Jan Fokkink, and Chris
Verhoef.
Structural Operational Semantics.
September 1999.
128 pp. Appears in Bergstra, Ponse and Smolka, editors, Handbook
of Process Algebra, 2001, pages 197-292.
Abstract: This paper offers an overview of the current state of
the development of the theory of Structural Operational Semantics (SOS), with
emphasis on its applications to process algebra. It focuses on five aspects
of SOS, viz. the meaning of Transition System Specifications (TSSs) with
predicates and negative premises, conservative extension results for TSSs,
congruence formats, many-sorted higher-order extensions and connections with
denotational semantics.
- RS-99-29
-
PostScript,
PDF,
DVI.
Søren Riis.
A Complexity Gap for Tree-Resolution.
September 1999.
33 pp.
Abstract: It is shown that any sequence of tautologies
which expresses the validity of a fixed combinatorial principle either is
``easy'' i.e. has polynomial size tree-resolution proofs or is ``difficult''
i.e requires exponential size tree-resolution proofs. It is shown that the
class of tautologies which are hard (for tree-resolution) is identical to the
class of tautologies which are based on combinatorial principles which are
violated for infinite sets. Actually it is shown that the gap-phenomena is
valid for tautologies based on infinite mathematical theories (i.e. not just
based on a single proposition).
We clarify the link between
translating combinatorial principles (or more general statements from
predicate logic) and the recent idea of using the symmetrical group to
generate problems of propositional logic.
Finally, we show that is
undecidable whether a sequence (of the kind we consider) has
polynomial size tree-resolution proofs or requires exponential size
tree-resolution proofs. Also we show that the degree of the polynomial in the
polynomial size (in case it exists) is non-recursive, but semi-decidable.
- RS-99-28
-
PostScript,
PDF,
DVI.
Thomas Troels Hildebrandt.
A Fully Abstract Presheaf Semantics of SCCS with Finite
Delay.
September 1999.
37 pp. Appears in Hofmann, Rosolini and Pavlovic, editors, Category Theory and Computer Science: 8th International Conference,
CTCS '99 Proceedings, ENTCS 29, 1999, 25 pp.
Abstract: We present a presheaf model for the observation of
infinite as well as finite computations. We apply it to give a denotational semantics of SCCS with finite delay, in which the meanings of
recursion are given by final coalgebras and meanings of finite delay by
initial algebras of the process equations for delay. This can be viewed
as a first step in representing fairness in presheaf semantics. We give
a concrete representation of the presheaf model as a category of generalised synchronisation trees and show that it is coreflective in a
category of generalised transition systems, which are a special case of
the general transition systems of Hennessy and Stirling. The open map
bisimulation is shown to coincide with the extended bisimulation of
Hennessy and Stirling. Finally we formulate Milners operational semantics of
SCCS with finite delay in terms of generalised transition systems and prove
that the presheaf semantics is fully abstract with respect to extended
bisimulation.
- RS-99-27
-
PostScript,
PDF,
DVI.
Olivier Danvy and Ulrik P. Schultz.
Lambda-Dropping: Transforming Recursive Equations into Programs
with Block Structure.
September 1999.
57 pp. Appears in Theoretical Computer Science,
248(1-2):243-287, November 2000. This revised report supersedes the earlier
BRICS report RS-98-54.
Abstract: Lambda-lifting a block-structured program transforms
it into a set of recursive equations. We present the symmetric
transformation: lambda-dropping. Lambda-dropping a set of recursive equations
restores block structure and lexical scope.
For lack of block
structure and lexical scope, recursive equations must carry around all the
parameters that any of their callees might possibly need. Both lambda-lifting
and lambda-dropping thus require one to compute Def/Use paths:
- for lambda-lifting: each of the functions occurring in
the path of a free variable is passed this variable as a parameter;
- for
lambda-dropping: parameters which are used in the same scope as their
definition do not need to be passed along in their path.
A
program whose blocks have no free variables is scope-insensitive. Its blocks
are then free to float (for lambda-lifting) or to sink (for lambda-dropping)
along the vertices of the scope tree.
Our primary application is
partial evaluation. Indeed, many partial evaluators for procedural programs
operate on recursive equations. To this end, they lambda-lift source programs
in a pre-processing phase. But often, partial evaluators [automatically]
produce residual recursive equations with dozens of parameters, which most
compilers do not handle efficiently. We solve this critical problem by
lambda-dropping residual programs in a post-processing phase, which
significantly improves both their compile time and their run time.
Lambda-lifting has been presented as an intermediate transformation in
compilers for functional languages. We study lambda-lifting and
lambda-dropping per se, though lambda-dropping also has a use as an
intermediate transformation in a compiler: we noticed that lambda-dropping
a program corresponds to transforming it into the functional representation
of its optimal SSA form. This observation actually led us to substantially
improve our PEPM '97 presentation of lambda-dropping.
- RS-99-26
-
PostScript,
PDF,
DVI.
Jesper G. Henriksen.
An Expressive Extension of TLC.
September 1999.
20 pp. Appears in International Journal of Foundations of
Computer Science, 13(3):341-360, 2002. Conference version in Thiagarajan
and Yap, editors, Fifth Asian Computing Science Conference, ASIAN '99
Proceedings, LNCS 1742, 1999, pages 126-138.
Abstract: A temporal logic of causality (TLC) was introduced by
Alur, Penczek and Peled. It is basically a linear time temporal logic
interpreted over Mazurkiewicz traces which allows quantification over causal
chains. Through this device one can directly formulate causality properties
of distributed systems. In this paper we consider an extension of TLC by
strengthening the chain quantification operators. We show that our logic
TLC adds to the expressive power of TLC. We do so by defining an
Ehrenfeucht-Fraïssé game to capture the expressive power of TLC. We
then exhibit a property and by means of this game prove that the chosen
property is not definable in TLC. We then show that the same property is
definable in TLC. We prove in fact the stronger result that TLC is
expressively stronger than TLC exactly when the dependency relation
associated with the underlying trace alphabet is not transitive.
- RS-99-25
-
PostScript,
PDF,
DVI.
Gerth Stølting Brodal and Christian
N. S. Pedersen.
Finding Maximal Quasiperiodicities in Strings.
September 1999.
20 pp. Appears in Giancarlo and Sankoff, editors, Combinatorial
Pattern Matching: 11th Annual Symposium, CPM '00 Proceedings, LNCS 1848,
2000, pages 397-411.
Abstract: Apostolico and Ehrenfeucht defined the notion of a
maximal quasiperiodic substring and gave an algorithm that finds all maximal
quasiperiodic substrings in a string of length in time .
In this paper we give an algorithm that finds all maximal quasiperiodic
substrings in a string of length in time and space .
Our algorithm uses the suffix tree as the fundamental data structure combined
with efficient methods for merging and performing multiple searches in search
trees. Besides finding all maximal quasiperiodic substrings, our algorithm
also marks the nodes in the suffix tree that have a superprimitive
path-label.
- RS-99-24
-
PostScript,
PDF,
DVI.
Luca Aceto, Willem Jan Fokkink, and Chris
Verhoef.
Conservative Extension in Structural Operational Semantics.
September 1999.
23 pp. Appears in the Bulletin of the European Association for
Theoretical Computer Science, 70:110-132, 1999.
Abstract: Over and over again, process calculi such as CCS,
CSP, and ACP have been extended with new features, and the Transition System
Specifications (TSSs) that provide the operational semantics for these
process algebras were extended with transition rules to describe these
features. A question that arises naturally is whether or not the original and
the extended TSS induce the same transitions in the original domain. Usually
it is desirable that an extension is operationally conservative, meaning that
the provable transitions for an original term are the same both in the
original and in the extended TSS. This paper contains an exposition of
existing conservative extension formats for Structural Operational Semantics,
and their applications with respect to term rewriting systems and
completeness of axiomatizations.
- RS-99-23
-
PostScript,
PDF,
DVI.
Olivier Danvy, Belmina Dzafic, and Frank
Pfenning.
On proving syntactic properties of CPS programs.
August 1999.
14 pp. Appears in Gordon and Pitts, editors, 3rd Workshop on
Higher Order Operational Techniques in Semantics, HOOTS '99 Proceedings,
ENTCS 26, 1999, pages 19-31.
Abstract: Higher-order program transformations raise new
challenges for proving properties of their output, since they resist
traditional, first-order proof techniques. In this work, we consider (1) the
``one-pass'' continuation-passing style (CPS) transformation, which is
second-order, and (2) the occurrences of parameters of continuations in its
output. To this end, we specify the one-pass CPS transformation relationally
and we use the proof technique of logical relations.
- RS-99-22
-
PostScript,
PDF,
DVI.
Luca Aceto, Zoltán Ésik, and Anna
Ingólfsdóttir.
On the Two-Variable Fragment of the Equational Theory of the
Max-Sum Algebra of the Natural Numbers.
August 1999.
22 pp. Appears in Reichel and Tison, editors, 17th Annual
Symposium on Theoretical Aspects of Computer Science Proceedings,
STACS '00 Proceedings, LNCS 1770, 2000, pages 267-278.
Abstract: This paper shows that the collection of identities in
two variables which hold in the algebra N of the natural numbers with
constant zero, and binary operations of sum and maximum does not have a
finite equational axiomatization. This gives an alternative proof of the
non-existence of a finite basis for N--a result previously obtained by
the authors. As an application of the main theorem, it is shown that the
language of Basic Process Algebra (over a singleton set of actions), with or
without the empty process, has no finite equational axiomatization modulo
trace equivalence.
- RS-99-21
-
PostScript,
PDF,
DVI.
Olivier Danvy.
An Extensional Characterization of Lambda-Lifting and
Lambda-Dropping.
August 1999.
13 pp. Extended version of an article appearing in Middeldorp and
Sato, editors, Fourth Fuji International Symposium on Functional and
Logic Programming, FLOPS '99 Proceedings, LNCS 1722, 1999, pages 241-250.
This report supersedes the earlier BRICS report RS-98-2.
Abstract: Lambda-lifting and lambda-dropping respectively
transform a block-structured functional program into recursive equations and
vice versa. Lambda-lifting was developed in the early 80's, whereas
lambda-dropping is more recent. Both are split into an analysis and a
transformation. Published work, however, has only concentrated on the
analysis parts. We focus here on the transformation parts and more precisely
on their correctness, which appears never to have been proven. To this end,
we define extensional versions of lambda-lifting and lambda-dropping and
establish their correctness with respect to a least fixed-point semantics.
- RS-99-20
-
PostScript,
PDF,
DVI.
Ulrich Kohlenbach.
A Note on Spector's Quantifier-Free Rule of Extensionality.
August 1999.
5 pp. Appears in Archive for Mathematical Logic, 40:89-92,
2001.
Abstract: In this note we show that the so-called weakly
extensional arithmetic in all finite types, which is based on a
quantifier-free rule of extensionality due to C. Spector and which is of
significance in the context of Gödel's functional interpretation, does
not satisfy the deduction theorem for additional axioms. This holds already
for -axioms. Previously, only the failure of the stronger deduction
theorem for deductions from (possibly open) assumptions (with parameters kept
fixed) was known.
- RS-99-19
-
PostScript,
PDF,
DVI.
Marcin Jurdzinski and Mogens Nielsen.
Hereditary History Preserving Bisimilarity is Undecidable.
June 1999.
18 pp. An extended abstract appears in Reichel and Tison, editors,
17th Annual Symposium on Theoretical Aspects of Computer Science
Proceedings, STACS '00 Proceedings, LNCS 1770, 2000, pages 358-369.
Abstract: We show undecidability of hereditary history
preserving bisimilarity for finite asynchronous transition systems by a
reduction from the halting problem of deterministic 2-counter machines. To
make the proof more transparent we introduce an intermediate problem of
checking domino bisimilarity for origin constrained tiling systems. First we
reduce the halting problem of deterministic 2-counter machines to origin
constrained domino bisimilarity. Then we show how to model domino
bisimulations as hereditary history preserving bisimulations for finite
asynchronous transitions systems. We also argue that the undecidability
result holds for finite 1-safe Petri nets, which can be seen as a proper
subclass of finite asynchronous transition systems.
- RS-99-18
-
PostScript,
PDF,
DVI.
M. Oliver Möller and Harald Rueß.
Solving Bit-Vector Equations of Fixed and Non-Fixed Size.
June 1999.
18 pp. Revised version of an article appearing under the title Solving Bit-Vector Equations in Gopalakrishnan and Windley, editors, Formal Methods in Computer-Aided Design: Second International Conference,
FMCAD '98 Proceedings, LNCS 1522, 1998, pages 36-48.
Abstract: This report is concerned with solving equations on
fixed and non-fixed size bit-vector terms. We define an equational
transformation system for solving equations on terms where all sizes of
bit-vectors and extraction positions are known. This transformation system
suggests a generalization for dealing with bit-vectors of unknown size and
unknown extraction positions. Both solvers adhere to the principle of
splitting bit-vectors only on demand, thereby making them quite effective in
practice.
- RS-99-17
-
PostScript,
PDF,
DVI.
Andrzej Filinski.
A Semantic Account of Type-Directed Partial Evaluation.
June 1999.
23 pp. Appears in Nadathur, editor, International Conference on
Principles and Practice of Declarative Programming, PPDP '99 Proceedings,
LNCS 1702, 1999, pages 378-395.
Abstract: We formally characterize partial evaluation of
functional programs as a normalization problem in an equational theory, and
derive a type-based normalization-by-evaluation algorithm for computing
normal forms in this setting. We then establish the correctness of this
algorithm using a semantic argument based on Kripke logical relations. For
simplicity, the results are stated for a non-strict, purely functional
language; but the methods are directly applicable to stating and proving
correctness of type-directed partial evaluation in ML-like languages as well.
- RS-99-16
-
PostScript,
PDF.
Rune B. Lyngsø and Christian N. S.
Pedersen.
Protein Folding in the 2D HP Model.
June 1999.
15 pp. Appears in Proceedings of the 1st Journées Ouvertes:
Biologie, Informatique et Mathématiques (JOBIM 2000).
Abstract: We study folding algorithms in the two dimensional
Hydrophobic-Hydrophilic model (2D HP model) for protein structure formation.
We consider three generalizations of the best known approximation algorithm.
We show that two of the generalizations do not improve the worst case
approximation ratio. The third generalization seems to be better, and the
analysis of its approximation ratio leads to an interesting combinatorial
problem.
- RS-99-15
-
PostScript,
PDF.
Rune B. Lyngsø, Michael Zuker, and
Christian N. S. Pedersen.
An Improved Algorithm for RNA Secondary Structure Prediction.
May 1999.
24 pp. An alloy of two articles appearing in Istrail, Pevzner and
Waterman, editors, Third Annual International Conference on
Computational Molecular Biology, RECOMB '99 Proceedings, 1999, pages
260-267, and Bioinformatics, 15(6):440-445, June 1999.
Abstract: Though not as abundant in known biological processes
as proteins, RNA molecules serve as more than mere intermediaries between DNA
and proteins, e.g. as catalytic molecules. Furthermore, RNA secondary
structure prediction based on free energy rules for stacking and loop
formation remains one of the few major breakthroughs in the field of
structure prediction. We present a new method to evaluate all possible
internal loops of size at most in an RNA sequence, , in time
; this is an improvement from the previously used method that uses
time . For unlimited loop size this improves the overall
complexity of evaluating RNA secondary structures from to
and the method applies equally well to finding the optimal
structure and calculating the equilibrium partition function. We use our
method to examine the soundness of setting , a commonly used
heuristic.
- RS-99-14
-
PostScript,
PDF,
DVI.
Marcelo P. Fiore, Gian Luca Cattani, and
Glynn Winskel.
Weak Bisimulation and Open Maps.
May 1999.
22 pp. Appears in Longo, editor, Fourteenth Annual IEEE
Symposium on Logic in Computer Science, LICS '99 Proceedings, 1999, pages
67-76.
Abstract: A general treatment of weak bisimulation and
observation congruence on presheaf models is presented. It extends previous
work on bisimulation from open maps and answers a fundamental question there.
The consequences of the general theory are derived for two key models for
concurrency, the interleaving model of synchronisation trees and the
independence model of labelled event structures. Starting with a ``hiding''
functor from a category of paths to observable paths, it is shown how to
derive a monad on the category of presheaves over the category of paths. The
Kleisli category of the monad is shown to be equivalent to that of presheaves
with weak morphisms, which roughly are only required to preserve observable
paths. The monad is defined through an intermediary view of processes as
bundles in Cat. This view, which seems important in its own right,
leads directly to a hiding operation on processes; when the hiding operation
is translated back to presheaves through an adjunction it yields the monad.
The monad is shown to automatically preserve open-map bisimulation,
generalising the expectation that strongly bisimilar processes should be
weakly bisimilar. However, two alternative general ways to define weak
bisimulation and observation congruence (in the Kleisli category itself or in
the presheaf category after application of the monad) do not coincide in
general. However a necessary and sufficient condition for their equivalence
is proved; from this it is sufficient to show a fill-in condition applies to
category of paths with weak morphisms. The fill-in condition is shown to hold
for the two traditional models, synchronisation trees and event structures.
- RS-99-13
-
PostScript,
PDF.
Rasmus Pagh.
Hash and Displace: Efficient Evaluation of Minimal Perfect Hash
Functions.
May 1999.
11 pp. A short version appears in Dehne, Gupta, Sack and Tamassia,
editors, Algorithms and Data Structures: 6th International Workshop,
WADS '99 Proceedings, LNCS 1663, 1999, pages 49-54.
Abstract: A new way of constructing (minimal) perfect hash
functions is described. The technique considerably reduces the overhead
associated with resolving buckets in two-level hashing schemes. Evaluating a
hash function requires just one multiplication and a few additions apart from
primitive bit operations. The number of accesses to memory is two, one of
which is to a fixed location. This improves the probe performance of previous
minimal perfect hashing schemes, and is shown to be optimal. The hash
function description (``program'') for a set of size occupies
words, and can be constructed in expected time.
- RS-99-12
-
PostScript,
PDF.
Gerth Stølting Brodal, Rune B.
Lyngsø, Christian N. S. Pedersen, and Jens Stoye.
Finding Maximal Pairs with Bounded Gap.
April 1999.
31 pp. Appears in Crochemore and Paterson, editors, Combinatorial Pattern Matching: 10th Annual Symposium, CPM '99 Proceedings,
LNCS 1645, 1999, pages 134-149. Journal version in Journal of Discrete
Algorithms, 1:77-104, 2000.
Abstract: A pair in a string is the occurrence of the same
substring twice. A pair is maximal if the two occurrences of the substring
cannot be extended to the left and right without making them different. The
gap of a pair is the number of characters between the two occurrences of the
substring. In this paper we present methods for finding all maximal pairs
under various constraints on the gap. In a string of length we can find
all maximal pairs with gap in an upper and lower bounded interval in time
where is the number of reported pairs. If the upper
bound is removed the time reduces to . Since a tandem repeat is a
pair where the gap is zero, our methods can be seen as a generalization of
finding tandem repeats. The running time of our methods equals the running
time of well known methods for finding tandem repeats.
- RS-99-11
-
PostScript,
PDF,
DVI.
Ulrich Kohlenbach.
On the Uniform Weak König's Lemma.
March 1999.
13 pp. An extended version appears in Annals of Pure and Applied
Logic (special issue in honor of A. S. Troelstra, 2001) vol. 114, pp.
103-116 (2002).
Abstract: The so-called weak König's lemma WKL asserts the
existence of an infinite path in any infinite binary tree (given by a
representing function ). Based on this principle one can formulate
subsystems of higher-order arithmetic which allow to carry out very
substantial parts of classical mathematics but are -conservative
over primitive recursive arithmetic PRA (and even weaker fragments of
arithmetic). In 1992 we established such conservation results relative to
finite type extensions PRA of PRA (together with a quantifier-free
axiom of choice schema). In this setting one can consider also a uniform
version UWKL of WKL which asserts the existence of a functional which
selects uniformly in a given infinite binary tree an infinite path of that tree. This uniform version of WKL is of interest in the context of
explicit mathematics as developed by S. Feferman. The elimination process
from 1992 actually can be used to eliminate even this uniform weak
König's lemma provided that PRA only has a quantifier-free
rule of extensionality QF-ER instead of the full axioms of
extensionality for all finite types. In this paper we show that in the
presence of , UWKL is much stronger than WKL: whereas WKL remains to be
-conservative over PRA, PRA
UWKL contains (and is
conservative over) full Peano arithmetic PA.
- RS-99-10
-
PostScript,
PDF,
DVI.
Jon G. Riecke and Anders B. Sandholm.
A Relational Account of Call-by-Value Sequentiality.
March 1999.
51 pp. To appear in Information and Computation, LICS '97
Special Issue. Extended version of an article appearing in Twelfth
Annual IEEE Symposium on Logic in Computer Science, LICS '97
Proceedings, 1997, pages 258-267. This report supersedes the earlier BRICS
report RS-97-41.
Abstract: We construct a model for FPC, a purely functional,
sequential, call-by-value language. The model is built from partial
continuous functions, in the style of Plotkin, further constrained to be
uniform with respect to a class of logical relations. We prove that the model
is fully abstract.
- RS-99-9
-
PostScript,
PDF.
Claus Brabrand, Anders Møller,
Anders B. Sandholm, and Michael I. Schwartzbach.
A Runtime System for Interactive Web Services.
March 1999.
21 pp. Appears in endelzon, editor, Eighth International World
Wide Web Conference, WWW8 Proceedings, 1999, pages 313-323 and Computer Networks, 31:1391-1401, 1999.
Abstract: Interactive web services are increasingly replacing
traditional static web pages. Producing web services seems to require a
tremendous amount of laborious low-level coding due to the primitive nature
of CGI programming. We present ideas for an improved runtime system for
interactive web services built on top of CGI running on virtually every
combination of browser and HTTP/CGI server. The runtime system has been
implemented and used extensively in bigwig, a tool for producing
interactive web services.
- RS-99-8
-
PostScript,
PDF.
Klaus Havelund, Kim G. Larsen, and Arne
Skou.
Formal Verification of a Power Controller Using the Real-Time
Model Checker UPPAAL.
March 1999.
23 pp. Appears in Katoen, editor, 5th International AMAST
Workshop on Real-Time and Probabilistic Systems, ARTS '99 Proceedings,
LNCS 1601, 1999, pages 277-298.
Abstract: A real-time system for power-down control in
audio/video components is modeled and verified using the real-time model
checker UPPAAL. The system is supposed to reside in an audio/video
component and control (read from and write to) links to neighbor audio/video
components such as TV, VCR and remote-control. In particular, the system is
responsible for the powering up and down of the component in between the
arrival of data, and in order to do so in a safe way without loss of data, it
is essential that no link interrupts are lost. Hence, a component system is a
multitasking system with hard real-time requirements, and we present
techniques for modeling time consumption in such a multitasked, prioritized
system. The work has been carried out in a collaboration between Aalborg
University and the audio/video company B&O. By modeling the system, 3 design
errors were identified and corrected, and the following verification
confirmed the validity of the design but also revealed the necessity for an
upper limit of the interrupt frequency. The resulting design has been
implemented and it is going to be incorporated as part of a new product line.
- RS-99-7
-
PostScript,
PDF,
DVI.
Glynn Winskel.
Event Structures as Presheaves--Two Representation Theorems.
March 1999.
16 pp. Appears in Baeten and Mauw, editors, Concurrency Theory:
10th International Conference, CONCUR '99 Proceedings, LNCS 1664, 1999,
pages 541-556.
Abstract: The category of event structures is known to embed
fully and faithfully in the category of presheaves over pomsets. Here a
characterisation of the presheaves represented by event structures is
presented. The proof goes via a characterisation of the presheaves
represented by event structures when the morphisms on event structures are
``strict'' in that they preserve the partial order of causal dependency.
- RS-99-6
-
PostScript,
PDF.
Rune B. Lyngsø, Christian N. S.
Pedersen, and Henrik Nielsen.
Measures on Hidden Markov Models.
February 1999.
27 pp. Appears in Lengauer, Schneider, Bork, Brutlag, Glasgow, Mewes
and Zimmer, editors, Seventh International Conference on Intelligent
Systems for Molecular Biology, ISMB '99 Proceedings, 1999 as Metrics
and similarity measures for hidden Markov models.
Abstract: Hidden Markov models were introduced in the beginning
of the 1970's as a tool in speech recognition. During the last decade they
have been found useful in addressing problems in computational biology such
as characterising sequence families, gene finding, structure prediction and
phylogenetic analysis. In this paper we propose several measures between
hidden Markov models. We give an efficient algorithm that computes the
measures for profile hidden Markov models and discuss how to extend the
algorithm to other types of models. We present an experiment using the
measures to compare hidden Markov models for three classes of signal
peptides.
- RS-99-5
-
PostScript,
PDF,
DVI.
Julian C. Bradfield and Perdita Stevens.
Observational Mu-Calculus.
February 1999.
18 pp.
Abstract: We propose an extended modal mu-calculus to provide
an `assembly language' for modal logics for real time, value-passing calculi,
and other extended models of computation.
- RS-99-4
-
PostScript,
PDF.
Sibylle B. Fröschle and Thomas Troels
Hildebrandt.
On Plain and Hereditary History-Preserving Bisimulation.
February 1999.
21 pp. Appears in Kutyowski, Pacholski and Wierzbicki, editors,
Mathematical Foundations of Computer Science: 24th International
Symposium, MFCS '99 Proceedings, LNCS 1672, 1999, pages 354-365.
Abstract: We investigate the difference between two well-known
notions of independence bisimilarity, history-preserving bisimulation
and hereditary history-preserving bisimulation. We characterise the
difference between the two bisimulations in trace-theoretical terms,
advocating the view that the first is (just) a bisimulation for causality, while the second is a bisimulation for concurrency. We
explore the frontier zone between the two notions by defining a hierarchy of bounded backtracking bisimulations. Our goal is to provide a
stepping stone for the solution to the intriguing open problem of whether
hereditary history-preserving bisimulation is decidable or not. We prove that
each of the bounded bisimulations is decidable. However, we also prove that
the hierarchy is strict. This rules out the possibility that decidability of
the general problem follows directly from the special case. Finally, we give
a non trivial reduction solving the general problem for a restricted class of
systems and give pointers towards a full answer.
- RS-99-3
-
PostScript,
PDF,
DVI.
Peter Bro Miltersen.
Two Notes on the Computational Complexity of One-Dimensional
Sandpiles.
February 1999.
8 pp.
Abstract: We prove that the one-dimensional sandpile prediction
problem is in
. The best previously known upper bound on
the
-scale was
. We also prove that the
problem is not in
for any constant .
- RS-99-2
-
PostScript,
PDF,
DVI.
Ivan B. Damgård.
An Error in the Mixed Adversary Protocol by Fitzi, Hirt and
Maurer.
February 1999.
4 pp.
Abstract: We point out an error in the protocol for mixed
adversaries and zero error from the Crypto 98 paper by Fitzi, Hirt and
Maurer. We show that the protocol only works under a stronger requirement on
the adversary than the one claimed. Hence the bound on the adversary's
corruption capability given there is not tight. Subsequent work has shown,
however, a new bound which is indeed tight.
- RS-99-1
-
PostScript,
PDF,
DVI.
Marcin Jurdzinski and Mogens Nielsen.
Hereditary History Preserving Simulation is Undecidable.
January 1999.
15 pp.
Abstract: We show undecidability of hereditary history
preserving simulation for finite asynchronous transition systems by a
reduction from the halting problem of deterministic Turing machines. To
make the proof more transparent we introduce an intermediate problem of deciding the winner in domino snake games. First we reduce the halting
problem of deterministic Turing machines to domino snake games. Then we show
how to model a domino snake game by a hereditary history simulation
game on a pair of finite asynchronous transition systems.
|