Economical Transformations of Structured Data (Extended Version)
نویسندگان
چکیده
Reliability of large-scale hardware and software systems often depends on the correctness of the underlying structured data. Examples of structured data include heap-allocated linked data structures, files, and program states in software, and netlists and simulator states for modeling hardware. In this paper, we focus on automatically transforming structured data to make it satisfy certain properties of interest. In particular, we consider tree-like structured data (i.e. trees and lists), and finite state properties of such structures (e.g. acyclicity, sorted-ness). We address two separate problems: (1) given an input structure, transforming it in a minimal fashion to obtain a desired output structure, and (2) given an input property and an output property, synthesizing a (small) update program that transforms any input satisfying the input property to some desired output. Our approach uses automata-theoretic constructions to enable efficient reasoning. The practical utility of our approach is in its ability to scale to input structures of arbitrary sizes, as illustrated by our prototype tool.
منابع مشابه
Some properties of extended multiplier transformations to the classes of meromorphic multivalent functions
In this paper, we introduce new classes $sum_{k,p,n}(alpha ,m,lambda ,l,rho )$ and $mathcal{T}_{k,p,n}(alpha ,m,lambda ,l,rho )$ of p-valent meromorphic functions defined by using the extended multiplier transformation operator. We use a strong convolution technique and derive inclusion results. A radius problem and some other interesting properties of these classes are discussed.
متن کاملSESOS: A Verifiable Searchable Outsourcing Scheme for Ordered Structured Data in Cloud Computing
While cloud computing is growing at a remarkable speed, privacy issues are far from being solved. One way to diminish privacy concerns is to store data on the cloud in encrypted form. However, encryption often hinders useful computation cloud services. A theoretical approach is to employ the so-called fully homomorphic encryption, yet the overhead is so high that it is not considered a viable s...
متن کاملTransformations and Strategies of the Sports Tourism Industry During the Covid-19 Epidemic
This study aimed to identify the implications of Covid-19 on sports tourism and to provide appropriate strategies. The research paradigm is interpretive, its nature is exploratory, the approach is inductive, the research method is qualitative, the research strategy is the thematic analysis and the data collection was performed using targeted library study and in-depth semi-structured interviews...
متن کاملA Language for Bi-Directional Tree Transformations (Working Draft of Full Version)
We develop a semantic foundation and a core programming language for bi-directional transformations on tree-stuctured data. In one direction, these transformations, called lenses, map a complex “concrete” tree into a simplified “abstract” one; in the other, they map a modified abstract tree, together with the original concrete tree, to a correspondingly modified concrete tree. The challenge of ...
متن کاملEnforcing RBAC Policies over Data Stored on Untrusted Server (Extended Version)
One of the security issues in data outsourcing is the enforcement of the data owner’s access control policies. This includes some challenges. The first challenge is preserving confidentiality of data and policies. One of the existing solutions is encrypting data before outsourcing which brings new challenges; namely, the number of keys required to access authorized resources, efficient policy u...
متن کامل