Computational Complexity of Some Equivalence-Checking Problems

نویسنده

  • Zdeněk Sawa
چکیده

This habilitation thesis gives an overview of five papers of the author in the area of verification, in particular, in the study of computational complexity of equivalence checking problems and related areas. The first of these papers, Sawa, Jančar: Equivalences on Finite-State Systems are PTIME-hard (2005), shows that deciding any relation between bisimulation equivalence (bisimilarity) and trace preorder is PTIME-hard for finite-state systems that are presented explicitly (i.e., as a list of states and transitions). The second paper, Sawa, Jančar: Hardness of equivalence checking for composed finite-state systems (2009), gives a proof that deciding any relation between bisimulation equivalence and trace preorder is EXPTIME-hard for systems composed of interacting finite-state components. Further hardness results are shown for special cases of acyclic systems. The third paper, Jančar, Kot, Sawa: Complexity of deciding bisimilarity between normed BPA and normed BPP (2010), presents a polynomial-time algorithm deciding bisimilarity between a normed BPA process and a normed BPP process, with running time O(n). The forth paper, Fröschle, Jančar, Lasota, Sawa: Non-Interleaving Bisimulation Equivalences on Basic Parallel Processes (2010), describes polynomial time algorithms for deciding hereditary history preserving bisimilarity (in O(n logn)) and history preserving bisimilarity (in O(n)) on BPP processes. The fifth paper, Jančar, Sawa: A note on emptiness for alternating finite automata with a one-letter alphabet (2007) gives a short direct self-contained proof of PSPACE-hardness of the emptiness problem for alternating finite automata with a singleton alphabet, which is much simpler than the original proof by Holtzer (1995) relying on a series of reductions from several papers.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Equivalence Models for Quantified Boolean Formulas

In this paper, the notion of equivalence models for quantified Boolean formulas with free variables is introduced. The computational complexity of the equivalence model checking problem is investigated in the general case and some restricted cases. We also establish a connection between the structure of some quantified Boolean formulas and the structure of models.

متن کامل

The Almost Equivalence by Asymptotic Probabilities for Regular Languages and Its Computational Complexities

We introduce p-equivalence by asymptotic probabilities, which is a weak almost-equivalence based on zero-one laws in finite model theory. In this paper, we consider the computational complexities of p-equivalence problems for regular languages and provide the following details. First, we give an robustness of p-equivalence and a logical characterization for p-equivalence. The characterization i...

متن کامل

On the complexity of checking semantic equivalences between pushdown processes and finite-state processes

Simulation preorder/equivalence and bisimulation equivalence are the most commonly used equivalences in concurrency theory. Their standard definitions are often called strong simulation/bisimulation, while weak simulation/bisimulation abstracts from internal τ -actions. We study the computational complexity of checking these strong and weak semantic preorders/equivalences between pushdown proce...

متن کامل

On Solution Correspondences in Answer-Set Programming

We introduce a general framework for specifying program correspondence under the answer-set semantics. The framework allows to define different kinds of equivalence notions, including previously defined notions like strong and uniform equivalence, in which programs are extended with rules from a given context, and correspondence is determined by means of a binary relation. In particular, refine...

متن کامل

On the computational complexity of finding a minimal basis for the guess and determine attack

Guess-and-determine attack is one of the general attacks on stream ciphers. It is a common cryptanalysis tool for evaluating security of stream ciphers. The effectiveness of this attack is based on the number of unknown bits which will be guessed by the attacker to break the cryptosystem. In this work, we present a relation between the minimum numbers of the guessed bits and uniquely restricted...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013