Eeective Lossy Queue Languages
نویسندگان
چکیده
Although the set of reachable states of a lossy channel system (LCS) is regular, it is well-known that this set cannot be constructed eeectively. In this paper, we characterize signiicant classes of LCS for which the set of reachable states can be computed. Furthermore, we show that, for slight generatlizations of these classes, computability can no longer be achieved. To carry out our study, we deene rewriting systems which capture the behaviour of LCS, in the sense that (i) they have a FIFO-like semantics and (ii) their languages are downward closed with respect to the substring relation. The main result of the paper shows that, for context-free rewriting systems, the corresponding language can be computed. An interesting consequence of our results is that we get a characterization of classes of meta-transitions whose post-images can be eeectively constructed. These meta-transitions consist of sets of nested loops in the control graph of the system, in contrast to previous works on meta-transitions in which only single loops are considered. Essentially the same proof technique we use to show the result mentioned above allows also to establish a result in the theory of 0L-systems, i.e., context-free parallel rewriting systems. We prove that the downward closure of the language generated by any 0L-system is eeectively regular.
منابع مشابه
The Transformation Monoid of a Partially Lossy Queue
We model the behavior of a lossy fifo-queue as a monoid of transformations that are induced by sequences of writing and reading. To have a common model for reliable and lossy queues, we split the alphabet of the queue into two parts: the forgettable letters and the letters that are transmitted reliably. We describe this monoid by means of a confluent and terminating semiThue system and then stu...
متن کاملRobust Image Authentication Method Surviving JPEG Lossy Compression
Image authentication veriies the originality of an image by detecting malicious manipulations. This goal is diierent from that of image watermarking which embeds into the image a signature surviving most manipulations. Existing methods for image authentication treat all types of manipulation equally (i.e., as unacceptable). However, some applications demand techniques that can distinguish accep...
متن کاملRing Networks Are Easier to Verify ? (report)
We show in this paper how the ring topology makes easier the analysis of communicating nite state machines' reachability set. We prove that the analysis of this kind of systems can be reduced to the analysis of a single automaton with a single queue. This leads us, by the use of new symbolic transitions, to the proposal of two semi-algorithms, one for normal ring networks and one for lossy ring...
متن کاملOptimal Tuning of the TCP Retransmission TimeOut for small-BDP lossy wireless networks
We study TCP performance over small-BDP lossy wireless networks. Our model is based on a feedback queue. It is tailored for the case when TCP operates with small congestion windows. The present approach allows us to analyze both standard and transmission loss aware TCP versions. Based on the system load and the average queue size of the packets waiting for transmission, we show how an optimal v...
متن کاملPerformance Evaluation of Different Filter Banks in the JPEG-2000 Baseline System
The performance of several decorrelating transforms is evaluated in the JPEG-2000 baseline system. The transforms considered are based on uniform parallel 2-channel and 8-channel lter banks and discrete cosine transform (DCT) building blocks. Through the analysis of lossy compression results, a system employing a combination of 8-channel and 2-channel lter banks is found to perform best overall...
متن کامل