skip to main content
10.1145/2933575.2934561acmconferencesArticle/Chapter ViewAbstractPublication PageslicsConference Proceedingsconference-collections
research-article

The complexity of regular abstractions of one-counter languages

Published:05 July 2016Publication History

ABSTRACT

We study the computational and descriptional complexity of the following transformation: Given a one-counter automaton (OCA) A, construct a nondeterministic finite automaton (NFA) B that recognizes an abstraction of the language L(A): its (1) downward closure, (2) upward closure, or (3) Parikh image. For the Parikh image over a fixed alphabet and for the upward and downward closures, we find polynomial-time algorithms that compute such an NFA. For the Parikh image with the alphabet as part of the input, we find a quasi-polynomial time algorithm and prove a completeness result: we construct a sequence of OCA that admits a polynomial-time algorithm iff there is one for all OCA. For all three abstractions, it was previously unknown whether appropriate NFA of sub-exponential size exist.

References

  1. P. A. Abdulla, M. F. Atig, and J. Cederberg. Analysis of message passing programs using SMT-solvers. In ATVA, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  2. P. A. Abdulla, M. F. Atig, R. Meyer, and M. S. Salehi. What's decidable about availability languages? In FSTTCS, 2015.Google ScholarGoogle Scholar
  3. R. Alur and P. Černý. Streaming transducers for algorithmic verification of single-pass list-processing programs. In POPL, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. M. F. Atig, A. Bouajjani, and T. Touili. On the reachability analysis of acyclic networks of pushdown systems. In CONCUR, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. F. Atig, A. Bouajjani, and T. Touili. Analyzing asynchronous programs with preemption. In FSTTCS, 2008.Google ScholarGoogle Scholar
  6. M. F. Atig, A. Bouajjani, and S. Qadeer. Context-bounded analysis for concurrent programs with dynamic creation of threads. Logical Methods in Computer Science, 7(4), 2011.Google ScholarGoogle Scholar
  7. M. F. Atig, A. Bouajjani, K. N. Kumar, and P. Saivasan. On bounded reachability analysis of shared memory systems. In FSTTCS, 2014.Google ScholarGoogle Scholar
  8. G. Bachmeier, M. Luttenberger, and M. Schlund. Finite automata for the sub- and superword closure of CFLs: Descriptional and computational complexity. In LATA, 2015.Google ScholarGoogle ScholarCross RefCross Ref
  9. S. Böhm, S. Göller, and P. Jancar. Equivalence of deterministic one-counter automata is NL-complete. In STOC, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. C. Chitic and D. Rosu. On validation of XML streams using finite state machines. In WebDB, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. B. Courcelle. On constructing obstruction sets of words. Bulletin of the EATCS, 44:178--186, 1991.Google ScholarGoogle Scholar
  12. J. Duske and R. Parchmann. Linear indexed languages. Theor. Comput. Sci., 32:47--60, 1984. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. J. Esparza and P. Ganty. Complexity of pattern-based verification for multithreaded programs. In POPL, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. J. Esparza, P. Ganty, S. Kiefer, and M. Luttenberger. Parikh's theorem: A simple and direct automaton construction. Inf. Process. Lett., 111(12):614--619, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J. Esparza, P. Ganty, and T. Poch. Pattern-based verification for multithreaded programs. ACM Trans. Program. Lang. Syst., 36(3):9:1--9:29, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. Esparza, M. Luttenberger, and M. Schlund. A brief history of Strahler numbers. In LATA, 2014.Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. P. Ganty and R. Majumdar. Algorithmic verification of asynchronous programs. ACM Trans. Program. Lang. Syst., 34(1):6:1--6:48, May 2012. ISSN 0164-0925. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. H. Gruber, M. Holzer, and M. Kutrib. More on the size of Higman-Haines sets: effective constructions. Fundamenta Informaticae, 91(1):105--121, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. P. Habermehl, R. Meyer, and H. Wimmel. The downward-closure of Petri net languages. In ICALP, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. M. Hague and A. W. Lin. Synchronisation- and reversal-bounded analysis of multithreaded programs with counters. In CAV, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. M. Hague, J. Kochems, and C. L. Ong. Unboundedness and downward closures of higher-order pushdown automata. In POPL, 2016. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. G. Higman. Ordering by divisibility in abstract algebras. Proc. London Math. Soc. (3), 2(7):326--336, 1952.Google ScholarGoogle ScholarCross RefCross Ref
  23. J. Hoenicke, R. Meyer, and E. Olderog. Kleene, Rabin, and Scott are available. In CONCUR, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. E. Kopczynski and A. W. To. Parikh images of grammars: Complexity and applications. In LICS, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. S. La Torre, P. Madhusudan, and G. Parlato. A robust class of context-sensitive languages. In LICS, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. S. La Torre, M. Napoli, and G. Parlato. Scope-bounded pushdown languages. In DLT, 2014.Google ScholarGoogle ScholarCross RefCross Ref
  27. S. La Torre, A. Muscholl, and I. Walukiewicz. Safety of parametrized asynchronous shared-memory systems is almost always decidable. In CONCUR, 2015.Google ScholarGoogle Scholar
  28. P. Lafourcade, D. Lugiez, and R. Treinen. Intruder deduction for AC-like equational theories with homomorphisms. In RTA, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. M. Latteux. Langages à un compteur. J. Comput. Syst. Sci., 26(1):14--33, 1983.Google ScholarGoogle ScholarCross RefCross Ref
  30. Z. Long, G. Calin, R. Majumdar, and R. Meyer. Language-theoretic abstraction refinement. In FASE, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. R. Mayr. Undecidable problems in unreliable computations. Theor. Comput. Sci., 297(1-3):337--354, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. R. J. Parikh. On context-free languages. J. ACM, 13(4): 570--581, Oct. 1966. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. K. Sen and M. Viswanathan. Model checking multithreaded programs with asynchronous atomic methods. In CAV, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. L. G. Valiant and M. Paterson. Deterministic one-counter automata. J. Comput. Syst. Sci., 10(3):340--350, 1975. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. J. van Leeuwen. Effective constructions in well-partially-ordered free monoids. Discrete Math., 21(3):237--252, 1978. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. K. N. Verma, H. Seidl, and T. Schwentick. On the complexity of equational Horn clauses. In CADE-20, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. G. Zetzsche. An approach to computing downward closures. In ICALP, 2015. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. G. Zetzsche. Computing downward closures for stacked counter automata. In STACS, 2015.Google ScholarGoogle Scholar

Index Terms

  1. The complexity of regular abstractions of one-counter languages

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        LICS '16: Proceedings of the 31st Annual ACM/IEEE Symposium on Logic in Computer Science
        July 2016
        901 pages
        ISBN:9781450343916
        DOI:10.1145/2933575

        Copyright © 2016 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 5 July 2016

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed limited

        Acceptance Rates

        Overall Acceptance Rate143of386submissions,37%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader