Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Showing 1–24 of 24 results for author: Chistikov, D

Searching in archive cs. Search in all archives.
.
  1. Integer Linear-Exponential Programming in NP by Quantifier Elimination

    Authors: Dmitry Chistikov, Alessio Mansutti, Mikhail R. Starchak

    Abstract: This paper provides an NP procedure that decides whether a linear-exponential system of constraints has an integer solution. Linear-exponential systems extend standard integer linear programs with exponential terms $2^x$ and remainder terms ${(x \bmod 2^y)}$. Our result implies that the existential theory of the structure $(\mathbb{N},0,1,+,2^{(\cdot)},V_2(\cdot,\cdot),\leq)$ has an NP-complete sa… ▽ More

    Submitted 9 July, 2024; originally announced July 2024.

    Comments: Extended version of ICALP 2024 paper

  2. arXiv:2310.01992  [pdf, other

    cs.FL cs.LO

    Acyclic Petri and Workflow Nets with Resets

    Authors: Dmitry Chistikov, Wojciech Czerwiński, Piotr Hofman, Filip Mazowiecki, Henry Sinclair-Banks

    Abstract: In this paper we propose two new subclasses of Petri nets with resets, for which the reachability and coverability problems become tractable. Namely, we add an acyclicity condition that only applies to the consumptions and productions, not the resets. The first class is acyclic Petri nets with resets, and we show that coverability is PSPACE-complete for them. This contrasts the known Ackermann-har… ▽ More

    Submitted 6 November, 2023; v1 submitted 3 October, 2023; originally announced October 2023.

    Comments: Preprint for FSTTCS'23 containing 28 pages and 7 figures

  3. arXiv:2306.06479  [pdf, other

    cs.LG

    Learning a Neuron by a Shallow ReLU Network: Dynamics and Implicit Bias for Correlated Inputs

    Authors: Dmitry Chistikov, Matthias Englert, Ranko Lazic

    Abstract: We prove that, for the fundamental regression task of learning a single neuron, training a one-hidden layer ReLU network of any width by gradient flow from a small initialisation converges to zero loss and is implicitly biased to minimise the rank of network parameters. By assuming that the training points are correlated with the teacher neuron, we complement previous work that considered orthogon… ▽ More

    Submitted 1 October, 2023; v1 submitted 10 June, 2023; originally announced June 2023.

    MSC Class: 68Q32; 68T07 ACM Class: I.2.6

  4. arXiv:2305.03037  [pdf, other

    cs.LO

    The complexity of Presburger arithmetic with power or powers

    Authors: Michael Benedikt, Dmitry Chistikov, Alessio Mansutti

    Abstract: We investigate expansions of Presburger arithmetic, i.e., the theory of the integers with addition and order, with additional structure related to exponentiation: either a function that takes a number to the power of $2$, or a predicate for the powers of $2$. The latter theory, denoted $\mathrm{PresPower}$, was introduced by Büchi as a first attempt at characterising the sets of tuples of numbers… ▽ More

    Submitted 4 May, 2023; originally announced May 2023.

  5. arXiv:2103.05087  [pdf, other

    cs.LO

    Presburger arithmetic with threshold counting quantifiers is easy

    Authors: Dmitry Chistikov, Christoph Haase, Alessio Mansutti

    Abstract: We give a quantifier elimination procedures for the extension of Presburger arithmetic with a unary threshold counting quantifier $\exists^{\ge c} y$ that determines whether the number of different $y$ satisfying some formula is at least $c \in \mathbb N$, where $c$ is given in binary. Using a standard quantifier elimination procedure for Presburger arithmetic, the resulting theory is easily seen… ▽ More

    Submitted 8 March, 2021; originally announced March 2021.

  6. arXiv:2102.13095  [pdf, ps, other

    cs.FL cs.CC cs.PL

    Subcubic Certificates for CFL Reachability

    Authors: Dmitry Chistikov, Rupak Majumdar, Philipp Schepper

    Abstract: Many problems in interprocedural program analysis can be modeled as the context-free language (CFL) reachability problem on graphs and can be solved in cubic time. Despite years of efforts, there are no known truly sub-cubic algorithms for this problem. We study the related certification task: given an instance of CFL reachability, are there small and efficiently checkable certificates for the exi… ▽ More

    Submitted 25 February, 2021; originally announced February 2021.

  7. The Big-O Problem

    Authors: Dmitry Chistikov, Stefan Kiefer, Andrzej S. Murawski, David Purser

    Abstract: Given two weighted automata, we consider the problem of whether one is big-O of the other, i.e., if the weight of every finite word in the first is not greater than some constant multiple of the weight in the second. We show that the problem is undecidable, even for the instantiation of weighted automata as labelled Markov chains. Moreover, even when it is known that one weighted automaton is bi… ▽ More

    Submitted 14 March, 2022; v1 submitted 15 July, 2020; originally announced July 2020.

    Comments: Extended version of the CONCUR 2020 paper "The Big-O Problem for Labelled Markov Chains and Weighted Automata": https://doi.org/10.4230/LIPIcs.CONCUR.2020.41

    Journal ref: Logical Methods in Computer Science, Volume 18, Issue 1 (March 15, 2022) lmcs:7343

  8. arXiv:2006.11898  [pdf, other

    math.GR cs.FL

    Rational subsets of Baumslag-Solitar groups

    Authors: Michaël Cadilhac, Dmitry Chistikov, Georg Zetzsche

    Abstract: We consider the rational subset membership problem for Baumslag-Solitar groups. These groups form a prominent class in the area of algorithmic group theory, and they were recently identified as an obstacle for understanding the rational subsets of $\text{GL}(2,\mathbb{Q})$. We show that rational subset membership for Baumslag-Solitar groups $\text{BS}(1,q)$ with $q\ge 2$ is decidable and PSPACE-… ▽ More

    Submitted 21 June, 2020; originally announced June 2020.

    Comments: Long version of paper with same title appearing in ICALP'20

  9. arXiv:2001.06442  [pdf, other

    quant-ph cs.DM math-ph math.CA

    Globe-hopping

    Authors: Dmitry Chistikov, Olga Goulko, Adrian Kent, Mike Paterson

    Abstract: We consider versions of the grasshopper problem (Goulko and Kent, 2017) on the circle and the sphere, which are relevant to Bell inequalities. For a circle of circumference $2π$, we show that for unconstrained lawns of any length and arbitrary jump lengths, the supremum of the probability for the grasshopper's jump to stay on the lawn is one. For antipodal lawns, which by definition contain precis… ▽ More

    Submitted 17 January, 2020; originally announced January 2020.

    Journal ref: Proc. R. Soc. A 476: 20200038 (2020)

  10. arXiv:1912.09864  [pdf, ps, other

    cs.MA

    Convergence of Opinion Diffusion is PSPACE-complete

    Authors: Dmitry Chistikov, Grzegorz Lisowski, Mike Paterson, Paolo Turrini

    Abstract: We analyse opinion diffusion in social networks, where a finite set of individuals is connected in a directed graph and each simultaneously changes their opinion to that of the majority of their influencers. We study the algorithmic properties of the fixed-point behaviour of such networks, showing that the problem of establishing whether individuals converge to stable opinions is PSPACE-complete.

    Submitted 30 March, 2020; v1 submitted 20 December, 2019; originally announced December 2019.

  11. arXiv:1904.08402  [pdf, ps, other

    cs.FL cs.LO math.CO

    Re-pairing brackets

    Authors: Dmitry Chistikov, Mikhail Vyalyi

    Abstract: Consider the following one-player game. Take a well-formed sequence of opening and closing brackets. As a move, the player can pair any opening bracket with any closing bracket to its right, erasing them. The goal is to re-pair (erase) the entire sequence, and the complexity of a strategy is measured by its width: the maximum number of nonempty segments of symbols (separated by blank space) seen d… ▽ More

    Submitted 17 April, 2019; originally announced April 2019.

  12. Bisimilarity Distances for Approximate Differential Privacy

    Authors: Dmitry Chistikov, Andrzej S. Murawski, David Purser

    Abstract: Differential privacy is a widely studied notion of privacy for various models of computation. Technically, it is based on measuring differences between probability distributions. We study $ε,δ$-differential privacy in the setting of labelled Markov chains. While the exact differences relevant to $ε,δ$-differential privacy are not computable in this framework, we propose a computable bisimilarity d… ▽ More

    Submitted 13 September, 2018; v1 submitted 26 July, 2018; originally announced July 2018.

    Comments: To appear International Symposium on Automated Technology for Verification and Analysis // October 7-10, 2018

  13. arXiv:1802.09263  [pdf, other

    cs.CC cs.LO math.AG

    O-Minimal Invariants for Discrete-Time Dynamical Systems

    Authors: Shaull Almagor, Dmitry Chistikov, Joël Ouaknine, James Worrell

    Abstract: Termination analysis of linear loops plays a key rôle in several areas of computer science, including program verification and abstract interpretation. Already for the simplest variants of linear loops the question of termination relates to deep open problems in number theory, such as the decidability of the Skolem and Positivity Problems for linear recurrence sequences, or equivalently reachabili… ▽ More

    Submitted 11 May, 2020; v1 submitted 26 February, 2018; originally announced February 2018.

    ACM Class: F.3.1

  14. arXiv:1605.07061  [pdf, other

    cs.FL cs.CC cs.LG

    On Restricted Nonnegative Matrix Factorization

    Authors: Dmitry Chistikov, Stefan Kiefer, Ines Marušić, Mahsa Shirmohammadi, James Worrell

    Abstract: Nonnegative matrix factorization (NMF) is the problem of decomposing a given nonnegative $n \times m$ matrix $M$ into a product of a nonnegative $n \times d$ matrix $W$ and a nonnegative $d \times m$ matrix $H$. Restricted NMF requires in addition that the column spaces of $M$ and $W$ coincide. Finding the minimal inner dimension $d$ is known to be NP-hard, both for NMF and restricted NMF. We show… ▽ More

    Submitted 23 May, 2016; originally announced May 2016.

    Comments: Full version of an ICALP'16 paper

  15. arXiv:1605.06848  [pdf, ps, other

    cs.CC cs.LG math.NA

    Nonnegative Matrix Factorization Requires Irrationality

    Authors: Dmitry Chistikov, Stefan Kiefer, Ines Marušić, Mahsa Shirmohammadi, James Worrell

    Abstract: Nonnegative matrix factorization (NMF) is the problem of decomposing a given nonnegative $n \times m$ matrix $M$ into a product of a nonnegative $n \times d$ matrix $W$ and a nonnegative $d \times m$ matrix $H$. A longstanding open question, posed by Cohen and Rothblum in 1993, is whether a rational matrix $M$ always has an NMF of minimal inner dimension $d$ whose factors $W$ and $H$ are also rati… ▽ More

    Submitted 22 March, 2017; v1 submitted 22 May, 2016; originally announced May 2016.

    Comments: Journal version, to appear in the SIAM Journal on Applied Algebra and Geometry (SIAGA)

  16. arXiv:1602.03755  [pdf, ps, other

    cs.DM cs.SE

    Hitting Families of Schedules for Asynchronous Programs

    Authors: Dmitry Chistikov, Rupak Majumdar, Filip Niksic

    Abstract: We consider the following basic task in the testing of concurrent systems. The input to the task is a partial order of events, which models actions performed on or by the system and specifies ordering constraints between them. The task is to determine if some scheduling of these events can result in a bug. The number of schedules to be explored can, in general, be exponential. Empirically, many… ▽ More

    Submitted 18 July, 2016; v1 submitted 11 February, 2016; originally announced February 2016.

  17. arXiv:1602.03419  [pdf, other

    cs.FL cs.LO

    Complexity of regular abstractions of one-counter languages

    Authors: Mohamed Faouzi Atig, Dmitry Chistikov, Piotr Hofman, K Narayan Kumar, Prakash Saivasan, Georg Zetzsche

    Abstract: We study the computational and descriptional complexity of the following transformation: Given a one-counter automaton (OCA) A, construct a nondeterministic finite automaton (NFA) B that recognizes an abstraction of the language L(A): its (1) downward closure, (2) upward closure, or (3) Parikh image. For the Parikh image over a fixed alphabet and for the upward and downward closures, we find pol… ▽ More

    Submitted 10 February, 2016; originally announced February 2016.

  18. arXiv:1511.04893  [pdf, ps, other

    cs.FL

    Context-Free Commutative Grammars with Integer Counters and Resets

    Authors: Dmitry Chistikov, Christoph Haase, Simon Halfon

    Abstract: We study the computational complexity of reachability, coverability and inclusion for extensions of context-free commutative grammars with integer counters and reset operations on them. Those grammars can alternatively be viewed as an extension of communication-free Petri nets. Our main results are that reachability and coverability are inter-reducible and both NP-complete. In particular, this cla… ▽ More

    Submitted 24 June, 2016; v1 submitted 16 November, 2015; originally announced November 2015.

    Comments: 33 pages

    ACM Class: F.1.1

  19. Shortest paths in one-counter systems

    Authors: Dmitry Chistikov, Wojciech Czerwiński, Piotr Hofman, Michał Pilipczuk, Michael Wehar

    Abstract: We show that any one-counter automaton with $n$ states, if its language is non-empty, accepts some word of length at most $O(n^2)$. This closes the gap between the previously known upper bound of $O(n^3)$ and lower bound of $Ω(n^2)$. More generally, we prove a tight upper bound on the length of shortest paths between arbitrary configurations in one-counter transition systems (weaker bounds have pr… ▽ More

    Submitted 4 March, 2019; v1 submitted 19 October, 2015; originally announced October 2015.

    Comments: 28 pages, 2 figures

    Journal ref: Logical Methods in Computer Science, Volume 15, Issue 1 (March 5, 2019) lmcs:4037

  20. arXiv:1509.07588  [pdf, other

    cs.CC cs.FL math.CO

    Fractional coverings, greedy coverings, and rectifier networks

    Authors: Dmitry Chistikov, Szabolcs Iván, Anna Lubiw, Jeffrey Shallit

    Abstract: A rectifier network is a directed acyclic graph with distinguished sources and sinks; it is said to compute a Boolean matrix $M$ that has a $1$ in the entry $(i,j)$ iff there is a path from the $j$th source to the $i$th sink. The smallest number of edges in a rectifier network computing $M$ is a classic complexity measure on matrices, which has been studied for more than half a century. We explo… ▽ More

    Submitted 18 May, 2016; v1 submitted 25 September, 2015; originally announced September 2015.

  21. arXiv:1411.0659  [pdf, other

    cs.LO cs.AI

    Approximate Counting in SMT and Value Estimation for Probabilistic Programs

    Authors: Dmitry Chistikov, Rayna Dimitrova, Rupak Majumdar

    Abstract: #SMT, or model counting for logical theories, is a well-known hard problem that generalizes such tasks as counting the number of satisfying assignments to a Boolean formula and computing the volume of a polytope. In the realm of satisfiability modulo theories (SMT) there is a growing need for model counting solvers, coming from several application domains (quantitative information flow, static ana… ▽ More

    Submitted 29 October, 2015; v1 submitted 3 November, 2014; originally announced November 2014.

  22. arXiv:1403.0509  [pdf, ps, other

    cs.FL cs.CC

    Unary Pushdown Automata and Straight-Line Programs

    Authors: Dmitry Chistikov, Rupak Majumdar

    Abstract: We consider decision problems for deterministic pushdown automata over a unary alphabet (udpda, for short). Udpda are a simple computation model that accept exactly the unary regular languages, but can be exponentially more succinct than finite-state automata. We complete the complexity landscape for udpda by showing that emptiness (and thus universality) is P-hard, equivalence and compressed memb… ▽ More

    Submitted 3 March, 2014; originally announced March 2014.

  23. arXiv:1203.0631  [pdf, ps, other

    cs.DM cs.CC cs.LG

    Checking Tests for Read-Once Functions over Arbitrary Bases

    Authors: Dmitry V. Chistikov

    Abstract: A Boolean function is called read-once over a basis B if it can be expressed by a formula over B where no variable appears more than once. A checking test for a read-once function f over B depending on all its variables is a set of input vectors distinguishing f from all other read-once functions of the same variables. We show that every read-once function f over B has a checking test containing O… ▽ More

    Submitted 28 May, 2012; v1 submitted 3 March, 2012; originally announced March 2012.

    Comments: Accepted to the 7th International Computer Science Symposium in Russia (CSR 2012), revised version

  24. arXiv:1007.1073  [pdf, ps, other

    cs.CC

    Learning Read-Once Functions Using Subcube Identity Queries

    Authors: Dmitry V. Chistikov, Andrey A. Voronenko

    Abstract: We consider the problem of exact identification for read-once functions over arbitrary Boolean bases. We introduce a new type of queries (subcube identity ones), discuss its connection to previously known ones, and study the complexity of the problem in question. Besides these new queries, learning algorithms are allowed to use classic membership ones. We present a technique of modeling an equival… ▽ More

    Submitted 7 July, 2010; originally announced July 2010.

    Comments: Submitted to SODA11