Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2603088.2603098acmconferencesArticle/Chapter ViewAbstractPublication PageslicsConference Proceedingsconference-collections
research-article

Separating regular languages with first-order logic

Published: 14 July 2014 Publication History

Abstract

Given two languages, a separator is a third language that contains the first one and is disjoint from the second one. We investigate the following decision problem: given two regular input languages of finite words, decide whether there exists a first-order definable separator. We prove that in order to answer this question, sufficient information can be extracted from semigroups recognizing the input languages, using a fixpoint computation. This yields an Exptime algorithm for checking first-order separability. Moreover, the correctness proof of this algorithm yields a stronger result, namely a description of a possible separator. Finally, we prove that this technique can be generalized to answer the same question for regular languages of infinite words.

References

[1]
J. Almeida. Some algorithmic problems for pseudovarieties. Publ. Math. Debrecen, 54:531--552, 1999. Proc. of Automata and Formal Languages, VIII.
[2]
D. Beauquier and J. E. Pin. Languages and scanners. Theoret. Comput. Sci., 84(1):3--21, 1991.
[3]
S. Cho and D. T. Huynh. Finite-automaton aperiodicity is PSPACE-complete. Theoret. Comp. Sci., 88(1):99--116, 1991.
[4]
W. Czerwiński, W. Martens, and T. s. Masopust. Efficient separability of regular languages by subsequences and suffixes. In ICALP'13, 2013.
[5]
V. Diekert and P. Gastin. First-order definable languages. In Logic and Automata: History and Perspectives, volume 2, pages 261--306. Amsterdam Univ. Press, 2008.
[6]
K. Henckell. Pointlike sets: the finest aperiodic cover of a finite semigroup. J. Pure Appl. Algebra, 55(1-2):85--126, 1988.
[7]
K. Henckell, J. Rhodes, and B. Steinberg. Aperiodic pointlikes and beyond. Internat. J. Algebra Comput., 20(2):287--305, 2010.
[8]
N. Immerman. Descriptive Complexity. Springer, 1999.
[9]
H. W. Kamp. Tense Logic and the Theory of Linear Order. Phd thesis, CS Department, University of California at Los Angeles, USA, 1968.
[10]
R. E. Ladner. Application of model theoretic games to discrete linear orders and finite automata. Inform. Control, 33(4):281--303, 1977.
[11]
L. Libkin. Elements Of Finite Model Theory. Springer, 2004.
[12]
R. McNaughton and S. Papert. Counter-Free Automata. MIT Press, 1971.
[13]
D. Perrin. Recent results on automata and infinite words. In MFCS'84, 1984.
[14]
D. Perrin and J. E. Pin. Infinite Words. Elsevier, 2004.
[15]
J. E. Pin. Mathematical foundations of automata theory. http://www.liafa.jussieu.fr/~jep/PDF/MPRI/MPRI.pdf, 2014.
[16]
T. Place, L. van Rooijen, and M. Zeitoun. Separating regular languages by piecewise testable and unambiguous languages. In MFCS' 13, 2013.
[17]
T. Place, L. van Rooijen, and M. Zeitoun. Separating regular languages by locally testable and locally threshold testable languages. In FSTTCS'13, LIPIcs, 2013.
[18]
M. P. Schützenberger. On finite monoids having only trivial subgroups. Inform. Control, 8:190--194, 1965.
[19]
H. Straubing. Finite Automata, Formal Logic and Circuit Complexity. Birkhauser, 1994.
[20]
W. Thomas. Star-free regular sets of omega-sequences. Inform. and Control, 42(2):148--156, 1979.
[21]
W. Thomas. Languages, automata, and logic. In Handbook of formal languages. Springer, 1997.
[22]
T. Wilke. An Eilenberg theorem for infinity-languages. In ICALP'91, 1991.
[23]
T. Wilke. Classifying discrete temporal properties. In STACS' 99, 1999.

Cited By

View all
  • (2020)Discriminative Power of Typing Features on Desktops, Tablets, and Phones for User IdentificationACM Transactions on Privacy and Security10.1145/337740423:1(1-36)Online publication date: 5-Feb-2020
  • (2020)CrowdPrivacyACM Transactions on Privacy and Security10.1145/337575223:1(1-25)Online publication date: 5-Feb-2020
  • (2020)A Formal Approach to Physics-based Attacks in Cyber-physical SystemsACM Transactions on Privacy and Security10.1145/337327023:1(1-41)Online publication date: 5-Feb-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CSL-LICS '14: Proceedings of the Joint Meeting of the Twenty-Third EACSL Annual Conference on Computer Science Logic (CSL) and the Twenty-Ninth Annual ACM/IEEE Symposium on Logic in Computer Science (LICS)
July 2014
764 pages
ISBN:9781450328869
DOI:10.1145/2603088
  • Program Chairs:
  • Thomas Henzinger,
  • Dale Miller
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Sponsors

In-Cooperation

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 14 July 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Ehrenfeucht-Fraïssé games
  2. expressive power
  3. first-order logic
  4. infinite words
  5. regular languages
  6. semigroups
  7. separation
  8. words

Qualifiers

  • Research-article

Funding Sources

Conference

CSL-LICS '14
Sponsor:

Acceptance Rates

CSL-LICS '14 Paper Acceptance Rate 74 of 212 submissions, 35%;
Overall Acceptance Rate 215 of 622 submissions, 35%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)10
  • Downloads (Last 6 weeks)1
Reflects downloads up to 03 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2020)Discriminative Power of Typing Features on Desktops, Tablets, and Phones for User IdentificationACM Transactions on Privacy and Security10.1145/337740423:1(1-36)Online publication date: 5-Feb-2020
  • (2020)CrowdPrivacyACM Transactions on Privacy and Security10.1145/337575223:1(1-25)Online publication date: 5-Feb-2020
  • (2020)A Formal Approach to Physics-based Attacks in Cyber-physical SystemsACM Transactions on Privacy and Security10.1145/337327023:1(1-41)Online publication date: 5-Feb-2020
  • (2020)The Power of the WeakACM Transactions on Computational Logic10.1145/337239221:2(1-47)Online publication date: 9-Jan-2020
  • (2020)Probabilistic Topic Modeling for Comparative Analysis of Document CollectionsACM Transactions on Knowledge Discovery from Data10.1145/336987314:2(1-27)Online publication date: 4-Mar-2020
  • (2020)Real-time Transportation Prediction Correction using Reconstruction Error in Deep LearningACM Transactions on Knowledge Discovery from Data10.1145/336987114:2(1-20)Online publication date: 9-Feb-2020
  • (2020)Bradykinesia Recognition in Parkinson’s Disease via Single RGB VideoACM Transactions on Knowledge Discovery from Data10.1145/336943814:2(1-19)Online publication date: 9-Feb-2020
  • (2020)A Multi-server ORAM Framework with Constant Client Bandwidth BlowupACM Transactions on Privacy and Security10.1145/336910823:1(1-35)Online publication date: 5-Feb-2020
  • (2020)Many-Objective Test Suite Generation for Software Product LinesACM Transactions on Software Engineering and Methodology10.1145/336114629:1(1-46)Online publication date: 30-Jan-2020
  • (2020)Deciding Classes of Regular Languages: The Covering ApproachLanguage and Automata Theory and Applications10.1007/978-3-030-40608-0_6(89-112)Online publication date: 25-Feb-2020
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media