About the effect of the number of successful paths in an infinite tree on the recognizability by a finite automaton with Buchi conditions

Author(s):  
D. Beauquier ◽  
M. Nivat ◽  
D. Niwiński
2020 ◽  
Vol 2 (1) ◽  
Author(s):  
Carlo Mereghetti ◽  
Beatrice Palano ◽  
Simone Cialdi ◽  
Valeria Vento ◽  
Matteo G. A. Paris ◽  
...  
Keyword(s):  

1991 ◽  
Vol 88 (1) ◽  
pp. 99-116 ◽  
Author(s):  
Sang Cho ◽  
Dung T. Huynh
Keyword(s):  

2015 ◽  
Vol 20 (3) ◽  
pp. 262-269 ◽  
Author(s):  
Ryosuke Nakamura ◽  
Kenji Sawada ◽  
Seiichi Shin ◽  
Kenji Kumagai ◽  
Hisato Yoneda

2021 ◽  
Vol 12 (3) ◽  
pp. 150-156
Author(s):  
A. V. Galatenko ◽  
◽  
V. A. Kuzovikhina ◽  

We propose an automata model of computer system security. A system is represented by a finite automaton with states partitioned into two subsets: "secure" and "insecure". System functioning is secure if the number of consecutive insecure states is not greater than some nonnegative integer k. This definition allows one to formally reflect responsiveness to security breaches. The number of all input sequences that preserve security for the given value of k is referred to as a k-secure language. We prove that if a language is k-secure for some natural and automaton V, then it is also k-secure for any 0 < k < k and some automaton V = V (k). Reduction of the value of k is performed at the cost of amplification of the number of states. On the other hand, for any non-negative integer k there exists a k-secure language that is not k"-secure for any natural k" > k. The problem of reconstruction of a k-secure language using a conditional experiment is split into two subcases. If the cardinality of an input alphabet is bound by some constant, then the order of Shannon function of experiment complexity is the same for al k; otherwise there emerges a lower bound of the order nk.


2009 ◽  
Vol 20 (04) ◽  
pp. 647-667
Author(s):  
FRANÇOIS CANTIN ◽  
AXEL LEGAY ◽  
PIERRE WOLPER

This paper considers the problem of computing the real convex hull of a finite set of n-dimensional integer vectors. The starting point is a finite-automaton representation of the initial set of vectors. The proposed method consists in computing a sequence of automata representing approximations of the convex hull and using extrapolation techniques to compute the limit of this sequence. The convex hull can then be directly computed from this limit in the form of an automaton-based representation of the corresponding set of real vectors. The technique is quite general and has been implemented.


2021 ◽  
Vol 28 (2) ◽  
pp. 89-100

It is inevitable for networks to be invaded during operation. The intrusion tolerance technology comes into being to enable invaded networks to provide the necessary network services. This paper introduces an automatic learning mechanism of the intrusion tolerance system to update network security strategy, and derives an intrusion tolerance finite automaton model from an existing intrusion tolerance model. The proposed model was quantified by the Markov theory to compute the stable probability of each state. The calculated stable probabilities provide the theoretical guidance and basis for administrators to better safeguard network security. Verification results show that it is feasible, effective, and convenient to integrate the Markov model to the intrusion tolerance finite automaton.


Sign in / Sign up

Export Citation Format

Share Document