Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 410.00Impact Factor 2024: 0.4
Fundamenta Informaticae is an international journal publishing original research results in all areas of theoretical computer science. Papers are encouraged contributing:
- solutions by mathematical methods of problems emerging in computer science
- solutions of mathematical problems inspired by computer science.
Topics of interest include (but are not restricted to): theory of computing, complexity theory, algorithms and data structures, computational aspects of combinatorics and graph theory, programming language theory, theoretical aspects of programming languages, computer-aided verification, computer science logic, database theory, logic programming, automated deduction, formal languages and automata theory, concurrency and distributed computing, cryptography and security, theoretical issues in artificial intelligence, machine learning, pattern recognition, algorithmic game theory, bioinformatics and computational biology, quantum computing, probabilistic methods, & algebraic and categorical methods.
Authors: Czaja, Ludwik | Penczek, Wojciech | Stencel, Krzysztof
Article Type: Other
DOI: 10.3233/FI-2016-1299
Citation: Fundamenta Informaticae, vol. 143, no. 1-2, pp. v-vi, 2016
Authors: Bazan, Jan G. | Bazan-Socha, Stanislawa | Buregwa-Czuma, Sylwia | Dydo, Lukasz | Rzasa, Wojciech | Skowron, Andrzej
Article Type: Research Article
Abstract: This article introduces a new method of a decision tree construction. Such construction is performed using additional cuts applied for a verification of the cuts’ quality in tree nodes during the classification of objects. The presented approach allows us to exploit the additional knowledge represented in the attributes which could be eliminated using greedy methods. The paper includes the results of experiments performed on data sets from a biomedical database and machine learning repositories. In order to evaluate the presented method, we compared its performance with the classification results of a local discretization decision tree, well known from literature. Our …new method outperforms the existing method, which is also confirmed by statistical tests. Show more
Keywords: rough sets, discretization, concept approximation, classifiers
DOI: 10.3233/FI-2016-1300
Citation: Fundamenta Informaticae, vol. 143, no. 1-2, pp. 1-18, 2016
Authors: Bazan, Jan G. | Szpyrka, Marcin | Szczur, Adam | Dydo, Lukasz | Wojtowicz, Hubert
Article Type: Research Article
Abstract: A new method of constructing classifiers from huge volume of temporal data is proposed in the paper. The novelty of introduced method finds expression in a multi-stage approach to build hierarchical classifiers that combines process mining, feature extraction based on temporal patterns and constructing classifiers based on a decision tree. Such an approach seems to be practical when dealing with huge volume of temporal data. As a proof of concept a system for packet-based network traffic anomaly detection was constructed, where anomalies are represented by spatio-temporal complex concepts and called by behavioral patterns. Hierarchical classifiers constructed with the new approach …turned out to be better than “flat” classifiers based directly on captured network traffic data. Show more
Keywords: classifiers, huge temporal data, temporal patterns, state graphs, behavioral patterns, LTL temporal logic
DOI: 10.3233/FI-2016-1301
Citation: Fundamenta Informaticae, vol. 143, no. 1-2, pp. 19-34, 2016
Authors: Bellia, Marco | Occhiuto, M. Eugenia
Article Type: Research Article
Abstract: The paper considers molecular programming in the abstract Tile Assembly Model, aTAM. Using simple constructions, an interpreter for the full Combinatory Logic, CL, is formally defined in aTAM. It provides an approach for sequential programming in aTAM, and produces a DNA molecular machine. This machine lives in a suitable solution and when receives a seed that linearly encodes a CL program and an input for the program, produces a grid which encodes a computation of the program on its input. The paper considers the construction cost and some alternative approaches. Finally, as a case study in distributed programming in aTAM, …the paper considers the consensus problem and shows how an aTAM program for it can be formally derived by using π-calculus. Show more
Keywords: DNA Tile self assembly, aTAM model, Combinatory Logic, π-calculus, Consensus problem
DOI: 10.3233/FI-2016-1302
Citation: Fundamenta Informaticae, vol. 143, no. 1-2, pp. 35-49, 2016
Authors: Castiglioni, Valentina | Lanotte, Ruggero | Tini, Simone
Article Type: Research Article
Abstract: We study function elimination for Arithmetical Logics. We propose a method allowing substitution of functions occurring in a given formula with functions with less arity. We prove the correctness of the method and we use it to show the decidability of the satisfiability problem for two classes of formulas allowing linear and polynomial terms.
DOI: 10.3233/FI-2016-1303
Citation: Fundamenta Informaticae, vol. 143, no. 1-2, pp. 51-71, 2016
Authors: Gruska, Damas P.
Article Type: Research Article
Abstract: A quantification of process’s security by differential privacy is defined and studied in the framework of probabilistic process algebras. The resulting (quantitative) security properties are investigated and compared with other (qualitative and quantitative) security notions.
Keywords: differential privacy, probabilistic process algebra, information flow, security, opacity, min-entropy
DOI: 10.3233/FI-2016-1304
Citation: Fundamenta Informaticae, vol. 143, no. 1-2, pp. 73-87, 2016
Authors: Köhler-Bußmeier, Michael | Heitmann, Frank
Article Type: Research Article
Abstract: In this paper we study the complexity of the reachability problem HORNETS, an algebraic extension of object nets. Here we consider the restricted class of safe, elementary HORNETS. In previous work we established the lower bound, i.e. reachability requires at least exponential space. In another work we have shown we can simulate elementary HORNETS with elementary object nets EOS, where reachability is known to be PSpace-complete. Since this simulation leads to a double exponential increase in the size of the simulating EOS, we obtain that for HORNETS the reachability problem is solvable in double exponential space. In this …contribution we show that this kind of simulation is rather bad, since we show that exponential space is sufficient. Together with the known lower bound this shows that the upper is tight. Show more
Keywords: Hornets, nets-within-nets, object nets, reachability, safeness
DOI: 10.3233/FI-2016-1305
Citation: Fundamenta Informaticae, vol. 143, no. 1-2, pp. 89-100, 2016
Authors: Lomazova, Irina A. | Popova-Zeugmann, Louchka
Article Type: Research Article
Abstract: In this paper we examine how it is possible to control Petri net behavior with the help of transition priorities. Controlling here means forcing a process to behave in a stable way by ascribing priorities to transitions and hence transforming a classic Petri net into a Priority Petri net. For Petri net models stability is often ensured by liveness and boundedness. These properties are crucial in many application areas, e.g. workflow modeling, embedded systems design, and bioinformatics. In this paper we study the problem of transforming a given live, but unbounded Petri net into a live and bounded one …by adding priority constraints. We specify necessary conditions for the solvability of this problem and present an algorithm for ascribing priorities to net transitions in such a way that the resulting net becomes bounded while staying live. Show more
DOI: 10.3233/FI-2016-1306
Citation: Fundamenta Informaticae, vol. 143, no. 1-2, pp. 101-112, 2016
Authors: Nguyen, Linh Anh
Article Type: Research Article
Abstract: Combining CPDL (Propositional Dynamic Logic with Converse) and regular grammar logic results in an expressive modal logic denoted by CPDLreg . This logic covers TEAM LOG , a logical formalism used to express properties of agents’ cooperation in terms of beliefs, goals and intentions. It can also be used as a description logic for expressing terminological knowledge, in which both regular role inclusion axioms and CPDL-like role constructors are allowed. In this paper, we develop an expressive and tractable rule language called Horn-CPDLreg . As a special property, this rule language allows the concept constructor “universal restriction” to …appear on the left hand side of general concept inclusion axioms. We use a special semantics for Horn-CPDLreg that is based on pseudo-interpretations. It is called the constructive semantics and coincides with the traditional semantics when the concept constructor “universal restriction” is disallowed on the left hand side of concept inclusion axioms or when the language is used as an epistemic formalism and the accessibility relations are serial. We provide an algorithm with PTIME data complexity for checking whether a knowledge base in Horn-CPDLreg has a pseudo-model. This shows that the instance checking problem in Horn-CPDLreg with respect to the constructive semantics has PTIME data complexity. Show more
DOI: 10.3233/FI-2016-1307
Citation: Fundamenta Informaticae, vol. 143, no. 1-2, pp. 113-139, 2016
Authors: Redziejowski, Roman R.
Article Type: Research Article
Abstract: Parsing Expression Grammar (PEG) encodes a recursive-descent parser with limited backtracking. It has been recently noticed that in the situation when the parser is to explore several alternatives one after another, no further alternatives need to be explored after the parser reached certain “cut point”. This fact can be used to save both processing time and storage. The subject of the paper is identification of cut points, which can also help in producing better diagnostics.
DOI: 10.3233/FI-2016-1308
Citation: Fundamenta Informaticae, vol. 143, no. 1-2, pp. 141-149, 2016
Authors: Suraj, Zbigniew | Lasek, Agnieszka | Lasek, Piotr
Article Type: Research Article
Abstract: In 1973 Lotfi Zadeh introduced the theory of fuzzy logic [17]. Fuzzy logic was an extension of Boolean logic so that it allowed using not only Boolean values to express reality. One kind of basic logical operations in fuzzy logic are so-called fuzzy implications. From over eight decades a number of different fuzzy implications have been described [3] - [16]. In the family of all fuzzy implications the partial order induced from [0,1] interval exists. Pairs of incomparable fuzzy implications can generate new fuzzy implications by using min(inf) and max(sup) operations. As a result the structure of lattice …is created ([1], page 186). This leads to the following question: how to choose the correct functions among basic fuzzy implications and other generated as described above. In our paper, we propose a new method for choosing implications. Our method allows to compare two fuzzy implications. If the truth value of the antecedent and the truth value of the implication are given, by means of inverse fuzzy implications we can easily optimize the truth value of the implication consequent. In other words, we can choose the fuzzy implication, which has the greatest or the smallest truth value of the implication consequent or which has greater or smaller truth value than another implication. Primary results regarding this problem are included in the paper [14]. Show more
DOI: 10.3233/FI-2016-1309
Citation: Fundamenta Informaticae, vol. 143, no. 1-2, pp. 151-171, 2016
Authors: Woźna-Szcześniak, Bożena
Article Type: Research Article
Abstract: We present WECTL*KD, a weighted branching time temporal logic to specify knowledge, and correct functioning behaviour in multi-agent systems (MAS). We interpret the formulae of the logic over models generated by weighted deontic interpreted systems (WDIS). Furthermore, we investigate a SAT-based bounded model checking (BMC) technique for WDIS and for WECTL*KD.
DOI: 10.3233/FI-2016-1310
Citation: Fundamenta Informaticae, vol. 143, no. 1-2, pp. 173-205, 2016
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]