Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 410.00Impact Factor 2024: 0.4
Fundamenta Informaticae is an international journal publishing original research results in all areas of theoretical computer science. Papers are encouraged contributing:
- solutions by mathematical methods of problems emerging in computer science
- solutions of mathematical problems inspired by computer science.
Topics of interest include (but are not restricted to): theory of computing, complexity theory, algorithms and data structures, computational aspects of combinatorics and graph theory, programming language theory, theoretical aspects of programming languages, computer-aided verification, computer science logic, database theory, logic programming, automated deduction, formal languages and automata theory, concurrency and distributed computing, cryptography and security, theoretical issues in artificial intelligence, machine learning, pattern recognition, algorithmic game theory, bioinformatics and computational biology, quantum computing, probabilistic methods, & algebraic and categorical methods.
Authors: Burkhard, Hans-Dieter | Lindemann, Gabriela | Starke, Peter | Czaja, Ludwik
Article Type: Other
Keywords:
Citation: Fundamenta Informaticae, vol. 55, no. 2, pp. i-i, 2003
Authors: Bashkin, Vladimir A. | Lomazova, Irina A.
Article Type: Research Article
Abstract: Resources are defined as submultisets of Petri net markings. Two resources are called similar if replacing one of them by another in any marking doesn't change the Petri net's behavior. We define the relations of resource similarity and resource bisimulation and show that they are finitely based. In this paper the resource bisimulation is studied for different classes of Petri nets: ordinary Petri nets, high-level Petri nets and nested Petri nets — Petri nets with Petri …nets as tokens. Show more
Keywords: Petri nets, resource similarity, bisimulation equivalence, high-level Petri nets, nested Petri nets
Citation: Fundamenta Informaticae, vol. 55, no. 2, pp. 101-114, 2003
Authors: Bellia, Marco | Occhiuto, Eugenia M.
Article Type: Research Article
Abstract: MGU_{mon} and MGU_{k-rep} have a complementary role in unification in the complexity class NC. MGU_mon is the upper bound of the unification classes that fall in NC and whose inputs admit an unrestricted number of repeated variables. MGU_{k-rep} is the upper bound of the unification classes that still fall in NC but whose inputs admit an unrestricted arity on term constructors. No LogSpace reduction of the one to the other class is known. Moreover, very fast …algorithms that solve the two separately are well known but no one is able to compute with both in polylog PRAM-Time. N-axioms unification extends the structure of unification inputs and brings out the notion of interleaving variable as a special repeated variable which serializes independet computations. Based on it, we define the unification class AMGU^k_{p/h} whose inputs have a fixed number of interleaving variables but admit unrestricted number of repeated variables and, at the same time, unrestricted arity for term constructors. Constructively, we prove that AMGU^k_{p/h} is in NC by introducing a new unification algorithm that works on graph contractions and solves AMGU^k_{p/h} in a polylog PRAM time of the input size. Finally, we prove that MGU_{mon}, MGU_{k-rep} , and MGU_{linear} all are LogSpace reducible to AMGU^k_{p/h}. Hence, AMGU^k_{p/h} becomes the upper bound of the unification classes that are proved to be in NC. Show more
Keywords: N-axioms unification, PRAM algorithms, complexity classes, graph contractions, intervealing variables
Citation: Fundamenta Informaticae, vol. 55, no. 2, pp. 115-128, 2003
Authors: Farwer, Berndt | Misra, Kundan
Article Type: Research Article
Abstract: Fehling's hierarchical Petri nets are a net modelling framework based on refinement and abstraction of nets. Object Petri nets are a Petri net-based method of encapsulation. We bring these two domains together in the new concept of hierarchical object Petri nets. Defining hierarchical object Petri nets forces us to consider what it means to preserve synchronisation when abstracting or refining an object Petri net. The goal is to provide a sound theoretical basis for building computer …tools to develop high-level Petri net models following the nets-within-nets paradigm. Show more
Citation: Fundamenta Informaticae, vol. 55, no. 2, pp. 129-147, 2003
Authors: Pancerz, Krzysztof | Suraj, Zbigniew
Article Type: Research Article
Abstract: The synthesis problem of concurrent data models from experimental tables based on rough set approach has earlier been discussed [14], [15] Classical Petri nets have been used as a model for concurrency. In this paper we propose the nets with inhibitor expressions and Coloured Petri Nets as models for concurrency. The nets with inhibitor expressions are defined on the base of so called inhibitor rules extracted from modelled systems. The approach presented in this paper enables …to implement the algorithms for easier construction of Petri net models. The proposed approach can be applied to discover data models in semi-automatic way. The obtained models enable us to determine all global states of a modelled system represented by an information system, consistent with all rules extracted from the given information system. Show more
Keywords: information system, rough sets, concurrency, nets with inhibitor expressions, Coloured Petri Nets
Citation: Fundamenta Informaticae, vol. 55, no. 2, pp. 149-165, 2003
Authors: Penczek, Wojciech | Lomuscio, Alessio
Article Type: Research Article
Abstract: We present a framework for verifying temporal and epistemic properties of multi-agent systems by means of bounded model checking. We use interpreted systems as underlying semantics. We give details of the proposed technique, and show how it can be applied to the "attacking generals problem", a typical example of coordination in multi-agent systems.
Citation: Fundamenta Informaticae, vol. 55, no. 2, pp. 167-185, 2003
Authors: Popova-Zeugmann, Louchka | Werner, Matthias | Richling, Jan
Article Type: Research Article
Abstract: Non-reachability proofs in Timed Petrinets were usually done by proving the non-reachability within the underlying timeless net. However, in many cases this approach fails. In this paper, we present an approach to prove non-reachability within the actual Timed Petrinet. For this purpose, we introduce a state equation for Timed Petrinets in analogy to timeless nets. Using this state equation, we can express reachability as a system of equations and inequations, which is solvable in polynomial time.
Keywords: Timed Petrinet, duration net, state equation, non-reachability
Citation: Fundamenta Informaticae, vol. 55, no. 2, pp. 187-202, 2003
Authors: Półrola, Agata | Penczek, Wojciech | Szreter, Maciej
Article Type: Research Article
Abstract: The paper presents a new method for checking reachability properties of Timed Automata. The idea consists in on-the-fly verification of a property on a pseudo-bisimulating model generated by a modified partitioning algorithm. Pseudo-bisimulating models are often much smaller than forward-reachability graphs commonly used in reachability analysis. A theoretical description of the algorithm is supported by several experimental results.
Citation: Fundamenta Informaticae, vol. 55, no. 2, pp. 203-221, 2003
Authors: Woźna, Bożena | Zbrzezny, Andrzej | Penczek, Wojciech
Article Type: Research Article
Abstract: The paper deals with the problem of checking reachability for timed automata. The main idea consists in combining the well-know forward reachability algorithm and the Bounded Model Checking (BMC) method. In order to check reachability of a~state satisfying some desired property, first the transition relation of a timed automaton is unfolded iteratively to some depth and encoded as a propositional formula. Next, the desired property is translated to a propositional formula and the satisfiability of the …conjunction of the two defined above formulas is checked. The unfolding of the transition relation can be terminated when either a state satisfying the property has been found or all the states of the timed automaton have been searched. The efficiency of the method is strongly supported by the experimental results. Show more
Keywords: , ,
Citation: Fundamenta Informaticae, vol. 55, no. 2, pp. 223-241, 2003
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]