Searching for just a few words should be enough to get started. If you need to make more complex queries, use the tips below to guide you.
Purchase individual online access for 1 year to this journal.
Price: EUR 410.00Impact Factor 2024: 0.4
Fundamenta Informaticae is an international journal publishing original research results in all areas of theoretical computer science. Papers are encouraged contributing:
- solutions by mathematical methods of problems emerging in computer science
- solutions of mathematical problems inspired by computer science.
Topics of interest include (but are not restricted to): theory of computing, complexity theory, algorithms and data structures, computational aspects of combinatorics and graph theory, programming language theory, theoretical aspects of programming languages, computer-aided verification, computer science logic, database theory, logic programming, automated deduction, formal languages and automata theory, concurrency and distributed computing, cryptography and security, theoretical issues in artificial intelligence, machine learning, pattern recognition, algorithmic game theory, bioinformatics and computational biology, quantum computing, probabilistic methods, & algebraic and categorical methods.
Authors: Grochowalski, Piotr | Pancerz, Krzysztof
Article Type: Research Article
Abstract: The paper gives the outline of an ontology for the rough set theory and its applications. This ontology will be applied in intelligent searching the Rough Set Database System. A specialized editor from the Protege system is used to define the ontology.
Keywords: ontology, rough sets, data mining, knowledge discovery, database systems
DOI: 10.3233/FI-2009-0093
Citation: Fundamenta Informaticae, vol. 93, no. 1-3, pp. 143-154, 2009
Authors: Gruska, Damas P.
Article Type: Research Article
Abstract: A quantification of process's security by quantification of an amount of information flow is defined and studied in the framework of timed process algebras. The resulting quantified security is compared with other (qualitative) security notions. Unprecise and limited observations are defined and discussed.
Keywords: information flow, information theory, opacity, surprisal, uncertainty, security, unprecise and limited observations
DOI: 10.3233/FI-2009-0094
Citation: Fundamenta Informaticae, vol. 93, no. 1-3, pp. 155-169, 2009
Authors: van Hee, Kees M. | Sidorova, Natalia | Voorhoeve, Marc | van derWerf, Jan Martijn
Article Type: Research Article
Abstract: Deleting a record from a database table without modifying other records or tables can easily lead to a violation of the database constraints. The same holds for other database operations. In this paper we generate descriptions of transactions triggered by a given operation, guaranteeing that if the database is in a consistent state before a transaction starts, it will be in a consistent state after it is finished. We describe transactions as models of a special …subclass of Coloured Petri nets where token values are vectors of identifiers. This class is powerful enough to model transaction execution and it allows for some formal analysis, like soundness. Show more
DOI: 10.3233/FI-2009-0095
Citation: Fundamenta Informaticae, vol. 93, no. 1-3, pp. 171-184, 2009
Authors: Jakubowska, Gizela | Dembiński, Piotr | Penczek, Wojciech | Szreter, Maciej
Article Type: Research Article
Abstract: In this paper we offer a methodology allowing for simulation of security protocols, implemented in the higher-level language Estelle, using scenarios designed for external attacks. To this aim we apply a translation of specifications of security protocols from Common Syntax to Estelle and an encoding of schemes of attacks into Estelle scenarios. We show that such an intelligent simulation may efficiently serve for validating security protocols.
DOI: 10.3233/FI-2009-0096
Citation: Fundamenta Informaticae, vol. 93, no. 1-3, pp. 185-203, 2009
Authors: Kohler-Bußmeier, Michael | Heitmann, Frank
Article Type: Research Article
Abstract: In this work we present object net systems, i.e. Petri nets with nets as token objects, which are equipped with channels that allow to transfer net-tokens in the vertical dimension of the nested marking. These channels are a modelling element powerful enough to describe a direct simulation of counter programs which shows that typical net problems like boundedness, coverability, and reachability are undecidable.
DOI: 10.3233/FI-2009-0097
Citation: Fundamenta Informaticae, vol. 93, no. 1-3, pp. 205-219, 2009
Authors: Kudlek, Manfred | Totzke, Patrick | Zetzsche, Georg
Article Type: Research Article
Abstract: Multiset finite Automata, a model equivalent to regular commutative grammars, are extended with a multiset store and the accepting power of this extended model of computation is investigated. This type of multiset automata come in two flavours, varying only in the ability of testing the storage for emptiness. This paper establishes normal forms and relates the derived language classes to each other as well as to known multiset language classes.
Keywords: commutative grammars and automata, Petri nets, multiset rewriting and languages
DOI: 10.3233/FI-2009-0098
Citation: Fundamenta Informaticae, vol. 93, no. 1-3, pp. 221-233, 2009
Authors: Kudlek, Manfred | Totzke, Patrick | Zetzsche, Georg
Article Type: Research Article
Abstract: The previously introduced multiset language classes defined by multiset pushdown automata are being explored with respect to their closure properties and alternative characterizations.
Keywords: commutative grammars and automata, Petri nets, multiset rewriting and languages
DOI: 10.3233/FI-2009-0099
Citation: Fundamenta Informaticae, vol. 93, no. 1-3, pp. 235-244, 2009
Authors: Kurkowski, Mirosław | Penczek, Wojciech
Article Type: Research Article
Abstract: A new approach to verification of timed security protocols is given. The idea consists in modelling a finite number of users (including an intruder) of the computer network and their knowledge about secrets by timed automata. The runs of the product automaton of the above automata correspond to all the behaviours of the protocol for a fixed number of sessions. Verification is performed using the module BMC of the tool VerICS.
Keywords: timed security protocols, model checking, authentication
DOI: 10.3233/FI-2009-0100
Citation: Fundamenta Informaticae, vol. 93, no. 1-3, pp. 245-259, 2009
Authors: Moshkov, Mikhail Ju. | Skowron, Andrzej | Suraj, Zbigniew
Article Type: Research Article
Abstract: The minimal inhibitory rules for information systems can be used for construction of classifiers. We show that almost all information systems from a certain large class of information systems have relatively short minimal inhibitory rules. However, the number of such rules is not polynomial in the number of attributes and the number of objects. This class consists of all k-valued information systems, k ⩾ 2, with the number of objects polynomial in the number of attributes. …Hence, for efficient construction of classifiers some filtration techniques in rule generation are necessary. Another way is to work with lazy classification algorithms based on inhibitory rules. Show more
Keywords: Information systems, minimal inhibitory rules, irreducible inconsistent systems of equations
DOI: 10.3233/FI-2009-0101
Citation: Fundamenta Informaticae, vol. 93, no. 1-3, pp. 261-272, 2009
Authors: Nguyen, Linh Anh
Article Type: Research Article
Abstract: We report on our implementation of a tableau prover for the description logic ALC, which is based on the EXPTIME tableau algorithm using global caching for ALC that was developed jointly by us and Goré [9]. The prover, called TGC for "Tableaux with Global Caching", checks satisfiability of a set of concepts w.r.t. a set of global assumptions by constructing an and-or graph, using tableau rules for expanding nodes. We have implemented for TGC a special …set of optimizations which co-operates very well with global caching and various search strategies. The test results on the test set T98-sat of DL'98 Systems Comparison indicate that TGC is an efficient prover for ALC. This suggests that global caching together with the set of optimizations used for TGC is worth implementing and experimenting also for other modal/description logics. Show more
Keywords: automated reasoning, tableaux, description logic, global caching, optimizations
DOI: 10.3233/FI-2009-0102
Citation: Fundamenta Informaticae, vol. 93, no. 1-3, pp. 273-288, 2009
IOS Press, Inc.
6751 Tepper Drive
Clifton, VA 20124
USA
Tel: +1 703 830 6300
Fax: +1 703 830 2300
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
IOS Press
Nieuwe Hemweg 6B
1013 BG Amsterdam
The Netherlands
Tel: +31 20 688 3355
Fax: +31 20 687 0091
[email protected]
For editorial issues, permissions, book requests, submissions and proceedings, contact the Amsterdam office [email protected]
Inspirees International (China Office)
Ciyunsi Beili 207(CapitaLand), Bld 1, 7-901
100025, Beijing
China
Free service line: 400 661 8717
Fax: +86 10 8446 7947
[email protected]
For editorial issues, like the status of your submitted paper or proposals, write to [email protected]
如果您在出版方面需要帮助或有任何建, 件至: [email protected]