Skip to main content

Showing 1–10 of 10 results for author: Mestel, D

Searching in archive cs. Search in all archives.
.
  1. arXiv:2410.17185  [pdf, ps, other

    cs.LO cs.FL cs.PL

    The Decision Problem for Regular First-Order Theories

    Authors: Umang Mathur, David Mestel, Mahesh Viswanathan

    Abstract: The \emph{Entscheidungsproblem}, or the classical decision problem, asks whether a given formula of first-order logic is satisfiable. In this work, we consider an extension of this problem to regular first-order \emph{theories}, i.e., (infinite) regular sets of formulae. Building on the elegant classification of syntactic classes as decidable or undecidable for the classical decision problem, we s… ▽ More

    Submitted 28 December, 2024; v1 submitted 22 October, 2024; originally announced October 2024.

    Comments: To appear in POPL 2025 (Proceedings of ACM Programming Languages vol 9 POPL)

  2. arXiv:2409.18634  [pdf, other

    cs.DS q-bio.PE

    Split-or-decompose: Improved FPT branching algorithms for maximum agreement forests

    Authors: David Mestel, Steven Chaplick, Steven Kelk, Ruben Meuwese

    Abstract: Phylogenetic trees are leaf-labelled trees used to model the evolution of species. In practice it is not uncommon to obtain two topologically distinct trees for the same set of species, and this motivates the use of distance measures to quantify dissimilarity. A well-known measure is the maximum agreement forest (MAF): a minimum-size partition of the leaf labels which splits both trees into the sa… ▽ More

    Submitted 27 September, 2024; originally announced September 2024.

    Comments: 26 pages

  3. arXiv:2202.02069  [pdf, other

    cs.CR quant-ph

    Beware of Greeks bearing entanglement? Quantum covert channels, information flow and non-local games

    Authors: David Mestel

    Abstract: Can quantum entanglement increase the capacity of (classical) covert channels? To one familiar with Holevo's Theorem it is tempting to think that the answer is obviously no. However, in this work we show: quantum entanglement can in fact increase the capacity of a classical covert channel, in the presence of an active adversary; on the other hand, a zero-capacity channel is not improved by entangl… ▽ More

    Submitted 4 February, 2022; originally announced February 2022.

    Comments: 35th IEEE Symposium on Computer Security Foundations (CSF 2022)

  4. arXiv:2011.07887  [pdf, ps, other

    cs.CY cs.MA

    A Survey of Requirements for COVID-19 Mitigation Strategies. Part I: Newspaper Clips

    Authors: Wojciech Jamroga, David Mestel, Peter B. Roenne, Peter Y. A. Ryan, Marjan Skrobot

    Abstract: The COVID-19 pandemic has influenced virtually all aspects of our lives. Across the world, countries have applied various mitigation strategies for the epidemic, based on social, political, and technological instruments. We postulate that one should {identify the relevant requirements} before committing to a particular mitigation strategy. One way to achieve it is through an overview of what is co… ▽ More

    Submitted 18 October, 2023; v1 submitted 16 November, 2020; originally announced November 2020.

  5. arXiv:2007.01288  [pdf, other

    cs.CR

    Robust ambiguity for contact tracing

    Authors: David Mestel

    Abstract: A known drawback of `decentralised' contact tracing architectures is that users who have been in contact with an infected person are able to precisely identify the relevant contact, and thereby perhaps identify the infected person. In their proposal, the PACT team discuss a simple DH-based protocol to mitigate this problem, but dismiss it because it is vulnerable to a malicious user who may deviat… ▽ More

    Submitted 2 July, 2020; originally announced July 2020.

    Comments: 5 pages

  6. arXiv:1905.04332  [pdf, ps, other

    cs.LO cs.CR cs.IT

    Quantifying information flow in interactive systems

    Authors: David Mestel

    Abstract: We consider the problem of quantifying information flow in interactive systems, modelled as finite-state transducers in the style of Goguen and Meseguer. Our main result is that if the system is deterministic then the information flow is either logarithmic or linear, and there is a polynomial-time algorithm to distinguish the two cases and compute the rate of logarithmic flow. To achieve this we f… ▽ More

    Submitted 10 May, 2019; originally announced May 2019.

    Comments: 32nd IEEE Symposium on Computer Security Foundations (CSF 2019)

  7. arXiv:1904.09875  [pdf, ps, other

    cs.FL cs.LO

    Translating between models of concurrency

    Authors: David Mestel, A. W. Roscoe

    Abstract: Hoare's Communicating Sequential Processes (CSP) admits a rich universe of semantic models closely related to the van Glabbeek spectrum. In this paper we study finite observational models, of which at least six have been identified for CSP, namely traces, stable failures, revivals, acceptances, refusal testing and finite linear observations. We show how to use the recently-introduced \emph{priorit… ▽ More

    Submitted 22 April, 2019; originally announced April 2019.

  8. arXiv:1807.11609  [pdf, other

    cs.IT cs.DM

    A Proof of Entropy Minimization for Outputs in Deletion Channels via Hidden Word Statistics

    Authors: Arash Atashpendar, David Mestel, A. W. Roscoe, Peter Y. A. Ryan

    Abstract: From the output produced by a memoryless deletion channel from a uniformly random input of known length $n$, one obtains a posterior distribution on the channel input. The difference between the Shannon entropy of this distribution and that of the uniform prior measures the amount of information about the channel input which is conveyed by the output of length $m$, and it is natural to ask for whi… ▽ More

    Submitted 30 July, 2018; originally announced July 2018.

    Comments: 11 pages, 2 figures

  9. arXiv:1802.00703  [pdf, other

    cs.IT cs.DM

    From Clustering Supersequences to Entropy Minimizing Subsequences for Single and Double Deletions

    Authors: Arash Atashpendar, Marc Beunardeau, Aisling Connolly, Rémi Géraud, David Mestel, A. W. Roscoe, Peter Y. A. Ryan

    Abstract: A binary string transmitted via a memoryless i.i.d. deletion channel is received as a subsequence of the original input. From this, one obtains a posterior distribution on the channel input, corresponding to a set of candidate supersequences weighted by the number of times the received subsequence can be embedded in them. In a previous work it is conjectured on the basis of experimental data that… ▽ More

    Submitted 4 March, 2019; v1 submitted 2 February, 2018; originally announced February 2018.

    Comments: 25 pages, 2 figures, submitted to IEEE Transactions on Information Theory; added references, minor writing improvements, fixed a minor flaw in section 5, improved notation, added proof of entropy minimization for the Rényi entropy for the case of single deletions, improved the presentation of the proofs in the appendix, added more details to the framework section, results unchanged

  10. Widths of regular and context-free languages

    Authors: David Mestel

    Abstract: Given a partially-ordered finite alphabet $Σ$ and a language $L\subseteq Σ^*$, how large can an antichain in $L$ be (where $L$ is given the lexicographic ordering)? More precisely, since $L$ will in general be infinite, we should ask about the rate of growth of maximum antichains consisting of words of length $n$. This fundamental property of partial orders is known as the width, and in a companio… ▽ More

    Submitted 7 December, 2019; v1 submitted 25 September, 2017; originally announced September 2017.

    Comments: 22 pages

    MSC Class: F.4.3; G.2.1 ACM Class: F.4.3; G.2.1

    Journal ref: 39th IARCS Annual Conference on Foundations of Software Technology and Theoretical Computer Science (FSTTCS 2019)