Information Technology Reference
In-Depth Information
of configurations related to u . We show how safe sets of configurations can be
defined from such sets associated to smaller prefixes u of [ t 0 ]. This property will
be useful to derive an incremental algorithm for checking right-universality of
aVPA.
3.1 A Notion of Safety for Right-Universality
Γ be a non empty set of config-
Definition 3. Let
A
be a VPA and
C ⊆
Q
×
urations. Let u
Pref ( T Σ )
\{
}
be a non empty prefix of t 0 .
-
C
is safe for u if for every v such that uv
[ T Σ ] ,thereexist ( q,σ )
∈ C
and
Q f such that ( q,σ ) v
p
( p, ) in
A
.
-
C
is leaf-safe for u if for every v = av with a
Σ such that uv
[ T Σ ] ,there
Q f such that ( q,σ ) v
. 4
exist ( q,σ )
∈ C
and p
( p, ) in
A
Let Safe ( u )=
{C | C
is safe for u
}
and LSafe ( u )=
{C | C
is leaf-safe for u
}
.
Intuitively, as stated in Theorem 1 below, if
C
is the set of configurations
reached in
A
after reading u ,then
A
is right-universal w.r.t. u iff
C
is safe for u .
Indeed, for every possible v , one can find in
at least one configuration leading
to an accepting configuration after reading v . Before stating this theorem, let
us give the next definition. Let Reach ( u ) denote the set of configurations ( q,σ )
such that ( q 0 0 ) u
C
( q,σ ) for some initial configuration ( q 0 0 )of
A
.
Theorem 1.
A
is right-universal w.r.t. u iff Reach ( u )
Safe ( u ) .
Let us illustrate this on the VPA A depicted in Figure 2a. Recall that this
VPA checks that the tree has a g -node with an f -child. After opening a g -root,
the set of safe configurations is Safe ( g )= {{ ( q 2 1 ) },{ ( q 2 0 ) }} , which does
not contain the set of reached configurations, as Reach ( g )=
{
( q 1 0 )
}
. Indeed,
A
is not right-universal w.r.t. g ,asno f -node has been encountered yet un-
der a g -node. For the word gf , as expected, the situation differs: Safe ( gf )=
{{
( q 2 1 γ 0 )
}
,
{
( q 2 0 γ 0 )
}}
,and Reach ( gf )=
{
( q 2 0 γ 0 )
}
is a safe set of config-
urations. By Theorem 1,
is right-universal w.r.t. gf .
Hence, an algorithm computing both Reach ( u )and Safe ( u ) can decide right-
universality w.r.t. u .Theset Reach ( u ) is easy to compute, just by firing tran-
sitions of the VPA. In Sections 3.2-3.4, we detail how the set Safe ( u )canbe
defined from the set Safe ( u ) with u a proper prefix of u .Inthisway,while
reading the linearization [ t 0 ]ofagiventree t 0 ,theset Safe ( u ) with u
A
= prefix
of [ t 0 ], can be incrementally defined. In Section 4, we turn this approach into an
algorithm.
4 The name “leaf-safe” comes from the fact that we only consider suxes starting
with a Σ symbol, and thus continuations of the tree that do not add children to the
current node.
 
Search WWH ::




Custom Search