https://arxiv.org/api/OtHtqgyic9TeeMUR8hFHCY8PS1I2026-03-28T11:07:19Z587913515http://arxiv.org/abs/2602.09360v1The Similarity Control Problem with Required Events2026-02-10T03:09:47ZIn order to guarantee that a supervised system satisfies safety requirements of the specification, as well as requirements saying that in certain states certain events must be enabled, this paper introduces required events for discrete event systems and reconsiders the similarity control problem while taking all requirements from the specification into account. The notion of a covariant-contravariant simulation, which is finer than the conventional notion of simulation, is adopted to act as the behavioral relation of supervisory control theory. A necessary and sufficient condition for the solvability of this problem is established and a method for synthesizing a maximally permissive supervisor is provided.2026-02-10T03:09:47Z12 pagesYu WangZhaohui ZhuRob van GlabbeekdJinjin ZhangYixuan Lihttp://arxiv.org/abs/2602.09197v1Global Protocols under Rendezvous Synchrony: From Realizability to Type Checking2026-02-09T21:05:13ZGlobal protocol specifications are the starting point of top-down verification methodologies, and serve as a blueprint for synthesizing local specifications that guarantee the correctness of distributed implementations. In this work, we study global protocol specifications targeting distributed processes that communicate via rendezvous synchrony. We obtain the following positive results for the synchronous realizability problem: (a) realizability is decidable for global protocols over a transitive concurrency alphabet in 2-EXPTIME in the size of the protocol, and in 3-EXPTIME in the size of the alphabet, and (b) realizability is decidable in EXPTIME for global protocols that unambiguously represent their trace language. Unambiguous global protocols encompass fragments of directed and sender-driven choice protocols studied in prior work. Further, our reductions admit the corollary that the synchronous verification problem is solvable with the same complexity, where a candidate realization is included as part of the input. We then prove a negative result stating that synchronous realizability is undecidable in general. Finally, we propose a type system to check pi-calculus processes against local specifications in the form of synchronous communicating state machines. Our type system is the first to support processes with local mixed choice in the presence of session interleaving and~delegation.2026-02-09T21:05:13ZElaine LiFelix Stutzhttp://arxiv.org/abs/2402.13086v2Profinite trees, through Lawvere theories and the lambda-calculus2026-02-09T14:39:00ZThe starting point of algebraic language theory is that regular languages of finite words are exactly those recognized by finite monoids. This finiteness condition gives rise to a topological space whose points, called profinite words, encode the limiting behavior of words with respect to finite monoids.
In this work, we move from words and monoids to trees and clones, the algebraic structures underlying deterministic bottom-up tree automata. Using the categorical notion of codensity monad, we introduce a profinite completion for clones. We prove that this construction on clones simultaneously generalizes the ultrafilter monad on sets and the profinite completion of monoids. When applied to free clones on a ranked alphabet, the profinite completion of clones yields a notion of profinite tree, providing a topological approach to regular languages of finite trees. We prove that these profinite trees coincide with a well-identified fragment of the profinite lambda-calculus.2024-02-20T15:28:27ZVincent Moreauhttp://arxiv.org/abs/2602.08549v1An Automata-Based Approach to Games with $ω$-Automatic Preferences2026-02-09T11:50:23ZThis paper studies multiplayer turn-based games on graphs in which player preferences are modeled as $ω$-automatic relations given by deterministic parity automata. This contrasts with most existing work, which focuses on specific reward functions. We conduct a computational analysis of these games, starting with the threshold problem in the antagonistic zero-sum case. As in classical games, we introduce the concept of value, defined here as the set of plays a player can guarantee to improve upon, relative to their preference relation. We show that this set is recognized by an alternating parity automaton APW of polynomial size. We also establish the computational complexity of several problems related to the concepts of value and optimal strategy, taking advantage of the $ω$-automatic characterization of value. Next, we shift to multiplayer games and Nash equilibria, and revisit the threshold problem in this context. Based on an APW construction again, we close complexity gaps left open in the literature, and additionally show that cooperative rational synthesis is $\mathsf{PSPACE}$-complete, while it becomes undecidable in the non-cooperative case.2026-02-09T11:50:23ZVéronique BruyèreEmmanuel FiliotChristophe GrandmontJean-François Raskinhttp://arxiv.org/abs/2511.12974v2Formal Foundations for Controlled Stochastic Activity Networks2026-02-08T22:59:07ZWe introduce Controlled Stochastic Activity Networks (Controlled SANs), a formal extension of classical Stochastic Activity Networks that integrates explicit control actions into a unified semantic framework for modeling distributed real-time systems. Controlled SANs systematically capture dynamic behavior involving nondeterminism, probabilistic branching, and stochastic timing, while enabling policy-driven decision-making within a rigorous mathematical framework.
We develop a hierarchical, automata-theoretic semantics for Controlled SANs that encompasses nondeterministic, probabilistic, and stochastic models in a uniform manner. A structured taxonomy of control policies, ranging from memoryless and finite-memory strategies to computationally augmented policies, is formalized, and their expressive power is characterized through associated language classes. To support model abstraction and compositional reasoning, we introduce behavioral equivalences, including bisimulation and stochastic isomorphism.
Controlled SANs generalize classical frameworks such as continuous-time Markov decision processes (CTMDPs), providing a rigorous foundation for the specification, verification, and synthesis of dependable systems operating under uncertainty. This framework enables both quantitative and qualitative analysis, advancing the design of safety-critical systems where control, timing, and stochasticity are tightly coupled.2025-11-17T04:51:01Z91 pages. An extended version of a manuscript submitted to Information and Computation. Includes additional results, proofs, and technical appendicesAli Movagharhttp://arxiv.org/abs/2602.07964v1Wheeler Bisimulations2026-02-08T13:23:15ZRecently, a new paradigm was introduced in automata theory. The main idea is to classify regular languages according to their propensity to be sorted, establishing a deep connection between automata theory and data compression [J. ACM 2023]. This parameterization leads to two hierarchies of regular languages: a deterministic hierarchy and a non-deterministic hierarchy. While the deterministic hierarchy is well understood, the non-deterministic hierarchy appears much more complex. This is true even for the richest and most studied level of the hierarchies, corresponding to the class of Wheeler languages.
In this paper, we study Wheeler language through the lens of bisimulations. We first show that the standard notion of bisimulation is not appropriate. Then, we introduce Wheeler bisimulations, that is, bisimulations that respect the convex structure of the considered Wheeler automata. Although there are some differences between the properties of bisimulations and the properties of Wheeler bisimulations, we show that Wheeler bisimulations induce a unique minimal Wheeler NFA (analogously to standard bisimulations). In particular, in the deterministic case, we retrieve the minimum Wheeler deterministic automaton of a given language. We also show that the minimal Wheeler NFA induced by Wheeler bisimulations can be built in linear time. This is in contrast with standard bisimulations, for which the corresponding minimal NFA can be built in $ O(m \log n) $ time (where $ m $ is the number of edges and $ n $ is the number of states) by adapting Paige-Tarjan's partition refinement algorithm.2026-02-08T13:23:15ZNicola Cotumacciohttp://arxiv.org/abs/2602.07473v1Computing the Reachability Value of Posterior-Deterministic POMDPs2026-02-07T10:09:41ZPartially observable Markov decision processes (POMDPs) are a fundamental model for sequential decision-making under uncertainty. However, many verification and synthesis problems for POMDPs are undecidable or intractable. Most prominently, the seminal result of Madani et al. (2003) states that there is no algorithm that, given a POMDP and a set of target states, can compute the maximal probability of reaching the target states, or even approximate it up to a non-trivial constant. This is in stark contrast to fully observable Markov decision processes (MDPs), where the reachability value can be computed in polynomial time.
In this work, we introduce posterior-deterministic POMDPs, a novel class of POMDPs. Our main technical contribution is to show that for posterior-deterministic POMDPs, the maximal probability of reaching a given set of states can be approximated up to arbitrary precision.
A POMDP is posterior-deterministic if the next state can be uniquely determined by the current state, the action taken, and the observation received. While the actual state is generally uncertain in POMDPs, the posterior-deterministic property tells us that once the true state is known it remains known forever. This simple and natural definition includes all MDPs and captures classical non-trivial examples such as the Tiger POMDP (Kaelbling et al. 1998), making it one of the largest known classes of POMDPs for which the reachability value can be approximated.2026-02-07T10:09:41ZNathanaël FijalkowArka GhoshRoman KniazevGuillermo A. PérezPierre Vandenhovehttp://arxiv.org/abs/2511.13806v2Optimal Sequential Flows2026-02-06T17:16:37ZWe provide a new algebraic technique to solve the sequential flow problem in polynomial space. The task is to maximise the flow through a graph where edge capacities can be changed over time by choosing a sequence of capacity labelings from a given finite set. Our method is based on a novel factorization theorem for finite semigroups that, applied to a suitable flow semigroup, allows to derive small witnesses. This generalises to multiple in/output vertices, as well as regular constraints.2025-11-17T15:05:06ZHugo GimbertCorto MasclePatrick Totzkehttp://arxiv.org/abs/2601.01754v2Context-Free Recognition with Transformers2026-02-06T07:25:32ZTransformers excel empirically on tasks that process well-formed inputs according to some grammar, such as natural language and code. However, it remains unclear how they can process grammatical syntax. In fact, under standard complexity conjectures, standard transformers cannot recognize context-free languages (CFLs), a canonical formalism to describe syntax, or even regular languages, a subclass of CFLs. Past work proves that $\mathcal{O}(\log(n))$ looping layers (w.r.t. input length n) allows transformers to recognize regular languages, but the question of context-free recognition remained open. In this work, we show that looped transformers with $\mathcal{O}(\log(n))$ looping layers and $\mathcal{O}(n^6)$ padding tokens can recognize all CFLs. However, training and inference with $\mathcal{O}(n^6)$ padding tokens is potentially impractical. Fortunately, we show that, for natural subclasses such as unambiguous CFLs, the recognition problem on transformers becomes more tractable, requiring $\mathcal{O}(n^3)$ padding. We empirically validate our results and show that looping helps on a language that provably requires logarithmic depth. Overall, our results shed light on the intricacy of CFL recognition by transformers: While general recognition may require an intractable amount of padding, natural constraints such as unambiguity yield efficient recognition algorithms.2026-01-05T03:14:23ZSelim JeradAnej SveteSophie HaoRyan CotterellWilliam Merrillhttp://arxiv.org/abs/2602.04049v1A categorical framework for cellular automata2026-02-03T22:34:14ZThis paper proposes a generalized framework for cellular automata using the language of category theory, extending the classical definition beyond set-theoretic constraints. For an arbitrary category $\mathscr{C}$ with products, we define $\mathscr{C}$-cellular automata as morphisms $τ: A^G \to B^G$ in $\mathscr{C}$, where the alphabets $A$ and $B$ are objects in $\mathscr{C}$ and the universe is a group $G$. We show that $\mathscr{C}$-cellular automata form a subcategory of $\mathscr{C}$ closed under finite products, and that they satisfy a categorical version of the Curtis-Hedlund-Lyndon theorem. For two arbitrary group universes $G$ and $H$, we extend our theory to define generalized $\mathscr{C}$-cellular automata as morphisms $τ: A^G \to B^H$ constructed via a group homomorphism $φ: H \to G$. Finally, we prove that generalized $\mathscr{C}$-cellular automata form a subcategory of $\mathscr{C}$ with a finite weak product involving the free product of the underlying group universes. This framework unifies existing concepts and provides purely categorical proofs of foundational results in the theory of cellular automata.2026-02-03T22:34:14Z22 pagesA. Castillo-RamirezA. Vazquez-AcevesA. Zaldivar-Corichihttp://arxiv.org/abs/2602.01199v2On Normality and Equidistribution for Separator Enumerators2026-02-03T17:35:58ZA separator is a countable dense subset of $[0,1)$, and a separator enumerator is a naming scheme that assigns a real number in $[0,1)$ to each finite word so that the set of all named values is a separator. Mayordomo introduced separator enumerators to define $f$-normality and a relativized finite-state dimension $\dim^{f}_{\mathrm{FS}}(x)$, where finite-state dimension measures the asymptotic lower rate of finite-state information needed to approximate $x$ through its $f$-names. This framework extends classical base-$k$ normality, and Mayordomo showed that it supports a point-to-set principle for finite-state dimension. This representation-based viewpoint has since been developed further in follow-up work, including by Calvert et al., yielding strengthened randomness notions such as supernormal and highly normal numbers.
Mayordomo posed the following open question: can $f$-normality be characterized via equidistribution properties of the sequence $\left(|Σ|^{n} a^{f}_{n}(x)\right)_{n=0}^{\infty}$, where $a^{f}_{n}(x)$ is the sequence of best approximations to $x$ from below induced by $f$? We give a strong negative answer: we construct computable separator enumerators $f_0,f_1$ and a point $x$ such that $a^{f_0}_{n}(x)=a^{f_1}_{n}(x)$ for all $n$, yet $\dim^{f_0}_{\mathrm{FS}}(x)=0$ while $\dim^{f_1}_{\mathrm{FS}}(x)=1$. Consequently, no criterion depending only on the sequence $\left(|Σ|^{n} a^{f}_{n}(x)\right)_{n=0}^{\infty}$ - in particular, no equidistribution property of this sequence - can characterize $f$-normality uniformly over all separator enumerators. On the other hand, for a natural finite-state coherent class of separator enumerators we recover a complete equidistribution characterization of $f$-normality. We also show that beyond finite-state coherence, this characterization can fail even for a separator enumerator computable in nearly linear time.2026-02-01T12:41:00ZSubin Pularihttp://arxiv.org/abs/2602.03643v1A Probabilistic Model-Checking Framework for Cognitive Assessment and Training2026-02-03T15:26:49ZSerious games have proven to be effective tools for screening cognitive impairments and supporting diagnosis in patients with neurodegenerative diseases like Alzheimer's and Parkinson's. They also offer cognitive training benefits. According to the DSM-5 classification, cognitive disorders are categorized as Mild Neurocognitive Disorders (mild NCDs) and Major Neurocognitive Disorders (Major NCDs). In this study, we focus on three patient groups: healthy, mild NCD, and Major NCD. We employ Discrete Time Markov Chains to model the behavior exhibited by each group while interacting with serious games. By applying model-checking techniques, we can identify discrepancies between expected and actual gameplay behavior. The primary contribution of this work is a novel theoretical framework designed to assess how a practitioner's confidence level in diagnosing a patient's Alzheimer's stage evolves with each game session (diagnosis support). Additionally, we propose an experimental protocol where the difficulty of subsequent game sessions is dynamically adjusted based on the patient's observed behavior in previous sessions (training support).2026-02-03T15:26:49ZElisabetta De MariaChristopher Leturchttp://arxiv.org/abs/2602.03550v1Formal Evidence Generation for Assurance Cases for Robotic Software Models2026-02-03T14:01:30ZRobotics and Autonomous Systems are increasingly deployed in safety-critical domains, so that demonstrating their safety is essential. Assurance Cases (ACs) provide structured arguments supported by evidence, but generating and maintaining this evidence is labour-intensive, error-prone, and difficult to keep consistent as systems evolve. We present a model-based approach to systematically generating AC evidence by embedding formal verification into the assurance workflow. The approach addresses three challenges: systematically deriving formal assertions from natural language requirements using templates, orchestrating multiple formal verification tools to handle diverse property types, and integrating formal evidence production into the workflow. Leveraging RoboChart, a domain-specific modelling language with formal semantics, we combine model checking and theorem proving in our approach. Structured requirements are automatically transformed into formal assertions using predefined templates, and verification results are automatically integrated as evidence. Case studies demonstrate the effectiveness of our approach.2026-02-03T14:01:30ZThis is a preprint. The paper is currently under review at Software and Systems ModelingFang YanSimon FosterAna CavalcantiIbrahim HabliJames Baxterhttp://arxiv.org/abs/2602.02940v1A vector logic for intensional formal semantics2026-02-03T00:24:37ZFormal semantics and distributional semantics are distinct approaches to linguistic meaning: the former models meaning as reference via model-theoretic structures; the latter represents meaning as vectors in high-dimensional spaces shaped by usage. This paper proves that these frameworks are structurally compatible for intensional semantics. We establish that Kripke-style intensional models embed injectively into vector spaces, with semantic functions lifting to (multi)linear maps that preserve composition. The construction accommodates multiple index sorts (worlds, times, locations) via a compound index space, representing intensions as linear operators. Modal operators are derived algebraically: accessibility relations become linear operators, and modal conditions reduce to threshold checks on accumulated values. For uncountable index domains, we develop a measure-theoretic generalization in which necessity becomes truth almost everywhere and possibility becomes truth on a set of positive measure, a non-classical logic natural for continuous parameters.2026-02-03T00:24:37Z25 pages; 68 sourcesDaniel Quigleyhttp://arxiv.org/abs/2602.02909v1Reasoning about Reasoning: BAPO Bounds on Chain-of-Thought Token Complexity in LLMs2026-02-02T23:33:34ZInference-time scaling via chain-of-thought (CoT) reasoning is a major driver of state-of-the-art LLM performance, but it comes with substantial latency and compute costs. We address a fundamental theoretical question: how many reasoning tokens are required to solve a problem as input size grows? By extending the bounded attention prefix oracle (BAPO) model--an abstraction of LLMs that quantifies the information flow required to solve a task--we prove lower bounds on the CoT tokens required for three canonical BAPO-hard tasks: binary majority, triplet matching, and graph reachability. We show that each requires $Ω(n)$ reasoning tokens when the input size is $n$. We complement these results with matching or near-matching upper bounds via explicit constructions. Finally, our experiments with frontier reasoning models show approximately linear reasoning token scaling on these tasks and failures when constrained to smaller reasoning budgets, consistent with our theoretical lower bounds. Together, our results identify fundamental bottlenecks in inference-time compute through CoT and offer a principled tool for analyzing optimal reasoning length.2026-02-02T23:33:34Z28 pagesKiran TomlinsonTobias SchnabelAdith SwaminathanJennifer Neville