https://arxiv.org/api/3us2K77bLd7VOKbJwM4ZzyP/vOM2026-03-24T09:56:26Z58764515http://arxiv.org/abs/2510.18479v2Formally Verified Linear-Time Invertible Lexing2026-03-06T15:36:59ZWe present ZipLex, a verified framework for invertible linear-time lexical analysis following the longest match semantics. Unlike past verified lexers that focus only on satisfying the semantics of regular expressions and the longest match property, ZipLex also guarantees that lexing and printing are mutual inverses. Thanks to verified memoization, it also ensures that the lexical analysis of a string is linear in the size of the string. Our design and implementation rely on two sets of ideas: (1) a new abstraction of token sequences that captures the separability of tokens in a sequence while supporting their efficient manipulation, and (2) a combination of verified data structures and optimizations, including Huet's zippers and memoization with a verified imperative hash table.
We implemented and verified ZipLex using the Stainless deductive verifier for Scala. Our evaluation demonstrates that ZipLex supports realistic applications such as JSON processing and lexers of programming languages, and behaves linearly even in cases that make flex-style approaches quadratic. ZipLex is two orders of magnitude faster than Verbatim++, showing that verified invertibility and linear-time algorithms can be developed without prohibitive cost. Compared to Coqlex, ZipLex also offers linear (instead of quadratic) time lexing, and is the first lexer that comes with invertibility proofs for printing token sequences.2025-10-21T09:58:08ZSamuel ChassotViktor Kunčakhttp://arxiv.org/abs/2603.05694v1Warm Starting State-Space Models with Automata Learning2026-03-05T21:35:28ZWe prove that Moore machines can be exactly realized as state-space models (SSMs), establishing a formal correspondence between symbolic automata and these continuous machine learning architectures. These Moore-SSMs preserve both the complete symbolic structure and input-output behavior of the original Moore machine, but operate in Euclidean space. With this correspondence, we compare the training of SSMs with both passive and active automata learning. In recovering automata from the SYNTCOMP benchmark, we show that SSMs require orders of magnitude more data than symbolic methods and fail to learn state structure. This suggests that symbolic structure provides a strong inductive bias for learning these systems. We leverage this insight to combine the strengths of both automata learning and SSMs in order to learn complex systems efficiently. We learn an adaptive arbitration policy on a suite of arbiters from SYNTCOMP and show that initializing SSMs with symbolically-learned approximations learn both faster and better. We see 2-5 times faster convergence compared to randomly initialized models and better overall model accuracies on test data. Our work lifts automata learning out of purely discrete spaces, enabling principled exploitation of symbolic structure in continuous domains for efficiently learning in complex settings.2026-03-05T21:35:28ZWilliam FishellSam Nicholas KouteiliMark Santolucitohttp://arxiv.org/abs/2603.06710v1Mining Beyond the Bools: Learning Data Transformations and Temporal Specifications2026-03-05T19:56:25ZMining specifications from execution traces presents an automated way of capturing characteristic system behaviors. However, existing approaches are largely restricted to Boolean abstractions of events, limiting their ability to express data-aware properties. In this paper, we extend mining procedures to operate over richer datatypes. We first establish candidate functions in our domain that cover the set of traces by leveraging Syntax Guided Synthesis (SyGuS) techniques. To capture these function applications temporally, we formalize the semantics of TSL$_f$, a finite-prefix interpretation of Temporal Stream Logic (TSL) that extends LTL$_f$ with support for first-order predicates and functional updates. This allows us to unify a corresponding procedure for learning the data transformations and temporal specifications of a system. We demonstrate our approach synthesizing reactive programs from mined specifications on the OpenAI-Gymnasium ToyText environments, finding that our method is more robust and orders of magnitude more sample-efficient than passive learning baselines on generalized problem instances.2026-03-05T19:56:25ZSam Nicholas KouteiliWilliam FishellChristian ScaffMark SantolucitoRuzica Piskachttp://arxiv.org/abs/2308.01174v11The Expansion Problem for Infinite Trees2026-03-05T18:14:33ZWe study Ramsey like theorems for infinite trees and similar combinatorial tools. As an application we consider the expansion problem for tree algebras.2023-08-02T14:26:08ZLogical Methods in Computer Science, Volume 22, Issue 1 (March 6, 2026) lmcs:12266Achim Blumensath10.46298/lmcs-22(1:20)2026http://arxiv.org/abs/2603.05380v1History-Deterministic Büchi Automata are Succinct2026-03-05T17:11:28ZWe describe a history-deterministic Büchi automaton that has strictly less states than every language-equivalent deterministic Büchi automaton. This solves a problem that had been open since the introduction of history-determinism and actively investigated for over a decade.
Our example automaton has 65 states, and proving its succinctness requires the combination of theoretical insights together with the aid of computers.2026-03-05T17:11:28Z40 pagesAntonio CasaresAditya PrakashK. S. Thejaswinihttp://arxiv.org/abs/2603.05331v1Computational Complexity of Alignments2026-03-05T16:12:48ZIn process mining, alignments quantify the degree of deviation between an observed event trace and a business process model and constitute the most important conformance checking technique. We study the algorithmic complexity of computing alignments over important classes of Petri nets. First, we show that the alignment problem is PSPACE-complete on the class of safe Petri nets and also on the class of safe and sound workflow nets. For live, bounded, free-choice systems, we prove the existence of optimal alignments of polynomial length which positions the alignment problem in NP for this class. We further show that computing alignments is NP-complete even on basic subclasses such as process trees and T-systems. We establish NP-completeness on several related classes as well, including acyclic systems. Finally, we demonstrate that on live, safe S-systems the alignment problem is solvable in P and that both assumptions (liveness and safeness) are crucial for this result.2026-03-05T16:12:48Z46 pages, 5 figures, submitted to Fundamenta InformaticaeChristopher T. SchwanenWied PakusaWil M. P. van der Aalsthttp://arxiv.org/abs/2603.05253v1Algebraic Characterization of Reversible First Degree Cellular Automata over $\mathbb{Z}_d$2026-03-05T15:06:33ZThere exists algorithms to detect reversibility of cellular automaton (CA) for both finite and infinite lattices taking quadratic time. But, can we identify a $d$-state CA rule in constant time that is always reversible for every lattice size $n\in \mathbb{N}$? To address this issue, this paper explores the reversibility properties of a subset of one-dimensional, $3$-neighborhood, $d$-state finite cellular automata (CAs), known as the first degree cellular automata (FDCAs) for any number of cells $(n\in \mathbb{N})$ under the null boundary condition. {In a first degree cellular automaton (FDCA), the local rule is defined using eight parameters. To ensure that the global transition function of $d$-state FDCA is reversible for any number of cells $(n\in \mathbb{N})$, it is necessary and sufficient to verify only three algebraic conditions among the parameter values. Based on these conditions, for any given $d$, one can synthesize all reversible FDCAs rules. Similarly, given a FDCA rule, one can check these conditions to decide its reversibility in constant time.2026-03-05T15:06:33ZBaby C. J.Kamalika Bhattacharjeehttp://arxiv.org/abs/2603.05221v1Reachability in VASS Extended with Integer Counters2026-03-05T14:34:13ZWe consider a variant of VASS extended with integer counters, denoted VASS+Z. These are automata equipped with N and Z counters; the N-counters are required to remain nonnegative and the Z-counters do not have this restriction. We study the complexity of the reachability problem for VASS+Z when the number of N-counters is fixed. We show that reachability is NP-complete in 1-VASS+Z (i.e. when there is only one N-counter) regardless of unary or binary encoding. For $d \geq 2$, using a KLMST-based algorithm, we prove that reachability in d-VASS+Z lies in the complexity class $\mathcal{F}_{d+2}$. Our upper bound improves on the naively obtained Ackermannian complexity by simulating the Z-counters with N-counters.
To complement our upper bounds, we show that extending VASS with integer counters significantly lowers the number of N-counters needed to exhibit hardness. We prove that reachability in unary 2-VASS+Z is PSPACE-hard; without Z-counters this lower bound is only known in dimension 5. We also prove that reachability in unary 3-VASS+Z is TOWER-hard. Without Z-counters, reachability in 3-VASS has elementary complexity and TOWER-hardness is only known in dimension 8.2026-03-05T14:34:13ZClotilde BizièreWojciech CzerwińskiRoland GuttenbergJérôme LerouxVincent MichieliniŁukasz OrlikowskiAntoni PuchHenry Sinclair-Bankshttp://arxiv.org/abs/2603.05193v1Transducing Language Models2026-03-05T14:04:08ZModern language models define distributions over strings, but downstream tasks often require different output formats. For instance, a model that generates byte-pair strings does not directly produce word-level predictions, and a DNA model does not directly produce amino-acid sequences. In such cases, a deterministic string-to-string transformation can convert the model's output to the desired form. This is a familiar pattern in probability theory: applying a function $f$ to a random variable $X\sim p$ yields a transformed random variable $f(X)$ with an induced distribution. While such transformations are occasionally used in language modeling, prior work does not treat them as yielding new, fully functional language models. We formalize this perspective and introduce a general framework for language models derived from deterministic string-to-string transformations. We focus on transformations representable as finite-state transducers -- a commonly used state-machine abstraction for efficient string-to-string mappings. We develop algorithms that compose a language model with an FST to *marginalize* over source strings mapping to a given target, propagating probabilities through the transducer without altering model parameters and enabling *conditioning* on transformed outputs. We present an exact algorithm, an efficient approximation, and a theoretical analysis. We conduct experiments in three domains: converting language models from tokens to bytes, from tokens to words, and from DNA to amino acids. These experiments demonstrate inference-time adaptation of pretrained language models to match application-specific output requirements.2026-03-05T14:04:08ZVésteinn SnæbjarnarsonSamuel KiegelandTianyu LiuReda BoumasmoudRyan CotterellTim Vieirahttp://arxiv.org/abs/2602.13046v2Classification of Local Optimization Problems in Directed Cycles2026-03-05T09:29:48ZWe present a complete classification of the distributed computational complexity of local optimization problems in directed cycles for both the deterministic and the randomized LOCAL model. We show that for any local optimization problem $Π$ (that can be of the form min-sum, max-sum, min-max, or max-min, for any local cost or utility function over some finite alphabet), and for any constant approximation ratio $α$, the task of finding an $α$-approximation of $Π$ in directed cycles has one of the following complexities:
1. $O(1)$ rounds in deterministic LOCAL, $O(1)$ rounds in randomized LOCAL,
2. $Θ(\log^* n)$ rounds in deterministic LOCAL, $O(1)$ rounds in randomized LOCAL,
3. $Θ(\log^* n)$ rounds in deterministic LOCAL, $Θ(\log^* n)$ rounds in randomized LOCAL,
4. $Θ(n)$ rounds in deterministic LOCAL, $Θ(n)$ rounds in randomized LOCAL.
Moreover, for any given $Π$ and $α$, we can determine the complexity class automatically, with an efficient (centralized, sequential) meta-algorithm, and we can also efficiently synthesize an asymptotically optimal distributed algorithm.
Before this work, similar results were only known for local search problems (e.g., locally checkable labeling problems). The family of local optimization problems is a strict generalization of local search problems, and it contains numerous commonly studied distributed tasks, such as the problems of finding approximations of the maximum independent set, minimum vertex cover, minimum dominating set, and minimum vertex coloring.2026-02-13T16:03:14Z26 pages, 2 figuresThomas BoudierFabian KuhnAugusto ModaneseRonja StimpertJukka Suomelahttp://arxiv.org/abs/2409.09769v4Risk-Aware Autonomous Driving with Linear Temporal Logic Specifications2026-03-05T09:29:02ZHuman drivers naturally balance the risks of different concerns while driving, including traffic rule violations, minor accidents, and fatalities. However, achieving the same behavior in autonomous driving systems remains an open problem. This paper extends a risk metric that has been verified in human-like driving studies to encompass more complex driving scenarios specified by linear temporal logic (LTL) that go beyond just collision risks. This extension incorporates the timing and severity of events into LTL specifications, thereby reflecting a human-like risk awareness. Without sacrificing expressivity for traffic rules, we adopt LTL specifications composed of safety and co-safety formulas, allowing the control synthesis problem to be reformulated as a reachability problem. By leveraging occupation measures, we further formulate a linear programming (LP) problem for this LTL-based risk metric. Consequently, the synthesized policy balances different types of driving risks, including both collision risks and traffic rule violations. The effectiveness of the proposed approach is validated by three typical traffic scenarios in Carla simulator.2024-09-15T15:37:38ZShuhao QiZengjie ZhangZhiyong SunSofie Haesaerthttp://arxiv.org/abs/2603.04235v22-Coloring Cycles in One Round2026-03-05T09:04:42ZWe show that there is a one-round randomized distributed algorithm that can 2-color cycles such that the expected fraction of monochromatic edges is less than 0.24118. We also show that a one-round algorithm cannot achieve a fraction less than 0.23879. Before this work, the best upper and lower bounds were 0.25 and 0.2. Our proof was largely discovered and developed by large language models, and both the upper and lower bounds have been formalized in Lean 4.2026-03-04T16:18:30Z9 pages, 3 figuresMaxime FlinAlesya RaevskayaRonja StimpertJukka SuomelaQingxin Yanghttp://arxiv.org/abs/2603.03612v2Why Are Linear RNNs More Parallelizable?2026-03-05T05:58:29ZThe community is increasingly exploring linear RNNs (LRNNs) as language models, motivated by their expressive power and parallelizability. While prior work establishes the expressivity benefits of LRNNs over transformers, it is unclear what makes LRNNs -- but not traditional, nonlinear RNNs -- as easy to parallelize in practice as transformers. We answer this question by providing a tight connection between types of RNNs and standard complexity classes. We show that LRNNs can be viewed as log-depth (bounded fan-in) arithmetic circuits, which represents only a slight depth overhead relative to log-depth boolean circuits that transformers admit. Furthermore, we show that nonlinear RNNs can solve $\mathsf{L}$-complete problems (and even $\mathsf{P}$-complete ones, under polynomial precision), revealing a fundamental barrier to parallelizing them as efficiently as transformers. Our theory also identifies fine-grained expressivity differences between recent popular LRNN variants: permutation-diagonal LRNNs are $\mathsf{NC}^1$-complete whereas diagonal-plus-low-rank LRNNs are more expressive ($\mathsf{PNC}^1$-complete). We provide further insight by associating each type of RNN with a corresponding automata-theoretic model that it can simulate. Together, our results reveal fundamental tradeoffs between nonlinear RNNs and different variants of LRNNs, providing a foundation for designing LLM architectures that achieve an optimal balance between expressivity and parallelism.2026-03-04T00:51:08ZCorrected authorship list from initial versionWilliam MerrillHongjian JiangYanhong LiAnthony LinAshish Sabharwalhttp://arxiv.org/abs/2510.26840v2SpotIt: Evaluating Text-to-SQL Evaluation with Formal Verification2026-03-04T18:15:21ZCommunity-driven Text-to-SQL evaluation platforms play a pivotal role in tracking the state of the art of Text-to-SQL performance. The reliability of the evaluation process is critical for driving progress in the field. Current evaluation methods are largely test-based, which involves comparing the execution results of a generated SQL query and a human-labeled ground-truth on a static test database. Such an evaluation is optimistic, as two queries can coincidentally produce the same output on the test database while actually being different. In this work, we propose a new alternative evaluation pipeline, called SpotIt, where a formal bounded equivalence verification engine actively searches for a database that differentiates the generated and ground-truth SQL queries. We develop techniques to extend existing verifiers to support a richer SQL subset relevant to Text-to-SQL. A performance evaluation of ten Text-to-SQL methods on the high-profile BIRD dataset suggests that test-based methods can often overlook differences between the generated query and the ground-truth. Further analysis of the verification results reveals a more complex picture of the current Text-to-SQL evaluation.2025-10-30T02:29:54ZAccepted at ICLR'26Rocky KlopfensteinYang HeAndrew TremanteYuepeng WangNina NarodytskaHaoze Wuhttp://arxiv.org/abs/2603.05540v1Attention Meets Reachability: Structural Equivalence and Efficiency in Grammar-Constrained LLM Decoding2026-03-04T11:49:55ZWe study grammar-constrained decoding (GCD) as a coupling between an autoregressive next-token distribution and a reachability oracle over a pushdown system compiled from a context-free grammar (CFG). We prove an oracle invariance theorem: language-equivalent grammars induce identical admissible next-token sets for every prefix, hence identical logit masks, yet can yield provably different compiled state spaces and online ambiguity costs. We give exact control-state blowup counts for the canonical $a^n b^n$ language under redundant nonterminal delegation, and introduce a left-to-right structural ambiguity cost (SAC) measuring incremental packed-parse-forest growth per token. For two equivalent grammars over all finite strings, SAC is $O(1)$ per token under right-recursion but $Θ(t^2)$ per token and $Θ(n^3)$ cumulatively under concatenation. We establish engine-independent lower bounds: any sound, retrieval-efficient, parse-preserving online masking engine must incur $Ω(t^2)$ work per token on a specific constant-size CFG family, unconditionally within this model. We define decoding-cost equivalence classes of grammars and prove existence of minimal-SAC representatives within bounded rewrite families. Finally, we characterize the true conditional sampler via a Doob $h$-transform and derive sharp one-step KL and total-variation distortion bounds for hard-masked decoding in terms of survival-probability spread among admissible next tokens. We integrate these results with Transformer and Mixture-of-Experts architectures, derive latency envelopes in terms of vocabulary size, active state sets, and beam width, and connect SAC to instrumentation-based predictive performance models and automated grammar optimization.2026-03-04T11:49:55Z20 pagesFaruk AlpayBilge Senturk