2005
DOI: 10.1007/11505877_23
|View full text |Cite
|
Sign up to set email alerts
|

Complementing Two-Way Finite Automata

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
14
0

Year Published

2006
2006
2013
2013

Publication Types

Select...
3
2

Relationship

3
2

Authors

Journals

citations
Cited by 6 publications
(14 citation statements)
references
References 16 publications
0
14
0
Order By: Relevance
“…Finally, we point out that, as proven in [GMP07], with a linear increasing in the number of the states, each 2dfas can be made halting. In particular, each n-state 2dfa can be simulated by a halting 2dfa with 4n states.…”
Section: (If Part)mentioning
confidence: 70%
“…Finally, we point out that, as proven in [GMP07], with a linear increasing in the number of the states, each 2dfas can be made halting. In particular, each n-state 2dfa can be simulated by a halting 2dfa with 4n states.…”
Section: (If Part)mentioning
confidence: 70%
“…This, in turn, would imply the exponential gap for the trade-off between 2NFA's and 2DFA's, and also between pebble-2NFA's and pebble-2DFA's, since the complementation for the deterministic two-way machines is linear (namely, 4 · n states for 2DFA's, by [10], and at most 60 · n states for pebble-2DFA's, by Corollary 6 above).…”
Section: Resultsmentioning
confidence: 99%
“…This time we use Theorems 2(b) and 3(b), together with the fact that an n-state 2DFA can be complemented with no more than 4 · n states [10].…”
Section: Translationmentioning
confidence: 99%
“…We shall prove this statement by applying a technique developed by Sipser in [10] in order to prove that every space bounded deterministic Turing machine can be transformed into a halting deterministic Turing machine with the same space bound. Furthermore, this technique has also been used by Muscholl et al [11] in order to show a similar result for deterministic tree-walking automata and by Geffert et al [12] in order to complement deterministic two-way automata. More precisely, we show for an arbitrary IFA(k) M , how a DFA(k) M can be constructed that, on any input ¢w$, searches the backward configuration tree of M on w for a path from (q f , 0, 0, .…”
Section: This Particularly Means That Ifmentioning
confidence: 93%