skip to main content
review-article
Free Access

Indistinguishability

Published:20 April 2020Publication History
Skip Abstract Section

Abstract

Diverse examples depict how indistinguishability plays a central role in computer science.

References

  1. Angluin, D. Learning regular sets from queries and counterexamples. Inf. Comput. 2, 75 (1987), 87---106.Google ScholarGoogle Scholar
  2. Angluin, D. Queries and concept learning. Mach. Learn. 2, 4 (1988), 319---342.Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Ross Ashby, W. An Introduction to Cybernetics. John Wiley, New York, 1956.Google ScholarGoogle ScholarCross RefCross Ref
  4. Attiya, H., Ellen, F. Impossibility Results for Distributed Computing. Morgan & Claypool, 2014, 162.Google ScholarGoogle Scholar
  5. Attiya, H., Herzberg, A., Rajsbaum, S. Optimal clock synchronization under different delay assumptions. SIAM J. Comput. 25, 2 (1996), 369---389. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Attiya, H., Ramalingam, G., Rinetzky, N. Sequential verification of serializability. In Proceedings of the 37th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages POPL, ACM, 2010, 31---42Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Baltag, A., Bezhanishvili, N., Özgün, A., Smets, S. A topological approach to full belief. J. Philos. Logic 48, 2 (2019), 205---244.Google ScholarGoogle ScholarCross RefCross Ref
  8. Bernstein, P.A., Hadzilacos, V., Goodman, N. Concurrency Control and Recovery in Database Systems. Addison-Wesley Pub. Co. Inc., Reading, MA, 1987.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Clarke, E., Grumberg, O., Jha, S., Lu, Y., Veith, H. Counterexample-guided abstraction refinement. In LNCS-Computer Aided Verification. E. Allen Emerson and A.P. Sistla, eds. Volume 1855. Springer Berlin, Heidelberg, Berlin, Heidelberg, 2000, 154---169.Google ScholarGoogle Scholar
  10. Coquidé, C., Georgeot, B., Giraud, O. Distinguishing humans from computers in the game of go: A complex network approach. Europhys. Lett. 4, 119 (2017), 48001. http://stacks.iop.org/0295-5075/119/i=4/a=48001Google ScholarGoogle Scholar
  11. De Nicola, R. Behavioral Equivalences. Springer US, Boston, MA, 2011, 120---127. Google ScholarGoogle ScholarCross RefCross Ref
  12. Edward, M. Gedanken-experiments on sequential machines. In Automata Studies. C.E. Shannon and J. McCarthy, eds. Number 34 in Annals of Mathematics Studies. Princeton University Press, Princeton, 1958, 129---153.Google ScholarGoogle Scholar
  13. Eswaran, K.P., Gray, J.N., Lorie, R.A., Traiger, I.L. The notions of consistency and predicate locks in a database system. Commun. ACM 19, 11 (1976), 624---633.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Fagin, R., Halpern, J.Y., Moses, Y., Vardi, M.Y. Reasoning About Knowledge. MIT Press, Cambridge, MA, USA, 2003.Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Fajstrup, L., Goubault, E., Haucourt, E., Mimram, S., Raussen, M. Directed Algebraic Topology and Concurrency. Springer, Switzerland, 2016.Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Fields, C. Bell's Theorem from Moore's Theorem. Cambridge, MA, 2012. arXiv 1201.3672v6. https://arxiv.org/pdf/1201.3672.pdfGoogle ScholarGoogle Scholar
  17. van Glabbeek, R.J. The Linear Time---Branching Time Spectrum I. Elsevier, 2001, 3---99.Google ScholarGoogle Scholar
  18. Goubault, E., Ledent, J., Rajsbaum, S. A simplicial complex model for dynamic epistemic logic to study distributed task computability. In Proceedings 9th International Symposium on Games, Automata, Logics, and Formal Verification (GandALF) (EPTCS). A. Orlandini and M. Zimmermann, eds. Volume 277, Electronic Proceedings in Theoretical Computer Science, 2018, 73---87.Google ScholarGoogle ScholarCross RefCross Ref
  19. Guerraoui, R., Henzinger, T.A., Vasu, S. Model checking transactional memories. Distrib. Comput. 22, 3 (2010), 129---145.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Halpern, J.Y., Megiddo, N., Munshi, A.A. Optimal precision in the presence of uncertainty. J. Complex. 1, 2 (1985), 170---196. Google ScholarGoogle ScholarCross RefCross Ref
  21. Harel, D. A grand challenge for computing: Towards full reactive modeling of a multi-cellular animal. Bull. EATCS, 81 (2003), 226---235.Google ScholarGoogle Scholar
  22. Herlihy, M., Kozlov, D., Rajsbaum, S. Distributed Computing Through Combinatorial Topology, 1st edn. Elsevier-Morgan Kaufmann Publishers Inc., San Francisco, CA, USA, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Hopcroft, J.E., Motwani, R., Ullman, J.D. Introduction to Automata Theory, Languages, and Computation, 3rd edn. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 2006.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Isberner, M., Howar, F., Steffen, B. The TTT algorithm: A redundancy-free approach to active automata learning. In Runtime Verification (LNCS). B. Bonakdarpour and S.A. Smolka, eds. Volume 8734. Springer International Publishing, Cham, 2014, 307---322.Google ScholarGoogle ScholarCross RefCross Ref
  25. Kearns, M.J., Vazirani, U. An Introduction to Computational Learning Theory. MIT Press, Boston, MA, USA, 1994. http://ieeexplore.ieee.org/servlet/opac?bknumber=6267405Google ScholarGoogle ScholarCross RefCross Ref
  26. Lamport, L. Time, clocks, and the ordering of events in a distributed system. Commun. ACM 21, 7 (1978), 558---565.Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. McKinsey, J.C.C., Tarski, A. The algebra of topology. Ann. Math. 45, 1 (1944), 141---191. http://www.jstor.org/stable/1969080Google ScholarGoogle ScholarCross RefCross Ref
  28. Mills, D.L. Computer Network Time Synchronization: The Network Time Protocol on Earth and in Space, 2nd edn. CRC Press, Florida, USA, 2016.Google ScholarGoogle Scholar
  29. Moses, Y. Relating knowledge and coordinated action: The knowledge of preconditions principle. In Proceedings of the Fifteenth Conference on Theoretical Aspects of Rationality and Knowledge, TARK 2015, Carnegie Mellon University, Pittsburgh, USA, June 4---6, 2015, 231---245.Google ScholarGoogle Scholar
  30. Patt-Shamir, B., Rajsbaum, S. A theory of clock synchronization (extended abstract). In Proceedings of the Twenty-Sixth Annual ACM Symposium on Theory of Computing (STOC '94). 1994, 810---819.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Poizat, B. A Course in Model Theory---An Introduction to Contemporary Mathematical Logic. Springer, NewYork, NY, USA, 2000.Google ScholarGoogle Scholar
  32. Ron, D., Rubinfeld, R. Learning fallible deterministic finite automata. Mach. Learn. 2---3, 18 (1995), 149---185. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Rosenberg, A.L. The Pillars of Computation Theory: State, Encoding, Nondeterminism, 1st edn. Springer Publishing Company, Incorporated, 2009.Google ScholarGoogle Scholar
  34. Sakakibara, Y. Recent advances of grammatical inference. Theor. Comput. Sci. 1, 185 (1997), 15---45.Google ScholarGoogle Scholar
  35. Sangiorgi, D. Introduction to Bisimulation and Coinduction. Cambridge University Press, New York, NY, USA, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  36. Trakhtenbrot, B.A., Barzdin, Y.M. Finite Automata, Behavior and Synthesis. North Holland, Amsterdam, 1973.Google ScholarGoogle Scholar
  37. Vaandrager, F. Model learning. Commun. ACM 2, 60 (2017), 86---95.Google ScholarGoogle Scholar
  38. Valiant, L. Probably Approximately Correct: Nature's Algorithms for Learning and Prospering in a Complex World. Basic Books, Inc., New York, 2013.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Weikum, G., Vossen, G. Transactional Information Systems: Theory, Algorithms, and The Practice of Concurrency Control and Recovery. Elsevier, 2001.Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Wigderson, A. Mathematics and Computation. Princeton University Press, Princeton, USA, 2018. To appear. https://www.math.ias.edu/avi/bookGoogle ScholarGoogle Scholar

Index Terms

  1. Indistinguishability

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image Communications of the ACM
        Communications of the ACM  Volume 63, Issue 5
        May 2020
        101 pages
        ISSN:0001-0782
        EISSN:1557-7317
        DOI:10.1145/3396208
        Issue’s Table of Contents

        Copyright © 2020 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 20 April 2020

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • review-article
        • Popular
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      HTML Format

      View this article in HTML Format .

      View HTML Format