Abstract 1 Introduction 2 Preliminaries 3 Tools for separating BAmb and NonDet 4 Properties 5 Proof of Theorem 1 6 Deciding regularity 7 Future research References

Languages of Boundedly-Ambiguous Vector Addition Systems with States

Wojciech Czerwiński ORCID University of Warsaw, Poland Łukasz Orlikowski ORCID University of Warsaw, Poland
Abstract

The aim of this paper is to deliver broad understanding of a class of languages of boundedly-ambiguous VASSs, that is k-ambiguous VASSs for some natural k. These are languages of Vector Addition Systems with States with the acceptance condition defined by the set of accepting states such that each accepted word has at most k accepting runs. We develop tools for proving that a given language is not accepted by any k-ambiguous VASS. Using them we show a few negative results: lack of some closure properties of languages of k-ambiguous VASSs and undecidability of the k-ambiguity problem, namely the question whether a given VASS language is a language of some k-ambiguous VASS. In fact we show an even more general undecidability result stating that for any class containing all regular languages and only k-ambiguous VASS languages for some k it is undecidable whether a language of a given 1-dimensional VASS belongs to this class. Finally, we show that the regularity problem is decidable for k-ambiguous VASSs.

Keywords and phrases:
vector addition systems, Petri nets, unambiguity, bounded-ambiguity, languages
Copyright and License:
[Uncaptioned image] © Wojciech Czerwiński and Łukasz Orlikowski; licensed under Creative Commons License CC-BY 4.0
2012 ACM Subject Classification:
Theory of computation Parallel computing models
Related Version:
Full Version: https://arxiv.org/abs/2504.07669
Funding:
Both authors are supported by the ERC grant INFSYS, agreement no. 950398.
Acknowledgements:
We would like to thank David Purser for sharing with us a conjecture about language not recognised by an unambiguous VASS. We thank also Sławomir Lasota for suggesting us to reduce from 0-finite-reach instead of reducing from the halting problem for 2CM in the proof of Theorem 1. Additionally, we would like to thank Piotr Hofman for inspiring discussions and for reviewing the Master’s Thesis [35], which served as the foundation for the results presented in this paper.
Editors:
Patricia Bouyer and Jaco van de Pol

1 Introduction

Determinism is a central notion in computer science. Deterministic systems often allow for more efficient algorithms. On the other hand, usually deterministic systems are less expressive, so in many cases for a non-deterministic system there is no equivalent deterministic system and one cannot use more efficient techniques. For those reasons, there is recently a lot of research devoted to various notions restricting nondeterminism in a milder way than determinism. The hope is that systems having the considered properties are more expressive than the deterministic ones, but still allow for robust algorithms design. One prominent example of such a notion is unambiguity; a system is unambiguous if for every word there is at most one accepting run over this word. In the last decade unambiguous systems were intensely studied and for various classes of infinite-state systems the unambiguous case turns out to be much more tractable [8, 29, 25, 9, 18]. Similar notions were also investigated recently, like k-ambiguity (each word is accepted by at most k runs) and history-determinism (a weakened version of determinism), in both cases one can design more efficient algorithms in some cases [10, 7].

In this paper we focus on studying milder version of determinism for Vector Addition Systems with States (VASS). VASSs and related Petri nets are popular and fundamental models of concurrency with many applications both in theory and in practical modelling [30, Section 5]. Languages of VASSs with restricted nondeterminism were already studied for several years, mostly with the acceptance condition being the set of accepting states. In [9] it was shown that the universality problem for unambiguous VASSs is decidable in ExpSpace, in contrast to Ackermann-completeness of the problem for VASSs without that restriction. In [10, 11] the language equivalence problem was considered for unambiguous VASS and more generally for k-ambiguous VASSs and it was shown to be decidable and Ackermann-complete, in contrast to undecidability in general [2], even in dimension one [21, Thm. 20]. The choice of universality and equivalence problems is deliberate here. The complexity of the seemingly more natural language emptiness problem (or equivalently of the reachability problem) does not depend on the unambiguity assumption. Indeed, one can always transform a system to a deterministic one by assigning all the transitions unique labels without affecting nonemptiness. Therefore, in order to observe a difference in complexity or decidability after restricting nondeterminism, one should consider problems, which do not simply ask about the existence of some object. Some natural problems concerning languages of that type are the universality problem and the language equivalence problem and these two problems were extensively studied for many models with the unambiguity assumption or some modification of it. First of all, the universality and equivalence problems are solvable in PTime [32] (and even in NC2 [33]) for unambiguous finite automata (UFA), in contrast to PSpace-hardness of both problems for NFA. The universality problem was also shown decidable for unambiguous register automata in a sequence of papers [25, 3, 14] with improving complexity, which contrasts undecidability in the case without restricted nondeterminism [26, Thm 5.1]. This line of research culminated in a very elegant contribution [6, 5], which showed in particular that not only the universality problem, but also the equivalence problem is solvable in ExpTime for unambiguous register automata, and in PTime in the case of fixed number of registers. Another popular restriction of nondeterminism was also studied recently: history-determinism. A system is history-deterministic if its nondeterminism can be resolved on the fly, based on the history of a particular run. The equivalence and inclusion problems were shown to be decidable for one-dimensional history-deterministic VASSs [27], but undecidable for two-dimensional history-deterministic VASSs [7].

Despite a lot of research on algorithms for unambiguous and boundedly-ambiguous (k-ambiguous for some k) VASS not much is known about the class of languages recognisable by such models. In particular, to our best knowledge, till now it was even not known whether there exist any VASS language (we consider acceptance by states), which is not a language of an unambiguous VASS. The reason behind this lack of knowledge was absence of any technique, which can show that a given language of a VASS cannot be recognised by an unambiguous VASS. The quest for such a technique is natural and the question deserves investigation. Analogous problems were considered for other models of computation. For finite automata the question trivialises, as deterministic automata recognise all the regular languages. However, already for weighted automata over a field the problems are highly nontrivial and were recently studied in-depth [4, 28], in particular it is decidable whether a given weighted automaton is unambiguisable, so equivalent to some unambiguous weighted automaton [4]. The problem whether a given context-free language is unambiguisable is known to be undecidable since the 60s [17, 19]. The aim of this paper is deepening the understanding of the class of languages recognisable by boundedly-ambiguous VASS and its subclasses.

Our contribution.

In the paper we deliver several results, which help understanding unambiguous, k-ambiguous and boundedly-ambiguous VASS languages. Our first main tool is Lemma 5, which delivers the first example of a VASS language, which is known to be not a k-ambiguous VASS language. The second main tool is Lemma 8, which formulates a condition, which needs to be satisfied by all k-ambiguous VASS languages. Using these two lemmas we can rather straightforwardly inspect closure properties of k-ambiguous VASS languages in Lemma 10 and show several expressivity results in Section 4.2. Further building on Lemma 5 we obtain our main contribution.

Theorem 1.

For any class 𝒞 of languages containing all regular languages and contained in the class of all boundedly-ambiguous VASS languages it is undecidable to check whether the language of a given 1-VASS accepting by states belongs to 𝒞.

Consequences of Theorem 1 are broad. It reproves undecidability of regularity of 1-dimensional VASSs (in short 1-VASSs) [12, Section 8] and undecidability of determinisability of 1-VASSs considered in [1]. It is important to emphasise that Theorem 1 gives us extensive flexibility wrt. the undecidability results. For example in [1] it was shown that for a given 1-VASS it is undecidable whether there is an equivalent deterministic 1-VASS. One can argue that possibly asking about equivalent deterministic VASS, without a bounding dimension, is a more natural question, which deserves independent research. Theorem 1 answers negatively all questions of that kind in one shot. We formulate below its corollary to illustrate variety of consequences we obtain. In particular we know now that for many classical restrictions of nondeterminism it is undecidable whether for a given 1-VASS there exists some equivalent one with nondeterminism restricted in that way.

Corollary 2.

It is undecidable whether the language of a given 1-VASS accepting by states is recognisable by some

  • unambiguous VASS,

  • k-ambiguous VASS for given k,

  • boundedly ambiguous VASS,

  • deterministic VASS,

  • k-ambiguous 1-VASS for given k.

Our last main contribution is Theorem 22, which states that the regularity problem is decidable for boundedly-ambiguous VASSs, which contrasts undecidability without that assumption [2, 21]. One can see this result as an intuitive indication that boundedly-ambiguous VASSs are closer to deterministic VASSs rather than to general nondeterministic VASSs.

Organisation of the paper.

In Section 2 we introduce preliminary notions and recall useful lemmas. Section 3 is devoted to showing the two main technical tools, namely Lemmas 5 and 8. In Section 4 we present closure properties and expressivity results for the classes of k-ambiguous VASSs. Next, in Section 5 we show our main result, namely Theorem 1. Theorem 22 is proved in Section 6. Finally, in Section 7 we discuss interesting future research directions.

2 Preliminaries

Basic notions.

For a,b such that ab we write [a,b] for the set of integers {a,a+1,,b}. For a we write [a] for the set [1,a]. For a vector vd we write vi for the i-th entry of v. For a vector vd we write support(v) for the set {ivi>0}. For two vectors u,vd we write uv if for all i[d] we have uivi. We also extend this order to ({ω})d where ω is bigger than any natural number. We write ω for the set {ω}. Whenever we speak about the norm of vector vd we mean v=max1id|vi|. For a word w we denote by #a(w) the number of letters a in the word w.

Downward-closed sets.

A set SNd is downward-closed if for each u,vd it holds that uS and vu implies vS. For ud we write u for the set {vvu}. If a downward-closed set is of the form u we call it a down-atom. Observe, that a one-dimensional set S is downward-closed if either S= or S=[0,n] for some n. Thus we have either S=ω in the first case or S=n in the second case. So equivalently a downward-closed set Dd is a down-atom if it is of a form D=D1××Dd, where for all i[d] we have that Di is a downward-closed one dimensional set. For simplicity we write D=(n1,n2,,nd) if D=n1×n2nd. Therefore each down-atom is of the form u where u(ω)d. The following proposition will be helpful in our considerations.

Proposition 3 (Lemma 17 in [13], [16]).

Each downward-closed set in d is a finite union of down-atoms.

Vector Addition Systems with States.

A d-dimensional Vector Addition System with States (d-VASS) is a nondeterministic finite automaton with d non-negative integer counters. Transitions of the VASS manipulate these counters. Formally, we define VASS V as V=(Σ,Q,δ,I,F) where Σ is a finite alphabet, Q is a finite set of automaton states, δQ×(Σε)×d×Q is a transition relation, IQ×d is a finite set of initial configurations and FQ×d is a finite set of final configurations. For a transition t=(s,a,v,s)δ we say that the transition is over a or the transition reads letter a. We also write eff(t) for the effect of transition, which is v. We define the norm of transition t as the norm of v.

A d-VASS can be seen as an infinite-state labelled transition system in which each configuration is a pair (s,u)Q×d. We denote such configuration as s(u). We define the norm of the configuration as the norm of u. A transition t=(s,a,v,s)δ can be fired in a configuration q(u) if and only if q=s and u0 where u=u+v. After firing the transition configuration is changed to s(u). We also define run as a sequence of transitions, which can be fired one after another from some configuration. For a run ρ=t1t2tn we write eff(ρ) for Σi=1neff(ti). If we want to say something only about jth (for j[d]) entry of the eff(ρ) we write effj(ρ). We also define support(ρ) as support(eff(ρ)). We say that a run ρ is from configuration q(u) to p(u) if the sequence of transitions can be fired from q(u) and the final configuration is p(u). We say that a run is a loop if the state of its initial configuration is the same as the state of the final configuration. For two runs ρ1=α1αn and ρ2=β1βk if the sequence α1αnβ1βk is a run ρ then we can write ρ=ρ1ρ2. We say, that a run ρ=t1tn is over w=λ1λn(Σ{ε}) (or reads w) if and only if for each i[n] transition ti is over λi. We denote by w(ρ) the word read by ρ. We say that the length of a run ρ is equal to n if it consists of n transitions. For the length of a run, we write |ρ|.

We say, that VASS is ε-free if there is no transition over ε. In this work, unless stated otherwise, we work with ε-free VASSs.

Languages of VASSs.

A run of a VASS is accepting if it starts in an initial configuration c0I and ends in an accepting configuration. A configuration is accepting if it covers some configuration from the set of final configurations F. In other words configuration q(v) is accepting if there exists a configuration q(v)F such that vv. For a VASS V we define its language as the set of all words read by accepting runs and we denote it by L(V). Languages defined in this way are called coverability languages. Sometimes we consider languages with other acceptance condition (reachability languages), in that case we indicate it clearly.

We sometimes consider reachability languages in which run ending in configuration q(v) is accepting if and only if q(v)F. Sometimes, we consider VASSs, where the set of accepting configurations is infinite, but has a specific form. For instance we consider downward-VASSs, where the set of accepting configurations is possibly infinite, but it is downward-closed. In this type of VASSs a run ending in configuration q(v) if and only if q(v)F where F is a downward-closed set of accepting configurations. We say, that VASS V is deterministic if it has only one initial configuration, it is ε-free and for each state q and each letter aΣ there is at most one transition over a leaving the state q. We say, that VASS V is k-ambiguous if and only if for every wL(V) we have at most k accepting runs over w. We also say then, that L(V) is a k-ambiguous language. For a d-VASS consider a function r:(Q×d×δ)×(Q×d)×Σδ that, given a history of the run (configurations and taken transitions), current configuration q(v) and a next letter λΣ, returns a sequence of possibly many transitions. One of these transitions is over λ, all the other are over ε, and the sequence can be fired from the current configuration q(v). Let us call r a resolver. We say, that d-VASS V is history-deterministic if and only if it has one initial configuration and there exists a resolver r such that for each wL(V) run ρ over w from the initial configuration given by the resolver is accepting.

We denote by Det, Hist, k-Amb, BAmb and NonDet the class of languages of respectively deterministic, history-deterministic, k-ambiguous , all boundedly-ambiguous and fully nondeterministic VASSs languages. We sometimes denote by 1-Amb the class of unambiguous VASSs languages. By d-NonDet we denote the class of languages of d-VASSs.

3 Tools for separating BAmb and NonDet

In this section we develop two techniques for showing that a language is not recognised by a k-ambiguous VASS: Lemma 5 and Lemma 8.

3.1 Dominating block

The first tool is based on the following observation about a language not recognised by a k-ambiguous VASS.

Lemma 4.

For every k+ the language

Lk={an1ban2ban3bank+2i[k+1]nini+1}

is not recognised by a k-ambiguous VASS.

For showing various properties of boundedly-ambiguous VASS Lemma 4 is sufficient. In one case, for proving Theorem 1, we need a strengthening of Lemma 4, which is presented in the following lemma:

Lemma 5.

Let Σ be an alphabet such that bΣ and let L be a language over Σ. For each function f:Lω such that supf=ω (recall that supf=sup{f(x)xL}) language L1={an1ban2ban3bank+2bwwL,i[k+1]nini+1nk+2f(w)} is not recognised by a k-ambiguous VASS.

Before proving Lemma 5 we show how it implies Lemma 4.

Proof of Lemma 4.

Let us fix k+ and let L={ε}. Let f:Lω be defined as f(ε)=ω. Hence by Lemma 5 we get that Lk is not recognised by a k-ambiguous VASS.

Below we sketch the idea behind the proof of Lemma 5. We assume, for the sake of contradiction, that L1 is recognised by a k-ambiguous VASS and aim at a contradiction by showing k+1 different runs over the same word. We first consider k+1 words w1,,wk+1L1, where uL is a particularly chosen word and N0<N1<<Nk+2 are particularly chosen constants:

wi=aN1!baN2!baNi!baN0!baNi+2!baNi+3!baNk+2!bu.

Then we dive into combinatorics of VASS runs ρi over words wi and conclude that there are specific pumping cycles in ρi. We show two main lemmas, which analyse the structure of the runs. The first one gives conditions for finding a specific loop in a run. Observe, that this lemma is general and is not restricted to k-ambiguous VASSs.

Lemma 6.

For each d-dimensional VASS V, each subset of counters S[d] and each n there exists a constant M:=M(V,S,n)1 such that in every run in V, starting from a configuration in which values of counters from S are at most n, which is of length at least M there exists a loop, which has non-negative effect on the counters from S.

The proof of Lemma 6 uses rather standard techniques similar to the ones in the Karp-Miller construction solving the coverability problem for VASS [22]. Lemma 6 is used to find loops in words wi. For example one can show that if N1 is big enough then one can find a loop as in Lemma 6 in the first block of letters a. Similarly, if N2 is big enough wrt. to N1, one can find an appropriate loop in the second block of letters a. Using this approach one can find loops in blocks of letters a, if the block is much longer than the whole prefix before it. This is however not true for the block of length N0. Therefore we need a more sophisticated tool in order to be able to modify runs over all the words wi to runs over the same word.

This requires the more challenging part of the proof, which provides a detailed characterisation of runs of k-ambiguous VASS. We formulate below one of the used lemmas in order to illustrate the kind of arguments we consider and, as it is also used in Section 3.2.

Lemma 7.

Let L be a language over Σ={a,b} recognised by some k-ambiguous d-VASS V. For each n there exists a constant C such that each run ρ in V such that:

  • Run ρ is a prefix of an accepting run.

  • Run ρ is reading am1bam2bamn1bamn.

can be decomposed as:

  1. 1.

    ρ=α1β1a1α1α2β2a2α2αnβnanαn for some a1,a2,,an1 and for each i[1,n] we have |αi|,|βi|,|αi|C.

  2. 2.

    For each j<n we have w(αj)L(ab) and w(αn)L(a)

  3. 3.

    For each j[n] we have that w(αj),w(βj)L(a)

  4. 4.

    For each j[n] we have that βj is either a loop or ε. Moreover if mj2C+1 then βjε.

  5. 5.

    For each j[n] let Aj=1i<jsupport(βi) then βj is nonnegative on counters from [d]Aj

  6. 6.

    For each j[n] there is no λ, δ and λ such that δ is a nonnegative loop on counters from [d]Aj, λε and λδλ=αjβj

The proof of Lemma 7 uses the Lemma 6 and a lot of combinatorial observations. It is moved to the Appendix.

By appropriate use of Lemma 7 and other auxiliary lemmas we show that ρi can be modified a bit into runs ρi, which are all different, all accepting and all over the same word w, where

w=an1ban2bank+2bu

and nj=2mk+3jΠl=jk+2Nl! (where m is the maximal norm of a transition). More concretely, ρi is obtained by pumping the loops βi in ρi more times. A challenge it to show that the resulting ρi are indeed different, which we achieve by more careful, but technical investigation of the runs. Existence of k+1 different runs over the same word w is a contradiction with the assumption that L1 is recognised by a k-ambiguous VASS and finishes the proof.

3.2 Semilinear image

Now, we develop the second tool for showing that language is not recognised by a k-ambiguous VASS. Before formulating the tool we have to provide a few definitions. For any language L{a,b} such that for each wL we have #b(w)=l for some l we define

im(L)={(a1,a2,,al+1)a1,a2,,al+1,aa1baa2bbaal+1L}

Given a base vector bd and a finite set of period vectors P={p1,,pn}d, the linear set L(b,P) is defined as

L(b,P)={b+a1p1++anpnai,1in}

A semi-linear set is a finite union of linear sets. Now we are ready to formulate the second tool.

Lemma 8.

Let L{a,b} be a language satisfying:

  • L is recognised by k-ambiguous VASS V.

  • There exists n such that for each wL we have #b(w)=n.

Then im(L) is a semilinear set.

Proof.

The proof is based on Lemma 7 and the fact that set of solution of a system of linear Diophantine inequalities is semilinear. Notice first, that L satisfies conditions of Lemma 7. Therefore we can apply Lemma 7 to L and n+1 and decompose each accepting run in V in the way presented in Lemma 7. Let us fix some α1,,αn+1, α1,,αn+1 and β1,,βn+1, initial configuration q(c) and accepting configuration p(f). We call a run ρ accepting with respect to q(c) and p(f) if ρ is an accepting run of the VASS starting in q(c) and ending in configuration p(c) such that cf. Let K be the following language:
K={wLthere exist a1,a2,,an+1 such that α1β1a1α1α2β2a2α2αn+1βn+1an+1αn+1  is an accepting run with respect to q(c) and p(f) and reads w}
Observe, that K depends on chosen αi,βi and αi. Moreover, observe, that because of the constant given by Lemma 7 we have only a finite number of possibilities of α1,,αk+1, α1,,αk+1, β1,,βk+1, initial configuration q(c) and accepting configuration p(f). Moreover, semilinear sets are closed under a finite union. Therefore to conclude, that im(L) is a semilinear set it is enough to show that im(K) is a semilinear set. Notice, that from conditions of Lemma 7, we know, that only αi (for i[n]) contain letter b, each exactly one letter at the last position. Hence:
im(K)={(|β1|a1+|α1|+|α1|1,|β2|a2+|α2|+|α2|1,, ,|βn|an+|αn|+|αn|1,|βk+1|an+1+|αn+1|+|αn+1|) such that α1β1a1α1α2β2a2α2αn+1βn+1ak+1αn+1 is an accepting run with respect to q(c) and p(f)}
Therefore it is enough to show, that:

A={(a1,a2,,an+1)such that 
α1β1a1α1α2β2a2α2αn+1βn+1an+1αn+1
is an accepting run with respect to q(c) and p(f)}

is a semilinear set. We have two cases. Either A=, hence semilinear. This case occurs if for any a1,a2,,an+11 we do not have an accepting run with respect to q(c) and p(f). Otherwise, we will show semilinearity, by providing a system of linear inequalities for a1,a2,,an+1. It is enough because in [20] it was shown, that the set of solutions of a system of linear inequalities is a semilinear set. The goal of this system of linear inequalities is to express, that after each prefix of a run, we are non-negative on all of the counters. Moreover, we want also to express the acceptance condition. Therefore for each counter i we write the following inequalities:

  • For each transition t and each αj such that there exist u and v such that αj=utv:

    ci+effi(α1β1a1α1α2β2a2α2αj1βj1aj1αj1)+effi(ut)0
  • For each transition t and each αj such that there exist u and v such that αj=utv:

    ci+effi(α1β1a1α1α2β2a2α2αj1βj1aj1αj1αjβjaj)+effi(ut)0
  • For each transition t and each βj such that there exist u and v such that βj=utv:

    • If effi(βj)0:

      ci+effi(α1β1a1α1α2β2a2α2αj1βj1aj1αj1αjβjaj1)+effi(ut)0
    • Otherwise:

      ci+effi(α1β1a1α1α2β2a2α2αj1βj1aj1αj1αj)+effi(ut)0
  • Acceptance condition:

    ci+effi(α1β1a1α1α2β2a2α2αk+1βn+1an+1αn+1)fi
  • Condition, that each ai is positive (this is needed because of conditions of Lemma 7): ai1

In other words, this system of inequalities ensures, that each transition in the sequence can be fired, check the acceptance condition and ensures that each ai is positive. We have shown, that the set A is semilinear and hence im(K) is a semilinear set. Therefore, because semilinar sets are closed under a finite union we have that im(L) is a semilinear set.

Then, as shown in Lemma 10, k-ambiguous VASS languages are closed under intersection with regular languages. As mentioned below languages Kn are regular for each n, the following corollary holds:

Corollary 9.

Let a,bΣ, LΣ be a language recognised by a k-ambiguous VASS and for n let Kn{a,b} be the language of words containing exactly n letters b. Then for any nN we have that im(LKn) is a semilinear set.

4 Properties

In this section we present several properties of languages of boundedly-ambiguous Vector Addition Systems with States.

4.1 Closure properties

First, we investigate the closure properties of boundedly-ambiguous languages.

Lemma 10.

If L1 and L2 are recognised by a k1-ambiguous and k2-ambiguous VASS respectively then:

  • L1L2 is recognised by a (k1k2)-ambiguous VASS;

  • L1L2 is recognised by a (k1+k2)-ambiguous VASS.

Moreover, class of languages of boundedly-ambiguous VASSs is not closed under complementation and commutative closure.

Proof.

We split the proof into several parts, each corresponding to the closure properties under one operation.

Intersection.

Let L1 and L2 be languages recognised respectively by d1-dimensional k1-ambiguous VASS A1 and d2-dimensional k2-ambiguous VASS A2. Language L1L2 can be recognised by the standard synchronised product of A1 and A2. It is easy to observe that the product is a (k1k2)-ambiguous (d1+d2)-VASS.

Union.

Let L1 and L2 be languages recognised by d1-dimensional k1-ambiguous VASS A1 and d2-dimensional k2-ambiguous VASS A2. The idea is to recognise L1L2 by taking union VASS A1A2, which is clearly k1+k2-ambiguous and max(d1,d2)-dimensional.

Complementation.

This comes from a general fact, that coverability languages are not closed under complementation. Language L=anbn is recognised even by a deterministic VASS (hence also by one with bounded-ambiguity). On the other hand, in [13] it was shown, that every two disjoint coverability VASS111In fact this result was shown for a wider class of Well-structured transition system (WSTS) languages L1 and L2 are regular separable, which means there exists a regular language L3 such that L1L3 and L2L3=. Because L is a coverability VASS language its complement can be a coverability VASS language if and only if L is a regular language. Clearly L1 is not and this can be shown using the Pumping Lemma for regular languages.

Commutative closure.

Boundedly-ambiguous languages are not closed under commutative closure. Let us consider language L=anbn, which is recognised by a deterministic VASS. Its commutative closure is equal to L1={w#a(w)#b(w)}. Assume, towards contradiction, that L1 is recognised by a k-ambiguous VASS for k0. Because boundedly-ambiguous languages are closed under intersection with regular languages also language L1L(ba)=bnan is recognised by a k-ambiguous VASS. Let V be k-ambiguous VASS recognising bnan. By Lemma 6 we can take N such, that while accepting bNaN VASS V will fire a non-negative loop on all of the counters. This loop reads bl for some l. Because VASS V is k-ambiguous l1. Hence we can fire this loop one more time and accept bN+laN, which is not in the language bnan. Therefore we reached a contradiction and boundedly-ambiguous languages are not closed under commutative closure. Using the fact that regular languages are unambiguous (i.e. 1-ambiguous) VASS languages and Lemma 10 we can formulate the following remark about closure of boundedly-ambiguous languages under intersection with unambiguous (hence also regular) languages.

 Remark 11.

For each k+ the class of k-ambiguous VASS languages is closed under intersection with unambiguous VASS languages. Hence, the same holds for the intersection with regular languages.

We complement Lemma 10 with Lemma 12 and Conjecture 13.

Lemma 12.

For each k1,k2+ there exist languages L1,L2, which are respectively recognised by a k1 and k2 ambiguous VASS such that language L1L2 is not recognised by an n-ambiguous VASS for n[k1+k21].

Proof.

Let k=k1+k2. For i[k] let us define language Ui={an1ban2ban3bank+1nini+1}. Observe, that Ui is a language of an unambiguous VASS. Let L1=i=1k1Ui and L2=i=k1+1k. By Lemma 10 languages L1 and L2 are respectively recognised by a k1 and k2 ambiguous VASS. By applying Lemma 4 to k1 we get that language L1L2 is not recognised by a n-ambiguous VASS for n[k1].

Conjecture 13.

For each k1,k2+ there exists languages L1,L2, which are respectively recognised by a k1 and k2 ambiguous VASS such that language L1L2 is not recognised by a n-ambiguous VASS for n[k1k21].

4.2 Expressiveness

Firstly, we show that the hierarchy of k-ambiguous VASS is strict.

Lemma 14.

For every k+ there exists language L(k+1)-Ambk-Amb.

Proof.

Let L={an1ban2ban3bank+2i[k+1]nini+1}. Because of Lemma 4 language L is not recognised by a k-ambiguous VASS. On the other hand it is a union of k+1 unambiguous VASS languages. For i[k+1] let us define Li={an1ban2ban3bank+2nini+1}. Observe, that L=i=1k+1Li. Hence, by Lemma 10, L is recognised by a (k+1)-ambiguous VASS. In terms of the classes of languages they define, boundedly-ambiguous VASS can express strictly more than deterministic ones. Moreover, they are strictly less expressive than non-deterministic ones. We prove this in Lemmas 15 and 17.

Lemma 15.

There exists language L1-AmbDet.

We show an even stronger Lemma 16. It is stronger because we have DetHist.

Lemma 16.

There exists language L1-AmbHist.

Figure 1: Unambiguous VASS recognising (starting from zero) {a,b}ban>0bn.

Proof.

Let L={a,b}ban>0bn. Observe, that L is recognized by an unambiguous VASS depicted in Figure 1. The only point of nondeterminism is in state q1 and there is only one way to guess when the last block, ending the word in the form an>0bn comes.

On the other hand, assume, towards contradiction, that L is recognised by a history-deterministic VASS. It is easy to see, that L1=an>0bn is a language of a deterministic VASS. Hence it is also history-deterministic. In [7] it was shown, that history-deterministic VASS languages are closed under union. Hence L2=LL1={a,b}an>0bn is also history-deterministic VASS language. However, in [7] it was also shown, that L2 is not a history-deterministic VASS language. Hence we get, that L is not a history-deterministic VASS language.

Lemma 17.

There exists language L1-NonDetBAmb.

Figure 2: VASS recognising (starting from zero) {anbambakn,m,k,(nmnk)}.

Proof.

Let L={uanbambvu,vL((ab)),nm}. Let us fix k+. We show, that L is not recognised by a k-ambiguous VASS. Assume, towards contradiction, that it is. Hence language Lk=LL((ab)k+2) is also recognised by a k-ambiguous VASS. Let f be a function such that f:{ϵ}ω and f(ϵ)=ω. Therefore, by Lemma 5, we get, that Lk is not recognised by a k-ambiguous VASS, contradiction. Hence L is not recognised by a k-ambiguous VASS. On the other hand, it can be recognised by a 1-dimensional VASS, which is presented in Figure 2.

Observe, that because each word is read by only finite number of accepting runs, one can see bounded-ambiguity as an extension of the notion of determinism. A second extension of the determinism is history-determinism. In [7] it was shown, that history-deterministic VASSs can express more than deterministic ones and less than nondeterministic ones. Up to now, there has been no comparison of the expressive power of history-deterministic and bounded-ambiguous VASSs. Now, we show, that these language classes are incomparable, which means that there exists a language recognised by an unambiguous VASS, which is not a language of history-deterministic VASS and language which is recognised by a history-deterministic VASS and it is not recognised by a k-ambiguous VASS for any k+. Recall, that in Lemma 16 we have shown that there exists L1-AmbHist. Hence it is enough to show the following Lemma:

Figure 3: VASS recognising (starting from zero) {anbamn,m,(m2n+2n+21)}.
Lemma 18.

There exists language LHistBAmb.

Proof.

Let L=anba2n+2n+21. Observe, that im(L) is not a semilinear set. Hence, due to Lemma 8, for every k+ we have that L is not recognised by a k-ambiguous VASS. Hence LBAmb. On the other hand it is recognised by a history-deterministic VASS presented in the Figure 3. It is history-deterministic, because the best option is to fire loops in states q2 and q3 as long as possible. In this way one can read words anbak for each k such that

k2Σi=1n1(2i+1)+2n+1+2n=2(2n1)+2n+2n+1+1=2n+2n+21

5 Proof of Theorem 1

In this section we prove Theorem 1. We start by introducing Lossy counter machines (LCMs) [24, 31]. Formally, an LCM is M=Q,Z,Δ where Q={l1,,lm} is a finite set of states, Z=(z1,,zn) are n counters, and ΔQ×OP(Z)×Q, where OP(Z)={inc,dec,ztest,skip}n. A configuration of M is q(a) where qQ and a=(a1,,an)n. There is a transition q(a)tq(b) if there exists tΔ such that t=(q,op,q) and for each i[1,n]:

  • If opi=inc then biai+1

  • If opi=dec then biai1

  • If opi=skip then biai

  • If opi=ztest then ai=bi=0

Observe, that counters can nondeterministically decrease at each step. A run of M is a finite sequence q1(a1)t1q2(a2)t2tn1qn(an). Given a configuration q(u), the reachability set of q(u) is the set of all configurations reachable from q(u) via runs of M. We denote this set as Reach(q(u)). For simplicity we denote by Reach(q) the set of configurations reachable from q(0). It was shown in [31] that the problem of deciding whether for a configuration q(u) and LCM M set Reach(q(u)) configuration is finite, is undecidable. Due to [1] even if u is always equal to 0 the problem is still undecidable. We call this problem 0-finite reach. We prove Theorem 1 by reducing from 0-finite reach. The proof is similar to the proofs of undecidability of regularity [34] and determinization [1]. The rest of the section is devoted to the proof of Theorem 1.

Firstly, we present an overview of the proof. For each LCM M1 with an initial state we create another LCM M and initial state l0 with the same answer to the 0-finite reach problem. Then, we define a language LM,l0, which intuitively encodes the correct runs of M. For technical reasons, namely because coverability VASSs are well-suited for recognising languages similar to anbn we encode the correct runs in reverse, that means from the final configuration to the initial one. Moreover, because we work with LCMs, it is better for us to work with the complement of LM,l0, that is LM,l0¯. In such a way we get at the end a language for which Lemma 5 is useful. Then, the proof of Theorem 1 is split into three claims. Claim 19 states, that LM,l0¯ is recognised by an effectively constructible 1-dimensional VASS A. Claim 20 provides, that if Reach(l0) is finite then LM,l0 is a regular language. Finally, Claim 21 states, that if Reach(l0) is not finite then LM,l0 is not recognised by a VASS from the class of all boundedly-ambiguous VASS. All these claims give a direct reduction from 0-finite reach to deciding whether a language of a 1-VASS belongs to class C of languages, which contains all regular languages and is contained in the class of all boundedly-ambiguous VASS languages. Thus they conclude the proof of Theorem 1.

Let us fix LCM M1=Q1,Z1,Δ1 with Q={l1,l2,lm} and Z={z1,z2,,zn}. Let l0 be the initial state of M1. We add to M1 two states: q1 and q2 and for i[1,m] transitions ti from li to q1 with no effect on the counters. In addition, for each i[2,n] we add a transition from q1 to q1 decrementing the ith counter and incrementing the first counter. We also add two transitions decrementing the first counter. The first one goes from q1 to q2. The second one goes from q2 to q2. In such a way we obtain LCM M=Q,Z,Δ. The sketch of the construction of M is presented in the Figure 4.

Figure 4: Sketch of the construction of LCM M.

Observe, that because each of the added transitions does not increase the sum of the counters, from q1 we can go only to q2 and later we can only stay in q2 the answer for 0-finite reach is the same for both: M1 and M. Hence, we proceed later with M. We encode each configuration q(a1,a2,,an) as a word over Σ=QZ as qz1a1z2a2znan. We use encodings of configurations to obtain an encoding of a run by concatenating encodings of its configurations. Finally, we define language LM,l0={wrw is an encoding of a run in M from l0(0,0,,0)}.

Claim 19.

One can construct 1-dimensional VASS recognising LM,l0¯.

Proof.

W.l.o.g. we assume, that there is at most one transition between each pair of states (otherwise we may split a state into several states, one for each incoming letter). We construct A such that it accepts w if and only if wr does not represent a valid run of M from l0(0,0,,0). The idea is, that A guesses the violation in the run represented by the word w. We have three types of violations. The first type is a control state violation, that is the run uses nonexisting transition or does not start in l0(0,0,,0). The second type is a counter violation, that we have invalid counter values between two consecutive configurations. The third violation is that we have invalid encoding of a configuration, that is we have two consecutive letters zizj such that j>i. To spot control violation for nonexisting transitions we will have gadget for each pair of states p and q such that there is no transition from p to q spotting infix of the form znzn1z1qznzn1z1p. Such gadget is just an NFA. Observe, that if a run start in l0(0,0,,0) then either the whole encoding of the run is equal to l0 or suffix is of the form pl0 for some pQ. Therefore to spot control violation, that the run does not start in l0(0,0,,0) we will have an NFA recognising words such that suffix is not of the form pl0 for some pQ and the encoding is not equal to l0. To spot counter violation we will have a 1-dimensional VASS for each transition and each counter spotting violation when firing this transition on this counter. Let us fix transition t and counter zi. Let transition t be from state p to state q. We have four possibilities for the operation performed by t on the counter zi. Therefore we need to spot infix of the form:

  1. 1.

    znzn1ziaz1qznzn1zibz1p where a>b1 (equivalently ab) if transition t decrements counter zi.

  2. 2.

    znzn1ziaz1qznzn1zibz1p where a>b+1 if transition t increments counter zi.

  3. 3.

    znzn1ziaz1qznzn1zibz1p where a>b if transition t has no effect on the counter zi.

  4. 4.

    znzn1ziaz1qznzn1zibz1p where a>0 or b>0 if transition t zero-tests counter zi.

All of the above can be done with 1-dimensional VASS. To spot invalid encoding of a configuration for each 1i<jn we will have an NFA recognising words with infix zizj. As all the gadgets have one initial state in which we “ignore” some prefix of the word, we can join them and obtain one dimensional VASS with single initial configuration.

Claim 20.

If Reach(l0) is finite then LM,l0¯ is a regular language.

Proof.

Observe, that in the proof of Claim 19 only gadgets spotting counter violations were not an NFA. Therefore it is enough to replace them by some NFAs. As Reach(l0) is finite there exists a bound B on the possible values of the counters. Hence we can implement each gadget spotting counter violation using the fact, that Ba,b. For instance for transition t from state p to q having no effect on the counter zi we can have an NFA being a union of NFAs for each 0b<aB spotting infix of the form znzn1ziaz1qznzn1zibz1p. In this way we will not detect counter violation increasing the counter to the value above B. Therefore we add another gadget spotting, that one counter is above B hence then the word does not encode a correct run. This can be done by spotting for each i[1,n] infix ziB+1, which can be done by an NFA. Because every gadget is now an NFA we showed that LM,l0¯ is a regular language when Reach(l0) is finite.

Claim 21.

If Reach(l0) is infinite then LM,l0¯ is not recognised by a boundedly-ambiguous VASS.

Proof.

Assume, towards contradiction, that LM,l0¯ is recognized by a k-ambiguous VASS for some k+. Recall, that there exist q1,q2Q such that from each q3Q such that q3q2 and q3q1 there exists a transition from q3 to q1 with no effect on the counters. Moreover, for each i[2,n] there exists a transition from q1 to q1 decrementing the ith counter and increasing the first counter. Additionally, there is a single transition leaving q1 decrementing the first counter to q2 and there is exactly one transition leaving q2, which goes to q2 and decrements the first counter.

As k-ambiguous VASS languages are closed under intersection with a regular language also L1=LM,l0¯(z1q2)k+2Zq1(QZq2) is recognised by a k-ambiguous VASS. The idea of this intersection is to get a language similar to the language presented in Lemma 5. Observe, that each wL1 can be uniquely decomposed into w=z1n1q2z1n2q2z1nk+2q2v. We denote v by suff(w). We define L={suff(w)wL1}. We define function f on words from L by setting f(w)=0 if wr encodes an incorrect run of M from l0(0,0,,0) and otherwise f(w)=n where n is the maximal number such that w=z1nv for some word v. Observe, that L1={z1n1q2z1n2q2z1n3q2z1nk+2q2wwL,1ik+1nini+1nk+2f(w)}. This is because both transition from q1 to q2 and loop from q2 to q2 decrements the first counter and therefore for each vL1 such that v=z1n1q2z1n2q2z1n3q2z1nk+2q2w we have that vr encodes invalid run if and only if either suff(v)r=wr encodes an incorrect run (that is f(w)=0nk+2) or vr encodes a correct run but f(w)nk+2 (recall the definition of f(w) in this case) or there exists i[k+1] such that nini+1. Moreover, notice that because Reach(l0) is infinite and we have transitions moving values to the first counter from all the other counters in the state q1 for each each B there exist B such that BB and a correct run ρB of M from l0(0,0,,0) to q1(B,0,,0). Let wB be the encoding of this run. Observe, that (z1Bq2)k+2wBrL1. Hence wBrL and f(wBr)=BB. Hence sup(f)=ω and hence, by Lemma 5, L1 is not recognised by a k-ambiguous VASS. Contradiction.

6 Deciding regularity

In this section we present a proof of the following theorem, that deciding regularity of a language of a k-ambigous VASS is decidable. This is in contrast to the general case where regularity is undecidable [34].

Theorem 22.

For every k it is decidable whether for a given k-ambigous VASS A language L(A) is regular.

The proof uses two, already present in the literature, results. The first result is the following Theorem from [10].

Theorem 23 (Theorem 28 [10]).

For any k and a k-ambiguous VASS one can build in elementary time a downward-VASS which recognises the complement of its language.

The second result is the decidability of regular separability of coverability VASS language and reachability VASS language. Regular separability problem asks whether for two VASSs A and B there exists a regular language L such that L(A)L and L(B)L=.

Theorem 24 (Theorem 7 [15]).

Regular separability is decidable if one VASS is a coverability VASS and the second VASS is a reachability VASS. 222Recently even stronger result about decidability of regular separability for reachability VASSs was proven in [23].

We devote the rest of this section to the proof of Theorem 22. Let us fix a k-ambiguous VASS V. We show how to decide regularity of a language of a k-ambiguous VASS. Using Theorem 23 we get a downward-VASS V^ recognising the complement of L(V). Observe, that L(V) is regular if and only if L(V) and L(V^) are regular separable. Now we will use the following claim about downward-VASSs.

Claim 25.

For every downward-VASS one can construct reachability VASS recognising the same language.

Proof.

Let us fix d-dimensional downward-VASS V and let Q be the states of V. We know, that the set of accepting configurations F is downward-closed. Hence, due to Proposition 3, we have a finite set DQ×(ω)d such that:

F=q(u)D{q}×u

We obtain reachability VASS V recognising the same language as V by taking VASS V and for each q(u)D adding state qq(u), ε transition from with no effect from q to qq(u). Moreover, for each i[1,d] if ui we add ε transition from qq(u) to qq(u) incrementing by one the ith counter and otherwise if ui=ω we add an ε-transition from qq(u) to qq(u) decrementing by one ith counter. Let the set of added states be equal to Q. We set the initial configurations of V to be the initial conditions of V. For vector u(ω)d let us denote by u^d vector such that for all i[1,d] we have ui=u^i if ui and u^i=0 otherwise. We set the accepting configurations of V to the following set of configurations F={qq(u)(u^)qq(u)Q}. Now we have to prove, that L(V)=L(V). For L(V)L(V) observe, that for each wL(V) there exists configuration q(v)F such that w is read by an accepting run ρ ending in q(v). As F is a downward-closed set there is u such that vu such that qq(v)(v^)F. Moreover, observe that qq(v)(v^) is reachable from q(u) in V using ε-transitions. Hence wL(V).

For L(V)L(V) observe that for each wL(V) we have an accepting run ρ ending in configuration qq(u)(u^)F. Due to construction of V we know, that there exists prefix of ρ, such that it also reads w and reaches configuration q(v) such that vu and hence q(v)F and wL(V). Now we invoke Claim 25 on V^ to get reachability VASS V^ recognising the same language. Finally, we use algorithm from Theorem 24 for V and V^ knowing that they are regular separable if and only if L(V) is regular. This concludes the proof of Theorem 22.

7 Future research

Other problems for boundedly-ambiguous VASSs.

We have shown in Section 6 that the regularity problem is decidable for baVASSs (boundedly-ambiguous VASSs), in contrast to general VASSs. It is also known that the language equivalence problem is decidable for baVASSs [11], while being undecidable for general VASSs [2, 21]. It is natural to ask whether other classical problems are decidable for baVASSs, for example deciding whether there exists an equivalent deterministic or unambiguous VASS. These problems are undecidable for general VASS due to Theorem 1, but can possibly be decidable for baVASSs. One can also ask whether given k-ambiguous VASS has an equivalent (k1)-ambiguous VASS, our techniques from Section 5 used for showing undecidability does not seem to work in that case. Other further research for baVASSs would be to ask about complexity of the mentioned problems, for example to understand complexity of the regularity problem for baVASSs, since we already know it is decidable.

Languages of VASSs accepting by configuration.

In this paper we have considered VASSs accepting by set of accepting states, it is natural to ask what happens if we modify the acceptance set to be a finite set of accepting configurations or even a single configuration. For VASSs accepting by configuration already the language universality problem is undecidable. We are not aware of any citation, but the proof is rather straightforward and uses the classical technique. For a given two-counter automaton one can construct 1-VASS accepting by configuration, which recognises all the words beside correct encodings of the runs of the two-counter automaton. Therefore the reachability problem for two-counter automaton, which is undecidable, can be reduced to the universality problem for 1-VASSs accepting by a configuration. Since the universality problem is undecidable for VASSs accepting by configuration, there is not much hope that the other nontrivial problems (beside emptiness) are decidable.

However, one can ask what about VASSs accepting by configuration with some restriction on nondeterminism, for example unambiguous or boundedly-ambiguous VASSs accepting by configuration. It is natural to ask whether universality, language equivalence, regularity or determinisability problems are decidable for that models and what is its complexity.

References

  • [1] Shaull Almagor and Asaf Yeshurun. Determinization of One-Counter Nets. In Proceedings of CONCUR 2022, volume 243 of LIPIcs, pages 18:1–18:23. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2022. doi:10.4230/LIPICS.CONCUR.2022.18.
  • [2] Toshiro Araki and Tadao Kasami. Some Decision Problems Related to the Reachability Problem for Petri Nets. Theor. Comput. Sci., 3(1):85–104, 1976. doi:10.1016/0304-3975(76)90067-0.
  • [3] Corentin Barloy and Lorenzo Clemente. Bidimensional linear recursive sequences and universality of unambiguous register automata. In Proceedings of STACS 2021), volume 187 of LIPIcs, pages 8:1–8:15. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2021. doi:10.4230/LIPICS.STACS.2021.8.
  • [4] Jason P. Bell and Daniel Smertnig. Computing the linear hull: Deciding Deterministic? and Unambiguous? for weighted automata over fields. In Proceedings of LICS 2023, pages 1–13. IEEE, 2023. doi:10.1109/LICS56636.2023.10175691.
  • [5] Mikolaj Bojanczyk, Joanna Fijalkow, Bartek Klin, and Joshua Moerman. Orbit-Finite-Dimensional Vector Spaces and Weighted Register Automata. TheoretiCS, 3, 2024. doi:10.46298/THEORETICS.24.13.
  • [6] Mikolaj Bojanczyk, Bartek Klin, and Joshua Moerman. Orbit-finite-dimensional vector spaces and weighted register automata. In Proceedings of LICS 2021, pages 1–13. IEEE, 2021. doi:10.1109/LICS52264.2021.9470634.
  • [7] Sougata Bose, David Purser, and Patrick Totzke. History-Deterministic Vector Addition Systems. In Proceedings of CONCUR 2023, volume 279 of LIPIcs, pages 18:1–18:17, 2023. doi:10.4230/LIPICS.CONCUR.2023.18.
  • [8] Thomas Colcombet. Unambiguity in automata theory. In Proceedings of DCFS 2015, pages 3–18, 2015. doi:10.1007/978-3-319-19225-3_1.
  • [9] Wojciech Czerwinski, Diego Figueira, and Piotr Hofman. Universality Problem for Unambiguous VASS. In Proceedings of CONCUR 2020, volume 171 of LIPIcs, pages 36:1–36:15. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2020. doi:10.4230/LIPICS.CONCUR.2020.36.
  • [10] Wojciech Czerwinski and Piotr Hofman. Language Inclusion for Boundedly-Ambiguous Vector Addition Systems Is Decidable. In Proceedings of CONCUR 2022, volume 243 of LIPIcs, pages 16:1–16:22. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2022. doi:10.4230/LIPICS.CONCUR.2022.16.
  • [11] Wojciech Czerwinski and Piotr Hofman. Language Inclusion for Boundedly-Ambiguous Vector Addition Systems is Decidable. Log. Methods Comput. Sci., 21(1), 2025. doi:10.46298/LMCS-21(1:27)2025.
  • [12] Wojciech Czerwinski and Slawomir Lasota. Regular Separability of One Counter Automata. Log. Methods Comput. Sci., 15(2), 2019. doi:10.23638/LMCS-15(2:20)2019.
  • [13] Wojciech Czerwiński, Sławomir Lasota, Roland Meyer, Sebastian Muskalla, K. Narayan Kumar, and Prakash Saivasan. Regular separability of well-structured transition systems. In 29th International Conference on Concurrency Theory, CONCUR 2018, volume 118 of LIPIcs, pages 35:1–35:18. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2018. doi:10.4230/LIPIcs.CONCUR.2018.35.
  • [14] Wojciech Czerwinski, Antoine Mottet, and Karin Quaas. New techniques for universality in unambiguous register automata. In Proceedings of ICALP 2021, volume 198 of LIPIcs, pages 129:1–129:16. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2021. doi:10.4230/LIPICS.ICALP.2021.129.
  • [15] Wojciech Czerwinski and Georg Zetzsche. An Approach to Regular Separability in Vector Addition Systems. In LICS ’20: 35th Annual ACM/IEEE Symposium on Logic in Computer Science, Saarbrücken, Germany, July 8-11, 2020, pages 341–354. ACM, 2020. doi:10.1145/3373718.3394776.
  • [16] L.E. Dickson. Finiteness of the odd perfect and primitive abundant numbers with n distinct prime factors. American Journal of Mathematics, 35((4)):413–422, 1913.
  • [17] Seymour Ginsburg and Joseph Ullian. Ambiguity in Context Free Languages. J. ACM, 13(1):62–89, 1966. doi:10.1145/321312.321318.
  • [18] Mika Göös, Stefan Kiefer, and Weiqiang Yuan. Lower Bounds for Unambiguous Automata via Communication Complexity. In Proceedings of ICALP 2022, volume 229 of LIPIcs, pages 126:1–126:13. Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2022. doi:10.4230/LIPICS.ICALP.2022.126.
  • [19] Sheila A. Greibach. A Note on Undecidable Properties of Formal Languages. Math. Syst. Theory, 2(1):1–6, 1968. doi:10.1007/BF01691341.
  • [20] Christoph Haase. A survival Guide to Presburger Arithmetic. ACM SIGLOG News, 5(3):67–82, 2018. doi:10.1145/3242953.3242964.
  • [21] Piotr Hofman, Richard Mayr, and Patrick Totzke. Decidability of weak simulation on one-counter nets. In Proceedings of LICS 2013, pages 203–212. IEEE Computer Society, 2013. doi:10.1109/LICS.2013.26.
  • [22] Richard M. Karp and Raymond E. Miller. Parallel program schemata. J. Comput. Syst. Sci., 3(2):147–195, 1969. doi:10.1016/S0022-0000(69)80011-5.
  • [23] Eren Keskin and Roland Meyer. On the separability problem of VASS reachability languages. In Proceedings of the 39th Annual ACM/IEEE Symposium on Logic in Computer Science, LICS 2024, Tallinn, Estonia, July 8-11, 2024, pages 49:1–49:14. ACM, 2024. doi:10.1145/3661814.3662116.
  • [24] Richard Mayr. Undecidable problems in unreliable computations. Theor. Comput. Sci., 297(1-3):337–354, 2003. doi:10.1016/S0304-3975(02)00646-1.
  • [25] Antoine Mottet and Karin Quaas. The containment problem for unambiguous register automata. In Proceedings of STACS 2019, pages 53:1–53:15, 2019. doi:10.4230/LIPICS.STACS.2019.53.
  • [26] Frank Neven, Thomas Schwentick, and Victor Vianu. Finite state machines for strings over infinite alphabets. ACM Trans. Comput. Log., 5(3):403–435, 2004. doi:10.1145/1013560.1013562.
  • [27] Aditya Prakash and K. S. Thejaswini. On History-Deterministic One-Counter Nets. In Proceedings of FoSSaCS 2023, volume 13992 of Lecture Notes in Computer Science, pages 218–239. Springer, 2023. doi:10.1007/978-3-031-30829-1_11.
  • [28] Antoni Puch and Daniel Smertnig. Factoring through monomial representations: arithmetic characterizations and ambiguity of weighted automata. CoRR, abs/2410.03444, 2024. doi:10.48550/arXiv.2410.03444.
  • [29] Mikhail Raskin. A superpolynomial lower bound for the size of non-deterministic complement of an unambiguous automaton. In Proceedings of ICALP 2018, pages 138:1–138:11, 2018. doi:10.4230/LIPICS.ICALP.2018.138.
  • [30] Sylvain Schmitz. The complexity of reachability in vector addition systems. ACM SIGLOG News, 3(1):4–21, 2016. doi:10.1145/2893582.2893585.
  • [31] Philippe Schnoebelen. Lossy Counter Machines Decidability Cheat Sheet. In Reachability Problems, 4th International Workshop, RP 2010, Brno, Czech Republic, August 28-29, 2010. Proceedings, volume 6227 of Lecture Notes in Computer Science, pages 51–75. Springer, 2010. doi:10.1007/978-3-642-15349-5_4.
  • [32] Richard Edwin Stearns and Harry B. Hunt III. On the equivalence and containment problems for unambiguous regular expressions, regular grammars and finite automata. SIAM J. Comput., 14(3):598–611, 1985. doi:10.1137/0214044.
  • [33] Wen-Guey Tzeng. On path equivalence of nondeterministic finite automata. Inf. Process. Lett., 58(1):43–46, 1996. doi:10.1016/0020-0190(96)00039-7.
  • [34] Rüdiger Valk and Guy Vidal-Naquet. Petri nets and regular languages. J. Comput. Syst. Sci., 23(3):299–325, 1981. doi:10.1016/0022-0000(81)90067-2.
  • [35] Łukasz Orlikowski. Languages of Unambiguous Vector Addition Systems with States. Master’s thesis, University of Warsaw, 2024. URL: https://apd.uw.edu.pl/diplomas/225085/.

Proof of Lemma 7.

We prove this lemma by induction on n. For n=0 we have ρ=ε and hence all decomposition conditions are satisfied. Now we assume, that this Lemma is true for n1 and we show that this implies Lemma 7 for n.

Let π1 be the prefix of ρ reading am1bam2bamn1 and let t be the next transition of ρ after π1. Hence ρ=π1tπ2 for some π2. By induction assumption we can apply Lemma 7 to π1 and get constant C and decomposition:

π1=α1β1a1α1α2β2a2α2αn1βn1an1λ

Observe, that we changed αn1 to λ as we will redefine αn1. Now let us set αn1=λt. Hence

ρ=α1β1a1α1α2β2a2α2αn1βn1an1αn1π2

Recall the definition of set An from condition 5, let m be the maximal norm of a transition, s be the maximal norm of an initial configuration and let us define constants T=s+2(n1)mC and Cn=M(V,An,T) given by Lemma 6. Let us also define constant Kn=maxS[d]M(V,S,T+mCn). Let also C=max(C+1,Cn,Kn). This will be a constant for Lemma 7 and n. We have two cases. The first case is that π2=αnβnanαn for some loop βn, which is nonnegative on counters from [d]An and |αnβn|Cn and βn is not a prefix of αn. The second case is that such a decomposition of π2 does not exist. We start the proof with the second case.

Case 2.

Observe, that for each i[n1] and l[d]An[d]Ai:

effl(βi)=0

Hence:

effl(α1β1a1α1α2β2a2α2αn1βn1an1αn1)=Σi=1n1(effl(αi)+effl(αi))mΣi=1n1(|αi|+|αi|)2(n1)mC=T

Hence, because of the definition of Cn and the fact that in this case, the decomposition of π2 does not exist, we have that |π2|CnC. Then we set αn=π2 and βn=αn=ε. Then clearly from the induction assumption and the definition of αn1,αn,βn,αn conditions 1-3 and 5 are satisfied. Condition 4 is satisfied for j<n by induction assumption and for j=n we have mj=|αnβnαn|CnC hence it is also satisfied. Condition 6 is satisfied for j<n by induction assumption. It is satisfied for j=n because otherwise π2 could have been decomposed and we are in case 1.

Case 1.

We know, that π2 can be decomposed as described above. If there are multiple decompositions we choose any of the ones minimizing |αnβn|. Now, we show that decomposition of ρ:

ρ=α1β1a1α1α2β2a2α2αnβnanαn

satisfies all the conditions. We start with conditions 2-6 as Condition 1 is the most challenging to prove.

Condition 2.

For j<n1 this condition follows from the induction assumption. For j=n1 we have that αn1=λt. Recall that t was a transition reading letter b and from the induction assumption λ does not read letter b. Moreover, αn is a suffix of π2, which does not read the letter b. Hence the condition follows.

Condition 3.

For j<n the condition follows from the induction assumption and for j=n we have that αnβn is a prefix of π2, which does not read the letter b.

Condition 4.

For j<n we have this condition from induction assumption and for j=n we have that βnε is a loop.

Condition 5.

This condition for j<n follows from inductions assumption and for j=n follows from the fact that βn is a nonnegative loop on counters from [d]An as required.

Condition 6.

For j<n we have it from induction assumption. For j=n we have it from minimality of |αnβn|.

Condition 1.

Observe, that for i[n2] from induction assumption we have |αi|,|βi|,|αi|CC and moreover |αn1|,|βn1|CC. Moreover, from induction assumption, |αn1|,|βn1|CC and |αn1|=|λt|C+1C. Additionally |αnβn|CnC. Therefore it is enough to prove that |αn|KnC. Let

S=[d]i=1nsupport(βi)

Observe, that for each lS we have:

effl(α1β1a1α1α2β2a2α2αnβnan)=effl(αn)+Σi=1n1(effl(αi)+effl(αi))mCn+2(n1)mC

Recall that Kn=M(V,S,T+mCn) and T=2(n1)mC, so if |αn|>Kn then αn contains a nonnegative loop on counters from S. Hence it is enough to prove, that αn does not contain such loop. Assume, for the sake of contradiction, that αn=λγλ such that γ is a nonnegative loop on counters from S. We define accepting runs ϕ1,ϕ2,,ϕk+1, which will read the same word, but will be different and hence this will create a contradiction with the fact that V is k-ambiguous VASS. Intuitively, due to loops βn and γ we have more degrees of freedom in the last block and we can create k+1 different runs over the same word. As ρ is a prefix of an accepting run we know, that there exists ρ1 such that ρρ1 is an accepting run. Firstly, we define runs ψ1, ψ2 and ψ3, which will be parts of ϕ1,ϕ2,,ϕk+1:

ψ1=α1β1a1+b1α1α2β2a2+b2α2αnβnan+bn
ψ2=λγ
ψ3=λρ1

where for i[n] we define bi=(k+1)m|γ||βn|+Σj=i+1nbjm|βj|. The intuition is, that bi is chosen in such a way to compensate the possible decrease of counters because of additional executions of loops βi+1,βi+2,,βn and γ. Finally we define ϕi

ϕi=ψ1βni|γ|ψ2γ(k+1i)|βn|ψ3

where for i[n] we define bi=(k+1)m|γ||βn|+Σj=i+1nbjm|βj|. Now it is enough to prove Claims 26, 27 and 28.

Claim 26.

For each i[k+1] we have that ϕi is an accepting run.

Proof.

Let us fix i[k+1]. Because ρρ1 is an accepting run it is enough to prove that:

  1. 1.

    For each j[n1] and l[d] we have

    effl(α1β1a1+b1α1α2β2a2+b2α2αjβjaj+bj)effl(α1β1a1α1α2β2a2α2αjβjaj)
  2. 2.

    For each l[d] we have

    effl(ψ1βni|γ|)effl(α1β1a1α1α2β2a2α2αnβnan)
  3. 3.

    For each l[d] we have

    effl(ψ1βnbn+i|γ|ψ2γ(k+1i)|βn|)effl(α1β1a1α1α2β2a2α2αnβnanλγ)

Point 1.

We prove this by induction on j. For j=1 the inequality follows from the fact that for each l[d] we have effl(β1)0. Now we show the induction step. If effl(βj)0 we get the inequality from the induction assumption. Hence now we assume effl(βj)<0. Therefore there has to be u<j such that effl(βu)>0. Let u be the maximal such. Observe, that from induction assumption:

effl(α1β1a1+b1α1α2β2a2+b2α2αs1βu1au1+bu1αuβuauαuαjβjajαj)effl(α1β1a1α1α2β2a2α2αjβjajαj)

And moreover:

bueffl(βu)bu

and for t[u+1,j] we have:

bteffl(βt)btm|βt|

Hence:

effl(α1β1a1+b1α1α2β2a2+b2α2αjβjaj+bj)=effl(α1β1a1+b1α1α2β2a2+b2α2αs1βu1au1+bu1αuβuauαuαjβjajαj)+Σt=ujbteffl(βt)effl(α1β1a1α1α2β2a2α2αjβjajαj)+buΣt=u+1jbtm|βt|effl(α1β1a1α1α2β2a2α2αjβjajαj)

Point 2.

If effl(βn)0 than because of point 1 we have:

effl(α1β1a1+b1α1α2β2a2+b2α2αnβnan+bn+i|γ|)effl(α1β1a1α1α2β2a2α2αnβnan)

Hence, we can assume effl(βn)<0. Therefore there has to be j<n such that effl(βj)>0. Let j be the maximal such. Observe, that:

effl(α1β1a1+b1α1α2β2a2+b2α2αjβjajαjβj+1aj+1αj+1αnβnan)effl(α1β1a1α1α2β2a2α2αnβnan)
bjeffl(βj)bj

And for each s[j+1,n]

bseffl(βs)bsm|βs|

Hence:
effl(α1β1a1+b1α1α2β2a2+b2α2αnβnan+bn+i|γ|)=effl(α1β1a1+b1α1α2β2a2+b2α2αjβjajαjβj+1aj+1αj+1αnβnan)+Σs=jnbseffl(βs)+i|γ|effl(βn)effl(α1β1a1α1α2β2a2α2αnβnan)+bjΣs=j+1nbsm|βs|mi|λ||βn|effl(α1β1a1α1α2β2a2α2αnβnan)

Point 3.

If effl(γ)0 than the inequality follows from Point 2. Hence now we assume effl(γ)<0. Therefore there has to be j[n] such that effl(βj)>0. Let j be the maximal such. Hence: Observe, that:

effl(α1β1a1+b1α1α2β2a2+b2α2αjβjajαjαnβnanλγ)effl(α1β1a1α1α2β2a2α2αjβjajαjαnβnanλγ)
bjeffl(βj)bj

And for s[j+1,n] we have:

bseffl(βs)bsm|βs|
effl(α1β1a1+b1α1α2β2a2+b2α2αnβnan+bn+i|γ|λγ1+(k+1i)|βn|)=effl(α1β1a1+b1α1α2β2a2+b2α2αjβjajαjαnβnanλγ)+bjeffl(βj)+Σs=j+1nbseffl(βs)+i|γ|effl(βn)+(k+1i)|βn|effl(γ)effl(α1β1a1α1α2β2a2α2αjβjajαjαnβnanλγ)+bjΣs=j+1nbsm|βs|(k+1)m|βn||γ|=effl(α1β1a1α1α2β2a2α2αjβjajαjαnβnanλγ)

Claim 27.

For each i[k+1] run ϕi reads the same word.

Proof.

Let us fix i,j[k+1] such that i<j. Observe, that w(ϕi)=w(ϕj) if and only if w(βn(ji)|γ|λ) and w(λγ(ji)|βn|). We have, that w(βn),w(αn)L(a). Hence also γ,λL(a), as they are parts of αn. Therefore these two runs read the same word because

|βn(ji)|γ|λ|=|λγ(ji)|βn||

Claim 28.

For each i,j[k+1] such that ij we have that ϕiϕj.

Proof.

W.l.o.g. assume i<j. Observe, that it is enough to show, that

βn(ji)|γ|λλγ(ji)|βn|

Assume, for the sake of contradiction that:

βn(ji)|γ|λ=λγ(ji)|βn|

Observe, that βn is not a prefix of λγ, because then βn would be a prefix of αn, which is not possible because of properties of π2 (recall, that π2=αnβnanαn and βn is not a prefix of αn). Hence λγ is a prefix of βn.

Hence for all l[d] we have:

effl(βn(ji)|γ|λ)=effl(λγ(ji)|βn|)

Hence support(βn)=support(γ). Because λγ is a prefix of βn and λγβn this contradicts the minimality of |αnβn|.

Since we have proven Claims 2627 and 28 we know that runs ϕi are all accepting, different and read the same word. This concludes the proof of Lemma 7.