Rewriting Structured Cospans
arXiv:2001.09029v3 Announce Type: replace-cross Abstract: We develop a theory of rewriting for structured cospans in order to extend compositional methods for modeling open networks. First, we introduce a category whose objects are structured cospans, and establish conditions under which it is adhesive or a topos. These results guarantee that double pushout rewriting can be applied in this setting. We then define structured cospan grammars and construct their associated languages via a 2-categorical framework, capturing both network composition and rewrite dynamics. As an application, we show that for graphs, hypergraphs, Petri nets, and their typed variants, any grammar induces the same language as its corresponding discrete grammar. This equivalence enables an inductive characterization
View PDF HTML (experimental)
Abstract:We develop a theory of rewriting for structured cospans in order to extend compositional methods for modeling open networks. First, we introduce a category whose objects are structured cospans, and establish conditions under which it is adhesive or a topos. These results guarantee that double pushout rewriting can be applied in this setting. We then define structured cospan grammars and construct their associated languages via a 2-categorical framework, capturing both network composition and rewrite dynamics. As an application, we show that for graphs, hypergraphs, Petri nets, and their typed variants, any grammar induces the same language as its corresponding discrete grammar. This equivalence enables an inductive characterization of rewriting, thereby generalizing classical results from graph transformation to a broader class of categorical models.
Comments: Version accepted by MSCS
Subjects:
Category Theory (math.CT); Formal Languages and Automata Theory (cs.FL); Social and Information Networks (cs.SI)
MSC classes: 18B10
Cite as: arXiv:2001.09029 [math.CT]
(or arXiv:2001.09029v3 [math.CT] for this version)
https://doi.org/10.48550/arXiv.2001.09029
arXiv-issued DOI via DataCite
Submission history
From: Daniel Cicala [view email] [v1] Fri, 24 Jan 2020 14:26:24 UTC (37 KB) [v2] Thu, 29 May 2025 20:53:31 UTC (35 KB) [v3] Thu, 2 Apr 2026 18:33:31 UTC (27 KB)
Sign in to highlight and annotate this article

Conversation starters
Daily AI Digest
Get the top 5 AI stories delivered to your inbox every morning.
More about
modelannounceapplication
Behind the Curtain: Sam's superintelligence New Deal
OpenAI CEO Sam Altman is doing something no tech titan has ever done: He's publishing a detailed blueprint for how government should tax, regulate and redistribute the wealth from the very technology he's racing to build and spread. Why it matters: Altman told us in a half-hour interview that AI superintelligence is so close, so mind-bending, so disruptive that America needs a new social contract — on the scale of the Progressive Era in the early 1900s, and the New Deal during the Great Depression . The big picture: The threats of inaction or slow action are grave, Altman warns — widespread job loss, cyberattacks, social upheaval, machines man can't control. The two most immediate threats, he said, are cyberattacks and biological attacks: We've told you that top tech, business and governme

QUANTUM HORIZONS Your Passwords Have an Expiry Date. Nobody Told You.
By The Architect NEO | April 2026 You know that friend? The one at every barbecue who, somewhere between the third burger and the dying embers, starts talking about encryption? The one who makes you check if your webcam has tape over it? The one who said "don't use that free Wi-Fi" at the airport in 2019 and you thought they were being dramatic? That friend was right about everything. And they're about to be right again — about something much, much bigger. THE QUIET HEIST NOBODY'S REPORTING Right now, while you're reading this on a Tuesday lunchbreak or doomscrolling at 11pm, encrypted data is being stolen. Not decrypted. Not read. Not yet. Stored. Intelligence agencies across the globe have a name for it: "Harvest Now, Decrypt Later." The idea is brutally simple. Steal encrypted data toda
Knowledge Map
Connected Articles — Knowledge Graph
This article is connected to other articles through shared AI topics and tags.
More in Products

Behavior is the New Credential
We are living through a paradigm shift in how we prove we are who we say we are online. Instead of asking What do you know? (password, PIN, mother’s maiden name) or What do you look like? (Face ID, fingerprint) the question has become How do you behave? The post Behavior is the New Credential appeared first on Towards Data Science .

Cloud Cost Anomaly Detection: How to Catch Surprise Bills Before They Hit
Cloud Cost Anomaly Detection: How to Catch Surprise Bills Before They Hit Cloud bills don't spike gradually. They spike overnight. A misconfigured NAT gateway starts routing all inter-AZ traffic inefficiently on a Friday. A data pipeline job enters an infinite retry loop on Saturday. A developer spins up a p3.8xlarge for a test and forgets to terminate it over a long weekend. By the time you find out, you've already burned through budget that wasn't allocated for it. The problem isn't that anomalies happen. The problem is the detection lag: most teams don't discover a cost spike until the invoice arrives 30 days later. With the right alerting in place, you catch the same spike in under 6 hours. This is the practical guide to setting that up. Why Cloud Bills Spike (And Why You Don't Find Ou

QUANTUM HORIZONS Your Passwords Have an Expiry Date. Nobody Told You.
By The Architect NEO | April 2026 You know that friend? The one at every barbecue who, somewhere between the third burger and the dying embers, starts talking about encryption? The one who makes you check if your webcam has tape over it? The one who said "don't use that free Wi-Fi" at the airport in 2019 and you thought they were being dramatic? That friend was right about everything. And they're about to be right again — about something much, much bigger. THE QUIET HEIST NOBODY'S REPORTING Right now, while you're reading this on a Tuesday lunchbreak or doomscrolling at 11pm, encrypted data is being stolen. Not decrypted. Not read. Not yet. Stored. Intelligence agencies across the globe have a name for it: "Harvest Now, Decrypt Later." The idea is brutally simple. Steal encrypted data toda

Cloud Observability vs Monitoring: What's the Difference and Why It Matters
Cloud Observability vs Monitoring: What's the Difference and Why It Matters Your alerting fires at 2 AM. CPU is at 94%, error rate is at 6.2%, and latency is climbing. You page the on-call engineer. They open the dashboard. They see the numbers going up. What they cannot see is why — because the service throwing errors depends on three upstream services, one of which depends on a database that is waiting on a connection pool that was quietly exhausted by a batch job that ran 11 minutes ago. Monitoring told you something was wrong. Observability would have told you what. This is not a semantic argument. Teams with mature observability resolve incidents 2.8x faster than teams that rely on monitoring alone, according to DORA research. The gap matters in production. Understanding why the gap e


Discussion
Sign in to join the discussion
No comments yet — be the first to share your thoughts!