Pub Date : 2024-06-27DOI: 10.1007/s00224-024-10181-z
Jacob Holm, Eva Rotenberg
We present a data structure that, given a graph G of n vertices and m edges, and a suitable pair of nested r-divisions of G, preprocesses G in (O(m+n)) time and handles any series of edge-deletions in O(m) total time while answering queries to pairwise biconnectivity in worst-case O(1) time. In case the vertices are not biconnected, the data structure can return a cutvertex separating them in worst-case O(1) time. As an immediate consequence, this gives optimal amortized decremental biconnectivity, 2-edge connectivity, and connectivity for large classes of graphs, including planar graphs and other minor free graphs.
我们提出了一种数据结构,给定一个由 n 个顶点和 m 条边组成的图 G,以及 G 的一对合适的嵌套 r 分割,它能在(O(m+n))时间内对 G 进行预处理,并在 O(m) 的总时间内处理任何一系列边的删除,同时在最坏情况下在 O(1) 的时间内回答成对双连通性查询。如果顶点不是双连接的,数据结构可以在最坏情况下用 O(1) 的时间返回一个将它们分开的切割顶点。因此,这就为包括平面图和其他次要自由图在内的大量图类提供了最优的摊销递减双连通性、2-边连通性和连通性。
{"title":"Good r-divisions Imply Optimal Amortized Decremental Biconnectivity","authors":"Jacob Holm, Eva Rotenberg","doi":"10.1007/s00224-024-10181-z","DOIUrl":"https://doi.org/10.1007/s00224-024-10181-z","url":null,"abstract":"<p>We present a data structure that, given a graph <i>G</i> of <i>n</i> vertices and <i>m</i> edges, and a suitable pair of nested <i>r</i>-divisions of <i>G</i>, preprocesses <i>G</i> in <span>(O(m+n))</span> time and handles any series of edge-deletions in <i>O</i>(<i>m</i>) total time while answering queries to pairwise biconnectivity in worst-case <i>O</i>(1) time. In case the vertices are not biconnected, the data structure can return a cutvertex separating them in worst-case <i>O</i>(1) time. As an immediate consequence, this gives optimal amortized decremental biconnectivity, 2-edge connectivity, and connectivity for large classes of graphs, including planar graphs and other minor free graphs.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"5 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141511288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-05DOI: 10.1007/s00224-024-10178-8
Sándor P. Fekete, Dominik Krupke
We investigate several geometric problems of finding tours and cycle covers with minimum turn cost, which have been studied in the past, with complexity, approximation results, and open problems dating back to work by Arkin et al. in 2001. Many new practical applications have spawned variants: For full coverage, all points have to be covered, for subset coverage, specific points have to be covered, and for penalty coverage, points may be left uncovered by incurring a penalty. We show that finding a minimum-turn (full) cycle cover is NP-hard even in 2-dimensional grid graphs, solving the long-standing open Problem 53 in The Open Problems Project edited by Demaine, Mitchell and O’Rourke. We also prove NP-hardness of finding a subset cycle cover of minimum turn cost in thin grid graphs, for which Arkin et al. gave a polynomial-time algorithm for full coverage; this shows that their boundary techniques cannot be applied to compute exact solutions for subset and penalty variants. We also provide a number of positive results. In particular, we establish the first constant-factor approximation algorithms for all considered subset and penalty problem variants for grid-based instances, based on LP/IP techniques. These geometric versions allow many possible edge directions (and thus, turn angles, such as in hexagonal grids or higher-dimensional variants); our approximation factors improve the combinatorial ones of Arkin et al.
{"title":"What Goes Around Comes Around: Covering Tours and Cycle Covers with Turn Costs","authors":"Sándor P. Fekete, Dominik Krupke","doi":"10.1007/s00224-024-10178-8","DOIUrl":"https://doi.org/10.1007/s00224-024-10178-8","url":null,"abstract":"<p>We investigate several geometric problems of finding tours and cycle covers with minimum turn cost, which have been studied in the past, with complexity, approximation results, and open problems dating back to work by Arkin et al. in 2001. Many new practical applications have spawned variants: For <i>full coverage</i>, all points have to be covered, for <i>subset coverage</i>, specific points have to be covered, and for <i>penalty coverage</i>, points may be left uncovered by incurring a penalty. We show that finding a minimum-turn (full) cycle cover is NP-hard even in 2-dimensional grid graphs, solving the long-standing open <i>Problem 53</i> in <i>The Open Problems Project</i> edited by Demaine, Mitchell and O’Rourke. We also prove NP-hardness of finding a <i>subset</i> cycle cover of minimum turn cost in <i>thin</i> grid graphs, for which Arkin et al. gave a polynomial-time algorithm for full coverage; this shows that their boundary techniques cannot be applied to compute exact solutions for subset and penalty variants. We also provide a number of positive results. In particular, we establish the first constant-factor approximation algorithms for all considered subset and penalty problem variants for grid-based instances, based on LP/IP techniques. These geometric versions allow many possible edge directions (and thus, turn angles, such as in hexagonal grids or higher-dimensional variants); our approximation factors improve the combinatorial ones of Arkin et al.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"4 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141252148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-20DOI: 10.1007/s00224-024-10180-0
Alexey Milovanov
We combine Solomonoff’s approach to universal prediction with algorithmic statistics and suggest to use the computable measure that provides the best “explanation” for the observed data (in the sense of algorithmic statistics) for prediction. In this way we keep the expected sum of squares of prediction errors bounded (as it was for the Solomonoff’s predictor) and, moreover, guarantee that the sum of squares of prediction errors is bounded along any Martin-Löf random sequence. An extended abstract of this paper was presented at the 16th International Computer Science Symposium in Russia (CSR 2021) (Milovanov 2021).
{"title":"Prediction and MDL for infinite sequences","authors":"Alexey Milovanov","doi":"10.1007/s00224-024-10180-0","DOIUrl":"https://doi.org/10.1007/s00224-024-10180-0","url":null,"abstract":"<p>We combine Solomonoff’s approach to universal prediction with algorithmic statistics and suggest to use the computable measure that provides the best “explanation” for the observed data (in the sense of algorithmic statistics) for prediction. In this way we keep the expected sum of squares of prediction errors bounded (as it was for the Solomonoff’s predictor) and, moreover, guarantee that the sum of squares of prediction errors is bounded along any Martin-Löf random sequence. An extended abstract of this paper was presented at the 16th International Computer Science Symposium in Russia (CSR 2021) (Milovanov 2021).</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"5 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141148389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-07DOI: 10.1007/s00224-024-10173-z
Markus Lohrey, Florian Stober, Armin Weiß
The power word problem for a group (varvec{G}) asks whether an expression (varvec{u_1^{x_1} cdots u_n^{x_n}}), where the (varvec{u_i}) are words over a finite set of generators of (varvec{G}) and the (varvec{x_i}) binary encoded integers, is equal to the identity of (varvec{G}). It is a restriction of the compressed word problem, where the input word is represented by a straight-line program (i.e., an algebraic circuit over (varvec{G})). We start by showing some easy results concerning the power word problem. In particular, the power word problem for a group (varvec{G}) is (varvec{textsf{uNC}^{1}})-many-one reducible to the power word problem for a finite-index subgroup of (varvec{G}). For our main result, we consider graph products of groups that do not have elements of order two. We show that the power word problem in a fixed such graph product is (varvec{textsf{AC} ^0})-Turing-reducible to the word problem for the free group (varvec{F_2}) and the power word problems of the base groups. Furthermore, we look into the uniform power word problem in a graph product, where the dependence graph and the base groups are part of the input. Given a class of finitely generated groups (varvec{mathcal {C}}) without order two elements, the uniform power word problem in a graph product can be solved in (varvec{textsf{AC} ^0[textsf{C}_=textsf{L} ^{{{,textrm{UPowWP},}}(mathcal {C})}]}), where (varvec{{{,textrm{UPowWP},}}(mathcal {C})}) denotes the uniform power word problem for groups from the class (varvec{mathcal {C}}). As a consequence of our results, the uniform knapsack problem in right-angled Artin groups is (varvec{textsf{NP}})-complete. The present paper is a combination of the two conference papers (Lohrey and Weiß 2019b, Stober and Weiß 2022a). In Stober and Weiß (2022a) our results on graph products were wrongly stated without the additional assumption that the base groups do not have elements of order two. In the present work we correct this mistake. While we strongly conjecture that the result as stated in Stober and Weiß (2022a) is true, our proof relies on this additional assumption.
群(varvec{G})的幂词问题问的是表达式 (varvec{u_1^{x_1} cdots u_n^{x_n}}) 是否是幂词、其中,(varvec{u_i})是有限的(varvec{G})生成器集合上的词;(varvec{x_i})是二进制编码的整数,等于(varvec{G})的标识。它是压缩字问题的一个限制条件,在压缩字问题中,输入字由直线程序(即 (varvec{G}) 上的代数电路)表示。我们首先展示一些关于幂词问题的简单结果。特别是,群 (varvec{G}) 的幂级数问题是 (varvec{textsf{uNC}^{1}})-many-one reducible to the power word problem for a finite-index subgroup of (varvec{G}).对于我们的主要结果,我们考虑的是没有二阶元素的群的图积。我们证明了在一个固定的这样的图积中,幂词问题是 (varvec{textsf{AC} ^0})-Turing-reducible 到自由群 (varvec{F_2}) 的词问题和基群的幂词问题的。此外,我们还研究了图积中的均匀幂词问题,其中隶属图和基群是输入的一部分。给定一类无二阶元素的有限生成群((varvec{textsf{AC})),图积中的均匀幂词问题可以在(varvec{textsf{AC})中求解。^0[textsf{C}_=textsf{L}^{{textrm{UPowWP},}}}(mathcal {C})}]}), where (varvec{{,textrm{UPowWP}、(mathcal{C})})表示来自类 (varvec{mathcal {C}}) 的群的均匀幂词问题。)由于我们的结果,直角阿汀群中的均匀knapsack问题是 (varvec{textsf{NP}})-完全的。本文是两篇会议论文(Lohrey and Weiß 2019b, Stober and Weiß 2022a)的合并。在 Stober and Weiß (2022a)中,我们关于图积的结果被错误地表述为没有额外假设基群没有二阶元素。在本论文中,我们纠正了这一错误。虽然我们强烈推测 Stober 和 Weiß (2022a) 中的结果是正确的,但我们的证明依赖于这个额外的假设。
{"title":"The Power Word Problem in Graph Products","authors":"Markus Lohrey, Florian Stober, Armin Weiß","doi":"10.1007/s00224-024-10173-z","DOIUrl":"https://doi.org/10.1007/s00224-024-10173-z","url":null,"abstract":"<p>The power word problem for a group <span>(varvec{G})</span> asks whether an expression <span>(varvec{u_1^{x_1} cdots u_n^{x_n}})</span>, where the <span>(varvec{u_i})</span> are words over a finite set of generators of <span>(varvec{G})</span> and the <span>(varvec{x_i})</span> binary encoded integers, is equal to the identity of <span>(varvec{G})</span>. It is a restriction of the compressed word problem, where the input word is represented by a straight-line program (i.e., an algebraic circuit over <span>(varvec{G})</span>). We start by showing some easy results concerning the power word problem. In particular, the power word problem for a group <span>(varvec{G})</span> is <span>(varvec{textsf{uNC}^{1}})</span>-many-one reducible to the power word problem for a finite-index subgroup of <span>(varvec{G})</span>. For our main result, we consider graph products of groups that do not have elements of order two. We show that the power word problem in a fixed such graph product is <span>(varvec{textsf{AC} ^0})</span>-Turing-reducible to the word problem for the free group <span>(varvec{F_2})</span> and the power word problems of the base groups. Furthermore, we look into the uniform power word problem in a graph product, where the dependence graph and the base groups are part of the input. Given a class of finitely generated groups <span>(varvec{mathcal {C}})</span> without order two elements, the uniform power word problem in a graph product can be solved in <span>(varvec{textsf{AC} ^0[textsf{C}_=textsf{L} ^{{{,textrm{UPowWP},}}(mathcal {C})}]})</span>, where <span>(varvec{{{,textrm{UPowWP},}}(mathcal {C})})</span> denotes the uniform power word problem for groups from the class <span>(varvec{mathcal {C}})</span>. As a consequence of our results, the uniform knapsack problem in right-angled Artin groups is <span>(varvec{textsf{NP}})</span>-complete. The present paper is a combination of the two conference papers (Lohrey and Weiß 2019b, Stober and Weiß 2022a). In Stober and Weiß (2022a) our results on graph products were wrongly stated without the additional assumption that the base groups do not have elements of order two. In the present work we correct this mistake. While we strongly conjecture that the result as stated in Stober and Weiß (2022a) is true, our proof relies on this additional assumption.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"508 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140883734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-11DOI: 10.1007/s00224-024-10172-0
Ondřej Klíma, Jonatan Kolegar
The notion of a quasi-order generated by a homomorphism from the semigroup of all words onto a finite ordered semigroup was introduced by Bucher et al. (Theor. Comput. Sci. 40, 131–148 1985). It naturally occurred in their studies of derivation relations associated with a given set of context-free rules, and they asked a crucial question, whether the resulting relation is a well quasi-order. We answer this question in the case of the quasi-order generated by a semigroup homomorphism. We show that the answer does not depend on the homomorphism, but it is a property of its image. Moreover, we give an algebraic characterization of those finite semigroups for which we get well quasi-orders. This characterization completes the structural characterization given by Kunc (Theor. Comput. Sci. 348, 277–293 2005) in the case of semigroups ordered by equality. Compared with Kunc’s characterization, the new one has no structural meaning, and we explain why that is so. In addition, we prove that the new condition is testable in polynomial time.
{"title":"Characterization of Ordered Semigroups Generating Well Quasi-Orders of Words","authors":"Ondřej Klíma, Jonatan Kolegar","doi":"10.1007/s00224-024-10172-0","DOIUrl":"https://doi.org/10.1007/s00224-024-10172-0","url":null,"abstract":"<p>The notion of a quasi-order generated by a homomorphism from the semigroup of all words onto a finite ordered semigroup was introduced by Bucher et al. (Theor. Comput. Sci. <b>40</b>, 131–148 1985). It naturally occurred in their studies of derivation relations associated with a given set of context-free rules, and they asked a crucial question, whether the resulting relation is a well quasi-order. We answer this question in the case of the quasi-order generated by a semigroup homomorphism. We show that the answer does not depend on the homomorphism, but it is a property of its image. Moreover, we give an algebraic characterization of those finite semigroups for which we get well quasi-orders. This characterization completes the structural characterization given by Kunc (Theor. Comput. Sci. <b>348</b>, 277–293 2005) in the case of semigroups ordered by equality. Compared with Kunc’s characterization, the new one has no structural meaning, and we explain why that is so. In addition, we prove that the new condition is testable in polynomial time.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"251 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140575154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-05DOI: 10.1007/s00224-024-10167-x
Uriel Feige, Vadim Grinberg
In the well known planted clique problem, a clique (or alternatively, an independent set) of size k is planted at random in an Erdos-Renyi random G(n, p) graph, and the goal is to design an algorithm that finds the maximum clique (or independent set) in the resulting graph. We introduce a variation on this problem, where instead of planting the clique at random, the clique is planted by an adversary who attempts to make it difficult to find the maximum clique in the resulting graph. We show that for the standard setting of the parameters of the problem, namely, a clique of size (k = sqrt{n}) planted in a random (G(n, frac{1}{2})) graph, the known polynomial time algorithms can be extended (in a non-trivial way) to work also in the adversarial setting. In contrast, we show that for other natural settings of the parameters, such as planting an independent set of size (k=frac{n}{2}) in a G(n, p) graph with (p = n^{-frac{1}{2}}), there is no polynomial time algorithm that finds an independent set of size k, unless NP has randomized polynomial time algorithms.
{"title":"How to Hide a Clique?","authors":"Uriel Feige, Vadim Grinberg","doi":"10.1007/s00224-024-10167-x","DOIUrl":"https://doi.org/10.1007/s00224-024-10167-x","url":null,"abstract":"<p>In the well known planted clique problem, a clique (or alternatively, an independent set) of size <i>k</i> is planted at random in an Erdos-Renyi random <i>G</i>(<i>n</i>, <i>p</i>) graph, and the goal is to design an algorithm that finds the maximum clique (or independent set) in the resulting graph. We introduce a variation on this problem, where instead of planting the clique at random, the clique is planted by an adversary who attempts to make it difficult to find the maximum clique in the resulting graph. We show that for the standard setting of the parameters of the problem, namely, a clique of size <span>(k = sqrt{n})</span> planted in a random <span>(G(n, frac{1}{2}))</span> graph, the known polynomial time algorithms can be extended (in a non-trivial way) to work also in the adversarial setting. In contrast, we show that for other natural settings of the parameters, such as planting an independent set of size <span>(k=frac{n}{2})</span> in a <i>G</i>(<i>n</i>, <i>p</i>) graph with <span>(p = n^{-frac{1}{2}})</span>, there is no polynomial time algorithm that finds an independent set of size <i>k</i>, unless NP has randomized polynomial time algorithms.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"2015 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140575153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-05DOI: 10.1007/s00224-024-10171-1
Aris Filos-Ratsikas, Alexandros A. Voudouris
We consider a setting with agents that have preferences over alternatives and are partitioned into disjoint districts. The goal is to choose one alternative as the winner using a mechanism which first decides a representative alternative for each district based on a local election with the agents therein as participants, and then chooses one of the district representatives as the winner. Previous work showed bounds on the distortion of a specific class of deterministic plurality-based mechanisms depending on the available information about the preferences of the agents in the districts. In this paper, we first consider the whole class of deterministic mechanisms and show asymptotically tight bounds on their distortion. We then initiate the study of the distortion of randomized mechanisms in distributed voting and show bounds based on several informational assumptions, which in many cases turn out to be tight. Finally, we also experimentally compare the distortion of many different mechanisms of interest using synthetic and real-world data.
{"title":"Revisiting the Distortion of Distributed Voting","authors":"Aris Filos-Ratsikas, Alexandros A. Voudouris","doi":"10.1007/s00224-024-10171-1","DOIUrl":"https://doi.org/10.1007/s00224-024-10171-1","url":null,"abstract":"<p>We consider a setting with agents that have preferences over alternatives and are partitioned into disjoint districts. The goal is to choose one alternative as the winner using a mechanism which first decides a representative alternative for each district based on a local election with the agents therein as participants, and then chooses one of the district representatives as the winner. Previous work showed bounds on the distortion of a specific class of deterministic plurality-based mechanisms depending on the available information about the preferences of the agents in the districts. In this paper, we first consider the whole class of deterministic mechanisms and show asymptotically tight bounds on their distortion. We then initiate the study of the distortion of randomized mechanisms in distributed voting and show bounds based on several informational assumptions, which in many cases turn out to be tight. Finally, we also experimentally compare the distortion of many different mechanisms of interest using synthetic and real-world data.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"130 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140575201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-05DOI: 10.1007/s00224-024-10169-9
Jingnan Xie, Harry B. Hunt III, Richard E. Stearns
A pumping lemma for a class of languages (varvec{mathcal {C}}) is often used to show particular languages are not in (varvec{mathcal {C}}). In contrast, we show that a pumping lemma for a class of languages (varvec{mathcal {C}}) can be used to study the computational complexity of the predicate “(in varvec{mathcal {C}})” via highly efficient many-one reductions. In this paper, we use extended regular expressions (EXREGs, introduced in Câmpeanu et al. (Int. J. Foundations Comput. Sci. 14(6), 1007–1018, 2003)) as an example to illustrate the proof technique and establish the complexity of the predicate “is an EXREG language” for several classes of languages. Due to the efficiency of the reductions, both productiveness (a stronger form of non-recursive enumerability) and complexity results can be obtained simultaneously. For example, we show that the predicate “is an EXREG language” is productive (hence, not recursively enumerable) for context-free grammars, and is Co-NEXPTIME-hard for context-free grammars generating bounded languages. The proof technique is easy to use and requires only a few conditions. This suggests that for any class of languages (varvec{mathcal {C}}) having a pumping lemma, the language class comparison problems (e.g., does a given context-free grammar generate a language in (varvec{mathcal {C}})?) are almost guaranteed to be hard. So, pumping lemmas sometimes could be “harmful” when studying computational complexity results.
{"title":"Pumping Lemmas Can be “Harmful”","authors":"Jingnan Xie, Harry B. Hunt III, Richard E. Stearns","doi":"10.1007/s00224-024-10169-9","DOIUrl":"https://doi.org/10.1007/s00224-024-10169-9","url":null,"abstract":"<p>A pumping lemma for a class of languages <span>(varvec{mathcal {C}})</span> is often used to show particular languages are not in <span>(varvec{mathcal {C}})</span>. In contrast, we show that a pumping lemma for a class of languages <span>(varvec{mathcal {C}})</span> can be used to study the computational complexity of the predicate “<span>(in varvec{mathcal {C}})</span>” via highly efficient many-one reductions. In this paper, we use extended regular expressions (EXREGs, introduced in Câmpeanu et al. (Int. J. Foundations Comput. Sci. <b>14</b>(6), 1007–1018, 2003)) as an example to illustrate the proof technique and establish the complexity of the predicate “is an EXREG language” for several classes of languages. Due to the efficiency of the reductions, both productiveness (a stronger form of non-recursive enumerability) and complexity results can be obtained simultaneously. For example, we show that the predicate “is an EXREG language” is productive (hence, not recursively enumerable) for context-free grammars, and is Co-NEXPTIME-hard for context-free grammars generating bounded languages. The proof technique is easy to use and requires only a few conditions. This suggests that for any class of languages <span>(varvec{mathcal {C}})</span> having a pumping lemma, the language class comparison problems (e.g., does a given context-free grammar generate a language in <span>(varvec{mathcal {C}})</span>?) are almost guaranteed to be hard. So, pumping lemmas sometimes could be “harmful” when studying computational complexity results.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"1 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140575240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-01DOI: 10.1007/s00224-023-10157-5
Till Fluschnik, Leon Kellerhals
We study the problem of placing wildlife crossings, such as green bridges, over human-made obstacles to challenge habitat fragmentation. The main task herein is, given a graph describing habitats or routes of wildlife animals and possibilities of building green bridges, to find a low-cost placement of green bridges that connects the habitats. We develop three problem models for this task and study them from a computational complexity and parameterized algorithmics perspective.
{"title":"Placing Green Bridges Optimally, with a Multivariate Analysis","authors":"Till Fluschnik, Leon Kellerhals","doi":"10.1007/s00224-023-10157-5","DOIUrl":"https://doi.org/10.1007/s00224-023-10157-5","url":null,"abstract":"<p>We study the problem of placing wildlife crossings, such as green bridges, over human-made obstacles to challenge habitat fragmentation. The main task herein is, given a graph describing habitats or routes of wildlife animals and possibilities of building green bridges, to find a low-cost placement of green bridges that connects the habitats. We develop three problem models for this task and study them from a computational complexity and parameterized algorithmics perspective.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"84 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140575237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-26DOI: 10.1007/s00224-024-10168-w
Abstract
Many Boolean functions that need to be encoded as CNF in practice, have only exponential size CNF representations. To avoid this effect, one usually introduces nondeterministic variables. For example, whereas the minimum number of clauses in a CNF computing the parity function (x_1oplus x_2 oplus cdots oplus x_n) is (2^{n-1}), one can use (n-1) nondeterministic variables to get a CNF encoding with 4n clauses. In this paper, we prove tradeoffs between various parameters (the number of clauses, the width of clauses, and the number of nondeterministic variables) of CNF encodings of various symmetric functions. In particular, we show that a folklore way of encoding parity as CNF is provably optimal. We do this by using a tight connection between CNF encodings and depth-3 circuits. This connection shows that CNF encodings is an interesting computational model for Boolean functions: on the one hand, it is routinely used in practice when translating a computational problem to a format acceptable by a SAT solver, on the other hand, lower bounds on the size of CNF encodings imply depth-3 circuit lower bounds.
{"title":"CNF Encodings of Symmetric Functions","authors":"","doi":"10.1007/s00224-024-10168-w","DOIUrl":"https://doi.org/10.1007/s00224-024-10168-w","url":null,"abstract":"<h3>Abstract</h3> <p>Many Boolean functions that need to be encoded as CNF in practice, have only exponential size CNF representations. To avoid this effect, one usually introduces nondeterministic variables. For example, whereas the minimum number of clauses in a CNF computing the parity function <span> <span>(x_1oplus x_2 oplus cdots oplus x_n)</span> </span> is <span> <span>(2^{n-1})</span> </span>, one can use <span> <span>(n-1)</span> </span> nondeterministic variables to get a CNF encoding with 4<em>n</em> clauses. In this paper, we prove tradeoffs between various parameters (the number of clauses, the width of clauses, and the number of nondeterministic variables) of CNF encodings of various symmetric functions. In particular, we show that a folklore way of encoding parity as CNF is provably optimal. We do this by using a tight connection between CNF encodings and depth-3 circuits. This connection shows that CNF encodings is an interesting computational model for Boolean functions: on the one hand, it is routinely used in practice when translating a computational problem to a format acceptable by a SAT solver, on the other hand, lower bounds on the size of CNF encodings imply depth-3 circuit lower bounds.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"166 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140301608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}