首页 > 最新文献

Theory of Computing Systems最新文献

英文 中文
Characterization of Ordered Semigroups Generating Well Quasi-Orders of Words 有序半群的特征,产生良好的词准有序半群
IF 0.5 4区 计算机科学 Q3 Computer Science Pub Date : 2024-04-11 DOI: 10.1007/s00224-024-10172-0
Ondřej Klíma, Jonatan Kolegar

The notion of a quasi-order generated by a homomorphism from the semigroup of all words onto a finite ordered semigroup was introduced by Bucher et al. (Theor. Comput. Sci. 40, 131–148 1985). It naturally occurred in their studies of derivation relations associated with a given set of context-free rules, and they asked a crucial question, whether the resulting relation is a well quasi-order. We answer this question in the case of the quasi-order generated by a semigroup homomorphism. We show that the answer does not depend on the homomorphism, but it is a property of its image. Moreover, we give an algebraic characterization of those finite semigroups for which we get well quasi-orders. This characterization completes the structural characterization given by Kunc (Theor. Comput. Sci. 348, 277–293 2005) in the case of semigroups ordered by equality. Compared with Kunc’s characterization, the new one has no structural meaning, and we explain why that is so. In addition, we prove that the new condition is testable in polynomial time.

由所有词的半群到有限有序半群的同构所产生的准序概念是由布歇等人提出的(《计算科学理论》,40, 131-148 1985 年)。他们在研究与一组给定的无上下文规则相关联的派生关系时自然而然地提出了一个关键问题:由此产生的关系是否是一个良好的准有序关系。我们以半群同态生成的准序为例来回答这个问题。我们证明,答案并不取决于同态,而是其映像的属性。此外,我们还给出了得到良好准阶的有限半群的代数特征。这一表征完善了昆奇 (Theor. Comput. Sci. 348, 277-293 2005) 在等价有序半群情况下给出的结构表征。与昆奇的表征相比,新表征在结构上没有任何意义,我们将解释其原因。此外,我们还证明了新条件可在多项式时间内检验。
{"title":"Characterization of Ordered Semigroups Generating Well Quasi-Orders of Words","authors":"Ondřej Klíma, Jonatan Kolegar","doi":"10.1007/s00224-024-10172-0","DOIUrl":"https://doi.org/10.1007/s00224-024-10172-0","url":null,"abstract":"<p>The notion of a quasi-order generated by a homomorphism from the semigroup of all words onto a finite ordered semigroup was introduced by Bucher et al. (Theor. Comput. Sci. <b>40</b>, 131–148 1985). It naturally occurred in their studies of derivation relations associated with a given set of context-free rules, and they asked a crucial question, whether the resulting relation is a well quasi-order. We answer this question in the case of the quasi-order generated by a semigroup homomorphism. We show that the answer does not depend on the homomorphism, but it is a property of its image. Moreover, we give an algebraic characterization of those finite semigroups for which we get well quasi-orders. This characterization completes the structural characterization given by Kunc (Theor. Comput. Sci. <b>348</b>, 277–293 2005) in the case of semigroups ordered by equality. Compared with Kunc’s characterization, the new one has no structural meaning, and we explain why that is so. In addition, we prove that the new condition is testable in polynomial time.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140575154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How to Hide a Clique? 如何隐藏小团体?
IF 0.5 4区 计算机科学 Q3 Computer Science Pub Date : 2024-04-05 DOI: 10.1007/s00224-024-10167-x
Uriel Feige, Vadim Grinberg

In the well known planted clique problem, a clique (or alternatively, an independent set) of size k is planted at random in an Erdos-Renyi random G(np) graph, and the goal is to design an algorithm that finds the maximum clique (or independent set) in the resulting graph. We introduce a variation on this problem, where instead of planting the clique at random, the clique is planted by an adversary who attempts to make it difficult to find the maximum clique in the resulting graph. We show that for the standard setting of the parameters of the problem, namely, a clique of size (k = sqrt{n}) planted in a random (G(n, frac{1}{2})) graph, the known polynomial time algorithms can be extended (in a non-trivial way) to work also in the adversarial setting. In contrast, we show that for other natural settings of the parameters, such as planting an independent set of size (k=frac{n}{2}) in a G(np) graph with (p = n^{-frac{1}{2}}), there is no polynomial time algorithm that finds an independent set of size k, unless NP has randomized polynomial time algorithms.

在众所周知的 "植入小块 "问题中,一个大小为 k 的小块(或独立集)被随机植入一个 Erdos-Renyi 随机 G(n, p) 图中,目标是设计一种算法,在生成的图中找到最大的小块(或独立集)。我们在这个问题上引入了一个变种,即不是随机植入一个小块,而是由对手植入一个小块,试图让我们很难在结果图中找到最大小块。我们证明,对于问题参数的标准设置,即在随机的 (G(n, frac{1}{2})) 图中植入一个大小为 (k = sqrt{n}) 的簇,已知的多项式时间算法可以(以一种非微妙的方式)扩展到在对抗设置中也能工作。与此相反,我们证明,对于参数的其他自然设置,例如在一个具有 (p = n^{-frac{1}{2}) 的 G(n, p) 图中种植大小为 (k=frac{n}{2}) 的独立集,除非 NP 有随机多项式时间算法,否则不存在找到大小为 k 的独立集的多项式时间算法。
{"title":"How to Hide a Clique?","authors":"Uriel Feige, Vadim Grinberg","doi":"10.1007/s00224-024-10167-x","DOIUrl":"https://doi.org/10.1007/s00224-024-10167-x","url":null,"abstract":"<p>In the well known planted clique problem, a clique (or alternatively, an independent set) of size <i>k</i> is planted at random in an Erdos-Renyi random <i>G</i>(<i>n</i>, <i>p</i>) graph, and the goal is to design an algorithm that finds the maximum clique (or independent set) in the resulting graph. We introduce a variation on this problem, where instead of planting the clique at random, the clique is planted by an adversary who attempts to make it difficult to find the maximum clique in the resulting graph. We show that for the standard setting of the parameters of the problem, namely, a clique of size <span>(k = sqrt{n})</span> planted in a random <span>(G(n, frac{1}{2}))</span> graph, the known polynomial time algorithms can be extended (in a non-trivial way) to work also in the adversarial setting. In contrast, we show that for other natural settings of the parameters, such as planting an independent set of size <span>(k=frac{n}{2})</span> in a <i>G</i>(<i>n</i>, <i>p</i>) graph with <span>(p = n^{-frac{1}{2}})</span>, there is no polynomial time algorithm that finds an independent set of size <i>k</i>, unless NP has randomized polynomial time algorithms.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140575153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Revisiting the Distortion of Distributed Voting 重新审视分散投票的扭曲现象
IF 0.5 4区 计算机科学 Q3 Computer Science Pub Date : 2024-04-05 DOI: 10.1007/s00224-024-10171-1
Aris Filos-Ratsikas, Alexandros A. Voudouris

We consider a setting with agents that have preferences over alternatives and are partitioned into disjoint districts. The goal is to choose one alternative as the winner using a mechanism which first decides a representative alternative for each district based on a local election with the agents therein as participants, and then chooses one of the district representatives as the winner. Previous work showed bounds on the distortion of a specific class of deterministic plurality-based mechanisms depending on the available information about the preferences of the agents in the districts. In this paper, we first consider the whole class of deterministic mechanisms and show asymptotically tight bounds on their distortion. We then initiate the study of the distortion of randomized mechanisms in distributed voting and show bounds based on several informational assumptions, which in many cases turn out to be tight. Finally, we also experimentally compare the distortion of many different mechanisms of interest using synthetic and real-world data.

我们考虑的情况是,代理人对备选方案有偏好,并被划分为互不相连的地区。我们的目标是利用一种机制选择一个备选方案作为获胜者,该机制首先根据当地选举决定每个地区的代表备选方案,其中的代理人都是参与者,然后从地区代表中选择一个作为获胜者。之前的研究表明,根据各地区代理人偏好的可用信息,某一类基于确定性复数的机制的失真度是有限的。在本文中,我们首先考虑了整类确定性机制,并展示了其失真度的渐近紧约束。然后,我们开始研究分布式投票中随机机制的失真问题,并展示了基于若干信息假设的约束,这些约束在很多情况下都很严格。最后,我们还使用合成数据和真实世界数据对许多不同机制的失真进行了实验比较。
{"title":"Revisiting the Distortion of Distributed Voting","authors":"Aris Filos-Ratsikas, Alexandros A. Voudouris","doi":"10.1007/s00224-024-10171-1","DOIUrl":"https://doi.org/10.1007/s00224-024-10171-1","url":null,"abstract":"<p>We consider a setting with agents that have preferences over alternatives and are partitioned into disjoint districts. The goal is to choose one alternative as the winner using a mechanism which first decides a representative alternative for each district based on a local election with the agents therein as participants, and then chooses one of the district representatives as the winner. Previous work showed bounds on the distortion of a specific class of deterministic plurality-based mechanisms depending on the available information about the preferences of the agents in the districts. In this paper, we first consider the whole class of deterministic mechanisms and show asymptotically tight bounds on their distortion. We then initiate the study of the distortion of randomized mechanisms in distributed voting and show bounds based on several informational assumptions, which in many cases turn out to be tight. Finally, we also experimentally compare the distortion of many different mechanisms of interest using synthetic and real-world data.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140575201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pumping Lemmas Can be “Harmful” 抽水马桶可能 "有害"
IF 0.5 4区 计算机科学 Q3 Computer Science Pub Date : 2024-04-05 DOI: 10.1007/s00224-024-10169-9
Jingnan Xie, Harry B. Hunt III, Richard E. Stearns

A pumping lemma for a class of languages (varvec{mathcal {C}}) is often used to show particular languages are not in (varvec{mathcal {C}}). In contrast, we show that a pumping lemma for a class of languages (varvec{mathcal {C}}) can be used to study the computational complexity of the predicate “(in varvec{mathcal {C}})” via highly efficient many-one reductions. In this paper, we use extended regular expressions (EXREGs, introduced in Câmpeanu et al. (Int. J. Foundations Comput. Sci. 14(6), 1007–1018, 2003)) as an example to illustrate the proof technique and establish the complexity of the predicate “is an EXREG language” for several classes of languages. Due to the efficiency of the reductions, both productiveness (a stronger form of non-recursive enumerability) and complexity results can be obtained simultaneously. For example, we show that the predicate “is an EXREG language” is productive (hence, not recursively enumerable) for context-free grammars, and is Co-NEXPTIME-hard for context-free grammars generating bounded languages. The proof technique is easy to use and requires only a few conditions. This suggests that for any class of languages (varvec{mathcal {C}}) having a pumping lemma, the language class comparison problems (e.g., does a given context-free grammar generate a language in (varvec{mathcal {C}})?) are almost guaranteed to be hard. So, pumping lemmas sometimes could be “harmful” when studying computational complexity results.

一类语言(varvec{mathcal {C}})的抽水稃常被用来证明特定的语言不在(varvec{mathcal {C}})中。与此相反,我们通过高效的多一还原法证明,一类语言 (varvec{mathcal {C}}) 的抽水稃可以用来研究谓词"(in varvec{mathcal {C}})" 的计算复杂性。在本文中,我们使用了扩展正则表达式(EXREGs,在 Câmpeanu et al.J. Foundations Comput.Sci. 14(6), 1007-1018, 2003)中引入的扩展正则表达式(EXREGs)作为例子来说明证明技术,并为几类语言建立 "是 EXREG 语言 "谓词的复杂性。由于还原的高效性,我们可以同时获得生产性(一种更强的非递归可枚举性)和复杂性结果。例如,我们证明了 "是 EXREG 语言 "这个谓词对于无上下文语法来说是富有成效的(因此不是递归可枚举的),而对于生成有界语言的无上下文语法来说是 Co-NEXPTIME-hard 的。证明技术易于使用,只需要几个条件。这表明,对于任何一类有抽水稃法的语言 (varvec{mathcal {C}}/),语言类比较问题(例如,给定的无上下文语法会生成 (varvec{mathcal {C}}/)中的语言吗?因此,在研究计算复杂性结果时,抽取lemmas有时可能是 "有害 "的。
{"title":"Pumping Lemmas Can be “Harmful”","authors":"Jingnan Xie, Harry B. Hunt III, Richard E. Stearns","doi":"10.1007/s00224-024-10169-9","DOIUrl":"https://doi.org/10.1007/s00224-024-10169-9","url":null,"abstract":"<p>A pumping lemma for a class of languages <span>(varvec{mathcal {C}})</span> is often used to show particular languages are not in <span>(varvec{mathcal {C}})</span>. In contrast, we show that a pumping lemma for a class of languages <span>(varvec{mathcal {C}})</span> can be used to study the computational complexity of the predicate “<span>(in varvec{mathcal {C}})</span>” via highly efficient many-one reductions. In this paper, we use extended regular expressions (EXREGs, introduced in Câmpeanu et al. (Int. J. Foundations Comput. Sci. <b>14</b>(6), 1007–1018, 2003)) as an example to illustrate the proof technique and establish the complexity of the predicate “is an EXREG language” for several classes of languages. Due to the efficiency of the reductions, both productiveness (a stronger form of non-recursive enumerability) and complexity results can be obtained simultaneously. For example, we show that the predicate “is an EXREG language” is productive (hence, not recursively enumerable) for context-free grammars, and is Co-NEXPTIME-hard for context-free grammars generating bounded languages. The proof technique is easy to use and requires only a few conditions. This suggests that for any class of languages <span>(varvec{mathcal {C}})</span> having a pumping lemma, the language class comparison problems (e.g., does a given context-free grammar generate a language in <span>(varvec{mathcal {C}})</span>?) are almost guaranteed to be hard. So, pumping lemmas sometimes could be “harmful” when studying computational complexity results.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140575240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Placing Green Bridges Optimally, with a Multivariate Analysis 通过多变量分析优化绿色桥梁的布局
IF 0.5 4区 计算机科学 Q3 Computer Science Pub Date : 2024-04-01 DOI: 10.1007/s00224-023-10157-5
Till Fluschnik, Leon Kellerhals

We study the problem of placing wildlife crossings, such as green bridges, over human-made obstacles to challenge habitat fragmentation. The main task herein is, given a graph describing habitats or routes of wildlife animals and possibilities of building green bridges, to find a low-cost placement of green bridges that connects the habitats. We develop three problem models for this task and study them from a computational complexity and parameterized algorithmics perspective.

我们研究的问题是在人为障碍物上架设野生动物通道(如绿桥),以解决栖息地破碎化问题。本文的主要任务是,给定一张描述野生动物栖息地或路线以及建造绿桥可能性的图,找到连接栖息地的低成本绿桥位置。我们为此任务开发了三个问题模型,并从计算复杂性和参数化算法的角度对其进行了研究。
{"title":"Placing Green Bridges Optimally, with a Multivariate Analysis","authors":"Till Fluschnik, Leon Kellerhals","doi":"10.1007/s00224-023-10157-5","DOIUrl":"https://doi.org/10.1007/s00224-023-10157-5","url":null,"abstract":"<p>We study the problem of placing wildlife crossings, such as green bridges, over human-made obstacles to challenge habitat fragmentation. The main task herein is, given a graph describing habitats or routes of wildlife animals and possibilities of building green bridges, to find a low-cost placement of green bridges that connects the habitats. We develop three problem models for this task and study them from a computational complexity and parameterized algorithmics perspective.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140575237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
CNF Encodings of Symmetric Functions 对称函数的 CNF 编码
IF 0.5 4区 计算机科学 Q3 Computer Science Pub Date : 2024-03-26 DOI: 10.1007/s00224-024-10168-w

Abstract

Many Boolean functions that need to be encoded as CNF in practice, have only exponential size CNF representations. To avoid this effect, one usually introduces nondeterministic variables. For example, whereas the minimum number of clauses in a CNF computing the parity function (x_1oplus x_2 oplus cdots oplus x_n) is  (2^{n-1}) , one can use (n-1) nondeterministic variables to get a CNF encoding with 4n clauses. In this paper, we prove tradeoffs between various parameters (the number of clauses, the width of clauses, and the number of nondeterministic variables) of CNF encodings of various symmetric functions. In particular, we show that a folklore way of encoding parity as CNF is provably optimal. We do this by using a tight connection between CNF encodings and depth-3 circuits. This connection shows that CNF encodings is an interesting computational model for Boolean functions: on the one hand, it is routinely used in practice when translating a computational problem to a format acceptable by a SAT solver, on the other hand, lower bounds on the size of CNF encodings imply depth-3 circuit lower bounds.

摘要 在实践中,许多需要用 CNF 编码的布尔函数,其 CNF 表示的大小仅为指数级。为了避免这种影响,我们通常会引入非确定变量。例如,计算奇偶校验函数 (x_1oplus x_2 oplus cdots oplus x_n) 的 CNF 中的最小子句数是 (2^{n-1}),而我们可以使用 (n-1) 个非确定变量来得到一个有 4n 个子句的 CNF 编码。在本文中,我们证明了各种对称函数的 CNF 编码的各种参数(子句数、子句宽度和非确定变量数)之间的权衡。特别是,我们证明了将奇偶性编码为 CNF 的民间方法是可证明的最优方法。我们通过使用 CNF 编码和深度-3 电路之间的紧密联系来实现这一点。这种联系表明,CNF 编码是布尔函数的一个有趣的计算模型:一方面,当把一个计算问题转换成 SAT 解算器可接受的格式时,CNF 编码经常被用于实践;另一方面,CNF 编码大小的下限意味着深度-3 电路的下限。
{"title":"CNF Encodings of Symmetric Functions","authors":"","doi":"10.1007/s00224-024-10168-w","DOIUrl":"https://doi.org/10.1007/s00224-024-10168-w","url":null,"abstract":"<h3>Abstract</h3> <p>Many Boolean functions that need to be encoded as CNF in practice, have only exponential size CNF representations. To avoid this effect, one usually introduces nondeterministic variables. For example, whereas the minimum number of clauses in a CNF computing the parity function <span> <span>(x_1oplus x_2 oplus cdots oplus x_n)</span> </span> is <span> <span>(2^{n-1})</span> </span>, one can use <span> <span>(n-1)</span> </span> nondeterministic variables to get a CNF encoding with 4<em>n</em> clauses. In this paper, we prove tradeoffs between various parameters (the number of clauses, the width of clauses, and the number of nondeterministic variables) of CNF encodings of various symmetric functions. In particular, we show that a folklore way of encoding parity as CNF is provably optimal. We do this by using a tight connection between CNF encodings and depth-3 circuits. This connection shows that CNF encodings is an interesting computational model for Boolean functions: on the one hand, it is routinely used in practice when translating a computational problem to a format acceptable by a SAT solver, on the other hand, lower bounds on the size of CNF encodings imply depth-3 circuit lower bounds.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140301608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximation Algorithms for the MAXSPACE Advertisement Problem MAXSPACE 广告问题的近似算法
IF 0.5 4区 计算机科学 Q3 Computer Science Pub Date : 2024-03-25 DOI: 10.1007/s00224-024-10170-2
Lehilton L. C. Pedrosa, Mauro R. C. da Silva, Rafael C. S. Schouery

In MAXSPACE, given a set of ads (mathcal {A}), one wants to schedule a subset ({mathcal {A}'subseteq mathcal {A}}) into K slots ({B_1, dots , B_K}) of size L. Each ad ({A_i in mathcal {A}}) has a size (s_i) and a frequency (w_i). A schedule is feasible if the total size of ads in any slot is at most L, and each ad ({A_i in mathcal {A}'}) appears in exactly (w_i) slots and at most once per slot. The goal is to find a feasible schedule that maximizes the sum of the space occupied by all slots. We consider a generalization called MAXSPACE-R for which an ad (A_i) also has a release date (r_i) and may only appear in a slot (B_j) if ({j ge r_i}). For this variant, we give a 1/9-approximation algorithm. Furthermore, we consider MAXSPACE-RDV for which an ad (A_i) also has a deadline (d_i) (and may only appear in a slot (B_j) with (r_i le j le d_i)), and a value (v_i) that is the gain of each assigned copy of (A_i) (which can be unrelated to (s_i)). We present a polynomial-time approximation scheme for this problem when K is bounded by a constant. This is the best factor one can expect since MAXSPACE is strongly NP-hard, even if (K = 2).

在 MAXSPACE 中,给定一组广告(mathcal {A}),我们需要将一个子集({mathcal {A}'subseteq mathcal {A}})安排到大小为 L 的 K 个插槽({B_1, dots , B_K})中。每个广告({A_i in mathcal {A}})都有一个大小(s_i)和频率(w_i)。如果任何时段中广告的总大小最多为 L,并且每个广告 ({A_i in mathcal {A}'}) 恰好出现在 (w_i) 个时段中,并且每个时段最多出现一次,那么这个计划就是可行的。我们的目标是找到一个可行的时间表,最大化所有时隙所占空间的总和。我们考虑了一种被称为 MAXSPACE-R 的概括,在这种概括中,广告 (A_i) 也有一个发布日期 (r_i),并且只有在 ({j ge r_i}) 的情况下才能出现在插槽 (B_j)中。对于这个变量,我们给出了一个 1/9 近似算法。此外,我们还考虑了MAXSPACE-RDV,对于MAXSPACE-RDV来说,一个广告(A_i )也有一个截止日期(d_i )(并且只能出现在有(r_i le j le d_i)的插槽(B_j )中),还有一个值(v_i ),它是(A_i )的每个分配副本的增益(可以与(s_i )无关)。当 K 由常数限定时,我们提出了一个多项式时间近似方案。由于 MAXSPACE 是强 NP 难的,即使 (K = 2) 也是如此,所以这是我们所能期待的最好的因素。
{"title":"Approximation Algorithms for the MAXSPACE Advertisement Problem","authors":"Lehilton L. C. Pedrosa, Mauro R. C. da Silva, Rafael C. S. Schouery","doi":"10.1007/s00224-024-10170-2","DOIUrl":"https://doi.org/10.1007/s00224-024-10170-2","url":null,"abstract":"<p>In MAXSPACE, given a set of ads <span>(mathcal {A})</span>, one wants to schedule a subset <span>({mathcal {A}'subseteq mathcal {A}})</span> into <i>K</i> slots <span>({B_1, dots , B_K})</span> of size <i>L</i>. Each ad <span>({A_i in mathcal {A}})</span> has a <i>size</i> <span>(s_i)</span> and a <i>frequency</i> <span>(w_i)</span>. A schedule is feasible if the total size of ads in any slot is at most <i>L</i>, and each ad <span>({A_i in mathcal {A}'})</span> appears in exactly <span>(w_i)</span> slots and at most once per slot. The goal is to find a feasible schedule that maximizes the sum of the space occupied by all slots. We consider a generalization called MAXSPACE-R for which an ad <span>(A_i)</span> also has a release date <span>(r_i)</span> and may only appear in a slot <span>(B_j)</span> if <span>({j ge r_i})</span>. For this variant, we give a 1/9-approximation algorithm. Furthermore, we consider MAXSPACE-RDV for which an ad <span>(A_i)</span> also has a deadline <span>(d_i)</span> (and may only appear in a slot <span>(B_j)</span> with <span>(r_i le j le d_i)</span>), and a value <span>(v_i)</span> that is the gain of each assigned copy of <span>(A_i)</span> (which can be unrelated to <span>(s_i)</span>). We present a polynomial-time approximation scheme for this problem when <i>K</i> is bounded by a constant. This is the best factor one can expect since MAXSPACE is strongly NP-hard, even if <span>(K = 2)</span>.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140301610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Imperative Process Algebra and Models of Parallel Computation 强制过程代数和并行计算模型
IF 0.5 4区 计算机科学 Q3 Computer Science Pub Date : 2024-03-14 DOI: 10.1007/s00224-024-10164-0
Cornelis A. Middelburg

Studies of issues related to computability and computational complexity involve the use of a model of computation. Central in such a model are computational processes. Processes of this kind can be described using an imperative process algebra based on ACP (Algebra of Communicating Processes). In this paper, it is investigated whether the imperative process algebra concerned can play a role in the field of models of computation. It is demonstrated that the process algebra is suitable to describe in a mathematically precise way models of computation corresponding to existing models based on sequential, asynchronous parallel, and synchronous parallel random access machines as well as time and work complexity measures for those models.

研究与可计算性和计算复杂性相关的问题,需要使用计算模型。这种模型的核心是计算过程。这类过程可以使用基于 ACP(通信过程代数)的命令过程代数来描述。本文研究了相关的命令式过程代数能否在计算模型领域发挥作用。结果表明,过程代数适用于以数学精确的方式描述与基于顺序、异步并行和同步并行随机存取机的现有模型相对应的计算模型,以及这些模型的时间和工作复杂度度量。
{"title":"Imperative Process Algebra and Models of Parallel Computation","authors":"Cornelis A. Middelburg","doi":"10.1007/s00224-024-10164-0","DOIUrl":"https://doi.org/10.1007/s00224-024-10164-0","url":null,"abstract":"<p>Studies of issues related to computability and computational complexity involve the use of a model of computation. Central in such a model are computational processes. Processes of this kind can be described using an imperative process algebra based on ACP (Algebra of Communicating Processes). In this paper, it is investigated whether the imperative process algebra concerned can play a role in the field of models of computation. It is demonstrated that the process algebra is suitable to describe in a mathematically precise way models of computation corresponding to existing models based on sequential, asynchronous parallel, and synchronous parallel random access machines as well as time and work complexity measures for those models.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140153092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performing Regular Operations with 1-Limited Automata 用 1 限自动机执行正则运算
IF 0.5 4区 计算机科学 Q3 Computer Science Pub Date : 2024-03-14 DOI: 10.1007/s00224-024-10163-1
Giovanni Pighizzini, Luca Prigioniero, Šimon Sádovský

The descriptional complexity of basic operations on regular languages using 1-limited automata, a restricted version of one-tape Turing machines, is investigated. When simulating operations on deterministic finite automata with deterministic 1-limited automata, the sizes of the resulting devices are polynomial in the sizes of the simulated machines. The situation is different when the operations are applied to deterministic 1-limited automata: while for boolean operations the simulations remain polynomial, for product, star, and reversal they cost exponential in size. The costs for product and star do not reduce if the given machines are sweeping two-way deterministic finite automata. These bounds are tight.

本文研究了使用一元有限自动机(一元图灵机的受限版本)对正则表达式语言进行基本操作的描述复杂性。当用确定性 1 限自动机模拟确定性有限自动机上的运算时,所得到的设备大小是模拟机器大小的多项式。当这些运算应用于确定性 1 限自动机时,情况就不同了:虽然布尔运算的模拟成本仍是多项式,但乘积、星形和反转运算的模拟成本却是指数级的。如果给定的机器是双向确定性有限自动机,则乘积和星形的成本不会降低。这些界限非常严格。
{"title":"Performing Regular Operations with 1-Limited Automata","authors":"Giovanni Pighizzini, Luca Prigioniero, Šimon Sádovský","doi":"10.1007/s00224-024-10163-1","DOIUrl":"https://doi.org/10.1007/s00224-024-10163-1","url":null,"abstract":"<p>The descriptional complexity of basic operations on regular languages using 1-limited automata, a restricted version of one-tape Turing machines, is investigated. When simulating operations on deterministic finite automata with deterministic 1-limited automata, the sizes of the resulting devices are polynomial in the sizes of the simulated machines. The situation is different when the operations are applied to deterministic 1-limited automata: while for boolean operations the simulations remain polynomial, for product, star, and reversal they cost exponential in size. The costs for product and star do not reduce if the given machines are sweeping two-way deterministic finite automata. These bounds are tight.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140153339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Linear Codes Correcting Repeated Bursts Equipped with Homogeneous Distance 利用同质距离校正重复突发的线性编码
IF 0.5 4区 计算机科学 Q3 Computer Science Pub Date : 2024-03-06 DOI: 10.1007/s00224-024-10166-y

Abstract

The homogeneous weight (metric) is useful in the construction of codes over a ring of integers (mathbb {Z}_{p^l}) (p prime and (l ge 1) an integer). It becomes Hamming weight when the ring is taken to be a finite field and becomes Lee weight when the ring is taken to be (mathbb {Z}_{4}) . This paper presents homogeneous weight distribution and total homogeneous weight of burst and repeated burst errors in the code space of n-tuples over (mathbb {Z}_{p^l}) . Necessary and sufficient conditions for existence of an (nk) linear code over (mathbb {Z}_{p^l}) correcting the error patterns with respect to the homogeneous weight are derived.

Abstract 均质权重(度量)在构建整数环 (mathbb {Z}_{p^l}) 上的编码时非常有用(p 是质数,(l ge 1) 是整数)。当把环看作有限域时,它就变成了哈明权重;当把环看作 ( (mathbb {Z}_{4} )时,它就变成了李权重。本文提出了在(mathbb {Z}_{p^l}) 上 n 个元组的码空间中突发和重复突发错误的同质权分布和总同质权。推导了在(mathbb {Z}_{p^l}) 上存在一个(n, k)线性码的必要条件和充分条件,该线性码可以纠正与同质权重有关的错误模式。
{"title":"Linear Codes Correcting Repeated Bursts Equipped with Homogeneous Distance","authors":"","doi":"10.1007/s00224-024-10166-y","DOIUrl":"https://doi.org/10.1007/s00224-024-10166-y","url":null,"abstract":"<h3>Abstract</h3> <p>The homogeneous weight (metric) is useful in the construction of codes over a ring of integers <span> <span>(mathbb {Z}_{p^l})</span> </span> (<em>p</em> prime and <span> <span>(l ge 1)</span> </span> an integer). It becomes Hamming weight when the ring is taken to be a finite field and becomes Lee weight when the ring is taken to be <span> <span>(mathbb {Z}_{4})</span> </span>. This paper presents homogeneous weight distribution and total homogeneous weight of burst and repeated burst errors in the code space of <em>n</em>-tuples over <span> <span>(mathbb {Z}_{p^l})</span> </span>. Necessary and sufficient conditions for existence of an (<em>n</em>, <em>k</em>) linear code over <span> <span>(mathbb {Z}_{p^l})</span> </span> correcting the error patterns with respect to the homogeneous weight are derived.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140046197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Theory of Computing Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1