Pub Date : 2024-04-05DOI: 10.1007/s00224-024-10169-9
Jingnan Xie, Harry B. Hunt III, Richard E. Stearns
A pumping lemma for a class of languages (varvec{mathcal {C}}) is often used to show particular languages are not in (varvec{mathcal {C}}). In contrast, we show that a pumping lemma for a class of languages (varvec{mathcal {C}}) can be used to study the computational complexity of the predicate “(in varvec{mathcal {C}})” via highly efficient many-one reductions. In this paper, we use extended regular expressions (EXREGs, introduced in Câmpeanu et al. (Int. J. Foundations Comput. Sci. 14(6), 1007–1018, 2003)) as an example to illustrate the proof technique and establish the complexity of the predicate “is an EXREG language” for several classes of languages. Due to the efficiency of the reductions, both productiveness (a stronger form of non-recursive enumerability) and complexity results can be obtained simultaneously. For example, we show that the predicate “is an EXREG language” is productive (hence, not recursively enumerable) for context-free grammars, and is Co-NEXPTIME-hard for context-free grammars generating bounded languages. The proof technique is easy to use and requires only a few conditions. This suggests that for any class of languages (varvec{mathcal {C}}) having a pumping lemma, the language class comparison problems (e.g., does a given context-free grammar generate a language in (varvec{mathcal {C}})?) are almost guaranteed to be hard. So, pumping lemmas sometimes could be “harmful” when studying computational complexity results.
{"title":"Pumping Lemmas Can be “Harmful”","authors":"Jingnan Xie, Harry B. Hunt III, Richard E. Stearns","doi":"10.1007/s00224-024-10169-9","DOIUrl":"https://doi.org/10.1007/s00224-024-10169-9","url":null,"abstract":"<p>A pumping lemma for a class of languages <span>(varvec{mathcal {C}})</span> is often used to show particular languages are not in <span>(varvec{mathcal {C}})</span>. In contrast, we show that a pumping lemma for a class of languages <span>(varvec{mathcal {C}})</span> can be used to study the computational complexity of the predicate “<span>(in varvec{mathcal {C}})</span>” via highly efficient many-one reductions. In this paper, we use extended regular expressions (EXREGs, introduced in Câmpeanu et al. (Int. J. Foundations Comput. Sci. <b>14</b>(6), 1007–1018, 2003)) as an example to illustrate the proof technique and establish the complexity of the predicate “is an EXREG language” for several classes of languages. Due to the efficiency of the reductions, both productiveness (a stronger form of non-recursive enumerability) and complexity results can be obtained simultaneously. For example, we show that the predicate “is an EXREG language” is productive (hence, not recursively enumerable) for context-free grammars, and is Co-NEXPTIME-hard for context-free grammars generating bounded languages. The proof technique is easy to use and requires only a few conditions. This suggests that for any class of languages <span>(varvec{mathcal {C}})</span> having a pumping lemma, the language class comparison problems (e.g., does a given context-free grammar generate a language in <span>(varvec{mathcal {C}})</span>?) are almost guaranteed to be hard. So, pumping lemmas sometimes could be “harmful” when studying computational complexity results.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"1 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-04-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140575240","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-01DOI: 10.1007/s00224-023-10157-5
Till Fluschnik, Leon Kellerhals
We study the problem of placing wildlife crossings, such as green bridges, over human-made obstacles to challenge habitat fragmentation. The main task herein is, given a graph describing habitats or routes of wildlife animals and possibilities of building green bridges, to find a low-cost placement of green bridges that connects the habitats. We develop three problem models for this task and study them from a computational complexity and parameterized algorithmics perspective.
{"title":"Placing Green Bridges Optimally, with a Multivariate Analysis","authors":"Till Fluschnik, Leon Kellerhals","doi":"10.1007/s00224-023-10157-5","DOIUrl":"https://doi.org/10.1007/s00224-023-10157-5","url":null,"abstract":"<p>We study the problem of placing wildlife crossings, such as green bridges, over human-made obstacles to challenge habitat fragmentation. The main task herein is, given a graph describing habitats or routes of wildlife animals and possibilities of building green bridges, to find a low-cost placement of green bridges that connects the habitats. We develop three problem models for this task and study them from a computational complexity and parameterized algorithmics perspective.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"84 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140575237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-26DOI: 10.1007/s00224-024-10168-w
Abstract
Many Boolean functions that need to be encoded as CNF in practice, have only exponential size CNF representations. To avoid this effect, one usually introduces nondeterministic variables. For example, whereas the minimum number of clauses in a CNF computing the parity function (x_1oplus x_2 oplus cdots oplus x_n) is (2^{n-1}), one can use (n-1) nondeterministic variables to get a CNF encoding with 4n clauses. In this paper, we prove tradeoffs between various parameters (the number of clauses, the width of clauses, and the number of nondeterministic variables) of CNF encodings of various symmetric functions. In particular, we show that a folklore way of encoding parity as CNF is provably optimal. We do this by using a tight connection between CNF encodings and depth-3 circuits. This connection shows that CNF encodings is an interesting computational model for Boolean functions: on the one hand, it is routinely used in practice when translating a computational problem to a format acceptable by a SAT solver, on the other hand, lower bounds on the size of CNF encodings imply depth-3 circuit lower bounds.
{"title":"CNF Encodings of Symmetric Functions","authors":"","doi":"10.1007/s00224-024-10168-w","DOIUrl":"https://doi.org/10.1007/s00224-024-10168-w","url":null,"abstract":"<h3>Abstract</h3> <p>Many Boolean functions that need to be encoded as CNF in practice, have only exponential size CNF representations. To avoid this effect, one usually introduces nondeterministic variables. For example, whereas the minimum number of clauses in a CNF computing the parity function <span> <span>(x_1oplus x_2 oplus cdots oplus x_n)</span> </span> is <span> <span>(2^{n-1})</span> </span>, one can use <span> <span>(n-1)</span> </span> nondeterministic variables to get a CNF encoding with 4<em>n</em> clauses. In this paper, we prove tradeoffs between various parameters (the number of clauses, the width of clauses, and the number of nondeterministic variables) of CNF encodings of various symmetric functions. In particular, we show that a folklore way of encoding parity as CNF is provably optimal. We do this by using a tight connection between CNF encodings and depth-3 circuits. This connection shows that CNF encodings is an interesting computational model for Boolean functions: on the one hand, it is routinely used in practice when translating a computational problem to a format acceptable by a SAT solver, on the other hand, lower bounds on the size of CNF encodings imply depth-3 circuit lower bounds.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"166 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-03-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140301608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-25DOI: 10.1007/s00224-024-10170-2
Lehilton L. C. Pedrosa, Mauro R. C. da Silva, Rafael C. S. Schouery
In MAXSPACE, given a set of ads (mathcal {A}), one wants to schedule a subset ({mathcal {A}'subseteq mathcal {A}}) into K slots ({B_1, dots , B_K}) of size L. Each ad ({A_i in mathcal {A}}) has a size(s_i) and a frequency(w_i). A schedule is feasible if the total size of ads in any slot is at most L, and each ad ({A_i in mathcal {A}'}) appears in exactly (w_i) slots and at most once per slot. The goal is to find a feasible schedule that maximizes the sum of the space occupied by all slots. We consider a generalization called MAXSPACE-R for which an ad (A_i) also has a release date (r_i) and may only appear in a slot (B_j) if ({j ge r_i}). For this variant, we give a 1/9-approximation algorithm. Furthermore, we consider MAXSPACE-RDV for which an ad (A_i) also has a deadline (d_i) (and may only appear in a slot (B_j) with (r_i le j le d_i)), and a value (v_i) that is the gain of each assigned copy of (A_i) (which can be unrelated to (s_i)). We present a polynomial-time approximation scheme for this problem when K is bounded by a constant. This is the best factor one can expect since MAXSPACE is strongly NP-hard, even if (K = 2).
在 MAXSPACE 中,给定一组广告(mathcal {A}),我们需要将一个子集({mathcal {A}'subseteq mathcal {A}})安排到大小为 L 的 K 个插槽({B_1, dots , B_K})中。每个广告({A_i in mathcal {A}})都有一个大小(s_i)和频率(w_i)。如果任何时段中广告的总大小最多为 L,并且每个广告 ({A_i in mathcal {A}'}) 恰好出现在 (w_i) 个时段中,并且每个时段最多出现一次,那么这个计划就是可行的。我们的目标是找到一个可行的时间表,最大化所有时隙所占空间的总和。我们考虑了一种被称为 MAXSPACE-R 的概括,在这种概括中,广告 (A_i) 也有一个发布日期 (r_i),并且只有在 ({j ge r_i}) 的情况下才能出现在插槽 (B_j)中。对于这个变量,我们给出了一个 1/9 近似算法。此外,我们还考虑了MAXSPACE-RDV,对于MAXSPACE-RDV来说,一个广告(A_i )也有一个截止日期(d_i )(并且只能出现在有(r_i le j le d_i)的插槽(B_j )中),还有一个值(v_i ),它是(A_i )的每个分配副本的增益(可以与(s_i )无关)。当 K 由常数限定时,我们提出了一个多项式时间近似方案。由于 MAXSPACE 是强 NP 难的,即使 (K = 2) 也是如此,所以这是我们所能期待的最好的因素。
{"title":"Approximation Algorithms for the MAXSPACE Advertisement Problem","authors":"Lehilton L. C. Pedrosa, Mauro R. C. da Silva, Rafael C. S. Schouery","doi":"10.1007/s00224-024-10170-2","DOIUrl":"https://doi.org/10.1007/s00224-024-10170-2","url":null,"abstract":"<p>In MAXSPACE, given a set of ads <span>(mathcal {A})</span>, one wants to schedule a subset <span>({mathcal {A}'subseteq mathcal {A}})</span> into <i>K</i> slots <span>({B_1, dots , B_K})</span> of size <i>L</i>. Each ad <span>({A_i in mathcal {A}})</span> has a <i>size</i> <span>(s_i)</span> and a <i>frequency</i> <span>(w_i)</span>. A schedule is feasible if the total size of ads in any slot is at most <i>L</i>, and each ad <span>({A_i in mathcal {A}'})</span> appears in exactly <span>(w_i)</span> slots and at most once per slot. The goal is to find a feasible schedule that maximizes the sum of the space occupied by all slots. We consider a generalization called MAXSPACE-R for which an ad <span>(A_i)</span> also has a release date <span>(r_i)</span> and may only appear in a slot <span>(B_j)</span> if <span>({j ge r_i})</span>. For this variant, we give a 1/9-approximation algorithm. Furthermore, we consider MAXSPACE-RDV for which an ad <span>(A_i)</span> also has a deadline <span>(d_i)</span> (and may only appear in a slot <span>(B_j)</span> with <span>(r_i le j le d_i)</span>), and a value <span>(v_i)</span> that is the gain of each assigned copy of <span>(A_i)</span> (which can be unrelated to <span>(s_i)</span>). We present a polynomial-time approximation scheme for this problem when <i>K</i> is bounded by a constant. This is the best factor one can expect since MAXSPACE is strongly NP-hard, even if <span>(K = 2)</span>.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"52 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140301610","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-14DOI: 10.1007/s00224-024-10164-0
Cornelis A. Middelburg
Studies of issues related to computability and computational complexity involve the use of a model of computation. Central in such a model are computational processes. Processes of this kind can be described using an imperative process algebra based on ACP (Algebra of Communicating Processes). In this paper, it is investigated whether the imperative process algebra concerned can play a role in the field of models of computation. It is demonstrated that the process algebra is suitable to describe in a mathematically precise way models of computation corresponding to existing models based on sequential, asynchronous parallel, and synchronous parallel random access machines as well as time and work complexity measures for those models.
{"title":"Imperative Process Algebra and Models of Parallel Computation","authors":"Cornelis A. Middelburg","doi":"10.1007/s00224-024-10164-0","DOIUrl":"https://doi.org/10.1007/s00224-024-10164-0","url":null,"abstract":"<p>Studies of issues related to computability and computational complexity involve the use of a model of computation. Central in such a model are computational processes. Processes of this kind can be described using an imperative process algebra based on ACP (Algebra of Communicating Processes). In this paper, it is investigated whether the imperative process algebra concerned can play a role in the field of models of computation. It is demonstrated that the process algebra is suitable to describe in a mathematically precise way models of computation corresponding to existing models based on sequential, asynchronous parallel, and synchronous parallel random access machines as well as time and work complexity measures for those models.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"7 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140153092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-14DOI: 10.1007/s00224-024-10163-1
Giovanni Pighizzini, Luca Prigioniero, Šimon Sádovský
The descriptional complexity of basic operations on regular languages using 1-limited automata, a restricted version of one-tape Turing machines, is investigated. When simulating operations on deterministic finite automata with deterministic 1-limited automata, the sizes of the resulting devices are polynomial in the sizes of the simulated machines. The situation is different when the operations are applied to deterministic 1-limited automata: while for boolean operations the simulations remain polynomial, for product, star, and reversal they cost exponential in size. The costs for product and star do not reduce if the given machines are sweeping two-way deterministic finite automata. These bounds are tight.
{"title":"Performing Regular Operations with 1-Limited Automata","authors":"Giovanni Pighizzini, Luca Prigioniero, Šimon Sádovský","doi":"10.1007/s00224-024-10163-1","DOIUrl":"https://doi.org/10.1007/s00224-024-10163-1","url":null,"abstract":"<p>The descriptional complexity of basic operations on regular languages using 1-limited automata, a restricted version of one-tape Turing machines, is investigated. When simulating operations on deterministic finite automata with deterministic 1-limited automata, the sizes of the resulting devices are polynomial in the sizes of the simulated machines. The situation is different when the operations are applied to deterministic 1-limited automata: while for boolean operations the simulations remain polynomial, for product, star, and reversal they cost exponential in size. The costs for product and star do not reduce if the given machines are sweeping two-way deterministic finite automata. These bounds are tight.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"7 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140153339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-06DOI: 10.1007/s00224-024-10166-y
Abstract
The homogeneous weight (metric) is useful in the construction of codes over a ring of integers (mathbb {Z}_{p^l}) (p prime and (l ge 1) an integer). It becomes Hamming weight when the ring is taken to be a finite field and becomes Lee weight when the ring is taken to be (mathbb {Z}_{4}). This paper presents homogeneous weight distribution and total homogeneous weight of burst and repeated burst errors in the code space of n-tuples over (mathbb {Z}_{p^l}). Necessary and sufficient conditions for existence of an (n, k) linear code over (mathbb {Z}_{p^l}) correcting the error patterns with respect to the homogeneous weight are derived.
Abstract 均质权重(度量)在构建整数环 (mathbb {Z}_{p^l}) 上的编码时非常有用(p 是质数,(l ge 1) 是整数)。当把环看作有限域时,它就变成了哈明权重;当把环看作 ( (mathbb {Z}_{4} )时,它就变成了李权重。本文提出了在(mathbb {Z}_{p^l}) 上 n 个元组的码空间中突发和重复突发错误的同质权分布和总同质权。推导了在(mathbb {Z}_{p^l}) 上存在一个(n, k)线性码的必要条件和充分条件,该线性码可以纠正与同质权重有关的错误模式。
{"title":"Linear Codes Correcting Repeated Bursts Equipped with Homogeneous Distance","authors":"","doi":"10.1007/s00224-024-10166-y","DOIUrl":"https://doi.org/10.1007/s00224-024-10166-y","url":null,"abstract":"<h3>Abstract</h3> <p>The homogeneous weight (metric) is useful in the construction of codes over a ring of integers <span> <span>(mathbb {Z}_{p^l})</span> </span> (<em>p</em> prime and <span> <span>(l ge 1)</span> </span> an integer). It becomes Hamming weight when the ring is taken to be a finite field and becomes Lee weight when the ring is taken to be <span> <span>(mathbb {Z}_{4})</span> </span>. This paper presents homogeneous weight distribution and total homogeneous weight of burst and repeated burst errors in the code space of <em>n</em>-tuples over <span> <span>(mathbb {Z}_{p^l})</span> </span>. Necessary and sufficient conditions for existence of an (<em>n</em>, <em>k</em>) linear code over <span> <span>(mathbb {Z}_{p^l})</span> </span> correcting the error patterns with respect to the homogeneous weight are derived.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"16 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140046197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-05DOI: 10.1007/s00224-024-10162-2
Yijie Chen, Kewei Lv
In 2015, Haviv introduced the Remote set problem (RSP) and studied the complexity of the covering radius problem (CRP), which is a classical problem in lattices. The RSP aims to identify a set containing a point that is sufficiently distant from a given lattice (pmb {mathcal {L}}). It introduced a new method for analyzing the complexity of CRP. An open question in RSP is whether we can obtain the approximation factor (gamma =1/2). This paper investigates this question and proposes a probabilistic polynomial-time algorithm for RSP with an approximation factor of (1/2-1/(clambda ^{(p)}_n)), where (cin mathbb {Z}^{+}) and (lambda ^{(p)}_n) is the n-th successive minima in lattice under (l_p)-norm. For a given lattice (pmb {mathcal {L}}) with rank n and positive integer d, our algorithm outputs a set S of size d in polynomial time. This set S includes a point at least ((frac{1}{2}-frac{1}{clambda ^{(p)}_n}){{rho }^{(p)}}(pmb {mathcal {L}})) from lattice (pmb {mathcal {L}}) with a probability greater than (1-1/2^d). Here, c is a positive integer and (rho ^{(p)}(pmb {mathcal {L}})) denotes the covering radius of (pmb {mathcal {L}}) in (l_p)-norm((1le ple infty )). Based on this, we obtain that (text {GAPCRP}_{2+1/2^{O(n)}}) belongs to the complexity class coRP, and we provide new reductions from GAPCRP to GAPCVP.
{"title":"New Results on the Remote Set Problem and Its Applications in Complexity Study","authors":"Yijie Chen, Kewei Lv","doi":"10.1007/s00224-024-10162-2","DOIUrl":"https://doi.org/10.1007/s00224-024-10162-2","url":null,"abstract":"<p>In 2015, Haviv introduced the Remote set problem (RSP) and studied the complexity of the covering radius problem (CRP), which is a classical problem in lattices. The RSP aims to identify a set containing a point that is sufficiently distant from a given lattice <span>(pmb {mathcal {L}})</span>. It introduced a new method for analyzing the complexity of CRP. An open question in RSP is whether we can obtain the approximation factor <span>(gamma =1/2)</span>. This paper investigates this question and proposes a probabilistic polynomial-time algorithm for RSP with an approximation factor of <span>(1/2-1/(clambda ^{(p)}_n))</span>, where <span>(cin mathbb {Z}^{+})</span> and <span>(lambda ^{(p)}_n)</span> is the <i>n</i>-th successive minima in lattice under <span>(l_p)</span>-norm. For a given lattice <span>(pmb {mathcal {L}})</span> with rank <i>n</i> and positive integer <i>d</i>, our algorithm outputs a set <i>S</i> of size <i>d</i> in polynomial time. This set <i>S</i> includes a point at least <span>((frac{1}{2}-frac{1}{clambda ^{(p)}_n}){{rho }^{(p)}}(pmb {mathcal {L}}))</span> from lattice <span>(pmb {mathcal {L}})</span> with a probability greater than <span>(1-1/2^d)</span>. Here, <i>c</i> is a positive integer and <span>(rho ^{(p)}(pmb {mathcal {L}}))</span> denotes the covering radius of <span>(pmb {mathcal {L}})</span> in <span>(l_p)</span>-norm(<span>(1le ple infty )</span>). Based on this, we obtain that <span>(text {GAPCRP}_{2+1/2^{O(n)}})</span> belongs to the complexity class coRP, and we provide new reductions from GAPCRP to GAPCVP.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"65 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140034561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-23DOI: 10.1007/s00224-024-10165-z
Marat Faizrahmanov
The paper studies (varvec{Sigma ^0_n})-computable families ((varvec{ngeqslant 2})) and their numberings. It is proved that any non-trivial (varvec{Sigma ^0_n})-computable family has a complete with respect to any of its elements (varvec{Sigma ^0_n})-computable non-principal numbering. It is established that if a (varvec{Sigma ^0_n})-computable family is not principal, then any of its (varvec{Sigma ^0_n})-computable numberings has a minimal cover and, if the family is infinite, is incomparable with one of its minimal (varvec{Sigma ^0_n})-computable numberings. It is also shown that for any (varvec{Sigma ^0_n})-computable numbering (varvec{nu }) of a (varvec{Sigma ^0_n})-computable non-principal family there exists its (varvec{Sigma ^0_n})-computable numbering that is incomparable with (varvec{nu }). If a non-trivial (varvec{Sigma ^0_n})-computable family contains the least and greatest elements under inclusion, then for any of its (varvec{Sigma ^0_n})-computable non-principal non-least numberings (varvec{nu }) there exists a (varvec{Sigma ^0_n})-computable numbering of the family incomparable with (varvec{nu }). In particular, this is true for the family of all (varvec{Sigma ^0_n})-sets and for the families consisting of two inclusion-comparable (varvec{Sigma ^0_n})-sets (semilattices of the (varvec{Sigma ^0_n})-computable numberings of such families are isomorphic to the semilattice of (varvec{m})-degrees of (varvec{Sigma ^0_n})-sets).
{"title":"On Non-principal Arithmetical Numberings and Families","authors":"Marat Faizrahmanov","doi":"10.1007/s00224-024-10165-z","DOIUrl":"https://doi.org/10.1007/s00224-024-10165-z","url":null,"abstract":"<p>The paper studies <span>(varvec{Sigma ^0_n})</span>-computable families (<span>(varvec{ngeqslant 2})</span>) and their numberings. It is proved that any non-trivial <span>(varvec{Sigma ^0_n})</span>-computable family has a complete with respect to any of its elements <span>(varvec{Sigma ^0_n})</span>-computable non-principal numbering. It is established that if a <span>(varvec{Sigma ^0_n})</span>-computable family is not principal, then any of its <span>(varvec{Sigma ^0_n})</span>-computable numberings has a minimal cover and, if the family is infinite, is incomparable with one of its minimal <span>(varvec{Sigma ^0_n})</span>-computable numberings. It is also shown that for any <span>(varvec{Sigma ^0_n})</span>-computable numbering <span>(varvec{nu })</span> of a <span>(varvec{Sigma ^0_n})</span>-computable non-principal family there exists its <span>(varvec{Sigma ^0_n})</span>-computable numbering that is incomparable with <span>(varvec{nu })</span>. If a non-trivial <span>(varvec{Sigma ^0_n})</span>-computable family contains the least and greatest elements under inclusion, then for any of its <span>(varvec{Sigma ^0_n})</span>-computable non-principal non-least numberings <span>(varvec{nu })</span> there exists a <span>(varvec{Sigma ^0_n})</span>-computable numbering of the family incomparable with <span>(varvec{nu })</span>. In particular, this is true for the family of all <span>(varvec{Sigma ^0_n})</span>-sets and for the families consisting of two inclusion-comparable <span>(varvec{Sigma ^0_n})</span>-sets (semilattices of the <span>(varvec{Sigma ^0_n})</span>-computable numberings of such families are isomorphic to the semilattice of <span>(varvec{m})</span>-degrees of <span>(varvec{Sigma ^0_n})</span>-sets).</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"7 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139955332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-23DOI: 10.1007/s00224-024-10161-3
Hoang-Oanh Le, Van Bang Le
The well-known Cluster Vertex Deletion problem (cluster-vd) asks for a given graph G and an integer k whether it is possible to delete a set S of at most k vertices of G such that the resulting graph (G-S) is a cluster graph (a disjoint union of cliques). We give a complete characterization of graphs H for which cluster-vd on H-free graphs is polynomially solvable and for which it is (textsf{NP})-complete. Moreover, in the (textsf{NP})-completeness cases, cluster-vd cannot be solved in sub-exponential time in the vertex number of the H-free input graphs unless the Exponential-Time Hypothesis fails. We also consider the connected variant of cluster-vd, the Connected Cluster Vertex Deletion problem (connected cluster-vd), in which the set S has to induce a connected subgraph of G. It turns out that connected cluster-vd admits the same complexity dichotomy for H-free graphs. Our results enlarge a list of rare dichotomy theorems for well-studied problems on H-free graphs.
众所周知的簇顶点删除问题(cluster-vd)问的是,对于给定的图 G 和整数 k,是否有可能删除 G 中最多由 k 个顶点组成的集合 S,从而使生成的图(G-S/)是一个簇图(小群的不相交联盟)。我们给出了图 H 的完整表征,对于这些图,无 H 图上的簇-vd 是多项式可解的,而对于这些图,簇-vd 是 (textsf{NP})-complete 的。此外,在(textsf{NP})-完备性情况下,除非指数时间假设失效,否则簇-vd 无法在无 H 输入图顶点数的亚指数时间内求解。我们还考虑了簇-vd 的连接变体,即连接簇顶点删除问题(connected cluster-vd),其中集合 S 必须诱导 G 的一个连接子图。我们的结果为无 H 图上研究得很好的问题增加了一个罕见的二分定理列表。
{"title":"Complexity of the (Connected) Cluster Vertex Deletion Problem on H-free Graphs","authors":"Hoang-Oanh Le, Van Bang Le","doi":"10.1007/s00224-024-10161-3","DOIUrl":"https://doi.org/10.1007/s00224-024-10161-3","url":null,"abstract":"<p>The well-known Cluster Vertex Deletion problem (<span>cluster-vd</span>) asks for a given graph <i>G</i> and an integer <i>k</i> whether it is possible to delete a set <i>S</i> of at most <i>k</i> vertices of <i>G</i> such that the resulting graph <span>(G-S)</span> is a cluster graph (a disjoint union of cliques). We give a complete characterization of graphs <i>H</i> for which <span>cluster-vd</span> on <i>H</i>-free graphs is polynomially solvable and for which it is <span>(textsf{NP})</span>-complete. Moreover, in the <span>(textsf{NP})</span>-completeness cases, <span>cluster-vd</span> cannot be solved in sub-exponential time in the vertex number of the <i>H</i>-free input graphs unless the Exponential-Time Hypothesis fails. We also consider the connected variant of <span>cluster-vd</span>, the Connected Cluster Vertex Deletion problem (<span>connected cluster-vd</span>), in which the set <i>S</i> has to induce a connected subgraph of <i>G</i>. It turns out that <span>connected cluster-vd</span> admits the same complexity dichotomy for <i>H</i>-free graphs. Our results enlarge a list of rare dichotomy theorems for well-studied problems on <i>H</i>-free graphs.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":"41 1","pages":""},"PeriodicalIF":0.5,"publicationDate":"2024-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139955176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}