首页 > 最新文献

Theory of Computing Systems最新文献

英文 中文
New Results on the Remote Set Problem and Its Applications in Complexity Study 远程集问题的新成果及其在复杂性研究中的应用
IF 0.5 4区 计算机科学 Q3 Computer Science Pub Date : 2024-03-05 DOI: 10.1007/s00224-024-10162-2
Yijie Chen, Kewei Lv

In 2015, Haviv introduced the Remote set problem (RSP) and studied the complexity of the covering radius problem (CRP), which is a classical problem in lattices. The RSP aims to identify a set containing a point that is sufficiently distant from a given lattice (pmb {mathcal {L}}). It introduced a new method for analyzing the complexity of CRP. An open question in RSP is whether we can obtain the approximation factor (gamma =1/2). This paper investigates this question and proposes a probabilistic polynomial-time algorithm for RSP with an approximation factor of (1/2-1/(clambda ^{(p)}_n)), where (cin mathbb {Z}^{+}) and (lambda ^{(p)}_n) is the n-th successive minima in lattice under (l_p)-norm. For a given lattice (pmb {mathcal {L}}) with rank n and positive integer d, our algorithm outputs a set S of size d in polynomial time. This set S includes a point at least ((frac{1}{2}-frac{1}{clambda ^{(p)}_n}){{rho }^{(p)}}(pmb {mathcal {L}})) from lattice (pmb {mathcal {L}}) with a probability greater than (1-1/2^d). Here, c is a positive integer and (rho ^{(p)}(pmb {mathcal {L}})) denotes the covering radius of (pmb {mathcal {L}}) in (l_p)-norm((1le ple infty )). Based on this, we obtain that (text {GAPCRP}_{2+1/2^{O(n)}}) belongs to the complexity class coRP, and we provide new reductions from GAPCRP to GAPCVP.

2015 年,哈维夫提出了远程集问题(RSP),并研究了覆盖半径问题(CRP)的复杂性,这是网格中的一个经典问题。RSP 的目的是找出一个包含一个点的集合,该点与给定的网格有足够的距离(pmb {mathcal {L}})。它引入了一种分析 CRP 复杂性的新方法。RSP 中一个悬而未决的问题是我们能否得到近似因子 (gamma =1/2/)。本文研究了这个问题,并提出了一种 RSP 的概率多项式时间算法,其近似因子为 (1/2-1/(clambda ^{(p)}_n)) ,其中 (cin mathbb {Z}^{+}) 和 (lambda ^{(p)}_n) 是 (l_p)-norm 下网格中的 n 次连续最小值。对于秩为 n、正整数为 d 的给定网格 (pmb {mathcal {L}}) ,我们的算法会在多项式时间内输出一个大小为 d 的集合 S。这个集合 S 包含了至少一个来自网格 (pmb {mathcal {L}})的点,且概率大于 (1-1/2^d)。这里,c 是一个正整数,(rho ^{(p)}(pmb {mathcal {L}})表示 (pmb {mathcal {L}})在 (l_p)-norm((1le ple infty ))中的覆盖半径。)在此基础上,我们得到(text {GAPCRP}_{2+1/2^{O(n)}} )属于复杂度类 coRP,并提供了从 GAPCRP 到 GAPCVP 的新还原。
{"title":"New Results on the Remote Set Problem and Its Applications in Complexity Study","authors":"Yijie Chen, Kewei Lv","doi":"10.1007/s00224-024-10162-2","DOIUrl":"https://doi.org/10.1007/s00224-024-10162-2","url":null,"abstract":"<p>In 2015, Haviv introduced the Remote set problem (RSP) and studied the complexity of the covering radius problem (CRP), which is a classical problem in lattices. The RSP aims to identify a set containing a point that is sufficiently distant from a given lattice <span>(pmb {mathcal {L}})</span>. It introduced a new method for analyzing the complexity of CRP. An open question in RSP is whether we can obtain the approximation factor <span>(gamma =1/2)</span>. This paper investigates this question and proposes a probabilistic polynomial-time algorithm for RSP with an approximation factor of <span>(1/2-1/(clambda ^{(p)}_n))</span>, where <span>(cin mathbb {Z}^{+})</span> and <span>(lambda ^{(p)}_n)</span> is the <i>n</i>-th successive minima in lattice under <span>(l_p)</span>-norm. For a given lattice <span>(pmb {mathcal {L}})</span> with rank <i>n</i> and positive integer <i>d</i>, our algorithm outputs a set <i>S</i> of size <i>d</i> in polynomial time. This set <i>S</i> includes a point at least <span>((frac{1}{2}-frac{1}{clambda ^{(p)}_n}){{rho }^{(p)}}(pmb {mathcal {L}}))</span> from lattice <span>(pmb {mathcal {L}})</span> with a probability greater than <span>(1-1/2^d)</span>. Here, <i>c</i> is a positive integer and <span>(rho ^{(p)}(pmb {mathcal {L}}))</span> denotes the covering radius of <span>(pmb {mathcal {L}})</span> in <span>(l_p)</span>-norm(<span>(1le ple infty )</span>). Based on this, we obtain that <span>(text {GAPCRP}_{2+1/2^{O(n)}})</span> belongs to the complexity class coRP, and we provide new reductions from GAPCRP to GAPCVP.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140034561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Non-principal Arithmetical Numberings and Families 论非主流算术级数和族
IF 0.5 4区 计算机科学 Q3 Computer Science Pub Date : 2024-02-23 DOI: 10.1007/s00224-024-10165-z
Marat Faizrahmanov

The paper studies (varvec{Sigma ^0_n})-computable families ((varvec{ngeqslant 2})) and their numberings. It is proved that any non-trivial (varvec{Sigma ^0_n})-computable family has a complete with respect to any of its elements (varvec{Sigma ^0_n})-computable non-principal numbering. It is established that if a (varvec{Sigma ^0_n})-computable family is not principal, then any of its (varvec{Sigma ^0_n})-computable numberings has a minimal cover and, if the family is infinite, is incomparable with one of its minimal (varvec{Sigma ^0_n})-computable numberings. It is also shown that for any (varvec{Sigma ^0_n})-computable numbering (varvec{nu }) of a (varvec{Sigma ^0_n})-computable non-principal family there exists its (varvec{Sigma ^0_n})-computable numbering that is incomparable with (varvec{nu }). If a non-trivial (varvec{Sigma ^0_n})-computable family contains the least and greatest elements under inclusion, then for any of its (varvec{Sigma ^0_n})-computable non-principal non-least numberings (varvec{nu }) there exists a (varvec{Sigma ^0_n})-computable numbering of the family incomparable with (varvec{nu }). In particular, this is true for the family of all (varvec{Sigma ^0_n})-sets and for the families consisting of two inclusion-comparable (varvec{Sigma ^0_n})-sets (semilattices of the (varvec{Sigma ^0_n})-computable numberings of such families are isomorphic to the semilattice of (varvec{m})-degrees of (varvec{Sigma ^0_n})-sets).

本文研究的是(varvec{Sigma ^0_n})-可计算族((varvec{ngeqslant 2})及其编号。证明了任何非琐的((varvec{Sigma ^0_n})-可计算族都有一个关于其任何元素的完整的((varvec{Sigma ^0_n})-可计算的非主要编号。研究证明,如果一个可计算的族不是主族,那么它的任何一个可计算的编号都有一个最小的覆盖,并且,如果这个族是无限的,那么它的一个最小的可计算的编号是不可比的。研究还表明,对于一个可计算的非主族的任何可计算的编号((varvec{σ^0_n})),都存在它的((varvec{σ^0_n})可计算的编号)与((varvec{nu }) 不可比。如果一个非琐的((varvec{Sigma ^0_n})可计算族包含了包含下的最小元素和最大元素、那么对于任何一个它的(varvec{Sigma ^0_n})可计算的非主要非最小数族来说,都存在一个(varvec{Sigma ^0_n})可计算的与(varvec{/nu }) 不可比的数族。特别是对于所有集合的族和由两个包容可比的集合组成的族都是如此。集(这些族的 (varvec{Sigma ^0_n})-computable numberings 的半网格与 (varvec{m})-degrees of (varvec{Sigma ^0_n})-sets 的半网格同构)。
{"title":"On Non-principal Arithmetical Numberings and Families","authors":"Marat Faizrahmanov","doi":"10.1007/s00224-024-10165-z","DOIUrl":"https://doi.org/10.1007/s00224-024-10165-z","url":null,"abstract":"<p>The paper studies <span>(varvec{Sigma ^0_n})</span>-computable families (<span>(varvec{ngeqslant 2})</span>) and their numberings. It is proved that any non-trivial <span>(varvec{Sigma ^0_n})</span>-computable family has a complete with respect to any of its elements <span>(varvec{Sigma ^0_n})</span>-computable non-principal numbering. It is established that if a <span>(varvec{Sigma ^0_n})</span>-computable family is not principal, then any of its <span>(varvec{Sigma ^0_n})</span>-computable numberings has a minimal cover and, if the family is infinite, is incomparable with one of its minimal <span>(varvec{Sigma ^0_n})</span>-computable numberings. It is also shown that for any <span>(varvec{Sigma ^0_n})</span>-computable numbering <span>(varvec{nu })</span> of a <span>(varvec{Sigma ^0_n})</span>-computable non-principal family there exists its <span>(varvec{Sigma ^0_n})</span>-computable numbering that is incomparable with <span>(varvec{nu })</span>. If a non-trivial <span>(varvec{Sigma ^0_n})</span>-computable family contains the least and greatest elements under inclusion, then for any of its <span>(varvec{Sigma ^0_n})</span>-computable non-principal non-least numberings <span>(varvec{nu })</span> there exists a <span>(varvec{Sigma ^0_n})</span>-computable numbering of the family incomparable with <span>(varvec{nu })</span>. In particular, this is true for the family of all <span>(varvec{Sigma ^0_n})</span>-sets and for the families consisting of two inclusion-comparable <span>(varvec{Sigma ^0_n})</span>-sets (semilattices of the <span>(varvec{Sigma ^0_n})</span>-computable numberings of such families are isomorphic to the semilattice of <span>(varvec{m})</span>-degrees of <span>(varvec{Sigma ^0_n})</span>-sets).</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139955332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Complexity of the (Connected) Cluster Vertex Deletion Problem on H-free Graphs 无 H 图上(连接)簇顶点删除问题的复杂性
IF 0.5 4区 计算机科学 Q3 Computer Science Pub Date : 2024-02-23 DOI: 10.1007/s00224-024-10161-3
Hoang-Oanh Le, Van Bang Le

The well-known Cluster Vertex Deletion problem (cluster-vd) asks for a given graph G and an integer k whether it is possible to delete a set S of at most k vertices of G such that the resulting graph (G-S) is a cluster graph (a disjoint union of cliques). We give a complete characterization of graphs H for which cluster-vd on H-free graphs is polynomially solvable and for which it is (textsf{NP})-complete. Moreover, in the (textsf{NP})-completeness cases, cluster-vd cannot be solved in sub-exponential time in the vertex number of the H-free input graphs unless the Exponential-Time Hypothesis fails. We also consider the connected variant of cluster-vd, the Connected Cluster Vertex Deletion problem (connected cluster-vd), in which the set S has to induce a connected subgraph of G. It turns out that connected cluster-vd admits the same complexity dichotomy for H-free graphs. Our results enlarge a list of rare dichotomy theorems for well-studied problems on H-free graphs.

众所周知的簇顶点删除问题(cluster-vd)问的是,对于给定的图 G 和整数 k,是否有可能删除 G 中最多由 k 个顶点组成的集合 S,从而使生成的图(G-S/)是一个簇图(小群的不相交联盟)。我们给出了图 H 的完整表征,对于这些图,无 H 图上的簇-vd 是多项式可解的,而对于这些图,簇-vd 是 (textsf{NP})-complete 的。此外,在(textsf{NP})-完备性情况下,除非指数时间假设失效,否则簇-vd 无法在无 H 输入图顶点数的亚指数时间内求解。我们还考虑了簇-vd 的连接变体,即连接簇顶点删除问题(connected cluster-vd),其中集合 S 必须诱导 G 的一个连接子图。我们的结果为无 H 图上研究得很好的问题增加了一个罕见的二分定理列表。
{"title":"Complexity of the (Connected) Cluster Vertex Deletion Problem on H-free Graphs","authors":"Hoang-Oanh Le, Van Bang Le","doi":"10.1007/s00224-024-10161-3","DOIUrl":"https://doi.org/10.1007/s00224-024-10161-3","url":null,"abstract":"<p>The well-known Cluster Vertex Deletion problem (<span>cluster-vd</span>) asks for a given graph <i>G</i> and an integer <i>k</i> whether it is possible to delete a set <i>S</i> of at most <i>k</i> vertices of <i>G</i> such that the resulting graph <span>(G-S)</span> is a cluster graph (a disjoint union of cliques). We give a complete characterization of graphs <i>H</i> for which <span>cluster-vd</span> on <i>H</i>-free graphs is polynomially solvable and for which it is <span>(textsf{NP})</span>-complete. Moreover, in the <span>(textsf{NP})</span>-completeness cases, <span>cluster-vd</span> cannot be solved in sub-exponential time in the vertex number of the <i>H</i>-free input graphs unless the Exponential-Time Hypothesis fails. We also consider the connected variant of <span>cluster-vd</span>, the Connected Cluster Vertex Deletion problem (<span>connected cluster-vd</span>), in which the set <i>S</i> has to induce a connected subgraph of <i>G</i>. It turns out that <span>connected cluster-vd</span> admits the same complexity dichotomy for <i>H</i>-free graphs. Our results enlarge a list of rare dichotomy theorems for well-studied problems on <i>H</i>-free graphs.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139955176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Decidability of Infix Inclusion Problem 论无穷包含问题的可判定性
IF 0.5 4区 计算机科学 Q3 Computer Science Pub Date : 2024-01-13 DOI: 10.1007/s00224-023-10160-w

Abstract

We introduce the infix inclusion problem of two languages S and T that decides whether or not S is a subset of the set of all infixes of T. This problem is motivated by the need for identifying malicious computation patterns according to their semantics, which are often disguised with additional sub-patterns surrounding information. In other words, malicious patterns are embedded as an infix of the whole pattern. We examine the infix inclusion problem for the case where a source S and a target T are finite, regular or context-free languages. We prove that the problem is 1) co-NP-complete when one of the languages is finite, 2) PSPACE-complete when both S and T are regular, 3) EXPTIME-complete when S is context-free and T is regular, 4) undecidable when S is either regular or context-free and T is context-free and 5) undecidable when one of S and T is in a language class where the emptiness of its languages is undecidable, even if the other is finite. We, furthermore, explore the infix inclusion problem for visibly pushdown languages, a subclass of context-free languages.

摘要 我们引入了两种语言 S 和 T 的后缀包含问题,该问题决定了 S 是否是 T 的所有后缀集合的子集。该问题的动机是根据恶意计算模式的语义识别恶意计算模式的需要,这些恶意计算模式通常用围绕信息的附加子模式进行伪装。换句话说,恶意模式是作为整个模式的下位数嵌入的。我们研究了源 S 和目标 T 均为有限、正则或无上下文语言情况下的下位包含问题。我们证明:1)当其中一种语言是有限语言时,该问题是 co-NP-complete 的;2)当 S 和 T 都是规则语言时,该问题是 PSPACE-complete 的;3)当 S 是无上下文且 T 是规则语言时,该问题是 EXPTIME-complete 的;4)当 S 是规则语言或无上下文且 T 是无上下文时,该问题是不可判定的;5)当 S 和 T 中的一种语言属于语言类时,即使另一种语言是有限语言,其语言的空性也是不可判定的。此外,我们还探讨了无上下文语言子类--明显推倒语言的下位包含问题。
{"title":"On the Decidability of Infix Inclusion Problem","authors":"","doi":"10.1007/s00224-023-10160-w","DOIUrl":"https://doi.org/10.1007/s00224-023-10160-w","url":null,"abstract":"<h3>Abstract</h3> <p>We introduce the infix inclusion problem of two languages <em>S</em> and <em>T</em> that decides whether or not <em>S</em> is a subset of the set of all infixes of <em>T</em>. This problem is motivated by the need for identifying malicious computation patterns according to their semantics, which are often disguised with additional sub-patterns surrounding information. In other words, malicious patterns are embedded as an infix of the whole pattern. We examine the infix inclusion problem for the case where a source <em>S</em> and a target <em>T</em> are finite, regular or context-free languages. We prove that the problem is 1) <span>co-NP-complete</span> when one of the languages is finite, 2) <span>PSPACE-complete</span> when both <em>S</em> and <em>T</em> are regular, 3) <span>EXPTIME-complete</span> when <em>S</em> is context-free and <em>T</em> is regular, 4) undecidable when <em>S</em> is either regular or context-free and <em>T</em> is context-free and 5) undecidable when one of <em>S</em> and <em>T</em> is in a language class where the emptiness of its languages is undecidable, even if the other is finite. We, furthermore, explore the infix inclusion problem for visibly pushdown languages, a subclass of context-free languages.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139459373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Farkas Bounds on Horn Constraint Systems 角约束系统的法卡斯界值
IF 0.5 4区 计算机科学 Q3 Computer Science Pub Date : 2024-01-06 DOI: 10.1007/s00224-023-10156-6
K. Subramani, Piotr Wojciechowki, Alvaro Velasquez

In this paper, we analyze the copy complexity of unsatisfiable Horn constraint systems, under the ADD refutation system. Recall that a linear constraint of the form (sum _{i=1}^{n} a_{i}cdot x_{i} ge b), is said to be a horn constraint if all the (a_{i} in {0,1,-1}) and at most one of the (a_{i})s is positive. A conjunction of such constraints is called a Horn constraint system (HCS). Horn constraints arise in a number of domains including, but not limited to, program verification, power systems, econometrics, and operations research. The ADD refutation system is both sound and complete. Additionally, it is the simplest and most natural refutation system for refuting the feasibility of a system of linear constraints. The copy complexity of an infeasible linear constraint system (not necessarily Horn) in a refutation system, is the minimum number of times each constraint needs to be replicated, in order to obtain a read-once refutation. We show that for an HCS with n variables and m constraints, the copy complexity is at most (2^{n-1}), in the ADD refutation system. Additionally, we analyze bounded-width HCSs from the perspective of copy complexity. Finally, we provide an empirical analysis of an integer programming formulation of the copy complexity problem in HCSs. (An extended abstract was published in FroCos 2021 [26].)

本文分析了 ADD 反驳系统下不可满足的 Horn 约束系统的副本复杂度。回想一下,如果所有的(a_{i} in {0,1,-1})和(a_{i})中最多有一个是正数,那么形式为(sum _{i=1}^{n} a_{i}cdot x_{i} ge b) 的线性约束就被称为角约束。这种约束的组合称为 Horn 约束系统(HCS)。Horn 约束出现在许多领域,包括但不限于程序验证、电力系统、计量经济学和运筹学。ADD 反驳系统既合理又完整。此外,它还是反驳线性约束系统可行性的最简单、最自然的反驳系统。反驳系统中不可行线性约束系统(不一定是 Horn)的复制复杂度,是指为了获得只读反驳,每个约束需要复制的最少次数。我们证明,对于具有 n 个变量和 m 个约束的 HCS,在 ADD 反驳系统中,复制复杂度最多为 (2^{n-1})。此外,我们还从复制复杂度的角度分析了有界宽的 HCS。最后,我们对 HCS 中副本复杂性问题的整数编程公式进行了实证分析。(扩展摘要发表于 FroCos 2021 [26])。
{"title":"Farkas Bounds on Horn Constraint Systems","authors":"K. Subramani, Piotr Wojciechowki, Alvaro Velasquez","doi":"10.1007/s00224-023-10156-6","DOIUrl":"https://doi.org/10.1007/s00224-023-10156-6","url":null,"abstract":"<p>In this paper, we analyze the copy complexity of unsatisfiable Horn constraint systems, under the ADD refutation system. Recall that a linear constraint of the form <span>(sum _{i=1}^{n} a_{i}cdot x_{i} ge b)</span>, is said to be a horn constraint if all the <span>(a_{i} in {0,1,-1})</span> and at most one of the <span>(a_{i})</span>s is positive. A conjunction of such constraints is called a Horn constraint system (HCS). Horn constraints arise in a number of domains including, but not limited to, program verification, power systems, econometrics, and operations research. The ADD refutation system is both <b>sound</b> and <b>complete</b>. Additionally, it is the simplest and most natural refutation system for refuting the feasibility of a system of linear constraints. The copy complexity of an infeasible linear constraint system (not necessarily Horn) in a refutation system, is the minimum number of times each constraint needs to be replicated, in order to obtain a read-once refutation. We show that for an HCS with <i>n</i> variables and <i>m</i> constraints, the copy complexity is at most <span>(2^{n-1})</span>, in the ADD refutation system. Additionally, we analyze bounded-width HCSs from the perspective of copy complexity. Finally, we provide an empirical analysis of an integer programming formulation of the copy complexity problem in HCSs. (An extended abstract was published in FroCos 2021 [26].)</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2024-01-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139373777","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Polynomial Recursive Sequences. 论多项式递推序列。
IF 0.6 4区 计算机科学 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-01-01 Epub Date: 2021-06-02 DOI: 10.1007/s00224-021-10046-9
Michaël Cadilhac, Filip Mazowiecki, Charles Paperman, Michał Pilipczuk, Géraud Sénizergues

We study the expressive power of polynomial recursive sequences, a nonlinear extension of the well-known class of linear recursive sequences. These sequences arise naturally in the study of nonlinear extensions of weighted automata, where (non)expressiveness results translate to class separations. A typical example of a polynomial recursive sequence is b n = n!. Our main result is that the sequence u n = n n is not polynomial recursive.

我们研究多项式递归序列的表达力,它是著名的线性递归序列类的非线性扩展。这些序列自然出现在加权自动机非线性扩展的研究中,其中(非)表现力结果转化为类分离。多项式递推序列的一个典型例子是 b n = n!我们的主要结果是序列 u n = n n 不是多项式递归的。
{"title":"On Polynomial Recursive Sequences.","authors":"Michaël Cadilhac, Filip Mazowiecki, Charles Paperman, Michał Pilipczuk, Géraud Sénizergues","doi":"10.1007/s00224-021-10046-9","DOIUrl":"https://doi.org/10.1007/s00224-021-10046-9","url":null,"abstract":"<p><p>We study the expressive power of <i>polynomial recursive sequences</i>, a nonlinear extension of the well-known class of linear recursive sequences. These sequences arise naturally in the study of nonlinear extensions of weighted automata, where (non)expressiveness results translate to class separations. A typical example of a polynomial recursive sequence is <i>b</i> <sub><i>n</i></sub> = <i>n</i>!. Our main result is that the sequence <i>u</i> <sub><i>n</i></sub> = <i>n</i> <sup><i>n</i></sup> is not polynomial recursive.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.6,"publicationDate":"2024-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC11343969/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142056552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rational Index of Languages Defined by Grammars with Bounded Dimension of Parse Trees 解析树维度有界的语法所定义语言的有理索引
IF 0.5 4区 计算机科学 Q3 Computer Science Pub Date : 2023-12-20 DOI: 10.1007/s00224-023-10159-3
Ekaterina Shemetova, Alexander Okhotin, Semyon Grigorev

The rational index (rho _L) of a language L is an integer function, where (rho _L(n)) is the maximum length of the shortest string in (L cap R), over all regular languages R recognized by n-state nondeterministic finite automata (NFA). This paper investigates the rational index of languages defined by grammars with bounded parse tree dimension: this is a numerical measure of the amount of branching in a tree (with trees in a linear grammar having dimension 1). For context-free grammars, a grammar with tree dimension bounded by d has rational index at most (O(n^{2d})), and it is known from the literature that there exists a grammar with rational index (Theta (n^{2d})). In this paper, it is shown that for multi-component grammars with at most k components (k-MCFG) and with a tree dimension bounded by d, the rational index is at most (O(n^{2kd})), where the constant depends on the grammar, and there exists such a grammar with rational index (frac{k}{2^{kd^2 - kd -2k -1} cdot (8k+1)^{2kd}} n^{2kd}). Also, for the case of ordinary context-free grammars, a more precise lower bound (frac{1}{2^{d^2 + d - 3} 3^{2d}} n^{2d}) is established.

语言 L 的有理指数 ((rho _L))是一个整数函数,其中 (rho _L(n)) 是在 n 状态非确定有限自动机(NFA)识别的所有规则语言 R 中,(L cap R) 中最短字符串的最大长度。本文研究了由解析树维度有界的语法定义的语言的理性指数:这是树中分支量的数字度量(线性语法中的树维度为 1)。对于无上下文语法来说,树维度以 d 为界的语法的有理指数最多为 (O(n^{2d})),文献中已知存在一种有理指数为 (Theta (n^{2d}))的语法。本文证明,对于最多有 k 个成分(k-MCFG)且树维度以 d 为界的多成分语法,合理指数最多为 (O(n^{2kd}))、存在这样一种语法,其合理指数为 (frac{k}{2^{kd^2 - kd -2k -1} cdot (8k+1)^{2kd}} n^{2kd}).此外,对于普通无上下文语法,还建立了一个更精确的下界 (frac{1}{2^{d^2 + d - 3} 3^{2d}} n^{2d}).
{"title":"Rational Index of Languages Defined by Grammars with Bounded Dimension of Parse Trees","authors":"Ekaterina Shemetova, Alexander Okhotin, Semyon Grigorev","doi":"10.1007/s00224-023-10159-3","DOIUrl":"https://doi.org/10.1007/s00224-023-10159-3","url":null,"abstract":"<p>The rational index <span>(rho _L)</span> of a language <i>L</i> is an integer function, where <span>(rho _L(n))</span> is the maximum length of the shortest string in <span>(L cap R)</span>, over all regular languages <i>R</i> recognized by <i>n</i>-state nondeterministic finite automata (NFA). This paper investigates the rational index of languages defined by grammars with bounded parse tree dimension: this is a numerical measure of the amount of branching in a tree (with trees in a linear grammar having dimension 1). For context-free grammars, a grammar with tree dimension bounded by <i>d</i> has rational index at most <span>(O(n^{2d}))</span>, and it is known from the literature that there exists a grammar with rational index <span>(Theta (n^{2d}))</span>. In this paper, it is shown that for multi-component grammars with at most <i>k</i> components (<i>k</i>-MCFG) and with a tree dimension bounded by <i>d</i>, the rational index is at most <span>(O(n^{2kd}))</span>, where the constant depends on the grammar, and there exists such a grammar with rational index <span>(frac{k}{2^{kd^2 - kd -2k -1} cdot (8k+1)^{2kd}} n^{2kd})</span>. Also, for the case of ordinary context-free grammars, a more precise lower bound <span>(frac{1}{2^{d^2 + d - 3} 3^{2d}} n^{2d})</span> is established.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2023-12-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138818090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Bounds for Matching in Random-Order Streams 随机排序流中匹配的改进边界
IF 0.5 4区 计算机科学 Q3 Computer Science Pub Date : 2023-12-12 DOI: 10.1007/s00224-023-10155-7
Aaron Bernstein

We study the problem of computing an approximate maximum cardinality matching in the semi-streaming model when edges arrive in a random order. In the semi-streaming model, the edges of the input graph (G = (V,E)) are given as a stream (e_1, ldots , e_m), and the algorithm is allowed to make a single pass over this stream while using (O(ntext {polylog}(n))) space ((m = |E|) and (n = |V|)). If the order of edges is adversarial, a simple single-pass greedy algorithm yields a 1/2-approximation in O(n) space; achieving a better approximation in adversarial streams remains an elusive open question. A line of recent work shows that one can improve upon the 1/2-approximation if the edges of the stream arrive in a random order. The state of the art for this model is two-fold: Assadi et al. [SODA 2019] show how to compute a (frac{2}{3}) ((sim .66))-approximate matching, but the space requirement is (O(n^{1.5}text {polylog}(n))). Very recently, Farhadi et al. [SODA 2020] presented an algorithm with the desired space usage of (O(ntext {polylog}(n))), but a worse approximation ratio of (frac{6}{11}) ((sim .545)), or (frac{3}{5}) ((=.6)) in bipartite graphs. In this paper, we present an algorithm that computes a (frac{2}{3}(sim .66))-approximate matching using only (O(nlog (n))) space, improving upon both results above. We also note that for adversarial streams, a lower bound of Kapralov [SODA 2013] shows that any algorithm that achieves a (1-frac{1}{e})((sim .63))-approximation requires ((n^{1+Omega (1/log log (n))})) space; recent follow-up work by the same author improved this lower bound to (1+ln (2) sim .59) [SODA 2021]. As a consequence, both our result and the earlier result of Farhadi et al. prove that the problem of computing a maximum matching is strictly easier in random-order streams than in adversarial ones.

我们研究的是当边缘以随机顺序到达时,在半流模型中计算近似最大心率匹配的问题。在半流模型中,输入图(G = (V,E))的边是以流 (e_1, ldots , e_m) 的形式给出的,允许算法在使用 (O(ntext {polylog}(n))) 空间((m = |E|)和(n = |V|))时对该流进行单次传递。如果边的顺序是对抗性的,那么简单的单程贪婪算法就能在 O(n) 空间内获得 1/2 近似值;而在对抗流中获得更好的近似值仍然是一个难以捉摸的开放性问题。最近的一项研究表明,如果数据流的边以随机顺序到达,则可以改进 1/2 近似值。该模型的最新进展有两个方面:Assadi 等人[SODA 2019]展示了如何计算一个(frac{2}{3}) ((sim .66))近似匹配,但空间需求为(O(n^{1.5}text {polylog}(n))) 。最近,Farhadi 等人[SODA 2020]提出了一种算法,其所需空间使用率为(O(ntext {polylog}(n)) ),但在双向图中,其近似比为(frac{6}{11}) ((sim .545)),或(frac{3}{5}) ((=.6))。在本文中,我们提出了一种算法,它只用了(O(nlog (n)))个空间就能计算出一个(frac{2}{3}(sim .66))近似匹配,改进了上述两个结果。我们还注意到,对于对抗流,卡普拉洛夫(Kapralov)的一个下限[SODA 2013]表明,任何算法只要能实现(1-frac{1}{e})((sim .63))-逼近需要 ((n^{1+Omega (1/log log (n))}))空间;同一作者最近的后续工作将这一下界改进为 (1+ln (2) sim .59)[SODA 2021]。因此,我们的结果和 Farhadi 等人的早期结果都证明,计算最大匹配的问题在随机秩流中严格来说比在对抗流中更容易。
{"title":"Improved Bounds for Matching in Random-Order Streams","authors":"Aaron Bernstein","doi":"10.1007/s00224-023-10155-7","DOIUrl":"https://doi.org/10.1007/s00224-023-10155-7","url":null,"abstract":"<p>We study the problem of computing an approximate maximum cardinality matching in the semi-streaming model when edges arrive in a <i>random</i> order. In the semi-streaming model, the edges of the input graph <span>(G = (V,E))</span> are given as a stream <span>(e_1, ldots , e_m)</span>, and the algorithm is allowed to make a single pass over this stream while using <span>(O(ntext {polylog}(n)))</span> space (<span>(m = |E|)</span> and <span>(n = |V|)</span>). If the order of edges is adversarial, a simple single-pass greedy algorithm yields a 1/2-approximation in <i>O</i>(<i>n</i>) space; achieving a better approximation in adversarial streams remains an elusive open question. A line of recent work shows that one can improve upon the 1/2-approximation if the edges of the stream arrive in a random order. The state of the art for this model is two-fold: Assadi et al. [SODA 2019] show how to compute a <span>(frac{2}{3})</span> <span>((sim .66))</span>-approximate matching, but the space requirement is <span>(O(n^{1.5}text {polylog}(n)))</span>. Very recently, Farhadi et al. [SODA 2020] presented an algorithm with the desired space usage of <span>(O(ntext {polylog}(n)))</span>, but a worse approximation ratio of <span>(frac{6}{11})</span> <span>((sim .545))</span>, or <span>(frac{3}{5})</span> <span>((=.6))</span> in bipartite graphs. In this paper, we present an algorithm that computes a <span>(frac{2}{3}(sim .66))</span>-approximate matching using only <span>(O(nlog (n)))</span> space, improving upon both results above. We also note that for adversarial streams, a lower bound of Kapralov [SODA 2013] shows that any algorithm that achieves a <span>(1-frac{1}{e})</span>(<span>(sim .63)</span>)-approximation requires <span>((n^{1+Omega (1/log log (n))}))</span> space; recent follow-up work by the same author improved this lower bound to <span>(1+ln (2) sim .59)</span> [SODA 2021]. As a consequence, both our result and the earlier result of Farhadi et al. prove that the problem of computing a maximum matching is strictly easier in random-order streams than in adversarial ones.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2023-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138573618","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Beyond the Existential Theory of the Reals 超越现实存在论
IF 0.5 4区 计算机科学 Q3 Computer Science Pub Date : 2023-12-12 DOI: 10.1007/s00224-023-10151-x
Marcus Schaefer, Daniel Štefankovič

We show that completeness at higher levels of the theory of the reals is a robust notion (under changing the signature and bounding the domain of the quantifiers). This mends recognized gaps in the hierarchy, and leads to stronger completeness results for various computational problems. We exhibit several families of complete problems which can be used for future completeness results in the real hierarchy. As an application we sharpen some results by Bürgisser and Cucker on the complexity of properties of semialgebraic sets, including the Hausdorff distance problem also studied by Jungeblut, Kleist, and Miltzow.

我们证明,在有数理论的更高层次上,完备性是一个稳健的概念(在改变签名和限定量词域的情况下)。这弥补了层次结构中公认的差距,并为各种计算问题带来了更强的完备性结果。我们展示了几组完备性问题,这些问题可用于未来在真实层次结构中得出完备性结果。作为一个应用,我们强化了布尔吉瑟和卡克关于半代数集合属性复杂性的一些结果,包括容格布卢特、克莱斯特和米尔佐夫也研究过的豪斯多夫距离问题。
{"title":"Beyond the Existential Theory of the Reals","authors":"Marcus Schaefer, Daniel Štefankovič","doi":"10.1007/s00224-023-10151-x","DOIUrl":"https://doi.org/10.1007/s00224-023-10151-x","url":null,"abstract":"<p>We show that completeness at higher levels of the theory of the reals is a robust notion (under changing the signature and bounding the domain of the quantifiers). This mends recognized gaps in the hierarchy, and leads to stronger completeness results for various computational problems. We exhibit several families of complete problems which can be used for future completeness results in the real hierarchy. As an application we sharpen some results by Bürgisser and Cucker on the complexity of properties of semialgebraic sets, including the Hausdorff distance problem also studied by Jungeblut, Kleist, and Miltzow.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2023-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138573607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Upper Bounds on Communication in Terms of Approximate Rank 近似等级的通信上限
IF 0.5 4区 计算机科学 Q3 Computer Science Pub Date : 2023-12-12 DOI: 10.1007/s00224-023-10158-4
Anna Gál, Ridwan Syed

We show that any Boolean function with approximate rank r can be computed by bounded-error quantum protocols without prior entanglement of complexity (O( sqrt{r} log r)). In addition, we show that any Boolean function with approximate rank r and discrepancy (delta ) can be computed by deterministic protocols of complexity O(r), and private coin bounded-error randomized protocols of complexity (O((frac{1}{delta })^2 + log r)). Our deterministic upper bound in terms of approximate rank is tight up to constant factors, and the dependence on discrepancy in our randomized upper bound is tight up to taking square-roots. Our results can be used to obtain lower bounds on approximate rank. We also obtain a strengthening of Newman’s theorem with respect to approximate rank.

我们证明,任何具有近似秩r的布尔函数都可以通过复杂度为(O( sqrt{r} log r))的无先验纠缠的有界错误量子协议来计算。此外,我们还证明,任何具有近似秩r和差分(delta )的布尔函数都可以通过复杂度为O(r)的确定性协议和复杂度为(O((frac{1}{delta })^2 + log r)的私有硬币有界错误随机协议来计算。)我们用近似等级表示的确定性上界在常数因子以内都是紧密的,而我们的随机上界中对差异的依赖在取平方根以内都是紧密的。我们的结果可以用来获得近似秩的下界。我们还得到了纽曼定理在近似秩方面的加强。
{"title":"Upper Bounds on Communication in Terms of Approximate Rank","authors":"Anna Gál, Ridwan Syed","doi":"10.1007/s00224-023-10158-4","DOIUrl":"https://doi.org/10.1007/s00224-023-10158-4","url":null,"abstract":"<p>We show that any Boolean function with approximate rank <i>r</i> can be computed by bounded-error quantum protocols without prior entanglement of complexity <span>(O( sqrt{r} log r))</span>. In addition, we show that any Boolean function with approximate rank <i>r</i> and discrepancy <span>(delta )</span> can be computed by deterministic protocols of complexity <i>O</i>(<i>r</i>), and private coin bounded-error randomized protocols of complexity <span>(O((frac{1}{delta })^2 + log r))</span>. Our deterministic upper bound in terms of approximate rank is tight up to constant factors, and the dependence on discrepancy in our randomized upper bound is tight up to taking square-roots. Our results can be used to obtain lower bounds on approximate rank. We also obtain a strengthening of Newman’s theorem with respect to approximate rank.</p>","PeriodicalId":22832,"journal":{"name":"Theory of Computing Systems","volume":null,"pages":null},"PeriodicalIF":0.5,"publicationDate":"2023-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138573899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Theory of Computing Systems
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1