Clustering is a basic technology in data mining, and similarity measurement plays a crucial role in it. The existing clustering algorithms, especially those for social networks, pay more attention to users' properties while ignoring the global measurement across social relationships. In this paper, a new clustering algorithm is proposed, which not only considers the distance of users' properties but also considers users' social influence. Social influence can be further divided into mutual influence and self influence. With mutual influence, we can deal with users' interests and measure their similarities by introducing areas and activities, thus better weighing the influence between them in an indirect way. Separately, we formulate a new propagation model, PR-Threshold++, by merging the PageRank algorithm and Linear Threshold model, to model the self influence. Based on that, we design a novel similarity by exploiting users' distance, mutual influence, and self influence. Finally, we adjust K-medoids according to our similarity and use real-world datasets to evaluate their performance in intensive simulations.
{"title":"A new similarity in clustering through users' interest and social relationship","authors":"Jianxiong Guo , Zhehao Zhu , Yucen Gao , Xiaofeng Gao","doi":"10.1016/j.tcs.2024.114833","DOIUrl":"10.1016/j.tcs.2024.114833","url":null,"abstract":"<div><p>Clustering is a basic technology in data mining, and similarity measurement plays a crucial role in it. The existing clustering algorithms, especially those for social networks, pay more attention to users' properties while ignoring the global measurement across social relationships. In this paper, a new clustering algorithm is proposed, which not only considers the distance of users' properties but also considers users' social influence. Social influence can be further divided into mutual influence and self influence. With mutual influence, we can deal with users' interests and measure their similarities by introducing areas and activities, thus better weighing the influence between them in an indirect way. Separately, we formulate a new propagation model, PR-Threshold++, by merging the PageRank algorithm and Linear Threshold model, to model the self influence. Based on that, we design a novel similarity by exploiting users' distance, mutual influence, and self influence. Finally, we adjust K-medoids according to our similarity and use real-world datasets to evaluate their performance in intensive simulations.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1019 ","pages":"Article 114833"},"PeriodicalIF":0.9,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142158432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-06DOI: 10.1016/j.tcs.2024.114834
Qianru Zhou , Jianxi Fan , Yan Wang , Baolei Cheng , Guijuan Wang
Two crucial metrics used to evaluate the fault tolerance of interconnection networks are connectivity and diagnosability. By improving the connectivity and diagnosability of the interconnection network, its fault tolerance can be enhanced. In this paper, we focus on determining the g-extra connectivity of the divide-and-swap cube , as well as its diagnosability based on the pessimistic diagnosis strategy and g-extra precise diagnosis strategy, under the PMC and MM* models. The research analysis suggests that compared with some other connectivity and diagnosability of , such as classical connectivity, structure connectivity, super connectivity, and classical diagnosability, the extra connectivity/diagnosability and pessimistic diagnosability of enable it to have a higher fault tolerance. Moreover, we propose two effective diagnosis algorithms of : the g-extra diagnosis algorithm (EX-Diagnosis) and the pessimistic diagnosis algorithm (PE-Diagnosis), where the EX-Diagnosis algorithm can accurately diagnose the state of all processors in .
{"title":"High fault-tolerant performance of the divide-and-swap cube network","authors":"Qianru Zhou , Jianxi Fan , Yan Wang , Baolei Cheng , Guijuan Wang","doi":"10.1016/j.tcs.2024.114834","DOIUrl":"10.1016/j.tcs.2024.114834","url":null,"abstract":"<div><p>Two crucial metrics used to evaluate the fault tolerance of interconnection networks are connectivity and diagnosability. By improving the connectivity and diagnosability of the interconnection network, its fault tolerance can be enhanced. In this paper, we focus on determining the <em>g</em>-extra connectivity <span><math><mo>(</mo><mn>0</mn><mo>≤</mo><mi>g</mi><mo>≤</mo><mn>10</mn><mo>)</mo></math></span> of the divide-and-swap cube <span><math><mi>D</mi><mi>S</mi><msub><mrow><mi>C</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>, as well as its diagnosability based on the pessimistic diagnosis strategy and <em>g</em>-extra precise diagnosis strategy, under the PMC and MM* models. The research analysis suggests that compared with some other connectivity and diagnosability of <span><math><mi>D</mi><mi>S</mi><msub><mrow><mi>C</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>, such as classical connectivity, structure connectivity, super connectivity, and classical diagnosability, the extra connectivity/diagnosability and pessimistic diagnosability of <span><math><mi>D</mi><mi>S</mi><msub><mrow><mi>C</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span> enable it to have a higher fault tolerance. Moreover, we propose two <span><math><mi>O</mi><mo>(</mo><mi>N</mi><msub><mrow><mi>log</mi></mrow><mrow><mn>2</mn></mrow></msub><mo></mo><mi>N</mi><mo>)</mo></math></span> effective diagnosis algorithms of <span><math><mi>D</mi><mi>S</mi><msub><mrow><mi>C</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>: the <em>g</em>-extra diagnosis algorithm (EX-Diagnosis<span><math><msub><mrow></mrow><mrow><mi>D</mi><mi>S</mi><msub><mrow><mi>C</mi></mrow><mrow><mi>n</mi></mrow></msub></mrow></msub></math></span>) and the pessimistic diagnosis algorithm (PE-Diagnosis<span><math><msub><mrow></mrow><mrow><mi>D</mi><mi>S</mi><msub><mrow><mi>C</mi></mrow><mrow><mi>n</mi></mrow></msub></mrow></msub></math></span>), where the EX-Diagnosis<span><math><msub><mrow></mrow><mrow><mi>D</mi><mi>S</mi><msub><mrow><mi>C</mi></mrow><mrow><mi>n</mi></mrow></msub></mrow></msub></math></span> algorithm can accurately diagnose the state of all processors in <span><math><mi>D</mi><mi>S</mi><msub><mrow><mi>C</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1019 ","pages":"Article 114834"},"PeriodicalIF":0.9,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142163043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-05DOI: 10.1016/j.tcs.2024.114845
Ziming Jiang , Yongbin Zhou , Yuejun Liu
Partial key exposure attacks pose a significant threat to RSA-type cryptosystems. These attacks factorize the RSA modulus by utilizing partial knowledge of the decryption exponent, which is typically revealed by side-channel attacks, cold boot attacks, etc. Such partial information is often located in non-consecutive blocks. However, the majority of the proposed attacks on Prime Power RSA have only considered a single unexposed block. Meanwhile, related attacks are incapable of being expanded to multiple unexposed blocks or achieving optimal results.
In this paper, we propose partial key exposure attacks on Prime Power RSA modulus with n unknown blocks, where . We reduce this extended attack to solving multivariate linear modular equations and apply lattice-based approaches, including Herrmann-May's method (ASIACRYPT'08), Takayasu-Kunihiro's method (ACISP'13), and Lu-Zhang-Peng-Lin's method (ASIACRYPT'15), to solve them. Furthermore, we improve Lu et al.'s method by adding helpful polynomials and removing unhelpful polynomials to construct a better lattice basis. We also extend Lu et al.'s method by introducing a new parameter to make the lattice basis construction more flexible. Our improved and extended methods can be used for attacks when and , respectively. These new attacks require less partial information than previous methods. For example, in the case where , we reduce the amount of partial information needed from 80.7% to 77.8% when , and from 64.0% to 44.9% when .
部分密钥暴露攻击对 RSA 类密码系统构成重大威胁。这些攻击利用解密指数的部分知识对 RSA 模进行因式分解,而解密指数通常是通过侧信道攻击、冷启动攻击等方式泄露的。这些部分信息通常位于非连续块中。然而,针对 Prime Power RSA 提出的大多数攻击都只考虑了单个未暴露的区块。本文提出了对具有 n 个未知块(其中 n≥2 )的 Prime Power RSA 模 N=prql 的部分密钥暴露攻击。我们将这种扩展攻击简化为解多元线性模块方程,并应用基于网格的方法,包括 Herrmann-May 方法(ASIACRYPT'08)、Takayasu-Kunihiro 方法(ACISP'13)和 Lu-Zhang-Peng-Lin 方法(ASIACRYPT'15)来解决它们。此外,我们还改进了 Lu 等人的方法,增加了有用的多项式,删除了无用的多项式,从而构建了更好的网格基础。我们还对 Lu 等人的方法进行了扩展,引入了一个新参数,使网格基础的构建更加灵活。我们改进和扩展的方法可分别用于 l=1 和 l≥1 时的攻击。与以前的方法相比,这些新的攻击方法所需的局部信息更少。例如,在 n=2 的情况下,当 r=2,l=1 时,我们将所需的局部信息量从 80.7% 减少到 77.8%;当 r=3,l=2 时,我们将所需的局部信息量从 64.0% 减少到 44.9%。
{"title":"Partial key exposure attacks on Prime Power RSA with non-consecutive blocks","authors":"Ziming Jiang , Yongbin Zhou , Yuejun Liu","doi":"10.1016/j.tcs.2024.114845","DOIUrl":"10.1016/j.tcs.2024.114845","url":null,"abstract":"<div><p>Partial key exposure attacks pose a significant threat to RSA-type cryptosystems. These attacks factorize the RSA modulus by utilizing partial knowledge of the decryption exponent, which is typically revealed by side-channel attacks, cold boot attacks, etc. Such partial information is often located in non-consecutive blocks. However, the majority of the proposed attacks on Prime Power RSA have only considered a single unexposed block. Meanwhile, related attacks are incapable of being expanded to multiple unexposed blocks or achieving optimal results.</p><p>In this paper, we propose partial key exposure attacks on Prime Power RSA modulus <span><math><mi>N</mi><mo>=</mo><msup><mrow><mi>p</mi></mrow><mrow><mi>r</mi></mrow></msup><msup><mrow><mi>q</mi></mrow><mrow><mi>l</mi></mrow></msup></math></span> with <em>n</em> unknown blocks, where <span><math><mi>n</mi><mo>≥</mo><mn>2</mn></math></span>. We reduce this extended attack to solving multivariate linear modular equations and apply lattice-based approaches, including Herrmann-May's method (ASIACRYPT'08), Takayasu-Kunihiro's method (ACISP'13), and Lu-Zhang-Peng-Lin's method (ASIACRYPT'15), to solve them. Furthermore, we improve Lu et al.'s method by adding helpful polynomials and removing unhelpful polynomials to construct a better lattice basis. We also extend Lu et al.'s method by introducing a new parameter to make the lattice basis construction more flexible. Our improved and extended methods can be used for attacks when <span><math><mi>l</mi><mo>=</mo><mn>1</mn></math></span> and <span><math><mi>l</mi><mo>≥</mo><mn>1</mn></math></span>, respectively. These new attacks require less partial information than previous methods. For example, in the case where <span><math><mi>n</mi><mo>=</mo><mn>2</mn></math></span>, we reduce the amount of partial information needed from 80.7% to 77.8% when <span><math><mi>r</mi><mo>=</mo><mn>2</mn><mo>,</mo><mi>l</mi><mo>=</mo><mn>1</mn></math></span>, and from 64.0% to 44.9% when <span><math><mi>r</mi><mo>=</mo><mn>3</mn><mo>,</mo><mi>l</mi><mo>=</mo><mn>2</mn></math></span>.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1019 ","pages":"Article 114845"},"PeriodicalIF":0.9,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142163044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-05DOI: 10.1016/j.tcs.2024.114835
Peng Yang, Yuan Huang, Zhiguo Fu
We prove a complexity trichotomy theorem for a class of partition functions over k-regular graphs, where the signature is complex valued and not necessarily symmetric. In details, we establish explicit criteria, according to which the partition functions of all such systems are classified into three classes: For every parameter setting in for the spin system, the partition function is either (1) computable in polynomial time for every graph, or (2) #P-hard for general graphs but computable in polynomial time for planar graphs, or (3) #P-hard even for planar graphs.
我们证明了 k 规则图上一类分区函数的复杂性三分法定理,其中签名是复值且不一定对称。具体来说,我们建立了明确的标准,根据这些标准,所有此类系统的分割函数都可分为三类:对于自旋系统 C 中的每个参数设置,分区函数要么是 (1) 对每个图都可在多项式时间内计算;要么是 (2) 对一般图 #P 难,但对平面图可在多项式时间内计算;要么是 (3) 即使对平面图也 #P 难。
{"title":"A complexity trichotomy for k-regular asymmetric spin systems with complex edge functions","authors":"Peng Yang, Yuan Huang, Zhiguo Fu","doi":"10.1016/j.tcs.2024.114835","DOIUrl":"10.1016/j.tcs.2024.114835","url":null,"abstract":"<div><p>We prove a complexity trichotomy theorem for a class of partition functions over <em>k</em>-regular graphs, where the signature is complex valued and not necessarily <em>symmetric</em>. In details, we establish explicit criteria, according to which the partition functions of all such systems are classified into three classes: For every parameter setting in <span><math><mi>C</mi></math></span> for the spin system, the partition function is either (1) computable in polynomial time for every graph, or (2) #P-hard for general graphs but computable in polynomial time for planar graphs, or (3) #P-hard even for planar graphs.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1020 ","pages":"Article 114835"},"PeriodicalIF":0.9,"publicationDate":"2024-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142172866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-04DOI: 10.1016/j.tcs.2024.114818
Adrian Dumitrescu , Csaba D. Tóth
We introduce the Observation Route Problem (ORP) defined as follows: Given a set of n pairwise disjoint obstacles (regions) in the plane, find a shortest tour (route) such that an observer walking along this tour can see (observe) each obstacle from some point of the tour. The observer does not need to see the entire boundary of an obstacle. The tour is not allowed to intersect the interior of any region (i.e., the regions are obstacles and therefore out of bounds). The problem exhibits similarity to both the Traveling Salesman Problem with Neighborhoods (TSPN) and the External Watchman Route Problem (EWRP). We distinguish two variants: the range of visibility is either limited to a bounding rectangle, or unlimited. We obtain the following results:
(I) Given a family of n disjoint convex bodies in the plane, computing a shortest observation route does not admit a -approximation unless for an absolute constant . (This holds for both limited and unlimited vision.)
(II) Given a family of disjoint convex bodies in the plane, computing a shortest external watchman route is -hard. (This holds for both limited and unlimited vision; and even for families of axis-aligned squares.)
(III) Given a family of n disjoint fat convex polygons in the plane, an observation tour whose length is at most times the optimal can be computed in polynomial time. (This holds for limited vision.)
(IV) For every , there exists a convex polygon with n sides and all angles obtuse such that its perimeter is not a shortest external watchman route. This refutes a conjecture by Absar and Whitesides (2006).
我们引入了定义如下的观察路线问题(ORP):给定平面上一组 n 对互不相交的障碍物(区域),找出一条最短的路径(路线),使得沿着这条路径行走的观察者可以从路径上的某一点看到(观察到)每个障碍物。观察者不需要看到障碍物的整个边界。巡回路线不允许与任何区域的内部相交(即这些区域都是障碍物,因此不在边界内)。该问题与邻域旅行推销员问题(TSPN)和外部守望者路线问题(ERP)相似。我们将其分为两种变体:可见度范围限制在边界矩形内,或者不受限制。我们得到以下结果:(I) 给定平面上 n 个不相交凸体的族,除非 P=NP 为绝对常量 c>0,否则计算最短观察路线不接受 (clogn)-approximation 。(这对有限视力和无限视力都成立。)(II) 给定平面中的不相交凸体族,计算一条最短的外部观察路线是 NP 难的。 (这对有限视力和无限视力都成立;甚至对轴对齐的正方形族也成立。)(III) 给定平面中的 n 个不相交肥凸多边形族,可以在多项式时间内计算出一条长度最多为最优的 O(logn) 倍的观察路线。(IV)对于每 n≥5,存在一个有 n 边且所有角均为钝角的凸多边形,使得它的周长不是一条最短的外部观察路线。这反驳了 Absar 和 Whitesides(2006 年)的猜想。
{"title":"Observation routes and external watchman routes","authors":"Adrian Dumitrescu , Csaba D. Tóth","doi":"10.1016/j.tcs.2024.114818","DOIUrl":"10.1016/j.tcs.2024.114818","url":null,"abstract":"<div><p>We introduce the Observation Route Problem (<span>ORP</span>) defined as follows: Given a set of <em>n</em> pairwise disjoint obstacles (regions) in the plane, find a shortest tour (route) such that an observer walking along this tour can see (observe) each obstacle from some point of the tour. The observer does <em>not</em> need to see the entire boundary of an obstacle. The tour is <em>not</em> allowed to intersect the interior of any region (i.e., the regions are obstacles and therefore out of bounds). The problem exhibits similarity to both the Traveling Salesman Problem with Neighborhoods (<span>TSPN</span>) and the External Watchman Route Problem (<span>EWRP</span>). We distinguish two variants: the range of visibility is either limited to a bounding rectangle, or unlimited. We obtain the following results:</p><p>(I) Given a family of <em>n</em> disjoint convex bodies in the plane, computing a shortest observation route does not admit a <span><math><mo>(</mo><mi>c</mi><mi>log</mi><mo></mo><mi>n</mi><mo>)</mo></math></span>-approximation unless <span><math><mi>P</mi><mo>=</mo><mrow><mi>NP</mi></mrow></math></span> for an absolute constant <span><math><mi>c</mi><mo>></mo><mn>0</mn></math></span>. (This holds for both limited and unlimited vision.)</p><p>(II) Given a family of disjoint convex bodies in the plane, computing a shortest external watchman route is <span><math><mi>NP</mi></math></span>-hard. (This holds for both limited and unlimited vision; and even for families of axis-aligned squares.)</p><p>(III) Given a family of <em>n</em> disjoint fat convex polygons in the plane, an observation tour whose length is at most <span><math><mi>O</mi><mo>(</mo><mi>log</mi><mo></mo><mi>n</mi><mo>)</mo></math></span> times the optimal can be computed in polynomial time. (This holds for limited vision.)</p><p>(IV) For every <span><math><mi>n</mi><mo>≥</mo><mn>5</mn></math></span>, there exists a convex polygon with <em>n</em> sides and all angles obtuse such that its perimeter is <em>not</em> a shortest external watchman route. This refutes a conjecture by Absar and Whitesides (2006).</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1019 ","pages":"Article 114818"},"PeriodicalIF":0.9,"publicationDate":"2024-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0304397524004353/pdfft?md5=8156a2411321e5e2d23ab419a17b5976&pid=1-s2.0-S0304397524004353-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142163027","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-03DOI: 10.1016/j.tcs.2024.114817
Marcel Fernández , John Livieratos , Sebastià Martín
In this paper, we present lower bounds and algorithmic constructions of union-intersection-bounded families of sets. The lower bound is established using the Lovász Local Lemma. This bound matches the best known bound for the size of union-intersection-bounded families of sets. We then use the variable framework for the Lovász Local Lemma, to discuss an algorithm that outputs explicit constructions that attain the lower bound. The algorithm has polynomial complexity in the number of points in the family.
在本文中,我们提出了联合-交集有界集合族的下界和算法构造。下界是利用洛瓦兹局部定理(Lovász Local Lemma)建立的。这个下界与已知的联合交集有界集合族大小的最佳下界相吻合。然后,我们使用 Lovász 局部定理的变量框架,讨论一种算法,它能输出达到下界的明确构造。该算法的复杂度为族中点数的多项式。
{"title":"An algorithmic construction of union-intersection-bounded families","authors":"Marcel Fernández , John Livieratos , Sebastià Martín","doi":"10.1016/j.tcs.2024.114817","DOIUrl":"10.1016/j.tcs.2024.114817","url":null,"abstract":"<div><p>In this paper, we present lower bounds and algorithmic constructions of union-intersection-bounded families of sets. The lower bound is established using the Lovász Local Lemma. This bound matches the best known bound for the size of union-intersection-bounded families of sets. We then use the variable framework for the Lovász Local Lemma, to discuss an algorithm that outputs explicit constructions that attain the lower bound. The algorithm has polynomial complexity in the number of points in the family.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1018 ","pages":"Article 114817"},"PeriodicalIF":0.9,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142136033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-03DOI: 10.1016/j.tcs.2024.114819
Giacomo Ortali , Ioannis G. Tollis
A weak dominance drawing Γ of a DAG is a d-dimensional drawing such that for every dimension D of Γ if there is a directed path from a vertex u to a vertex v in G, where is the coordinate of vertex in dimension D of Γ. If for every dimension D of Γ, but there is no path from u to v, we have a falsely implied path (fip). Minimizing the number of fips is an important theoretical and practical problem. Computing 2-dimensional weak dominance drawings with minimum number of fips is NP-hard. We show that this problem is FPT parameterized by the dimension d and the modular width mw. A key ingredient of our proof is the Compaction Lemma, where we show an interesting property of any weak dominance drawing of G with the minimum number of fips. This FPT result in weak dominance, which is interesting by itself because the fip-minimization problem is NP-hard, is used to prove our main contributions. Computing the dominance dimension of G, that is, the minimum number of dimensions d for which G has a d-dimensional dominance drawing (a weak dominance drawing with 0 fips), is a well-known NP-hard problem. We show that the dominance dimension of G is bounded by (or mw, if ) and that computing the dominance dimension of G is an FPT problem with parameter mw. As far as we know, this the first FPT-algorithm to compute the dominance dimension of a DAG.
DAG G=(V,E) 的弱支配图 Γ 是一个 d 维图,如果在 G 中存在从顶点 u 到顶点 v 的有向路径,那么在 Γ 的每一个 D 维中,D(u)<D(v)都是有向路径,其中 D(w) 是顶点 w∈V 在 Γ 的 D 维中的坐标。如果在 Γ 的每个维度 D 中,D(u)<D(v),但并不存在从 u 到 v 的路径,那么我们就有一条虚假隐含路径(fip)。尽量减少虚假路径的数量是一个重要的理论和实际问题。计算二维弱支配图的 fips 数量最小是 NP-hard。我们证明,这个问题是由维度 d 和模宽 mw 参数化的 FPT 问题。我们证明的一个关键要素是 "压缩"(Compaction Lemma),在这里我们展示了一个有趣的特性,即任何弱支配图都能以最少的点数绘制 G。弱支配性的这一 FPT 结果本身就很有趣,因为 fip 最小化问题是 NP-hard,它被用来证明我们的主要贡献。计算 G 的支配维度,即 G 具有 d 维支配图(fips 为 0 的弱支配图)的最小维数 d,是一个众所周知的 NP 难问题。我们证明了 G 的优势维数以 mw2(或 mw,如果 mw<4 则为 mw)为界,并且计算 G 的优势维数是一个参数为 mw 的 FPT 问题。据我们所知,这是第一个计算 DAG 优势维度的 FPT 算法。
{"title":"A fixed-parameter algorithm for dominance drawings of DAGs","authors":"Giacomo Ortali , Ioannis G. Tollis","doi":"10.1016/j.tcs.2024.114819","DOIUrl":"10.1016/j.tcs.2024.114819","url":null,"abstract":"<div><p>A weak dominance drawing Γ of a DAG <span><math><mi>G</mi><mo>=</mo><mo>(</mo><mi>V</mi><mo>,</mo><mi>E</mi><mo>)</mo></math></span> is a <em>d</em>-dimensional drawing such that <span><math><mi>D</mi><mo>(</mo><mi>u</mi><mo>)</mo><mo><</mo><mi>D</mi><mo>(</mo><mi>v</mi><mo>)</mo></math></span> for every dimension <em>D</em> of Γ if there is a directed path from a vertex <em>u</em> to a vertex <em>v</em> in <em>G</em>, where <span><math><mi>D</mi><mo>(</mo><mi>w</mi><mo>)</mo></math></span> is the coordinate of vertex <span><math><mi>w</mi><mo>∈</mo><mi>V</mi></math></span> in dimension <em>D</em> of Γ. If <span><math><mi>D</mi><mo>(</mo><mi>u</mi><mo>)</mo><mo><</mo><mi>D</mi><mo>(</mo><mi>v</mi><mo>)</mo></math></span> for every dimension <em>D</em> of Γ, but there is no path from <em>u</em> to <em>v</em>, we have a <em>falsely implied path (fip)</em>. Minimizing the number of fips is an important theoretical and practical problem. Computing 2-dimensional weak dominance drawings with minimum number of fips is NP-hard. We show that this problem is FPT parameterized by the dimension <em>d</em> and the modular width <em>mw</em>. A key ingredient of our proof is the <span>Compaction Lemma</span>, where we show an interesting property of any weak dominance drawing of <em>G</em> with the minimum number of fips. This FPT result in weak dominance, which is interesting by itself because the fip-minimization problem is NP-hard, is used to prove our main contributions. Computing the dominance dimension of <em>G</em>, that is, the minimum number of dimensions <em>d</em> for which <em>G</em> has a <em>d</em>-dimensional dominance drawing (a weak dominance drawing with 0 fips), is a well-known NP-hard problem. We show that the dominance dimension of <em>G</em> is bounded by <span><math><mfrac><mrow><mi>m</mi><mi>w</mi></mrow><mrow><mn>2</mn></mrow></mfrac></math></span> (or <em>mw</em>, if <span><math><mi>m</mi><mi>w</mi><mo><</mo><mn>4</mn></math></span>) and that computing the dominance dimension of <em>G</em> is an FPT problem with parameter <em>mw</em>. As far as we know, this the first FPT-algorithm to compute the dominance dimension of a DAG.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1020 ","pages":"Article 114819"},"PeriodicalIF":0.9,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142168385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A dynamic flow network consists of a directed graph, where nodes called sources represent locations of evacuees, and nodes called sinks represent locations of evacuation facilities. Each source and each sink are given supply representing the number of evacuees and demand representing the maximum number of acceptable evacuees, respectively. Each edge is given capacity and transit time. Here, the capacity of an edge bounds the rate at which evacuees can enter the edge per unit time, and the transit time represents the time which evacuees take to travel across the edge. The evacuation completion time is the minimum time at which each evacuee can arrive at one of the evacuation facilities. Given a dynamic flow network without sinks, once sinks are located on some nodes or edges, the evacuation completion time for this sink location is determined. We then consider the problem of locating sinks to minimize the evacuation completion time, called the sink location problem. The problems have been given polynomial-time algorithms only for limited networks such as paths [1], [2], [3], cycles [1], and trees [4], [5], [6], but no polynomial-time algorithms are known for more complex network classes. In this paper, we prove that the 1-sink location problem can be solved in polynomial-time when an input network is a grid with uniform edge capacity and transit time.
{"title":"Sink location problems in dynamic flow grid networks","authors":"Yuya Higashikawa, Ayano Nishii, Junichi Teruyama, Yuki Tokuni","doi":"10.1016/j.tcs.2024.114812","DOIUrl":"10.1016/j.tcs.2024.114812","url":null,"abstract":"<div><p>A <em>dynamic flow network</em> consists of a directed graph, where nodes called <em>sources</em> represent locations of evacuees, and nodes called <em>sinks</em> represent locations of evacuation facilities. Each source and each sink are given <em>supply</em> representing the number of evacuees and <em>demand</em> representing the maximum number of acceptable evacuees, respectively. Each edge is given <em>capacity</em> and <em>transit time</em>. Here, the capacity of an edge bounds the rate at which evacuees can enter the edge per unit time, and the transit time represents the time which evacuees take to travel across the edge. The <em>evacuation completion time</em> is the minimum time at which each evacuee can arrive at one of the evacuation facilities. Given a dynamic flow network without sinks, once sinks are located on some nodes or edges, the evacuation completion time for this sink location is determined. We then consider the problem of locating sinks to minimize the evacuation completion time, called the <em>sink location problem</em>. The problems have been given polynomial-time algorithms only for limited networks such as paths <span><span>[1]</span></span>, <span><span>[2]</span></span>, <span><span>[3]</span></span>, cycles <span><span>[1]</span></span>, and trees <span><span>[4]</span></span>, <span><span>[5]</span></span>, <span><span>[6]</span></span>, but no polynomial-time algorithms are known for more complex network classes. In this paper, we prove that the 1-sink location problem can be solved in polynomial-time when an input network is a grid with uniform edge capacity and transit time.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1019 ","pages":"Article 114812"},"PeriodicalIF":0.9,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142163026","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-30DOI: 10.1016/j.tcs.2024.114811
Guillaume Fertin , Oscar Fontaine , Géraldine Jean , Stéphane Vialette
We study the Maximum Zero-Sum Partition problem (or MZSP), defined as follows: given a multiset of integers (where denotes the set of non-zero integers) such that , find a maximum cardinality partition of such that, for every , . Solving MZSP is useful in genomics for computing evolutionary distances between pairs of species. Our contributions are a series of algorithmic results concerning MZSP, in terms of complexity, (in)approximability, with a particular focus on the fixed-parameter tractability of MZSP with respect to either (i) the size k of the solution, (ii) the number of negative (resp. positive) values in and (iii) the largest integer in .
我们研究的最大零和分割问题(或 MZSP)定义如下:给定一个由整数 ai∈Z⁎ 组成的多集合 S={a1,a2,...,an}(其中 Z⁎ 表示非零整数集合),使得∑i=1nai=0,找出 S 的最大卡方分割 {S1,S2,...,Sk},使得对于每 1≤i≤k,∑aj∈Siaj=0。求解 MZSP 对基因组学中计算物种对之间的进化距离非常有用。我们的贡献是一系列有关 MZSP 的算法结果,包括复杂性、(不)近似性,特别是 MZSP 在以下方面的固定参数可操作性:(i) 解的大小 k;(ii) S 中负值(或正值)的数量;(iii) S 中最大的整数。
{"title":"The Maximum Zero-Sum Partition problem","authors":"Guillaume Fertin , Oscar Fontaine , Géraldine Jean , Stéphane Vialette","doi":"10.1016/j.tcs.2024.114811","DOIUrl":"10.1016/j.tcs.2024.114811","url":null,"abstract":"<div><p>We study the <span>Maximum Zero-Sum Partition</span> problem (or <span>MZSP</span>), defined as follows: given a multiset <span><math><mi>S</mi><mo>=</mo><mo>{</mo><msub><mrow><mi>a</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><msub><mrow><mi>a</mi></mrow><mrow><mn>2</mn></mrow></msub><mo>,</mo><mo>…</mo><mo>,</mo><msub><mrow><mi>a</mi></mrow><mrow><mi>n</mi></mrow></msub><mo>}</mo></math></span> of integers <span><math><msub><mrow><mi>a</mi></mrow><mrow><mi>i</mi></mrow></msub><mo>∈</mo><msup><mrow><mi>Z</mi></mrow><mrow><mo>⁎</mo></mrow></msup></math></span> (where <span><math><msup><mrow><mi>Z</mi></mrow><mrow><mo>⁎</mo></mrow></msup></math></span> denotes the set of non-zero integers) such that <span><math><msubsup><mrow><mo>∑</mo></mrow><mrow><mi>i</mi><mo>=</mo><mn>1</mn></mrow><mrow><mi>n</mi></mrow></msubsup><msub><mrow><mi>a</mi></mrow><mrow><mi>i</mi></mrow></msub><mo>=</mo><mn>0</mn></math></span>, find a maximum cardinality partition <span><math><mo>{</mo><msub><mrow><mi>S</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><msub><mrow><mi>S</mi></mrow><mrow><mn>2</mn></mrow></msub><mo>,</mo><mo>…</mo><mo>,</mo><msub><mrow><mi>S</mi></mrow><mrow><mi>k</mi></mrow></msub><mo>}</mo></math></span> of <span><math><mi>S</mi></math></span> such that, for every <span><math><mn>1</mn><mo>≤</mo><mi>i</mi><mo>≤</mo><mi>k</mi></math></span>, <span><math><msub><mrow><mo>∑</mo></mrow><mrow><msub><mrow><mi>a</mi></mrow><mrow><mi>j</mi></mrow></msub><mo>∈</mo><msub><mrow><mi>S</mi></mrow><mrow><mi>i</mi></mrow></msub></mrow></msub><msub><mrow><mi>a</mi></mrow><mrow><mi>j</mi></mrow></msub><mo>=</mo><mn>0</mn></math></span>. Solving <span>MZSP</span> is useful in genomics for computing evolutionary distances between pairs of species. Our contributions are a series of algorithmic results concerning <span>MZSP</span>, in terms of complexity, (in)approximability, with a particular focus on the fixed-parameter tractability of <span>MZSP</span> with respect to either (i) the size <em>k</em> of the solution, (ii) the number of negative (resp. positive) values in <span><math><mi>S</mi></math></span> and (iii) the largest integer in <span><math><mi>S</mi></math></span>.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1019 ","pages":"Article 114811"},"PeriodicalIF":0.9,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0304397524004286/pdfft?md5=834de52b293d98cccaa7d3d01b33ccb6&pid=1-s2.0-S0304397524004286-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142158429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-30DOI: 10.1016/j.tcs.2024.114816
Yulin Han , Yalan Li , Chengfu Ye
In 2023, Zhang et al. proposed a novel diagnostic parameter, namely the cyclic diagnosability and explored the cyclic diagnosability of . In this paper, the cyclic diagnosability of is determined under the PMC model and the model.
{"title":"The cyclic diagnosability of balanced hypercubes under the PMC and MM⁎ model","authors":"Yulin Han , Yalan Li , Chengfu Ye","doi":"10.1016/j.tcs.2024.114816","DOIUrl":"10.1016/j.tcs.2024.114816","url":null,"abstract":"<div><p>In 2023, Zhang et al. proposed a novel diagnostic parameter, namely the cyclic diagnosability and explored the cyclic diagnosability of <span><math><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>. In this paper, the cyclic diagnosability of <span><math><mi>B</mi><msub><mrow><mi>H</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span> is determined under the <em>PMC</em> model and the <span><math><mi>M</mi><msup><mrow><mi>M</mi></mrow><mrow><mo>⁎</mo></mrow></msup></math></span> model.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1018 ","pages":"Article 114816"},"PeriodicalIF":0.9,"publicationDate":"2024-08-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142136056","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}