首页 > 最新文献

Theoretical Computer Science最新文献

英文 中文
Algebraic properties and transformations of monographs 专著的代数特性和变换
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-29 DOI: 10.1016/j.tcs.2024.114939
Thierry Boy de la Tour
Monographs are graph-like structures with directed edges of unlimited length that are freely adjacent to each other. The standard nodes are represented as edges of length zero. They can be drawn in a way consistent with standard graphs and many others, like E-graphs or ∞-graphs. The category of monographs share many properties with the categories of graph structures (algebras of monadic many-sorted signatures, equivalent to presheaf toposes), except that there is no terminal monograph. It is universal in the sense that its slice categories (or categories of typed monographs) are equivalent to the categories of graph structures. Type monographs thus emerge as a natural way of specifying graph structures. A detailed analysis of single and double pushout transformations of monographs is provided, and a notion of attributed typed monographs generalizing typed attributed E-graphs is analyzed w.r.t. attribute-preserving transformations.
专著是一种类似图的结构,其有向边的长度不受限制,可以自由地相互毗邻。标准节点用长度为零的边表示。它们的绘制方式与标准图和许多其他图(如 E 图或∞图)一致。单论范畴与图结构范畴(单论多排序签名代数,等同于预设拓扑)有许多相同的性质,只是没有终端单论。从它的切片范畴(或类型专著范畴)等同于图结构范畴的意义上讲,它是通用的。因此,类型专著是指定图结构的一种自然方式。本文对专著的单推出和双推出变换进行了详细分析,并结合属性保留变换分析了归属类型专著的概念,该概念概括了类型化归属电子图。
{"title":"Algebraic properties and transformations of monographs","authors":"Thierry Boy de la Tour","doi":"10.1016/j.tcs.2024.114939","DOIUrl":"10.1016/j.tcs.2024.114939","url":null,"abstract":"<div><div>Monographs are graph-like structures with directed edges of unlimited length that are freely adjacent to each other. The standard nodes are represented as edges of length zero. They can be drawn in a way consistent with standard graphs and many others, like E-graphs or ∞-graphs. The category of monographs share many properties with the categories of graph structures (algebras of monadic many-sorted signatures, equivalent to presheaf toposes), except that there is no terminal monograph. It is universal in the sense that its slice categories (or categories of typed monographs) are equivalent to the categories of graph structures. Type monographs thus emerge as a natural way of specifying graph structures. A detailed analysis of single and double pushout transformations of monographs is provided, and a notion of attributed typed monographs generalizing typed attributed E-graphs is analyzed w.r.t. attribute-preserving transformations.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1024 ","pages":"Article 114939"},"PeriodicalIF":0.9,"publicationDate":"2024-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142553817","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Priority algorithms with advice for disjoint path allocation problems 针对不相邻路径分配问题的带建议的优先级算法
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-28 DOI: 10.1016/j.tcs.2024.114942
Hans-Joachim Böckenhauer , Fabian Frei , Silvan Horvath
We analyze the Disjoint Path Allocation problem (DPA) in the priority framework. Motivated by the problem of traffic regulation in communication networks, DPA consists of allocating edge-disjoint paths in a graph. Like an online algorithm, a priority algorithm receives its input sequentially and must output irrevocable decisions for individual input items before having seen the entire input. However, in contrast to the online setting, a priority algorithm may choose an order on the set of all possible input items and the actual input is then presented according to this order. A priority algorithm is thus a natural model for the intuitively well-understood concept of a greedy algorithm.
Mainly motivated by their application for proving lower bounds, we also consider priority algorithms with advice, thus measuring the necessary amount of information about the yet unknown parts of the input.
Besides considering the classical variant of the DPA problem on paths and the related problem of Length-Weighted DPA, we mainly focus on DPA on trees. We show asymptotically matching upper and lower bounds on the advice necessary for optimality in LWDPA and generalize the known optimality result for DPA on paths to trees with maximal degree at most 3. On trees with higher maximal degree, we prove matching upper and lower bounds on the approximation ratio in the advice-free priority setting as well as upper and lower bounds on the advice necessary to achieve optimality.
我们在优先权框架下分析了 "不相邻路径分配问题"(DPA)。受通信网络流量调节问题的启发,DPA 包括在图中分配边缘相邻的路径。与在线算法一样,优先级算法也是按顺序接收输入,在看到整个输入之前,必须对单个输入项输出不可撤销的决定。不过,与联机算法不同的是,优先级算法可以在所有可能的输入项集合中选择一个顺序,然后根据这个顺序显示实际输入。因此,优先级算法是贪婪算法这一直观理解的概念的自然模型。主要受其应用于证明下限的启发,我们还考虑了带建议的优先级算法,从而衡量了输入中未知部分的必要信息量。除了考虑路径上 DPA 问题的经典变体和相关的长度加权 DPA 问题外,我们主要关注树上的 DPA。我们展示了 LWDPA 优化所需的建议的渐进匹配上界和下界,并将已知的路径上 DPA 的优化结果推广到最大度最多为 3 的树上。在最大度更高的树上,我们证明了无建议优先级设置中近似率的匹配上界和下界,以及实现最优所需的建议的上界和下界。
{"title":"Priority algorithms with advice for disjoint path allocation problems","authors":"Hans-Joachim Böckenhauer ,&nbsp;Fabian Frei ,&nbsp;Silvan Horvath","doi":"10.1016/j.tcs.2024.114942","DOIUrl":"10.1016/j.tcs.2024.114942","url":null,"abstract":"<div><div>We analyze the Disjoint Path Allocation problem (DPA) in the priority framework. Motivated by the problem of traffic regulation in communication networks, DPA consists of allocating edge-disjoint paths in a graph. Like an online algorithm, a priority algorithm receives its input sequentially and must output irrevocable decisions for individual input items before having seen the entire input. However, in contrast to the online setting, a priority algorithm may choose an order on the set of all possible input items and the actual input is then presented according to this order. A priority algorithm is thus a natural model for the intuitively well-understood concept of a greedy algorithm.</div><div>Mainly motivated by their application for proving lower bounds, we also consider priority algorithms with advice, thus measuring the necessary amount of information about the yet unknown parts of the input.</div><div>Besides considering the classical variant of the DPA problem on paths and the related problem of Length-Weighted DPA, we mainly focus on DPA on trees. We show asymptotically matching upper and lower bounds on the advice necessary for optimality in LWDPA and generalize the known optimality result for DPA on paths to trees with maximal degree at most 3. On trees with higher maximal degree, we prove matching upper and lower bounds on the approximation ratio in the advice-free priority setting as well as upper and lower bounds on the advice necessary to achieve optimality.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1021 ","pages":"Article 114942"},"PeriodicalIF":0.9,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142554209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Euclidean division by d in base b 以 b 为底的欧式除法 d
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-28 DOI: 10.1016/j.tcs.2024.114937
Jean-Éric Pin
Let b2 be an integer. For each positive integer d, let Ed,b be the Euclidean division by d in base b, that is, the function which associates to a word u in {0,,b1}, representing an integer n in base b, the unique word of the same length as u representing the quotient of the division of n by d. We describe the pure sequential transducer realizing this function and analyze the algebraic structure of its syntactic monoid. We compute its size, describe its Green's relations and its minimum ideal. As a consequence, we show that it is a group if and only if d and b are coprime numbers, it is a p-group if and only if d is a power of p and b is congruent to 1 modulo p and it is an aperiodic monoid if and only if d divides some power of b. The uniform continuity of Ed,b for the pro-group metric was studied by Reutenauer and Schützenberger in 1995. We launch a similar study for the uniform continuity of Ed,b with respect to the pro-p metric, where p is a prime number.
设 b⩾2 为整数。对于每个正整数 d,设 Ed,b 是以 b 为底的欧几里得除法,即把代表以 b 为底的整数 n 的 {0,...,b-1}⁎ 中的单词 u 与代表 n 除以 d 的商的与 u 长度相同的唯一单词关联起来的函数。我们计算了它的大小,描述了它的格林关系和最小理想数。因此,我们证明了当且仅当 d 和 b 是同素数时,它是一个群;当且仅当 d 是 p 的幂和 b 同调于 1 modulo p 时,它是一个 p 群;当且仅当 d 除以 b 的某个幂时,它是一个非周期性单元。我们对 Ed,b 关于亲群公设(其中 p 是素数)的均匀连续性进行了类似的研究。
{"title":"Euclidean division by d in base b","authors":"Jean-Éric Pin","doi":"10.1016/j.tcs.2024.114937","DOIUrl":"10.1016/j.tcs.2024.114937","url":null,"abstract":"<div><div>Let <span><math><mi>b</mi><mo>⩾</mo><mn>2</mn></math></span> be an integer. For each positive integer <em>d</em>, let <span><math><msub><mrow><mi>E</mi></mrow><mrow><mi>d</mi><mo>,</mo><mi>b</mi></mrow></msub></math></span> be the Euclidean division by <em>d</em> in base <em>b</em>, that is, the function which associates to a word <em>u</em> in <span><math><msup><mrow><mo>{</mo><mn>0</mn><mo>,</mo><mo>…</mo><mo>,</mo><mi>b</mi><mo>−</mo><mn>1</mn><mo>}</mo></mrow><mrow><mo>⁎</mo></mrow></msup></math></span>, representing an integer <em>n</em> in base <em>b</em>, the unique word of the same length as <em>u</em> representing the quotient of the division of <em>n</em> by <em>d</em>. We describe the pure sequential transducer realizing this function and analyze the algebraic structure of its syntactic monoid. We compute its size, describe its Green's relations and its minimum ideal. As a consequence, we show that it is a group if and only if <em>d</em> and <em>b</em> are coprime numbers, it is a <em>p</em>-group if and only if <em>d</em> is a power of <em>p</em> and <em>b</em> is congruent to 1 modulo <em>p</em> and it is an aperiodic monoid if and only if <em>d</em> divides some power of <em>b</em>. The uniform continuity of <span><math><msub><mrow><mi>E</mi></mrow><mrow><mi>d</mi><mo>,</mo><mi>b</mi></mrow></msub></math></span> for the pro-group metric was studied by Reutenauer and Schützenberger in 1995. We launch a similar study for the uniform continuity of <span><math><msub><mrow><mi>E</mi></mrow><mrow><mi>d</mi><mo>,</mo><mi>b</mi></mrow></msub></math></span> with respect to the pro-<em>p</em> metric, where <em>p</em> is a prime number.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1024 ","pages":"Article 114937"},"PeriodicalIF":0.9,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142553818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Restricted holant dichotomy on domain sizes 3 and 4 域大小为 3 和 4 的受限整体二分法
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-28 DOI: 10.1016/j.tcs.2024.114931
Yin Liu, Austen Z. Fan, Jin-Yi Cai
Holant(f) denotes a class of counting problems specified by a constraint function f. We prove complexity dichotomy theorems for Holant(f) in two settings: (1) f is any symmetric arity-3 real-valued function on input of domain size 3. (2) f is any symmetric arity-3 {0,1}-valued function on input of domain size 4.
Holant⁎(f) 表示一类由约束函数 f 指定的计数问题。我们将在两种情况下证明 Holant⁎(f) 的复杂性二分定理:(1) f 是域大小为 3 的输入上的任意对称算术值-3 实值函数;(2) f 是域大小为 4 的输入上的任意对称算术值-3 {0,1} 值函数。
{"title":"Restricted holant dichotomy on domain sizes 3 and 4","authors":"Yin Liu,&nbsp;Austen Z. Fan,&nbsp;Jin-Yi Cai","doi":"10.1016/j.tcs.2024.114931","DOIUrl":"10.1016/j.tcs.2024.114931","url":null,"abstract":"<div><div><span><math><msup><mrow><mi>Holant</mi></mrow><mrow><mo>⁎</mo></mrow></msup><mo>(</mo><mi>f</mi><mo>)</mo></math></span> denotes a class of counting problems specified by a constraint function <em>f</em>. We prove complexity dichotomy theorems for <span><math><msup><mrow><mi>Holant</mi></mrow><mrow><mo>⁎</mo></mrow></msup><mo>(</mo><mi>f</mi><mo>)</mo></math></span> in two settings: (1) <em>f</em> is any symmetric arity-3 real-valued function on input of domain size 3. (2) <em>f</em> is any symmetric arity-3 <span><math><mo>{</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>}</mo></math></span>-valued function on input of domain size 4.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1023 ","pages":"Article 114931"},"PeriodicalIF":0.9,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142553640","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comparison of machine learning algorithms for classification of Big Data sets 用于大数据集分类的机器学习算法比较
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-28 DOI: 10.1016/j.tcs.2024.114938
Barkha Singh, Sreedevi Indu, Sudipta Majumdar
This article analyzes and compares various Quantum machine learning algorithms on big data. The main contribution of this article is to provide a new machine-learning approach using Quantum computing for big data analysis with features of robust, novel, and effective Quantum computing. This work proposes a global Quantum feature extraction technique for large-scale image classification based on Schmidt decomposition for the first time. Additionally, a new version of the Quantum learning algorithm is presented, which uses the features of Hamming distance to classify images. With the help of algorithm analysis and experimental findings from the benchmark database Caltech 101, a successful method for large-scale image classification is developed and put forth in the context of big data. The proposed model yields an average accuracy of 98% with the proposed enhanced Quantum classifier, QeSVM classifier, swarm particle optimizer with Twin wave SVM, QPSO-TWSVM, and other Q-CNN models on different Big Data sets.
本文分析和比较了大数据中的各种量子机器学习算法。本文的主要贡献在于利用量子计算为大数据分析提供了一种新的机器学习方法,具有鲁棒、新颖、有效的量子计算特点。这项工作首次提出了基于施密特分解的大规模图像分类全局量子特征提取技术。此外,还提出了新版量子学习算法,该算法利用汉明距离特征对图像进行分类。借助算法分析和基准数据库 Caltech 101 的实验结果,在大数据背景下开发并提出了一种成功的大规模图像分类方法。所提出的模型与所提出的增强型量子分类器、QeSVM 分类器、群粒子优化器与双波 SVM、QPSO-TWSVM 以及其他 Q-CNN 模型在不同的大数据集上的平均准确率达到 98%。
{"title":"Comparison of machine learning algorithms for classification of Big Data sets","authors":"Barkha Singh,&nbsp;Sreedevi Indu,&nbsp;Sudipta Majumdar","doi":"10.1016/j.tcs.2024.114938","DOIUrl":"10.1016/j.tcs.2024.114938","url":null,"abstract":"<div><div>This article analyzes and compares various Quantum machine learning algorithms on big data. The main contribution of this article is to provide a new machine-learning approach using Quantum computing for big data analysis with features of robust, novel, and effective Quantum computing. This work proposes a global Quantum feature extraction technique for large-scale image classification based on Schmidt decomposition for the first time. Additionally, a new version of the Quantum learning algorithm is presented, which uses the features of Hamming distance to classify images. With the help of algorithm analysis and experimental findings from the benchmark database Caltech 101, a successful method for large-scale image classification is developed and put forth in the context of big data. The proposed model yields an average accuracy of 98% with the proposed enhanced Quantum classifier, QeSVM classifier, swarm particle optimizer with Twin wave SVM, QPSO-TWSVM, and other Q-CNN models on different Big Data sets.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1024 ","pages":"Article 114938"},"PeriodicalIF":0.9,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142586215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
No six-cell neighborhood cellular automaton solves the parity problem 没有六单元邻域蜂窝自动机能解决奇偶性问题
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-28 DOI: 10.1016/j.tcs.2024.114923
Anna Nenca , Barbara Wolnik , Bernard De Baets
The parity problem is one of the best-known classification problems studied to examine the computational abilities of cellular automata. In this inverse problem, one is looking for a cellular automaton that can classify each initial configuration into one of two classes according to its parity. In the case of deterministic one-dimensional cellular automata, there exists a local rule that effectively solves the parity problem, but it is unknown whether it is the simplest possible rule. Specifically, it is known that a cellular automaton with a nine-cell neighborhood can solve the parity problem, whereas no cellular automaton with a five-cell neighborhood is capable of doing so. These findings have remained unimproved for the past 10 years. In this paper, we present novel tools that allow to narrow down the existing gap. With the help of these tools, we are able to demonstrate that there is no cellular automaton with a six-cell neighborhood capable of solving the parity problem.
奇偶性问题是研究细胞自动机计算能力的最著名分类问题之一。在这一逆向问题中,我们要寻找一种能根据奇偶性将每个初始配置分为两类的蜂窝自动机。在确定性一维蜂窝自动机中,存在一种能有效解决奇偶性问题的局部规则,但它是否是可能的最简单规则还不得而知。具体地说,我们知道具有九个单元邻域的细胞自动机可以解决奇偶性问题,而具有五个单元邻域的细胞自动机却不能解决奇偶性问题。这些发现在过去 10 年中一直没有得到改进。在本文中,我们提出了缩小现有差距的新工具。在这些工具的帮助下,我们能够证明不存在具有六单元邻域的细胞自动机能够解决奇偶性问题。
{"title":"No six-cell neighborhood cellular automaton solves the parity problem","authors":"Anna Nenca ,&nbsp;Barbara Wolnik ,&nbsp;Bernard De Baets","doi":"10.1016/j.tcs.2024.114923","DOIUrl":"10.1016/j.tcs.2024.114923","url":null,"abstract":"<div><div>The parity problem is one of the best-known classification problems studied to examine the computational abilities of cellular automata. In this inverse problem, one is looking for a cellular automaton that can classify each initial configuration into one of two classes according to its parity. In the case of deterministic one-dimensional cellular automata, there exists a local rule that effectively solves the parity problem, but it is unknown whether it is the simplest possible rule. Specifically, it is known that a cellular automaton with a nine-cell neighborhood can solve the parity problem, whereas no cellular automaton with a five-cell neighborhood is capable of doing so. These findings have remained unimproved for the past 10 years. In this paper, we present novel tools that allow to narrow down the existing gap. With the help of these tools, we are able to demonstrate that there is no cellular automaton with a six-cell neighborhood capable of solving the parity problem.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1021 ","pages":"Article 114923"},"PeriodicalIF":0.9,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142554208","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constructing red-black spanners for mixed-charging vehicular networks 为混合充电车辆网络构建红黑扳手
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-28 DOI: 10.1016/j.tcs.2024.114932
Sergey Bereg , Yuya Higashikawa , Naoki Katoh , Junichi Teruyama , Yuki Tokuni , Binhai Zhu
Motivated by the recent trend of increasing number of e-cars and hybrid cars, we investigate the problem of building a red-black spanner for a mixed-charging vehicular network. In such a network, we have two kinds of gas/charging stations: electric (black) and the traditional gas (red) stations. Our requirement is that one cannot connect two gas stations directly in the spanner (i.e., no red-red edge), and the goal is to build a linear-size spanner with a bounded stretch factor under this requirement. (In 2-d, it can be shown that a spanner with an optimal stretch factor could have a quadratic size and if one is constrained to build the spanner purely from a given road network then it is impossible to obtain a bounded stretch factor.) Our main results are summarized as follows.
  • 1.
    In 1-d, a linear-size red-black spanner is built to satisfy the ‘no red-red edge’ requirement which achieves the optimal stretch factor.
  • 2.
    In 2-d and under the L2 metric, we build a linear-size red-black spanner satisfying the ‘no red-red edge’ requirement which achieves a stretch factor of 1.998.
  • 3.
    In 2-d and under the L1 metric, a linear-size red-black spanner is built to satisfy the ‘no red-red edge’ requirement which achieves a stretch factor of 3.613.
最近,电动汽车和混合动力汽车的数量呈上升趋势,受此激励,我们研究了为混合充电车辆网络构建红黑扳手的问题。在这种网络中,我们有两种加油/充电站:电动(黑色)和传统加油(红色)站。我们的要求是不能将两个加油站直接连接在一起(即没有红-红边),目标是在此要求下建立一个线性大小的、伸展系数有界的拼接器。(在二维模型中,可以证明具有最佳伸展系数的扳道器可能具有二次方大小,而如果我们受限于纯粹从给定的道路网络中构建扳道器,那么就不可能获得有界的伸展系数)。我们的主要结果总结如下: 1.在 1-d 条件下,为满足 "无红-红边 "要求,我们构建了线性大小的红-黑扳手,从而获得了最优拉伸系数。3.在二维和 L1 指标下,我们构建了一个线性大小的红黑扳手,以满足 "无红色边缘 "的要求,其拉伸系数达到 1.998。
{"title":"Constructing red-black spanners for mixed-charging vehicular networks","authors":"Sergey Bereg ,&nbsp;Yuya Higashikawa ,&nbsp;Naoki Katoh ,&nbsp;Junichi Teruyama ,&nbsp;Yuki Tokuni ,&nbsp;Binhai Zhu","doi":"10.1016/j.tcs.2024.114932","DOIUrl":"10.1016/j.tcs.2024.114932","url":null,"abstract":"<div><div>Motivated by the recent trend of increasing number of e-cars and hybrid cars, we investigate the problem of building a red-black spanner for a mixed-charging vehicular network. In such a network, we have two kinds of gas/charging stations: electric (black) and the traditional gas (red) stations. Our requirement is that one cannot connect two gas stations directly in the spanner (i.e., no red-red edge), and the goal is to build a linear-size spanner with a bounded stretch factor under this requirement. (In 2-d, it can be shown that a spanner with an optimal stretch factor could have a quadratic size and if one is constrained to build the spanner purely from a given road network then it is impossible to obtain a bounded stretch factor.) Our main results are summarized as follows.<ul><li><span>1.</span><span><div>In 1-d, a linear-size red-black spanner is built to satisfy the ‘no red-red edge’ requirement which achieves the optimal stretch factor.</div></span></li><li><span>2.</span><span><div>In 2-d and under the <span><math><msub><mrow><mi>L</mi></mrow><mrow><mn>2</mn></mrow></msub></math></span> metric, we build a linear-size red-black spanner satisfying the ‘no red-red edge’ requirement which achieves a stretch factor of 1.998.</div></span></li><li><span>3.</span><span><div>In 2-d and under the <span><math><msub><mrow><mi>L</mi></mrow><mrow><mn>1</mn></mrow></msub></math></span> metric, a linear-size red-black spanner is built to satisfy the ‘no red-red edge’ requirement which achieves a stretch factor of 3.613.</div></span></li></ul></div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1023 ","pages":"Article 114932"},"PeriodicalIF":0.9,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142553639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parameterized complexity of vertex splitting to pathwidth at most 1 顶点拆分至最多 1 路径宽度的参数化复杂度
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-28 DOI: 10.1016/j.tcs.2024.114928
Jakob Baumann, Matthias Pfretzschner, Ignaz Rutter
Motivated by the planarization of 2-layered straight-line drawings, we consider the problem of modifying a graph such that the resulting graph has pathwidth at most 1. The problem Pathwidth-One Vertex Explosion (POVE) asks whether such a graph can be obtained using at most k vertex explosions, where a vertex explosion replaces a vertex v by deg(v) degree-1 vertices, each incident to exactly one edge that was originally incident to v. For POVE, we give an FPT algorithm with running time O(4km) and an O(k2) kernel, thereby improving over the O(k6)-kernel by Ahmed et al. [2] in a more general setting. Similarly, a vertex split replaces a vertex v by two distinct vertices v1 and v2 and distributes the edges originally incident to v arbitrarily to v1 and v2. Analogously to POVE, we define the problem variant Pathwidth-One Vertex Splitting (POVS) that uses the split operation instead of vertex explosions. Here we obtain a linear kernel and an algorithm with running time O((6k+12)km). This answers an open question by Ahmed et al. [2].
Finally, we consider the problem Π-VertexSplitting-VS), which generalizes the problem POVS and asks whether a given graph can be turned into a graph of a specific graph class Π using at most k vertex splits. For graph classes Π that can be defined in monadic second-order graph logic (MSO2), we show that the problem Π-VS can be expressed as an MSO2 formula, resulting in an FPT algorithm for Π-VS parameterized by k if Π additionally has bounded treewidth. We obtain the same result for the problem variant using vertex explosions.
受两层直线图平面化的启发,我们考虑了如何修改一个图,使得到的图的路径宽度至多为 1 的问题。路径宽度为 1 的顶点爆炸(POVE)问题问的是,是否能用至多 k 个顶点爆炸得到这样一个图,其中一个顶点爆炸用 deg(v) 度为 1 的顶点替换一个顶点 v,每个顶点都恰好与一条原来与 v 有关的边相连。对于 POVE,我们给出了运行时间为 O(4k⋅m)、内核为 O(k2)的 FPT 算法,从而改进了 Ahmed 等人[2]在更一般情况下的内核为 O(k6)的算法。同样,顶点拆分也是用两个不同的顶点 v1 和 v2 替换一个顶点 v,并将 v 原有的边任意分配给 v1 和 v2。与 POVE 类似,我们定义了问题变体 "路径宽度一顶点分割"(POVS),它使用分割操作代替顶点爆炸。在这里,我们得到了一个线性内核和运行时间为 O((6k+12)k⋅m)的算法。最后,我们考虑了 Π-VertexSplitting (Π-VS)问题,它是对 POVS 问题的概括,问的是给定的图是否能通过最多 k 个顶点分割变成特定图类 Π 的图。对于可以用一元二阶图逻辑(MSO2)定义的图类Π,我们证明了问题Π-VS 可以用 MSO2 公式来表达,如果Π 还具有有界树宽(treewidth),就能得到以 k 为参数的Π-VS 的 FPT 算法。对于使用顶点爆炸的问题变体,我们也得到了同样的结果。
{"title":"Parameterized complexity of vertex splitting to pathwidth at most 1","authors":"Jakob Baumann,&nbsp;Matthias Pfretzschner,&nbsp;Ignaz Rutter","doi":"10.1016/j.tcs.2024.114928","DOIUrl":"10.1016/j.tcs.2024.114928","url":null,"abstract":"<div><div>Motivated by the planarization of 2-layered straight-line drawings, we consider the problem of modifying a graph such that the resulting graph has pathwidth at most 1. The problem <span>Pathwidth-One Vertex Explosion</span> (<span>POVE</span>) asks whether such a graph can be obtained using at most <em>k</em> vertex explosions, where a <em>vertex explosion</em> replaces a vertex <em>v</em> by <span><math><mi>deg</mi><mo>⁡</mo><mo>(</mo><mi>v</mi><mo>)</mo></math></span> degree-1 vertices, each incident to exactly one edge that was originally incident to <em>v</em>. For <span>POVE</span>, we give an FPT algorithm with running time <span><math><mi>O</mi><mo>(</mo><msup><mrow><mn>4</mn></mrow><mrow><mi>k</mi></mrow></msup><mo>⋅</mo><mi>m</mi><mo>)</mo></math></span> and an <span><math><mi>O</mi><mo>(</mo><msup><mrow><mi>k</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>)</mo></math></span> kernel, thereby improving over the <span><math><mi>O</mi><mo>(</mo><msup><mrow><mi>k</mi></mrow><mrow><mn>6</mn></mrow></msup><mo>)</mo></math></span>-kernel by Ahmed et al. <span><span>[2]</span></span> in a more general setting. Similarly, a <em>vertex split</em> replaces a vertex <em>v</em> by two distinct vertices <span><math><msub><mrow><mi>v</mi></mrow><mrow><mn>1</mn></mrow></msub></math></span> and <span><math><msub><mrow><mi>v</mi></mrow><mrow><mn>2</mn></mrow></msub></math></span> and distributes the edges originally incident to <em>v</em> arbitrarily to <span><math><msub><mrow><mi>v</mi></mrow><mrow><mn>1</mn></mrow></msub></math></span> and <span><math><msub><mrow><mi>v</mi></mrow><mrow><mn>2</mn></mrow></msub></math></span>. Analogously to <span>POVE</span>, we define the problem variant <span>Pathwidth-One Vertex Splitting</span> (<span>POVS</span>) that uses the split operation instead of vertex explosions. Here we obtain a linear kernel and an algorithm with running time <span><math><mi>O</mi><mo>(</mo><msup><mrow><mo>(</mo><mn>6</mn><mi>k</mi><mo>+</mo><mn>12</mn><mo>)</mo></mrow><mrow><mi>k</mi></mrow></msup><mo>⋅</mo><mi>m</mi><mo>)</mo></math></span>. This answers an open question by Ahmed et al. <span><span>[2]</span></span>.</div><div>Finally, we consider the problem Π<span>-VertexSplitting</span> (Π<span>-VS</span>), which generalizes the problem <span>POVS</span> and asks whether a given graph can be turned into a graph of a specific graph class Π using at most <em>k</em> vertex splits. For graph classes Π that can be defined in monadic second-order graph logic (MSO<sub>2</sub>), we show that the problem Π<span>-VS</span> can be expressed as an MSO<sub>2</sub> formula, resulting in an FPT algorithm for Π<span>-VS</span> parameterized by <em>k</em> if Π additionally has bounded treewidth. We obtain the same result for the problem variant using vertex explosions.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1021 ","pages":"Article 114928"},"PeriodicalIF":0.9,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142554211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MODRED: A code-based non-interactive key exchange protocol MODRED:基于代码的非交互式密钥交换协议
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-28 DOI: 10.1016/j.tcs.2024.114943
Junling Pei, Fang-Wei Fu
How to construct a non-interactive key exchange (NIKE) protocol based on coding theory is an opening problem. In this paper, we propose the first code-based NIKE protocol MODRED, whose security relies on the hardness of the Restricted Syndrome Decoding (R-SD) problem and its variant. A non-interactive error reconciliation mechanism is presented and applied to MODRED, which enables the two sides of communication to “approximately agree” on the shared key. This is of great significance because it may lead to a more generic framework construction. Furthermore, our proposal is competitive and practical. We provide an initial choice of parameters for MODRED, tailored to 120-bit post-quantum security level, yielding the public keys of less than 1.2 MBs.
如何构建基于编码理论的非交互式密钥交换(NIKE)协议是一个有待解决的问题。本文提出了第一个基于编码的 NIKE 协议 MODRED,其安全性依赖于受限综合解码(R-SD)问题及其变体的硬度。我们提出了一种非交互式错误调节机制,并将其应用于 MODRED,使通信双方能够 "近似同意 "共享密钥。这一点意义重大,因为它可能会带来更通用的框架构建。此外,我们的建议具有竞争力和实用性。我们提供了 MODRED 的初始参数选择,根据 120 位后量子安全级别进行了定制,产生的公钥小于 1.2 MB。
{"title":"MODRED: A code-based non-interactive key exchange protocol","authors":"Junling Pei,&nbsp;Fang-Wei Fu","doi":"10.1016/j.tcs.2024.114943","DOIUrl":"10.1016/j.tcs.2024.114943","url":null,"abstract":"<div><div>How to construct a non-interactive key exchange (NIKE) protocol based on coding theory is an opening problem. In this paper, we propose the first code-based NIKE protocol MODRED, whose security relies on the hardness of the Restricted Syndrome Decoding (R-SD) problem and its variant. A non-interactive error reconciliation mechanism is presented and applied to MODRED, which enables the two sides of communication to “approximately agree” on the shared key. This is of great significance because it may lead to a more generic framework construction. Furthermore, our proposal is competitive and practical. We provide an initial choice of parameters for MODRED, tailored to 120-bit post-quantum security level, yielding the public keys of less than 1.2 MBs.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1021 ","pages":"Article 114943"},"PeriodicalIF":0.9,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142554253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An approximate cost recovery scheme for the k-product facility location game with penalties 有惩罚的 k 种产品设施选址博弈的近似成本回收方案
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-28 DOI: 10.1016/j.tcs.2024.114933
Xiaowei Li, Xiwen Lu
This paper considers a variant of the classic facility location game called the k-product facility location game with penalties. In this game, each facility can only produce at most one kind of product and each customer must be supplied with k different products or be rejected by paying the penalty cost. The authors propose a 2-approximate cross-monotonic cost-sharing scheme for the game when k=2, and a (32k32)-approximate cross-monotonic cost-sharing scheme when k3, respectively. Furthermore, the lower bound is obtained for the k-product facility location game with penalties.
本文研究的是经典设施选址博弈的一种变体,称为带惩罚的 k 种产品设施选址博弈。在这个博弈中,每个设施最多只能生产一种产品,而每个客户必须得到 k 种不同的产品,否则就要支付惩罚成本而被拒绝。作者分别提出了 k=2 时博弈的 2 近似交叉单调成本分摊方案和 k≥3 时的 (32k-32)- 近似交叉单调成本分摊方案。此外,还得到了 k 产品设施位置博弈的下界。
{"title":"An approximate cost recovery scheme for the k-product facility location game with penalties","authors":"Xiaowei Li,&nbsp;Xiwen Lu","doi":"10.1016/j.tcs.2024.114933","DOIUrl":"10.1016/j.tcs.2024.114933","url":null,"abstract":"<div><div>This paper considers a variant of the classic facility location game called the <em>k</em>-product facility location game with penalties. In this game, each facility can only produce at most one kind of product and each customer must be supplied with <em>k</em> different products or be rejected by paying the penalty cost. The authors propose a 2-approximate cross-monotonic cost-sharing scheme for the game when <span><math><mi>k</mi><mo>=</mo><mn>2</mn></math></span>, and a (<span><math><mfrac><mrow><mn>3</mn></mrow><mrow><mn>2</mn></mrow></mfrac><mi>k</mi><mo>−</mo><mfrac><mrow><mn>3</mn></mrow><mrow><mn>2</mn></mrow></mfrac></math></span>)-approximate cross-monotonic cost-sharing scheme when <span><math><mi>k</mi><mo>≥</mo><mn>3</mn></math></span>, respectively. Furthermore, the lower bound is obtained for the <em>k</em>-product facility location game with penalties.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1021 ","pages":"Article 114933"},"PeriodicalIF":0.9,"publicationDate":"2024-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142554148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Theoretical Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1