首页 > 最新文献

Theoretical Computer Science最新文献

英文 中文
Generalized capacity planning for the hospital-Residents problem 医院-居民问题的广义容量规划
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-14 DOI: 10.1016/j.tcs.2026.115760
Haricharan Balasundaram , Girija Limaye , Meghana Nasre , Abhinav Raja
The Hospital Residents setting models important problems like school choice, assignment of undergraduate students to degree programs, among many others. In this setting, fixed quotas are associated with the programs that limit the number of agents that can be assigned to them. Motivated by scenarios where all agents must be matched, we propose and study a generalized capacity planning problem, which allows cost-controlled flexibility with respect to quotas.
Our setting is an extension of the Hospital Resident setting where programs have the usual quota as well as an associated cost, indicating the cost of matching an agent beyond the initial quotas. We seek to compute a matching that matches all agents and is optimal with respect to preferences, and minimizes either a local or a global objective on cost.
We show that there is a sharp contrast – minimizing the local objective is polynomial-time solvable, whereas minimizing the global objective is NP-hard. On the positive side, we present approximation algorithms for the global objective in the general case and a particular hard case. We achieve the approximation guarantee for the special hard case via a linear programming based algorithm. We strengthen the NP-hardness by showing a matching lower bound to our algorithmic result.
《住院医师》为许多重要问题树立了榜样,比如学校选择、本科生学位课程的分配等等。在此设置中,固定配额与限制可以分配给它们的代理数量的程序相关联。在所有代理必须匹配的情况下,我们提出并研究了一个广义容量规划问题,该问题允许相对于配额的成本控制灵活性。我们的设置是医院住院医师设置的扩展,其中程序具有通常的配额和相关的成本,表明在初始配额之外匹配代理的成本。我们试图计算匹配所有代理的匹配,并且在偏好方面是最优的,并且最小化局部或全局目标的成本。我们证明了一个鲜明的对比——最小化局部目标是多项式时间可解的,而最小化全局目标是np困难的。在积极的方面,我们提出了在一般情况下和特殊困难情况下的全局目标的近似算法。通过一种基于线性规划的算法,实现了特殊情况下的近似保证。我们通过显示匹配的下界来增强我们的算法结果的np -硬度。
{"title":"Generalized capacity planning for the hospital-Residents problem","authors":"Haricharan Balasundaram ,&nbsp;Girija Limaye ,&nbsp;Meghana Nasre ,&nbsp;Abhinav Raja","doi":"10.1016/j.tcs.2026.115760","DOIUrl":"10.1016/j.tcs.2026.115760","url":null,"abstract":"<div><div>The Hospital Residents setting models important problems like school choice, assignment of undergraduate students to degree programs, among many others. In this setting, fixed quotas are associated with the programs that limit the number of agents that can be assigned to them. Motivated by scenarios where <em>all</em> agents must be matched, we propose and study a generalized capacity planning problem, which allows cost-controlled flexibility with respect to quotas.</div><div>Our setting is an extension of the Hospital Resident setting where programs have the usual quota as well as an associated cost, indicating the cost of matching an agent beyond the initial quotas. We seek to compute a matching that matches all agents and is optimal with respect to preferences, and minimizes either a local or a global objective on cost.</div><div>We show that there is a sharp contrast – minimizing the local objective is polynomial-time solvable, whereas minimizing the global objective is <span><math><mi>NP</mi></math></span>-hard. On the positive side, we present approximation algorithms for the global objective in the general case and a particular hard case. We achieve the approximation guarantee for the special hard case via a linear programming based algorithm. We strengthen the <span><math><mi>NP</mi></math></span>-hardness by showing a matching lower bound to our algorithmic result.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1067 ","pages":"Article 115760"},"PeriodicalIF":1.0,"publicationDate":"2026-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146080048","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On countable SFT covers of sparse multidimensional shift spaces 稀疏多维位移空间的可数SFT覆盖
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-14 DOI: 10.1016/j.tcs.2026.115755
Ilkka Törmä
A multidimensional sofic shift is called countably covered if it has an SFT cover containing only countably many configurations. In contrast to the one-dimensional setting, not all countable sofic shifts are countably covered. We investigate the existence of countable covers for gap width shifts, where the number of nonzero symbols in a configuration is bounded by a function of the minimum distance between two such symbols. As our main results, we characterize those one-dimensional gap width shifts whose two-dimensional lift is a countably covered sofic shift, and show that a large class of two-dimensional gap width shifts are countably covered.
如果一个多维softshift的SFT覆盖只包含可数个构型,那么它被称为可数覆盖。与一维设置相反,并非所有可数的软移都被可数覆盖。我们研究了间隙宽度位移的可数覆盖的存在性,其中构型中非零符号的数量由两个此类符号之间的最小距离的函数限定。我们的主要研究结果,刻画了二维升力为可数覆盖位移的一维隙宽位移,并证明了一类二维隙宽位移是可数覆盖的。
{"title":"On countable SFT covers of sparse multidimensional shift spaces","authors":"Ilkka Törmä","doi":"10.1016/j.tcs.2026.115755","DOIUrl":"10.1016/j.tcs.2026.115755","url":null,"abstract":"<div><div>A multidimensional sofic shift is called countably covered if it has an SFT cover containing only countably many configurations. In contrast to the one-dimensional setting, not all countable sofic shifts are countably covered. We investigate the existence of countable covers for gap width shifts, where the number of nonzero symbols in a configuration is bounded by a function of the minimum distance between two such symbols. As our main results, we characterize those one-dimensional gap width shifts whose two-dimensional lift is a countably covered sofic shift, and show that a large class of two-dimensional gap width shifts are countably covered.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1066 ","pages":"Article 115755"},"PeriodicalIF":1.0,"publicationDate":"2026-01-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146038909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Computing the center of uncertain points on cactus graphs 计算仙人掌图上不确定点的中心
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-13 DOI: 10.1016/j.tcs.2026.115761
Ran Hu , Divy H. Kanani , Jingru Zhang
In this paper, we consider the (weighted) one-center problem of uncertain points on cactus graphs. Given are a cactus graph G and a set of n uncertain points. Each uncertain point has m possible locations on G with probabilities and a non-negative weight. The (weighted) one-center problem aims to compute a point (the center) x* on G to minimize the maximum (weighted) expected distance from x* to all uncertain points. No previous algorithms are known for this problem. In this paper, we propose an O(|G|+mnlogmn)-time algorithm for solving it. Since the input size is O(|G|+mn), our algorithm is almost optimal.
本文研究仙人掌图上不确定点的(加权)单中心问题。给定仙人掌图G和n个不确定点的集合。每个不确定点在G上有m个可能的位置,具有概率和非负权。(加权)单中心问题旨在计算G上的一个点(中心)x*,以最小化从x*到所有不确定点的最大(加权)期望距离。以前没有已知的算法可以解决这个问题。在本文中,我们提出了一个O(|G|+mnlogmn)时间算法来求解它。由于输入大小为0 (|G|+mn),我们的算法几乎是最优的。
{"title":"Computing the center of uncertain points on cactus graphs","authors":"Ran Hu ,&nbsp;Divy H. Kanani ,&nbsp;Jingru Zhang","doi":"10.1016/j.tcs.2026.115761","DOIUrl":"10.1016/j.tcs.2026.115761","url":null,"abstract":"<div><div>In this paper, we consider the (weighted) one-center problem of uncertain points on cactus graphs. Given are a cactus graph <em>G</em> and a set of <em>n</em> uncertain points. Each uncertain point has <em>m</em> possible locations on <em>G</em> with probabilities and a non-negative weight. The (weighted) one-center problem aims to compute a point (the center) <em>x</em>* on <em>G</em> to minimize the maximum (weighted) expected distance from <em>x</em>* to all uncertain points. No previous algorithms are known for this problem. In this paper, we propose an <span><math><mrow><mi>O</mi><mo>(</mo><mo>|</mo><mi>G</mi><mo>|</mo><mo>+</mo><mi>m</mi><mi>n</mi><mi>log</mi><mi>m</mi><mi>n</mi><mo>)</mo></mrow></math></span>-time algorithm for solving it. Since the input size is <span><math><mrow><mi>O</mi><mo>(</mo><mo>|</mo><mi>G</mi><mo>|</mo><mo>+</mo><mi>m</mi><mi>n</mi><mo>)</mo></mrow></math></span>, our algorithm is almost optimal.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1067 ","pages":"Article 115761"},"PeriodicalIF":1.0,"publicationDate":"2026-01-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145993600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pathlength of outerplanar graphs 外平面图的路径长度
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-12 DOI: 10.1016/j.tcs.2026.115759
Thomas Dissaux, Nicolas Nisse
A path-decomposition of a graph G=(V,E) is a sequence of subsets of V, called bags, that satisfy some connectivity properties. The length of a path-decomposition of a graph G is the greatest distance (in G) between two vertices that belong to a same bag and the pathlength, denoted by pℓ(G), of G is the smallest length of its path-decompositions. This parameter has been studied for its algorithmic applications for several classical metric problems like the minimum eccentricity shortest path problem, the line-distortion problem, etc. However, deciding if the pathlength of a graph G is at most 2 is NP-complete, and the best known approximation algorithm has a ratio 2 (there is no c-approximation with c<32 unless P=NP). In this work, we focus on the study of the pathlength of simple sub-classes of planar graphs. We start by designing a linear-time algorithm that computes the pathlength of trees. Then, we show that the pathlength of cycles with n vertices is equal to n2. Our main result is a (+1)-approximation algorithm for the pathlength of outerplanar graphs. This algorithm is based on a characterization of almost optimal (of length at most p(G)+1) path-decompositions of outerplanar graphs.
图G=(V,E)的路径分解是V的子集序列,称为袋,满足某些连通性。图G的路径分解的长度是属于同一袋的两个顶点之间的最大距离(在G中),而G的路径长度表示为p (G),是其路径分解的最小长度。研究了该参数在若干经典度量问题中的算法应用,如最小偏心最短路径问题、线畸变问题等。然而,判断图G的路径长度是否最多为2是NP完全的,而最著名的近似算法的比值为2(除非P=NP,否则不存在c<;32的c近似)。在这项工作中,我们重点研究了平面图的简单子类的路径长度。我们首先设计一个线性时间算法来计算树的路径长度。然后,我们证明了有n个顶点的环的路径长度等于⌊n2⌋。我们的主要结果是外平面图路径长度的(+1)逼近算法。该算法基于外平面图的几乎最优(长度最多为p (G)+1)路径分解的表征。
{"title":"Pathlength of outerplanar graphs","authors":"Thomas Dissaux,&nbsp;Nicolas Nisse","doi":"10.1016/j.tcs.2026.115759","DOIUrl":"10.1016/j.tcs.2026.115759","url":null,"abstract":"<div><div>A <em>path-decomposition</em> of a graph <span><math><mrow><mi>G</mi><mo>=</mo><mo>(</mo><mi>V</mi><mo>,</mo><mi>E</mi><mo>)</mo></mrow></math></span> is a sequence of subsets of <em>V</em>, called <em>bags</em>, that satisfy some connectivity properties. The <em>length</em> of a path-decomposition of a graph <em>G</em> is the greatest distance (in <em>G</em>) between two vertices that belong to a same bag and the <em>pathlength</em>, denoted by <em>p</em>ℓ(<em>G</em>), of <em>G</em> is the smallest length of its path-decompositions. This parameter has been studied for its algorithmic applications for several classical metric problems like the minimum eccentricity shortest path problem, the line-distortion problem, <em>etc</em>. However, deciding if the pathlength of a graph <em>G</em> is at most 2 is NP-complete, and the best known approximation algorithm has a ratio 2 (there is no <em>c</em>-approximation with <span><math><mrow><mi>c</mi><mo>&lt;</mo><mfrac><mn>3</mn><mn>2</mn></mfrac></mrow></math></span> unless <span><math><mrow><mi>P</mi><mo>=</mo><mi>N</mi><mi>P</mi></mrow></math></span>). In this work, we focus on the study of the pathlength of simple sub-classes of planar graphs. We start by designing a linear-time algorithm that computes the pathlength of trees. Then, we show that the pathlength of cycles with <em>n</em> vertices is equal to <span><math><mrow><mo>⌊</mo><mfrac><mi>n</mi><mn>2</mn></mfrac><mo>⌋</mo></mrow></math></span>. Our main result is a <span><math><mrow><mo>(</mo><mo>+</mo><mn>1</mn><mo>)</mo></mrow></math></span>-approximation algorithm for the pathlength of outerplanar graphs. This algorithm is based on a characterization of almost optimal (of length at most <span><math><mrow><mi>p</mi><mi>ℓ</mi><mo>(</mo><mi>G</mi><mo>)</mo><mo>+</mo><mn>1</mn></mrow></math></span>) path-decompositions of outerplanar graphs.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1066 ","pages":"Article 115759"},"PeriodicalIF":1.0,"publicationDate":"2026-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145980987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Balanced substructures in bicolored graphs 双色图中的平衡子结构
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-11 DOI: 10.1016/j.tcs.2026.115745
P.S. Ardra , R. Krithika , Saket Saurabh , Roohani Sharma
An edge-colored graph is said to be balanced if it has an equal number of edges of each color. Given a graph G whose edges are colored using two colors and a positive integer k, the objective in the Edge Balanced Connected Subgraph problem is to determine if G has a balanced connected subgraph containing at least k edges. We first show that this problem is NP-complete and remains so even if the solution is required to be a tree or a path. Then, we focus on the parameterized complexity of Edge Balanced Connected Subgraph and its variants (where the balanced subgraph is required to be a path/tree) with respect to k as the parameter. Towards this, we show that if a graph has a balanced connected subgraph/tree/path of size at least k, then it has one of size at least k and at most f(k) where f is a linear function. We use this result combined with dynamic programming algorithms based on color coding and representative sets to show that Edge Balanced Connected Subgraph and its variants are FPT. Further, using polynomial-time reductions to the Multilinear Monomial Detection problem, we give faster randomized FPT algorithms for the problems. In order to describe these reductions, we define a combinatorial object called relaxed-subgraph. We define this object in such a way that balanced connected subgraphs, trees and paths are relaxed-subgraphs with certain properties. This object is defined in the spirit of branching walks known for the Steiner Tree problem and may be of independent interest.
如果一个有不同颜色边的图有相同数量的边,我们就说它是平衡的。给定一个图G,它的边是用两种颜色和一个正整数k着色的,边缘平衡连通子图问题的目标是确定G是否有一个包含至少k条边的平衡连通子图。我们首先证明了这个问题是np完全的,并且即使要求解是树或路径也仍然是np完全的。然后,我们重点研究了以k为参数的边平衡连通子图及其变体(其中平衡子图要求为路径/树)的参数化复杂度。为此,我们证明,如果一个图有一个大小至少为k的平衡连通子图/树/路径,那么它就有一个大小至少为k,最大为f(k)的子图/树/路径,其中f是一个线性函数。我们将这一结果与基于颜色编码和代表集的动态规划算法相结合,证明边缘平衡连通子图及其变体是FPT的。此外,对多线性单项检测问题使用多项式时间约简,我们给出了更快的随机化FPT算法。为了描述这些约简,我们定义了一个称为松弛子图的组合对象。我们这样定义这个对象:平衡连接子图、树和路径是具有某些属性的松弛子图。这个对象是根据斯坦纳树问题中分支行走的精神来定义的,并且可能具有独立的兴趣。
{"title":"Balanced substructures in bicolored graphs","authors":"P.S. Ardra ,&nbsp;R. Krithika ,&nbsp;Saket Saurabh ,&nbsp;Roohani Sharma","doi":"10.1016/j.tcs.2026.115745","DOIUrl":"10.1016/j.tcs.2026.115745","url":null,"abstract":"<div><div>An edge-colored graph is said to be <em>balanced</em> if it has an equal number of edges of each color. Given a graph <em>G</em> whose edges are colored using two colors and a positive integer <em>k</em>, the objective in the <span>Edge Balanced Connected Subgraph</span> problem is to determine if <em>G</em> has a balanced connected subgraph containing at least <em>k</em> edges. We first show that this problem is <span>NP</span>-complete and remains so even if the solution is required to be a tree or a path. Then, we focus on the parameterized complexity of <span>Edge Balanced Connected Subgraph</span> and its variants (where the balanced subgraph is required to be a path/tree) with respect to <em>k</em> as the parameter. Towards this, we show that if a graph has a balanced connected subgraph/tree/path of size at least <em>k</em>, then it has one of size at least <em>k</em> and at most <em>f</em>(<em>k</em>) where <em>f</em> is a linear function. We use this result combined with dynamic programming algorithms based on <em>color coding</em> and <em>representative sets</em> to show that <span>Edge Balanced Connected Subgraph</span> and its variants are <span>FPT</span>. Further, using polynomial-time reductions to the <span>Multilinear Monomial Detection</span> problem, we give faster randomized <span>FPT</span> algorithms for the problems. In order to describe these reductions, we define a combinatorial object called <em>relaxed-subgraph</em>. We define this object in such a way that balanced connected subgraphs, trees and paths are relaxed-subgraphs with certain properties. This object is defined in the spirit of branching walks known for the <span>Steiner Tree</span> problem and may be of independent interest.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1066 ","pages":"Article 115745"},"PeriodicalIF":1.0,"publicationDate":"2026-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145980988","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On balance properties of hypercubic billiard words 超立方台球词的平衡性质
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-11 DOI: 10.1016/j.tcs.2026.115754
Nicolas Bédaride , Valérie Berthé , Antoine Julien
This paper studies balance properties for billiard words. Billiard words generalize Sturmian words by coding trajectories in hypercubic billiards. In the setting of aperiodic order, they also provide the simplest examples of quasicrystals, as tilings of the line obtained via cut and project sets with a cubical canonical window. By construction, the number of occurrences of each letter in a factor (i.e., a string of consecutive letters) of a hypercubic billiard word only depends on the length of the factor, up to an additive constant. In other words, the difference of the number of occurrences of each letter in factors of the same length is bounded. In contrast with the behaviour of letters, we prove the existence of factors that are not balanced in billiard words: the difference of the number of occurrences of such unbalanced factors in longer factors of the same length is unbounded. The proof relies both on topological methods inspired by tiling cohomology and on arithmetic results on bounded remainder sets for toral translations.
本文研究了台球词的平衡性质。台球词通过对超立方台球中的轨迹进行编码来推广Sturmian词。在非周期顺序的设置中,它们也提供了准晶体的最简单的例子,作为通过具有立方体规范窗口的切割和投影集获得的线的平铺。通过构造,一个超立方台球单词的一个因子(即一串连续的字母)中每个字母出现的次数只取决于因子的长度,直到一个附加常数。换句话说,相同长度的因子中每个字母出现的次数之差是有限的。与字母的行为相反,我们证明了台球词中不平衡因素的存在:这种不平衡因素在相同长度的较长因素中出现的次数之差是无界的。该证明既依赖于由平铺上同调启发的拓扑方法,也依赖于总平移的有界剩余集上的算术结果。
{"title":"On balance properties of hypercubic billiard words","authors":"Nicolas Bédaride ,&nbsp;Valérie Berthé ,&nbsp;Antoine Julien","doi":"10.1016/j.tcs.2026.115754","DOIUrl":"10.1016/j.tcs.2026.115754","url":null,"abstract":"<div><div>This paper studies balance properties for billiard words. Billiard words generalize Sturmian words by coding trajectories in hypercubic billiards. In the setting of aperiodic order, they also provide the simplest examples of quasicrystals, as tilings of the line obtained via cut and project sets with a cubical canonical window. By construction, the number of occurrences of each letter in a factor (i.e., a string of consecutive letters) of a hypercubic billiard word only depends on the length of the factor, up to an additive constant. In other words, the difference of the number of occurrences of each letter in factors of the same length is bounded. In contrast with the behaviour of letters, we prove the existence of factors that are not balanced in billiard words: the difference of the number of occurrences of such unbalanced factors in longer factors of the same length is unbounded. The proof relies both on topological methods inspired by tiling cohomology and on arithmetic results on bounded remainder sets for toral translations.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1066 ","pages":"Article 115754"},"PeriodicalIF":1.0,"publicationDate":"2026-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145980986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A textbook solution for dynamic strings 一个教科书式的动态字符串解决方案
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-11 DOI: 10.1016/j.tcs.2026.115746
Zsuzsanna Lipták , Francesco Masillo , Gonzalo Navarro
We consider the problem of maintaining a collection of strings while efficiently supporting splits and concatenations on them, as well as comparing two substrings, and computing the longest common prefix between two suffixes. This problem can be solved in optimal time O(logN) whp for the updates and O(1) worst-case time for the queries, where N is the total collection size [Gawrychowski et al., SODA 2018]. We present here a much simpler solution based on a forest of enhanced splay trees (FeST), where both the updates and the substring comparison take O(logn) amortized time, n being the sum of the lengths of the strings involved in the operation. The length ℓ of the longest common prefix is computed in O(logn+log2) amortized time. Our query results are correct whp. Our simpler solution enables other more general updates in O(logn) amortized time, such as reversing a substring and/or mapping its symbols. We can also make FeST use compact space, and extend it to regard substrings as circular or as their omega extension. A C++-implementation of our FeST data structure is available at https://github.com/fmasillo/FeST.
我们考虑了在有效支持分割和连接的同时维护字符串集合的问题,以及比较两个子字符串和计算两个后缀之间最长的公共前缀的问题。这个问题可以在更新的最优时间O(logN) whp和查询的最坏时间O(1)内解决,其中N是总集合大小[Gawrychowski等人,SODA 2018]。我们在这里提出了一个更简单的解决方案,基于增强的扩展树森林(FeST),其中更新和子字符串比较都需要O(logn)平摊时间,n是操作中涉及的字符串长度的总和。最长公共前缀的长度在O(logn+log2)平摊时间内计算。我们的查询结果是正确的。我们更简单的解决方案支持在O(logn)平摊时间内进行其他更一般的更新,例如反转子字符串和/或映射其符号。我们还可以使FeST使用紧空间,并将其扩展为将子字符串视为圆形或它们的扩展。我们的FeST数据结构的c++实现可从https://github.com/fmasillo/FeST获得。
{"title":"A textbook solution for dynamic strings","authors":"Zsuzsanna Lipták ,&nbsp;Francesco Masillo ,&nbsp;Gonzalo Navarro","doi":"10.1016/j.tcs.2026.115746","DOIUrl":"10.1016/j.tcs.2026.115746","url":null,"abstract":"<div><div>We consider the problem of maintaining a collection of strings while efficiently supporting splits and concatenations on them, as well as comparing two substrings, and computing the longest common prefix between two suffixes. This problem can be solved in optimal time <span><math><mrow><mi>O</mi><mo>(</mo><mi>log</mi><mi>N</mi><mo>)</mo></mrow></math></span> whp for the updates and <span><math><mrow><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></mrow></math></span> worst-case time for the queries, where <em>N</em> is the total collection size [Gawrychowski et al., SODA 2018]. We present here a much simpler solution based on a forest of enhanced splay trees (FeST), where both the updates and the substring comparison take <span><math><mrow><mi>O</mi><mo>(</mo><mi>log</mi><mi>n</mi><mo>)</mo></mrow></math></span> amortized time, <em>n</em> being the sum of the lengths of the strings involved in the operation. The length ℓ of the longest common prefix is computed in <span><math><mrow><mi>O</mi><mo>(</mo><mi>log</mi><mi>n</mi><mo>+</mo><msup><mi>log</mi><mn>2</mn></msup><mi>ℓ</mi><mo>)</mo></mrow></math></span> amortized time. Our query results are correct whp. Our simpler solution enables other more general updates in <span><math><mrow><mi>O</mi><mo>(</mo><mi>log</mi><mi>n</mi><mo>)</mo></mrow></math></span> amortized time, such as reversing a substring and/or mapping its symbols. We can also make FeST use compact space, and extend it to regard substrings as circular or as their omega extension. A <span>C++</span>-implementation of our FeST data structure is available at <span><span>https://github.com/fmasillo/FeST</span><svg><path></path></svg></span>.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1066 ","pages":"Article 115746"},"PeriodicalIF":1.0,"publicationDate":"2026-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146078801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internal quasiperiod queries 内部准周期查询
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-09 DOI: 10.1016/j.tcs.2026.115747
Maxime Crochemore , Costas S. Iliopoulos , Jakub Radoszewski , Wojciech Rytter , Juliusz Straszyński , Tomasz Waleń , Wiktor Zuba
Internal pattern matching requires one to answer queries about factors of a given string. Many results are known on answering internal period queries, asking for the periods of a given factor. In this paper we investigate internal queries asking for covers (also known as quasiperiods) of a given factor. Let n denote the length of the string and m denote the length of the factor in question. We propose a data structure that answers such queries in O(logm) time for the shortest cover and in O(logmloglogm) time for a representation of all the covers, after O(nlogn) time and space preprocessing.
This is a full version of a conference paper at SPIRE 2020 with query complexities improved by a log log n-factor and additional applications.
内部模式匹配要求回答关于给定字符串的因素的查询。在回答内部周期查询(要求给定因子的周期)时,可以知道许多结果。在本文中,我们研究了要求给定因子的覆盖(也称为准周期)的内部查询。设n表示字符串的长度,m表示所讨论的因子的长度。我们提出了一种数据结构,在经过O(nlogn)时间和空间预处理后,在O(loglogm)时间内回答最短覆盖的查询,在O(logloggm)时间内回答所有覆盖的表示。这是SPIRE 2020会议论文的完整版本,查询复杂性通过log log n因子和其他应用程序得到了改进。
{"title":"Internal quasiperiod queries","authors":"Maxime Crochemore ,&nbsp;Costas S. Iliopoulos ,&nbsp;Jakub Radoszewski ,&nbsp;Wojciech Rytter ,&nbsp;Juliusz Straszyński ,&nbsp;Tomasz Waleń ,&nbsp;Wiktor Zuba","doi":"10.1016/j.tcs.2026.115747","DOIUrl":"10.1016/j.tcs.2026.115747","url":null,"abstract":"<div><div>Internal pattern matching requires one to answer queries about factors of a given string. Many results are known on answering internal period queries, asking for the periods of a given factor. In this paper we investigate internal queries asking for covers (also known as quasiperiods) of a given factor. Let <em>n</em> denote the length of the string and <em>m</em> denote the length of the factor in question. We propose a data structure that answers such queries in <span><math><mrow><mi>O</mi><mo>(</mo><mi>log</mi><mi>m</mi><mo>)</mo></mrow></math></span> time for the shortest cover and in <span><math><mrow><mi>O</mi><mo>(</mo><mi>log</mi><mi>m</mi><mi>log</mi><mi>log</mi><mi>m</mi><mo>)</mo></mrow></math></span> time for a representation of all the covers, after <span><math><mrow><mi>O</mi><mo>(</mo><mi>n</mi><mi>log</mi><mi>n</mi><mo>)</mo></mrow></math></span> time and space preprocessing.</div><div>This is a full version of a conference paper at SPIRE 2020 with query complexities improved by a log log <em>n</em>-factor and additional applications.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1066 ","pages":"Article 115747"},"PeriodicalIF":1.0,"publicationDate":"2026-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145980990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Public-key encryption with filtered equality test against adaptive chosen-ciphertext attacks 针对自适应选择密文攻击的公钥加密过滤等式检验
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-07 DOI: 10.1016/j.tcs.2026.115744
Zi-Yuan Liu , Masahiro Mambo , Raylin Tso , Yi-Fan Tseng
In this study, we revisit the cryptosystem termed public-key encryption with filtered equality test (PKEFET), originally devised by Huang et al. (J. Comput. Syst. Sci. 2017) and subsequently refined by Chen et al. (Des. Codes Cryptogr. 2021). This notion allows users to delegate the equality test functionality of ciphertexts to a tester, but only for ciphertexts associated with a selected message set. More specifically, consider two ciphertexts related to plaintexts m and m′, along with their respective tokens related to two plaintext sets m and m′. Assuming m ∈ m and m′ ∈ m′ hold simultaneously, then any tester has the ability to determine if the ciphertexts are associated with an identical plaintext (i.e., m=m). With this functionality, PKEFET is valuable in applications such as encrypted data search and spam filtering. However, there exist several challenges in the current PKEFET schemes, such as: (i) security is limited to indistinguishability against “non-adaptive” chosen-ciphertext attacks (CCA1) and (ii) the computational and storage complexities scale linearly with the maximum number of plaintexts that a token can authenticate. To address these challenges, by employing public-key encryption and key-policy attribute-based encryption (KPABE) supporting OR-gate policies as the foundational building blocks, we propose a generic construction of PKEFET. In particular, we show that the required KPABE can be obtained from identity-based encryption. We demonstrate that the proposed construction satisfies one-wayness and indistinguishability under strong filtered equality test against adaptive chosen-ciphertext attacks (CCA2). Moreover, the resulting scheme has significant computational and storage complexity advantages compared to existing PKEFET schemes.
在本研究中,我们重新审视了由Huang等人最初设计的带有过滤等式检验的公钥加密(PKEFET)密码系统。系统。Sci. 2017),随后由Chen等人改进(Des. Codes Cryptogr. 2021)。这个概念允许用户将密文的相等性测试功能委托给测试人员,但仅限于与选定消息集相关联的密文。更具体地说,考虑与明文m和m ‘相关的两个密文,以及与两个明文集m和m ’相关的各自的令牌。假设m ∈ m和m ‘ ∈ m ’同时成立,那么任何测试人员都有能力确定密文是否与相同的明文相关联(即m=m ')。有了这个功能,PKEFET在加密数据搜索和垃圾邮件过滤等应用程序中很有价值。然而,目前的PKEFET方案存在一些挑战,例如:(i)安全性仅限于对“非自适应”选择密文攻击(CCA1)的不可区分性;(ii)计算和存储复杂性与令牌可以认证的明文的最大数量呈线性增长。为了解决这些挑战,我们采用支持or门策略的公钥加密和基于密钥策略属性的加密(KPABE)作为基础构建块,提出了PKEFET的通用结构。特别地,我们展示了可以通过基于身份的加密获得所需的KPABE。在强过滤等式检验下,我们证明了该构造在抗自适应选择密文攻击(CCA2)中满足单向性和不可区分性。此外,与现有的PKEFET方案相比,该方案具有显著的计算和存储复杂度优势。
{"title":"Public-key encryption with filtered equality test against adaptive chosen-ciphertext attacks","authors":"Zi-Yuan Liu ,&nbsp;Masahiro Mambo ,&nbsp;Raylin Tso ,&nbsp;Yi-Fan Tseng","doi":"10.1016/j.tcs.2026.115744","DOIUrl":"10.1016/j.tcs.2026.115744","url":null,"abstract":"<div><div>In this study, we revisit the cryptosystem termed public-key encryption with filtered equality test (PKEFET), originally devised by Huang et al. (<em>J. Comput. Syst. Sci.</em> 2017) and subsequently refined by Chen et al. (<em>Des. Codes Cryptogr.</em> 2021). This notion allows users to delegate the equality test functionality of ciphertexts to a tester, but only for ciphertexts associated with a selected message set. More specifically, consider two ciphertexts related to plaintexts <em>m</em> and <em>m</em>′, along with their respective tokens related to two plaintext sets <strong><em>m</em></strong> and <strong><em>m</em></strong>′. Assuming <em>m</em> ∈ <strong><em>m</em></strong> and <em>m</em>′ ∈ <strong><em>m</em></strong>′ hold simultaneously, then any tester has the ability to determine if the ciphertexts are associated with an identical plaintext (i.e., <span><math><mrow><mi>m</mi><mo>=</mo><msup><mi>m</mi><mo>′</mo></msup></mrow></math></span>). With this functionality, PKEFET is valuable in applications such as encrypted data search and spam filtering. However, there exist several challenges in the current PKEFET schemes, such as: (i) security is limited to indistinguishability against “non-adaptive” chosen-ciphertext attacks (CCA1) and (ii) the computational and storage complexities scale linearly with the maximum number of plaintexts that a token can authenticate. To address these challenges, by employing public-key encryption and key-policy attribute-based encryption (KPABE) supporting OR-gate policies as the foundational building blocks, we propose a generic construction of PKEFET. In particular, we show that the required KPABE can be obtained from identity-based encryption. We demonstrate that the proposed construction satisfies one-wayness and indistinguishability under strong filtered equality test against adaptive chosen-ciphertext attacks (CCA2). Moreover, the resulting scheme has significant computational and storage complexity advantages compared to existing PKEFET schemes.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1067 ","pages":"Article 115744"},"PeriodicalIF":1.0,"publicationDate":"2026-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146080049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quadratic truncated rotation symmetric Boolean functions 二次截断旋转对称布尔函数
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-07 DOI: 10.1016/j.tcs.2026.115743
Thomas W. Cusick , Younhwan Cheon
A Boolean function gn in n variables is rotation symmetric (RS) if it is invariant under powers of ρ(x1,,xn)=(x2,,xn,x1). An RS function is monomial rotation symmetric (MRS) if it is generated by applying powers of ρ to a single monomial, say x1xa(2)xa(d), where d is the degree of the function. An MRS function in n variables is called truncated rotation symmetric (TRS) if the function stops the expansion for the n-variable MRS function at the term where xn first occurs. Truncated functions are important because they are used in the computation of linear recursions which the weights of any RS functions are known to satisfy. Computing these recursions in general is very complex. This paper proves that for the quadratic TRS functions, an explicit formula for the generating function for the weights can be proved. This removes the need for the complex computation and makes the weight computation much simpler.
有n个变量的布尔函数gn是旋转对称的(RS),如果它在ρ(x1,…,xn)=(x2,…,xn,x1)的幂下不变。一个RS函数是单项式旋转对称(MRS),如果它是通过对单个单项式应用ρ的幂产生的,比如x1xa(2)…xa(d),其中d是函数的度。如果函数在xn第一次出现的项处停止n变量MRS函数的展开,则n变量MRS函数称为截断旋转对称(TRS)。截断函数很重要,因为它们用于计算任何已知RS函数的权值都满足的线性递归。一般来说,计算这些递归是非常复杂的。证明了二次型TRS函数的权值生成函数的显式公式。这消除了对复杂计算的需要,并使权重计算变得简单得多。
{"title":"Quadratic truncated rotation symmetric Boolean functions","authors":"Thomas W. Cusick ,&nbsp;Younhwan Cheon","doi":"10.1016/j.tcs.2026.115743","DOIUrl":"10.1016/j.tcs.2026.115743","url":null,"abstract":"<div><div>A Boolean function <em>g<sub>n</sub></em> in <em>n</em> variables is rotation symmetric (RS) if it is invariant under powers of <span><math><mrow><mi>ρ</mi><mrow><mo>(</mo><msub><mi>x</mi><mn>1</mn></msub><mo>,</mo><mo>…</mo><mo>,</mo><msub><mi>x</mi><mi>n</mi></msub><mo>)</mo></mrow><mo>=</mo><mrow><mo>(</mo><msub><mi>x</mi><mn>2</mn></msub><mo>,</mo><mo>…</mo><mo>,</mo><msub><mi>x</mi><mi>n</mi></msub><mo>,</mo><msub><mi>x</mi><mn>1</mn></msub><mo>)</mo></mrow></mrow></math></span>. An RS function is monomial rotation symmetric (MRS) if it is generated by applying powers of <em>ρ</em> to a single monomial, say <span><math><mrow><msub><mi>x</mi><mn>1</mn></msub><msub><mi>x</mi><mrow><mi>a</mi><mo>(</mo><mn>2</mn><mo>)</mo></mrow></msub><mo>…</mo><msub><mi>x</mi><mrow><mi>a</mi><mo>(</mo><mi>d</mi><mo>)</mo></mrow></msub><mo>,</mo></mrow></math></span> where <em>d</em> is the degree of the function. An MRS function in <em>n</em> variables is called truncated rotation symmetric (TRS) if the function stops the expansion for the <em>n</em>-variable MRS function at the term where <em>x<sub>n</sub></em> first occurs. Truncated functions are important because they are used in the computation of linear recursions which the weights of any RS functions are known to satisfy. Computing these recursions in general is very complex. This paper proves that for the quadratic TRS functions, an explicit formula for the generating function for the weights can be proved. This removes the need for the complex computation and makes the weight computation much simpler.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1066 ","pages":"Article 115743"},"PeriodicalIF":1.0,"publicationDate":"2026-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145928841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Theoretical Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1