首页 > 最新文献

Theoretical Computer Science最新文献

英文 中文
Robustness for biochemical networks: Step-by-step approach 生化网络的鲁棒性:循序渐进的方法
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-26 DOI: 10.1016/j.tcs.2024.114934
Valentina Castiglioni , Ruggero Lanotte , Michele Loreti , Desiree Manicardi , Simone Tini
We propose two step-by-step approaches to the analysis of robustness in biochemical networks. Our aim is to measure the ability of the network to exhibit step-by-step limited variations on the concentration of a species of interest at varying of the initial concentration of other species. The first approach we propose is reaction-by-reaction, i.e. we compare the states reached by nominal and perturbed networks after they have performed the same number of reactions. We provide a statistical technique allowing for estimating robustness, we implement it in a tool called spebnr (a Simple Python Environment for statistical estimation of Biochemical Network Robustness) and showcase it on three case studies: the EnvZ/OmpR osmoregulatory signaling system of Escherichia Coli, the mechanism of bacterial chemotaxis of Escherichia Coli, and enzyme activity at saturation. Then, we consider a time-by-time approach, in which networks are compared on the basis of the states they reached at the same time point, regardless of how many reactions occurred. This approach is implemented in Stark, and we apply it to the study the robustness of the EnvZ/OmpR osmoregulatory signaling system and the Lotka-Volterra equations.
我们提出了两种逐步分析生化网络鲁棒性的方法。我们的目的是测量网络在其他物种初始浓度变化时,对相关物种浓度进行逐步有限变化的能力。我们提出的第一种方法是逐个反应法,即比较名义网络和受扰动网络在进行相同数量的反应后所达到的状态。我们提供了一种可以估算鲁棒性的统计技术,并在一个名为 spebnr(用于统计估算生化网络鲁棒性的简单 Python 环境)的工具中实现了这一技术,并在三个案例研究中进行了展示:大肠杆菌的 EnvZ/OmpR 渗透信号系统、大肠杆菌的细菌趋化机制以及饱和状态下的酶活性。然后,我们考虑采用逐时方法,根据网络在同一时间点达到的状态进行比较,而不管发生了多少反应。我们在斯塔克中实现了这种方法,并将其用于研究 EnvZ/OmpR 渗透信号系统和 Lotka-Volterra 方程的鲁棒性。
{"title":"Robustness for biochemical networks: Step-by-step approach","authors":"Valentina Castiglioni ,&nbsp;Ruggero Lanotte ,&nbsp;Michele Loreti ,&nbsp;Desiree Manicardi ,&nbsp;Simone Tini","doi":"10.1016/j.tcs.2024.114934","DOIUrl":"10.1016/j.tcs.2024.114934","url":null,"abstract":"<div><div>We propose two step-by-step approaches to the analysis of robustness in biochemical networks. Our aim is to measure the ability of the network to exhibit step-by-step limited variations on the concentration of a species of interest at varying of the initial concentration of other species. The first approach we propose is reaction-by-reaction, i.e. we compare the states reached by nominal and perturbed networks after they have performed the same number of reactions. We provide a statistical technique allowing for estimating robustness, we implement it in a tool called <span>spebnr</span> (<em>a Simple Python Environment for statistical estimation of Biochemical Network Robustness</em>) and showcase it on three case studies: the EnvZ/OmpR osmoregulatory signaling system of Escherichia Coli, the mechanism of bacterial chemotaxis of Escherichia Coli, and enzyme activity at saturation. Then, we consider a time-by-time approach, in which networks are compared on the basis of the states they reached at the same time point, regardless of how many reactions occurred. This approach is implemented in <span>Stark</span>, and we apply it to the study the robustness of the EnvZ/OmpR osmoregulatory signaling system and the Lotka-Volterra equations.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1022 ","pages":"Article 114934"},"PeriodicalIF":0.9,"publicationDate":"2024-10-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142551927","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Some results on digital segments and balanced words 关于数字段和平衡词的一些结果
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-24 DOI: 10.1016/j.tcs.2024.114935
Alessandro De Luca, Gabriele Fici
We exhibit combinatorial results on Christoffel words and binary balanced words that are motivated by their geometric interpretation as approximations of digital segments. We give a closed formula for counting the exact number of balanced words with a zeroes and b ones. We also study minimal non-balanced words.
我们展示了 Christoffel 词和二进制平衡词的组合结果,这些结果是由它们作为数字段近似值的几何解释所激发的。我们给出了一个封闭公式,用于计算有 a 个 0 和 b 个 1 的平衡词的精确数量。我们还研究了最小非平衡词。
{"title":"Some results on digital segments and balanced words","authors":"Alessandro De Luca,&nbsp;Gabriele Fici","doi":"10.1016/j.tcs.2024.114935","DOIUrl":"10.1016/j.tcs.2024.114935","url":null,"abstract":"<div><div>We exhibit combinatorial results on Christoffel words and binary balanced words that are motivated by their geometric interpretation as approximations of digital segments. We give a closed formula for counting the exact number of balanced words with <em>a</em> zeroes and <em>b</em> ones. We also study minimal non-balanced words.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1021 ","pages":"Article 114935"},"PeriodicalIF":0.9,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142554149","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Time optimal gathering of myopic robots on an infinite triangular grid 近视机器人在无限三角形网格上的时间优化集结
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-24 DOI: 10.1016/j.tcs.2024.114930
Pritam Goswami , Avisek Sharma , Satakshi Ghosh , Buddhadeb Sau
This work deals with the problem of gathering n oblivious mobile entities, called robots, at a point (not known beforehand) placed on an infinite triangular grid. The robots are considered to be myopic, i.e., robots have limited visibility. Earlier works of gathering mostly considered the robots either on a plane or on a circle or on a rectangular grid under both full and limited visibility. In the triangular grid, there are two works to the best of our knowledge. The first one is by Cicerone et al. on arbitrary pattern formation where full visibility is considered. The other one by Shibata et al. which considers seven robots with 2-hop visibility that form a hexagon with one robot in the center of the hexagon in a collision-less environment under a fully synchronous scheduler.
In this work, we first show that gathering on a triangular grid with 1-hop vision of robots is not possible even under a fully synchronous scheduler if the robots do not agree on any axis. So one axis agreement has been considered in this work (i.e., the robots agree on a direction and its orientation). We have also shown that the lower bound for time is Ω(n) epochs when n number of robots are gathering on an infinite triangular grid. An algorithm is then presented where a swarm of n number of robots with 1-hop visibility can gather within O(n) epochs under a semi-synchronous scheduler. So the algorithm presented here is time optimal.
这项工作涉及的问题是,在一个无限三角形网格上的一个点(事先不知道)上,聚集 n 个被称为机器人的遗忘移动实体。机器人被认为是近视眼,即机器人的可见度有限。早期的收集工作大多将机器人置于平面、圆形或矩形网格上,既考虑了完全可见性,也考虑了有限可见性。在三角形网格中,据我们所知有两项研究。第一项是 Cicerone 等人关于任意模式形成的研究,其中考虑了完全可见性。另一项研究由 Shibata 等人完成,该研究考虑了在完全同步调度下,七个具有 2 跳可见度的机器人在无碰撞环境中组成一个六边形,其中一个机器人位于六边形的中心。在这项研究中,我们首先证明,如果机器人在任何轴上都不一致,那么即使在完全同步调度下,具有 1 跳可见度的机器人也不可能在三角形网格上聚集。因此,本研究考虑的是单轴一致(即机器人在一个方向及其方位上达成一致)。我们还证明,当 n 个机器人聚集在一个无限三角形网格上时,时间下限为 Ω(n) 个历时。随后,我们提出了一种算法,在半同步调度程序下,由 n 个机器人组成的具有 1 跳可见度的机器人群可以在 O(n) 个历时内聚集。因此,这里介绍的算法在时间上是最优的。
{"title":"Time optimal gathering of myopic robots on an infinite triangular grid","authors":"Pritam Goswami ,&nbsp;Avisek Sharma ,&nbsp;Satakshi Ghosh ,&nbsp;Buddhadeb Sau","doi":"10.1016/j.tcs.2024.114930","DOIUrl":"10.1016/j.tcs.2024.114930","url":null,"abstract":"<div><div>This work deals with the problem of gathering <em>n</em> oblivious mobile entities, called robots, at a point (not known beforehand) placed on an infinite triangular grid. The robots are considered to be myopic, i.e., robots have limited visibility. Earlier works of gathering mostly considered the robots either on a plane or on a circle or on a rectangular grid under both full and limited visibility. In the triangular grid, there are two works to the best of our knowledge. The first one is by Cicerone et al. on arbitrary pattern formation where full visibility is considered. The other one by Shibata et al. which considers seven robots with 2-hop visibility that form a hexagon with one robot in the center of the hexagon in a collision-less environment under a fully synchronous scheduler.</div><div>In this work, we first show that gathering on a triangular grid with 1-hop vision of robots is not possible even under a fully synchronous scheduler if the robots do not agree on any axis. So one axis agreement has been considered in this work (i.e., the robots agree on a direction and its orientation). We have also shown that the lower bound for time is <span><math><mi>Ω</mi><mo>(</mo><mi>n</mi><mo>)</mo></math></span> epochs when <em>n</em> number of robots are gathering on an infinite triangular grid. An algorithm is then presented where a swarm of <em>n</em> number of robots with 1-hop visibility can gather within <span><math><mi>O</mi><mo>(</mo><mi>n</mi><mo>)</mo></math></span> epochs under a semi-synchronous scheduler. So the algorithm presented here is time optimal.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1023 ","pages":"Article 114930"},"PeriodicalIF":0.9,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142553638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Exact Subset MultiCover problem 精确子集多重覆盖问题
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-24 DOI: 10.1016/j.tcs.2024.114936
Emile Benoist , Guillaume Fertin , Géraldine Jean
<div><div>In this paper, we study the <span>Exact Subset MultiCover</span> problem (or <span>ESM</span>), which can be seen as an extension of the well-known <span>Set Cover</span> problem. Let <span><math><mo>(</mo><mi>U</mi><mo>,</mo><mi>f</mi><mo>)</mo></math></span> be a multiset built from set <span><math><mi>U</mi><mo>=</mo><mo>{</mo><msub><mrow><mi>e</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><msub><mrow><mi>e</mi></mrow><mrow><mn>2</mn></mrow></msub><mo>,</mo><mo>…</mo><mo>,</mo><msub><mrow><mi>e</mi></mrow><mrow><mi>m</mi></mrow></msub><mo>}</mo></math></span> and function <span><math><mi>f</mi><mo>:</mo><mi>U</mi><mo>→</mo><msup><mrow><mi>N</mi></mrow><mrow><mo>⁎</mo></mrow></msup></math></span>. <span>ESM</span> is defined as follows: given <span><math><mo>(</mo><mi>U</mi><mo>,</mo><mi>f</mi><mo>)</mo></math></span> and a collection <span><math><mi>S</mi><mo>=</mo><mo>{</mo><msub><mrow><mi>S</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><msub><mrow><mi>S</mi></mrow><mrow><mn>2</mn></mrow></msub><mo>,</mo><mo>…</mo><mo>,</mo><msub><mrow><mi>S</mi></mrow><mrow><mi>n</mi></mrow></msub><mo>}</mo></math></span> of <em>n</em> subsets of <span><math><mi>U</mi></math></span>, is it possible to find a multiset <span><math><mo>(</mo><msup><mrow><mi>S</mi></mrow><mrow><mo>′</mo></mrow></msup><mo>,</mo><mi>g</mi><mo>)</mo></math></span> with <span><math><msup><mrow><mi>S</mi></mrow><mrow><mo>′</mo></mrow></msup><mo>=</mo><mo>{</mo><msubsup><mrow><mi>S</mi></mrow><mrow><mn>1</mn></mrow><mrow><mo>′</mo></mrow></msubsup><mo>,</mo><msubsup><mrow><mi>S</mi></mrow><mrow><mn>2</mn></mrow><mrow><mo>′</mo></mrow></msubsup><mo>,</mo><mo>…</mo><mo>,</mo><msubsup><mrow><mi>S</mi></mrow><mrow><mi>n</mi></mrow><mrow><mo>′</mo></mrow></msubsup><mo>}</mo></math></span> and <span><math><mi>g</mi><mo>:</mo><msup><mrow><mi>S</mi></mrow><mrow><mo>′</mo></mrow></msup><mo>→</mo><mi>N</mi></math></span>, such that (i) <span><math><msubsup><mrow><mi>S</mi></mrow><mrow><mi>i</mi></mrow><mrow><mo>′</mo></mrow></msubsup><mo>⊆</mo><msub><mrow><mi>S</mi></mrow><mrow><mi>i</mi></mrow></msub></math></span> for every <span><math><mn>1</mn><mo>≤</mo><mi>i</mi><mo>≤</mo><mi>n</mi></math></span>, and (ii) each element of <span><math><mi>U</mi></math></span> appears as many times in <span><math><mo>(</mo><mi>U</mi><mo>,</mo><mi>f</mi><mo>)</mo></math></span> as in <span><math><mo>(</mo><msup><mrow><mi>S</mi></mrow><mrow><mo>′</mo></mrow></msup><mo>,</mo><mi>g</mi><mo>)</mo></math></span>? We study this problem under an algorithmic viewpoint and provide diverse complexity results such as polynomial cases, <span>NP</span>-hardness proofs and <span>FPT</span> algorithms. We also study two variants of <span>ESM</span>: (i) <span>Exclusive Exact Subset MultiCover</span> (<span>EESM</span>), which asks that each element of <span><math><mi>U</mi></math></span> appears in exactly one subset <span><math><msubsup><mrow><mi>S</mi></mrow><mrow><mi>i</mi></mrow><mrow><mo>′</mo></mro
本文研究的是精确子集多覆盖问题(或称 ESM),它可以看作是著名的集合覆盖问题的扩展。设 (U,f) 是由集合 U={e1,e2,...em} 和函数 f:U→N⁎ 构成的多集。ESM 的定义如下:给定(U,f)和由 U 的 n 个子集组成的集合 S={S1,S2,...,Sn},是否可能找到一个多集合(S′,g),其中 S′={S1′,S2′,...,Sn′}和 g:S′→N,使得 (i) Si′⊆Si,且 (ii) U 的每个元素在 (U,f) 中出现的次数与在 (S′,g)中出现的次数一样多?我们从算法的角度研究了这个问题,并提供了多种复杂性结果,如多项式情况、NP-hardness 证明和 FPT 算法。我们还研究了 EESM 的两个变体:(i) Exclusive Exact Subset MultiCover (ESM),要求 U 的每个元素都恰好出现在 S′ 的一个子集 Si′中;(ii) Maximum Exclusive Exact Subset MultiCover (Max-EESM),这是 EESM 的优化版本,要求 U 的最大数量的元素恰好出现在 S′ 的一个子集 Si′中。对于这两个变体,我们都提供了一些复杂度结果;特别是,我们提出了一个最大 EESM 的 2 近似算法,并证明了它的严密性。对于这三个问题,我们还提供了整数线性规划(ILP)公式。
{"title":"The Exact Subset MultiCover problem","authors":"Emile Benoist ,&nbsp;Guillaume Fertin ,&nbsp;Géraldine Jean","doi":"10.1016/j.tcs.2024.114936","DOIUrl":"10.1016/j.tcs.2024.114936","url":null,"abstract":"&lt;div&gt;&lt;div&gt;In this paper, we study the &lt;span&gt;Exact Subset MultiCover&lt;/span&gt; problem (or &lt;span&gt;ESM&lt;/span&gt;), which can be seen as an extension of the well-known &lt;span&gt;Set Cover&lt;/span&gt; problem. Let &lt;span&gt;&lt;math&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mi&gt;U&lt;/mi&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mi&gt;f&lt;/mi&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/math&gt;&lt;/span&gt; be a multiset built from set &lt;span&gt;&lt;math&gt;&lt;mi&gt;U&lt;/mi&gt;&lt;mo&gt;=&lt;/mo&gt;&lt;mo&gt;{&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;e&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;e&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mo&gt;…&lt;/mo&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;e&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;m&lt;/mi&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;}&lt;/mo&gt;&lt;/math&gt;&lt;/span&gt; and function &lt;span&gt;&lt;math&gt;&lt;mi&gt;f&lt;/mi&gt;&lt;mo&gt;:&lt;/mo&gt;&lt;mi&gt;U&lt;/mi&gt;&lt;mo&gt;→&lt;/mo&gt;&lt;msup&gt;&lt;mrow&gt;&lt;mi&gt;N&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mo&gt;⁎&lt;/mo&gt;&lt;/mrow&gt;&lt;/msup&gt;&lt;/math&gt;&lt;/span&gt;. &lt;span&gt;ESM&lt;/span&gt; is defined as follows: given &lt;span&gt;&lt;math&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mi&gt;U&lt;/mi&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mi&gt;f&lt;/mi&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/math&gt;&lt;/span&gt; and a collection &lt;span&gt;&lt;math&gt;&lt;mi&gt;S&lt;/mi&gt;&lt;mo&gt;=&lt;/mo&gt;&lt;mo&gt;{&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;S&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;S&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mo&gt;…&lt;/mo&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;S&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;n&lt;/mi&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;}&lt;/mo&gt;&lt;/math&gt;&lt;/span&gt; of &lt;em&gt;n&lt;/em&gt; subsets of &lt;span&gt;&lt;math&gt;&lt;mi&gt;U&lt;/mi&gt;&lt;/math&gt;&lt;/span&gt;, is it possible to find a multiset &lt;span&gt;&lt;math&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;msup&gt;&lt;mrow&gt;&lt;mi&gt;S&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mo&gt;′&lt;/mo&gt;&lt;/mrow&gt;&lt;/msup&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mi&gt;g&lt;/mi&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/math&gt;&lt;/span&gt; with &lt;span&gt;&lt;math&gt;&lt;msup&gt;&lt;mrow&gt;&lt;mi&gt;S&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mo&gt;′&lt;/mo&gt;&lt;/mrow&gt;&lt;/msup&gt;&lt;mo&gt;=&lt;/mo&gt;&lt;mo&gt;{&lt;/mo&gt;&lt;msubsup&gt;&lt;mrow&gt;&lt;mi&gt;S&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mo&gt;′&lt;/mo&gt;&lt;/mrow&gt;&lt;/msubsup&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;msubsup&gt;&lt;mrow&gt;&lt;mi&gt;S&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mo&gt;′&lt;/mo&gt;&lt;/mrow&gt;&lt;/msubsup&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mo&gt;…&lt;/mo&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;msubsup&gt;&lt;mrow&gt;&lt;mi&gt;S&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;n&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mo&gt;′&lt;/mo&gt;&lt;/mrow&gt;&lt;/msubsup&gt;&lt;mo&gt;}&lt;/mo&gt;&lt;/math&gt;&lt;/span&gt; and &lt;span&gt;&lt;math&gt;&lt;mi&gt;g&lt;/mi&gt;&lt;mo&gt;:&lt;/mo&gt;&lt;msup&gt;&lt;mrow&gt;&lt;mi&gt;S&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mo&gt;′&lt;/mo&gt;&lt;/mrow&gt;&lt;/msup&gt;&lt;mo&gt;→&lt;/mo&gt;&lt;mi&gt;N&lt;/mi&gt;&lt;/math&gt;&lt;/span&gt;, such that (i) &lt;span&gt;&lt;math&gt;&lt;msubsup&gt;&lt;mrow&gt;&lt;mi&gt;S&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;i&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mo&gt;′&lt;/mo&gt;&lt;/mrow&gt;&lt;/msubsup&gt;&lt;mo&gt;⊆&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;S&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;i&lt;/mi&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;/math&gt;&lt;/span&gt; for every &lt;span&gt;&lt;math&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;mo&gt;≤&lt;/mo&gt;&lt;mi&gt;i&lt;/mi&gt;&lt;mo&gt;≤&lt;/mo&gt;&lt;mi&gt;n&lt;/mi&gt;&lt;/math&gt;&lt;/span&gt;, and (ii) each element of &lt;span&gt;&lt;math&gt;&lt;mi&gt;U&lt;/mi&gt;&lt;/math&gt;&lt;/span&gt; appears as many times in &lt;span&gt;&lt;math&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mi&gt;U&lt;/mi&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mi&gt;f&lt;/mi&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/math&gt;&lt;/span&gt; as in &lt;span&gt;&lt;math&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;msup&gt;&lt;mrow&gt;&lt;mi&gt;S&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mo&gt;′&lt;/mo&gt;&lt;/mrow&gt;&lt;/msup&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mi&gt;g&lt;/mi&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/math&gt;&lt;/span&gt;? We study this problem under an algorithmic viewpoint and provide diverse complexity results such as polynomial cases, &lt;span&gt;NP&lt;/span&gt;-hardness proofs and &lt;span&gt;FPT&lt;/span&gt; algorithms. We also study two variants of &lt;span&gt;ESM&lt;/span&gt;: (i) &lt;span&gt;Exclusive Exact Subset MultiCover&lt;/span&gt; (&lt;span&gt;EESM&lt;/span&gt;), which asks that each element of &lt;span&gt;&lt;math&gt;&lt;mi&gt;U&lt;/mi&gt;&lt;/math&gt;&lt;/span&gt; appears in exactly one subset &lt;span&gt;&lt;math&gt;&lt;msubsup&gt;&lt;mrow&gt;&lt;mi&gt;S&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;i&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mo&gt;′&lt;/mo&gt;&lt;/mro","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1024 ","pages":"Article 114936"},"PeriodicalIF":0.9,"publicationDate":"2024-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142578448","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Privacy in population protocols with probabilistic scheduling 具有概率调度功能的群体协议中的隐私问题
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-18 DOI: 10.1016/j.tcs.2024.114926
Talley Amir, James Aspnes
The population protocol model [2] offers a theoretical framework for designing and analyzing distributed algorithms among limited-resource mobile agents. While the original population protocol model considers the concept of anonymity, the issue of privacy is not investigated thoroughly. However, there is a need for time- and space-efficient privacy-preserving techniques in the population protocol model if these algorithms are to be implemented in settings handling sensitive data, such as sensor networks, IoT devices, and drones. In this work, we introduce several formal definitions of privacy, ranging from assuring only plausible deniability of the population input vector to having a full information-theoretic guarantee that knowledge beyond an agent's input and output bear no influence on the probability of a particular input vector. We then apply these definitions to both existing and novel protocols. We show that the Remainder-computing protocol from [9] (which is proven to satisfy output independent privacy under adversarial scheduling) is not information-theoretically private under probabilistic scheduling. In contrast, we provide a new algorithm and demonstrate that it correctly and information-theoretically privately computes Remainder under probabilistic scheduling.
人口协议模型 [2] 为设计和分析资源有限的移动代理之间的分布式算法提供了一个理论框架。虽然最初的群体协议模型考虑了匿名的概念,但对隐私问题的研究并不深入。然而,如果要在传感器网络、物联网设备和无人机等处理敏感数据的环境中实施这些算法,就需要在群体协议模型中采用具有时间和空间效率的隐私保护技术。在这项工作中,我们介绍了几种正式的隐私定义,从仅保证群体输入向量的可信可抵赖性,到完全的信息论保证,即代理的输入和输出以外的知识不会对特定输入向量的概率产生影响。然后,我们将这些定义应用于现有协议和新型协议。我们证明,[9] 中的余数计算协议(已被证明在对抗调度下满足输出独立隐私)在概率调度下不具有信息论上的隐私性。与此相反,我们提供了一种新算法,并证明它能在概率调度条件下正确地、从信息论角度私密地计算余数。
{"title":"Privacy in population protocols with probabilistic scheduling","authors":"Talley Amir,&nbsp;James Aspnes","doi":"10.1016/j.tcs.2024.114926","DOIUrl":"10.1016/j.tcs.2024.114926","url":null,"abstract":"<div><div>The population protocol model <span><span>[2]</span></span> offers a theoretical framework for designing and analyzing distributed algorithms among limited-resource mobile agents. While the original population protocol model considers the concept of anonymity, the issue of privacy is not investigated thoroughly. However, there is a need for time- and space-efficient privacy-preserving techniques in the population protocol model if these algorithms are to be implemented in settings handling sensitive data, such as sensor networks, IoT devices, and drones. In this work, we introduce several formal definitions of privacy, ranging from assuring only plausible deniability of the population input vector to having a full information-theoretic guarantee that knowledge beyond an agent's input and output bear no influence on the probability of a particular input vector. We then apply these definitions to both existing and novel protocols. We show that the <span>Remainder</span>-computing protocol from <span><span>[9]</span></span> (which is proven to satisfy output independent privacy under adversarial scheduling) is not information-theoretically private under probabilistic scheduling. In contrast, we provide a new algorithm and demonstrate that it correctly and information-theoretically privately computes <span>Remainder</span> under probabilistic scheduling.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1024 ","pages":"Article 114926"},"PeriodicalIF":0.9,"publicationDate":"2024-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142535252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enabling high reliability via matroidal connectivity and conditional matroidal connectivity on arrangement graph networks 通过排列图网络上的矩阵连通性和条件矩阵连通性实现高可靠性
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-18 DOI: 10.1016/j.tcs.2024.114927
Xiao-Yan Li , Zhaoding Lin , Hongbin Zhuang , Jou-Ming Chang
Connectivity indicators are commonly used to evaluate system fault tolerance and reliability. However, with the high demand for multi-processor systems in high-performance computing and data center networks, the number of processors is getting larger, and the network is getting more complex. Thus, traditional connectivity and other indicators are hardly competent in assessing the reliability of complex networks. The matroidal connectivity and conditional matroidal connectivity are novel connectivity metrics that measure the actual fault-tolerant capability based on the constraints of each network dimension. In this paper, we study matroidal connectivity and conditional matroidal connectivity of the (n,k)-arrangement graph network An,k from the natural perspective of the partition of edge dimension and obtain their theoretically accurate values. Moreover, we conduct numerical analysis to compare matroidal connectivity with other conditional edge connectivities in An,k. Additionally, we explore the distribution pattern of edge failure through simulation experiments in An,k and attain the relation of conditional matroidal connectivity related to network scales. Our investigations include two famous network classes: alternating group graphs and star graphs.
连接性指标通常用于评估系统容错性和可靠性。然而,随着高性能计算和数据中心网络对多处理器系统的高要求,处理器数量越来越多,网络也越来越复杂。因此,传统的连通性和其他指标很难胜任复杂网络的可靠性评估。矩阵连通性和条件矩阵连通性是一种新型的连通性指标,可根据网络各维度的约束条件来衡量实际的容错能力。本文从边维度划分的自然视角出发,研究了 (n,k) 排列图网络 An,k 的矩阵连通性和条件矩阵连通性,并得到了它们在理论上的精确值。此外,我们还进行了数值分析,比较了 An,k 中的矩阵连通性和其他条件边连通性。此外,我们还通过模拟实验探索了 An,k 中边缘失效的分布模式,并得出了条件矩阵连通性与网络规模的关系。我们的研究包括两类著名的网络:交替群图和星形图。
{"title":"Enabling high reliability via matroidal connectivity and conditional matroidal connectivity on arrangement graph networks","authors":"Xiao-Yan Li ,&nbsp;Zhaoding Lin ,&nbsp;Hongbin Zhuang ,&nbsp;Jou-Ming Chang","doi":"10.1016/j.tcs.2024.114927","DOIUrl":"10.1016/j.tcs.2024.114927","url":null,"abstract":"<div><div>Connectivity indicators are commonly used to evaluate system fault tolerance and reliability. However, with the high demand for multi-processor systems in high-performance computing and data center networks, the number of processors is getting larger, and the network is getting more complex. Thus, traditional connectivity and other indicators are hardly competent in assessing the reliability of complex networks. The matroidal connectivity and conditional matroidal connectivity are novel connectivity metrics that measure the actual fault-tolerant capability based on the constraints of each network dimension. In this paper, we study matroidal connectivity and conditional matroidal connectivity of the <span><math><mo>(</mo><mi>n</mi><mo>,</mo><mi>k</mi><mo>)</mo></math></span>-arrangement graph network <span><math><msub><mrow><mi>A</mi></mrow><mrow><mi>n</mi><mo>,</mo><mi>k</mi></mrow></msub></math></span> from the natural perspective of the partition of edge dimension and obtain their theoretically accurate values. Moreover, we conduct numerical analysis to compare matroidal connectivity with other conditional edge connectivities in <span><math><msub><mrow><mi>A</mi></mrow><mrow><mi>n</mi><mo>,</mo><mi>k</mi></mrow></msub></math></span>. Additionally, we explore the distribution pattern of edge failure through simulation experiments in <span><math><msub><mrow><mi>A</mi></mrow><mrow><mi>n</mi><mo>,</mo><mi>k</mi></mrow></msub></math></span> and attain the relation of conditional matroidal connectivity related to network scales. Our investigations include two famous network classes: alternating group graphs and star graphs.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1024 ","pages":"Article 114927"},"PeriodicalIF":0.9,"publicationDate":"2024-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142535253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On decision problems concerning contextual insertions and deletions 关于上下文插入和删除的决策问题
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-18 DOI: 10.1016/j.tcs.2024.114905
Oscar H. Ibarra , Ian McQuillan
The notions of stability, anti-stability, and error-correctability of a language that is modified by making contextual insertions in the words of the language were introduced in a previous paper by Bottoni et al. in 2011, where it was shown that these properties are decidable for regular languages. The authors proposed investigating the decidability of these properties for other classes of languages. Here, we derive necessary and sufficient conditions for a class of languages to have decidable stable, anti-stable, and error-correctable properties, and use these conditions to exhibit general classes of languages (strictly greater than the regular languages) for which the properties are decidable, and also simple classes (the first such classes) for which the properties are undecidable. We obtain identical results for the case when contextual deletions (instead of insertions) are made in the words of the language, and also with mixes of insertions and deletions. Our constructions also demonstrate that certain general problems involving nondeterministic generalized sequential machines (GSMs) applied to languages accepted by deterministic machine models are decidable, which is surprising as the deterministic language families do not need to be closed under GSM mappings.
博托尼等人在 2011 年发表的一篇论文中介绍了通过在语言单词中插入上下文来修改语言的稳定性、反稳定性和可纠错性等概念。作者提议研究这些特性对于其他语言类别的可解性。在此,我们推导出一类语言具有可判定的稳定、反稳定和纠错属性的必要条件和充分条件,并利用这些条件展示了这些属性可判定的一般语言类(严格大于常规语言),以及这些属性不可判定的简单语言类(第一类)。对于在语言的词语中进行上下文删除(而不是插入)的情况,以及插入和删除混合的情况,我们也得到了相同的结果。我们的构造还证明,某些涉及应用于确定性机器模型所接受的语言的非确定性广义序列机器(GSM)的一般问题是可解的,这令人惊讶,因为确定性语系并不需要在 GSM 映射下是封闭的。
{"title":"On decision problems concerning contextual insertions and deletions","authors":"Oscar H. Ibarra ,&nbsp;Ian McQuillan","doi":"10.1016/j.tcs.2024.114905","DOIUrl":"10.1016/j.tcs.2024.114905","url":null,"abstract":"<div><div>The notions of stability, anti-stability, and error-correctability of a language that is modified by making contextual insertions in the words of the language were introduced in a previous paper by Bottoni et al. in 2011, where it was shown that these properties are decidable for regular languages. The authors proposed investigating the decidability of these properties for other classes of languages. Here, we derive necessary and sufficient conditions for a class of languages to have decidable stable, anti-stable, and error-correctable properties, and use these conditions to exhibit general classes of languages (strictly greater than the regular languages) for which the properties are decidable, and also simple classes (the first such classes) for which the properties are undecidable. We obtain identical results for the case when contextual deletions (instead of insertions) are made in the words of the language, and also with mixes of insertions and deletions. Our constructions also demonstrate that certain general problems involving nondeterministic generalized sequential machines (<span><math><mtext>GSM</mtext></math></span>s) applied to languages accepted by deterministic machine models are decidable, which is surprising as the deterministic language families do not need to be closed under <span><math><mtext>GSM</mtext></math></span> mappings.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1024 ","pages":"Article 114905"},"PeriodicalIF":0.9,"publicationDate":"2024-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142535259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Connectivity and diagnosability of the complete Josephus cube networks under h-extra fault-tolerant model h-extra 容错模型下完整约瑟夫立方体网络的连通性和可诊断性
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-18 DOI: 10.1016/j.tcs.2024.114925
Zhaoman Huang , Mingzu Zhang , Chia-Wei Lee
The h-extra connectivity and the h-extra diagnosability are key parameters for evaluating the reliability and fault-tolerance of the interconnection networks of the multiprocessor systems, and play an important role in designing and maintaining interconnection networks. Recently, various self-diagnostic models have emerged to assess the fault-tolerance in interconnection networks. These interconnection networks are typically expressed by a connected graph G(V,E). For a non-complete graph G and h0, the h-extra cut signifies a vertex subset R of G, whose removal results in GR disconnected, with each remaining component containing at least h+1 vertices. And the h-extra connectivity of G is defined as the minimum cardinality of all h-extra cuts of G. The h-extra diagnosability for a graph G denotes the maximum number of detectable faulty vertices when focusing on these h-extra faulty sets only. The complete Josephus cube CJCn, a variant of Qn, exhibits superior properties compared to hypercube Qn, and also boasts higher connectivity. In this study, with the help of the exact value of the h-extra connectivity of CJCn, the explicit expression of h-extra diagnosability of CJCn under both the PMC model for n5 and 1hn32 and the MM* model for n5 and 2hn32 are identified to share the same value (h+1)n(h12)+1.
h-extra 连接性和 h-extra 可诊断性是评估多处理器系统互连网络可靠性和容错性的关键参数,在设计和维护互连网络中发挥着重要作用。最近,出现了各种自诊断模型来评估互连网络的容错性。这些互连网络通常由连通图 G(V,E) 表示。对于 h≥0 的非完整图 G,h-外切表示 G 的一个顶点子集 R,去除该子集后,G-R 断开,剩下的每个部分至少包含 h+1 个顶点。图 G 的 h-extra 连通性定义为 G 的所有 h-extra 切分的最小心数。图 G 的 h-extra 可诊断性表示只关注这些 h-extra 故障集时可检测到的最大故障顶点数。完整约瑟夫立方体 CJCn 是 Qn 的一种变体,与超立方体 Qn 相比具有更优越的特性,同时还拥有更高的连接性。在本研究中,借助 CJCn 的 h-extra 连接性的精确值,确定了在 n≥5 和 1≤h≤⌊n-32⌋ 的 PMC 模型以及 n≥5 和 2≤h≤⌊n-32⌋ 的 MM* 模型下,CJCn 的 h-extra 可诊断性的明确表达式具有相同的值(h+1)n-(h-12)+1。
{"title":"Connectivity and diagnosability of the complete Josephus cube networks under h-extra fault-tolerant model","authors":"Zhaoman Huang ,&nbsp;Mingzu Zhang ,&nbsp;Chia-Wei Lee","doi":"10.1016/j.tcs.2024.114925","DOIUrl":"10.1016/j.tcs.2024.114925","url":null,"abstract":"<div><div>The <em>h</em>-extra connectivity and the <em>h</em>-extra diagnosability are key parameters for evaluating the reliability and fault-tolerance of the interconnection networks of the multiprocessor systems, and play an important role in designing and maintaining interconnection networks. Recently, various self-diagnostic models have emerged to assess the fault-tolerance in interconnection networks. These interconnection networks are typically expressed by a connected graph <span><math><mi>G</mi><mo>(</mo><mi>V</mi><mo>,</mo><mi>E</mi><mo>)</mo></math></span>. For a non-complete graph <em>G</em> and <span><math><mi>h</mi><mo>≥</mo><mn>0</mn></math></span>, the <em>h</em>-extra cut signifies a vertex subset <em>R</em> of <em>G</em>, whose removal results in <span><math><mi>G</mi><mo>−</mo><mi>R</mi></math></span> disconnected, with each remaining component containing at least <span><math><mi>h</mi><mo>+</mo><mn>1</mn></math></span> vertices. And the <em>h</em>-extra connectivity of <em>G</em> is defined as the minimum cardinality of all <em>h</em>-extra cuts of <em>G</em>. The <em>h</em>-extra diagnosability for a graph <em>G</em> denotes the maximum number of detectable faulty vertices when focusing on these <em>h</em>-extra faulty sets only. The complete Josephus cube <span><math><mi>C</mi><mi>J</mi><msub><mrow><mi>C</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>, a variant of <span><math><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>, exhibits superior properties compared to hypercube <span><math><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>, and also boasts higher connectivity. In this study, with the help of the exact value of the <em>h</em>-extra connectivity of <span><math><mi>C</mi><mi>J</mi><msub><mrow><mi>C</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>, the explicit expression of <em>h</em>-extra diagnosability of <span><math><mi>C</mi><mi>J</mi><msub><mrow><mi>C</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span> under both the PMC model for <span><math><mi>n</mi><mo>≥</mo><mn>5</mn></math></span> and <span><math><mn>1</mn><mo>≤</mo><mi>h</mi><mo>≤</mo><mo>⌊</mo><mfrac><mrow><mi>n</mi><mo>−</mo><mn>3</mn></mrow><mrow><mn>2</mn></mrow></mfrac><mo>⌋</mo></math></span> and the MM* model for <span><math><mi>n</mi><mo>≥</mo><mn>5</mn></math></span> and <span><math><mn>2</mn><mo>≤</mo><mi>h</mi><mo>≤</mo><mo>⌊</mo><mfrac><mrow><mi>n</mi><mo>−</mo><mn>3</mn></mrow><mrow><mn>2</mn></mrow></mfrac><mo>⌋</mo></math></span> are identified to share the same value <span><math><mo>(</mo><mi>h</mi><mo>+</mo><mn>1</mn><mo>)</mo><mi>n</mi><mo>−</mo><mrow><mo>(</mo><mtable><mtr><mtd><mrow><mi>h</mi><mo>−</mo><mn>1</mn></mrow></mtd></mtr><mtr><mtd><mn>2</mn></mtd></mtr></mtable><mo>)</mo></mrow><mo>+</mo><mn>1</mn></math></span>.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1020 ","pages":"Article 114925"},"PeriodicalIF":0.9,"publicationDate":"2024-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142527261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tolerance to asynchrony in algorithms for multiplication and modulo 乘法和求模算法对异步的容忍度
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-18 DOI: 10.1016/j.tcs.2024.114914
Arya Tanmay Gupta, Sandeep S Kulkarni
In this article, we study some parallel processing algorithms for multiplication and modulo operations. We demonstrate that the state transitions that are formed under these algorithms satisfy lattice-linearity, where these algorithms induce a lattice among the global states. Lattice-linearity implies that these algorithms can be implemented in asynchronous environments, where the nodes are allowed to read old information from each other. It means that these algorithms are guaranteed to converge correctly without any synchronization overhead. These algorithms also exhibit snap-stabilizing properties, i.e., starting from an arbitrary state, the sequence of state transitions made by the system strictly follows its specification.
本文研究了一些乘法和模乘运算的并行处理算法。我们证明,在这些算法下形成的状态转换满足晶格线性,即这些算法在全局状态间诱导出一个晶格。晶格线性意味着这些算法可以在异步环境中实现,在异步环境中,节点之间可以互相读取旧信息。这意味着这些算法可以保证在没有任何同步开销的情况下正确收敛。这些算法还具有快速稳定特性,即从任意状态开始,系统的状态转换序列严格遵循其规范。
{"title":"Tolerance to asynchrony in algorithms for multiplication and modulo","authors":"Arya Tanmay Gupta,&nbsp;Sandeep S Kulkarni","doi":"10.1016/j.tcs.2024.114914","DOIUrl":"10.1016/j.tcs.2024.114914","url":null,"abstract":"<div><div>In this article, we study some parallel processing algorithms for multiplication and modulo operations. We demonstrate that the state transitions that are formed under these algorithms satisfy lattice-linearity, where these algorithms induce a lattice among the global states. Lattice-linearity implies that these algorithms can be implemented in asynchronous environments, where the nodes are allowed to read old information from each other. It means that these algorithms are guaranteed to converge correctly without any synchronization overhead. These algorithms also exhibit snap-stabilizing properties, i.e., starting from an arbitrary state, the sequence of state transitions made by the system strictly follows its specification.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1024 ","pages":"Article 114914"},"PeriodicalIF":0.9,"publicationDate":"2024-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142535255","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online coloring of disk graphs 磁盘图的在线着色
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-10-18 DOI: 10.1016/j.tcs.2024.114924
Joanna Chybowska-Sokół , Konstanty Junosza-Szaniawski
In this paper, we give a family of online algorithms for the classical coloring problem of intersection graphs of disks with bounded diameter. Our algorithms make use of a geometric representation of such graphs and are inspired by an algorithm of Fiala et al., but have better competitive ratios. The improvement comes from using two techniques of partitioning the set of vertices before coloring them. One of them is an application of a b-fold coloring of the plane. The method is more general and we show how it can be applied to coloring other shapes on the plane as well as adjust it for online L(2,1)-labeling.
本文针对直径有界的磁盘交集图的经典着色问题给出了一系列在线算法。我们的算法利用了此类图的几何表示法,并受到 Fiala 等人算法的启发,但具有更好的竞争比率。这种改进来自于在着色前使用了两种分割顶点集的技术。其中一种是平面 b 折叠着色的应用。这种方法更具通用性,我们展示了如何将其应用于平面上其他形状的着色,以及如何将其调整为在线 L(2,1)- 标记。
{"title":"Online coloring of disk graphs","authors":"Joanna Chybowska-Sokół ,&nbsp;Konstanty Junosza-Szaniawski","doi":"10.1016/j.tcs.2024.114924","DOIUrl":"10.1016/j.tcs.2024.114924","url":null,"abstract":"<div><div>In this paper, we give a family of online algorithms for the classical coloring problem of intersection graphs of disks with bounded diameter. Our algorithms make use of a geometric representation of such graphs and are inspired by an algorithm of Fiala et al., but have better competitive ratios. The improvement comes from using two techniques of partitioning the set of vertices before coloring them. One of them is an application of a <em>b</em>-fold coloring of the plane. The method is more general and we show how it can be applied to coloring other shapes on the plane as well as adjust it for online <span><math><mi>L</mi><mo>(</mo><mn>2</mn><mo>,</mo><mn>1</mn><mo>)</mo></math></span>-labeling.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1020 ","pages":"Article 114924"},"PeriodicalIF":0.9,"publicationDate":"2024-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142527262","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Theoretical Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1