首页 > 最新文献

Theoretical Computer Science最新文献

英文 中文
On balance properties of hypercubic billiard words 超立方台球词的平衡性质
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-11 DOI: 10.1016/j.tcs.2026.115754
Nicolas Bédaride , Valérie Berthé , Antoine Julien
This paper studies balance properties for billiard words. Billiard words generalize Sturmian words by coding trajectories in hypercubic billiards. In the setting of aperiodic order, they also provide the simplest examples of quasicrystals, as tilings of the line obtained via cut and project sets with a cubical canonical window. By construction, the number of occurrences of each letter in a factor (i.e., a string of consecutive letters) of a hypercubic billiard word only depends on the length of the factor, up to an additive constant. In other words, the difference of the number of occurrences of each letter in factors of the same length is bounded. In contrast with the behaviour of letters, we prove the existence of factors that are not balanced in billiard words: the difference of the number of occurrences of such unbalanced factors in longer factors of the same length is unbounded. The proof relies both on topological methods inspired by tiling cohomology and on arithmetic results on bounded remainder sets for toral translations.
本文研究了台球词的平衡性质。台球词通过对超立方台球中的轨迹进行编码来推广Sturmian词。在非周期顺序的设置中,它们也提供了准晶体的最简单的例子,作为通过具有立方体规范窗口的切割和投影集获得的线的平铺。通过构造,一个超立方台球单词的一个因子(即一串连续的字母)中每个字母出现的次数只取决于因子的长度,直到一个附加常数。换句话说,相同长度的因子中每个字母出现的次数之差是有限的。与字母的行为相反,我们证明了台球词中不平衡因素的存在:这种不平衡因素在相同长度的较长因素中出现的次数之差是无界的。该证明既依赖于由平铺上同调启发的拓扑方法,也依赖于总平移的有界剩余集上的算术结果。
{"title":"On balance properties of hypercubic billiard words","authors":"Nicolas Bédaride ,&nbsp;Valérie Berthé ,&nbsp;Antoine Julien","doi":"10.1016/j.tcs.2026.115754","DOIUrl":"10.1016/j.tcs.2026.115754","url":null,"abstract":"<div><div>This paper studies balance properties for billiard words. Billiard words generalize Sturmian words by coding trajectories in hypercubic billiards. In the setting of aperiodic order, they also provide the simplest examples of quasicrystals, as tilings of the line obtained via cut and project sets with a cubical canonical window. By construction, the number of occurrences of each letter in a factor (i.e., a string of consecutive letters) of a hypercubic billiard word only depends on the length of the factor, up to an additive constant. In other words, the difference of the number of occurrences of each letter in factors of the same length is bounded. In contrast with the behaviour of letters, we prove the existence of factors that are not balanced in billiard words: the difference of the number of occurrences of such unbalanced factors in longer factors of the same length is unbounded. The proof relies both on topological methods inspired by tiling cohomology and on arithmetic results on bounded remainder sets for toral translations.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1066 ","pages":"Article 115754"},"PeriodicalIF":1.0,"publicationDate":"2026-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145980986","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A textbook solution for dynamic strings 一个教科书式的动态字符串解决方案
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-11 DOI: 10.1016/j.tcs.2026.115746
Zsuzsanna Lipták , Francesco Masillo , Gonzalo Navarro
We consider the problem of maintaining a collection of strings while efficiently supporting splits and concatenations on them, as well as comparing two substrings, and computing the longest common prefix between two suffixes. This problem can be solved in optimal time O(logN) whp for the updates and O(1) worst-case time for the queries, where N is the total collection size [Gawrychowski et al., SODA 2018]. We present here a much simpler solution based on a forest of enhanced splay trees (FeST), where both the updates and the substring comparison take O(logn) amortized time, n being the sum of the lengths of the strings involved in the operation. The length ℓ of the longest common prefix is computed in O(logn+log2) amortized time. Our query results are correct whp. Our simpler solution enables other more general updates in O(logn) amortized time, such as reversing a substring and/or mapping its symbols. We can also make FeST use compact space, and extend it to regard substrings as circular or as their omega extension. A C++-implementation of our FeST data structure is available at https://github.com/fmasillo/FeST.
我们考虑了在有效支持分割和连接的同时维护字符串集合的问题,以及比较两个子字符串和计算两个后缀之间最长的公共前缀的问题。这个问题可以在更新的最优时间O(logN) whp和查询的最坏时间O(1)内解决,其中N是总集合大小[Gawrychowski等人,SODA 2018]。我们在这里提出了一个更简单的解决方案,基于增强的扩展树森林(FeST),其中更新和子字符串比较都需要O(logn)平摊时间,n是操作中涉及的字符串长度的总和。最长公共前缀的长度在O(logn+log2)平摊时间内计算。我们的查询结果是正确的。我们更简单的解决方案支持在O(logn)平摊时间内进行其他更一般的更新,例如反转子字符串和/或映射其符号。我们还可以使FeST使用紧空间,并将其扩展为将子字符串视为圆形或它们的扩展。我们的FeST数据结构的c++实现可从https://github.com/fmasillo/FeST获得。
{"title":"A textbook solution for dynamic strings","authors":"Zsuzsanna Lipták ,&nbsp;Francesco Masillo ,&nbsp;Gonzalo Navarro","doi":"10.1016/j.tcs.2026.115746","DOIUrl":"10.1016/j.tcs.2026.115746","url":null,"abstract":"<div><div>We consider the problem of maintaining a collection of strings while efficiently supporting splits and concatenations on them, as well as comparing two substrings, and computing the longest common prefix between two suffixes. This problem can be solved in optimal time <span><math><mrow><mi>O</mi><mo>(</mo><mi>log</mi><mi>N</mi><mo>)</mo></mrow></math></span> whp for the updates and <span><math><mrow><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></mrow></math></span> worst-case time for the queries, where <em>N</em> is the total collection size [Gawrychowski et al., SODA 2018]. We present here a much simpler solution based on a forest of enhanced splay trees (FeST), where both the updates and the substring comparison take <span><math><mrow><mi>O</mi><mo>(</mo><mi>log</mi><mi>n</mi><mo>)</mo></mrow></math></span> amortized time, <em>n</em> being the sum of the lengths of the strings involved in the operation. The length ℓ of the longest common prefix is computed in <span><math><mrow><mi>O</mi><mo>(</mo><mi>log</mi><mi>n</mi><mo>+</mo><msup><mi>log</mi><mn>2</mn></msup><mi>ℓ</mi><mo>)</mo></mrow></math></span> amortized time. Our query results are correct whp. Our simpler solution enables other more general updates in <span><math><mrow><mi>O</mi><mo>(</mo><mi>log</mi><mi>n</mi><mo>)</mo></mrow></math></span> amortized time, such as reversing a substring and/or mapping its symbols. We can also make FeST use compact space, and extend it to regard substrings as circular or as their omega extension. A <span>C++</span>-implementation of our FeST data structure is available at <span><span>https://github.com/fmasillo/FeST</span><svg><path></path></svg></span>.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1066 ","pages":"Article 115746"},"PeriodicalIF":1.0,"publicationDate":"2026-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146078801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Internal quasiperiod queries 内部准周期查询
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-09 DOI: 10.1016/j.tcs.2026.115747
Maxime Crochemore , Costas S. Iliopoulos , Jakub Radoszewski , Wojciech Rytter , Juliusz Straszyński , Tomasz Waleń , Wiktor Zuba
Internal pattern matching requires one to answer queries about factors of a given string. Many results are known on answering internal period queries, asking for the periods of a given factor. In this paper we investigate internal queries asking for covers (also known as quasiperiods) of a given factor. Let n denote the length of the string and m denote the length of the factor in question. We propose a data structure that answers such queries in O(logm) time for the shortest cover and in O(logmloglogm) time for a representation of all the covers, after O(nlogn) time and space preprocessing.
This is a full version of a conference paper at SPIRE 2020 with query complexities improved by a log log n-factor and additional applications.
内部模式匹配要求回答关于给定字符串的因素的查询。在回答内部周期查询(要求给定因子的周期)时,可以知道许多结果。在本文中,我们研究了要求给定因子的覆盖(也称为准周期)的内部查询。设n表示字符串的长度,m表示所讨论的因子的长度。我们提出了一种数据结构,在经过O(nlogn)时间和空间预处理后,在O(loglogm)时间内回答最短覆盖的查询,在O(logloggm)时间内回答所有覆盖的表示。这是SPIRE 2020会议论文的完整版本,查询复杂性通过log log n因子和其他应用程序得到了改进。
{"title":"Internal quasiperiod queries","authors":"Maxime Crochemore ,&nbsp;Costas S. Iliopoulos ,&nbsp;Jakub Radoszewski ,&nbsp;Wojciech Rytter ,&nbsp;Juliusz Straszyński ,&nbsp;Tomasz Waleń ,&nbsp;Wiktor Zuba","doi":"10.1016/j.tcs.2026.115747","DOIUrl":"10.1016/j.tcs.2026.115747","url":null,"abstract":"<div><div>Internal pattern matching requires one to answer queries about factors of a given string. Many results are known on answering internal period queries, asking for the periods of a given factor. In this paper we investigate internal queries asking for covers (also known as quasiperiods) of a given factor. Let <em>n</em> denote the length of the string and <em>m</em> denote the length of the factor in question. We propose a data structure that answers such queries in <span><math><mrow><mi>O</mi><mo>(</mo><mi>log</mi><mi>m</mi><mo>)</mo></mrow></math></span> time for the shortest cover and in <span><math><mrow><mi>O</mi><mo>(</mo><mi>log</mi><mi>m</mi><mi>log</mi><mi>log</mi><mi>m</mi><mo>)</mo></mrow></math></span> time for a representation of all the covers, after <span><math><mrow><mi>O</mi><mo>(</mo><mi>n</mi><mi>log</mi><mi>n</mi><mo>)</mo></mrow></math></span> time and space preprocessing.</div><div>This is a full version of a conference paper at SPIRE 2020 with query complexities improved by a log log <em>n</em>-factor and additional applications.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1066 ","pages":"Article 115747"},"PeriodicalIF":1.0,"publicationDate":"2026-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145980990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Public-key encryption with filtered equality test against adaptive chosen-ciphertext attacks 针对自适应选择密文攻击的公钥加密过滤等式检验
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-07 DOI: 10.1016/j.tcs.2026.115744
Zi-Yuan Liu , Masahiro Mambo , Raylin Tso , Yi-Fan Tseng
In this study, we revisit the cryptosystem termed public-key encryption with filtered equality test (PKEFET), originally devised by Huang et al. (J. Comput. Syst. Sci. 2017) and subsequently refined by Chen et al. (Des. Codes Cryptogr. 2021). This notion allows users to delegate the equality test functionality of ciphertexts to a tester, but only for ciphertexts associated with a selected message set. More specifically, consider two ciphertexts related to plaintexts m and m′, along with their respective tokens related to two plaintext sets m and m′. Assuming m ∈ m and m′ ∈ m′ hold simultaneously, then any tester has the ability to determine if the ciphertexts are associated with an identical plaintext (i.e., m=m). With this functionality, PKEFET is valuable in applications such as encrypted data search and spam filtering. However, there exist several challenges in the current PKEFET schemes, such as: (i) security is limited to indistinguishability against “non-adaptive” chosen-ciphertext attacks (CCA1) and (ii) the computational and storage complexities scale linearly with the maximum number of plaintexts that a token can authenticate. To address these challenges, by employing public-key encryption and key-policy attribute-based encryption (KPABE) supporting OR-gate policies as the foundational building blocks, we propose a generic construction of PKEFET. In particular, we show that the required KPABE can be obtained from identity-based encryption. We demonstrate that the proposed construction satisfies one-wayness and indistinguishability under strong filtered equality test against adaptive chosen-ciphertext attacks (CCA2). Moreover, the resulting scheme has significant computational and storage complexity advantages compared to existing PKEFET schemes.
在本研究中,我们重新审视了由Huang等人最初设计的带有过滤等式检验的公钥加密(PKEFET)密码系统。系统。Sci. 2017),随后由Chen等人改进(Des. Codes Cryptogr. 2021)。这个概念允许用户将密文的相等性测试功能委托给测试人员,但仅限于与选定消息集相关联的密文。更具体地说,考虑与明文m和m ‘相关的两个密文,以及与两个明文集m和m ’相关的各自的令牌。假设m ∈ m和m ‘ ∈ m ’同时成立,那么任何测试人员都有能力确定密文是否与相同的明文相关联(即m=m ')。有了这个功能,PKEFET在加密数据搜索和垃圾邮件过滤等应用程序中很有价值。然而,目前的PKEFET方案存在一些挑战,例如:(i)安全性仅限于对“非自适应”选择密文攻击(CCA1)的不可区分性;(ii)计算和存储复杂性与令牌可以认证的明文的最大数量呈线性增长。为了解决这些挑战,我们采用支持or门策略的公钥加密和基于密钥策略属性的加密(KPABE)作为基础构建块,提出了PKEFET的通用结构。特别地,我们展示了可以通过基于身份的加密获得所需的KPABE。在强过滤等式检验下,我们证明了该构造在抗自适应选择密文攻击(CCA2)中满足单向性和不可区分性。此外,与现有的PKEFET方案相比,该方案具有显著的计算和存储复杂度优势。
{"title":"Public-key encryption with filtered equality test against adaptive chosen-ciphertext attacks","authors":"Zi-Yuan Liu ,&nbsp;Masahiro Mambo ,&nbsp;Raylin Tso ,&nbsp;Yi-Fan Tseng","doi":"10.1016/j.tcs.2026.115744","DOIUrl":"10.1016/j.tcs.2026.115744","url":null,"abstract":"<div><div>In this study, we revisit the cryptosystem termed public-key encryption with filtered equality test (PKEFET), originally devised by Huang et al. (<em>J. Comput. Syst. Sci.</em> 2017) and subsequently refined by Chen et al. (<em>Des. Codes Cryptogr.</em> 2021). This notion allows users to delegate the equality test functionality of ciphertexts to a tester, but only for ciphertexts associated with a selected message set. More specifically, consider two ciphertexts related to plaintexts <em>m</em> and <em>m</em>′, along with their respective tokens related to two plaintext sets <strong><em>m</em></strong> and <strong><em>m</em></strong>′. Assuming <em>m</em> ∈ <strong><em>m</em></strong> and <em>m</em>′ ∈ <strong><em>m</em></strong>′ hold simultaneously, then any tester has the ability to determine if the ciphertexts are associated with an identical plaintext (i.e., <span><math><mrow><mi>m</mi><mo>=</mo><msup><mi>m</mi><mo>′</mo></msup></mrow></math></span>). With this functionality, PKEFET is valuable in applications such as encrypted data search and spam filtering. However, there exist several challenges in the current PKEFET schemes, such as: (i) security is limited to indistinguishability against “non-adaptive” chosen-ciphertext attacks (CCA1) and (ii) the computational and storage complexities scale linearly with the maximum number of plaintexts that a token can authenticate. To address these challenges, by employing public-key encryption and key-policy attribute-based encryption (KPABE) supporting OR-gate policies as the foundational building blocks, we propose a generic construction of PKEFET. In particular, we show that the required KPABE can be obtained from identity-based encryption. We demonstrate that the proposed construction satisfies one-wayness and indistinguishability under strong filtered equality test against adaptive chosen-ciphertext attacks (CCA2). Moreover, the resulting scheme has significant computational and storage complexity advantages compared to existing PKEFET schemes.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1067 ","pages":"Article 115744"},"PeriodicalIF":1.0,"publicationDate":"2026-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146080049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quadratic truncated rotation symmetric Boolean functions 二次截断旋转对称布尔函数
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-07 DOI: 10.1016/j.tcs.2026.115743
Thomas W. Cusick , Younhwan Cheon
A Boolean function gn in n variables is rotation symmetric (RS) if it is invariant under powers of ρ(x1,,xn)=(x2,,xn,x1). An RS function is monomial rotation symmetric (MRS) if it is generated by applying powers of ρ to a single monomial, say x1xa(2)xa(d), where d is the degree of the function. An MRS function in n variables is called truncated rotation symmetric (TRS) if the function stops the expansion for the n-variable MRS function at the term where xn first occurs. Truncated functions are important because they are used in the computation of linear recursions which the weights of any RS functions are known to satisfy. Computing these recursions in general is very complex. This paper proves that for the quadratic TRS functions, an explicit formula for the generating function for the weights can be proved. This removes the need for the complex computation and makes the weight computation much simpler.
有n个变量的布尔函数gn是旋转对称的(RS),如果它在ρ(x1,…,xn)=(x2,…,xn,x1)的幂下不变。一个RS函数是单项式旋转对称(MRS),如果它是通过对单个单项式应用ρ的幂产生的,比如x1xa(2)…xa(d),其中d是函数的度。如果函数在xn第一次出现的项处停止n变量MRS函数的展开,则n变量MRS函数称为截断旋转对称(TRS)。截断函数很重要,因为它们用于计算任何已知RS函数的权值都满足的线性递归。一般来说,计算这些递归是非常复杂的。证明了二次型TRS函数的权值生成函数的显式公式。这消除了对复杂计算的需要,并使权重计算变得简单得多。
{"title":"Quadratic truncated rotation symmetric Boolean functions","authors":"Thomas W. Cusick ,&nbsp;Younhwan Cheon","doi":"10.1016/j.tcs.2026.115743","DOIUrl":"10.1016/j.tcs.2026.115743","url":null,"abstract":"<div><div>A Boolean function <em>g<sub>n</sub></em> in <em>n</em> variables is rotation symmetric (RS) if it is invariant under powers of <span><math><mrow><mi>ρ</mi><mrow><mo>(</mo><msub><mi>x</mi><mn>1</mn></msub><mo>,</mo><mo>…</mo><mo>,</mo><msub><mi>x</mi><mi>n</mi></msub><mo>)</mo></mrow><mo>=</mo><mrow><mo>(</mo><msub><mi>x</mi><mn>2</mn></msub><mo>,</mo><mo>…</mo><mo>,</mo><msub><mi>x</mi><mi>n</mi></msub><mo>,</mo><msub><mi>x</mi><mn>1</mn></msub><mo>)</mo></mrow></mrow></math></span>. An RS function is monomial rotation symmetric (MRS) if it is generated by applying powers of <em>ρ</em> to a single monomial, say <span><math><mrow><msub><mi>x</mi><mn>1</mn></msub><msub><mi>x</mi><mrow><mi>a</mi><mo>(</mo><mn>2</mn><mo>)</mo></mrow></msub><mo>…</mo><msub><mi>x</mi><mrow><mi>a</mi><mo>(</mo><mi>d</mi><mo>)</mo></mrow></msub><mo>,</mo></mrow></math></span> where <em>d</em> is the degree of the function. An MRS function in <em>n</em> variables is called truncated rotation symmetric (TRS) if the function stops the expansion for the <em>n</em>-variable MRS function at the term where <em>x<sub>n</sub></em> first occurs. Truncated functions are important because they are used in the computation of linear recursions which the weights of any RS functions are known to satisfy. Computing these recursions in general is very complex. This paper proves that for the quadratic TRS functions, an explicit formula for the generating function for the weights can be proved. This removes the need for the complex computation and makes the weight computation much simpler.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1066 ","pages":"Article 115743"},"PeriodicalIF":1.0,"publicationDate":"2026-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145928841","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Strategy-proof budgeting via a VCG-like mechanism 通过类似vcg的机制进行无策略预算
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-03 DOI: 10.1016/j.tcs.2025.115720
Jonathan Wagner, Reshef Meir
We present a strategy-proof public goods budgeting mechanism where agents determine both the total volume of expanses and the specific allocation. It is constructed as a modification of VCG to a non-typical environment, namely where we do not assume quasi-linear utilities nor direct revelation. We further show that under plausible assumptions it satisfies strategyproofness in strictly dominant strategies, and consequently implements the social optimum as a Coalition-Proof Nash Equilibrium. A primary (albeit not an exclusive) motivation of our model is Participatory Budgeting, where members of a community collectively decide the spending policy of public tax dollars. While incentives alignment in our mechanism, as in classic VCG, is achieved via individual payments we charge from agents, in a PB context that seems unreasonable. Our second main result thus provides that, under further specifications relevant in that context, these payments will vanish in large populations. In the last section we expand the mechanism’s definition to a class of mechanisms in which the designer can prioritize certain outcomes she sees as desirable. In particular we give the example of favoring equitable/egalitarian allocations.
我们提出了一种不受策略约束的公共产品预算机制,在这种机制中,代理人既决定扩张的总量,也决定具体的分配。它是作为VCG对非典型环境的修改而构建的,即我们不假设拟线性效用或直接启示。我们进一步证明,在合理的假设下,它满足严格优势策略的策略证明性,从而实现社会最优作为防联盟纳什均衡。我们模型的主要(尽管不是唯一)动机是参与式预算,即社区成员集体决定公共税收的支出政策。虽然在我们的机制中,如在经典的VCG中,激励机制是通过我们向代理商收取的个人费用来实现的,但在PB环境中,这似乎是不合理的。因此,我们的第二个主要结果是,根据与此有关的进一步规范,这些付款将在大量人口中消失。在最后一节中,我们将机制的定义扩展为一类机制,在这些机制中,设计师可以优先考虑她认为理想的某些结果。我们特别举出赞成公平/平等分配的例子。
{"title":"Strategy-proof budgeting via a VCG-like mechanism","authors":"Jonathan Wagner,&nbsp;Reshef Meir","doi":"10.1016/j.tcs.2025.115720","DOIUrl":"10.1016/j.tcs.2025.115720","url":null,"abstract":"<div><div>We present a strategy-proof public goods budgeting mechanism where agents determine both the total volume of expanses and the specific allocation. It is constructed as a modification of VCG to a non-typical environment, namely where we do not assume quasi-linear utilities nor direct revelation. We further show that under plausible assumptions it satisfies strategyproofness in strictly dominant strategies, and consequently implements the social optimum as a Coalition-Proof Nash Equilibrium. A primary (albeit not an exclusive) motivation of our model is Participatory Budgeting, where members of a community collectively decide the spending policy of public tax dollars. While incentives alignment in our mechanism, as in classic VCG, is achieved via individual payments we charge from agents, in a PB context that seems unreasonable. Our second main result thus provides that, under further specifications relevant in that context, these payments will vanish in large populations. In the last section we expand the mechanism’s definition to a class of mechanisms in which the designer can prioritize certain outcomes she sees as desirable. In particular we give the example of favoring equitable/egalitarian allocations.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1067 ","pages":"Article 115720"},"PeriodicalIF":1.0,"publicationDate":"2026-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146039653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Guest editorial - Fun with algorithms 2024 客座编辑- 2024年算法的乐趣
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-03 DOI: 10.1016/j.tcs.2026.115742
Paolo Boldi , Giuseppe Prencipe , Tami Tamir
{"title":"Guest editorial - Fun with algorithms 2024","authors":"Paolo Boldi ,&nbsp;Giuseppe Prencipe ,&nbsp;Tami Tamir","doi":"10.1016/j.tcs.2026.115742","DOIUrl":"10.1016/j.tcs.2026.115742","url":null,"abstract":"","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1065 ","pages":"Article 115742"},"PeriodicalIF":1.0,"publicationDate":"2026-01-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145979004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The category of H-posets h -集的范畴
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-02 DOI: 10.1016/j.tcs.2025.115725
Xiangping Chu, Qingguo Li
In this paper, we investigate the product of H-posets and their function spaces. Our main result establishes that the function space [X → Y], consisting of all Scott continuous functions from X to Y, is an H-poset when X is a continuous poset and Y is an H-poset with a smallest element. This finding generalizes earlier results reported by Kou, Liu, and Luo. Building on these insights, we derive a cartesian closed full subcategory of posets and Scott continuous functions. Additionally, we prove that the finite product of meet continuous H-posets remains a meet continuous H-poset.
本文研究了h -偏集及其函数空间的积。我们的主要结果证明,当X是连续偏序集,Y是最小元素的h偏序集时,由X到Y的所有Scott连续函数组成的函数空间[X → Y]是一个h偏序集。这一发现概括了之前由Kou、Liu和Luo报道的结果。在这些见解的基础上,我们推导出了偏置集和斯科特连续函数的笛卡儿闭完整子范畴。此外,我们证明了满足连续h -偏集的有限积仍然是满足连续h -偏集。
{"title":"The category of H-posets","authors":"Xiangping Chu,&nbsp;Qingguo Li","doi":"10.1016/j.tcs.2025.115725","DOIUrl":"10.1016/j.tcs.2025.115725","url":null,"abstract":"<div><div>In this paper, we investigate the product of <em>H</em>-posets and their function spaces. Our main result establishes that the function space [<em>X</em> → <em>Y</em>], consisting of all Scott continuous functions from <em>X</em> to <em>Y</em>, is an <em>H</em>-poset when <em>X</em> is a continuous poset and <em>Y</em> is an <em>H</em>-poset with a smallest element. This finding generalizes earlier results reported by Kou, Liu, and Luo. Building on these insights, we derive a cartesian closed full subcategory of posets and Scott continuous functions. Additionally, we prove that the finite product of meet continuous <em>H</em>-posets remains a meet continuous <em>H</em>-poset.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1066 ","pages":"Article 115725"},"PeriodicalIF":1.0,"publicationDate":"2026-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145908870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the detection of local and global amoebas: Theoretical insights and practical algorithms 关于局部和全局阿米巴虫的检测:理论见解和实用算法
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-02 DOI: 10.1016/j.tcs.2025.115730
Marcos E. González Laffitte , René González-Martínez , Amanda Montejano
We study local and global amoebas, which are graphs that have unique properties with respect to interpolation techniques in graphs. Our work includes a proof that almost every graph is not an amoeba, and the identification of a special type of edge-replacement called weird-edge-replacements. Additionally, we provide an infinite family of trees that are both weird local and global amoebas. Our contributions extend to the development and implementation of several algorithms for detecting local and global amoebas, which are made available in a public repository along with multiple examples.
我们研究了局部和全局阿米巴,它们是在图的插值技术方面具有独特性质的图。我们的工作包括证明几乎每个图都不是变形虫,以及识别一种特殊类型的边替换称为奇异边替换。此外,我们提供了一个无限的树家族,既有奇怪的本地变形虫,也有全球变形虫。我们的贡献扩展到开发和实现用于检测本地和全局阿米巴虫的几种算法,这些算法与多个示例一起在公共存储库中提供。
{"title":"On the detection of local and global amoebas: Theoretical insights and practical algorithms","authors":"Marcos E. González Laffitte ,&nbsp;René González-Martínez ,&nbsp;Amanda Montejano","doi":"10.1016/j.tcs.2025.115730","DOIUrl":"10.1016/j.tcs.2025.115730","url":null,"abstract":"<div><div>We study local and global amoebas, which are graphs that have unique properties with respect to interpolation techniques in graphs. Our work includes a proof that almost every graph is not an amoeba, and the identification of a special type of edge-replacement called weird-edge-replacements. Additionally, we provide an infinite family of trees that are both weird local and global amoebas. Our contributions extend to the development and implementation of several algorithms for detecting local and global amoebas, which are made available in a public repository along with multiple examples.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1066 ","pages":"Article 115730"},"PeriodicalIF":1.0,"publicationDate":"2026-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145928840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Completely independent spanning trees in the line graph of complete multipartite graphs 完全多部图的线形图中的完全独立生成树
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-02 DOI: 10.1016/j.tcs.2025.115741
Hao Wang, Yan Wang, Baolei Cheng, Jianxi Fan
Spanning trees T1,T2,,Tt are completely independent spanning trees (CISTs) if and only if they are edge-disjoint and each node is internal in at most one tree. CISTs have a wide range of applications in routing protection, data transmission, etc., and can improve reliability, fault tolerance, and information security. Line graphs have received increasing attention in recent years for the construction of multiple CISTs, as they are more likely to satisfy the structural conditions required for their existence. This paper introduces an algorithm for constructing multiple CISTs in the line graph of the complete tripartite graph Kn3,n2,n1 (denoted by L(Kn3,n2,n1)), using multiple two-dimensional matrices to guide the construction process. Furthermore, it presents a method for constructing multiple CISTs in the line graph of the complete multipartite graph Knφ,nφ1,,n1 (denoted by L(Knφ,nφ1,,n1), when φ ≥ 4), utilizing edge-disjoint Hamiltonian cycles of the complete graph. In our simulation study, we employed multiple CISTs as transmission paths and compared their performance with shortest-path routing in terms of transmission latency and resilience to node failures.
生成树T1,T2,…,Tt是完全独立的生成树(cist),当且仅当它们是边不相交的,且每个节点最多在一个树的内部。cist在路由保护、数据传输等方面有着广泛的应用,可以提高可靠性、容错能力和信息安全性。近年来,线形图在构建多个cist方面受到越来越多的关注,因为它们更有可能满足其存在所需的结构条件。本文介绍了一种在完全三部图Kn3,n2,n1(记为L(Kn3,n2,n1))的线形图中构造多个cist的算法,该算法利用多个二维矩阵来指导构造过程。在此基础上,提出了利用完备图的边不相交哈密顿环,在完备多部图Knφ,nφ−1,…,n1(当φ ≥ 4时,记为L(Knφ,nφ−1,…,n1)的线图中构造多个cist的方法。在我们的模拟研究中,我们采用了多个cist作为传输路径,并比较了它们在传输延迟和节点故障恢复方面与最短路径路由的性能。
{"title":"Completely independent spanning trees in the line graph of complete multipartite graphs","authors":"Hao Wang,&nbsp;Yan Wang,&nbsp;Baolei Cheng,&nbsp;Jianxi Fan","doi":"10.1016/j.tcs.2025.115741","DOIUrl":"10.1016/j.tcs.2025.115741","url":null,"abstract":"<div><div>Spanning trees <span><math><mrow><msub><mi>T</mi><mn>1</mn></msub><mo>,</mo><msub><mi>T</mi><mn>2</mn></msub><mo>,</mo><mo>…</mo><mo>,</mo><msub><mi>T</mi><mi>t</mi></msub></mrow></math></span> are completely independent spanning trees (CISTs) if and only if they are edge-disjoint and each node is internal in at most one tree. CISTs have a wide range of applications in routing protection, data transmission, etc., and can improve reliability, fault tolerance, and information security. Line graphs have received increasing attention in recent years for the construction of multiple CISTs, as they are more likely to satisfy the structural conditions required for their existence. This paper introduces an algorithm for constructing multiple CISTs in the line graph of the complete tripartite graph <span><math><msub><mi>K</mi><mrow><msub><mi>n</mi><mn>3</mn></msub><mo>,</mo><msub><mi>n</mi><mn>2</mn></msub><mo>,</mo><msub><mi>n</mi><mn>1</mn></msub></mrow></msub></math></span> (denoted by <span><math><mrow><mi>L</mi><mo>(</mo><msub><mi>K</mi><mrow><msub><mi>n</mi><mn>3</mn></msub><mo>,</mo><msub><mi>n</mi><mn>2</mn></msub><mo>,</mo><msub><mi>n</mi><mn>1</mn></msub></mrow></msub><mo>)</mo></mrow></math></span>), using multiple two-dimensional matrices to guide the construction process. Furthermore, it presents a method for constructing multiple CISTs in the line graph of the complete multipartite graph <span><math><msub><mi>K</mi><mrow><msub><mi>n</mi><mi>φ</mi></msub><mo>,</mo><msub><mi>n</mi><mrow><mi>φ</mi><mo>−</mo><mn>1</mn></mrow></msub><mo>,</mo><mo>…</mo><mo>,</mo><msub><mi>n</mi><mn>1</mn></msub></mrow></msub></math></span> (denoted by <span><math><mrow><mi>L</mi><mo>(</mo><msub><mi>K</mi><mrow><msub><mi>n</mi><mi>φ</mi></msub><mo>,</mo><msub><mi>n</mi><mrow><mi>φ</mi><mo>−</mo><mn>1</mn></mrow></msub><mo>,</mo><mo>…</mo><mo>,</mo><msub><mi>n</mi><mn>1</mn></msub></mrow></msub><mo>)</mo></mrow></math></span>, when φ ≥ 4), utilizing edge-disjoint Hamiltonian cycles of the complete graph. In our simulation study, we employed multiple CISTs as transmission paths and compared their performance with shortest-path routing in terms of transmission latency and resilience to node failures.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1066 ","pages":"Article 115741"},"PeriodicalIF":1.0,"publicationDate":"2026-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145928842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Theoretical Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1