Pub Date : 2024-10-18DOI: 10.1016/j.tcs.2024.114929
Jayashree Dey, Ratna Dutta
The rapid advancement of computer networks has led to an increase in the exposure of messages within an open environment (cloud). Therefore, the confidentiality of the user's signing information is extremely essential to handle unauthorized access and alterations. Attribute-based signature (ABS) scheme is a significant primitive that ensures the privacy of the user's signing information. To endorse a message, the signer can generate a signature with his/her attributes that satisfy a policy without revealing any other information. Post-quantum attribute-based signature schemes are attractive construction options whose safety do not collapse in presence of quantum computers. This article presents the first attribute-based signature scheme in multivariate quadratic (MQ) setting. To generate the secret signing key, the salted-UOV technique is employed in our protocol. While signing, the well-known 3-pass identification protocol is coupled with the Fiat-Shamir transformation. More positively, our candidate relies on presenting the policy as a monotone span program. We also study existential unforgeability and the perfect privacy feature which ensures that a signature cannot be linked to any signing information. Moreover, our scheme is compact in the sense that it performs efficiently in terms of storage when contrasted to the existing post-quantum attribute-based signature schemes.
{"title":"Privacy enhanced secure compact attribute-based signature from MQ problem for monotone span program","authors":"Jayashree Dey, Ratna Dutta","doi":"10.1016/j.tcs.2024.114929","DOIUrl":"10.1016/j.tcs.2024.114929","url":null,"abstract":"<div><div>The rapid advancement of computer networks has led to an increase in the exposure of messages within an open environment (cloud). Therefore, the confidentiality of the user's signing information is extremely essential to handle unauthorized access and alterations. <em>Attribute-based signature</em> (ABS) scheme is a significant primitive that ensures the privacy of the user's signing information. To endorse a message, the signer can generate a signature with his/her attributes that satisfy a policy without revealing any other information. Post-quantum attribute-based signature schemes are attractive construction options whose safety do not collapse in presence of quantum computers. This article presents the <em>first</em> attribute-based signature scheme in multivariate quadratic (MQ) setting. To generate the secret signing key, the salted-UOV technique is employed in our protocol. While signing, the well-known 3-pass identification protocol is coupled with the Fiat-Shamir transformation. More positively, our candidate relies on presenting the policy as a monotone span program. We also study existential unforgeability and the perfect privacy feature which ensures that a signature cannot be linked to any signing information. Moreover, our scheme is compact in the sense that it performs efficiently in terms of storage when contrasted to the existing post-quantum attribute-based signature schemes.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1020 ","pages":"Article 114929"},"PeriodicalIF":0.9,"publicationDate":"2024-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142527925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-18DOI: 10.1016/j.tcs.2024.114915
Carlos Zapata-Carratalá , Xerxes D. Arsiwalla , Taliesin Beynon
In this paper we investigate a ternary generalization of associativity by defining a diagrammatic calculus of hypergraphs that extends the usual notions of tensor networks, categories and relational algebras. Our key insight is to approach higher associativity as a confluence property of hypergraph rewrite systems. In doing so we rediscover the ternary structures known as heaps and are able to give a more comprehensive treatment of their emergence in the context of dagger categories and their generalizations. This approach allows us to define a notion of ternary category and heapoid, where morphisms bind three objects simultaneously, and suggests a systematic study of higher arity forms of associativity.
{"title":"Diagrammatic calculus and generalized associativity for higher-arity tensor operations","authors":"Carlos Zapata-Carratalá , Xerxes D. Arsiwalla , Taliesin Beynon","doi":"10.1016/j.tcs.2024.114915","DOIUrl":"10.1016/j.tcs.2024.114915","url":null,"abstract":"<div><div>In this paper we investigate a ternary generalization of associativity by defining a diagrammatic calculus of hypergraphs that extends the usual notions of tensor networks, categories and relational algebras. Our key insight is to approach higher associativity as a confluence property of hypergraph rewrite systems. In doing so we rediscover the ternary structures known as heaps and are able to give a more comprehensive treatment of their emergence in the context of dagger categories and their generalizations. This approach allows us to define a notion of ternary category and heapoid, where morphisms bind three objects simultaneously, and suggests a systematic study of higher arity forms of associativity.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1020 ","pages":"Article 114915"},"PeriodicalIF":0.9,"publicationDate":"2024-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142527263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-17DOI: 10.1016/j.tcs.2024.114912
Cristóbal Samaniego, Guillaume Houzeaux
This paper introduces a formal framework for the data exchanges required to solve partial differential equations in a distributed memory parallel environment.
Many physical phenomena can be described in terms of partial differential equations, and discretization methods are commonly used to solve this class of equations. Most of them require the definition of a mesh or grid in order to discretize the problem domain. In a parallel programming environment, the original mesh is partitioned into subdomains. Then, important data that has a direct relationship with the original mesh will be also divided based on the partition. As a consequence, data between subdomains has to be exchanged in order to obtain the correct solution to the problem in parallel.
In this context, the main objective of this work is to describe the existing data exchange algorithms typically used in simulation codes by formal means. This objective is achieved by first describing the original and partitioned mesh in terms of set theory concepts and using them for writing the data exchange algorithms from the perspective of a typical implementation of three numerical methods: the finite element, finite difference, and cell-centered finite volume methods.
Some attempts to create a description for these algorithms can be found in the literature. However, in the authors' opinion, a formal description is necessary in order to avoid any ambiguity.
Implicit and explicit schemes are considered here. However, this study is primarily focused on implicit schemes where iterative methods are employed to solve the system of linear algebraic equations arising from the discretization of a partial differential equation in a parallel environment. These iterative methods serve as motivation for defining well-known data exchange algorithms necessary to solve the system of equations. To achieve this, we will first examine a simple one-dimensional problem, followed by a general problem description. We finally illustrate the concepts presented in the paper by examining the solution of a partial differential equation in parallel.
{"title":"A formalization of parallel data exchange algorithms used by numerical methods for solving partial differential equations","authors":"Cristóbal Samaniego, Guillaume Houzeaux","doi":"10.1016/j.tcs.2024.114912","DOIUrl":"10.1016/j.tcs.2024.114912","url":null,"abstract":"<div><div>This paper introduces a formal framework for the data exchanges required to solve partial differential equations in a distributed memory parallel environment.</div><div>Many physical phenomena can be described in terms of partial differential equations, and discretization methods are commonly used to solve this class of equations. Most of them require the definition of a mesh or grid in order to discretize the problem domain. In a parallel programming environment, the original mesh is partitioned into subdomains. Then, important data that has a direct relationship with the original mesh will be also divided based on the partition. As a consequence, data between subdomains has to be exchanged in order to obtain the correct solution to the problem in parallel.</div><div>In this context, the main objective of this work is to describe the existing data exchange algorithms typically used in simulation codes by formal means. This objective is achieved by first describing the original and partitioned mesh in terms of set theory concepts and using them for writing the data exchange algorithms from the perspective of a typical implementation of three numerical methods: the finite element, finite difference, and cell-centered finite volume methods.</div><div>Some attempts to create a description for these algorithms can be found in the literature. However, in the authors' opinion, a formal description is necessary in order to avoid any ambiguity.</div><div>Implicit and explicit schemes are considered here. However, this study is primarily focused on implicit schemes where iterative methods are employed to solve the system of linear algebraic equations arising from the discretization of a partial differential equation in a parallel environment. These iterative methods serve as motivation for defining well-known data exchange algorithms necessary to solve the system of equations. To achieve this, we will first examine a simple one-dimensional problem, followed by a general problem description. We finally illustrate the concepts presented in the paper by examining the solution of a partial differential equation in parallel.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1024 ","pages":"Article 114912"},"PeriodicalIF":0.9,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142535258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-17DOI: 10.1016/j.tcs.2024.114911
Raphael Yuster
We present new algorithms for counting and detecting small tournaments in a given tournament. In particular, we prove that every tournament on four vertices (there are four) can be detected in time and counted in time where is the matrix multiplication exponent. We further prove that any tournament on five vertices (there are 12) can be counted in time. As for lower-bounds, we prove that for almost all k-vertex tournaments, the complexity of the detection problem is not easier than the complexity of the corresponding well-studied counting problem for undirected cliques of order .
{"title":"Finding and counting small tournaments in large tournaments","authors":"Raphael Yuster","doi":"10.1016/j.tcs.2024.114911","DOIUrl":"10.1016/j.tcs.2024.114911","url":null,"abstract":"<div><div>We present new algorithms for counting and detecting small tournaments in a given tournament. In particular, we prove that every tournament on four vertices (there are four) can be detected in <span><math><mi>O</mi><mo>(</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>)</mo></math></span> time and counted in <span><math><mi>O</mi><mo>(</mo><msup><mrow><mi>n</mi></mrow><mrow><mi>ω</mi></mrow></msup><mo>)</mo></math></span> time where <span><math><mi>ω</mi><mo><</mo><mn>2.372</mn></math></span> is the matrix multiplication exponent. We further prove that any tournament on five vertices (there are 12) can be counted in <span><math><mi>O</mi><mo>(</mo><msup><mrow><mi>n</mi></mrow><mrow><mi>ω</mi><mo>+</mo><mn>1</mn></mrow></msup><mo>)</mo></math></span> time. As for lower-bounds, we prove that for almost all <em>k</em>-vertex tournaments, the complexity of the detection problem is not easier than the complexity of the corresponding well-studied counting problem for <em>undirected cliques</em> of order <span><math><mi>k</mi><mo>−</mo><mi>O</mi><mo>(</mo><mi>log</mi><mo></mo><mi>k</mi><mo>)</mo></math></span>.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1024 ","pages":"Article 114911"},"PeriodicalIF":0.9,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142446354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-17DOI: 10.1016/j.tcs.2024.114913
Panagiotis Kanellopoulos, Alexandros A. Voudouris, Rongsen Zhang
We study a truthful two-facility location problem in which a set of agents have private positions on the line of real numbers and known approval preferences over two different facilities. Given the locations of the two facilities, the cost of an agent is the total distance from the facilities she approves. The goal is to decide where to place the facilities from a given finite set of candidate locations so as to (a) approximately optimize desired social objectives, and (b) incentivize the agents to truthfully report their private positions. We focus on the class of deterministic strategyproof mechanisms and show bounds on their approximation ratio in terms of the social cost (i.e., the total cost of the agents) and the max cost for several classes of instances depending on the preferences of the agents over the facilities.
{"title":"Truthful two-facility location with candidate locations","authors":"Panagiotis Kanellopoulos, Alexandros A. Voudouris, Rongsen Zhang","doi":"10.1016/j.tcs.2024.114913","DOIUrl":"10.1016/j.tcs.2024.114913","url":null,"abstract":"<div><div>We study a truthful two-facility location problem in which a set of agents have private positions on the line of real numbers and known approval preferences over two different facilities. Given the locations of the two facilities, the cost of an agent is the total distance from the facilities she approves. The goal is to decide where to place the facilities from a given finite set of candidate locations so as to (a) approximately optimize desired social objectives, and (b) incentivize the agents to truthfully report their private positions. We focus on the class of deterministic strategyproof mechanisms and show bounds on their approximation ratio in terms of the social cost (i.e., the total cost of the agents) and the max cost for several classes of instances depending on the preferences of the agents over the facilities.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1024 ","pages":"Article 114913"},"PeriodicalIF":0.9,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142446356","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-16DOI: 10.1016/j.tcs.2024.114907
Manuel Lafond , Vincent Moulton
In phylogenetics, evolution is traditionally represented in a tree-like manner. However, phylogenetic networks can be more appropriate for representing evolutionary events such as hybridization, horizontal gene transfer, and others. In particular, the class of forest-based networks was recently introduced to represent introgression, in which genes are swapped between species. A network is forest-based if it can be obtained by adding arcs to a collection of trees, so that the endpoints of the new arcs are in different trees. This contrasts with so-called tree-based networks, which are formed by adding arcs within a single tree.
We are interested in the computational complexity of recognizing forest-based networks, which was recently left as an open problem by Huber et al. It has been observed that forest-based networks coincide with directed acyclic graphs that can be partitioned into induced paths, each ending at a leaf of the original graph. Several types of path partitions have been studied in the graph theory literature, but to our best knowledge this type of ‘leaf induced path partition’ has not been directly considered before. The study of forest-based networks in terms of these partitions allows us to establish closer relationships between phylogenetics and algorithmic graph theory, and to provide answers to problems in both fields.
More specifically, we show that deciding whether a network is forest-based is NP-complete, even on input networks that are tree-based, binary, and have only three leaves. This shows that partitioning a directed acyclic graph into a constant number of induced paths is NP-complete, answering a recent question of Fernau et al. We then show that the problem is polynomial-time solvable on binary networks with two leaves and on the recently introduced class of orchards, which we show to be always forest-based. Finally, for undirected graphs, we introduce unrooted forest-based networks and provide hardness results for this class as well.
{"title":"Path partitions of phylogenetic networks","authors":"Manuel Lafond , Vincent Moulton","doi":"10.1016/j.tcs.2024.114907","DOIUrl":"10.1016/j.tcs.2024.114907","url":null,"abstract":"<div><div>In phylogenetics, evolution is traditionally represented in a tree-like manner. However, phylogenetic networks can be more appropriate for representing evolutionary events such as hybridization, horizontal gene transfer, and others. In particular, the class of forest-based networks was recently introduced to represent introgression, in which genes are swapped between species. A network is forest-based if it can be obtained by adding arcs to a collection of trees, so that the endpoints of the new arcs are in different trees. This contrasts with so-called tree-based networks, which are formed by adding arcs within a single tree.</div><div>We are interested in the computational complexity of recognizing forest-based networks, which was recently left as an open problem by Huber et al. It has been observed that forest-based networks coincide with directed acyclic graphs that can be partitioned into induced paths, each ending at a leaf of the original graph. Several types of path partitions have been studied in the graph theory literature, but to our best knowledge this type of ‘leaf induced path partition’ has not been directly considered before. The study of forest-based networks in terms of these partitions allows us to establish closer relationships between phylogenetics and algorithmic graph theory, and to provide answers to problems in both fields.</div><div>More specifically, we show that deciding whether a network is forest-based is NP-complete, even on input networks that are tree-based, binary, and have only three leaves. This shows that partitioning a directed acyclic graph into a constant number of induced paths is NP-complete, answering a recent question of Fernau et al. We then show that the problem is polynomial-time solvable on binary networks with two leaves and on the recently introduced class of orchards, which we show to be always forest-based. Finally, for undirected graphs, we introduce unrooted forest-based networks and provide hardness results for this class as well.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1024 ","pages":"Article 114907"},"PeriodicalIF":0.9,"publicationDate":"2024-10-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142446357","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-15DOI: 10.1016/j.tcs.2024.114903
Steven Ge, Toshiya Itoh
A recently introduced restricted variant of the multidimensional stable roommates problem is the roommate diversity problem: each agent belongs to one of two types (e.g., red and blue), and the agents' preferences over the rooms solely depend on the fraction of agents of their own type among their roommates. We study this variant with the notion of popularity.
We show that in the roommate diversity problem with the room size fixed to 2, the problem becomes tractable. Particularly, a popular partitioning of agents is guaranteed to exist and can be computed in polynomial time. Additionally, a mixed popular partitioning of agents is always guaranteed to exist in any roommate diversity game. By contrast, when there are no restrictions on the room size of a roommate diversity game, a popular partitioning may fail to exist and the problem becomes intractable.
{"title":"Popularity on the roommate diversity problem","authors":"Steven Ge, Toshiya Itoh","doi":"10.1016/j.tcs.2024.114903","DOIUrl":"10.1016/j.tcs.2024.114903","url":null,"abstract":"<div><div>A recently introduced restricted variant of the multidimensional stable roommates problem is the roommate diversity problem: each agent belongs to one of two types (e.g., red and blue), and the agents' preferences over the rooms solely depend on the fraction of agents of their own type among their roommates. We study this variant with the notion of popularity.</div><div>We show that in the roommate diversity problem with the room size fixed to 2, the problem becomes tractable. Particularly, a popular partitioning of agents is guaranteed to exist and can be computed in polynomial time. Additionally, a mixed popular partitioning of agents is always guaranteed to exist in any roommate diversity game. By contrast, when there are no restrictions on the room size of a roommate diversity game, a popular partitioning may fail to exist and the problem becomes intractable.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1023 ","pages":"Article 114903"},"PeriodicalIF":0.9,"publicationDate":"2024-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142441263","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-15DOI: 10.1016/j.tcs.2024.114909
Guillaume Fertin , Géraldine Jean , Anthony Labarre
In this paper, we study the problem of sorting unichromosomal linear genomes by prefix double-cut-and-joins (or DCJs) in both the signed and the unsigned settings. Prefix DCJs cut the leftmost segment of a genome and any other segment, and recombine the severed endpoints in one of two possible ways: one of these options corresponds to a prefix reversal, which reverses the order of elements between the two cuts (as well as their signs in the signed case). Our main results are: (1) new structural lower bounds based on the breakpoint graph for sorting by unsigned prefix reversals, unsigned prefix DCJs, and signed prefix DCJs; (2) two polynomial-time algorithms for sorting by prefix DCJs, both in the signed case (which answers an open question of Labarre [1]) and in the unsigned case; (3) a 1-absolute approximation algorithm for sorting by unsigned prefix reversals for a specific class of permutations.
{"title":"Sorting genomes by prefix double-cut-and-joins","authors":"Guillaume Fertin , Géraldine Jean , Anthony Labarre","doi":"10.1016/j.tcs.2024.114909","DOIUrl":"10.1016/j.tcs.2024.114909","url":null,"abstract":"<div><div>In this paper, we study the problem of sorting unichromosomal linear genomes by prefix double-cut-and-joins (or DCJs) in both the signed and the unsigned settings. Prefix DCJs cut the leftmost segment of a genome and any other segment, and recombine the severed endpoints in one of two possible ways: one of these options corresponds to a prefix reversal, which reverses the order of elements between the two cuts (as well as their signs in the signed case). Our main results are: (1) new structural lower bounds based on the breakpoint graph for sorting by unsigned prefix reversals, unsigned prefix DCJs, and signed prefix DCJs; (2) two polynomial-time algorithms for sorting by prefix DCJs, both in the signed case (which answers an open question of Labarre <span><span>[1]</span></span>) and in the unsigned case; (3) a 1-absolute approximation algorithm for sorting by unsigned prefix reversals for a specific class of permutations.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1024 ","pages":"Article 114909"},"PeriodicalIF":0.9,"publicationDate":"2024-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142535256","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-15DOI: 10.1016/j.tcs.2024.114908
Janosch Döcker, Simone Linz
Recently, there has been a growing interest in the relationships between unrooted and rooted phylogenetic networks. In this context, a natural question to ask is if an unrooted phylogenetic network can be oriented as a rooted phylogenetic network such that the latter satisfies certain structural properties. In a recent preprint, Bulteau et al. claim that it is NP-hard to decide if has a funneled (resp. funneled tree-child) orientation, for when the internal vertices of have degree at most 5. Unfortunately, the proof of their funneled tree-child result appears to be incorrect. In this paper, we show that, despite their incorrect proof, it is NP-hard to decide if has a funneled tree-child orientation even if each internal vertex has degree 5 and that NP-hardness remains for other popular classes of rooted phylogenetic networks such as funneled normal and funneled reticulation-visible. Additionally, our results hold regardless of whether is rooted at an existing vertex or by subdividing an edge with the root.
最近,人们对无根系统发育网络和有根系统发育网络之间的关系越来越感兴趣。在这种情况下,一个自然而然的问题是,无根系统发育网络 U 是否可以定向为有根系统发育网络,从而使后者满足某些结构特性。在最近的预印本中,Bulteau 等人声称,当 U 的内部顶点阶数最多为 5 时,判断 U 是否具有漏斗状(或漏斗状树子)定向是 NP 难的。遗憾的是,他们对漏斗树子结果的证明似乎并不正确。在本文中,我们证明了尽管他们的证明不正确,但即使每个内部顶点的阶数都是 5,要判断 U 是否具有漏斗树子方向也是 NP-困难的,而且对于其他流行的有根系统发育网络类别,如漏斗正常和漏斗网状可见,NP-困难性依然存在。此外,无论 U 是根植于现有顶点还是通过细分根边,我们的结果都是成立的。
{"title":"On the existence of funneled orientations for classes of rooted phylogenetic networks","authors":"Janosch Döcker, Simone Linz","doi":"10.1016/j.tcs.2024.114908","DOIUrl":"10.1016/j.tcs.2024.114908","url":null,"abstract":"<div><div>Recently, there has been a growing interest in the relationships between unrooted and rooted phylogenetic networks. In this context, a natural question to ask is if an unrooted phylogenetic network <span><math><mi>U</mi></math></span> can be oriented as a rooted phylogenetic network such that the latter satisfies certain structural properties. In a recent preprint, Bulteau et al. claim that it is NP-hard to decide if <span><math><mi>U</mi></math></span> has a funneled (resp. funneled tree-child) orientation, for when the internal vertices of <span><math><mi>U</mi></math></span> have degree at most 5. Unfortunately, the proof of their funneled tree-child result appears to be incorrect. In this paper, we show that, despite their incorrect proof, it is NP-hard to decide if <span><math><mi>U</mi></math></span> has a funneled tree-child orientation even if each internal vertex has degree 5 and that NP-hardness remains for other popular classes of rooted phylogenetic networks such as funneled normal and funneled reticulation-visible. Additionally, our results hold regardless of whether <span><math><mi>U</mi></math></span> is rooted at an existing vertex or by subdividing an edge with the root.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1023 ","pages":"Article 114908"},"PeriodicalIF":0.9,"publicationDate":"2024-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142437930","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-10-15DOI: 10.1016/j.tcs.2024.114906
Stephane Durocher , J. Mark Keil , Debajyoti Mondal
Given a set P of points and a set U of geometric objects in the Euclidean plane, a minimum ply cover of P with U is a subset of U that covers P and minimizes the number of objects that share a common intersection, called the minimum ply cover number of P with U. Biedl et al. (2021) [9] showed that for both unit squares and unit disks, determining the minimum ply cover number for a set of points is NP-hard. They gave polynomial-time 2-approximation algorithms for the special case when the minimum ply cover number is constant, and asked whether there exists polynomial-time -approximation algorithms for these problems. In this paper, we settle the question posed by Biedl et al. by providing polynomial-time -approximation algorithms for the minimum ply cover problem for both unit squares and unit disks.
给定欧几里得平面中的一个点集 P 和一个几何对象集 U,P 与 U 的最小层覆盖是 U 的一个子集,该子集覆盖 P 并使共享一个共同交集的对象数目最小,称为 P 与 U 的最小层覆盖数。Biedl 等人(2021 年)[9] 的研究表明,对于单位正方形和单位圆盘,确定一个点集的最小层覆盖数都是 NP-困难的。他们给出了最小层覆盖数为常数时特殊情况下的多项式时间 2 近似算法,并询问是否存在针对这些问题的多项式时间 O(1)- 近似算法。在本文中,我们解决了 Biedl 等人提出的问题,为单位正方形和单位圆盘的最小层覆盖问题提供了多项式时间 O(1)- 近似算法。
{"title":"Approximation algorithms for minimum ply covering of points with unit squares and unit disks","authors":"Stephane Durocher , J. Mark Keil , Debajyoti Mondal","doi":"10.1016/j.tcs.2024.114906","DOIUrl":"10.1016/j.tcs.2024.114906","url":null,"abstract":"<div><div>Given a set <em>P</em> of points and a set <em>U</em> of geometric objects in the Euclidean plane, a minimum ply cover of <em>P</em> with <em>U</em> is a subset of <em>U</em> that covers <em>P</em> and minimizes the number of objects that share a common intersection, called the minimum ply cover number of <em>P</em> with <em>U</em>. Biedl et al. (2021) <span><span>[9]</span></span> showed that for both unit squares and unit disks, determining the minimum ply cover number for a set of points is NP-hard. They gave polynomial-time 2-approximation algorithms for the special case when the minimum ply cover number is constant, and asked whether there exists polynomial-time <span><math><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></math></span>-approximation algorithms for these problems. In this paper, we settle the question posed by Biedl et al. by providing polynomial-time <span><math><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></math></span>-approximation algorithms for the minimum ply cover problem for both unit squares and unit disks.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1024 ","pages":"Article 114906"},"PeriodicalIF":0.9,"publicationDate":"2024-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142446355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}