首页 > 最新文献

Theoretical Computer Science最新文献

英文 中文
Partial gathering of mobile agents in dynamic rings 动态环中移动代理的部分聚集
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-09 DOI: 10.1016/j.tcs.2025.115684
Masahiro Shibata , Yuichi Sudo , Junya Nakamura , Yonghwan Kim
<div><div>In this paper, we consider the partial gathering problem of mobile agents in synchronous dynamic bidirectional ring networks. The partial gathering problem is a generalization of the (well-investigated) total gathering problem, which requires that all <em>k</em> agents distributed in the network terminate at a non-predetermined single node. The partial gathering problem requires, for a given positive integer <em>g</em> ( < <em>k</em>), that agents terminate in a configuration such that either at least <em>g</em> agents or no agent exists at each node. When <em>k</em> ≥ 2<em>g</em>, the requirement for the partial gathering problem is strictly weaker than that for the total gathering problem, and thus it is interesting to clarify the difference in the move complexity between them. So far, the partial gathering problem has been considered in static graphs. In this paper, we start considering partial gathering in dynamic graphs. As a first step, we consider this problem in 1-interval connected rings, that is, one of the links in a ring may be missing at each time step. In such networks, focusing on the relationship between the values of <em>k</em> and <em>g</em>, we fully characterize the solvability of the partial gathering problem and analyze the move complexity of the proposed algorithms when the problem can be solved. First, we show that the <em>g</em>-partial gathering problem is unsolvable when <em>k</em> ≤ 2<em>g</em>. Second, we show that the problem can be solved with <em>O</em>(<em>n</em>log <em>g</em>) time and the total number of <em>O</em>(<em>gn</em>log <em>g</em>) moves when <span><math><mrow><mn>2</mn><mi>g</mi><mo>+</mo><mn>1</mn><mo>≤</mo><mi>k</mi><mo>≤</mo><mn>3</mn><mi>g</mi><mo>−</mo><mn>2</mn></mrow></math></span>. Third, we show that the problem can be solved with <em>O</em>(<em>n</em>) time and the total number of <em>O</em>(<em>kn</em>) moves when <span><math><mrow><mn>3</mn><mi>g</mi><mo>−</mo><mn>1</mn><mo>≤</mo><mi>k</mi><mo>≤</mo><mn>8</mn><mi>g</mi><mo>−</mo><mn>4</mn></mrow></math></span>. Notice that since <span><math><mrow><mi>k</mi><mo>=</mo><mi>O</mi><mo>(</mo><mi>g</mi><mo>)</mo></mrow></math></span> holds when <span><math><mrow><mn>3</mn><mi>g</mi><mo>−</mo><mn>1</mn><mo>≤</mo><mi>k</mi><mo>≤</mo><mn>8</mn><mi>g</mi><mo>−</mo><mn>4</mn></mrow></math></span>, the move complexity <em>O</em>(<em>kn</em>) in this case can be represented also as <em>O</em>(<em>gn</em>). Finally, we show that the problem can be solved with <em>O</em>(<em>n</em>) time and the total number of <em>O</em>(<em>gn</em>) moves when <span><math><mrow><mi>k</mi><mo>≥</mo><mn>8</mn><mi>g</mi><mo>−</mo><mn>3</mn></mrow></math></span>. These results mean that the partial gathering problem can be solved also in dynamic rings when <span><math><mrow><mi>k</mi><mo>≥</mo><mn>2</mn><mi>g</mi><mo>+</mo><mn>1</mn></mrow></math></span>. In addition, agents require a total number of Ω(<em>gn</em>) (resp., Ω(<em>kn</em>)) moves to solve the par
研究了同步动态双向环形网络中移动智能体的部分聚集问题。部分收集问题是(经过充分研究的)总收集问题的推广,它要求分布在网络中的所有k个代理都终止于一个非预定的单个节点。对于给定的正整数g( <; k),部分收集问题要求代理终止在这样的配置中,即在每个节点上至少存在g个代理或不存在代理。当k ≥ 2g时,对部分收集问题的要求严格弱于对全部收集问题的要求,因此澄清它们之间移动复杂性的差异是有趣的。到目前为止,部分收集问题已经被考虑在静态图中。本文开始考虑动态图的部分聚集问题。作为第一步,我们考虑这个问题在1区间连通环上,即在每个时间步长环上可能有一个环缺失。在这种网络中,我们关注k值和g值之间的关系,充分表征了部分收集问题的可解性,并分析了当问题可解时所提出算法的移动复杂度。首先,我们证明了当k ≤ 2g时,g-偏集问题是不可解的。其次,我们证明了当2g+1≤k≤3g−2时,问题可以在O(nlog g)时间内解决,并且O(gnlog g)的总数移动。第三,我们证明了当3g−1≤k≤8g−4时,问题可以在O(n)时间内解决,并且移动总数为O(kn)。注意,由于k=O(g)在3g−1≤k≤8g−4时成立,因此这种情况下的移动复杂度O(kn)也可以表示为O(gn)。最后,我们证明了当k≥8g−3时,问题可以在O(n)时间内解决,并且O(gn)移动总数。这些结果表明,当k≥2g+1时,动态环的部分聚集问题也可以得到解决。此外,代理需要的总数为Ω(gn)。, Ω(kn))移动解偏(resp)。(总)收集问题。因此,当k≥3g−1时,智能体能够以渐进最优的总移动数O(gn)来解决部分聚集问题,其移动数严格小于总聚集问题。
{"title":"Partial gathering of mobile agents in dynamic rings","authors":"Masahiro Shibata ,&nbsp;Yuichi Sudo ,&nbsp;Junya Nakamura ,&nbsp;Yonghwan Kim","doi":"10.1016/j.tcs.2025.115684","DOIUrl":"10.1016/j.tcs.2025.115684","url":null,"abstract":"&lt;div&gt;&lt;div&gt;In this paper, we consider the partial gathering problem of mobile agents in synchronous dynamic bidirectional ring networks. The partial gathering problem is a generalization of the (well-investigated) total gathering problem, which requires that all &lt;em&gt;k&lt;/em&gt; agents distributed in the network terminate at a non-predetermined single node. The partial gathering problem requires, for a given positive integer &lt;em&gt;g&lt;/em&gt; ( &lt; &lt;em&gt;k&lt;/em&gt;), that agents terminate in a configuration such that either at least &lt;em&gt;g&lt;/em&gt; agents or no agent exists at each node. When &lt;em&gt;k&lt;/em&gt; ≥ 2&lt;em&gt;g&lt;/em&gt;, the requirement for the partial gathering problem is strictly weaker than that for the total gathering problem, and thus it is interesting to clarify the difference in the move complexity between them. So far, the partial gathering problem has been considered in static graphs. In this paper, we start considering partial gathering in dynamic graphs. As a first step, we consider this problem in 1-interval connected rings, that is, one of the links in a ring may be missing at each time step. In such networks, focusing on the relationship between the values of &lt;em&gt;k&lt;/em&gt; and &lt;em&gt;g&lt;/em&gt;, we fully characterize the solvability of the partial gathering problem and analyze the move complexity of the proposed algorithms when the problem can be solved. First, we show that the &lt;em&gt;g&lt;/em&gt;-partial gathering problem is unsolvable when &lt;em&gt;k&lt;/em&gt; ≤ 2&lt;em&gt;g&lt;/em&gt;. Second, we show that the problem can be solved with &lt;em&gt;O&lt;/em&gt;(&lt;em&gt;n&lt;/em&gt;log &lt;em&gt;g&lt;/em&gt;) time and the total number of &lt;em&gt;O&lt;/em&gt;(&lt;em&gt;gn&lt;/em&gt;log &lt;em&gt;g&lt;/em&gt;) moves when &lt;span&gt;&lt;math&gt;&lt;mrow&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;mi&gt;g&lt;/mi&gt;&lt;mo&gt;+&lt;/mo&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;mo&gt;≤&lt;/mo&gt;&lt;mi&gt;k&lt;/mi&gt;&lt;mo&gt;≤&lt;/mo&gt;&lt;mn&gt;3&lt;/mn&gt;&lt;mi&gt;g&lt;/mi&gt;&lt;mo&gt;−&lt;/mo&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;/mrow&gt;&lt;/math&gt;&lt;/span&gt;. Third, we show that the problem can be solved with &lt;em&gt;O&lt;/em&gt;(&lt;em&gt;n&lt;/em&gt;) time and the total number of &lt;em&gt;O&lt;/em&gt;(&lt;em&gt;kn&lt;/em&gt;) moves when &lt;span&gt;&lt;math&gt;&lt;mrow&gt;&lt;mn&gt;3&lt;/mn&gt;&lt;mi&gt;g&lt;/mi&gt;&lt;mo&gt;−&lt;/mo&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;mo&gt;≤&lt;/mo&gt;&lt;mi&gt;k&lt;/mi&gt;&lt;mo&gt;≤&lt;/mo&gt;&lt;mn&gt;8&lt;/mn&gt;&lt;mi&gt;g&lt;/mi&gt;&lt;mo&gt;−&lt;/mo&gt;&lt;mn&gt;4&lt;/mn&gt;&lt;/mrow&gt;&lt;/math&gt;&lt;/span&gt;. Notice that since &lt;span&gt;&lt;math&gt;&lt;mrow&gt;&lt;mi&gt;k&lt;/mi&gt;&lt;mo&gt;=&lt;/mo&gt;&lt;mi&gt;O&lt;/mi&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mi&gt;g&lt;/mi&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/mrow&gt;&lt;/math&gt;&lt;/span&gt; holds when &lt;span&gt;&lt;math&gt;&lt;mrow&gt;&lt;mn&gt;3&lt;/mn&gt;&lt;mi&gt;g&lt;/mi&gt;&lt;mo&gt;−&lt;/mo&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;mo&gt;≤&lt;/mo&gt;&lt;mi&gt;k&lt;/mi&gt;&lt;mo&gt;≤&lt;/mo&gt;&lt;mn&gt;8&lt;/mn&gt;&lt;mi&gt;g&lt;/mi&gt;&lt;mo&gt;−&lt;/mo&gt;&lt;mn&gt;4&lt;/mn&gt;&lt;/mrow&gt;&lt;/math&gt;&lt;/span&gt;, the move complexity &lt;em&gt;O&lt;/em&gt;(&lt;em&gt;kn&lt;/em&gt;) in this case can be represented also as &lt;em&gt;O&lt;/em&gt;(&lt;em&gt;gn&lt;/em&gt;). Finally, we show that the problem can be solved with &lt;em&gt;O&lt;/em&gt;(&lt;em&gt;n&lt;/em&gt;) time and the total number of &lt;em&gt;O&lt;/em&gt;(&lt;em&gt;gn&lt;/em&gt;) moves when &lt;span&gt;&lt;math&gt;&lt;mrow&gt;&lt;mi&gt;k&lt;/mi&gt;&lt;mo&gt;≥&lt;/mo&gt;&lt;mn&gt;8&lt;/mn&gt;&lt;mi&gt;g&lt;/mi&gt;&lt;mo&gt;−&lt;/mo&gt;&lt;mn&gt;3&lt;/mn&gt;&lt;/mrow&gt;&lt;/math&gt;&lt;/span&gt;. These results mean that the partial gathering problem can be solved also in dynamic rings when &lt;span&gt;&lt;math&gt;&lt;mrow&gt;&lt;mi&gt;k&lt;/mi&gt;&lt;mo&gt;≥&lt;/mo&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;mi&gt;g&lt;/mi&gt;&lt;mo&gt;+&lt;/mo&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;/mrow&gt;&lt;/math&gt;&lt;/span&gt;. In addition, agents require a total number of Ω(&lt;em&gt;gn&lt;/em&gt;) (resp., Ω(&lt;em&gt;kn&lt;/em&gt;)) moves to solve the par","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1063 ","pages":"Article 115684"},"PeriodicalIF":1.0,"publicationDate":"2025-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145798611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Support preorder on finitely supported Cb-Sets 支持有限支持的cb - set预购
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-09 DOI: 10.1016/j.tcs.2025.115677
A. Hosseinabadi, M. Haddadi
This paper investigates the support-preorder, a reflexive and transitive relation that can be defined on any finitely supported Cb-set using the notion of support. Finitely supported Cb-sets extend the concept of nominal sets. We introduce the category sp-(Cb-Set)fs consisting of finitely supported Cb-sets and sp-preserving morphisms. We analyze its characteristics, including the existence of products and coproducts, and regularity, highlighting differences from the category of support-preordered nominal sets. A key distinction is the non-equivariance of the support-preorder on finitely supported Cb-sets. We also characterize strongly finitely supported Cb-sets, where the support-preorder is equivariant, and investigate the behavior of support under actions within these sets. Our research contributes to a deeper understanding of the structure and interrelations between nominal sets and finitely supported Cb-sets, with significant implications for fields such as formal systems and homotopy type theory.
利用支持的概念,研究了在任何有限支持的cb集上可以定义的一个自反传递关系——支持-预序。有限支持的cb集扩展了名义集的概念。引入由有限支持的cb集和sp保态射组成的范畴sp-(cb集)fs。我们分析了它的特征,包括乘积和副乘积的存在性和规律性,突出了与支持预定标称集范畴的区别。一个关键的区别是在有限支持的cb集上支持序的非等变性。我们还描述了强有限支持的cb集,其中支持预阶是等变的,并研究了支持在这些集合内的行为下的行为。我们的研究有助于更深入地理解名义集和有限支持的cb集之间的结构和相互关系,对形式系统和同伦类型理论等领域具有重要意义。
{"title":"Support preorder on finitely supported Cb-Sets","authors":"A. Hosseinabadi,&nbsp;M. Haddadi","doi":"10.1016/j.tcs.2025.115677","DOIUrl":"10.1016/j.tcs.2025.115677","url":null,"abstract":"<div><div>This paper investigates the support-preorder, a reflexive and transitive relation that can be defined on any finitely supported <strong>Cb</strong>-set using the notion of support. Finitely supported <strong>Cb</strong>-sets extend the concept of nominal sets. We introduce the category <span><math><mrow><mtext>sp-</mtext><msub><mrow><mo>(</mo><mi>Cb</mi><mtext>-</mtext><mtext>Set</mtext><mo>)</mo></mrow><mrow><mrow><mi>f</mi></mrow><mi>s</mi></mrow></msub></mrow></math></span> consisting of finitely supported <strong>Cb</strong>-sets and sp-preserving morphisms. We analyze its characteristics, including the existence of products and coproducts, and regularity, highlighting differences from the category of support-preordered nominal sets. A key distinction is the non-equivariance of the support-preorder on finitely supported <strong>Cb</strong>-sets. We also characterize strongly finitely supported <strong>Cb</strong>-sets, where the support-preorder is equivariant, and investigate the behavior of support under actions within these sets. Our research contributes to a deeper understanding of the structure and interrelations between nominal sets and finitely supported <strong>Cb</strong>-sets, with significant implications for fields such as formal systems and homotopy type theory.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1064 ","pages":"Article 115677"},"PeriodicalIF":1.0,"publicationDate":"2025-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145792173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On generalizations of partial scenario set cover 部分情景集覆盖的推广
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-08 DOI: 10.1016/j.tcs.2025.115654
Shai Michael Dimant, Sven O. Krumke
In the Partial Scenario Set Cover problem (PSSC), given a finite ground set Q, a collection S of subsets of Q with associated nonnegative costs, and a second collection U of subsets of Q, the goal is to select a minimum-cost sub-collection of S that covers at least l sets from U. In this paper, we focus on two natural generalizations of PSSC. In the first generalization, called Partial PSSC (PPSSC), each scenario has a demand, and the task is to find a minimum-cost sub-collection of S that satisfies the demand of at least l scenarios. We present a primal-dual algorithm for this problem whose approximation ratio improves over the previously best known for a special case of PPSSC. In the second generalization, given a finite set N, a non-negative cost function c over N, and integer-valued submodular non-decreasing functions f1,,fr over 2N together with integer demands d1,,dr and an additional integer l, we ask for a minimum-cost subset SN such that at least l covering constraints of the form fi(S) ≥ di are satisfied. This is the partial cover version of the Multi-Submod-Cover problem studied in the literature, which we call Partial-Multi-Submod-Cover (PMSC). From the presented primal-dual algorithm we derive an algorithm for PMSC, which can be viewed as a generalization of Wolsey’s greedy algorithm for Submodular Set Cover. Finally, we highlight the broad applicability of the presented algorithms, which unlike previous algorithms for PSSC are purely combinatorial.
在部分场景集覆盖问题(PSSC)中,给定一个有限的基础集Q,一个由Q的非负代价子集组成的集合S,以及一个由Q的子集组成的第二个集合U,目标是选择一个最小代价的子集合S,该集合至少覆盖U中的l个集合。在第一个泛化中,称为部分PSSC (PPSSC),每个场景都有一个需求,任务是找到满足至少l个场景需求的最小成本子集合S。我们提出了一种原始对偶算法,该算法的近似比先前已知的PPSSC的特殊情况有所改善。在第二个推广中,给定一个有限集合N、一个非负代价函数c / N和一个大于2N的整数值子模非降函数f1、…、fr以及整数需求d1、…、dr和一个额外的整数l,我们要求一个最小代价子集S≥l满足fi(S) ≥ di形式的约束。这是文献中研究的多子模式覆盖问题的部分覆盖版本,我们称之为部分多子模式覆盖(PMSC)。在给出的原对偶算法的基础上,我们推导出一种PMSC算法,该算法可以看作是对次模集覆盖的Wolsey贪心算法的推广。最后,我们强调了所提出算法的广泛适用性,与以前的PSSC算法不同,这些算法是纯组合的。
{"title":"On generalizations of partial scenario set cover","authors":"Shai Michael Dimant,&nbsp;Sven O. Krumke","doi":"10.1016/j.tcs.2025.115654","DOIUrl":"10.1016/j.tcs.2025.115654","url":null,"abstract":"<div><div>In the <em>Partial Scenario Set Cover problem</em> (PSSC), given a finite ground set <em>Q</em>, a collection <span><math><mi>S</mi></math></span> of subsets of <em>Q</em> with associated nonnegative costs, and a second collection <span><math><mi>U</mi></math></span> of subsets of <em>Q</em>, the goal is to select a minimum-cost sub-collection of <span><math><mi>S</mi></math></span> that covers at least <em>l</em> sets from <span><math><mi>U</mi></math></span>. In this paper, we focus on two natural generalizations of PSSC. In the first generalization, called <em>Partial PSSC</em> (PPSSC), each scenario has a demand, and the task is to find a minimum-cost sub-collection of <span><math><mi>S</mi></math></span> that satisfies the demand of at least <em>l</em> scenarios. We present a primal-dual algorithm for this problem whose approximation ratio improves over the previously best known for a special case of PPSSC. In the second generalization, given a finite set <em>N</em>, a non-negative cost function <em>c</em> over <em>N</em>, and integer-valued submodular non-decreasing functions <span><math><mrow><msub><mi>f</mi><mn>1</mn></msub><mo>,</mo><mo>…</mo><mo>,</mo><msub><mi>f</mi><mi>r</mi></msub></mrow></math></span> over 2<sup><em>N</em></sup> together with integer demands <span><math><mrow><msub><mi>d</mi><mn>1</mn></msub><mo>,</mo><mo>…</mo><mo>,</mo><msub><mi>d</mi><mi>r</mi></msub></mrow></math></span> and an additional integer <em>l</em>, we ask for a minimum-cost subset <em>S</em>⊆<em>N</em> such that at least <em>l</em> covering constraints of the form <em>f<sub>i</sub></em>(<em>S</em>) ≥ <em>d<sub>i</sub></em> are satisfied. This is the partial cover version of the Multi-Submod-Cover problem studied in the literature, which we call <em>Partial-Multi-Submod-Cover</em> (PMSC). From the presented primal-dual algorithm we derive an algorithm for PMSC, which can be viewed as a generalization of Wolsey’s greedy algorithm for Submodular Set Cover. Finally, we highlight the broad applicability of the presented algorithms, which unlike previous algorithms for PSSC are purely combinatorial.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1063 ","pages":"Article 115654"},"PeriodicalIF":1.0,"publicationDate":"2025-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145884648","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An efficient two-stage diagnostic algorithm for assessing system reliability 一种高效的系统可靠性两阶段诊断算法
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-08 DOI: 10.1016/j.tcs.2025.115679
Chunjian Liang , Jiafei Liu , Chia-Wei Lee , Jingli Wu , Gaoshi Li
Assessing the diagnosability of multiprocessor systems is vital for maintaining reliability and fault-tolerance, especially in extensive interconnection networks where precise reliability assessments are crucial for system stability and resilience against processor failures. In this paper, we introduce a novel diagnosability metric called h-extra r-component diagnosability, which extends traditional models by considering both component-level robustness and structural constraints. Specifically, for a graph G, a vertex subset F ⊂ V(G) is termed an h-extra r-component vertex-cut if GF is disconnected with at least r connected components, each containing at least h+1 vertices. The h-extra r-component diagnosability of G, denoted by trh(G), is defined as the maximum integer t such that G is conditionally t-diagnosable under this constraint. We establish theoretical characterization for hypercube networks Qn under the condition that there does not exist exactly one isolated node in Qn(F1F2) for two distinct sets F1, F2. Specifically, we show that 4n8t21(Qn)4n7 for n ≥ 7 and t31(Qn)=6n15 for n ≥ 13 under the MM* diagnostic model. To enhance fault identification efficiency, we propose a two-stage diagnosis algorithm (TSDA-MM*), leveraging network structural properties to improve diagnostic accuracy and efficiency. Extensive simulation experiments on hypercube networks and the data center networks Bcube(n, k) demonstrate that TSDA-MM* achieves high performance in terms of Accuracy, TrueNegativeRate, TruePositiveRate, and Precision, thereby providing a promising solution for practical fault diagnosis in large-scale systems.
评估多处理器系统的可诊断性对于维持可靠性和容错性至关重要,特别是在广泛的互连网络中,精确的可靠性评估对于系统稳定性和对处理器故障的恢复能力至关重要。本文引入了一种新的可诊断性度量,即h-extra - r-component可诊断性,它通过考虑组件级鲁棒性和结构约束对传统模型进行了扩展。具体地说,对于图G,如果G−F与至少r个连通分量断开,且每个包含至少h+1个顶点,则顶点子集F∧V(G)被称为h-额外r分量顶点切割。G的h-额外r分量可诊断性,用trh(G)表示,定义为使G在此约束下条件可诊断的最大整数t。对于两个不同的集合F1, F2,在Qn−(F1∪F2)中不完全存在一个孤立节点的条件下,建立了超立方体网络Qn的理论表征。具体来说,我们发现在MM*诊断模型下,当n ≥ 7时,4n−8≤t21(Qn)≤4n−7,当n ≥ 13时,t31(Qn)=6n−15。为了提高故障识别效率,我们提出了一种两阶段诊断算法(TSDA-MM*),利用网络的结构特性来提高诊断的准确性和效率。在超立方体网络和数据中心网络Bcube(n, k)上进行的大量仿真实验表明,TSDA-MM*在准确率、真负率、真正率和精度方面都达到了很高的性能,为大规模系统的实际故障诊断提供了一种很有前景的解决方案。
{"title":"An efficient two-stage diagnostic algorithm for assessing system reliability","authors":"Chunjian Liang ,&nbsp;Jiafei Liu ,&nbsp;Chia-Wei Lee ,&nbsp;Jingli Wu ,&nbsp;Gaoshi Li","doi":"10.1016/j.tcs.2025.115679","DOIUrl":"10.1016/j.tcs.2025.115679","url":null,"abstract":"<div><div>Assessing the diagnosability of multiprocessor systems is vital for maintaining reliability and fault-tolerance, especially in extensive interconnection networks where precise reliability assessments are crucial for system stability and resilience against processor failures. In this paper, we introduce a novel diagnosability metric called <em>h</em>-extra <em>r</em>-component diagnosability, which extends traditional models by considering both component-level robustness and structural constraints. Specifically, for a graph <em>G</em>, a vertex subset <em>F</em> ⊂ <em>V</em>(<em>G</em>) is termed an <em>h</em>-extra <em>r</em>-component vertex-cut if <span><math><mrow><mi>G</mi><mo>−</mo><mi>F</mi></mrow></math></span> is disconnected with at least <em>r</em> connected components, each containing at least <span><math><mrow><mi>h</mi><mo>+</mo><mn>1</mn></mrow></math></span> vertices. The <em>h</em>-extra <em>r</em>-component diagnosability of <em>G</em>, denoted by <span><math><mrow><msubsup><mi>t</mi><mrow><mi>r</mi></mrow><mi>h</mi></msubsup><mrow><mo>(</mo><mi>G</mi><mo>)</mo></mrow></mrow></math></span>, is defined as the maximum integer <em>t</em> such that <em>G</em> is conditionally <em>t</em>-diagnosable under this constraint. We establish theoretical characterization for hypercube networks <em>Q<sub>n</sub></em> under the condition that there does not exist exactly one isolated node in <span><math><mrow><msub><mi>Q</mi><mi>n</mi></msub><mo>−</mo><mrow><mo>(</mo><msub><mi>F</mi><mn>1</mn></msub><mo>∪</mo><msub><mi>F</mi><mn>2</mn></msub><mo>)</mo></mrow></mrow></math></span> for two distinct sets <em>F</em><sub>1</sub>, <em>F</em><sub>2</sub>. Specifically, we show that <span><math><mrow><mn>4</mn><mi>n</mi><mo>−</mo><mn>8</mn><mo>≤</mo><msubsup><mi>t</mi><mrow><mn>2</mn></mrow><mn>1</mn></msubsup><mrow><mo>(</mo><msub><mi>Q</mi><mi>n</mi></msub><mo>)</mo></mrow><mo>≤</mo><mn>4</mn><mi>n</mi><mo>−</mo><mn>7</mn></mrow></math></span> for <em>n</em> ≥ 7 and <span><math><mrow><msubsup><mi>t</mi><mrow><mn>3</mn></mrow><mn>1</mn></msubsup><mrow><mo>(</mo><msub><mi>Q</mi><mi>n</mi></msub><mo>)</mo></mrow><mo>=</mo><mn>6</mn><mi>n</mi><mo>−</mo><mn>15</mn></mrow></math></span> for <em>n</em> ≥ 13 under the MM* diagnostic model. To enhance fault identification efficiency, we propose a two-stage diagnosis algorithm (TSDA-MM*), leveraging network structural properties to improve diagnostic accuracy and efficiency. Extensive simulation experiments on hypercube networks and the data center networks <em>Bcube</em>(<em>n, k</em>) demonstrate that TSDA-MM* achieves high performance in terms of <em>Accuracy, True</em> <em>Negative</em> <em>Rate, True</em> <em>Positive</em> <em>Rate</em>, and <em>Precision</em>, thereby providing a promising solution for practical fault diagnosis in large-scale systems.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1063 ","pages":"Article 115679"},"PeriodicalIF":1.0,"publicationDate":"2025-12-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145746976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Largest similar copies of convex polygons in polygonal domains 多边形域中凸多边形的最大相似副本
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-07 DOI: 10.1016/j.tcs.2025.115685
Taekang Eom , Seungjun Lee , Hee-Kap Ahn
Given a convex polygon with k vertices and a polygonal domain consisting of polygonal obstacles with n vertices in total in the plane, we study the optimization problem of finding a largest similar copy of the polygon that can be placed in the polygonal domain without intersecting the obstacles. We present an upper bound O(k2n2λ4(k)) on the number of combinatorial changes occurring to the underlying structure during the rotation of the polygon, together with an O(k2n2λ4(k)log n)-time deterministic algorithm for the problem, where λs(n) is the length of the longest Davenport–Schinzel sequence of order s including n distinct symbols. This improves upon the previously best known results by Chew and Kedem [SoCG89, CGTA93] and Sharir and Toledo [SoCG91, CGTA94] on the problem in more than 27 years. Our result also improves the time complexity of the high-clearance motion planning algorithm by Chew and Kedem.
给定一个有k个顶点的凸多边形和一个平面上有n个顶点的多边形障碍物组成的多边形域,我们研究了在多边形域中寻找一个最大的相似多边形副本的优化问题,该副本可以放置在多边形域中而不与障碍物相交。我们给出了在多边形旋转过程中底层结构发生组合变化的次数的上界O(k2n2λ4(k)),以及该问题的O(k2n2λ4(k)log n)时间确定性算法,其中λs(n)是包含n个不同符号的s阶最长Davenport-Schinzel序列的长度。这比之前由Chew和Kedem [SoCG89, CGTA93]以及Sharir和Toledo [SoCG91, CGTA94]在27年多的时间里对这个问题所做的最著名的研究结果有所改进。我们的结果也提高了Chew和Kedem的高间隙运动规划算法的时间复杂度。
{"title":"Largest similar copies of convex polygons in polygonal domains","authors":"Taekang Eom ,&nbsp;Seungjun Lee ,&nbsp;Hee-Kap Ahn","doi":"10.1016/j.tcs.2025.115685","DOIUrl":"10.1016/j.tcs.2025.115685","url":null,"abstract":"<div><div>Given a convex polygon with <em>k</em> vertices and a polygonal domain consisting of polygonal obstacles with <em>n</em> vertices in total in the plane, we study the optimization problem of finding a largest similar copy of the polygon that can be placed in the polygonal domain without intersecting the obstacles. We present an upper bound <em>O</em>(<em>k</em><sup>2</sup><em>n</em><sup>2</sup><em>λ</em><sub>4</sub>(<em>k</em>)) on the number of combinatorial changes occurring to the underlying structure during the rotation of the polygon, together with an <em>O</em>(<em>k</em><sup>2</sup><em>n</em><sup>2</sup><em>λ</em><sub>4</sub>(<em>k</em>)log <em>n</em>)-time deterministic algorithm for the problem, where <em>λ<sub>s</sub></em>(<em>n</em>) is the length of the longest Davenport–Schinzel sequence of order <em>s</em> including <em>n</em> distinct symbols. This improves upon the previously best known results by Chew and Kedem [SoCG89, CGTA93] and Sharir and Toledo [SoCG91, CGTA94] on the problem in more than 27 years. Our result also improves the time complexity of the high-clearance motion planning algorithm by Chew and Kedem.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1063 ","pages":"Article 115685"},"PeriodicalIF":1.0,"publicationDate":"2025-12-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145746973","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Analysis of key reuse security for Aigis.KEM aegis密钥重用安全性分析。克姆
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-06 DOI: 10.1016/j.tcs.2025.115680
Ke Wang , Haodong Jiang , Zhenfeng Zhang , Long Chen , Huiqin Xie
Key reuse security is an important security property considered in the NIST post-quantum cryptography algorithm standardization. At PKC’20, Zhang et al. proposed Aigis.KEM, a key encapsulation mechanism based on asymmetric MLWE. Aigis.KEM provides flexible parameter selection, has high comprehensive performance, and won the first prize of the China’s National cryptographic algorithm competition. However, its key reuse security is currently unclear. This paper studies the key reuse security of Aigis.KEM. Aigis.KEM is derived from public key encryption Aigis.PKE, so we will first assess its key reuse resilience using key recovery under plaintext-checking attack (KR-PCA). Then, we optimize the attack and proposes a two-positional KR-PCA attack to further approach the lower bound of attack complexity. We also verify these attacks through experiments, and discuss the further optimization and improvement. Finally, based on the KR-PCA attacks on Aigis.PKE, we further propose practical attacks on Aigis.KEM by utilizing side-channel attacks or fault-injection attacks. In response to these attacks, we explored possible countermeasures. The work helps to clarify the potential risks of Aigis.KEM and guide its application in practice.
密钥重用安全性是NIST后量子加密算法标准化中考虑的一个重要安全特性。在PKC ' 20上,Zhang等人提出了aegis。基于非对称MLWE的密钥封装机制KEM。Aigis。KEM提供灵活的参数选择,综合性能高,曾获得中国国家密码算法竞赛一等奖。然而,它的密钥重用安全性目前还不清楚。本文研究了aegis . kem的密钥重用安全性。Aigis。KEM是由公钥加密技术派生而来。因此,我们将首先使用明文检查攻击(KR-PCA)下的密钥恢复来评估其密钥重用弹性。然后,我们对攻击进行了优化,提出了一种双位置的KR-PCA攻击,进一步逼近攻击复杂度的下界。我们还通过实验验证了这些攻击,并讨论了进一步的优化和改进。最后,基于KR-PCA对isis进行攻击。PKE,我们进一步建议对isis实施实际攻击。利用侧信道攻击或故障注入攻击进行KEM攻击。为了应对这些攻击,我们探索了可能的对策。这项工作有助于澄清isis的潜在风险。并指导其在实践中的应用。
{"title":"Analysis of key reuse security for Aigis.KEM","authors":"Ke Wang ,&nbsp;Haodong Jiang ,&nbsp;Zhenfeng Zhang ,&nbsp;Long Chen ,&nbsp;Huiqin Xie","doi":"10.1016/j.tcs.2025.115680","DOIUrl":"10.1016/j.tcs.2025.115680","url":null,"abstract":"<div><div>Key reuse security is an important security property considered in the NIST post-quantum cryptography algorithm standardization. At PKC’20, Zhang et al. proposed Aigis.KEM, a key encapsulation mechanism based on asymmetric MLWE. Aigis.KEM provides flexible parameter selection, has high comprehensive performance, and won the first prize of the China’s National cryptographic algorithm competition. However, its key reuse security is currently unclear. This paper studies the key reuse security of Aigis.KEM. Aigis.KEM is derived from public key encryption Aigis.PKE, so we will first assess its key reuse resilience using key recovery under plaintext-checking attack (KR-PCA). Then, we optimize the attack and proposes a two-positional KR-PCA attack to further approach the lower bound of attack complexity. We also verify these attacks through experiments, and discuss the further optimization and improvement. Finally, based on the KR-PCA attacks on Aigis.PKE, we further propose practical attacks on Aigis.KEM by utilizing side-channel attacks or fault-injection attacks. In response to these attacks, we explored possible countermeasures. The work helps to clarify the potential risks of Aigis.KEM and guide its application in practice.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1063 ","pages":"Article 115680"},"PeriodicalIF":1.0,"publicationDate":"2025-12-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145746975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Anonymous registered attribute-based signature for circuits 匿名注册的基于属性的电路签名
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-04 DOI: 10.1016/j.tcs.2025.115681
Liuyu Yang , Xinxuan Zhang , Yi Deng , Zhuo Wu , Xudong Zhu
Registered attribute-based signature (registered ABS), introduced by Zhang et al. (PKC’24), eliminates the key escrow problem associated with classical attribute-based signature (ABS). It allows users to generate public/sectret key pairs themselves and register the related public key and attribute with a key curator. Different from a trusted attribute authority, the key curator is fully transparent and retains no secrets. In this paper, we propose the first generic framework for anonymous registered ABS that supports circuits as policies. We achieve this goal through an approach we call “accumulate-then-sign-then-prove”, which leverages commonly used cryptographic primitives including digital signature, accumulator, and non-interactive zero-knowledge schemes (NIZKs). We further enrich the functionality by adding user removal, making our scheme dynamic. Our generic framework can be instantiated from various combinations of inner and outer layer protocols based on different assumptions. We provide recommendations from three different perspectives for the choice of concrete cryptographic schemes. Compared with current work on registered ABS, our framework: i) provides diversity regarding the assumptions to instantiate cryptographic primitives; ii) has advantages in proof size and verification time.
由Zhang等人(PKC ' 24)提出的注册属性签名(Registered ABS),消除了与经典属性签名(ABS)相关的密钥托管问题。它允许用户自己生成公共/秘密密钥对,并向密钥管理员注册相关的公共密钥和属性。与可信属性权威不同,密钥管理器是完全透明的,不保留任何秘密。本文提出了第一个支持电路作为策略的匿名注册ABS通用框架。我们通过一种称为“积累-然后签名-然后证明”的方法来实现这一目标,该方法利用了常用的加密原语,包括数字签名、累加器和非交互式零知识方案(nizk)。我们通过添加用户删除来进一步丰富功能,使我们的方案动态化。我们的通用框架可以根据不同的假设从内部和外层协议的各种组合实例化。我们从三个不同的角度为具体密码方案的选择提供了建议。与目前在注册ABS上的工作相比,我们的框架:i)提供了关于实例化加密原语的假设的多样性;Ii)在证明大小和验证时间上具有优势。
{"title":"Anonymous registered attribute-based signature for circuits","authors":"Liuyu Yang ,&nbsp;Xinxuan Zhang ,&nbsp;Yi Deng ,&nbsp;Zhuo Wu ,&nbsp;Xudong Zhu","doi":"10.1016/j.tcs.2025.115681","DOIUrl":"10.1016/j.tcs.2025.115681","url":null,"abstract":"<div><div>Registered attribute-based signature (registered ABS), introduced by Zhang et al. (PKC’24), eliminates the key escrow problem associated with classical attribute-based signature (ABS). It allows users to generate public/sectret key pairs themselves and register the related public key and attribute with a key curator. Different from a trusted attribute authority, the key curator is fully transparent and retains no secrets. In this paper, we propose the first generic framework for anonymous registered ABS that supports circuits as policies. We achieve this goal through an approach we call “accumulate-then-sign-then-prove”, which leverages commonly used cryptographic primitives including digital signature, accumulator, and non-interactive zero-knowledge schemes (NIZKs). We further enrich the functionality by adding user removal, making our scheme dynamic. Our generic framework can be instantiated from various combinations of inner and outer layer protocols based on different assumptions. We provide recommendations from three different perspectives for the choice of concrete cryptographic schemes. Compared with current work on registered ABS, our framework: i) provides diversity regarding the assumptions to instantiate cryptographic primitives; ii) has advantages in proof size and verification time.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1063 ","pages":"Article 115681"},"PeriodicalIF":1.0,"publicationDate":"2025-12-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145746974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Image reflection on process graphs of 1-free regular expressions modulo bisimilarity 1-free正则表达式模双相似过程图的图像反射
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-03 DOI: 10.1016/j.tcs.2025.115678
Yuanrui Zhang , Xinxin Liu
We study a phenomenon called “image reflection” on a type of characterization graphs — LLEE charts — for 1-free regular expressions modulo bisimularity. This property, stating that the images of a bisimulation function from an LLEE chart actually impose a special LEE structure corresponding to the LLEE chart, is recognized by our proposed “well-structured looping-back charts” as a sub-LLEE-structure of LLEE charts. As an application, our study naturally leads to a novel proof for the completeness of the inference system BBP for 1-free regular expressions, due to the correspondence between 1-free regular expressions and the provable solutions of LEE/LLEE charts. Compared to the previous approach, our proof is more direct in the sense that it does not rely on a graph transformation procedure on LLEE charts in which at each step two bisimilar nodes have to be carefully selected and merged together according to selection rules. Our observation on LLEE charts is useful to understand the completeness problems of regular expressions modulo bisimilarity from a new angle, and can be also helpful for solving the completeness problems of other expressions that share similar graph structures.
我们研究了1-free正则表达式模双相似的一类表征图- LLEE图上的“映像反射”现象。这一性质表明,来自LLEE图表的双模拟函数的图像实际上强加了一个与LLEE图表相对应的特殊LEE结构,我们提出的“结构良好的回环图表”将其视为LLEE图表的子LLEE结构。作为一个应用,由于1-free正则表达式与LEE/LLEE图的可证明解之间的对应关系,我们的研究自然导致了1-free正则表达式推理系统BBP完备性的一个新的证明。与之前的方法相比,我们的证明更直接,因为它不依赖于LLEE图上的图变换过程,其中每一步都必须根据选择规则仔细选择两个双相似节点并合并在一起。我们对LLEE图的观察有助于从一个新的角度理解正则表达式模双相似的完备性问题,也有助于解决其他具有相似图结构的表达式的完备性问题。
{"title":"Image reflection on process graphs of 1-free regular expressions modulo bisimilarity","authors":"Yuanrui Zhang ,&nbsp;Xinxin Liu","doi":"10.1016/j.tcs.2025.115678","DOIUrl":"10.1016/j.tcs.2025.115678","url":null,"abstract":"<div><div>We study a phenomenon called “image reflection” on a type of characterization graphs — LLEE charts — for 1-free regular expressions modulo bisimularity. This property, stating that the images of a bisimulation function from an LLEE chart actually impose a special LEE structure corresponding to the LLEE chart, is recognized by our proposed “well-structured looping-back charts” as a sub-LLEE-structure of LLEE charts. As an application, our study naturally leads to a novel proof for the completeness of the inference system <span><math><mi>BBP</mi></math></span> for 1-free regular expressions, due to the correspondence between 1-free regular expressions and the provable solutions of LEE/LLEE charts. Compared to the previous approach, our proof is more direct in the sense that it does not rely on a graph transformation procedure on LLEE charts in which at each step two bisimilar nodes have to be carefully selected and merged together according to selection rules. Our observation on LLEE charts is useful to understand the completeness problems of regular expressions modulo bisimilarity from a new angle, and can be also helpful for solving the completeness problems of other expressions that share similar graph structures.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1063 ","pages":"Article 115678"},"PeriodicalIF":1.0,"publicationDate":"2025-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145705791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The non-inclusive diagnosability of a kind of networks 一类网络的非包容性可诊断性
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-11-29 DOI: 10.1016/j.tcs.2025.115659
Chuanye Zheng, Liqiong Xu
The probability of vertex failure in interconnection networks will enhance with the increase of the system scale, so the fault diagnosis of interconnection networks deserves our attention and study. The diagnosability is a significant indicator to evaluate network reliability. For measuring the diagnosability of a given system more accurately, Ding et al. [1] came up with the non-inclusive diagnosability of a graph. Our work is to determine the lower bounds of non-inclusive diagnosability of a kind of networks under the PMC model and the MM* model, which can be applied to non-regular graphs and some graphs containing triangles. Finally, we propose the non-inclusive diagnosability of some famous networks under the two diagnostic models as applications.
随着系统规模的增大,互连网络中出现顶点故障的概率会增大,因此互连网络的故障诊断值得我们关注和研究。可诊断性是评价网络可靠性的重要指标。为了更准确地测量给定系统的可诊断性,Ding等人提出了图的非包容性可诊断性。我们的工作是确定一类网络在PMC模型和MM*模型下的非包容可诊断性下界,该下界可应用于非正则图和一些包含三角形的图。最后,我们提出了两种诊断模型下一些著名网络的非包容性可诊断性作为应用。
{"title":"The non-inclusive diagnosability of a kind of networks","authors":"Chuanye Zheng,&nbsp;Liqiong Xu","doi":"10.1016/j.tcs.2025.115659","DOIUrl":"10.1016/j.tcs.2025.115659","url":null,"abstract":"<div><div>The probability of vertex failure in interconnection networks will enhance with the increase of the system scale, so the fault diagnosis of interconnection networks deserves our attention and study. The diagnosability is a significant indicator to evaluate network reliability. For measuring the diagnosability of a given system more accurately, Ding et al. [1] came up with the non-inclusive diagnosability of a graph. Our work is to determine the lower bounds of non-inclusive diagnosability of a kind of networks under the PMC model and the MM* model, which can be applied to non-regular graphs and some graphs containing triangles. Finally, we propose the non-inclusive diagnosability of some famous networks under the two diagnostic models as applications.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1062 ","pages":"Article 115659"},"PeriodicalIF":1.0,"publicationDate":"2025-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145659151","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Elimination of annotation dependencies in validation for Modern JSON Schema 消除了现代JSON模式验证中的注释依赖
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-11-28 DOI: 10.1016/j.tcs.2025.115645
Lyes Attouche , Mohamed-Amine Baazizi , Dario Colazzo , Giorgio Ghelli , Stefan Klessinger , Carlo Sartiani , Stefanie Scherzinger
<div><div>JSON Schema is a declarative language that allows one to specify the structure of JSON instances using hierarchical schema objects that combine logical and structural operators.2.2 Early versions of JSON Schema, known collectively as Classical JSON Schema, operated with a straightforward semantics where a schema’s meaning was completely determined by which JSON values it could successfully validate. This simple foundation enabled researchers to develop robust theoretical frameworks and practical tools for instance validation and also to determine whether schemas are satisfiable or equivalent to one another. However, Classical JSON Schema had a significant weakness in its inability to effectively express certain kinds of extensions of object schemas.</div><div>This limitation prompted a major overhaul in Draft 2019-09, introducing two new features that fundamentally alter how JSON Schema works. The first is <em>annotation dependency</em>, where validation now produces more than just a yes/no result. When a schema validates a JSON instance, it also generates an “annotation” that records which fields and items were “evaluated”. This annotation then influences the behavior of the new operators "<span><math><mi>unevaluatedProperties</mi></math></span>" and "<span><math><mi>unevaluatedItems</mi></math></span>", creating a dependency that did not exist before. The second feature is dynamic references, a separate mechanism that allows for the target of a reference operator to depend on the validation context. These changes were so substantial that all JSON Schema versions from Draft 2019-09 onward are called <em>Modern JSON Schema</em>.</div><div>This semantic shift invalidated much of the existing theoretical work, and the algorithms that researchers had developed for Classical JSON Schema — particularly those for determining satisfiability and schema inclusion — do not easily adapt to Modern JSON Schema’s new behavior. One approach to bridge this gap is “elimination” — converting Modern JSON Schema constructs back into equivalent Classical JSON Schema forms. Previous research successfully developed algorithms for eliminating dynamic references, but annotation dependency remained unsolved.</div><div>In this paper we solve this problem, providing three contributions: an <em>expressibility</em> result, proving that eliminating annotation-dependent operators is possible; a <em>succinctness</em> result, proving that eliminating annotation-dependent operators can generally cause schemas to grow exponentially in size, and finally a <em>practical algorithm</em> to perform annotation elimination.</div><div>Our “practical algorithm” not only matches the asymptotic lower-bound that is provided by the succinctness theorem, but it also presents some specific optimizations that we designed to exploit typical features or real-world schemas. A comprehensive experimental testing, executed on a representative set of 305 schemas retrieved from GitHub, shows tha
JSON模式是一种声明性语言,允许用户使用结合逻辑和结构操作符的分层模式对象来指定JSON实例的结构。2.2 JSON模式的早期版本,统称为经典JSON模式,使用直接的语义操作,其中模式的含义完全由它可以成功验证的JSON值决定。这个简单的基础使研究人员能够为实例验证开发强大的理论框架和实用工具,并确定模式是否可满足或彼此等效。然而,经典JSON模式有一个明显的弱点,即无法有效地表达对象模式的某些类型的扩展。这一限制促使草案2019-09进行了重大修改,引入了两个从根本上改变JSON模式工作方式的新功能。第一个是注释依赖,其中验证现在产生的不仅仅是是/否结果。当模式验证JSON实例时,它还生成一个“注释”,记录“评估”了哪些字段和项。这个注释然后影响新操作符“unevaluatedProperties”和“unevaluatedItems”的行为,创建以前不存在的依赖项。第二个特性是动态引用,这是一种单独的机制,允许引用操作符的目标依赖于验证上下文。这些变化是如此之大,以至于从2019-09草案开始的所有JSON模式版本都被称为现代JSON模式。这种语义的转变使许多现有的理论工作无效,并且研究人员为经典JSON模式开发的算法——特别是那些确定可满足性和模式包含性的算法——不容易适应现代JSON模式的新行为。弥合这一差距的一种方法是“消除”——将现代JSON模式结构转换回等效的经典JSON模式形式。先前的研究成功地开发了消除动态引用的算法,但注释依赖仍然没有得到解决。在本文中,我们解决了这个问题,提供了三个贡献:一个可表达性结果,证明消除注释依赖算子是可能的;简洁的结果,证明消除依赖于注释的操作符通常会导致模式的大小呈指数级增长,最后是执行注释消除的实用算法。我们的“实用算法”不仅与简洁性定理提供的渐近下界相匹配,而且还提供了一些我们为利用典型特征或现实世界模式而设计的特定优化。对从GitHub检索到的305个具有代表性的模式进行了全面的实验测试,结果表明,实际算法在所有模式上的运行时间都不到10毫秒,在98%的情况下运行时间不到1毫秒,并且在95%的情况下,它以经典JSON模式生成的模式的大小最多比以现代JSON模式编写的源模式大10倍。
{"title":"Elimination of annotation dependencies in validation for Modern JSON Schema","authors":"Lyes Attouche ,&nbsp;Mohamed-Amine Baazizi ,&nbsp;Dario Colazzo ,&nbsp;Giorgio Ghelli ,&nbsp;Stefan Klessinger ,&nbsp;Carlo Sartiani ,&nbsp;Stefanie Scherzinger","doi":"10.1016/j.tcs.2025.115645","DOIUrl":"10.1016/j.tcs.2025.115645","url":null,"abstract":"&lt;div&gt;&lt;div&gt;JSON Schema is a declarative language that allows one to specify the structure of JSON instances using hierarchical schema objects that combine logical and structural operators.2.2 Early versions of JSON Schema, known collectively as Classical JSON Schema, operated with a straightforward semantics where a schema’s meaning was completely determined by which JSON values it could successfully validate. This simple foundation enabled researchers to develop robust theoretical frameworks and practical tools for instance validation and also to determine whether schemas are satisfiable or equivalent to one another. However, Classical JSON Schema had a significant weakness in its inability to effectively express certain kinds of extensions of object schemas.&lt;/div&gt;&lt;div&gt;This limitation prompted a major overhaul in Draft 2019-09, introducing two new features that fundamentally alter how JSON Schema works. The first is &lt;em&gt;annotation dependency&lt;/em&gt;, where validation now produces more than just a yes/no result. When a schema validates a JSON instance, it also generates an “annotation” that records which fields and items were “evaluated”. This annotation then influences the behavior of the new operators \"&lt;span&gt;&lt;math&gt;&lt;mi&gt;unevaluatedProperties&lt;/mi&gt;&lt;/math&gt;&lt;/span&gt;\" and \"&lt;span&gt;&lt;math&gt;&lt;mi&gt;unevaluatedItems&lt;/mi&gt;&lt;/math&gt;&lt;/span&gt;\", creating a dependency that did not exist before. The second feature is dynamic references, a separate mechanism that allows for the target of a reference operator to depend on the validation context. These changes were so substantial that all JSON Schema versions from Draft 2019-09 onward are called &lt;em&gt;Modern JSON Schema&lt;/em&gt;.&lt;/div&gt;&lt;div&gt;This semantic shift invalidated much of the existing theoretical work, and the algorithms that researchers had developed for Classical JSON Schema — particularly those for determining satisfiability and schema inclusion — do not easily adapt to Modern JSON Schema’s new behavior. One approach to bridge this gap is “elimination” — converting Modern JSON Schema constructs back into equivalent Classical JSON Schema forms. Previous research successfully developed algorithms for eliminating dynamic references, but annotation dependency remained unsolved.&lt;/div&gt;&lt;div&gt;In this paper we solve this problem, providing three contributions: an &lt;em&gt;expressibility&lt;/em&gt; result, proving that eliminating annotation-dependent operators is possible; a &lt;em&gt;succinctness&lt;/em&gt; result, proving that eliminating annotation-dependent operators can generally cause schemas to grow exponentially in size, and finally a &lt;em&gt;practical algorithm&lt;/em&gt; to perform annotation elimination.&lt;/div&gt;&lt;div&gt;Our “practical algorithm” not only matches the asymptotic lower-bound that is provided by the succinctness theorem, but it also presents some specific optimizations that we designed to exploit typical features or real-world schemas. A comprehensive experimental testing, executed on a representative set of 305 schemas retrieved from GitHub, shows tha","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1063 ","pages":"Article 115645"},"PeriodicalIF":1.0,"publicationDate":"2025-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145798612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Theoretical Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1