Pub Date : 2024-09-13DOI: 10.1016/j.tcs.2024.114871
Ionut Cardei, Caner Mutlu, Mihaela Cardei
Reducing traffic congestion and increasing passenger safety are important objectives for emerging automated transportation systems. Autonomous intersection management systems (AIMS) enable large scale optimization of vehicle trajectories with connected and autonomous vehicles (CAVs). We propose a novel approach for computing the fastest waypoint trajectory in intersections using graph search in a discretized space-time graph that produces collision-free paths with variable vehicle speeds that comply with traffic rules and vehicle dynamical constraints. To assist our planner algorithm in decentralized scenarios, we also propose a multi-agent protocol architecture for vehicle coordination for trajectory planning using a vehicle-to-vehicle (V2V) network. The trajectories generated allow a much higher evacuation rate and congestion threshold, with lower algorithm runtime compared to the state of the art conflict detection graph platoon path planning method, even for large scenarios with vehicle arrival rate of and thousands of vehicles.
{"title":"Space-time graph path planner for unsignalized intersection management with a V2V agent coordination architecture","authors":"Ionut Cardei, Caner Mutlu, Mihaela Cardei","doi":"10.1016/j.tcs.2024.114871","DOIUrl":"10.1016/j.tcs.2024.114871","url":null,"abstract":"<div><p>Reducing traffic congestion and increasing passenger safety are important objectives for emerging automated transportation systems. Autonomous intersection management systems (AIMS) enable large scale optimization of vehicle trajectories with connected and autonomous vehicles (CAVs). We propose a novel approach for computing the fastest waypoint trajectory in intersections using graph search in a discretized space-time graph that produces collision-free paths with variable vehicle speeds that comply with traffic rules and vehicle dynamical constraints. To assist our planner algorithm in decentralized scenarios, we also propose a multi-agent protocol architecture for vehicle coordination for trajectory planning using a vehicle-to-vehicle (V2V) network. The trajectories generated allow a much higher evacuation rate and congestion threshold, with lower <span><math><mi>O</mi><mo>(</mo><mi>N</mi><mo>)</mo></math></span> algorithm runtime compared to the state of the art conflict detection graph platoon path planning method, even for large scenarios with vehicle arrival rate of <span><math><mn>1</mn><mo>/</mo><mi>s</mi></math></span> and thousands of vehicles.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1020 ","pages":"Article 114871"},"PeriodicalIF":0.9,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142239252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The reconstruction of a (hyper)graph starting from its degree sequence is one of the most relevant among the inverse problems investigated in the field of graph theory. In case of graphs, a feasible solution can be quickly reached, while in case of hypergraphs Deza et al. (2018) proved that the problem is NP-hard even in the simple case of 3-uniform ones. This result opened a new research line consisting in the detection of instances for which a solution can be computed in polynomial time. In this work we deal with 3-uniform hypergraphs, and we study them from a different perspective, exploiting a connection of these objects with partially ordered sets. More precisely, we introduce a simple partially ordered set, whose ideals are in bijection with a subclass of 3-uniform hypergraphs. We completely characterize their degree sequences in case of principal ideals (here a simple fast reconstruction strategy follows), and we furthermore carry on a complete analysis of those degree sequences related to the ideals with two generators. We also consider unique hypergraphs in , i.e., those hypergraphs that do not share their degree sequence with other non-isomorphic ones. We show that uniqueness holds in case of hypergraphs associated to principal ideals, and we provide some examples of hypergraphs in where this property is lost.
{"title":"An algebraic approach to the reconstruction of uniform hypergraphs from their degree sequence","authors":"Michela Ascolese , Andrea Frosini , Elisa Pergola , Simone Rinaldi , Laurent Vuillon","doi":"10.1016/j.tcs.2024.114872","DOIUrl":"10.1016/j.tcs.2024.114872","url":null,"abstract":"<div><p>The reconstruction of a (hyper)graph starting from its degree sequence is one of the most relevant among the inverse problems investigated in the field of graph theory. In case of graphs, a feasible solution can be quickly reached, while in case of hypergraphs Deza et al. (2018) proved that the problem is NP-hard even in the simple case of 3-uniform ones. This result opened a new research line consisting in the detection of instances for which a solution can be computed in polynomial time. In this work we deal with 3-uniform hypergraphs, and we study them from a different perspective, exploiting a connection of these objects with partially ordered sets. More precisely, we introduce a simple partially ordered set, whose ideals are in bijection with a subclass of 3-uniform hypergraphs. We completely characterize their degree sequences in case of principal ideals (here a simple fast reconstruction strategy follows), and we furthermore carry on a complete analysis of those degree sequences related to the ideals with two generators. We also consider unique hypergraphs in <span><math><msup><mrow><mi>D</mi></mrow><mrow><mi>e</mi><mi>x</mi><mi>t</mi></mrow></msup></math></span>, i.e., those hypergraphs that do not share their degree sequence with other non-isomorphic ones. We show that uniqueness holds in case of hypergraphs associated to principal ideals, and we provide some examples of hypergraphs in <span><math><msup><mrow><mi>D</mi></mrow><mrow><mi>e</mi><mi>x</mi><mi>t</mi></mrow></msup></math></span> where this property is lost.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1020 ","pages":"Article 114872"},"PeriodicalIF":0.9,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0304397524004894/pdfft?md5=9a5013316177a513ac9292e891e55cf0&pid=1-s2.0-S0304397524004894-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142239250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-12DOI: 10.1016/j.tcs.2024.114869
Lei Sun , Zexia Shi , Jian Liu , Fang-Wei Fu
Constructions of Boolean functions with various cryptographic properties have always been an important challenge in cryptography. This paper proposes systematic constructions of even-variable rotation symmetric Boolean functions satisfying almost all cryptographic criteria, that is, resiliency, optimal algebraic degree, strict avalanche criterion, high nonlinearity, nonexistence of nonzero linear structures, good global avalanche characteristics. Moreover, some of the constructions also have high algebraic immunity. This is the first time that Boolean functions having such cryptographic properties are obtained, which can be considered as good candidates for the design of real-life encryption schemes.
{"title":"Constructions of rotation symmetric Boolean functions satisfying almost all cryptographic criteria","authors":"Lei Sun , Zexia Shi , Jian Liu , Fang-Wei Fu","doi":"10.1016/j.tcs.2024.114869","DOIUrl":"10.1016/j.tcs.2024.114869","url":null,"abstract":"<div><p>Constructions of Boolean functions with various cryptographic properties have always been an important challenge in cryptography. This paper proposes systematic constructions of even-variable rotation symmetric Boolean functions satisfying almost all cryptographic criteria, that is, resiliency, optimal algebraic degree, strict avalanche criterion, high nonlinearity, nonexistence of nonzero linear structures, good global avalanche characteristics. Moreover, some of the constructions also have high algebraic immunity. This is the first time that Boolean functions having such cryptographic properties are obtained, which can be considered as good candidates for the design of real-life encryption schemes.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1020 ","pages":"Article 114869"},"PeriodicalIF":0.9,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142239253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-12DOI: 10.1016/j.tcs.2024.114781
Andrew L. Szilard
This essay, in a novel way, uses various tiles, such as dominoes, square-, interlocking-, and flow-tiles, to visualize approximations to recursively defined, potentially infinite mathematical objects, such as binary code tables, and variants of the space-filling Hilbert curve. The power of L-systems is shown by defining these tiled objects as L-systems.
这篇文章以一种新颖的方式,利用多米诺骨牌、方形瓦片、连锁瓦片和流动瓦片等各种瓦片,将递归定义的、可能无限的数学对象(如二进制代码表和空间填充希尔伯特曲线的变体)可视化为近似值。通过将这些瓦片对象定义为 L 系统,我们可以看到 L 系统的威力。
{"title":"On recursive tiling of some mathematical objects","authors":"Andrew L. Szilard","doi":"10.1016/j.tcs.2024.114781","DOIUrl":"10.1016/j.tcs.2024.114781","url":null,"abstract":"<div><div>This essay, in a novel way, uses various tiles, such as dominoes, square-, interlocking-, and flow-tiles, to visualize approximations to recursively defined, potentially infinite mathematical objects, such as binary code tables, and variants of the space-filling Hilbert curve. The power of L-systems is shown by defining these tiled objects as L-systems.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1022 ","pages":"Article 114781"},"PeriodicalIF":0.9,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142699487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
<div><p>A <em>vertex cover</em> of a graph is a set of vertices of the graph such that every edge has at least one endpoint in it. In this work, we study <span>Weighted Vertex Cover</span> with solution size as a parameter. Formally, in the <span><math><mo>(</mo><mi>k</mi><mo>,</mo><mi>W</mi><mo>)</mo></math></span>-<span>Vertex Cover</span> problem, given a graph <em>G</em>, an integer <em>k</em>, a positive rational <em>W</em>, and a weight function <span><math><mi>w</mi><mo>:</mo><mi>V</mi><mo>(</mo><mi>G</mi><mo>)</mo><mo>→</mo><msup><mrow><mi>Q</mi></mrow><mrow><mo>+</mo></mrow></msup></math></span>, the question is whether <em>G</em> has a vertex cover of size at most <em>k</em> of weight at most <em>W</em>, with <em>k</em> being the parameter. An <span><math><mo>(</mo><mi>a</mi><mo>,</mo><mi>b</mi><mo>)</mo></math></span>-bi-criteria approximation algorithm for <span><math><mo>(</mo><mi>k</mi><mo>,</mo><mi>W</mi><mo>)</mo></math></span>-<span>Vertex Cover</span> either produces a vertex cover <em>S</em> such that <span><math><mo>|</mo><mi>S</mi><mo>|</mo><mo>≤</mo><mi>a</mi><mi>k</mi></math></span> and <span><math><mi>w</mi><mo>(</mo><mi>S</mi><mo>)</mo><mo>≤</mo><mi>b</mi><mi>W</mi></math></span>, or decides that there is no vertex cover of size at most <em>k</em> of weight at most <em>W</em>. We obtain the following results.</p><ul><li><span>•</span><span><p>A simple <span><math><mo>(</mo><mn>2</mn><mo>,</mo><mn>2</mn><mo>)</mo></math></span>-bi-criteria approximation algorithm for <span><math><mo>(</mo><mi>k</mi><mo>,</mo><mi>W</mi><mo>)</mo></math></span>-<span>Vertex Cover</span> in polynomial time by modifying the standard <span>LP</span>-rounding algorithm.</p></span></li><li><span>•</span><span><p>A simple exact parameterized algorithm for <span><math><mo>(</mo><mi>k</mi><mo>,</mo><mi>W</mi><mo>)</mo></math></span>-<span>Vertex Cover</span> running in <span><math><msup><mrow><mi>O</mi></mrow><mrow><mo>⁎</mo></mrow></msup><mo>(</mo><msup><mrow><mn>1.4656</mn></mrow><mrow><mi>k</mi></mrow></msup><mo>)</mo></math></span> time<span><span><sup>1</sup></span></span>.</p></span></li><li><span>•</span><span><p>A <span><math><mo>(</mo><mn>1</mn><mo>+</mo><mi>ϵ</mi><mo>,</mo><mn>2</mn><mo>)</mo></math></span>-approximation algorithm for <span><math><mo>(</mo><mi>k</mi><mo>,</mo><mi>W</mi><mo>)</mo></math></span>-<span>Vertex Cover</span> running in <span><math><msup><mrow><mi>O</mi></mrow><mrow><mo>⁎</mo></mrow></msup><mo>(</mo><msup><mrow><mn>1.4656</mn></mrow><mrow><mo>(</mo><mn>1</mn><mo>−</mo><mi>ϵ</mi><mo>)</mo><mi>k</mi></mrow></msup><mo>)</mo></math></span> time.</p></span></li><li><span>•</span><span><p>A <span><math><mo>(</mo><mn>1.5</mn><mo>,</mo><mn>1.5</mn><mo>)</mo></math></span>-approximation algorithm for <span><math><mo>(</mo><mi>k</mi><mo>,</mo><mi>W</mi><mo>)</mo></math></span>-<span>Vertex Cover</span> running in <span><math><msup><mrow><mi>O</mi></mrow><mrow><mo>⁎</mo></mrow></msup><mo>(</mo><msup><mrow><mn>1.414</mn></mr
图的顶点覆盖是指图中每个边至少有一个端点的顶点集合。在这项工作中,我们研究的是以解决方案大小为参数的加权顶点覆盖问题。形式上,在(k,W)-顶点覆盖问题中,给定一个图 G、一个整数 k、一个正有理数 W 和一个权重函数 w:V(G)→Q+,问题是 G 是否有一个大小至多为 k、权重至多为 W(k 为参数)的顶点覆盖。(k,W)-Vertex Cover 的 (a,b)-bi-criteria 近似算法要么产生一个顶点覆盖 S,使得 |S|≤ak 且 w(S)≤bW,要么判定不存在大小至多为 k 权重至多为 W 的顶点覆盖。我们得到了以下结果。-运行于 O⁎(1.4656k) time1 的 (k,W)-Vertex Cover 的简单精确参数化算法。对于任意 δ<0.5,(k,W)-顶点覆盖的(2-δ,2-δ)-近似计算法在 O⁎(∑i=δk(1-2δ)1+2δδk(1-2δ)2δ(δk+iδk-2iδ1-2δ))时间内运行。例如,对于 (1.75,1.75) 和 (1.9,1.9) 近似算法,我们得到的运行时间分别为 O⁎(1.272k) 和 O⁎(1.151k)。与有权重版本的算法相比,我们的算法是我们所知的第一种可以使用任意权重的算法,而且在解的大小远小于所需解的总权重时,我们的算法表现良好。
{"title":"Parameterized approximation algorithms for weighted vertex cover","authors":"Soumen Mandal , Pranabendu Misra , Ashutosh Rai , Saket Saurabh","doi":"10.1016/j.tcs.2024.114870","DOIUrl":"10.1016/j.tcs.2024.114870","url":null,"abstract":"<div><p>A <em>vertex cover</em> of a graph is a set of vertices of the graph such that every edge has at least one endpoint in it. In this work, we study <span>Weighted Vertex Cover</span> with solution size as a parameter. Formally, in the <span><math><mo>(</mo><mi>k</mi><mo>,</mo><mi>W</mi><mo>)</mo></math></span>-<span>Vertex Cover</span> problem, given a graph <em>G</em>, an integer <em>k</em>, a positive rational <em>W</em>, and a weight function <span><math><mi>w</mi><mo>:</mo><mi>V</mi><mo>(</mo><mi>G</mi><mo>)</mo><mo>→</mo><msup><mrow><mi>Q</mi></mrow><mrow><mo>+</mo></mrow></msup></math></span>, the question is whether <em>G</em> has a vertex cover of size at most <em>k</em> of weight at most <em>W</em>, with <em>k</em> being the parameter. An <span><math><mo>(</mo><mi>a</mi><mo>,</mo><mi>b</mi><mo>)</mo></math></span>-bi-criteria approximation algorithm for <span><math><mo>(</mo><mi>k</mi><mo>,</mo><mi>W</mi><mo>)</mo></math></span>-<span>Vertex Cover</span> either produces a vertex cover <em>S</em> such that <span><math><mo>|</mo><mi>S</mi><mo>|</mo><mo>≤</mo><mi>a</mi><mi>k</mi></math></span> and <span><math><mi>w</mi><mo>(</mo><mi>S</mi><mo>)</mo><mo>≤</mo><mi>b</mi><mi>W</mi></math></span>, or decides that there is no vertex cover of size at most <em>k</em> of weight at most <em>W</em>. We obtain the following results.</p><ul><li><span>•</span><span><p>A simple <span><math><mo>(</mo><mn>2</mn><mo>,</mo><mn>2</mn><mo>)</mo></math></span>-bi-criteria approximation algorithm for <span><math><mo>(</mo><mi>k</mi><mo>,</mo><mi>W</mi><mo>)</mo></math></span>-<span>Vertex Cover</span> in polynomial time by modifying the standard <span>LP</span>-rounding algorithm.</p></span></li><li><span>•</span><span><p>A simple exact parameterized algorithm for <span><math><mo>(</mo><mi>k</mi><mo>,</mo><mi>W</mi><mo>)</mo></math></span>-<span>Vertex Cover</span> running in <span><math><msup><mrow><mi>O</mi></mrow><mrow><mo>⁎</mo></mrow></msup><mo>(</mo><msup><mrow><mn>1.4656</mn></mrow><mrow><mi>k</mi></mrow></msup><mo>)</mo></math></span> time<span><span><sup>1</sup></span></span>.</p></span></li><li><span>•</span><span><p>A <span><math><mo>(</mo><mn>1</mn><mo>+</mo><mi>ϵ</mi><mo>,</mo><mn>2</mn><mo>)</mo></math></span>-approximation algorithm for <span><math><mo>(</mo><mi>k</mi><mo>,</mo><mi>W</mi><mo>)</mo></math></span>-<span>Vertex Cover</span> running in <span><math><msup><mrow><mi>O</mi></mrow><mrow><mo>⁎</mo></mrow></msup><mo>(</mo><msup><mrow><mn>1.4656</mn></mrow><mrow><mo>(</mo><mn>1</mn><mo>−</mo><mi>ϵ</mi><mo>)</mo><mi>k</mi></mrow></msup><mo>)</mo></math></span> time.</p></span></li><li><span>•</span><span><p>A <span><math><mo>(</mo><mn>1.5</mn><mo>,</mo><mn>1.5</mn><mo>)</mo></math></span>-approximation algorithm for <span><math><mo>(</mo><mi>k</mi><mo>,</mo><mi>W</mi><mo>)</mo></math></span>-<span>Vertex Cover</span> running in <span><math><msup><mrow><mi>O</mi></mrow><mrow><mo>⁎</mo></mrow></msup><mo>(</mo><msup><mrow><mn>1.414</mn></mr","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1021 ","pages":"Article 114870"},"PeriodicalIF":0.9,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142271415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-10DOI: 10.1016/j.tcs.2024.114844
Zhiyi Huang, Hanwen Zhang
The deterministic k-server conjecture states that there is a k-competitive deterministic algorithm for the k-server problem for any metric space. We show that the work function algorithm is 3-competitive for the 3-server problem on circle metrics, a case left open by Coester and Koutsoupias (2021). Our analysis follows the existing framework but introduces a new potential function which may be viewed as a relaxation of the counterpart by Coester and Koutsoupias (2021). We further notice that the new potential function and many existing ones can be rewritten in a canonical form. Through a computer-aided verification, however, we find that no such canonical potential function can resolve the deterministic 3-server conjecture for general metric spaces under the current analysis framework.
确定性 k 伺服器猜想指出,对于任意度量空间的 k 伺服器问题,都存在一种 k 竞争确定性算法。我们证明,对于圆公设上的 3-server 问题,功函数算法具有 3 种竞争性,这是 Coester 和 Koutsoupias(2021 年)未解决的问题。我们的分析沿用了现有的框架,但引入了一个新的势函数,该势函数可视为 Coester 和 Koutsoupias(2021 年)的对应函数的松弛。我们进一步注意到,新的势函数和许多现有的势函数都可以用规范形式重写。然而,通过计算机辅助验证,我们发现在当前的分析框架下,没有这样的典型势函数可以解决一般度量空间的确定性 3 伺服猜想。
{"title":"Deterministic 3-server on a circle and the limitation of canonical potentials","authors":"Zhiyi Huang, Hanwen Zhang","doi":"10.1016/j.tcs.2024.114844","DOIUrl":"10.1016/j.tcs.2024.114844","url":null,"abstract":"<div><p>The deterministic <em>k</em>-server conjecture states that there is a <em>k</em>-competitive deterministic algorithm for the <em>k</em>-server problem for any metric space. We show that the work function algorithm is 3-competitive for the 3-server problem on circle metrics, a case left open by Coester and Koutsoupias (2021). Our analysis follows the existing framework but introduces a new potential function which may be viewed as a relaxation of the counterpart by Coester and Koutsoupias (2021). We further notice that the new potential function and many existing ones can be rewritten in a canonical form. Through a computer-aided verification, however, we find that no such canonical potential function can resolve the deterministic 3-server conjecture for general metric spaces under the current analysis framework.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1020 ","pages":"Article 114844"},"PeriodicalIF":0.9,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142239251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-06DOI: 10.1016/j.tcs.2024.114836
Cristina G. Fernandes , Carla N. Lintzmayer , Phablo F.S. Moura
The Steiner Multicycle problem consists in, given a complete graph, a weight function on its edges, and a collection of pairwise disjoint non-unitary sets called terminal sets, finding a minimum weight collection of vertex-disjoint cycles in the graph such that, for every terminal set, all of its vertices are in a same cycle of the collection. This problem generalizes the Traveling Salesman problem and, therefore, is hard to approximate in general. On the practical side, it models a collaborative less-than-truckload problem with pickup and delivery locations. Using an algorithm for the Survivable Network Design problem and T-joins, we obtain a 3-approximation for the metric case, improving on the previous best 4-approximation. Furthermore, we present an (11/9)-approximation for the particular case of the Steiner Multicycle in which each edge weight is 1 or 2. This algorithm can be adapted to obtain a (7/6)-approximation when every terminal set contains at least four vertices. Finally, we devise an -approximation algorithm for the asymmetric version of the problem.
{"title":"Approximations for the Steiner Multicycle problem","authors":"Cristina G. Fernandes , Carla N. Lintzmayer , Phablo F.S. Moura","doi":"10.1016/j.tcs.2024.114836","DOIUrl":"10.1016/j.tcs.2024.114836","url":null,"abstract":"<div><p>The <span>Steiner Multicycle</span> problem consists in, given a complete graph, a weight function on its edges, and a collection of pairwise disjoint non-unitary sets called terminal sets, finding a minimum weight collection of vertex-disjoint cycles in the graph such that, for every terminal set, all of its vertices are in a same cycle of the collection. This problem generalizes the <span>Traveling Salesman</span> problem and, therefore, is hard to approximate in general. On the practical side, it models a collaborative less-than-truckload problem with pickup and delivery locations. Using an algorithm for the <span>Survivable Network Design</span> problem and <em>T</em>-joins, we obtain a 3-approximation for the metric case, improving on the previous best 4-approximation. Furthermore, we present an (11/9)-approximation for the particular case of the <span>Steiner Multicycle</span> in which each edge weight is 1 or 2. This algorithm can be adapted to obtain a (7/6)-approximation when every terminal set contains at least four vertices. Finally, we devise an <span><math><mi>O</mi><mo>(</mo><mi>lg</mi><mo></mo><mi>n</mi><mo>)</mo></math></span>-approximation algorithm for the asymmetric version of the problem.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1020 ","pages":"Article 114836"},"PeriodicalIF":0.9,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142163957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
As high performance computing systems consisting of multiple processors play an important role in big data analytics, we are motivated to focus on the research of reliability, design-for-test, fault diagnosis and detection of large-scale multiprocessor interconnected systems. System-level diagnosis theory, which originates from the testing of VLSI and Wafer, aims to identify faulty processors in these systems by means of analyzing the test results among the processors, while diagnosability as well as diagnosis accuracy are two important indices. The probabilistic fault diagnostic strategy seeks to correctly diagnose processors with high probability under the assumption that each processor has a certain failing probability. In this work, based on the probabilistic diagnosis algorithm with consideration of fault clustering, we specialize in the local diagnostic capability to establish the probability that any processor in a discrete status is diagnosed correctly. Subsequently, we investigate the global performance evaluation of multiprocessor systems under various significant fault distributions including Poisson distribution, Exponential distribution and Binomial distribution. In addition, we directly apply our results to the data center network and -star network. Numerical simulations are performed to verify the established results, which reveal the relationship between the accuracy of correct diagnosis and regulatory parameters.
{"title":"Probabilistic cluster fault diagnosis for multiprocessor systems","authors":"Baohua Niu , Shuming Zhou , Hong Zhang , Qifan Zhang","doi":"10.1016/j.tcs.2024.114837","DOIUrl":"10.1016/j.tcs.2024.114837","url":null,"abstract":"<div><p>As high performance computing systems consisting of multiple processors play an important role in big data analytics, we are motivated to focus on the research of reliability, design-for-test, fault diagnosis and detection of large-scale multiprocessor interconnected systems. System-level diagnosis theory, which originates from the testing of VLSI and Wafer, aims to identify faulty processors in these systems by means of analyzing the test results among the processors, while diagnosability as well as diagnosis accuracy are two important indices. The probabilistic fault diagnostic strategy seeks to correctly diagnose processors with high probability under the assumption that each processor has a certain failing probability. In this work, based on the probabilistic diagnosis algorithm with consideration of fault clustering, we specialize in the local diagnostic capability to establish the probability that any processor in a discrete status is diagnosed correctly. Subsequently, we investigate the global performance evaluation of multiprocessor systems under various significant fault distributions including Poisson distribution, Exponential distribution and Binomial distribution. In addition, we directly apply our results to the data center network <span><math><mi>H</mi><mi>S</mi><mi>D</mi><mi>C</mi></math></span> and <span><math><mo>(</mo><mi>n</mi><mo>,</mo><mi>k</mi><mo>)</mo></math></span>-star network. Numerical simulations are performed to verify the established results, which reveal the relationship between the accuracy of correct diagnosis and regulatory parameters.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1020 ","pages":"Article 114837"},"PeriodicalIF":0.9,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142168383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-06DOI: 10.1016/j.tcs.2024.114854
Kenji Saotome , Koji Nakazawa , Daisuke Kimura
Symbolic heaps, which are a restricted class of separation logic formulas, with inductive definitions are a suitable language in automated verification systems for memory-manipulating programs. In this context, some related problems, e.g., the entailment problem, have been studied theoretically. In addition, several solvers for the entailment problem based on the proof-search algorithm in cyclic-proof systems, which are proof systems in sequent calculus style with cyclic structure, have been proposed. However, the cut-elimination property generally does not hold for cyclic-proof systems of symbolic heaps with inductive definitions, which means that searching for a cut-free proof is insufficient. In other words, we hope to find a reasonable proof-search algorithm considering the cut rule or we give up on obtaining a complete proof-search procedure. This paper investigates this issue and demonstrates a limit to the challenge of the restrictions on the cut rule in a cyclic-proof system for symbolic heaps. We propose a restricted cut rule, referred to as the presumable cut, which is a relaxed variant of the analytic cut, in which the cut formula must be a subformula of the bottom sequent. This paper demonstrates that the provability of the cyclic-proof system for symbolic heaps becomes strictly weaker by restricting the cut rule to the presumable cut.
{"title":"Restriction on cut rule in cyclic-proof system for symbolic heaps","authors":"Kenji Saotome , Koji Nakazawa , Daisuke Kimura","doi":"10.1016/j.tcs.2024.114854","DOIUrl":"10.1016/j.tcs.2024.114854","url":null,"abstract":"<div><p>Symbolic heaps, which are a restricted class of separation logic formulas, with inductive definitions are a suitable language in automated verification systems for memory-manipulating programs. In this context, some related problems, e.g., the entailment problem, have been studied theoretically. In addition, several solvers for the entailment problem based on the proof-search algorithm in cyclic-proof systems, which are proof systems in sequent calculus style with cyclic structure, have been proposed. However, the cut-elimination property generally does not hold for cyclic-proof systems of symbolic heaps with inductive definitions, which means that searching for a cut-free proof is insufficient. In other words, we hope to find a reasonable proof-search algorithm considering the cut rule or we give up on obtaining a complete proof-search procedure. This paper investigates this issue and demonstrates a limit to the challenge of the restrictions on the cut rule in a cyclic-proof system for symbolic heaps. We propose a restricted cut rule, referred to as the presumable cut, which is a relaxed variant of the analytic cut, in which the cut formula must be a subformula of the bottom sequent. This paper demonstrates that the provability of the cyclic-proof system for symbolic heaps becomes strictly weaker by restricting the cut rule to the presumable cut.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1019 ","pages":"Article 114854"},"PeriodicalIF":0.9,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0304397524004717/pdfft?md5=08f063fdecac881a6031c44144f640a6&pid=1-s2.0-S0304397524004717-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142163029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-06DOI: 10.1016/j.tcs.2024.114847
Stefan Rass , Max-Julian Jakobitsch , Stefan Haan , Moritz Hiebler
We consider the problem of sampling elements with some desired property from a large set, without testing the property of interest, but with the (probabilistic) assurance to have at least one match among the random sample. Like in ranked set sampling (RSS), we consider an infinite population under study, whose properties of interest are too expensive and/or time-consuming to measure. Unlike RSS, we are void of a ranking mechanism, so our sampling is done entirely blind. We show how it is nonetheless doable to assure, with controllably large likelihood, to either have at least one of the interesting elements in a random sample, or, contrarily, sample with the likewise assurance of not having one of the interesting elements in the sample. Our technique utilizes density bounds for distributions and threshold functions from random graph theory.
{"title":"Threshold sampling","authors":"Stefan Rass , Max-Julian Jakobitsch , Stefan Haan , Moritz Hiebler","doi":"10.1016/j.tcs.2024.114847","DOIUrl":"10.1016/j.tcs.2024.114847","url":null,"abstract":"<div><p>We consider the problem of sampling elements with some desired property from a large set, without testing the property of interest, but with the (probabilistic) assurance to have at least one match among the random sample. Like in ranked set sampling (RSS), we consider an infinite population under study, whose properties of interest are too expensive and/or time-consuming to measure. Unlike RSS, we are void of a ranking mechanism, so our sampling is done entirely blind. We show how it is nonetheless doable to assure, with controllably large likelihood, to either have at least one of the interesting elements in a random sample, or, contrarily, sample with the likewise assurance of not having one of the interesting elements in the sample. Our technique utilizes density bounds for distributions and threshold functions from random graph theory.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1019 ","pages":"Article 114847"},"PeriodicalIF":0.9,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S030439752400464X/pdfft?md5=26ceab1a448b5baf958ad0b8d3b32343&pid=1-s2.0-S030439752400464X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142163028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}