首页 > 最新文献

Theoretical Computer Science最新文献

英文 中文
Space-time graph path planner for unsignalized intersection management with a V2V agent coordination architecture 利用 V2V 代理协调架构管理无信号交叉口的时空图路径规划器
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-13 DOI: 10.1016/j.tcs.2024.114871
Ionut Cardei, Caner Mutlu, Mihaela Cardei

Reducing traffic congestion and increasing passenger safety are important objectives for emerging automated transportation systems. Autonomous intersection management systems (AIMS) enable large scale optimization of vehicle trajectories with connected and autonomous vehicles (CAVs). We propose a novel approach for computing the fastest waypoint trajectory in intersections using graph search in a discretized space-time graph that produces collision-free paths with variable vehicle speeds that comply with traffic rules and vehicle dynamical constraints. To assist our planner algorithm in decentralized scenarios, we also propose a multi-agent protocol architecture for vehicle coordination for trajectory planning using a vehicle-to-vehicle (V2V) network. The trajectories generated allow a much higher evacuation rate and congestion threshold, with lower O(N) algorithm runtime compared to the state of the art conflict detection graph platoon path planning method, even for large scenarios with vehicle arrival rate of 1/s and thousands of vehicles.

减少交通拥堵和提高乘客安全是新兴自动交通系统的重要目标。自主交叉路口管理系统(AIMS)可以大规模优化联网和自主车辆(CAV)的行驶轨迹。我们提出了一种新方法,利用离散时空图中的图搜索计算交叉路口中最快的航点轨迹,该方法可生成符合交通规则和车辆动态约束条件的无碰撞路径,且车辆速度可变。为了在分散场景中辅助我们的规划算法,我们还提出了一种多代理协议架构,用于协调车辆,利用车对车(V2V)网络进行轨迹规划。生成的轨迹允许更高的疏散率和拥堵阈值,与最先进的冲突检测图排路径规划方法相比,O(N)算法运行时间更短,即使在车辆到达率为1/s、车辆数以千计的大型场景中也是如此。
{"title":"Space-time graph path planner for unsignalized intersection management with a V2V agent coordination architecture","authors":"Ionut Cardei,&nbsp;Caner Mutlu,&nbsp;Mihaela Cardei","doi":"10.1016/j.tcs.2024.114871","DOIUrl":"10.1016/j.tcs.2024.114871","url":null,"abstract":"<div><p>Reducing traffic congestion and increasing passenger safety are important objectives for emerging automated transportation systems. Autonomous intersection management systems (AIMS) enable large scale optimization of vehicle trajectories with connected and autonomous vehicles (CAVs). We propose a novel approach for computing the fastest waypoint trajectory in intersections using graph search in a discretized space-time graph that produces collision-free paths with variable vehicle speeds that comply with traffic rules and vehicle dynamical constraints. To assist our planner algorithm in decentralized scenarios, we also propose a multi-agent protocol architecture for vehicle coordination for trajectory planning using a vehicle-to-vehicle (V2V) network. The trajectories generated allow a much higher evacuation rate and congestion threshold, with lower <span><math><mi>O</mi><mo>(</mo><mi>N</mi><mo>)</mo></math></span> algorithm runtime compared to the state of the art conflict detection graph platoon path planning method, even for large scenarios with vehicle arrival rate of <span><math><mn>1</mn><mo>/</mo><mi>s</mi></math></span> and thousands of vehicles.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1020 ","pages":"Article 114871"},"PeriodicalIF":0.9,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142239252","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An algebraic approach to the reconstruction of uniform hypergraphs from their degree sequence 从均匀超图的度数序列重构均匀超图的代数方法
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-12 DOI: 10.1016/j.tcs.2024.114872
Michela Ascolese , Andrea Frosini , Elisa Pergola , Simone Rinaldi , Laurent Vuillon

The reconstruction of a (hyper)graph starting from its degree sequence is one of the most relevant among the inverse problems investigated in the field of graph theory. In case of graphs, a feasible solution can be quickly reached, while in case of hypergraphs Deza et al. (2018) proved that the problem is NP-hard even in the simple case of 3-uniform ones. This result opened a new research line consisting in the detection of instances for which a solution can be computed in polynomial time. In this work we deal with 3-uniform hypergraphs, and we study them from a different perspective, exploiting a connection of these objects with partially ordered sets. More precisely, we introduce a simple partially ordered set, whose ideals are in bijection with a subclass of 3-uniform hypergraphs. We completely characterize their degree sequences in case of principal ideals (here a simple fast reconstruction strategy follows), and we furthermore carry on a complete analysis of those degree sequences related to the ideals with two generators. We also consider unique hypergraphs in Dext, i.e., those hypergraphs that do not share their degree sequence with other non-isomorphic ones. We show that uniqueness holds in case of hypergraphs associated to principal ideals, and we provide some examples of hypergraphs in Dext where this property is lost.

从(超)图的度数序列出发重构(超)图是图论领域研究的逆问题中最相关的问题之一。在图的情况下,很快就能找到可行的解,而在超图的情况下,Deza 等人(2018)证明,即使在 3-uniform 图的简单情况下,该问题也是 NP-hard。这一结果开辟了一条新的研究思路,即检测可以在多项式时间内计算出解决方案的实例。在这项工作中,我们将处理 3-uniform 超图,并利用这些对象与部分有序集的联系,从不同的角度对它们进行研究。更确切地说,我们引入了一个简单的部分有序集合,它的ideals与3-均匀超图的一个子类是双射的。在主理想的情况下,我们完全描述了它们的度序列(在此,我们将采用一种简单的快速重构策略),此外,我们还对与具有两个生成器的理想相关的度序列进行了完整的分析。我们还考虑了 Dext 中的唯一超图,即那些不与其他非同构超图共享度序列的超图。我们证明了与主理想相关的超图的唯一性,并举例说明了 Dext 中失去这一特性的超图。
{"title":"An algebraic approach to the reconstruction of uniform hypergraphs from their degree sequence","authors":"Michela Ascolese ,&nbsp;Andrea Frosini ,&nbsp;Elisa Pergola ,&nbsp;Simone Rinaldi ,&nbsp;Laurent Vuillon","doi":"10.1016/j.tcs.2024.114872","DOIUrl":"10.1016/j.tcs.2024.114872","url":null,"abstract":"<div><p>The reconstruction of a (hyper)graph starting from its degree sequence is one of the most relevant among the inverse problems investigated in the field of graph theory. In case of graphs, a feasible solution can be quickly reached, while in case of hypergraphs Deza et al. (2018) proved that the problem is NP-hard even in the simple case of 3-uniform ones. This result opened a new research line consisting in the detection of instances for which a solution can be computed in polynomial time. In this work we deal with 3-uniform hypergraphs, and we study them from a different perspective, exploiting a connection of these objects with partially ordered sets. More precisely, we introduce a simple partially ordered set, whose ideals are in bijection with a subclass of 3-uniform hypergraphs. We completely characterize their degree sequences in case of principal ideals (here a simple fast reconstruction strategy follows), and we furthermore carry on a complete analysis of those degree sequences related to the ideals with two generators. We also consider unique hypergraphs in <span><math><msup><mrow><mi>D</mi></mrow><mrow><mi>e</mi><mi>x</mi><mi>t</mi></mrow></msup></math></span>, i.e., those hypergraphs that do not share their degree sequence with other non-isomorphic ones. We show that uniqueness holds in case of hypergraphs associated to principal ideals, and we provide some examples of hypergraphs in <span><math><msup><mrow><mi>D</mi></mrow><mrow><mi>e</mi><mi>x</mi><mi>t</mi></mrow></msup></math></span> where this property is lost.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1020 ","pages":"Article 114872"},"PeriodicalIF":0.9,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0304397524004894/pdfft?md5=9a5013316177a513ac9292e891e55cf0&pid=1-s2.0-S0304397524004894-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142239250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Constructions of rotation symmetric Boolean functions satisfying almost all cryptographic criteria 构建满足几乎所有加密标准的旋转对称布尔函数
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-12 DOI: 10.1016/j.tcs.2024.114869
Lei Sun , Zexia Shi , Jian Liu , Fang-Wei Fu

Constructions of Boolean functions with various cryptographic properties have always been an important challenge in cryptography. This paper proposes systematic constructions of even-variable rotation symmetric Boolean functions satisfying almost all cryptographic criteria, that is, resiliency, optimal algebraic degree, strict avalanche criterion, high nonlinearity, nonexistence of nonzero linear structures, good global avalanche characteristics. Moreover, some of the constructions also have high algebraic immunity. This is the first time that Boolean functions having such cryptographic properties are obtained, which can be considered as good candidates for the design of real-life encryption schemes.

构造具有各种密码特性的布尔函数一直是密码学中的一个重要挑战。本文提出了满足几乎所有密码学标准的偶变旋转对称布尔函数的系统构造,即弹性、最佳代数度、严格雪崩标准、高非线性、不存在非零线性结构、良好的全局雪崩特性。此外,一些结构还具有很高的代数抗扰度。这是首次获得具有这种加密特性的布尔函数,可将其视为设计现实生活中加密方案的良好候选。
{"title":"Constructions of rotation symmetric Boolean functions satisfying almost all cryptographic criteria","authors":"Lei Sun ,&nbsp;Zexia Shi ,&nbsp;Jian Liu ,&nbsp;Fang-Wei Fu","doi":"10.1016/j.tcs.2024.114869","DOIUrl":"10.1016/j.tcs.2024.114869","url":null,"abstract":"<div><p>Constructions of Boolean functions with various cryptographic properties have always been an important challenge in cryptography. This paper proposes systematic constructions of even-variable rotation symmetric Boolean functions satisfying almost all cryptographic criteria, that is, resiliency, optimal algebraic degree, strict avalanche criterion, high nonlinearity, nonexistence of nonzero linear structures, good global avalanche characteristics. Moreover, some of the constructions also have high algebraic immunity. This is the first time that Boolean functions having such cryptographic properties are obtained, which can be considered as good candidates for the design of real-life encryption schemes.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1020 ","pages":"Article 114869"},"PeriodicalIF":0.9,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142239253","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On recursive tiling of some mathematical objects 论某些数学对象的递归平铺
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-12 DOI: 10.1016/j.tcs.2024.114781
Andrew L. Szilard
This essay, in a novel way, uses various tiles, such as dominoes, square-, interlocking-, and flow-tiles, to visualize approximations to recursively defined, potentially infinite mathematical objects, such as binary code tables, and variants of the space-filling Hilbert curve. The power of L-systems is shown by defining these tiled objects as L-systems.
这篇文章以一种新颖的方式,利用多米诺骨牌、方形瓦片、连锁瓦片和流动瓦片等各种瓦片,将递归定义的、可能无限的数学对象(如二进制代码表和空间填充希尔伯特曲线的变体)可视化为近似值。通过将这些瓦片对象定义为 L 系统,我们可以看到 L 系统的威力。
{"title":"On recursive tiling of some mathematical objects","authors":"Andrew L. Szilard","doi":"10.1016/j.tcs.2024.114781","DOIUrl":"10.1016/j.tcs.2024.114781","url":null,"abstract":"<div><div>This essay, in a novel way, uses various tiles, such as dominoes, square-, interlocking-, and flow-tiles, to visualize approximations to recursively defined, potentially infinite mathematical objects, such as binary code tables, and variants of the space-filling Hilbert curve. The power of L-systems is shown by defining these tiled objects as L-systems.</div></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1022 ","pages":"Article 114781"},"PeriodicalIF":0.9,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142699487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parameterized approximation algorithms for weighted vertex cover 加权顶点覆盖的参数化近似算法
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-12 DOI: 10.1016/j.tcs.2024.114870
Soumen Mandal , Pranabendu Misra , Ashutosh Rai , Saket Saurabh
<div><p>A <em>vertex cover</em> of a graph is a set of vertices of the graph such that every edge has at least one endpoint in it. In this work, we study <span>Weighted Vertex Cover</span> with solution size as a parameter. Formally, in the <span><math><mo>(</mo><mi>k</mi><mo>,</mo><mi>W</mi><mo>)</mo></math></span>-<span>Vertex Cover</span> problem, given a graph <em>G</em>, an integer <em>k</em>, a positive rational <em>W</em>, and a weight function <span><math><mi>w</mi><mo>:</mo><mi>V</mi><mo>(</mo><mi>G</mi><mo>)</mo><mo>→</mo><msup><mrow><mi>Q</mi></mrow><mrow><mo>+</mo></mrow></msup></math></span>, the question is whether <em>G</em> has a vertex cover of size at most <em>k</em> of weight at most <em>W</em>, with <em>k</em> being the parameter. An <span><math><mo>(</mo><mi>a</mi><mo>,</mo><mi>b</mi><mo>)</mo></math></span>-bi-criteria approximation algorithm for <span><math><mo>(</mo><mi>k</mi><mo>,</mo><mi>W</mi><mo>)</mo></math></span>-<span>Vertex Cover</span> either produces a vertex cover <em>S</em> such that <span><math><mo>|</mo><mi>S</mi><mo>|</mo><mo>≤</mo><mi>a</mi><mi>k</mi></math></span> and <span><math><mi>w</mi><mo>(</mo><mi>S</mi><mo>)</mo><mo>≤</mo><mi>b</mi><mi>W</mi></math></span>, or decides that there is no vertex cover of size at most <em>k</em> of weight at most <em>W</em>. We obtain the following results.</p><ul><li><span>•</span><span><p>A simple <span><math><mo>(</mo><mn>2</mn><mo>,</mo><mn>2</mn><mo>)</mo></math></span>-bi-criteria approximation algorithm for <span><math><mo>(</mo><mi>k</mi><mo>,</mo><mi>W</mi><mo>)</mo></math></span>-<span>Vertex Cover</span> in polynomial time by modifying the standard <span>LP</span>-rounding algorithm.</p></span></li><li><span>•</span><span><p>A simple exact parameterized algorithm for <span><math><mo>(</mo><mi>k</mi><mo>,</mo><mi>W</mi><mo>)</mo></math></span>-<span>Vertex Cover</span> running in <span><math><msup><mrow><mi>O</mi></mrow><mrow><mo>⁎</mo></mrow></msup><mo>(</mo><msup><mrow><mn>1.4656</mn></mrow><mrow><mi>k</mi></mrow></msup><mo>)</mo></math></span> time<span><span><sup>1</sup></span></span>.</p></span></li><li><span>•</span><span><p>A <span><math><mo>(</mo><mn>1</mn><mo>+</mo><mi>ϵ</mi><mo>,</mo><mn>2</mn><mo>)</mo></math></span>-approximation algorithm for <span><math><mo>(</mo><mi>k</mi><mo>,</mo><mi>W</mi><mo>)</mo></math></span>-<span>Vertex Cover</span> running in <span><math><msup><mrow><mi>O</mi></mrow><mrow><mo>⁎</mo></mrow></msup><mo>(</mo><msup><mrow><mn>1.4656</mn></mrow><mrow><mo>(</mo><mn>1</mn><mo>−</mo><mi>ϵ</mi><mo>)</mo><mi>k</mi></mrow></msup><mo>)</mo></math></span> time.</p></span></li><li><span>•</span><span><p>A <span><math><mo>(</mo><mn>1.5</mn><mo>,</mo><mn>1.5</mn><mo>)</mo></math></span>-approximation algorithm for <span><math><mo>(</mo><mi>k</mi><mo>,</mo><mi>W</mi><mo>)</mo></math></span>-<span>Vertex Cover</span> running in <span><math><msup><mrow><mi>O</mi></mrow><mrow><mo>⁎</mo></mrow></msup><mo>(</mo><msup><mrow><mn>1.414</mn></mr
图的顶点覆盖是指图中每个边至少有一个端点的顶点集合。在这项工作中,我们研究的是以解决方案大小为参数的加权顶点覆盖问题。形式上,在(k,W)-顶点覆盖问题中,给定一个图 G、一个整数 k、一个正有理数 W 和一个权重函数 w:V(G)→Q+,问题是 G 是否有一个大小至多为 k、权重至多为 W(k 为参数)的顶点覆盖。(k,W)-Vertex Cover 的 (a,b)-bi-criteria 近似算法要么产生一个顶点覆盖 S,使得 |S|≤ak 且 w(S)≤bW,要么判定不存在大小至多为 k 权重至多为 W 的顶点覆盖。我们得到了以下结果。-运行于 O⁎(1.4656k) time1 的 (k,W)-Vertex Cover 的简单精确参数化算法。对于任意 δ<0.5,(k,W)-顶点覆盖的(2-δ,2-δ)-近似计算法在 O⁎(∑i=δk(1-2δ)1+2δδk(1-2δ)2δ(δk+iδk-2iδ1-2δ))时间内运行。例如,对于 (1.75,1.75) 和 (1.9,1.9) 近似算法,我们得到的运行时间分别为 O⁎(1.272k) 和 O⁎(1.151k)。与有权重版本的算法相比,我们的算法是我们所知的第一种可以使用任意权重的算法,而且在解的大小远小于所需解的总权重时,我们的算法表现良好。
{"title":"Parameterized approximation algorithms for weighted vertex cover","authors":"Soumen Mandal ,&nbsp;Pranabendu Misra ,&nbsp;Ashutosh Rai ,&nbsp;Saket Saurabh","doi":"10.1016/j.tcs.2024.114870","DOIUrl":"10.1016/j.tcs.2024.114870","url":null,"abstract":"&lt;div&gt;&lt;p&gt;A &lt;em&gt;vertex cover&lt;/em&gt; of a graph is a set of vertices of the graph such that every edge has at least one endpoint in it. In this work, we study &lt;span&gt;Weighted Vertex Cover&lt;/span&gt; with solution size as a parameter. Formally, in the &lt;span&gt;&lt;math&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mi&gt;k&lt;/mi&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mi&gt;W&lt;/mi&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/math&gt;&lt;/span&gt;-&lt;span&gt;Vertex Cover&lt;/span&gt; problem, given a graph &lt;em&gt;G&lt;/em&gt;, an integer &lt;em&gt;k&lt;/em&gt;, a positive rational &lt;em&gt;W&lt;/em&gt;, and a weight function &lt;span&gt;&lt;math&gt;&lt;mi&gt;w&lt;/mi&gt;&lt;mo&gt;:&lt;/mo&gt;&lt;mi&gt;V&lt;/mi&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mi&gt;G&lt;/mi&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;mo&gt;→&lt;/mo&gt;&lt;msup&gt;&lt;mrow&gt;&lt;mi&gt;Q&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mo&gt;+&lt;/mo&gt;&lt;/mrow&gt;&lt;/msup&gt;&lt;/math&gt;&lt;/span&gt;, the question is whether &lt;em&gt;G&lt;/em&gt; has a vertex cover of size at most &lt;em&gt;k&lt;/em&gt; of weight at most &lt;em&gt;W&lt;/em&gt;, with &lt;em&gt;k&lt;/em&gt; being the parameter. An &lt;span&gt;&lt;math&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mi&gt;a&lt;/mi&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mi&gt;b&lt;/mi&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/math&gt;&lt;/span&gt;-bi-criteria approximation algorithm for &lt;span&gt;&lt;math&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mi&gt;k&lt;/mi&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mi&gt;W&lt;/mi&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/math&gt;&lt;/span&gt;-&lt;span&gt;Vertex Cover&lt;/span&gt; either produces a vertex cover &lt;em&gt;S&lt;/em&gt; such that &lt;span&gt;&lt;math&gt;&lt;mo&gt;|&lt;/mo&gt;&lt;mi&gt;S&lt;/mi&gt;&lt;mo&gt;|&lt;/mo&gt;&lt;mo&gt;≤&lt;/mo&gt;&lt;mi&gt;a&lt;/mi&gt;&lt;mi&gt;k&lt;/mi&gt;&lt;/math&gt;&lt;/span&gt; and &lt;span&gt;&lt;math&gt;&lt;mi&gt;w&lt;/mi&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mi&gt;S&lt;/mi&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;mo&gt;≤&lt;/mo&gt;&lt;mi&gt;b&lt;/mi&gt;&lt;mi&gt;W&lt;/mi&gt;&lt;/math&gt;&lt;/span&gt;, or decides that there is no vertex cover of size at most &lt;em&gt;k&lt;/em&gt; of weight at most &lt;em&gt;W&lt;/em&gt;. We obtain the following results.&lt;/p&gt;&lt;ul&gt;&lt;li&gt;&lt;span&gt;•&lt;/span&gt;&lt;span&gt;&lt;p&gt;A simple &lt;span&gt;&lt;math&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/math&gt;&lt;/span&gt;-bi-criteria approximation algorithm for &lt;span&gt;&lt;math&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mi&gt;k&lt;/mi&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mi&gt;W&lt;/mi&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/math&gt;&lt;/span&gt;-&lt;span&gt;Vertex Cover&lt;/span&gt; in polynomial time by modifying the standard &lt;span&gt;LP&lt;/span&gt;-rounding algorithm.&lt;/p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span&gt;•&lt;/span&gt;&lt;span&gt;&lt;p&gt;A simple exact parameterized algorithm for &lt;span&gt;&lt;math&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mi&gt;k&lt;/mi&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mi&gt;W&lt;/mi&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/math&gt;&lt;/span&gt;-&lt;span&gt;Vertex Cover&lt;/span&gt; running in &lt;span&gt;&lt;math&gt;&lt;msup&gt;&lt;mrow&gt;&lt;mi&gt;O&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mo&gt;⁎&lt;/mo&gt;&lt;/mrow&gt;&lt;/msup&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;msup&gt;&lt;mrow&gt;&lt;mn&gt;1.4656&lt;/mn&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;k&lt;/mi&gt;&lt;/mrow&gt;&lt;/msup&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/math&gt;&lt;/span&gt; time&lt;span&gt;&lt;span&gt;&lt;sup&gt;1&lt;/sup&gt;&lt;/span&gt;&lt;/span&gt;.&lt;/p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span&gt;•&lt;/span&gt;&lt;span&gt;&lt;p&gt;A &lt;span&gt;&lt;math&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;mo&gt;+&lt;/mo&gt;&lt;mi&gt;ϵ&lt;/mi&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/math&gt;&lt;/span&gt;-approximation algorithm for &lt;span&gt;&lt;math&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mi&gt;k&lt;/mi&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mi&gt;W&lt;/mi&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/math&gt;&lt;/span&gt;-&lt;span&gt;Vertex Cover&lt;/span&gt; running in &lt;span&gt;&lt;math&gt;&lt;msup&gt;&lt;mrow&gt;&lt;mi&gt;O&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mo&gt;⁎&lt;/mo&gt;&lt;/mrow&gt;&lt;/msup&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;msup&gt;&lt;mrow&gt;&lt;mn&gt;1.4656&lt;/mn&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;mo&gt;−&lt;/mo&gt;&lt;mi&gt;ϵ&lt;/mi&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;mi&gt;k&lt;/mi&gt;&lt;/mrow&gt;&lt;/msup&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/math&gt;&lt;/span&gt; time.&lt;/p&gt;&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span&gt;•&lt;/span&gt;&lt;span&gt;&lt;p&gt;A &lt;span&gt;&lt;math&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mn&gt;1.5&lt;/mn&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mn&gt;1.5&lt;/mn&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/math&gt;&lt;/span&gt;-approximation algorithm for &lt;span&gt;&lt;math&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;mi&gt;k&lt;/mi&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mi&gt;W&lt;/mi&gt;&lt;mo&gt;)&lt;/mo&gt;&lt;/math&gt;&lt;/span&gt;-&lt;span&gt;Vertex Cover&lt;/span&gt; running in &lt;span&gt;&lt;math&gt;&lt;msup&gt;&lt;mrow&gt;&lt;mi&gt;O&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mo&gt;⁎&lt;/mo&gt;&lt;/mrow&gt;&lt;/msup&gt;&lt;mo&gt;(&lt;/mo&gt;&lt;msup&gt;&lt;mrow&gt;&lt;mn&gt;1.414&lt;/mn&gt;&lt;/mr","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1021 ","pages":"Article 114870"},"PeriodicalIF":0.9,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142271415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deterministic 3-server on a circle and the limitation of canonical potentials 圆上的确定性 3 伺服器与典型势的限制
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-10 DOI: 10.1016/j.tcs.2024.114844
Zhiyi Huang, Hanwen Zhang

The deterministic k-server conjecture states that there is a k-competitive deterministic algorithm for the k-server problem for any metric space. We show that the work function algorithm is 3-competitive for the 3-server problem on circle metrics, a case left open by Coester and Koutsoupias (2021). Our analysis follows the existing framework but introduces a new potential function which may be viewed as a relaxation of the counterpart by Coester and Koutsoupias (2021). We further notice that the new potential function and many existing ones can be rewritten in a canonical form. Through a computer-aided verification, however, we find that no such canonical potential function can resolve the deterministic 3-server conjecture for general metric spaces under the current analysis framework.

确定性 k 伺服器猜想指出,对于任意度量空间的 k 伺服器问题,都存在一种 k 竞争确定性算法。我们证明,对于圆公设上的 3-server 问题,功函数算法具有 3 种竞争性,这是 Coester 和 Koutsoupias(2021 年)未解决的问题。我们的分析沿用了现有的框架,但引入了一个新的势函数,该势函数可视为 Coester 和 Koutsoupias(2021 年)的对应函数的松弛。我们进一步注意到,新的势函数和许多现有的势函数都可以用规范形式重写。然而,通过计算机辅助验证,我们发现在当前的分析框架下,没有这样的典型势函数可以解决一般度量空间的确定性 3 伺服猜想。
{"title":"Deterministic 3-server on a circle and the limitation of canonical potentials","authors":"Zhiyi Huang,&nbsp;Hanwen Zhang","doi":"10.1016/j.tcs.2024.114844","DOIUrl":"10.1016/j.tcs.2024.114844","url":null,"abstract":"<div><p>The deterministic <em>k</em>-server conjecture states that there is a <em>k</em>-competitive deterministic algorithm for the <em>k</em>-server problem for any metric space. We show that the work function algorithm is 3-competitive for the 3-server problem on circle metrics, a case left open by Coester and Koutsoupias (2021). Our analysis follows the existing framework but introduces a new potential function which may be viewed as a relaxation of the counterpart by Coester and Koutsoupias (2021). We further notice that the new potential function and many existing ones can be rewritten in a canonical form. Through a computer-aided verification, however, we find that no such canonical potential function can resolve the deterministic 3-server conjecture for general metric spaces under the current analysis framework.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1020 ","pages":"Article 114844"},"PeriodicalIF":0.9,"publicationDate":"2024-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142239251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximations for the Steiner Multicycle problem 斯坦纳多循环问题的近似值
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-06 DOI: 10.1016/j.tcs.2024.114836
Cristina G. Fernandes , Carla N. Lintzmayer , Phablo F.S. Moura

The Steiner Multicycle problem consists in, given a complete graph, a weight function on its edges, and a collection of pairwise disjoint non-unitary sets called terminal sets, finding a minimum weight collection of vertex-disjoint cycles in the graph such that, for every terminal set, all of its vertices are in a same cycle of the collection. This problem generalizes the Traveling Salesman problem and, therefore, is hard to approximate in general. On the practical side, it models a collaborative less-than-truckload problem with pickup and delivery locations. Using an algorithm for the Survivable Network Design problem and T-joins, we obtain a 3-approximation for the metric case, improving on the previous best 4-approximation. Furthermore, we present an (11/9)-approximation for the particular case of the Steiner Multicycle in which each edge weight is 1 or 2. This algorithm can be adapted to obtain a (7/6)-approximation when every terminal set contains at least four vertices. Finally, we devise an O(lgn)-approximation algorithm for the asymmetric version of the problem.

斯泰纳多循环问题包括:给定一个完整的图形、其边上的权重函数和称为终端集的成对互不相交的非单元集的集合,找出图形中顶点互不相交的循环的最小权重集合,使得对于每个终端集,其所有顶点都在集合的同一个循环中。这个问题概括了旅行推销员问题,因此在一般情况下很难近似。在实际应用方面,它模拟了一个具有取货和交货地点的协作性零担问题。利用可存活网络设计问题的算法和 T-joins 算法,我们得到了公制情况下的 3 近似值,改进了之前的最佳 4 近似值。此外,我们还针对 Steiner 多循环的特殊情况(其中每条边的权重为 1 或 2)提出了 (11/9)- 近似值。当每个末端集至少包含四个顶点时,该算法可以调整为 (7/6)-xapproximation 算法。最后,我们为该问题的非对称版本设计了一种 O(lgn)-approximation 算法。
{"title":"Approximations for the Steiner Multicycle problem","authors":"Cristina G. Fernandes ,&nbsp;Carla N. Lintzmayer ,&nbsp;Phablo F.S. Moura","doi":"10.1016/j.tcs.2024.114836","DOIUrl":"10.1016/j.tcs.2024.114836","url":null,"abstract":"<div><p>The <span>Steiner Multicycle</span> problem consists in, given a complete graph, a weight function on its edges, and a collection of pairwise disjoint non-unitary sets called terminal sets, finding a minimum weight collection of vertex-disjoint cycles in the graph such that, for every terminal set, all of its vertices are in a same cycle of the collection. This problem generalizes the <span>Traveling Salesman</span> problem and, therefore, is hard to approximate in general. On the practical side, it models a collaborative less-than-truckload problem with pickup and delivery locations. Using an algorithm for the <span>Survivable Network Design</span> problem and <em>T</em>-joins, we obtain a 3-approximation for the metric case, improving on the previous best 4-approximation. Furthermore, we present an (11/9)-approximation for the particular case of the <span>Steiner Multicycle</span> in which each edge weight is 1 or 2. This algorithm can be adapted to obtain a (7/6)-approximation when every terminal set contains at least four vertices. Finally, we devise an <span><math><mi>O</mi><mo>(</mo><mi>lg</mi><mo>⁡</mo><mi>n</mi><mo>)</mo></math></span>-approximation algorithm for the asymmetric version of the problem.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1020 ","pages":"Article 114836"},"PeriodicalIF":0.9,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142163957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Probabilistic cluster fault diagnosis for multiprocessor systems 多处理器系统的概率集群故障诊断
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-06 DOI: 10.1016/j.tcs.2024.114837
Baohua Niu , Shuming Zhou , Hong Zhang , Qifan Zhang

As high performance computing systems consisting of multiple processors play an important role in big data analytics, we are motivated to focus on the research of reliability, design-for-test, fault diagnosis and detection of large-scale multiprocessor interconnected systems. System-level diagnosis theory, which originates from the testing of VLSI and Wafer, aims to identify faulty processors in these systems by means of analyzing the test results among the processors, while diagnosability as well as diagnosis accuracy are two important indices. The probabilistic fault diagnostic strategy seeks to correctly diagnose processors with high probability under the assumption that each processor has a certain failing probability. In this work, based on the probabilistic diagnosis algorithm with consideration of fault clustering, we specialize in the local diagnostic capability to establish the probability that any processor in a discrete status is diagnosed correctly. Subsequently, we investigate the global performance evaluation of multiprocessor systems under various significant fault distributions including Poisson distribution, Exponential distribution and Binomial distribution. In addition, we directly apply our results to the data center network HSDC and (n,k)-star network. Numerical simulations are performed to verify the established results, which reveal the relationship between the accuracy of correct diagnosis and regulatory parameters.

由于由多个处理器组成的高性能计算系统在大数据分析中发挥着重要作用,我们有动力重点研究大规模多处理器互联系统的可靠性、测试设计、故障诊断和检测。系统级诊断理论源于 VLSI 和 Wafer 测试,旨在通过分析处理器之间的测试结果来识别这些系统中存在故障的处理器,而可诊断性和诊断准确性是两个重要指标。概率故障诊断策略是在假设每个处理器都有一定的故障概率的前提下,以高概率对处理器进行正确诊断。在这项工作中,基于考虑故障聚类的概率诊断算法,我们专门研究了局部诊断能力,以确定处于离散状态的任何处理器被正确诊断的概率。随后,我们研究了多处理器系统在各种重要故障分布(包括泊松分布、指数分布和二项分布)下的全局性能评估。此外,我们还将结果直接应用于数据中心网络 HSDC 和 (n,k)-star 网络。我们进行了数值模拟来验证所建立的结果,从而揭示了正确诊断的准确性与调节参数之间的关系。
{"title":"Probabilistic cluster fault diagnosis for multiprocessor systems","authors":"Baohua Niu ,&nbsp;Shuming Zhou ,&nbsp;Hong Zhang ,&nbsp;Qifan Zhang","doi":"10.1016/j.tcs.2024.114837","DOIUrl":"10.1016/j.tcs.2024.114837","url":null,"abstract":"<div><p>As high performance computing systems consisting of multiple processors play an important role in big data analytics, we are motivated to focus on the research of reliability, design-for-test, fault diagnosis and detection of large-scale multiprocessor interconnected systems. System-level diagnosis theory, which originates from the testing of VLSI and Wafer, aims to identify faulty processors in these systems by means of analyzing the test results among the processors, while diagnosability as well as diagnosis accuracy are two important indices. The probabilistic fault diagnostic strategy seeks to correctly diagnose processors with high probability under the assumption that each processor has a certain failing probability. In this work, based on the probabilistic diagnosis algorithm with consideration of fault clustering, we specialize in the local diagnostic capability to establish the probability that any processor in a discrete status is diagnosed correctly. Subsequently, we investigate the global performance evaluation of multiprocessor systems under various significant fault distributions including Poisson distribution, Exponential distribution and Binomial distribution. In addition, we directly apply our results to the data center network <span><math><mi>H</mi><mi>S</mi><mi>D</mi><mi>C</mi></math></span> and <span><math><mo>(</mo><mi>n</mi><mo>,</mo><mi>k</mi><mo>)</mo></math></span>-star network. Numerical simulations are performed to verify the established results, which reveal the relationship between the accuracy of correct diagnosis and regulatory parameters.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1020 ","pages":"Article 114837"},"PeriodicalIF":0.9,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142168383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Restriction on cut rule in cyclic-proof system for symbolic heaps 符号堆防循环系统中切割规则的限制
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-06 DOI: 10.1016/j.tcs.2024.114854
Kenji Saotome , Koji Nakazawa , Daisuke Kimura

Symbolic heaps, which are a restricted class of separation logic formulas, with inductive definitions are a suitable language in automated verification systems for memory-manipulating programs. In this context, some related problems, e.g., the entailment problem, have been studied theoretically. In addition, several solvers for the entailment problem based on the proof-search algorithm in cyclic-proof systems, which are proof systems in sequent calculus style with cyclic structure, have been proposed. However, the cut-elimination property generally does not hold for cyclic-proof systems of symbolic heaps with inductive definitions, which means that searching for a cut-free proof is insufficient. In other words, we hope to find a reasonable proof-search algorithm considering the cut rule or we give up on obtaining a complete proof-search procedure. This paper investigates this issue and demonstrates a limit to the challenge of the restrictions on the cut rule in a cyclic-proof system for symbolic heaps. We propose a restricted cut rule, referred to as the presumable cut, which is a relaxed variant of the analytic cut, in which the cut formula must be a subformula of the bottom sequent. This paper demonstrates that the provability of the cyclic-proof system for symbolic heaps becomes strictly weaker by restricting the cut rule to the presumable cut.

符号堆(Symbolic heaps)是分离逻辑公式的一个受限类别,具有归纳定义,是内存操作程序自动验证系统的一种合适语言。在这一背景下,一些相关问题,如 "蕴涵问题",已经得到了理论上的研究。循环证明系统是具有循环结构的序列微积分式证明系统,基于循环证明系统中的证明搜索算法,人们提出了几种解决 "entailment "问题的方法。然而,对于具有归纳定义的符号堆的循环证明系统,切分消除属性一般不成立,这意味着搜索无切分证明是不够的。换句话说,我们希望找到一种考虑到剪切规则的合理证明搜索算法,否则就放弃获得完整的证明搜索程序。本文研究了这个问题,并证明了在符号堆的循环证明系统中限制切分规则的挑战极限。我们提出了一种受限制的切分规则,称为可推定切分,它是解析切分的一个宽松变体,其中切分公式必须是底序的子公式。本文证明,将切分规则限制为推定切分后,符号堆的循环证明系统的可证明性会严格减弱。
{"title":"Restriction on cut rule in cyclic-proof system for symbolic heaps","authors":"Kenji Saotome ,&nbsp;Koji Nakazawa ,&nbsp;Daisuke Kimura","doi":"10.1016/j.tcs.2024.114854","DOIUrl":"10.1016/j.tcs.2024.114854","url":null,"abstract":"<div><p>Symbolic heaps, which are a restricted class of separation logic formulas, with inductive definitions are a suitable language in automated verification systems for memory-manipulating programs. In this context, some related problems, e.g., the entailment problem, have been studied theoretically. In addition, several solvers for the entailment problem based on the proof-search algorithm in cyclic-proof systems, which are proof systems in sequent calculus style with cyclic structure, have been proposed. However, the cut-elimination property generally does not hold for cyclic-proof systems of symbolic heaps with inductive definitions, which means that searching for a cut-free proof is insufficient. In other words, we hope to find a reasonable proof-search algorithm considering the cut rule or we give up on obtaining a complete proof-search procedure. This paper investigates this issue and demonstrates a limit to the challenge of the restrictions on the cut rule in a cyclic-proof system for symbolic heaps. We propose a restricted cut rule, referred to as the presumable cut, which is a relaxed variant of the analytic cut, in which the cut formula must be a subformula of the bottom sequent. This paper demonstrates that the provability of the cyclic-proof system for symbolic heaps becomes strictly weaker by restricting the cut rule to the presumable cut.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1019 ","pages":"Article 114854"},"PeriodicalIF":0.9,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0304397524004717/pdfft?md5=08f063fdecac881a6031c44144f640a6&pid=1-s2.0-S0304397524004717-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142163029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threshold sampling 阈值采样
IF 0.9 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-09-06 DOI: 10.1016/j.tcs.2024.114847
Stefan Rass , Max-Julian Jakobitsch , Stefan Haan , Moritz Hiebler

We consider the problem of sampling elements with some desired property from a large set, without testing the property of interest, but with the (probabilistic) assurance to have at least one match among the random sample. Like in ranked set sampling (RSS), we consider an infinite population under study, whose properties of interest are too expensive and/or time-consuming to measure. Unlike RSS, we are void of a ranking mechanism, so our sampling is done entirely blind. We show how it is nonetheless doable to assure, with controllably large likelihood, to either have at least one of the interesting elements in a random sample, or, contrarily, sample with the likewise assurance of not having one of the interesting elements in the sample. Our technique utilizes density bounds for distributions and threshold functions from random graph theory.

我们考虑的问题是从一个大集合中抽取具有某种所需属性的元素,无需测试感兴趣的属性,但(概率上)保证在随机样本中至少有一个匹配的元素。与排序集抽样(RSS)一样,我们考虑的是一个无限的研究群体,其感兴趣的属性的测量成本太高和/或耗时太长。与 RSS 不同的是,我们没有排序机制,因此我们的抽样完全是盲目的。我们展示了如何以可控的大概率确保在随机样本中至少有一个有趣的元素,或者相反,同样确保在样本中没有一个有趣的元素。我们的技术利用了随机图论中的分布密度边界和阈值函数。
{"title":"Threshold sampling","authors":"Stefan Rass ,&nbsp;Max-Julian Jakobitsch ,&nbsp;Stefan Haan ,&nbsp;Moritz Hiebler","doi":"10.1016/j.tcs.2024.114847","DOIUrl":"10.1016/j.tcs.2024.114847","url":null,"abstract":"<div><p>We consider the problem of sampling elements with some desired property from a large set, without testing the property of interest, but with the (probabilistic) assurance to have at least one match among the random sample. Like in ranked set sampling (RSS), we consider an infinite population under study, whose properties of interest are too expensive and/or time-consuming to measure. Unlike RSS, we are void of a ranking mechanism, so our sampling is done entirely blind. We show how it is nonetheless doable to assure, with controllably large likelihood, to either have at least one of the interesting elements in a random sample, or, contrarily, sample with the likewise assurance of not having one of the interesting elements in the sample. Our technique utilizes density bounds for distributions and threshold functions from random graph theory.</p></div>","PeriodicalId":49438,"journal":{"name":"Theoretical Computer Science","volume":"1019 ","pages":"Article 114847"},"PeriodicalIF":0.9,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S030439752400464X/pdfft?md5=26ceab1a448b5baf958ad0b8d3b32343&pid=1-s2.0-S030439752400464X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142163028","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Theoretical Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1