首页 > 最新文献

SIAM Journal on Computing最新文献

英文 中文
Sublinear Time Approximation of the Cost of a Metric [math]-Nearest Neighbor Graph 度量[数学]-近邻图成本的亚线性时间逼近
IF 1.6 3区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-04-17 DOI: 10.1137/22m1544105
Artur Czumaj, Christian Sohler
SIAM Journal on Computing, Volume 53, Issue 2, Page 524-571, April 2024.
Abstract. Let [math] be an [math]-point metric space. We assume that [math] is given in the distance oracle model, that is, [math] and for every pair of points [math] from [math] we can query their distance [math] in constant time. A [math]-nearest neighbor ([math]-NN) graph for [math] is a directed graph [math] that has an edge to each of [math]’s [math] nearest neighbors. We use [math] to denote the sum of edge weights of [math]. In this paper, we study the problem of approximating [math] in sublinear time when we are given oracle access to the metric space [math] that defines [math]. Our goal is to develop an algorithm that solves this problem faster than the time required to compute [math]. We first present an algorithm that in [math] time with probability at least [math] approximates [math] to within a factor of [math]. Next, we present a more elaborate sublinear algorithm that in time [math] computes an estimate [math] of [math] that satisfies with probability at least [math] [math], where [math] denotes the cost of the minimum spanning tree of [math]. Further, we complement these results with near matching lower bounds. We show that any algorithm that for a given metric space [math] of size [math], with probability at least [math], estimates [math] to within a [math] factor requires [math] time. Similarly, any algorithm that with probability at least [math] estimates [math] to within an additive error term [math] requires [math] time.
SIAM 计算期刊》,第 53 卷第 2 期,第 524-571 页,2024 年 4 月。 摘要。设 [math] 是一个 [math] 点度量空间。我们假设[math]是在距离甲骨文模型中给出的,即[math]和[math]中的每一对点[math]都可以在恒定时间内查询它们的距离[math]。[math]的[math]-近邻([math]-NN)图是一个有向图[math],它的每一个[math]的[math]近邻都有一条边。我们用 [math] 表示 [math] 的边权重之和。在本文中,我们研究的问题是,当我们获得定义 [math] 的度量空间 [math] 的甲骨文访问权限时,如何在亚线性时间内逼近 [math]。我们的目标是开发一种算法,以比计算 [math] 所需的时间更快的速度解决这个问题。我们首先介绍一种算法,它能在[math]时间内以至少[math]的概率将[math]逼近到[math]的一个因子以内。接着,我们提出了一种更复杂的亚线性算法,它能在[math]时间内计算出[math]的估计值[math],该估计值至少满足[math][math]的概率,其中[math]表示[math]最小生成树的代价。此外,我们还用接近匹配的下界来补充这些结果。我们证明,对于大小为[math]的给定度量空间[math],以至少[math]的概率估计[math]到[math]因子以内的任何算法,都需要[math]时间。同样,任何算法,如果以至少[数学]的概率将[数学]估计到加法误差项[数学]以内,都需要[数学]时间。
{"title":"Sublinear Time Approximation of the Cost of a Metric [math]-Nearest Neighbor Graph","authors":"Artur Czumaj, Christian Sohler","doi":"10.1137/22m1544105","DOIUrl":"https://doi.org/10.1137/22m1544105","url":null,"abstract":"SIAM Journal on Computing, Volume 53, Issue 2, Page 524-571, April 2024. <br/> Abstract. Let [math] be an [math]-point metric space. We assume that [math] is given in the distance oracle model, that is, [math] and for every pair of points [math] from [math] we can query their distance [math] in constant time. A [math]-nearest neighbor ([math]-NN) graph for [math] is a directed graph [math] that has an edge to each of [math]’s [math] nearest neighbors. We use [math] to denote the sum of edge weights of [math]. In this paper, we study the problem of approximating [math] in sublinear time when we are given oracle access to the metric space [math] that defines [math]. Our goal is to develop an algorithm that solves this problem faster than the time required to compute [math]. We first present an algorithm that in [math] time with probability at least [math] approximates [math] to within a factor of [math]. Next, we present a more elaborate sublinear algorithm that in time [math] computes an estimate [math] of [math] that satisfies with probability at least [math] [math], where [math] denotes the cost of the minimum spanning tree of [math]. Further, we complement these results with near matching lower bounds. We show that any algorithm that for a given metric space [math] of size [math], with probability at least [math], estimates [math] to within a [math] factor requires [math] time. Similarly, any algorithm that with probability at least [math] estimates [math] to within an additive error term [math] requires [math] time.","PeriodicalId":49532,"journal":{"name":"SIAM Journal on Computing","volume":"1 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-04-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140615382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online List Labeling: Breaking the [math] Barrier 在线列表标签:打破[数学]障碍
IF 1.6 3区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-04-11 DOI: 10.1137/22m1534468
Michael A. Bender, Alex Conway, Martín Farach-Colton, Hanna Komlós, William Kuszmaul, Nicole Wein
SIAM Journal on Computing, Ahead of Print.
Abstract. The online list-labeling problem is an algorithmic primitive with a large literature of upper bounds, lower bounds, and applications. The goal is to store a dynamically changing set of [math] items in an array of [math] slots, while maintaining the invariant that the items appear in sorted order and while minimizing the relabeling cost, defined to be the number of items that are moved per insertion/deletion. For the linear regime, where [math], an upper bound of [math] on the relabeling cost has been known since 1981. A lower bound of [math] is known for deterministic algorithms and for so-called smooth algorithms, but the best general lower bound remains [math]. The central open question in the field is whether [math] is optimal for all algorithms. In this paper, we give a randomized data structure that achieves an expected relabeling cost of [math] per operation. More generally, if [math] for [math], the expected relabeling cost becomes [math]. Our solution is history independent, meaning that the state of the data structure is independent of the order in which items are inserted/deleted. For history-independent data structures, we also prove a matching lower bound: for all [math] between [math] and some sufficiently small positive constant, the optimal expected cost for history-independent list-labeling solutions is [math].
SIAM 计算期刊》,提前印刷。 摘要在线列表标注问题是一个算法基元问题,有大量关于上界、下界和应用的文献。其目标是将一组动态变化的[math]项存储在一个由[math]槽组成的数组中,同时保持这些项按排序顺序出现的不变性,并最大限度地降低重新标注的成本(定义为每次插入/删除所移动的项数)。对于[math]的线性机制,重新标注成本的[math]上限早在 1981 年就已经存在。对于确定性算法和所谓的平滑算法,[math]的下界是已知的,但最佳的一般下界仍然是[math]。该领域的核心未决问题是,[math] 是否是所有算法的最优解。在本文中,我们给出了一种随机数据结构,它能使每次操作的预期重新标注成本达到 [math]。更一般地说,如果[数学]为[数学],则预期重新标注成本变为[数学]。我们的解决方案与历史无关,这意味着数据结构的状态与项目的插入/删除顺序无关。对于独立于历史的数据结构,我们还证明了一个匹配的下界:对于介于 [math] 和某个足够小的正常数之间的所有 [math],独立于历史的列表标签解决方案的最优预期成本为 [math]。
{"title":"Online List Labeling: Breaking the [math] Barrier","authors":"Michael A. Bender, Alex Conway, Martín Farach-Colton, Hanna Komlós, William Kuszmaul, Nicole Wein","doi":"10.1137/22m1534468","DOIUrl":"https://doi.org/10.1137/22m1534468","url":null,"abstract":"SIAM Journal on Computing, Ahead of Print. <br/> Abstract. The online list-labeling problem is an algorithmic primitive with a large literature of upper bounds, lower bounds, and applications. The goal is to store a dynamically changing set of [math] items in an array of [math] slots, while maintaining the invariant that the items appear in sorted order and while minimizing the relabeling cost, defined to be the number of items that are moved per insertion/deletion. For the linear regime, where [math], an upper bound of [math] on the relabeling cost has been known since 1981. A lower bound of [math] is known for deterministic algorithms and for so-called smooth algorithms, but the best general lower bound remains [math]. The central open question in the field is whether [math] is optimal for all algorithms. In this paper, we give a randomized data structure that achieves an expected relabeling cost of [math] per operation. More generally, if [math] for [math], the expected relabeling cost becomes [math]. Our solution is history independent, meaning that the state of the data structure is independent of the order in which items are inserted/deleted. For history-independent data structures, we also prove a matching lower bound: for all [math] between [math] and some sufficiently small positive constant, the optimal expected cost for history-independent list-labeling solutions is [math].","PeriodicalId":49532,"journal":{"name":"SIAM Journal on Computing","volume":"56 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-04-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140585453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Almost Optimal SuperConstant-Pass Streaming Lower Bounds for Reachability 几乎最优的超实体-传递流媒体可达性下界
IF 1.6 3区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-04-09 DOI: 10.1137/21m1417740
Lijie Chen, Gillat Kol, Dmitry Paramonov, Raghuvansh R. Saxena, Zhao Song, Huacheng Yu
SIAM Journal on Computing, Ahead of Print.
Abstract. We give an almost quadratic [math] lower bound on the space usage of any [math]-pass streaming algorithm solving the (directed) [math]-[math] reachability problem. This means that any such algorithm must essentially store the entire graph. As corollaries, we obtain almost quadratic space lower bounds for additional fundamental problems, including maximum matching, shortest path, matrix rank, and linear programming. Our main technical contribution is the definition and construction of set hiding graphs, that may be of independent interest: we give a general way of encoding a set [math] as a directed graph with [math] vertices, such that deciding whether [math] boils down to deciding if [math] is reachable from [math], for a specific pair of vertices [math] in the graph. Furthermore, we prove that our graph “hides” [math], in the sense that no low-space streaming algorithm with a small number of passes can learn (almost) anything about [math].
SIAM 计算期刊》,提前印刷。 摘要我们给出了求解(有向)[math]-[math]可达性问题的任何[math]通量流算法的空间使用量的几乎二次[math]下限。这意味着任何此类算法基本上都必须存储整个图。作为推论,我们还得到了其他基本问题的几乎二次空间下界,包括最大匹配、最短路径、矩阵秩和线性规划。我们的主要技术贡献是定义和构建了集合隐藏图,这可能会引起人们的独立兴趣:我们给出了将集合 [math] 编码为具有 [math] 顶点的有向图的一般方法,这样,对于图中特定的一对顶点 [math],判断 [math] 是否可以到达就可以归结为判断 [math] 是否可以从 [math] 到达。此外,我们还证明了我们的图 "隐藏 "了[math],也就是说,任何低空间流算法都无法通过少量传递了解到(几乎)任何关于[math]的信息。
{"title":"Almost Optimal SuperConstant-Pass Streaming Lower Bounds for Reachability","authors":"Lijie Chen, Gillat Kol, Dmitry Paramonov, Raghuvansh R. Saxena, Zhao Song, Huacheng Yu","doi":"10.1137/21m1417740","DOIUrl":"https://doi.org/10.1137/21m1417740","url":null,"abstract":"SIAM Journal on Computing, Ahead of Print. <br/> Abstract. We give an almost quadratic [math] lower bound on the space usage of any [math]-pass streaming algorithm solving the (directed) [math]-[math] reachability problem. This means that any such algorithm must essentially store the entire graph. As corollaries, we obtain almost quadratic space lower bounds for additional fundamental problems, including maximum matching, shortest path, matrix rank, and linear programming. Our main technical contribution is the definition and construction of set hiding graphs, that may be of independent interest: we give a general way of encoding a set [math] as a directed graph with [math] vertices, such that deciding whether [math] boils down to deciding if [math] is reachable from [math], for a specific pair of vertices [math] in the graph. Furthermore, we prove that our graph “hides” [math], in the sense that no low-space streaming algorithm with a small number of passes can learn (almost) anything about [math].","PeriodicalId":49532,"journal":{"name":"SIAM Journal on Computing","volume":"43 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-04-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140584995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rigid Matrices from Rectangular PCPs 来自矩形 PCP 的刚性矩阵
IF 1.6 3区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-04-03 DOI: 10.1137/22m1495597
Amey Bhangale, Prahladh Harsha, Orr Paradise, Avishay Tal
SIAM Journal on Computing, Volume 53, Issue 2, Page 480-523, April 2024.
Abstract. We introduce a variant of Probabilistically Checkable Proofs (PCPs) that we refer to as rectangular PCPs, wherein proofs are thought of as square matrices, and the random coins used by the verifier can be partitioned into two disjoint sets, one determining the row of each query and the other determining the column. We construct PCPs that are efficient, short, smooth, and (almost) rectangular. As a key application, we show that proofs for hard languages in NTIME[math], when viewed as matrices, are rigid infinitely often. This strengthens and simplifies a recent result of Alman and Chen [FOCS, 2019] constructing explicit rigid matrices in FNP. Namely, we prove the following theorem: There is a constant [math] such that there is an FNP-machine that, for infinitely many [math], on input [math] outputs [math] matrices with entries in [math] that are [math]-far (in Hamming distance) from matrices of rank at most [math]. Our construction of rectangular PCPs starts with an analysis of how randomness yields queries in the Reed–Muller-based outer PCP of Ben-Sasson, Goldreich, Harsha, Sudan, and Vadhan [SIAM J. Comput., 36 (2006), pp. 889–974; CCC, 2005]. We then show how to preserve rectangularity under PCP composition and a smoothness-inducing transformation. This warrants refined and stronger notions of rectangularity, which we prove for the outer PCP and its transforms.
SIAM 计算期刊》,第 53 卷第 2 期,第 480-523 页,2024 年 4 月。 摘要。我们引入了概率可验证证明(Probabilistically Checkable Proofs,PCPs)的一种变体,我们称之为矩形 PCPs,其中证明被视为正方形矩阵,验证者使用的随机硬币可被划分为两个不相交的集合,一个决定每个查询的行,另一个决定查询的列。我们构建了高效、简短、平滑和(几乎)矩形的 PCP。作为一个关键应用,我们证明了在 NTIME[math] 中,将难语言的证明视为矩阵时,其刚性是无穷大的。这加强并简化了 Alman 和 Chen [FOCS, 2019] 最近在 FNP 中构建显式刚性矩阵的结果。也就是说,我们证明了以下定理:有一个常数 [math],使得存在一种 FNP 机器,对于无限多 [math],在输入 [math] 时输出 [math] 矩阵,其 [math] 中的条目与秩最多 [math] 的矩阵相差 [math](在汉明距离中)。我们首先分析了 Ben-Sasson、Goldreich、Harsha、Sudan 和 Vadhan [SIAM J. Comput.然后,我们展示了如何在 PCP 组合和平滑诱导变换下保持矩形性。这就需要更精细、更强大的矩形性概念,我们将证明外层 PCP 及其变换的矩形性。
{"title":"Rigid Matrices from Rectangular PCPs","authors":"Amey Bhangale, Prahladh Harsha, Orr Paradise, Avishay Tal","doi":"10.1137/22m1495597","DOIUrl":"https://doi.org/10.1137/22m1495597","url":null,"abstract":"SIAM Journal on Computing, Volume 53, Issue 2, Page 480-523, April 2024. <br/> Abstract. We introduce a variant of Probabilistically Checkable Proofs (PCPs) that we refer to as rectangular PCPs, wherein proofs are thought of as square matrices, and the random coins used by the verifier can be partitioned into two disjoint sets, one determining the row of each query and the other determining the column. We construct PCPs that are efficient, short, smooth, and (almost) rectangular. As a key application, we show that proofs for hard languages in NTIME[math], when viewed as matrices, are rigid infinitely often. This strengthens and simplifies a recent result of Alman and Chen [FOCS, 2019] constructing explicit rigid matrices in FNP. Namely, we prove the following theorem: There is a constant [math] such that there is an FNP-machine that, for infinitely many [math], on input [math] outputs [math] matrices with entries in [math] that are [math]-far (in Hamming distance) from matrices of rank at most [math]. Our construction of rectangular PCPs starts with an analysis of how randomness yields queries in the Reed–Muller-based outer PCP of Ben-Sasson, Goldreich, Harsha, Sudan, and Vadhan [SIAM J. Comput., 36 (2006), pp. 889–974; CCC, 2005]. We then show how to preserve rectangularity under PCP composition and a smoothness-inducing transformation. This warrants refined and stronger notions of rectangularity, which we prove for the outer PCP and its transforms.","PeriodicalId":49532,"journal":{"name":"SIAM Journal on Computing","volume":"10 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140585120","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Rounds vs. Communication Tradeoffs for Maximal Independent Sets 最大独立集的轮次与通信权衡
IF 1.6 3区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-03-25 DOI: 10.1137/22m1536972
Sepehr Assadi, Gillat Kol, Zhijun Zhang
SIAM Journal on Computing, Ahead of Print.
Abstract. We consider the problem of finding a maximal independent set (MIS) in the shared blackboard communication model with vertex-partitioned inputs. There are [math] players corresponding to vertices of an undirected graph, and each player sees the edges incident on its vertex; this way, each edge is known by both its endpoints and is thus shared by two players. The players communicate in simultaneous rounds by posting their messages on a shared blackboard visible to all players, with the goal of computing an MIS of the graph. While the MIS problem is well studied in other distributed models and while shared blackboard is, perhaps, the simplest broadcast model, lower bounds for our problem were only known against one-round protocols. We present a lower bound on the round-communication tradeoff for computing an MIS in this model. Specifically, we show that, when [math] rounds of interaction are allowed, at least one player needs to communicate [math] bits. In particular, with logarithmic bandwidth, finding an MIS requires [math] rounds. This lower bound can be compared with the algorithm of Ghaffari et al. [Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing, 2018, pp. 129–138] that solves the MIS in [math] rounds but with a logarithmic bandwidth for an average player. Additionally, our lower bound further extends to the closely related problem of maximal bipartite matching. The presence of edge-sharing gives the algorithms in our model a surprising power, and numerous algorithmic results exploiting this power are known. For a similar reason, proving lower bounds in this model is much more challenging because this sharing in the players’ inputs prohibits the use of standard number-in-hand communication complexity arguments. Thus, to prove our results, we devise a new round elimination framework, which we call partial-input embedding, that may also be useful in future work for proving round-sensitive lower bounds in the presence of shared inputs. Finally, we discuss several implications of our results to multiround (adaptive) distributed sketching algorithms, broadcast congested clique, and the welfare maximization problem in two-sided matching markets.
SIAM 计算期刊》,提前印刷。 摘要我们考虑的是在顶点分区输入的共享黑板通信模型中寻找最大独立集(MIS)的问题。无向图的顶点对应着 [math] 玩家,每个玩家都能看到自己顶点上的边,这样,每条边的端点都是已知的,因此由两个玩家共享。棋手在同时进行的几轮比赛中,通过在所有棋手都能看到的共享黑板上发布信息进行交流,目的是计算图的 MIS。虽然 MIS 问题在其他分布式模型中得到了很好的研究,而且共享黑板也许是最简单的广播模型,但我们的问题的下界只针对一轮协议。我们提出了在该模型中计算 MIS 的回合-通信权衡下限。具体来说,我们证明了当允许 [math] 轮交互时,至少有一个玩家需要通信 [math] 比特。特别是在带宽为对数的情况下,找到一个 MIS 需要 [math] 轮。这个下界可以与 Ghaffari 等人的算法[Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing, 2018, pp.此外,我们的下界还进一步扩展到了密切相关的最大双方格匹配问题。边缘共享的存在给我们模型中的算法带来了惊人的威力,利用这种威力的算法结果不胜枚举。出于类似的原因,在这个模型中证明下界更具挑战性,因为玩家输入的共享禁止使用标准的手数通信复杂度论证。因此,为了证明我们的结果,我们设计了一个新的回合消除框架,我们称之为部分输入嵌入(partial-input embedding)。最后,我们讨论了我们的结果对多轮(自适应)分布式草图算法、广播拥塞小集团以及双面匹配市场中的福利最大化问题的若干影响。
{"title":"Rounds vs. Communication Tradeoffs for Maximal Independent Sets","authors":"Sepehr Assadi, Gillat Kol, Zhijun Zhang","doi":"10.1137/22m1536972","DOIUrl":"https://doi.org/10.1137/22m1536972","url":null,"abstract":"SIAM Journal on Computing, Ahead of Print. <br/> Abstract. We consider the problem of finding a maximal independent set (MIS) in the shared blackboard communication model with vertex-partitioned inputs. There are [math] players corresponding to vertices of an undirected graph, and each player sees the edges incident on its vertex; this way, each edge is known by both its endpoints and is thus shared by two players. The players communicate in simultaneous rounds by posting their messages on a shared blackboard visible to all players, with the goal of computing an MIS of the graph. While the MIS problem is well studied in other distributed models and while shared blackboard is, perhaps, the simplest broadcast model, lower bounds for our problem were only known against one-round protocols. We present a lower bound on the round-communication tradeoff for computing an MIS in this model. Specifically, we show that, when [math] rounds of interaction are allowed, at least one player needs to communicate [math] bits. In particular, with logarithmic bandwidth, finding an MIS requires [math] rounds. This lower bound can be compared with the algorithm of Ghaffari et al. [Proceedings of the 2018 ACM Symposium on Principles of Distributed Computing, 2018, pp. 129–138] that solves the MIS in [math] rounds but with a logarithmic bandwidth for an average player. Additionally, our lower bound further extends to the closely related problem of maximal bipartite matching. The presence of edge-sharing gives the algorithms in our model a surprising power, and numerous algorithmic results exploiting this power are known. For a similar reason, proving lower bounds in this model is much more challenging because this sharing in the players’ inputs prohibits the use of standard number-in-hand communication complexity arguments. Thus, to prove our results, we devise a new round elimination framework, which we call partial-input embedding, that may also be useful in future work for proving round-sensitive lower bounds in the presence of shared inputs. Finally, we discuss several implications of our results to multiround (adaptive) distributed sketching algorithms, broadcast congested clique, and the welfare maximization problem in two-sided matching markets.","PeriodicalId":49532,"journal":{"name":"SIAM Journal on Computing","volume":"33 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-03-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140302407","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parameterized Complexity of Untangling Knots 解结的参数化复杂性
IF 1.6 3区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-03-21 DOI: 10.1137/22m1501969
Clément Legrand-Duchesne, Ashutosh Rai, Martin Tancer
SIAM Journal on Computing, Volume 53, Issue 2, Page 431-479, April 2024.
Abstract. Deciding whether a diagram of a knot can be untangled with a given number of moves (as a part of the input) is known to be NP-complete. In this paper we determine the parameterized complexity of this problem with respect to a natural parameter called defect. Roughly speaking, it measures the efficiency of the moves used in the shortest untangling sequence of Reidemeister moves. We show that in a shortest untangling sequence the [math] moves, that is, the moves removing two adjacent crossings, can be essentially performed greedily. Using that, we show that this problem belongs to W[P] when parameterized by the defect. We also show that this problem is W[P]-hard by a reduction from Minimum axiom set.
SIAM 计算期刊》,第 53 卷第 2 期,第 431-479 页,2024 年 4 月。 摘要。已知用给定的移动次数(作为输入的一部分)决定一个结的图是否能解开是一个 NP-完全问题。在本文中,我们确定了这个问题的参数化复杂度,它与一个称为缺陷的自然参数有关。粗略地说,它衡量的是莱德米斯特移动最短解缠序列中所用移动的效率。我们证明,在最短的解缠序列中,[math] 移动,即去除两个相邻交叉点的移动,基本上可以贪婪地进行。据此,我们证明当以缺陷为参数时,这个问题属于 W[P]。通过最小公理集的还原,我们还证明这个问题是 W[P] 难问题。
{"title":"Parameterized Complexity of Untangling Knots","authors":"Clément Legrand-Duchesne, Ashutosh Rai, Martin Tancer","doi":"10.1137/22m1501969","DOIUrl":"https://doi.org/10.1137/22m1501969","url":null,"abstract":"SIAM Journal on Computing, Volume 53, Issue 2, Page 431-479, April 2024. <br/> Abstract. Deciding whether a diagram of a knot can be untangled with a given number of moves (as a part of the input) is known to be NP-complete. In this paper we determine the parameterized complexity of this problem with respect to a natural parameter called defect. Roughly speaking, it measures the efficiency of the moves used in the shortest untangling sequence of Reidemeister moves. We show that in a shortest untangling sequence the [math] moves, that is, the moves removing two adjacent crossings, can be essentially performed greedily. Using that, we show that this problem belongs to W[P] when parameterized by the defect. We also show that this problem is W[P]-hard by a reduction from Minimum axiom set.","PeriodicalId":49532,"journal":{"name":"SIAM Journal on Computing","volume":"165 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140197632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved List-Decodability and List-Recoverability of Reed–Solomon Codes via Tree Packings 通过树形包装提高里德-所罗门码的列表可解码性和列表可恢复性
IF 1.6 3区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-03-19 DOI: 10.1137/21m1463707
Zeyu Guo, Ray Li, Chong Shangguan, Itzhak Tamo, Mary Wootters
SIAM Journal on Computing, Volume 53, Issue 2, Page 389-430, April 2024.
Abstract. This paper shows that there exist Reed–Solomon (RS) codes, over exponentially large finite fields in the code length, that are combinatorially list-decodable well beyond the Johnson radius, in fact almost achieving the list-decoding capacity. In particular, we show that for any [math] there exist RS codes with rate [math] that are list-decodable from radius of [math]. We generalize this result to list-recovery, showing that there exist [math]-list-recoverable RS codes with rate [math]. Along the way we use our techniques to give a new proof of a result of Blackburn on optimal linear perfect hash matrices, and strengthen it to obtain a construction of strongly perfect hash matrices. To derive the results in this paper we show a surprising connection of the above problems to graph theory, and in particular to the tree packing theorem of Nash-Williams and Tutte. We also state a new conjecture that generalizes the tree packing theorem to hypergraphs and show that if this conjecture holds, then there would exist RS codes that are optimally (nonasymptotically) list-decodable.
SIAM 计算期刊》,第 53 卷第 2 期,第 389-430 页,2024 年 4 月。 摘要本文表明,在码长为指数大的有限域上存在里德-所罗门(Reed-Solomon,RS)码,其组合列表可解码性远远超过约翰逊半径,事实上几乎达到了列表解码能力。特别是,我们证明了对于任何 [math],都存在速率为 [math] 的 RS 码,这些码从 [math] 半径开始是可列表解码的。我们将这一结果推广到列表恢复,证明存在速率为[math]的[math]-列表可恢复 RS 编码。在此过程中,我们利用我们的技术对布莱克本关于最优线性完美哈希矩阵的一个结果给出了新的证明,并加强了这个结果,从而获得了强完美哈希矩阵的构造。为了得出本文的结果,我们展示了上述问题与图论,特别是与纳什-威廉姆斯和图特的树包装定理之间的惊人联系。我们还提出了一个新的猜想,将树打包定理推广到超图,并证明如果这个猜想成立,那么就会存在最佳(非渐近)列表可解码的 RS 编码。
{"title":"Improved List-Decodability and List-Recoverability of Reed–Solomon Codes via Tree Packings","authors":"Zeyu Guo, Ray Li, Chong Shangguan, Itzhak Tamo, Mary Wootters","doi":"10.1137/21m1463707","DOIUrl":"https://doi.org/10.1137/21m1463707","url":null,"abstract":"SIAM Journal on Computing, Volume 53, Issue 2, Page 389-430, April 2024. <br/> Abstract. This paper shows that there exist Reed–Solomon (RS) codes, over exponentially large finite fields in the code length, that are combinatorially list-decodable well beyond the Johnson radius, in fact almost achieving the list-decoding capacity. In particular, we show that for any [math] there exist RS codes with rate [math] that are list-decodable from radius of [math]. We generalize this result to list-recovery, showing that there exist [math]-list-recoverable RS codes with rate [math]. Along the way we use our techniques to give a new proof of a result of Blackburn on optimal linear perfect hash matrices, and strengthen it to obtain a construction of strongly perfect hash matrices. To derive the results in this paper we show a surprising connection of the above problems to graph theory, and in particular to the tree packing theorem of Nash-Williams and Tutte. We also state a new conjecture that generalizes the tree packing theorem to hypergraphs and show that if this conjecture holds, then there would exist RS codes that are optimally (nonasymptotically) list-decodable.","PeriodicalId":49532,"journal":{"name":"SIAM Journal on Computing","volume":"36 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140170229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sharp Thresholds in Random Simple Temporal Graphs 随机简单时态图中的锐阈值
IF 1.6 3区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-03-19 DOI: 10.1137/22m1511916
Arnaud Casteigts, Michael Raskin, Malte Renken, Viktor Zamaraev
SIAM Journal on Computing, Volume 53, Issue 2, Page 346-388, April 2024.
Abstract. A graph whose edges only appear at certain points in time is called a temporal graph (among other names). Such a graph is temporally connected if each ordered pair of vertices is connected by a path which traverses edges in chronological order (i.e., a temporal path). In this paper, we consider a simple model of random temporal graph, obtained from an Erdős–Rényi random graph, [math], by considering a random permutation [math] of the edges and interpreting the ranks in [math] as presence times. We give a thorough study of the temporal connectivity of such graphs and derive implications for the existence of several kinds of sparse spanners. It turns out that temporal reachability in this model exhibits a surprisingly regular sequence of thresholds. In particular, we show that at [math], any fixed pair of vertices can asymptotically almost surely (a.a.s.) reach each other; at [math], at least one vertex (and, in fact, any fixed vertex) can a.a.s. reach all others; and at [math], all the vertices can a.a.s. reach each other; i.e., the graph is temporally connected. Furthermore, the graph admits a temporal spanner of size [math] as soon as it becomes temporally connected, which is nearly optimal, as [math] is a lower bound. This result is quite significant because temporal graphs do not admit spanners of size [math] in general [Kempe, Kleinberg, and Kumar, J. Comput. System Sci., 64 (2002), pp. 820–842]. In fact, they do not even always admit spanners of size [math] [Axiotis and Fotakis, On the size and the approximability of minimum temporally connected subgraphs, 2016, pp. 149:1–149:14]. Thus, our result implies that the obstructions found in these works—and more generally any non-negligible obstruction—are statistically insignificant: nearly optimal spanners always exist in random temporal graphs. All the above thresholds are sharp. Carrying the study of temporal spanners a step further, we show that pivotal spanners—i.e., spanners of size [math] composed of two spanning trees glued at a single vertex (one descending in time, the other ascending subsequently)—exist a.a.s. at [math], this threshold being also sharp. Finally, we show that optimal spanners (of size [math]) also exist a.a.s. at [math]. Whether this value is a sharp threshold is open; we conjecture that it is. For completeness, we compare the above results to existing results in related areas, including edge-ordered graphs, gossip theory, and population protocols, showing that our results can be interpreted in these settings as well and that in some cases they improve known results therein. Finally, we discuss an intriguing connection between our results and Janson’s celebrated results on percolation in weighted graphs.
SIAM 计算期刊》,第 53 卷第 2 期,第 346-388 页,2024 年 4 月。 摘要一个图的边只出现在特定的时间点上,这个图被称为时间图(还有其他名称)。如果每个有序顶点对由一条按时间顺序遍历边的路径(即时间路径)连接,那么这样的图就是时间连接图。在本文中,我们考虑了一个简单的随机时间图模型,它是从厄尔多斯-雷尼随机图[math]中通过考虑边的随机排列[math]并将[math]中的等级解释为存在时间而得到的。我们对这种图的时间连通性进行了深入研究,并推导出几种稀疏跨度图存在的意义。结果发现,在这个模型中,时间可达性呈现出令人惊讶的规则阈值序列。特别是,我们证明在[math]处,任何一对固定顶点都可以渐近地几乎肯定(a.a.s.)到达对方;在[math]处,至少有一个顶点(事实上,任何一个固定顶点)可以a.a.s.到达所有其他顶点;在[math]处,所有顶点都可以a.a.s.到达对方;也就是说,这个图是时间连通的。此外,一旦该图在时间上连通,就会产生一个大小为 [math] 的时空扳手,这几乎是最优的,因为 [math] 是一个下限。这个结果非常重要,因为一般情况下,时态图并不接受大小为 [math] 的跨度[Kempe, Kleinberg, and Kumar, J. Comput. System Sci.,64 (2002),pp.]事实上,它们甚至并不总是允许大小为[math]的跨度[Axiotis and Fotakis, On the size and the approximability of minimum temporally connected subgraphs, 2016, pp.149:1-149:14]。因此,我们的结果意味着,这些著作中发现的障碍--更一般地说,任何不可忽略的障碍--在统计上都是不重要的:在随机时空图中,总是存在近乎最优的扳手。上述所有阈值都很尖锐。为了进一步研究时空跨域图,我们证明了枢轴跨域图--即大小为[math]的跨域图,由粘在一个顶点上的两棵生成树(一棵在时间上递减,另一棵随后递增)组成--在[math]时a.a.s.存在,这个阈值也是尖锐的。最后,我们证明了最优跨接树(大小为 [math])在 [math] 时也是 a.a.s. 存在的。这个值是否是一个尖锐的临界值还没有定论;我们猜想它是。为了完整起见,我们将上述结果与相关领域的现有结果进行了比较,包括边序图、流言理论和种群协议,表明我们的结果也可以在这些环境中得到解释,而且在某些情况下,它们改进了其中的已知结果。最后,我们讨论了我们的结果与詹森关于加权图中渗流的著名结果之间的有趣联系。
{"title":"Sharp Thresholds in Random Simple Temporal Graphs","authors":"Arnaud Casteigts, Michael Raskin, Malte Renken, Viktor Zamaraev","doi":"10.1137/22m1511916","DOIUrl":"https://doi.org/10.1137/22m1511916","url":null,"abstract":"SIAM Journal on Computing, Volume 53, Issue 2, Page 346-388, April 2024. <br/> Abstract. A graph whose edges only appear at certain points in time is called a temporal graph (among other names). Such a graph is temporally connected if each ordered pair of vertices is connected by a path which traverses edges in chronological order (i.e., a temporal path). In this paper, we consider a simple model of random temporal graph, obtained from an Erdős–Rényi random graph, [math], by considering a random permutation [math] of the edges and interpreting the ranks in [math] as presence times. We give a thorough study of the temporal connectivity of such graphs and derive implications for the existence of several kinds of sparse spanners. It turns out that temporal reachability in this model exhibits a surprisingly regular sequence of thresholds. In particular, we show that at [math], any fixed pair of vertices can asymptotically almost surely (a.a.s.) reach each other; at [math], at least one vertex (and, in fact, any fixed vertex) can a.a.s. reach all others; and at [math], all the vertices can a.a.s. reach each other; i.e., the graph is temporally connected. Furthermore, the graph admits a temporal spanner of size [math] as soon as it becomes temporally connected, which is nearly optimal, as [math] is a lower bound. This result is quite significant because temporal graphs do not admit spanners of size [math] in general [Kempe, Kleinberg, and Kumar, J. Comput. System Sci., 64 (2002), pp. 820–842]. In fact, they do not even always admit spanners of size [math] [Axiotis and Fotakis, On the size and the approximability of minimum temporally connected subgraphs, 2016, pp. 149:1–149:14]. Thus, our result implies that the obstructions found in these works—and more generally any non-negligible obstruction—are statistically insignificant: nearly optimal spanners always exist in random temporal graphs. All the above thresholds are sharp. Carrying the study of temporal spanners a step further, we show that pivotal spanners—i.e., spanners of size [math] composed of two spanning trees glued at a single vertex (one descending in time, the other ascending subsequently)—exist a.a.s. at [math], this threshold being also sharp. Finally, we show that optimal spanners (of size [math]) also exist a.a.s. at [math]. Whether this value is a sharp threshold is open; we conjecture that it is. For completeness, we compare the above results to existing results in related areas, including edge-ordered graphs, gossip theory, and population protocols, showing that our results can be interpreted in these settings as well and that in some cases they improve known results therein. Finally, we discuss an intriguing connection between our results and Janson’s celebrated results on percolation in weighted graphs.","PeriodicalId":49532,"journal":{"name":"SIAM Journal on Computing","volume":"3 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140173081","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast Metric Embedding into the Hamming Cube 快速度量嵌入汉明立方体
IF 1.6 3区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-03-14 DOI: 10.1137/22m1520220
Sjoerd Dirksen, Shahar Mendelson, Alexander Stollenwerk
SIAM Journal on Computing, Volume 53, Issue 2, Page 315-345, April 2024.
Abstract. We consider the problem of embedding a subset of [math] into a low-dimensional Hamming cube in an almost isometric way. We construct a simple, data-oblivious, and computationally efficient map that achieves this task with high probability; we first apply a specific structured random matrix, which we call the double circulant matrix; using that a matrix requires linear storage and matrix-vector multiplication that can be performed in near-linear time. We then binarize each vector by comparing each of its entries to a random threshold, selected uniformly at random from a well-chosen interval. We estimate the number of bits required for this encoding scheme in terms of two natural geometric complexity parameters of the set: its Euclidean covering numbers and its localized Gaussian complexity. The estimate we derive turns out to be the best that one can hope for, up to logarithmic terms. The key to the proof is a phenomenon of independent interest: we show that the double circulant matrix mimics the behavior of the Gaussian matrix in two important ways. First, it maps an arbitrary set in [math] into a set of well-spread vectors. Second, it yields a fast near-isometric embedding of any finite subset of [math] into [math]. This embedding achieves the same dimension reduction as the Gaussian matrix in near-linear time, under an optimal condition—up to logarithmic factors—on the number of points to be embedded. This improves a well-known construction due to Ailon and Chazelle.
SIAM 计算期刊》,第 53 卷第 2 期,第 315-345 页,2024 年 4 月。 摘要。我们考虑以几乎等距的方式将[math]的一个子集嵌入低维汉明立方体的问题。我们构建了一个简单、不依赖数据、计算效率高的映射,可以高概率地实现这一任务;我们首先应用一个特定的结构化随机矩阵,我们称之为双圆周矩阵;使用该矩阵需要线性存储和矩阵-矢量乘法,可以在接近线性的时间内完成。然后,我们将每个矢量的每个条目与随机阈值进行比较,对每个矢量进行二值化处理,随机阈值是从一个精心选择的区间中均匀随机选取的。我们根据集合的两个自然几何复杂度参数来估算这种编码方案所需的比特数:欧氏覆盖数和局部高斯复杂度。结果表明,我们得出的估算结果是最好的,甚至达到了对数。证明的关键在于一个独立的现象:我们证明了双圆周矩阵在两个重要方面模仿了高斯矩阵的行为。首先,它将[math]中的任意集合映射成一个分布良好的向量集合。其次,它能将[math]的任意有限子集快速近等距嵌入到[math]中。这种嵌入以接近线性的时间实现了与高斯矩阵相同的维度缩减,其最优条件是被嵌入点的数量达到对数因子。这改进了 Ailon 和 Chazelle 提出的著名构造。
{"title":"Fast Metric Embedding into the Hamming Cube","authors":"Sjoerd Dirksen, Shahar Mendelson, Alexander Stollenwerk","doi":"10.1137/22m1520220","DOIUrl":"https://doi.org/10.1137/22m1520220","url":null,"abstract":"SIAM Journal on Computing, Volume 53, Issue 2, Page 315-345, April 2024. <br/> Abstract. We consider the problem of embedding a subset of [math] into a low-dimensional Hamming cube in an almost isometric way. We construct a simple, data-oblivious, and computationally efficient map that achieves this task with high probability; we first apply a specific structured random matrix, which we call the double circulant matrix; using that a matrix requires linear storage and matrix-vector multiplication that can be performed in near-linear time. We then binarize each vector by comparing each of its entries to a random threshold, selected uniformly at random from a well-chosen interval. We estimate the number of bits required for this encoding scheme in terms of two natural geometric complexity parameters of the set: its Euclidean covering numbers and its localized Gaussian complexity. The estimate we derive turns out to be the best that one can hope for, up to logarithmic terms. The key to the proof is a phenomenon of independent interest: we show that the double circulant matrix mimics the behavior of the Gaussian matrix in two important ways. First, it maps an arbitrary set in [math] into a set of well-spread vectors. Second, it yields a fast near-isometric embedding of any finite subset of [math] into [math]. This embedding achieves the same dimension reduction as the Gaussian matrix in near-linear time, under an optimal condition—up to logarithmic factors—on the number of points to be embedded. This improves a well-known construction due to Ailon and Chazelle.","PeriodicalId":49532,"journal":{"name":"SIAM Journal on Computing","volume":"21 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140156104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fixed-Parameter Algorithms for the Kneser and Schrijver Problems 克奈瑟和施里弗问题的固定参数算法
IF 1.6 3区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-03-13 DOI: 10.1137/23m1557076
Ishay Haviv
SIAM Journal on Computing, Volume 53, Issue 2, Page 287-314, April 2024.
Abstract. The Kneser graph [math] is defined for integers [math] and [math] with [math] as the graph whose vertices are all the [math]-subsets of [math] where two such sets are adjacent if they are disjoint. The Schrijver graph [math] is defined as the subgraph of [math] induced by the collection of all [math]-subsets of [math] that do not include two consecutive elements modulo [math]. It is known that the chromatic number of both [math] and [math] is [math]. In the computational Kneser and Schrijver problems, we are given access to a coloring with [math] colors of the vertices of [math] and [math], respectively, and the goal is to find a monochromatic edge. We prove that the problems admit randomized algorithms with running time [math], hence they are fixed-parameter tractable with respect to the parameter [math]. The analysis involves structural results on intersecting families and on induced subgraphs of Kneser and Schrijver graphs. We also study the Agreeable-Set problem of assigning a small subset of a set of [math] items to a group of [math] agents, so that all agents value the subset at least as much as its complement. As an application of our algorithm for the Kneser problem, we obtain a randomized polynomial-time algorithm for the Agreeable-Set problem for instances with [math]. We further show that the Agreeable-Set problem is at least as hard as a variant of the Kneser problem with extended access to the input coloring.
SIAM 计算期刊》,第 53 卷第 2 期,第 287-314 页,2024 年 4 月。 摘要。Kneser图[math]是为整数[math]和[math]定义的,其中[math]是其顶点是[math]的所有[math]子集的图,如果两个这样的集不相交,它们就是相邻的。Schrijver图[math]被定义为[math]的子图,由[math]的所有不包含两个连续元素的[math]子集的集合所引起。已知[math]和[math]的色度数都是[math]。在计算 Kneser 和 Schrijver 问题中,我们分别得到了[math] 和[math] 顶点的[math]色着色,目标是找到一条单色边。我们证明,这些问题可以用运行时间为[math]的随机算法解决,因此它们在参数[math]方面是固定参数可控的。分析涉及相交族以及 Kneser 和 Schrijver 图的诱导子图的结构性结果。我们还研究了将[数学]项集合的一个小子集分配给一组[数学]代理的 "可协商集合 "问题,从而使所有代理对该子集的重视程度至少与其补集相同。作为我们对 Kneser 问题算法的一个应用,我们得到了一个针对 [math] 实例的 Agreeable-Set 问题的随机多项式时间算法。我们进一步证明,Agreeable-Set 问题的难度至少与扩展了输入着色访问权限的 Kneser 问题的变种相当。
{"title":"Fixed-Parameter Algorithms for the Kneser and Schrijver Problems","authors":"Ishay Haviv","doi":"10.1137/23m1557076","DOIUrl":"https://doi.org/10.1137/23m1557076","url":null,"abstract":"SIAM Journal on Computing, Volume 53, Issue 2, Page 287-314, April 2024. <br/> Abstract. The Kneser graph [math] is defined for integers [math] and [math] with [math] as the graph whose vertices are all the [math]-subsets of [math] where two such sets are adjacent if they are disjoint. The Schrijver graph [math] is defined as the subgraph of [math] induced by the collection of all [math]-subsets of [math] that do not include two consecutive elements modulo [math]. It is known that the chromatic number of both [math] and [math] is [math]. In the computational Kneser and Schrijver problems, we are given access to a coloring with [math] colors of the vertices of [math] and [math], respectively, and the goal is to find a monochromatic edge. We prove that the problems admit randomized algorithms with running time [math], hence they are fixed-parameter tractable with respect to the parameter [math]. The analysis involves structural results on intersecting families and on induced subgraphs of Kneser and Schrijver graphs. We also study the Agreeable-Set problem of assigning a small subset of a set of [math] items to a group of [math] agents, so that all agents value the subset at least as much as its complement. As an application of our algorithm for the Kneser problem, we obtain a randomized polynomial-time algorithm for the Agreeable-Set problem for instances with [math]. We further show that the Agreeable-Set problem is at least as hard as a variant of the Kneser problem with extended access to the input coloring.","PeriodicalId":49532,"journal":{"name":"SIAM Journal on Computing","volume":"45 1","pages":""},"PeriodicalIF":1.6,"publicationDate":"2024-03-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140126989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
SIAM Journal on Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1