首页 > 最新文献

arXiv - CS - Computational Complexity最新文献

英文 中文
Limitations of Affine Integer Relaxations for Solving Constraint Satisfaction Problems 解决约束满足问题的仿射整数松弛的局限性
Pub Date : 2024-07-12 DOI: arxiv-2407.09097
Moritz Lichter, Benedikt Pago
We show that various known algorithms for finite-domain constraintsatisfaction problems (CSP), which are based on solving systems of linearequations over the integers, fail to solve all tractable CSPs correctly. Thealgorithms include $mathbb{Z}$-affine $k$-consistency, BLP+AIP, every fixedlevel of the BA$^{k}$-hierarchy, and the CLAP algorithm. In particular, werefute the conjecture by Dalmau and Oprv{s}al that there is a fixed constant$k$ such that the $mathbb{Z}$-affine $k$-consistency algorithm solves alltractable finite domain CSPs.
我们证明,基于求解整数线性方程组的有限域约束满足问题(CSP)的各种已知算法,都无法正确求解所有可行的 CSP。这些算法包括$mathbb{Z}$-affine $k$-一致性算法、BLP+AIP算法、BA$^{k}$-层次结构的每个固定层次算法以及CLAP算法。特别是,我们验证了达尔莫和奥普尔的猜想,即存在一个固定常数$k$,使得$mathbb{Z}$-affine $k$-一致性算法可以求解所有可求解的有限域 CSP。
{"title":"Limitations of Affine Integer Relaxations for Solving Constraint Satisfaction Problems","authors":"Moritz Lichter, Benedikt Pago","doi":"arxiv-2407.09097","DOIUrl":"https://doi.org/arxiv-2407.09097","url":null,"abstract":"We show that various known algorithms for finite-domain constraint\u0000satisfaction problems (CSP), which are based on solving systems of linear\u0000equations over the integers, fail to solve all tractable CSPs correctly. The\u0000algorithms include $mathbb{Z}$-affine $k$-consistency, BLP+AIP, every fixed\u0000level of the BA$^{k}$-hierarchy, and the CLAP algorithm. In particular, we\u0000refute the conjecture by Dalmau and Oprv{s}al that there is a fixed constant\u0000$k$ such that the $mathbb{Z}$-affine $k$-consistency algorithm solves all\u0000tractable finite domain CSPs.","PeriodicalId":501024,"journal":{"name":"arXiv - CS - Computational Complexity","volume":"17 5 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141719613","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Circuits and Backdoors: Five Shades of the SETH 电路与后门SETH 的五种色调
Pub Date : 2024-07-12 DOI: arxiv-2407.09683
Michael Lampis
The SETH is a hypothesis of fundamental importance to (fine-grained)parameterized complexity theory and many important tight lower bounds are basedon it. This situation is somewhat problematic, because the validity of the SETHis not universally believed and because in some senses the SETH seems to be"too strong" a hypothesis for the considered lower bounds. Motivated by this,we consider a number of reasonable weakenings of the SETH that render it moreplausible, with sources ranging from circuit complexity, to backdoors forSAT-solving, to graph width parameters, to weighted satisfiability problems.Despite the diversity of the different formulations, we are able to uncoverseveral non-obvious connections using tools from classical complexity theory.This leads us to a hierarchy of five main equivalence classes of hypotheses,with some of the highlights being the following: We show that beating brute force search for SAT parameterized by a modulatorto a graph of bounded pathwidth, or bounded treewidth, or logarithmictree-depth, is actually the same question, and is in fact equivalent to beatingbrute force for circuits of depth $epsilon n$; we show that beating bruteforce search for a strong 2-SAT backdoor is equivalent to beating brute forcesearch for a modulator to logarithmic pathwidth; we show that beting bruteforce search for a strong Horn backdoor is equivalent to beating brute forcesearch for arbitrary circuit SAT.
SETH 是一个对(细粒度)参数化复杂性理论具有根本重要性的假设,许多重要的严密下界都是以它为基础的。这种情况存在一些问题,因为 SETH 的有效性并没有得到普遍的认可,而且在某些意义上,SETH 对于所考虑的下界来说似乎是一个 "太强 "的假设。受此启发,我们考虑了 SETH 的一系列合理弱化,使其更加可信,其来源包括电路复杂性、SAT 求解的后门、图宽参数、加权可满足性问题等。尽管不同的提法多种多样,我们还是能够利用经典复杂性理论的工具,发现许多非显而易见的联系:我们证明,在有界路径宽度、有界树宽或对数深度的图中,对以调制器为参数的 SAT 进行蛮力搜索,实际上是同一个问题,而且事实上等价于对深度为 $epsilon n$ 的电路进行蛮力搜索;我们证明,击败对强 2-SAT 后门的暴力搜索,等同于击败对数路径宽度调制器的暴力搜索;我们证明,击败对强 Horn 后门的暴力搜索,等同于击败对任意电路 SAT 的暴力搜索。
{"title":"Circuits and Backdoors: Five Shades of the SETH","authors":"Michael Lampis","doi":"arxiv-2407.09683","DOIUrl":"https://doi.org/arxiv-2407.09683","url":null,"abstract":"The SETH is a hypothesis of fundamental importance to (fine-grained)\u0000parameterized complexity theory and many important tight lower bounds are based\u0000on it. This situation is somewhat problematic, because the validity of the SETH\u0000is not universally believed and because in some senses the SETH seems to be\u0000\"too strong\" a hypothesis for the considered lower bounds. Motivated by this,\u0000we consider a number of reasonable weakenings of the SETH that render it more\u0000plausible, with sources ranging from circuit complexity, to backdoors for\u0000SAT-solving, to graph width parameters, to weighted satisfiability problems.\u0000Despite the diversity of the different formulations, we are able to uncover\u0000several non-obvious connections using tools from classical complexity theory.\u0000This leads us to a hierarchy of five main equivalence classes of hypotheses,\u0000with some of the highlights being the following: We show that beating brute force search for SAT parameterized by a modulator\u0000to a graph of bounded pathwidth, or bounded treewidth, or logarithmic\u0000tree-depth, is actually the same question, and is in fact equivalent to beating\u0000brute force for circuits of depth $epsilon n$; we show that beating brute\u0000force search for a strong 2-SAT backdoor is equivalent to beating brute force\u0000search for a modulator to logarithmic pathwidth; we show that beting brute\u0000force search for a strong Horn backdoor is equivalent to beating brute force\u0000search for arbitrary circuit SAT.","PeriodicalId":501024,"journal":{"name":"arXiv - CS - Computational Complexity","volume":"69 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141719612","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximate Degree Composition for Recursive Functions 递归函数的近似度合成
Pub Date : 2024-07-11 DOI: arxiv-2407.08385
Sourav Chakraborty, Chandrima Kayal, Rajat Mittal, Manaswi Paraashar, Nitin Saurabh
Determining the approximate degree composition for Boolean functions remainsa significant unsolved problem in Boolean function complexity. In recentdecades, researchers have concentrated on proving that approximate degreecomposes for special types of inner and outer functions. An important andextensively studied class of functions are the recursive functions,i.e.~functions obtained by composing a base function with itself a number oftimes. Let $h^d$ denote the standard $d$-fold composition of the base function$h$. The main result of this work is to show that the approximate degree composesif either of the following conditions holds: begin{itemize} item The outer function $f:{0,1}^nto {0,1}$ is a recursive function ofthe form $h^d$, with $h$ being any base function and $d= Omega(loglog n)$. item The inner function is a recursive function of the form $h^d$, with $h$being any constant arity base function (other than AND and OR) and $d=Omega(loglog n)$, where $n$ is the arity of the outer function. end{itemize} In terms of proof techniques, we first observe that the lower bound forcomposition can be obtained by introducing majority in between the inner andthe outer functions. We then show that majority can be emph{efficientlyeliminated} if the inner or outer function is a recursive function.
确定布尔函数的近似度构成仍然是布尔函数复杂性中一个重要的未决问题。近几十年来,研究者们集中于证明特殊类型的内函数和外函数的近似度构成。递归函数是一类重要的、被广泛研究的函数,即通过将一个基函数与自身多次合成而得到的函数。让$h^d$表示基函数$h$的标准$d$倍构成。这项工作的主要结果是证明,如果以下任一条件成立,则近似度合成:开始{项目}外部函数$f:{0,1}^nto {0,1}$是一个形式为$h^d$的递归函数,其中$h$是任意基函数,$d= Omega(loglog n)$。项目 内部函数是一个形式为 $h^d$ 的递归函数,其中 $h$ 是任何常值基函数(AND 和 OR 除外),$d=Omega(loglog n)$,其中 $n$ 是外部函数的常值。end{itemize} 在证明技术方面,我们首先观察到,通过在内部函数和外部函数之间引入多数函数,可以得到组合的下界。然后我们证明,如果内函数或外函数是递归函数,那么多数函数就可以被emph{eefficientlyeliminated}。
{"title":"Approximate Degree Composition for Recursive Functions","authors":"Sourav Chakraborty, Chandrima Kayal, Rajat Mittal, Manaswi Paraashar, Nitin Saurabh","doi":"arxiv-2407.08385","DOIUrl":"https://doi.org/arxiv-2407.08385","url":null,"abstract":"Determining the approximate degree composition for Boolean functions remains\u0000a significant unsolved problem in Boolean function complexity. In recent\u0000decades, researchers have concentrated on proving that approximate degree\u0000composes for special types of inner and outer functions. An important and\u0000extensively studied class of functions are the recursive functions,\u0000i.e.~functions obtained by composing a base function with itself a number of\u0000times. Let $h^d$ denote the standard $d$-fold composition of the base function\u0000$h$. The main result of this work is to show that the approximate degree composes\u0000if either of the following conditions holds: begin{itemize} item The outer function $f:{0,1}^nto {0,1}$ is a recursive function of\u0000the form $h^d$, with $h$ being any base function and $d= Omega(loglog n)$. item The inner function is a recursive function of the form $h^d$, with $h$\u0000being any constant arity base function (other than AND and OR) and $d=\u0000Omega(loglog n)$, where $n$ is the arity of the outer function. end{itemize} In terms of proof techniques, we first observe that the lower bound for\u0000composition can be obtained by introducing majority in between the inner and\u0000the outer functions. We then show that majority can be emph{efficiently\u0000eliminated} if the inner or outer function is a recursive function.","PeriodicalId":501024,"journal":{"name":"arXiv - CS - Computational Complexity","volume":"155 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141611391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Coordinating "7 Billion Humans" is hard 协调 "70 亿人类 "很困难
Pub Date : 2024-07-09 DOI: arxiv-2407.07246
Alessandro Panconesi, Pietro Maria Posta, Mirko Giacchini
In the video game "7 Billion Humans", the player is requested to direct agroup of workers to various destinations by writing a program that is executedsimultaneously on each worker. While the game is quite rich and, indeed, it isconsidered one of the best games for beginners to learn the basics ofprogramming, we show that even extremely simple versions are already NP-Hard orPSPACE-Hard.
在视频游戏 "70 亿人类 "中,玩家需要编写一个程序,并在每个工人身上同时执行,从而指挥一群工人前往不同的目的地。虽然游戏内容相当丰富,而且被认为是初学者学习编程基础的最佳游戏之一,但我们的研究表明,即使是极其简单的版本,也已经是 NP-Hard或PSPACE-Hard。
{"title":"Coordinating \"7 Billion Humans\" is hard","authors":"Alessandro Panconesi, Pietro Maria Posta, Mirko Giacchini","doi":"arxiv-2407.07246","DOIUrl":"https://doi.org/arxiv-2407.07246","url":null,"abstract":"In the video game \"7 Billion Humans\", the player is requested to direct a\u0000group of workers to various destinations by writing a program that is executed\u0000simultaneously on each worker. While the game is quite rich and, indeed, it is\u0000considered one of the best games for beginners to learn the basics of\u0000programming, we show that even extremely simple versions are already NP-Hard or\u0000PSPACE-Hard.","PeriodicalId":501024,"journal":{"name":"arXiv - CS - Computational Complexity","volume":"52 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141584608","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smoothed Analysis for Learning Concepts with Low Intrinsic Dimension 学习低内在维度概念的平滑分析法
Pub Date : 2024-07-01 DOI: arxiv-2407.00966
Gautam Chandrasekaran, Adam Klivans, Vasilis Kontonis, Raghu Meka, Konstantinos Stavropoulos
In traditional models of supervised learning, the goal of a learner -- givenexamples from an arbitrary joint distribution on $mathbb{R}^d times {pm1}$ -- is to output a hypothesis that is competitive (to within $epsilon$) ofthe best fitting concept from some class. In order to escape strong hardnessresults for learning even simple concept classes, we introduce asmoothed-analysis framework that requires a learner to compete only with thebest classifier that is robust to small random Gaussian perturbation. This subtle change allows us to give a wide array of learning results for anyconcept that (1) depends on a low-dimensional subspace (aka multi-index model)and (2) has a bounded Gaussian surface area. This class includes functions ofhalfspaces and (low-dimensional) convex sets, cases that are only known to belearnable in non-smoothed settings with respect to highly structureddistributions such as Gaussians. Surprisingly, our analysis also yields new results for traditionalnon-smoothed frameworks such as learning with margin. In particular, we obtainthe first algorithm for agnostically learning intersections of $k$-halfspacesin time $k^{poly(frac{log k}{epsilon gamma}) }$ where $gamma$ is themargin parameter. Before our work, the best-known runtime was exponential in$k$ (Arriaga and Vempala, 1999).
在传统的监督学习模型中,学习者的目标--给定来自$mathbb{R}^d times {pm1}$ 上任意联合分布的样本--是输出一个与某个类别中的最佳拟合概念具有竞争性(在$epsilon$范围内)的假设。为了在学习即使是简单的概念类时也能摆脱强硬度结果,我们引入了平滑分析框架,要求学习者只与对小随机高斯扰动具有鲁棒性的最佳分类器竞争。这种微妙的变化使我们能够为以下任何概念提供大量学习结果:(1)依赖于低维子空间(又称多指数模型);(2)具有有界高斯表面积。这一类概念包括半空间函数和(低维)凸集函数,这些情况只有在高斯等高度结构化分布的非平滑设置中才能学习。令人惊讶的是,我们的分析还为传统的非平滑框架(如边际学习)提供了新结果。特别是,我们获得了第一种算法,可以在$k^{poly(frac{log k}{epsilon gamma}) }$(其中$gamma$是边际参数)的时间内精确学习$k$半空间的交集。在我们的工作之前,最著名的运行时间是以 $k$ 为指数的(Arriaga 和 Vempala,1999 年)。
{"title":"Smoothed Analysis for Learning Concepts with Low Intrinsic Dimension","authors":"Gautam Chandrasekaran, Adam Klivans, Vasilis Kontonis, Raghu Meka, Konstantinos Stavropoulos","doi":"arxiv-2407.00966","DOIUrl":"https://doi.org/arxiv-2407.00966","url":null,"abstract":"In traditional models of supervised learning, the goal of a learner -- given\u0000examples from an arbitrary joint distribution on $mathbb{R}^d times {pm\u00001}$ -- is to output a hypothesis that is competitive (to within $epsilon$) of\u0000the best fitting concept from some class. In order to escape strong hardness\u0000results for learning even simple concept classes, we introduce a\u0000smoothed-analysis framework that requires a learner to compete only with the\u0000best classifier that is robust to small random Gaussian perturbation. This subtle change allows us to give a wide array of learning results for any\u0000concept that (1) depends on a low-dimensional subspace (aka multi-index model)\u0000and (2) has a bounded Gaussian surface area. This class includes functions of\u0000halfspaces and (low-dimensional) convex sets, cases that are only known to be\u0000learnable in non-smoothed settings with respect to highly structured\u0000distributions such as Gaussians. Surprisingly, our analysis also yields new results for traditional\u0000non-smoothed frameworks such as learning with margin. In particular, we obtain\u0000the first algorithm for agnostically learning intersections of $k$-halfspaces\u0000in time $k^{poly(frac{log k}{epsilon gamma}) }$ where $gamma$ is the\u0000margin parameter. Before our work, the best-known runtime was exponential in\u0000$k$ (Arriaga and Vempala, 1999).","PeriodicalId":501024,"journal":{"name":"arXiv - CS - Computational Complexity","volume":"18 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141518329","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An XOR Lemma for Deterministic Communication Complexity 确定性通信复杂性的 XOR 定理
Pub Date : 2024-07-01 DOI: arxiv-2407.01802
Siddharth Iyer, Anup Rao
We prove a lower bound on the communication complexity of computing the$n$-fold xor of an arbitrary function $f$, in terms of the communicationcomplexity and rank of $f$. We prove that $D(f^{oplus n}) geq n cdotBig(frac{Omega(D(f))}{log mathsf{rk}(f)} -log mathsf{rk}(f)Big )$,where here $D(f), D(f^{oplus n})$ represent the deterministic communicationcomplexity, and $mathsf{rk}(f)$ is the rank of $f$. Our methods involve a newway to use information theory to reason about deterministic communicationcomplexity.
我们用通信复杂度和 $f$ 的秩证明了计算任意函数 $f$ 的 $n$ 折 xor 的通信复杂度下限。我们证明了$D(f^{oplus n}) geq n cdotBig(frac{Omega(D(f))}{log mathsf{rk}(f)} -log mathsf{rk}(f)Big )$、其中 $D(f)、D(f^{oplus n})$ 表示确定性通信复杂度,$mathsf{rk}(f)$ 是 $f$ 的秩。我们的方法是利用信息论推理确定性通信复杂性的新途径。
{"title":"An XOR Lemma for Deterministic Communication Complexity","authors":"Siddharth Iyer, Anup Rao","doi":"arxiv-2407.01802","DOIUrl":"https://doi.org/arxiv-2407.01802","url":null,"abstract":"We prove a lower bound on the communication complexity of computing the\u0000$n$-fold xor of an arbitrary function $f$, in terms of the communication\u0000complexity and rank of $f$. We prove that $D(f^{oplus n}) geq n cdot\u0000Big(frac{Omega(D(f))}{log mathsf{rk}(f)} -log mathsf{rk}(f)Big )$,\u0000where here $D(f), D(f^{oplus n})$ represent the deterministic communication\u0000complexity, and $mathsf{rk}(f)$ is the rank of $f$. Our methods involve a new\u0000way to use information theory to reason about deterministic communication\u0000complexity.","PeriodicalId":501024,"journal":{"name":"arXiv - CS - Computational Complexity","volume":"10 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141518328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the approximability of graph visibility problems 论图形可见性问题的近似性
Pub Date : 2024-06-29 DOI: arxiv-2407.00409
Davide Bilò, Alessia Di Fonso, Gabriele Di Stefano, Stefano Leucci
Visibility problems have been investigated for a long time under differentassumptions as they pose challenging combinatorial problems and are connectedto robot navigation problems. The mutual-visibility problem in a graph $G$ of$n$ vertices asks to find the largest set of vertices $Xsubseteq V(G)$, alsocalled $mu$-set, such that for any two vertices $u,vin X$, there is ashortest $u,v$-path $P$ where all internal vertices of $P$ are not in $X$. Thismeans that $u$ and $v$ are visible w.r.t. $X$. Variations of this problem areknown as total, outer, and dual mutual-visibility problems, depending on thevisibility property of vertices inside and/or outside $X$. Themutual-visibility problem and all its variations are known to be$mathsf{NP}$-complete on graphs of diameter $4$. In this paper, we design a polynomial-time algorithm that finds a $mu$-setwith size $Omegaleft( sqrt{n/ overline{D}} right)$, where $overline D$ isthe average distance between any two vertices of $G$. Moreover, we showinapproximability results for all visibility problems on graphs of diameter $2$and strengthen the inapproximability ratios for graphs of diameter $3$ orlarger. More precisely, for graphs of diameter at least $3$ and for everyconstant $varepsilon > 0$, we show that mutual-visibility and dualmutual-visibility problems are not approximable within a factor of$n^{1/3-varepsilon}$, while outer and total mutual-visibility problems are notapproximable within a factor of $n^{1/2 - varepsilon}$, unless$mathsf{P}=mathsf{NP}$. Furthermore we study the relationship between the mutual-visibility numberand the general position number in which no three distinct vertices $u,v,w$ of$X$ belong to any shortest path of $G$.
长期以来,人们一直在研究不同假设条件下的可见性问题,因为它们提出了具有挑战性的组合问题,并与机器人导航问题相关联。在一个有 n 个顶点的图 $G 中,互可见性问题要求找到最大的顶点集合 $Xsubseteq V(G)$,也称为 $mu$-set,这样对于 X$ 中的任意两个顶点 $u,v$,都有最短的 $u,v$-路径 $P$,其中 $P$ 的所有内部顶点都不在 $X$ 中。这意味着 $u$ 和 $v$ 对 $X$ 是可见的。根据顶点在 $X$ 内部和/或外部的可见性,这个问题的变种被称为总互见问题、外互见问题和对偶互见问题。众所周知,在直径为 $4$ 的图上,互见问题及其所有变体都是$mathsf{NP}$-完全的。在本文中,我们设计了一种多项式时间算法,可以找到一个大小为 $Omegaleft( sqrt{n/ overline{D}} right)$ 的 $mu$ 集,其中 $overline D$ 是 $G$ 任意两个顶点之间的平均距离。此外,我们还展示了直径为 2$ 的图的所有可见性问题的可近似性结果,并加强了直径为 3$ 或更大的图的不可近似性比率。更准确地说,对于直径至少为 3$且常数 $varepsilon > 0$ 的图,我们证明了互可见性和对偶互可见性问题在 $n^{1/3-varepsilon}$ 的因子内不可近似,而外部互可见性和总互可见性问题在 $n^{1/2 - varepsilon}$ 的因子内不可近似,除非 $mathsf{P}=mathsf{NP}$。此外,我们还研究了互可见度数与一般位置数之间的关系,在一般位置数中,没有三个不同的顶点 $u,v,w$ 属于 $G$ 的任何最短路径。
{"title":"On the approximability of graph visibility problems","authors":"Davide Bilò, Alessia Di Fonso, Gabriele Di Stefano, Stefano Leucci","doi":"arxiv-2407.00409","DOIUrl":"https://doi.org/arxiv-2407.00409","url":null,"abstract":"Visibility problems have been investigated for a long time under different\u0000assumptions as they pose challenging combinatorial problems and are connected\u0000to robot navigation problems. The mutual-visibility problem in a graph $G$ of\u0000$n$ vertices asks to find the largest set of vertices $Xsubseteq V(G)$, also\u0000called $mu$-set, such that for any two vertices $u,vin X$, there is a\u0000shortest $u,v$-path $P$ where all internal vertices of $P$ are not in $X$. This\u0000means that $u$ and $v$ are visible w.r.t. $X$. Variations of this problem are\u0000known as total, outer, and dual mutual-visibility problems, depending on the\u0000visibility property of vertices inside and/or outside $X$. The\u0000mutual-visibility problem and all its variations are known to be\u0000$mathsf{NP}$-complete on graphs of diameter $4$. In this paper, we design a polynomial-time algorithm that finds a $mu$-set\u0000with size $Omegaleft( sqrt{n/ overline{D}} right)$, where $overline D$ is\u0000the average distance between any two vertices of $G$. Moreover, we show\u0000inapproximability results for all visibility problems on graphs of diameter $2$\u0000and strengthen the inapproximability ratios for graphs of diameter $3$ or\u0000larger. More precisely, for graphs of diameter at least $3$ and for every\u0000constant $varepsilon > 0$, we show that mutual-visibility and dual\u0000mutual-visibility problems are not approximable within a factor of\u0000$n^{1/3-varepsilon}$, while outer and total mutual-visibility problems are not\u0000approximable within a factor of $n^{1/2 - varepsilon}$, unless\u0000$mathsf{P}=mathsf{NP}$. Furthermore we study the relationship between the mutual-visibility number\u0000and the general position number in which no three distinct vertices $u,v,w$ of\u0000$X$ belong to any shortest path of $G$.","PeriodicalId":501024,"journal":{"name":"arXiv - CS - Computational Complexity","volume":"160 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141507159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Distance to Transitivity: New Parameters for Taming Reachability in Temporal Graphs 距离与传递性:驯服时态图中可达性的新参数
Pub Date : 2024-06-27 DOI: arxiv-2406.19514
Arnaud Casteigts, Nils Morawietz, Petra Wolf
A temporal graph is a graph whose edges only appear at certain points intime. Reachability in these graphs is defined in terms of paths that traversethe edges in chronological order (temporal paths). This form of reachability isneither symmetric nor transitive, the latter having important consequences onthe computational complexity of even basic questions, such as computingtemporal connected components. In this paper, we introduce several parametersthat capture how far a temporal graph $mathcal{G}$ is from being transitive,namely, emph{vertex-deletion distance to transitivity} andemph{arc-modification distance to transitivity}, both being applied to thereachability graph of $mathcal{G}$. We illustrate the impact of theseparameters on the temporal connected component problem, obtaining severaltractability results in terms of fixed-parameter tractability and polynomialkernels. Significantly, these results are obtained without restrictions of theunderlying graph, the snapshots, or the lifetime of the input graph. As such,our results isolate the impact of non-transitivity and confirm the key rolethat it plays in the hardness of temporal graph problems.
时序图是一种边只在特定时间点出现的图。这些图中的可达性是根据按时间顺序遍历边的路径(时间路径)来定义的。这种形式的可达性既不是对称的,也不是传递的,后者甚至对计算时空连接成分等基本问题的计算复杂性都有重要影响。在本文中,我们引入了几个参数来捕捉时空图 $mathcal{G}$ 距离传递性有多远,即 emph{vertex-deletion distance to transitivity} 和 emph{arc-modification distance to transitivity},这两个参数都应用于 $mathcal{G}$ 的可达性图。我们说明了这些参数对时间连通分量问题的影响,并从固定参数可计算性和多项式核的角度得到了几个可计算性结果。值得注意的是,这些结果的获得不受底层图、快照或输入图生命周期的限制。因此,我们的结果隔离了非传递性的影响,并证实了它在时序图问题的难易程度中扮演的关键角色。
{"title":"Distance to Transitivity: New Parameters for Taming Reachability in Temporal Graphs","authors":"Arnaud Casteigts, Nils Morawietz, Petra Wolf","doi":"arxiv-2406.19514","DOIUrl":"https://doi.org/arxiv-2406.19514","url":null,"abstract":"A temporal graph is a graph whose edges only appear at certain points in\u0000time. Reachability in these graphs is defined in terms of paths that traverse\u0000the edges in chronological order (temporal paths). This form of reachability is\u0000neither symmetric nor transitive, the latter having important consequences on\u0000the computational complexity of even basic questions, such as computing\u0000temporal connected components. In this paper, we introduce several parameters\u0000that capture how far a temporal graph $mathcal{G}$ is from being transitive,\u0000namely, emph{vertex-deletion distance to transitivity} and\u0000emph{arc-modification distance to transitivity}, both being applied to the\u0000reachability graph of $mathcal{G}$. We illustrate the impact of these\u0000parameters on the temporal connected component problem, obtaining several\u0000tractability results in terms of fixed-parameter tractability and polynomial\u0000kernels. Significantly, these results are obtained without restrictions of the\u0000underlying graph, the snapshots, or the lifetime of the input graph. As such,\u0000our results isolate the impact of non-transitivity and confirm the key role\u0000that it plays in the hardness of temporal graph problems.","PeriodicalId":501024,"journal":{"name":"arXiv - CS - Computational Complexity","volume":"66 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141518330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Fourier analysis of sparse Boolean functions over certain Abelian groups 论某些阿贝尔群上稀疏布尔函数的傅立叶分析
Pub Date : 2024-06-26 DOI: arxiv-2406.18700
Sourav Chakraborty, Swarnalipa Datta, Pranjal Dutta, Arijit Ghosh, Swagato Sanyal
Given an Abelian group G, a Boolean-valued function f: G -> {-1,+1}, is saidto be s-sparse, if it has at most s-many non-zero Fourier coefficients over thedomain G. In a seminal paper, Gopalan et al. proved "Granularity" for Fouriercoefficients of Boolean valued functions over Z_2^n, that have found manydiverse applications in theoretical computer science and combinatorics. Theyalso studied structural results for Boolean functions over Z_2^n which areapproximately Fourier-sparse. In this work, we obtain structural results forapproximately Fourier-sparse Boolean valued functions over Abelian groups G ofthe form,G:= Z_{p_1}^{n_1} times ... times Z_{p_t}^{n_t}, for distinct primesp_i. We also obtain a lower bound of the form 1/(m^{2}s)^ceiling(phi(m)/2), onthe absolute value of the smallest non-zero Fourier coefficient of an s-sparsefunction, where m=p_1 ... p_t, and phi(m)=(p_1-1) ... (p_t-1). We carefullyapply probabilistic techniques from Gopalan et al., to obtain our structuralresults, and use some non-trivial results from algebraic number theory to getthe lower bound. We construct a family of at most s-sparse Boolean functions over Z_p^n, wherep > 2, for arbitrarily large enough s, where the minimum non-zero Fouriercoefficient is 1/omega(n). The "Granularity" result of Gopalan et al. impliesthat the absolute values of non-zero Fourier coefficients of any s-sparseBoolean valued function over Z_2^n are 1/O(s). So, our result shows that onecannot expect such a lower bound for general Abelian groups. Using our new structural results on the Fourier coefficients of sparsefunctions, we design an efficient testing algorithm for Fourier-sparse Booleanfunctions, thata requires poly((ms)^phi(m),1/epsilon)-many queries. Further, weprove an Omega(sqrt{s}) lower bound on the query complexity of any adaptivesparsity testing algorithm.
在一篇开创性论文中,Gopalan 等人证明了 Z_2^n 上布尔值函数傅里叶系数的 "粒度",这在理论计算机科学和组合学中得到了广泛应用。他们还研究了 Z_2^n 上近似傅里叶稀疏布尔函数的结构性结果。在这项工作中,我们获得了形式为 G:= Z_{p_1}^{n_1} 的阿贝尔群 G 上近似傅立叶稀疏布尔有值函数的结构结果。times ...times Z_{p_t}^{n_t},对于不同的素数 p_i。我们还得到了一个 s 稀疏函数最小非零傅里叶系数绝对值的下限,其形式为 1/(m^{2}s)^ceiling(phi(m)/2),其中 m=p_1 ... p_t,phi(m)=(p_1-1) ... (p_t-1)。我们小心翼翼地运用戈帕兰等人的概率技术来获得我们的结构性结果,并利用代数数论的一些非难结果来得到下界。我们构造了 Z_p^n 上最多 s 个稀疏布尔函数族,其中对于任意足够大的 s,p > 2,最小非零傅里叶系数为 1/omega(n)。戈帕兰等人的 "粒度 "结果意味着,Z_2^n 上任何 s 稀疏布尔值函数的非零傅里叶系数的绝对值都是 1/O(s)。因此,我们的结果表明,对于一般的阿贝尔群,我们无法期待这样的下界。利用我们关于稀疏函数傅里叶系数的新结构性结果,我们设计了一种高效的傅里叶稀疏布尔函数测试算法,它只需要 poly((ms)^phi(m),1/epsilon)-many 查询。此外,我们还证明了任何自适应稀疏性测试算法查询复杂度的欧米茄(sqrt{s})下限。
{"title":"On Fourier analysis of sparse Boolean functions over certain Abelian groups","authors":"Sourav Chakraborty, Swarnalipa Datta, Pranjal Dutta, Arijit Ghosh, Swagato Sanyal","doi":"arxiv-2406.18700","DOIUrl":"https://doi.org/arxiv-2406.18700","url":null,"abstract":"Given an Abelian group G, a Boolean-valued function f: G -> {-1,+1}, is said\u0000to be s-sparse, if it has at most s-many non-zero Fourier coefficients over the\u0000domain G. In a seminal paper, Gopalan et al. proved \"Granularity\" for Fourier\u0000coefficients of Boolean valued functions over Z_2^n, that have found many\u0000diverse applications in theoretical computer science and combinatorics. They\u0000also studied structural results for Boolean functions over Z_2^n which are\u0000approximately Fourier-sparse. In this work, we obtain structural results for\u0000approximately Fourier-sparse Boolean valued functions over Abelian groups G of\u0000the form,G:= Z_{p_1}^{n_1} times ... times Z_{p_t}^{n_t}, for distinct primes\u0000p_i. We also obtain a lower bound of the form 1/(m^{2}s)^ceiling(phi(m)/2), on\u0000the absolute value of the smallest non-zero Fourier coefficient of an s-sparse\u0000function, where m=p_1 ... p_t, and phi(m)=(p_1-1) ... (p_t-1). We carefully\u0000apply probabilistic techniques from Gopalan et al., to obtain our structural\u0000results, and use some non-trivial results from algebraic number theory to get\u0000the lower bound. We construct a family of at most s-sparse Boolean functions over Z_p^n, where\u0000p > 2, for arbitrarily large enough s, where the minimum non-zero Fourier\u0000coefficient is 1/omega(n). The \"Granularity\" result of Gopalan et al. implies\u0000that the absolute values of non-zero Fourier coefficients of any s-sparse\u0000Boolean valued function over Z_2^n are 1/O(s). So, our result shows that one\u0000cannot expect such a lower bound for general Abelian groups. Using our new structural results on the Fourier coefficients of sparse\u0000functions, we design an efficient testing algorithm for Fourier-sparse Boolean\u0000functions, thata requires poly((ms)^phi(m),1/epsilon)-many queries. Further, we\u0000prove an Omega(sqrt{s}) lower bound on the query complexity of any adaptive\u0000sparsity testing algorithm.","PeriodicalId":501024,"journal":{"name":"arXiv - CS - Computational Complexity","volume":"32 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141507161","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Consistent Query Answering over SHACL Constraints SHACL 约束条件下的一致性查询应答
Pub Date : 2024-06-24 DOI: arxiv-2406.16653
Shqiponja Ahmetaj, Timo Camillo Merkl, Reinhard Pichler
The Shapes Constraint Language (SHACL) was standardized by the World Wide Webas a constraint language to describe and validate RDF data graphs. SHACL usesthe notion of shapes graph to describe a set of shape constraints paired withtargets, that specify which nodes of the RDF graph should satisfy which shapes.An important question in practice is how to handle data graphs that do notvalidate the shapes graph. A solution is to tolerate the non-validation andfind ways to obtain meaningful and correct answers to queries despite thenon-validation. This is known as consistent query answering (CQA) and there isextensive literature on CQA in both the database and the KR setting. We studyCQA in the context of SHACL for a fundamental fragment of the Semantic Webquery language SPARQL. The goal of our work is a detailed complexity analysisof CQA for various semantics and possible restrictions on the acceptablerepairs. It turns out that all considered variants of the problem areintractable, with complexities ranging between the first and third level of thepolynomial hierarchy.
形状约束语言(SHACL)是万维网(World Wide Web)标准化的一种约束语言,用于描述和验证 RDF 数据图。SHACL 使用形状图的概念来描述一组与目标配对的形状约束,这些约束指定 RDF 图中的哪些节点应该满足哪些形状。一个解决方案是容忍不验证,并想办法在不验证的情况下获得有意义的正确查询答案。这就是所谓的一致性查询回答(CQA),在数据库和 KR 设置中都有大量关于 CQA 的文献。我们针对语义网查询语言 SPARQL 的一个基本片段,在 SHACL 的背景下研究一致性查询应答(CQA)。我们的工作目标是针对各种语义和对可接受修复的可能限制,对 CQA 进行详细的复杂性分析。结果发现,所有考虑过的问题变体都很难解决,复杂度介于多项式层次结构的第一级和第三级之间。
{"title":"Consistent Query Answering over SHACL Constraints","authors":"Shqiponja Ahmetaj, Timo Camillo Merkl, Reinhard Pichler","doi":"arxiv-2406.16653","DOIUrl":"https://doi.org/arxiv-2406.16653","url":null,"abstract":"The Shapes Constraint Language (SHACL) was standardized by the World Wide Web\u0000as a constraint language to describe and validate RDF data graphs. SHACL uses\u0000the notion of shapes graph to describe a set of shape constraints paired with\u0000targets, that specify which nodes of the RDF graph should satisfy which shapes.\u0000An important question in practice is how to handle data graphs that do not\u0000validate the shapes graph. A solution is to tolerate the non-validation and\u0000find ways to obtain meaningful and correct answers to queries despite the\u0000non-validation. This is known as consistent query answering (CQA) and there is\u0000extensive literature on CQA in both the database and the KR setting. We study\u0000CQA in the context of SHACL for a fundamental fragment of the Semantic Web\u0000query language SPARQL. The goal of our work is a detailed complexity analysis\u0000of CQA for various semantics and possible restrictions on the acceptable\u0000repairs. It turns out that all considered variants of the problem are\u0000intractable, with complexities ranging between the first and third level of the\u0000polynomial hierarchy.","PeriodicalId":501024,"journal":{"name":"arXiv - CS - Computational Complexity","volume":"32 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2024-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141507211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
arXiv - CS - Computational Complexity
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1