An automata network with n components over a finite alphabet Q of size q is a discrete dynamical system described by the successive iterations of a function . In most applications, the main parameter is the interaction graph of f: the digraph with vertex set that contains an arc from j to i if depends on input j. What can be said on the set of the interaction graphs of the automata networks isomorphic to f? It seems that this simple question has never been studied. Here, we report some basic facts. First, we prove that if or and f is neither the identity nor constant, then always contains the complete digraph , with arcs. Then, we prove that always contains a digraph whose minimum in-degree is bounded as a function of q. Hence, if n is large with respect to q, then cannot only contain . However, we prove that can contain only dense digraphs, with at least arcs.
{"title":"Interaction graphs of isomorphic automata networks I: Complete digraph and minimum in-degree","authors":"Florian Bridoux , Kévin Perrot , Aymeric Picard Marchetto , Adrien Richard","doi":"10.1016/j.jcss.2023.05.003","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.05.003","url":null,"abstract":"<div><p><span>An automata network with </span><em>n</em> components over a finite alphabet <em>Q</em> of size <em>q</em><span> is a discrete dynamical system described by the successive iterations of a function </span><span><math><mi>f</mi><mo>:</mo><msup><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msup><mo>→</mo><msup><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msup></math></span>. In most applications, the main parameter is the interaction graph of <em>f</em><span>: the digraph with vertex set </span><span><math><mo>[</mo><mi>n</mi><mo>]</mo></math></span> that contains an arc from <em>j</em> to <em>i</em> if <span><math><msub><mrow><mi>f</mi></mrow><mrow><mi>i</mi></mrow></msub></math></span> depends on input <em>j</em>. What can be said on the set <span><math><mi>G</mi><mo>(</mo><mi>f</mi><mo>)</mo></math></span> of the interaction graphs of the automata networks isomorphic to <em>f</em>? It seems that this simple question has never been studied. Here, we report some basic facts. First, we prove that if <span><math><mi>n</mi><mo>≥</mo><mn>5</mn></math></span> or <span><math><mi>q</mi><mo>≥</mo><mn>3</mn></math></span> and <em>f</em> is neither the identity nor constant, then <span><math><mi>G</mi><mo>(</mo><mi>f</mi><mo>)</mo></math></span> always contains the complete digraph <span><math><msub><mrow><mi>K</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>, with <span><math><msup><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></msup></math></span> arcs. Then, we prove that <span><math><mi>G</mi><mo>(</mo><mi>f</mi><mo>)</mo></math></span> always contains a digraph whose minimum in-degree is bounded as a function of <em>q</em>. Hence, if <em>n</em> is large with respect to <em>q</em>, then <span><math><mi>G</mi><mo>(</mo><mi>f</mi><mo>)</mo></math></span> cannot only contain <span><math><msub><mrow><mi>K</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>. However, we prove that <span><math><mi>G</mi><mo>(</mo><mi>f</mi><mo>)</mo></math></span> can contain only dense digraphs, with at least <span><math><mo>⌊</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>/</mo><mn>4</mn><mo>⌋</mo></math></span> arcs.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"138 ","pages":"Article 103458"},"PeriodicalIF":1.1,"publicationDate":"2023-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49723541","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-22DOI: 10.1016/j.jcss.2023.05.001
Fedor V. Fomin , Petr A. Golovach , William Lochet , Danil Sagunov , Saket Saurabh , Kirill Simonov
We study two “above guarantee” versions of the classical Longest Path problem on undirected and directed graphs and obtain the following results. In the first variant of Longest Path that we study, called Longest Detour, the task is to decide whether a graph has an -path of length at least . Bezáková et al. [7] proved that on undirected graphs the problem is fixed-parameter tractable (). Our first main result establishes a connection between Longest Detour on directed graphs and 3- Disjoint Paths on directed graphs. Using these new insights, we design a time algorithm for the problem on directed planar graphs. Furthermore, the new approach yields a significantly faster algorithm on undirected graphs. In the second variant of Longest Path, namely Longest Path above Diameter, the task is to decide whether the graph has a path of length at least . We obtain dichotomy results about Longest Path above Diameter on undirected and directed graphs.
{"title":"Detours in directed graphs","authors":"Fedor V. Fomin , Petr A. Golovach , William Lochet , Danil Sagunov , Saket Saurabh , Kirill Simonov","doi":"10.1016/j.jcss.2023.05.001","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.05.001","url":null,"abstract":"<div><p>We study two “above guarantee” versions of the classical <span>Longest Path</span> problem on undirected and directed graphs and obtain the following results. In the first variant of <span>Longest Path</span> that we study, called <span>Longest Detour</span>, the task is to decide whether a graph has an <span><math><mo>(</mo><mi>s</mi><mo>,</mo><mi>t</mi><mo>)</mo></math></span>-path of length at least <span><math><msub><mrow><mi>dist</mi></mrow><mrow><mi>G</mi></mrow></msub><mo>(</mo><mi>s</mi><mo>,</mo><mi>t</mi><mo>)</mo><mo>+</mo><mi>k</mi></math></span>. Bezáková et al. <span>[7]</span> proved that on undirected graphs the problem is fixed-parameter tractable (<span><math><mi>FPT</mi></math></span>). Our first main result establishes a connection between <span>Longest Detour</span> on directed graphs and 3- <span>Disjoint Paths</span> on directed graphs. Using these new insights, we design a <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>O</mi><mo>(</mo><mi>k</mi><mo>)</mo></mrow></msup><mo>⋅</mo><msup><mrow><mi>n</mi></mrow><mrow><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></mrow></msup></math></span> time algorithm for the problem on directed planar graphs. Furthermore, the new approach yields a significantly faster <span><math><mi>FPT</mi></math></span> algorithm on undirected graphs. In the second variant of <span>Longest Path</span>, namely <span>Longest Path above Diameter</span>, the task is to decide whether the graph has a path of length at least <span><math><mi>diam</mi><mo>(</mo><mi>G</mi><mo>)</mo><mo>+</mo><mi>k</mi></math></span>. We obtain dichotomy results about <span>Longest Path above Diameter</span> on undirected and directed graphs.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"137 ","pages":"Pages 66-86"},"PeriodicalIF":1.1,"publicationDate":"2023-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49762902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-11DOI: 10.1016/j.jcss.2023.04.007
Brett Hemenway Falk , Rohit Nema , Rafail Ostrovsky
We present a linear-time, space and communication data-oblivious algorithm for securely merging two private, sorted lists into a single sorted, secret-shared list in the two party setting. Although merging two sorted lists can be done insecurely in linear time, previous secure merge algorithms all require super-linear time and communication. A key feature of our construction is a novel method to obliviously traverse permuted lists in sorted order. Our algorithm only requires black-box use of the underlying additively homomorphic cryptosystem and generic secure computation protocols for comparison and equality testing.
{"title":"Linear-time 2-party secure merge from additively homomorphic encryption","authors":"Brett Hemenway Falk , Rohit Nema , Rafail Ostrovsky","doi":"10.1016/j.jcss.2023.04.007","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.04.007","url":null,"abstract":"<div><p>We present a linear-time, space and communication <em>data-oblivious</em> algorithm for securely merging two private, sorted lists into a single sorted, secret-shared list in the <em>two</em> party setting. Although merging two sorted lists can be done <em>insecurely</em> in linear time, previous <em>secure</em> merge algorithms all require super-linear time and communication. A key feature of our construction is a novel method to <em>obliviously</em> traverse permuted lists in sorted order. Our algorithm only requires black-box use of the underlying additively homomorphic cryptosystem and generic secure computation protocols for comparison and equality testing.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"137 ","pages":"Pages 37-49"},"PeriodicalIF":1.1,"publicationDate":"2023-05-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49762882","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-04DOI: 10.1016/j.jcss.2023.04.006
Theodoros Papamakarios , Alexander Razborov
We identify two new clusters of proof complexity measures equal up to polynomial and factors. The first cluster contains the logarithm of tree-like resolution size, regularized clause and monomial space, and clause space, ordinary and regularized, in regular and tree-like resolution. Consequently, separating clause or monomial space from the logarithm of tree-like resolution size is equivalent to showing strong trade-offs between clause space and length, and equivalent to showing super-critical trade-offs between clause space and depth. The second cluster contains width, space (a generalization of clause space to depth 2 Frege systems), ordinary and regularized, and the logarithm of tree-like size. As an application, we improve a known size-space trade-off for polynomial calculus with resolution. We further show a quadratic lower bound on tree-like resolution size for formulas refutable in clause space 4, and introduce a measure intermediate between depth and the logarithm of tree-like resolution size.
{"title":"Space characterizations of complexity measures and size-space trade-offs in propositional proof systems","authors":"Theodoros Papamakarios , Alexander Razborov","doi":"10.1016/j.jcss.2023.04.006","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.04.006","url":null,"abstract":"<div><p>We identify two new clusters of proof complexity measures equal up to polynomial and <span><math><mi>log</mi><mo></mo><mi>n</mi></math></span> factors. The first cluster contains the logarithm of tree-like resolution size, regularized clause and monomial space, and clause space, ordinary and regularized, in regular and tree-like resolution. Consequently, separating clause or monomial space from the logarithm of tree-like resolution size is equivalent to showing strong trade-offs between clause space and length, and equivalent to showing super-critical trade-offs between clause space and depth. The second cluster contains width, <span><math><msub><mrow><mi>Σ</mi></mrow><mrow><mn>2</mn></mrow></msub></math></span> space (a generalization of clause space to depth 2 Frege systems), ordinary and regularized, and the logarithm of tree-like <span><math><mi>R</mi><mo>(</mo><mi>log</mi><mo></mo><mo>)</mo></math></span> size. As an application, we improve a known size-space trade-off for polynomial calculus with resolution. We further show a quadratic lower bound on tree-like resolution size for formulas refutable in clause space 4, and introduce a measure intermediate between depth and the logarithm of tree-like resolution size.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"137 ","pages":"Pages 20-36"},"PeriodicalIF":1.1,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49739315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-04DOI: 10.1016/j.jcss.2023.04.005
George B. Mertzios , Hendrik Molter , Rolf Niedermeier , Viktor Zamaraev , Philipp Zschoche
Temporal graphs are graphs whose topology is subject to discrete changes over time. Given a static underlying graph G, a temporal graph is represented by assigning a set of integer time-labels to every edge e of G, indicating the discrete time steps at which e is active. We introduce and study the complexity of a natural temporal extension of the classical graph problem Maximum Matching, taking into account the dynamic nature of temporal graphs. In our problem, Maximum Temporal Matching, we are looking for the largest possible number of time-labeled edges (simply time-edges) such that no vertex is matched more than once within any time window of Δ consecutive time slots, where is given. We prove strong computational hardness results for Maximum Temporal Matching, even for elementary cases, as well as fixed-parameter algorithms with respect to natural parameters and polynomial-time approximation algorithms.
{"title":"Computing maximum matchings in temporal graphs","authors":"George B. Mertzios , Hendrik Molter , Rolf Niedermeier , Viktor Zamaraev , Philipp Zschoche","doi":"10.1016/j.jcss.2023.04.005","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.04.005","url":null,"abstract":"<div><p><span>Temporal graphs are graphs whose topology is subject to discrete changes over time. Given a static underlying graph </span><em>G</em>, a temporal graph is represented by assigning a set of integer time-labels to every edge <em>e</em> of <em>G</em><span>, indicating the discrete time steps at which </span><em>e</em><span><span> is active. We introduce and study the complexity of a natural temporal extension of the </span>classical graph problem </span><span>Maximum Matching</span>, taking into account the dynamic nature of temporal graphs. In our problem, <span>Maximum Temporal Matching</span>, we are looking for the largest possible number of time-labeled edges (simply <em>time-edges</em>) <span><math><mo>(</mo><mi>e</mi><mo>,</mo><mi>t</mi><mo>)</mo></math></span> such that no vertex is matched more than once within any time window of Δ consecutive time slots, where <span><math><mi>Δ</mi><mo>∈</mo><mi>N</mi></math></span> is given. We prove strong computational hardness results for <span>Maximum Temporal Matching</span><span>, even for elementary cases, as well as fixed-parameter algorithms with respect to natural parameters and polynomial-time approximation algorithms.</span></p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"137 ","pages":"Pages 1-19"},"PeriodicalIF":1.1,"publicationDate":"2023-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49739744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-01DOI: 10.1016/j.jcss.2022.10.003
Yen-Heng Lin , Sun-Yuan Hsieh
Many Internet protocol (IP) lookup algorithms have been formulated to improve network performance. This study reviewed and experimentally evaluated technologies for trie-based methods that reduce memory access, memory consumption and IP lookup time. Experiments involving binary tries (for simplicity) were conducted on four real-world data sets, two of which were on IPv4 router tables (855,997 and 876,489 active prefixes) and two of which were on IPv6 router tables (155,310 and 157,579 active prefixes). Technologies designed to reduce time taken (at the expense of memory consumption) worked well for IPv4, and those designed to reduce memory consumption worked well for IPv6. Various combinations of these technologies were applied together in the experiments.
{"title":"Improved IP lookup technology for trie-based data structures","authors":"Yen-Heng Lin , Sun-Yuan Hsieh","doi":"10.1016/j.jcss.2022.10.003","DOIUrl":"https://doi.org/10.1016/j.jcss.2022.10.003","url":null,"abstract":"<div><p>Many Internet protocol (IP) lookup algorithms have been formulated to improve network performance. This study reviewed and experimentally evaluated technologies for trie-based methods that reduce memory access, memory consumption and IP lookup time. Experiments involving binary tries (for simplicity) were conducted on four real-world data sets, two of which were on IPv4 router tables (855,997 and 876,489 active prefixes) and two of which were on IPv6 router tables (155,310 and 157,579 active prefixes). Technologies designed to reduce time taken (at the expense of memory consumption) worked well for IPv4, and those designed to reduce memory consumption worked well for IPv6. Various combinations of these technologies were applied together in the experiments.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"133 ","pages":"Pages 41-55"},"PeriodicalIF":1.1,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725737","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-01DOI: 10.1016/j.jcss.2022.11.002
Carl Einarson , Gregory Gutin , Bart M.P. Jansen , Diptapriyo Majumdar , Magnus Wahlström
We introduce and study two natural generalizations of the Connected Vertex Cover (VC) problem: the p-Edge-Connected and p-Vertex-Connected VC problem (where is a fixed integer). We obtain an -time algorithm for p-Edge-Connected VC and an -time algorithm for p-Vertex-Connected VC. Thus, like Connected VC, both constrained VC problems are FPT. Furthermore, like Connected VC, neither problem admits a polynomial kernel unless NP ⊆ coNP/poly, which is highly unlikely. We prove however that both problems admit time efficient polynomial sized approximate kernelization schemes. Finally, we describe a -approximation algorithm for the p-Edge-Connected VC. The proofs for the new VC problems require more sophisticated arguments than for Connected VC. In particular, for the approximation algorithm we use Gomory-Hu trees and for the approximate kernels a result on small-size spanning p-vertex/edge-connected subgraphs of a p-vertex/edge-connected graph by Nishizeki and Poljak (1994) [30] and Nagamochi and Ibaraki (1992) [27].
{"title":"p-Edge/vertex-connected vertex cover: Parameterized and approximation algorithms","authors":"Carl Einarson , Gregory Gutin , Bart M.P. Jansen , Diptapriyo Majumdar , Magnus Wahlström","doi":"10.1016/j.jcss.2022.11.002","DOIUrl":"https://doi.org/10.1016/j.jcss.2022.11.002","url":null,"abstract":"<div><p>We introduce and study two natural generalizations of the Connected Vertex Cover (VC) problem: the <em>p</em>-Edge-Connected and <em>p</em>-Vertex-Connected VC problem (where <span><math><mi>p</mi><mo>≥</mo><mn>2</mn></math></span> is a fixed integer). We obtain an <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>O</mi><mo>(</mo><mi>p</mi><mi>k</mi><mo>)</mo></mrow></msup><msup><mrow><mi>n</mi></mrow><mrow><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></mrow></msup></math></span>-time algorithm for <em>p</em>-Edge-Connected VC and an <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>O</mi><mo>(</mo><msup><mrow><mi>k</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>)</mo></mrow></msup><msup><mrow><mi>n</mi></mrow><mrow><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></mrow></msup></math></span>-time algorithm for <em>p</em>-Vertex-Connected VC. Thus, like Connected VC, both constrained VC problems are FPT. Furthermore, like Connected VC, neither problem admits a polynomial kernel unless NP ⊆ coNP/poly, which is highly unlikely. We prove however that both problems admit time efficient polynomial sized approximate kernelization schemes. Finally, we describe a <span><math><mn>2</mn><mo>(</mo><mi>p</mi><mo>+</mo><mn>1</mn><mo>)</mo></math></span>-approximation algorithm for the <em>p</em>-Edge-Connected VC. The proofs for the new VC problems require more sophisticated arguments than for Connected VC. In particular, for the approximation algorithm we use Gomory-Hu trees and for the approximate kernels a result on small-size spanning <em>p</em>-vertex/edge-connected subgraphs of a <em>p</em>-vertex/edge-connected graph by Nishizeki and Poljak (1994) <span>[30]</span> and Nagamochi and Ibaraki (1992) <span>[27]</span>.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"133 ","pages":"Pages 23-40"},"PeriodicalIF":1.1,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725779","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-01DOI: 10.1016/j.jcss.2022.11.001
Gianluca De Marco , Dariusz R. Kowalski , Grzegorz Stachowiak
In a multiple access channel, autonomous stations are able to transmit and listen to a shared device. A fundamental problem, called contention resolution, is to allow any station to successfully deliver its message by resolving the conflicts that arise when several stations transmit simultaneously. Despite a long history on such a problem, most of the results deal with the static setting when all stations start simultaneously, while many fundamental questions remain open in the realistic scenario when stations can join the channel at arbitrary times. In this paper, we explore the impact that three major channel features (asynchrony among stations, knowledge of the number of contenders and possibility of switching off stations after a successful transmission) can have on the time complexity of non-adaptive deterministic algorithms. We establish upper and lower bounds allowing to understand which parameters permit time-efficient contention resolution and which do not.
{"title":"Deterministic non-adaptive contention resolution on a shared channel","authors":"Gianluca De Marco , Dariusz R. Kowalski , Grzegorz Stachowiak","doi":"10.1016/j.jcss.2022.11.001","DOIUrl":"https://doi.org/10.1016/j.jcss.2022.11.001","url":null,"abstract":"<div><p><span>In a multiple access channel, autonomous stations are able to transmit and listen to a shared device. A fundamental problem, called </span><span><em>contention resolution</em></span>, is to allow any station to successfully deliver its message by resolving the conflicts that arise when several stations transmit simultaneously. Despite a long history on such a problem, most of the results deal with the static setting when all stations start simultaneously, while many fundamental questions remain open in the realistic scenario when stations can join the channel at arbitrary times. In this paper, we explore the impact that three major channel features (asynchrony among stations, knowledge of the number of contenders and possibility of switching off stations after a successful transmission) can have on the time complexity of non-adaptive deterministic algorithms. We establish upper and lower bounds allowing to understand which parameters permit time-efficient contention resolution and which do not.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"133 ","pages":"Pages 1-22"},"PeriodicalIF":1.1,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725774","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we focus on Hitting-Set, a fundamental problem in combinatorial optimization, through the lens of sublinear time algorithms. Given access to the hypergraph through a subset query oracle in the query model, we give sublinear time algorithms for Hitting-Set with almost tight parameterized query complexity. In parameterized query complexity, we estimate the number of queries to the oracle based on the parameter k, the size of the Hitting-Set. The subset query oracle we use in this paper is called Generalized d-partite Independent Set query oracle (GPIS) and it was introduced by Bishnu et al. (ISAAC'18). GPIS is a generalization to hypergraphs of the Bipartite Independent Set query oracle (BIS) introduced by Beame et al. (ITCS'18 and TALG'20) for estimating the number of edges in graphs. Since its introduction GPIS query oracle has been used for estimating the number of hyperedges independently by Dell et al. (SODA'20 and SICOMP'22) and Bhattacharya et al. (STACS'22), and for estimating the number of triangles in a graph by Bhattacharya et al. (ISAAC'19 and TOCS'21). Formally, GPIS is defined as follows: GPISoracle for a d-uniform hypergraphtakes as input d pairwise disjoint non-empty subsetsof vertices inand answers whether there is a hyperedge inthat intersects each set, where. For , the GPIS oracle is nothing but BIS oracle.
We show that d-Hitting-Set, the hitting set problem for d-uniform hypergraphs, can be solved using GPIS queries. Additionally, we also showed that d-Decision-Hitting-Set, the decision version of d-Hitting-Set can be solved with
{"title":"Almost optimal query algorithm for hitting set using a subset query","authors":"Arijit Bishnu , Arijit Ghosh , Sudeshna Kolay , Gopinath Mishra , Saket Saurabh","doi":"10.1016/j.jcss.2023.02.002","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.02.002","url":null,"abstract":"<div><p>In this paper, we focus on <span>Hitting-Set</span><span>, a fundamental problem in combinatorial optimization, through the lens of sublinear time algorithms. Given access to the hypergraph through a subset query oracle in the query model, we give sublinear time algorithms for </span><span>Hitting-Set</span><span> with almost tight parameterized query complexity. In </span><em>parameterized query complexity</em>, we estimate the number of queries to the oracle based on the parameter <em>k</em>, the size of the <span>Hitting-Set</span>. The subset query oracle we use in this paper is called Generalized <em>d</em><span>-partite Independent Set query oracle (GPIS) and it was introduced by Bishnu et al. (ISAAC'18). GPIS is a generalization to hypergraphs of the Bipartite Independent Set query oracle (BIS) introduced by Beame et al. (ITCS'18 and TALG'20) for estimating the number of edges in graphs. Since its introduction GPIS query oracle has been used for estimating the number of hyperedges independently by Dell et al. (SODA'20 and SICOMP'22) and Bhattacharya et al. (STACS'22), and for estimating the number of triangles in a graph by Bhattacharya et al. (ISAAC'19 and TOCS'21). Formally, GPIS is defined as follows: </span><span>GPIS</span> <em>oracle for a d-uniform hypergraph</em> <span><math><mi>H</mi></math></span> <em>takes as input d pairwise disjoint non-empty subsets</em> <span><math><msub><mrow><mi>A</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><mo>…</mo><mo>,</mo><msub><mrow><mi>A</mi></mrow><mrow><mi>d</mi></mrow></msub></math></span> <em>of vertices in</em> <span><math><mi>H</mi></math></span> <em>and answers whether there is a hyperedge in</em> <span><math><mi>H</mi></math></span> <em>that intersects each set</em> <span><math><msub><mrow><mi>A</mi></mrow><mrow><mi>i</mi></mrow></msub></math></span><em>, where</em> <span><math><mi>i</mi><mo>∈</mo><mo>{</mo><mn>1</mn><mo>,</mo><mspace></mspace><mn>2</mn><mo>,</mo><mspace></mspace><mo>…</mo><mo>,</mo><mi>d</mi><mo>}</mo></math></span><em>.</em> For <span><math><mi>d</mi><mo>=</mo><mn>2</mn></math></span>, the <span>GPIS</span> oracle is nothing but <span>BIS</span> oracle.</p><p>We show that <em>d</em>-<span>Hitting-Set</span>, the hitting set problem for <em>d</em>-uniform hypergraphs, can be solved using <span><math><msub><mrow><mover><mrow><mi>O</mi></mrow><mrow><mo>˜</mo></mrow></mover></mrow><mrow><mi>d</mi></mrow></msub><mo>(</mo><msup><mrow><mi>k</mi></mrow><mrow><mi>d</mi></mrow></msup><mi>log</mi><mo></mo><mi>n</mi><mo>)</mo></math></span> <span>GPIS</span> queries. Additionally, we also showed that <em>d</em>-<span>Decision-Hitting-Set</span>, the decision version of <em>d</em>-<span>Hitting-Set</span> can be solved with <span><math><msub><mrow><mover><mrow><mi>O</mi></mrow><mrow><mo>˜</mo></mrow></mover></mrow><mrow><mi>d</mi></mrow></msub><mrow><mo>(</mo><mi>min</mi><mo></mo><mrow><mo>{</mo><msup><mrow><mi>k</mi></mrow><mrow><mi>d</mi></mrow></msup><mi>log</mi><mo","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"137 ","pages":"Pages 50-65"},"PeriodicalIF":1.1,"publicationDate":"2023-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49739741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-03-01DOI: 10.1016/j.jcss.2022.10.002
Fedor V. Fomin , Danil Sagunov , Kirill Simonov
A k-core of a graph G is the maximal induced subgraph in which every vertex has degree at least k. In the Edgek-Core optimization problem, we are given a graph G and integers k, b and p. The task is to ensure that the k-core of G has at least p vertices, by adding at most b edges. While Edgek-Core is known to be computationally hard in general, we show that there are efficient algorithms when the k-core has to be constructed from a sparse graph with some structural properties. Our results are as follows.
•
When the input graph is a forest, Edgek-Core is solvable in polynomial time.
•
Edgek-Core is fixed-parameter tractable (FPT) when parameterized by the minimum size of a vertex cover in the input graph.
•
Edgek-Core is when parameterized by the treewidth of the graph plus k.
{"title":"Building large k-cores from sparse graphs","authors":"Fedor V. Fomin , Danil Sagunov , Kirill Simonov","doi":"10.1016/j.jcss.2022.10.002","DOIUrl":"https://doi.org/10.1016/j.jcss.2022.10.002","url":null,"abstract":"<div><p>A <em>k</em>-core of a graph <em>G</em> is the maximal induced subgraph in which every vertex has degree at least <em>k</em>. In the <span>Edge</span> <em>k</em><span>-Core</span> optimization problem, we are given a graph <em>G</em> and integers <em>k</em>, <em>b</em> and <em>p</em>. The task is to ensure that the <em>k</em>-core of <em>G</em> has at least <em>p</em> vertices, by adding at most <em>b</em> edges. While <span>Edge</span> <em>k</em><span>-Core</span> is known to be computationally hard in general, we show that there are efficient algorithms when the <em>k</em>-core has to be constructed from a sparse graph with some structural properties. Our results are as follows.</p><ul><li><span>•</span><span><p>When the input graph is a forest, <span>Edge</span> <em>k</em><span>-Core</span> is solvable in polynomial time.</p></span></li><li><span>•</span><span><p><span>Edge</span> <em>k</em><span>-Core</span> is fixed-parameter tractable (FPT) when parameterized by the minimum size of a vertex cover in the input graph.</p></span></li><li><span>•</span><span><p><span>Edge</span> <em>k</em><span>-Core</span> is <span><math><mi>FPT</mi></math></span> when parameterized by the treewidth of the graph plus <em>k</em>.</p></span></li></ul></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"132 ","pages":"Pages 68-88"},"PeriodicalIF":1.1,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49738283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}