Pub Date : 2026-01-07DOI: 10.1016/j.jcss.2026.103758
Xiaowei Huang , Shiguang Feng , Lvzhou Li
Connectivity is a fundamental structural property of matroids, and has been studied algorithmically over 50 years. In 1974, Cunningham proposed a deterministic algorithm consuming queries to the independence oracle to determine whether a matroid is connected. Since then, no algorithm, not even a random one, has worked better. To the best of our knowledge, the classical query complexity lower bound and the quantum complexity for this problem have not been considered. Thus, in this paper we are devoted to addressing these issues, and our contributions are threefold as follows: (i) First, we prove that the randomized query complexity of determining whether a matroid is connected is and thus the algorithm proposed by Cunningham is optimal in classical computing. (ii) Second, we present a quantum algorithm with queries, which exhibits provable quantum speedups over classical ones. (iii) Third, we prove that any quantum algorithm requires queries, which indicates that quantum algorithms can achieve at most a quadratic speedup over classical ones. Therefore, we have a relatively comprehensive understanding of the potential of quantum computing in determining the connectedness of matroids.
{"title":"Quantum and classical query complexities for determining connectedness of matroids","authors":"Xiaowei Huang , Shiguang Feng , Lvzhou Li","doi":"10.1016/j.jcss.2026.103758","DOIUrl":"10.1016/j.jcss.2026.103758","url":null,"abstract":"<div><div>Connectivity is a fundamental structural property of matroids, and has been studied algorithmically over 50 years. In 1974, Cunningham proposed a deterministic algorithm consuming <span><math><mi>O</mi><mo>(</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>)</mo></math></span> queries to the independence oracle to determine whether a matroid is connected. Since then, no algorithm, not even a random one, has worked better. To the best of our knowledge, the classical query complexity lower bound and the quantum complexity for this problem have not been considered. Thus, in this paper we are devoted to addressing these issues, and our contributions are threefold as follows: (i) First, we prove that the randomized query complexity of determining whether a matroid is connected is <span><math><mi>Ω</mi><mo>(</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>)</mo></math></span> and thus the algorithm proposed by Cunningham is optimal in classical computing. (ii) Second, we present a quantum algorithm with <span><math><mi>O</mi><mo>(</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>3</mn><mo>/</mo><mn>2</mn></mrow></msup><mo>)</mo></math></span> queries, which exhibits provable quantum speedups over classical ones. (iii) Third, we prove that any quantum algorithm requires <span><math><mi>Ω</mi><mo>(</mo><mi>n</mi><mo>)</mo></math></span> queries, which indicates that quantum algorithms can achieve at most a quadratic speedup over classical ones. Therefore, we have a relatively comprehensive understanding of the potential of quantum computing in determining the connectedness of matroids.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"157 ","pages":"Article 103758"},"PeriodicalIF":0.9,"publicationDate":"2026-01-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145976511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-01-05DOI: 10.1016/j.jcss.2025.103754
Nikola Jedličková , Jan Kratochvíl
A Hamiltonian path (cycle) in a graph is a path (cycle, respectively) which passes through all of its vertices exactly once. The problems of deciding the existence of a Hamiltonian path and a Hamiltonian cycle in an input graph (called Hamiltonian Path resp. Hamiltonian Cycle) is well known to be NP-complete, and restricted classes of graphs which allow for their polynomial-time solutions are intensively investigated. Until very recently, the complexity was open even for graphs of independence number at most 3. Fomin, Golovach, Sagunov, and Simonov [arxiv 2024] showed that for every integer k, Hamiltonian Path and Hamiltonian Cycle are polynomial-time solvable in graphs of independence number bounded by k, and moreover, that these problems are in FPT when parameterized by the independence number of the input graph. As a companion structural result to these general algorithms, we determine explicit obstacles to the existence of a Hamiltonian path for small values of k, namely for graphs of independence number 2, 3, and 4. Identifying these obstacles in an input graph yields alternative polynomial-time algorithms for Hamiltonian Path and Hamiltonian Cycle with no large hidden multiplicative constants.
图中的哈密顿路径(循环)是经过所有顶点一次的路径(循环)。确定输入图中哈密顿路径和哈密顿循环是否存在的问题(称为哈密顿路径问题)。哈密顿循环)众所周知是np完全的,并且对允许其多项式时间解的图的限制类进行了深入的研究。直到最近,即使独立数最多为3的图的复杂性也是开放的。Fomin, Golovach, Sagunov, and Simonov [arxiv 2024]证明了对于每一个整数k, hamilton Path和hamilton Cycle在以k为界的独立数的图中都是多项式时间可解的,并且当用输入图的独立数参数化时,这些问题在FPT中。作为这些一般算法的伴随结构结果,我们确定了小k值的哈密顿路径存在的显式障碍,即独立数为2、3和4的图。在输入图中识别这些障碍,可以产生哈密顿路径和哈密顿循环的替代多项式时间算法,没有大的隐藏乘法常数。
{"title":"On the structure of Hamiltonian graphs with small independence number","authors":"Nikola Jedličková , Jan Kratochvíl","doi":"10.1016/j.jcss.2025.103754","DOIUrl":"10.1016/j.jcss.2025.103754","url":null,"abstract":"<div><div>A Hamiltonian path (cycle) in a graph is a path (cycle, respectively) which passes through all of its vertices exactly once. The problems of deciding the existence of a Hamiltonian path and a Hamiltonian cycle in an input graph (called <span>Hamiltonian Path</span> resp. <span>Hamiltonian Cycle</span>) is well known to be NP-complete, and restricted classes of graphs which allow for their polynomial-time solutions are intensively investigated. Until very recently, the complexity was open even for graphs of independence number at most 3. Fomin, Golovach, Sagunov, and Simonov [arxiv 2024] showed that for every integer <em>k</em>, <span>Hamiltonian Path</span> and <span>Hamiltonian Cycle</span> are polynomial-time solvable in graphs of independence number bounded by <em>k</em>, and moreover, that these problems are in FPT when parameterized by the independence number of the input graph. As a companion structural result to these general algorithms, we determine explicit obstacles to the existence of a Hamiltonian path for small values of <em>k</em>, namely for graphs of independence number 2, 3, and 4. Identifying these obstacles in an input graph yields alternative polynomial-time algorithms for <span>Hamiltonian Path</span> and <span>Hamiltonian Cycle</span> with no large hidden multiplicative constants.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"157 ","pages":"Article 103754"},"PeriodicalIF":0.9,"publicationDate":"2026-01-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145976510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-01-02DOI: 10.1016/j.jcss.2025.103753
Argyrios Deligkas , Eduard Eiben , Robert Ganian , Iyad Kanj , Dominik Leko , M.S. Ramanujan
In Graph Coordinated Motion Planning, we are given a graph G some of whose vertices are occupied by robots, and we are asked to route k marked robots to their destinations while avoiding collisions and without exceeding a given budget ℓ on the number of robot moves. We continue the recent investigation of the problem [ICALP 2024], focusing on the parameter k that captures the task of routing a small number of robots in a possibly crowded graph. We prove that the problem is W[1]-hard parameterized by ℓ even for , but fixed-parameter tractable parameterized by k plus the treedepth of G. We complement the latter algorithm with an NP-hardness reduction which shows that both parameters are necessary to achieve tractability.
{"title":"Routing few robots in a crowded network","authors":"Argyrios Deligkas , Eduard Eiben , Robert Ganian , Iyad Kanj , Dominik Leko , M.S. Ramanujan","doi":"10.1016/j.jcss.2025.103753","DOIUrl":"10.1016/j.jcss.2025.103753","url":null,"abstract":"<div><div>In <span>Graph Coordinated Motion Planning</span>, we are given a graph <em>G</em> some of whose vertices are occupied by robots, and we are asked to route <em>k</em> marked robots to their destinations while avoiding collisions and without exceeding a given budget <em>ℓ</em> on the number of robot moves. We continue the recent investigation of the problem [ICALP 2024], focusing on the parameter <em>k</em> that captures the task of routing a small number of robots in a possibly crowded graph. We prove that the problem is <span>W</span>[1]-hard parameterized by <em>ℓ</em> even for <span><math><mi>k</mi><mo>=</mo><mn>1</mn></math></span>, but fixed-parameter tractable parameterized by <em>k</em> plus the treedepth of <em>G</em>. We complement the latter algorithm with an <span>NP</span>-hardness reduction which shows that both parameters are necessary to achieve tractability.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"157 ","pages":"Article 103753"},"PeriodicalIF":0.9,"publicationDate":"2026-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145924261","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-17DOI: 10.1016/j.jcss.2025.103751
João Marcos Brito , Thiago Marcilon , Nicolas A. Martins , Rudini Sampaio
In 2010, Brešar, Klavžar and Rall introduced the optimization variant of the graph domination game and the game domination number. This variant has been extensively investigated in the literature, with several papers published on this topic. Interestingly, the most common variant of combinatorial games, the normal variant, in which the last to play wins, had never been investigated for the graph domination game. In this paper, we start the study of the normal play of the domination game, which we call Normal Domination Game. We first prove that this game is PSPACE-complete even in graphs with diameter two. We also use the Sprague-Grundy theory to prove that Alice (the first player) wins in the path if and only if n is not a multiple of 4, and wins in the cycle if and only if for some integer k. Moreover, we obtain a polynomial time algorithm to decide the winner for any disjoint union of paths and cycles in the Normal Domination Game and its natural partizan variant. Finally, we also prove that the Misère Domination Game (the last to play loses) is PSPACE-complete, as are the natural partizan variants of the normal game and the misère game.
{"title":"The Normal Domination Game in graphs","authors":"João Marcos Brito , Thiago Marcilon , Nicolas A. Martins , Rudini Sampaio","doi":"10.1016/j.jcss.2025.103751","DOIUrl":"10.1016/j.jcss.2025.103751","url":null,"abstract":"<div><div>In 2010, Brešar, Klavžar and Rall introduced the optimization variant of the graph domination game and the game domination number. This variant has been extensively investigated in the literature, with several papers published on this topic. Interestingly, the most common variant of combinatorial games, the normal variant, in which the last to play wins, had never been investigated for the graph domination game. In this paper, we start the study of the normal play of the domination game, which we call <span>Normal Domination Game</span>. We first prove that this game is PSPACE-complete even in graphs with diameter two. We also use the Sprague-Grundy theory to prove that Alice (the first player) wins in the path <span><math><msub><mrow><mi>P</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span> if and only if <em>n</em> is not a multiple of 4, and wins in the cycle <span><math><msub><mrow><mi>C</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span> if and only if <span><math><mi>n</mi><mo>=</mo><mn>4</mn><mi>k</mi><mo>+</mo><mn>3</mn></math></span> for some integer <em>k</em>. Moreover, we obtain a polynomial time algorithm to decide the winner for any disjoint union of paths and cycles in the <span>Normal Domination Game</span> and its natural partizan variant. Finally, we also prove that the <span>Misère Domination Game</span> (the last to play loses) is PSPACE-complete, as are the natural partizan variants of the normal game and the misère game.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"157 ","pages":"Article 103751"},"PeriodicalIF":0.9,"publicationDate":"2025-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145839598","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-16DOI: 10.1016/j.jcss.2025.103750
Hua Chen , Lin Chen , Shenghao Ye , Guochuan Zhang
In the min-k-union problem (MkU), given a ground set N, a collection of m subsets of N, and an integer k, one needs to select k sets from so that their union has the smallest size. In this paper, we study two extensions of MkU.
The first is the maximum coverage interdiction problem, where there is a leader with cardinality and a follower with cardinality . The leader's goal (as well as the problem) is to remove up to sets from so that the union size of the at most sets selected by the follower from the remaining sets attains the minimum. We provide an -approximation algorithm, while a lower bound of under the “Dense versus Random” conjecture for MkU [Chlamtáč et al. '17] applies to our problem as well. When , this problem becomes MkU.
The second problem deals with monotone submodular minimization with a cardinality constraint. Given a ground set N of n elements, a nonnegative monotone submodular function f, and an integer k, we are required to find a size-k set that minimizes . We propose a 2-approximation algorithm, matching (up to a logarithmic factor) the lower bound of [Svitkina and Fleischer '11]. When f is a coverage function, this problem becomes MkU.
{"title":"Approximation algorithms for two extensions of min-k-union","authors":"Hua Chen , Lin Chen , Shenghao Ye , Guochuan Zhang","doi":"10.1016/j.jcss.2025.103750","DOIUrl":"10.1016/j.jcss.2025.103750","url":null,"abstract":"<div><div>In the min-<em>k</em>-union problem (M<em>k</em>U), given a ground set <em>N</em>, a collection <span><math><mi>S</mi></math></span> of <em>m</em> subsets of <em>N</em>, and an integer <em>k</em>, one needs to select <em>k</em> sets from <span><math><mi>S</mi></math></span> so that their union has the smallest size. In this paper, we study two extensions of M<em>k</em>U.</div><div>The first is the maximum coverage interdiction problem, where there is a leader with cardinality <span><math><msub><mrow><mi>k</mi></mrow><mrow><mi>l</mi></mrow></msub></math></span> and a follower with cardinality <span><math><msub><mrow><mi>k</mi></mrow><mrow><mi>f</mi></mrow></msub></math></span>. The leader's goal (as well as the problem) is to remove up to <span><math><msub><mrow><mi>k</mi></mrow><mrow><mi>l</mi></mrow></msub></math></span> sets from <span><math><mi>S</mi></math></span> so that the union size of the at most <span><math><msub><mrow><mi>k</mi></mrow><mrow><mi>f</mi></mrow></msub></math></span> sets selected by the follower from the remaining sets attains the minimum. We provide an <span><math><mover><mrow><mi>O</mi></mrow><mrow><mo>˜</mo></mrow></mover><mo>(</mo><msqrt><mrow><mi>m</mi></mrow></msqrt><mo>)</mo></math></span>-approximation algorithm, while a lower bound of <span><math><mi>Ω</mi><mo>(</mo><msup><mrow><mi>m</mi></mrow><mrow><mn>1</mn><mo>/</mo><mn>4</mn></mrow></msup><mo>)</mo></math></span> under the “Dense versus Random” conjecture for M<em>k</em>U [Chlamtáč et al. '17] applies to our problem as well. When <span><math><msub><mrow><mi>k</mi></mrow><mrow><mi>l</mi></mrow></msub><mo>=</mo><mi>m</mi><mo>−</mo><msub><mrow><mi>k</mi></mrow><mrow><mi>f</mi></mrow></msub></math></span>, this problem becomes M<em>k</em>U.</div><div>The second problem deals with monotone submodular minimization with a cardinality constraint. Given a ground set <em>N</em> of <em>n</em> elements, a nonnegative monotone submodular function <em>f</em>, and an integer <em>k</em>, we are required to find a size-<em>k</em> set <span><math><mi>S</mi><mo>⊆</mo><mi>N</mi></math></span> that minimizes <span><math><mi>f</mi><mo>(</mo><mi>S</mi><mo>)</mo></math></span>. We propose a 2<span><math><msqrt><mrow><mi>n</mi></mrow></msqrt></math></span>-approximation algorithm, matching (up to a logarithmic factor) the lower bound of <span><math><mi>Ω</mi><mo>(</mo><msqrt><mrow><mfrac><mrow><mi>n</mi></mrow><mrow><mi>ln</mi><mo></mo><mi>n</mi></mrow></mfrac></mrow></msqrt><mo>)</mo></math></span> [Svitkina and Fleischer '11]. When <em>f</em> is a coverage function, this problem becomes M<em>k</em>U.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"157 ","pages":"Article 103750"},"PeriodicalIF":0.9,"publicationDate":"2025-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145839599","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-16DOI: 10.1016/j.jcss.2025.103752
Davi de Andrade , Júlio Araújo , Laure Morelle , Ignasi Sau , Ana Silva
A good edge-labeling (gel for short) of a graph G is a function such that, for any ordered pair of vertices of G, there do not exist two distinct increasing paths from x to y, where “increasing” means that the sequence of labels is non-decreasing. This notion was introduced by Bermond et al. (2013) [3] motivated by practical applications arising from routing and wavelength assignment problems in optical networks. Prompted by the lack of algorithmic results about the problem of deciding whether an input graph admits a gel, called GEL, we initiate its study from the viewpoint of parameterized complexity. We first introduce the natural version of GEL where one wants to use at most c distinct labels, which we call c-GEL, and we prove that it is NP-complete for every on very restricted instances. We then provide several positive results, starting with simple polynomial kernels for GEL and c-GEL parameterized by neighborhood diversity or vertex cover. As one of our main technical contributions, we present an FPT algorithm for GEL parameterized by the size of a modulator to a forest of stars, based on a novel approach via a 2-SAT formulation which we believe to be of independent interest. We also present FPT algorithms based on dynamic programming for c-GEL parameterized by treewidth and c, and for GEL parameterized by treewidth and the maximum degree. Finally, we answer positively a question of Bermond et al. (2013) [3] by proving the NP-completeness of a problem strongly related to GEL, namely that of deciding whether an input graph admits a so-called UPP-orientation.
{"title":"On the parameterized complexity of computing good edge-labelings","authors":"Davi de Andrade , Júlio Araújo , Laure Morelle , Ignasi Sau , Ana Silva","doi":"10.1016/j.jcss.2025.103752","DOIUrl":"10.1016/j.jcss.2025.103752","url":null,"abstract":"<div><div>A <em>good edge-labeling</em> (<span>gel</span> for short) of a graph <em>G</em> is a function <span><math><mi>λ</mi><mo>:</mo><mi>E</mi><mo>(</mo><mi>G</mi><mo>)</mo><mo>→</mo><mi>R</mi></math></span> such that, for any ordered pair of vertices <span><math><mo>(</mo><mi>x</mi><mo>,</mo><mi>y</mi><mo>)</mo></math></span> of <em>G</em>, there do not exist two distinct increasing paths from <em>x</em> to <em>y</em>, where “increasing” means that the sequence of labels is non-decreasing. This notion was introduced by Bermond et al. (2013) <span><span>[3]</span></span> motivated by practical applications arising from routing and wavelength assignment problems in optical networks. Prompted by the lack of algorithmic results about the problem of deciding whether an input graph admits a <span>gel</span>, called <span>GEL</span>, we initiate its study from the viewpoint of parameterized complexity. We first introduce the natural version of <span>GEL</span> where one wants to use at most <em>c</em> distinct labels, which we call <em>c</em>-GEL, and we prove that it is <span>NP</span>-complete for every <span><math><mi>c</mi><mo>≥</mo><mn>2</mn></math></span> on very restricted instances. We then provide several positive results, starting with simple polynomial kernels for <span>GEL</span> and <em>c</em>-<span>GEL</span> parameterized by neighborhood diversity or vertex cover. As one of our main technical contributions, we present an <span>FPT</span> algorithm for <span>GEL</span> parameterized by the size of a modulator to a forest of stars, based on a novel approach via a 2-<span>SAT</span> formulation which we believe to be of independent interest. We also present <span>FPT</span> algorithms based on dynamic programming for <em>c</em>-<span>GEL</span> parameterized by treewidth and <em>c</em>, and for <span>GEL</span> parameterized by treewidth and the maximum degree. Finally, we answer positively a question of Bermond et al. (2013) <span><span>[3]</span></span> by proving the <span>NP</span>-completeness of a problem strongly related to <span>GEL</span>, namely that of deciding whether an input graph admits a so-called UPP-orientation.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"157 ","pages":"Article 103752"},"PeriodicalIF":0.9,"publicationDate":"2025-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145789683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-11DOI: 10.1016/j.jcss.2025.103746
Hafsa Sidaq , Lei Wang , Jiancheng Chi , Hussain Haider
Nowadays, eye blink detection is gaining significant attention in human-computer interaction systems. Users are increasingly favoring interactions with their phones and computers through non-manual methods, underscoring the constraints of conventional touch interfaces. Wearable technology, such as electrooculography (EOG)-based approaches and infrared sensors (IR), can accurately detect eye blinks; nevertheless, they can be inconvenient after prolonged use. Despite this, the drawbacks of camera-based eye blink recognition techniques are blind spots and the lighting effect. Thus, this study proposes an acoustic signal-based eye blink detection system to overcome these constraints. Acoustic signals can perform fine-grained detection within localized range due to their high attenuation in the air medium. The main benefit of acoustic sensing over conventional methods is that it senses signals directly, so the user does not need to wear any sensors. The prevalence of speakers and microphones in devices is another advancement that supports acoustic sensing. In this research, we present AdapBlinker, which employs the HP ProBook 440 G5 laptop to generate acoustic signals, retrieve data, process acquired signals, and plot Fast Fourier transform (FFT) to extract eye blink signals. AdapBlinker uses an adaptive median filter that adapts to surroundings, eliminates intrusions, and detects subtle blinks. We tested AdapBlinker with thirty-four participants across three settings for five months, achieving an average eye blink detection accuracy of 97.2%.
{"title":"AdapBlinker: Robust adaptive median filter approach to detect subtle eye blinks","authors":"Hafsa Sidaq , Lei Wang , Jiancheng Chi , Hussain Haider","doi":"10.1016/j.jcss.2025.103746","DOIUrl":"10.1016/j.jcss.2025.103746","url":null,"abstract":"<div><div>Nowadays, eye blink detection is gaining significant attention in human-computer interaction systems. Users are increasingly favoring interactions with their phones and computers through non-manual methods, underscoring the constraints of conventional touch interfaces. Wearable technology, such as electrooculography (EOG)-based approaches and infrared sensors (IR), can accurately detect eye blinks; nevertheless, they can be inconvenient after prolonged use. Despite this, the drawbacks of camera-based eye blink recognition techniques are blind spots and the lighting effect. Thus, this study proposes an acoustic signal-based eye blink detection system to overcome these constraints. Acoustic signals can perform fine-grained detection within localized range due to their high attenuation in the air medium. The main benefit of acoustic sensing over conventional methods is that it senses signals directly, so the user does not need to wear any sensors. The prevalence of speakers and microphones in devices is another advancement that supports acoustic sensing. In this research, we present AdapBlinker, which employs the HP ProBook 440 G5 laptop to generate acoustic signals, retrieve data, process acquired signals, and plot Fast Fourier transform (FFT) to extract eye blink signals. AdapBlinker uses an adaptive median filter that adapts to surroundings, eliminates intrusions, and detects subtle blinks. We tested AdapBlinker with thirty-four participants across three settings for five months, achieving an average eye blink detection accuracy of 97.2%.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"157 ","pages":"Article 103746"},"PeriodicalIF":0.9,"publicationDate":"2025-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145924260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-11DOI: 10.1016/j.jcss.2025.103747
Michael R. Fellows , Mario Grobler , Nicole Megow , Amer E. Mouawad , Vijayaragunathan Ramamoorthi , Frances A. Rosamond , Daniel Schmand , Sebastian Siebertz
The dynamics of real-world applications and systems require efficient methods for improving infeasible solutions or restoring corrupted ones by making modifications to the current state of a system in a restricted way. We propose a new framework of solution discovery via reconfiguration for constructing a feasible solution for a given problem by executing a sequence of small modifications starting from a given state or configuration. Our framework integrates and formalizes different aspects of classical local search, reoptimization, and combinatorial reconfiguration. We exemplify our framework on a multitude of fundamental combinatorial problems, namely Vertex Cover, Independent Set, Dominating Set, and Coloring. We study the classical as well as the parameterized complexity of the solution discovery variants of those problems and explore the boundary between tractable and intractable instances.
{"title":"On solution discovery via reconfiguration","authors":"Michael R. Fellows , Mario Grobler , Nicole Megow , Amer E. Mouawad , Vijayaragunathan Ramamoorthi , Frances A. Rosamond , Daniel Schmand , Sebastian Siebertz","doi":"10.1016/j.jcss.2025.103747","DOIUrl":"10.1016/j.jcss.2025.103747","url":null,"abstract":"<div><div>The dynamics of real-world applications and systems require efficient methods for improving infeasible solutions or restoring corrupted ones by making modifications to the current state of a system in a restricted way. We propose a new framework of <em>solution discovery via reconfiguration</em> for constructing a feasible solution for a given problem by executing a sequence of small modifications starting from a given state or configuration. Our framework integrates and formalizes different aspects of classical local search, reoptimization, and combinatorial reconfiguration. We exemplify our framework on a multitude of fundamental combinatorial problems, namely <span>Vertex Cover</span>, <span>Independent Set</span>, <span>Dominating Set</span>, and <span>Coloring</span>. We study the classical as well as the parameterized complexity of the solution discovery variants of those problems and explore the boundary between tractable and intractable instances.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"157 ","pages":"Article 103747"},"PeriodicalIF":0.9,"publicationDate":"2025-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145789684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-09DOI: 10.1016/j.jcss.2025.103749
Niccolò Castronuovo , Alberto Dennunzio , Luciano Margara
We prove that many dynamical properties of group cellular automata (GCA) can be decided by decomposing them into a set of much simpler GCA, provided those properties are decidable for such simpler GCA. Specifically, we provide a novel algorithmic technique that decomposes the GCA under investigation into a finite number of GCA, some defined on abelian groups, while others, if any, on products of simple non-abelian isomorphic groups. Importantly, the groups resulting from the decomposition depend only on the original group and are therefore completely independent of both the automaton and the considered property. Consequently, they do not inherit any aspect of the complexity of the automaton under investigation. We study the inheritance of the dynamical properties in the original GCA versus the same properties in the GCA obtained through decomposition. The latter turn out to be significantly easier to analyze than in the original GCA. Then, we show that injectivity, surjectivity, and equicontinuity/sensitivity to initial conditions can be decided by testing them in the smaller GCA produced by the decomposition. Moreover, we prove that the topological entropy of a GCA can be computed, provided one knows how to compute it for GCA defined on products of simple non-abelian isomorphic groups – for which we explicitly prove how to compute it in the surjective case – and on abelian groups. Finally, we prove that no strongly transitive, and therefore no positively expansive, GCA defined on non-abelian groups exist.
{"title":"A divide and conquer algorithm for deciding group cellular automata dynamics","authors":"Niccolò Castronuovo , Alberto Dennunzio , Luciano Margara","doi":"10.1016/j.jcss.2025.103749","DOIUrl":"10.1016/j.jcss.2025.103749","url":null,"abstract":"<div><div>We prove that many dynamical properties of group cellular automata (GCA) can be decided by decomposing them into a set of much simpler GCA, provided those properties are decidable for such simpler GCA. Specifically, we provide a novel algorithmic technique that decomposes the GCA under investigation into a finite number of GCA, some defined on abelian groups, while others, if any, on products of simple non-abelian isomorphic groups. Importantly, the groups resulting from the decomposition depend only on the original group and are therefore completely independent of both the automaton and the considered property. Consequently, they do not inherit any aspect of the complexity of the automaton under investigation. We study the inheritance of the dynamical properties in the original GCA versus the same properties in the GCA obtained through decomposition. The latter turn out to be significantly easier to analyze than in the original GCA. Then, we show that injectivity, surjectivity, and equicontinuity/sensitivity to initial conditions can be decided by testing them in the smaller GCA produced by the decomposition. Moreover, we prove that the topological entropy of a GCA can be computed, provided one knows how to compute it for GCA defined on products of simple non-abelian isomorphic groups – for which we explicitly prove how to compute it in the surjective case – and on abelian groups. Finally, we prove that no strongly transitive, and therefore no positively expansive, GCA defined on non-abelian groups exist.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"157 ","pages":"Article 103749"},"PeriodicalIF":0.9,"publicationDate":"2025-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145736654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-09DOI: 10.1016/j.jcss.2025.103748
Tesshu Hanaka , Noleen Köhler , Michael Lampis
Additively Separable Hedonic Games (ASHGs) are coalition-formation games where we are given a directed graph whose vertices represent n selfish agents and the weight of each arc uv denotes the preferences of u for v. We revisit the computational complexity of the well-known notion of core stability of symmetric ASHGs, where the goal is to construct a partition of the agents into coalitions such that no group of agents would prefer to diverge from the given partition and form a new coalition. For Core Stability Verification (CSV), we first show the following hardness results: CSV remains coNP-complete on graphs of vertex cover 2; CSV is coW[1]-hard parameterized by vertex integrity when edge weights are encoded in unary; and CSV is coW[1]-hard parameterized by tree-depth even if all weights are from . We complement these results with essentially matching algorithms and an FPT algorithm parameterized by the treewidth tw plus the maximum degree Δ (improving a previous algorithm's dependence from to ). We then move on to study Core Stability (CS), which one would naturally expect to be even harder than CSV. We confirm this intuition by showing that CS is -complete even on graphs of bounded vertex cover number. On the positive side, we present a -time algorithm parameterized by , which is essentially optimal assuming the Exponential Time Hypothesis (ETH). Finally, we consider the notion of k-core stability: k denotes the maximum size of the allowed blocking (diverging) coalitions. We show that k-CSV is coW[1]-hard parameterized by k (even on unweighted graphs), while k-CS is NP-complete for all (even on graphs of bounded degree with bounded edge weights).
加法分离变量享乐游戏(ASHGs)结盟是游戏,我们给出了一个有向图的顶点代表n自私的代理和每个电弧紫外的重量表示偏好的u v .我们重温著名的计算复杂度的概念核心稳定对称ASHGs,目标是构造一个分区的代理商等联盟,没有群宁愿偏离给定的分区和组建一个新的联合政府。对于核心稳定性验证(CSV),我们首先证明了以下硬度结果:CSV在顶点覆盖2的图上保持conp完全;当边权为一元编码时,CSV是顶点完整性的coW[1]-hard参数化;即使所有权值都来自{−1,1},CSV仍然是由树深度参数化的coW[1]-hard。我们用基本匹配的算法和由树宽tw加上最大程度Δ参数化的FPT算法来补充这些结果(将先前算法的依赖性从2O(twΔ2)提高到2O(twΔ))。然后我们继续学习核心稳定性(CS),人们自然会认为它比CSV更难。我们通过证明CS即使在有界顶点覆盖数的图上也是Σ2p-complete来证实这个直觉。在积极的方面,我们提出了一个由tw+Δ参数化的22O(Δtw)nO(1)时间算法,该算法本质上是最优的,假设指数时间假设(ETH)。最后,我们考虑了k核稳定性的概念:k表示允许的阻塞(发散)联盟的最大大小。我们证明k- csv是由k(即使在无权图上)硬参数化的,而k- cs对于所有k≥3(即使在边权有界的有界度图上)是np完全的。
{"title":"Core stability in additively separable hedonic games of low treewidth","authors":"Tesshu Hanaka , Noleen Köhler , Michael Lampis","doi":"10.1016/j.jcss.2025.103748","DOIUrl":"10.1016/j.jcss.2025.103748","url":null,"abstract":"<div><div>Additively Separable Hedonic Games (ASHGs) are coalition-formation games where we are given a directed graph whose vertices represent <em>n</em> selfish agents and the weight of each arc <em>uv</em> denotes the preferences of <em>u</em> for <em>v</em>. We revisit the computational complexity of the well-known notion of core stability of symmetric ASHGs, where the goal is to construct a partition of the agents into coalitions such that no group of agents would prefer to diverge from the given partition and form a new coalition. For <span>Core Stability Verification</span> (CSV), we first show the following hardness results: <span>CSV</span> remains coNP-complete on graphs of vertex cover 2; <span>CSV</span> is coW[1]-hard parameterized by vertex integrity when edge weights are encoded in unary; and <span>CSV</span> is coW[1]-hard parameterized by tree-depth even if all weights are from <span><math><mo>{</mo><mo>−</mo><mn>1</mn><mo>,</mo><mn>1</mn><mo>}</mo></math></span>. We complement these results with essentially matching algorithms and an FPT algorithm parameterized by the treewidth <span>tw</span> plus the maximum degree Δ (improving a previous algorithm's dependence from <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>O</mi><mo>(</mo><mrow><mi>tw</mi></mrow><msup><mrow><mi>Δ</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>)</mo></mrow></msup></math></span> to <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>O</mi><mo>(</mo><mrow><mi>tw</mi></mrow><mi>Δ</mi><mo>)</mo></mrow></msup></math></span>). We then move on to study <span>Core Stability</span> (CS), which one would naturally expect to be even harder than <span>CSV</span>. We confirm this intuition by showing that <span>CS</span> is <span><math><msubsup><mrow><mi>Σ</mi></mrow><mrow><mn>2</mn></mrow><mrow><mi>p</mi></mrow></msubsup></math></span>-complete even on graphs of bounded vertex cover number. On the positive side, we present a <span><math><msup><mrow><mn>2</mn></mrow><mrow><msup><mrow><mn>2</mn></mrow><mrow><mi>O</mi><mo>(</mo><mi>Δ</mi><mrow><mi>tw</mi></mrow><mo>)</mo></mrow></msup></mrow></msup><msup><mrow><mi>n</mi></mrow><mrow><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></mrow></msup></math></span>-time algorithm parameterized by <span><math><mrow><mi>tw</mi></mrow><mo>+</mo><mi>Δ</mi></math></span>, which is essentially optimal assuming the Exponential Time Hypothesis (ETH). Finally, we consider the notion of <em>k</em>-core stability: <em>k</em> denotes the maximum size of the allowed blocking (diverging) coalitions. We show that <em>k</em><span>-CSV</span> is coW[1]-hard parameterized by <em>k</em> (even on unweighted graphs), while <em>k</em><span>-CS</span> is NP-complete for all <span><math><mi>k</mi><mo>≥</mo><mn>3</mn></math></span> (even on graphs of bounded degree with bounded edge weights).</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"157 ","pages":"Article 103748"},"PeriodicalIF":0.9,"publicationDate":"2025-12-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145789682","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}