Pub Date : 2024-08-28DOI: 10.1016/j.jcss.2024.103579
Niclas Boehmer, Klaus Heeger
We introduce the problem of adapting a stable matching to forced and forbidden pairs. Given a stable matching , a set Q of forced pairs, and a set P of forbidden pairs, we want to find a stable matching that includes all pairs from Q, no pair from P, and is as close as possible to . We study this problem in four classic stable matching settings: Stable Roommates (with Ties) and Stable Marriage (with Ties). Our main contribution is a polynomial-time algorithm, based on the theory of rotations, for adapting Stable Roommates matchings to forced pairs. In contrast, we show that the same problem for forbidden pairs is NP-hard. However, our polynomial-time algorithm for forced pairs can be extended to a fixed-parameter tractable algorithm with respect to the number of forbidden pairs. Moreover, we study the setting where preferences contain ties: Some of our algorithmic results can be extended while other problems become intractable.
{"title":"Adapting stable matchings to forced and forbidden pairs","authors":"Niclas Boehmer, Klaus Heeger","doi":"10.1016/j.jcss.2024.103579","DOIUrl":"10.1016/j.jcss.2024.103579","url":null,"abstract":"<div><p>We introduce the problem of adapting a stable matching to forced and forbidden pairs. Given a stable matching <span><math><msub><mrow><mi>M</mi></mrow><mrow><mn>1</mn></mrow></msub></math></span>, a set <em>Q</em> of forced pairs, and a set <em>P</em> of forbidden pairs, we want to find a stable matching that includes all pairs from <em>Q</em>, no pair from <em>P</em>, and is as close as possible to <span><math><msub><mrow><mi>M</mi></mrow><mrow><mn>1</mn></mrow></msub></math></span>. We study this problem in four classic stable matching settings: <span>Stable Roommates (with Ties)</span> and <span>Stable Marriage (with Ties)</span>. Our main contribution is a polynomial-time algorithm, based on the theory of rotations, for adapting <span>Stable Roommates</span> matchings to forced pairs. In contrast, we show that the same problem for forbidden pairs is NP-hard. However, our polynomial-time algorithm for forced pairs can be extended to a fixed-parameter tractable algorithm with respect to the number of forbidden pairs. Moreover, we study the setting where preferences contain ties: Some of our algorithmic results can be extended while other problems become intractable.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"147 ","pages":"Article 103579"},"PeriodicalIF":1.1,"publicationDate":"2024-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0022000024000746/pdfft?md5=5e125ee369922694f684034bd2940b97&pid=1-s2.0-S0022000024000746-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142162787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The radio k-chromatic number of a graph G is the minimum integer λ such that there exists a function satisfying , where denotes the distance between u and v. A considerable amount of attention has been given to find the exact values or providing polynomial time algorithms to determine for several basic graph families such as paths, cycles, trees, and powers of paths, usually for some specific values of k. In this article, we find the exact values of where G is a power of a path with diameter strictly less than k. Our proof readily provides a linear time algorithm for assigning a radio k-coloring of G. Furthermore, our proof technique is a potential tool for solving the same problem for other classes of graphs having “small” diameters.
图 G 的无线电 k 色度数 rck(G) 是存在函数 ϕ:V(G)→{0,1,⋯,λ} 满足 |ϕ(u)-ϕ(v)|≥k+1-d(u,v) 的最小整数 λ,其中 d(u,v) 表示 u 和 v 之间的距离。对于一些基本图族,如路径、循环、树和路径的幂,通常是针对某些特定的 k 值,人们已经花费了大量精力去寻找它们的精确值或提供多项式时间算法来确定 rck(G)。在本文中,我们找到了 rck(G)的精确值,其中 G 是直径严格小于 k 的路径的幂。我们的证明很容易提供一种线性时间算法,用于为 G 指定无线电 k 着色。
{"title":"A linear algorithm for radio k-coloring of powers of paths having small diameters","authors":"Dipayan Chakraborty , Soumen Nandi , Sagnik Sen , D.K. Supraja","doi":"10.1016/j.jcss.2024.103577","DOIUrl":"10.1016/j.jcss.2024.103577","url":null,"abstract":"<div><p>The radio <em>k</em>-chromatic number <span><math><mi>r</mi><msub><mrow><mi>c</mi></mrow><mrow><mi>k</mi></mrow></msub><mo>(</mo><mi>G</mi><mo>)</mo></math></span> of a graph <em>G</em> is the minimum integer <em>λ</em> such that there exists a function <span><math><mi>ϕ</mi><mo>:</mo><mi>V</mi><mo>(</mo><mi>G</mi><mo>)</mo><mo>→</mo><mo>{</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>,</mo><mo>⋯</mo><mo>,</mo><mi>λ</mi><mo>}</mo></math></span> satisfying <span><math><mo>|</mo><mi>ϕ</mi><mo>(</mo><mi>u</mi><mo>)</mo><mo>−</mo><mi>ϕ</mi><mo>(</mo><mi>v</mi><mo>)</mo><mo>|</mo><mo>≥</mo><mi>k</mi><mo>+</mo><mn>1</mn><mo>−</mo><mi>d</mi><mo>(</mo><mi>u</mi><mo>,</mo><mi>v</mi><mo>)</mo></math></span>, where <span><math><mi>d</mi><mo>(</mo><mi>u</mi><mo>,</mo><mi>v</mi><mo>)</mo></math></span> denotes the distance between <em>u</em> and <em>v</em>. A considerable amount of attention has been given to find the exact values or providing polynomial time algorithms to determine <span><math><mi>r</mi><msub><mrow><mi>c</mi></mrow><mrow><mi>k</mi></mrow></msub><mo>(</mo><mi>G</mi><mo>)</mo></math></span> for several basic graph families such as paths, cycles, trees, and powers of paths, usually for some specific values of <em>k</em>. In this article, we find the exact values of <span><math><mi>r</mi><msub><mrow><mi>c</mi></mrow><mrow><mi>k</mi></mrow></msub><mo>(</mo><mi>G</mi><mo>)</mo></math></span> where <em>G</em> is a power of a path with diameter strictly less than <em>k</em>. Our proof readily provides a linear time algorithm for assigning a radio <em>k</em>-coloring of <em>G</em>. Furthermore, our proof technique is a potential tool for solving the same problem for other classes of graphs having “small” diameters.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"147 ","pages":"Article 103577"},"PeriodicalIF":1.1,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142136727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-23DOI: 10.1016/j.jcss.2024.103578
Akanksha Agrawal , Soumita Hait , Amer E. Mouawad
Token Sliding Optimization asks whether there exists a sequence of at most ℓ steps that transforms independent set S into T, where at each step a token slides to an unoccupied neighboring vertex (while maintaining independence). In Token Jumping Optimization, we are instead allowed to jump from a vertex to any unoccupied vertex. Both problems are known to be FPT when parameterized by ℓ on nowhere dense graphs. In this work, we show that both problems are FPT for parameter on d-degenerate graphs as well as for parameter on graphs having a modulator M to maximum degree Δ. We complement these results by showing that for parameter ℓ both problems become hard already on 2-degenerate graphs. Finally, we show that using such families one can obtain a unified algorithm for the standard Token Jumping problem parameterized by k on degenerate and nowhere dense graphs.
令牌滑动优化(Token Sliding Optimization)询问是否存在一个最多 ℓ 步的序列,能将独立集 S 转变为 T,其中每一步都有一个令牌滑动到一个未被占用的相邻顶点(同时保持独立性)。在令牌跳转优化中,我们可以从一个顶点跳转到任何一个未被占用的顶点。已知这两个问题在无处密集图上以ℓ 为参数时都是 FPT 问题。在这项研究中,我们证明了在参数 k+ℓ+d 为 d 的畸变图上,以及参数 |M|+ℓ+Δ 为最大度数 Δ 的调制器 M 的图上,这两个问题都是 FPT。最后,我们证明了利用这些族,可以在退化图和无处密集图上获得以 k 为参数的标准令牌跳跃问题的统一算法。
{"title":"On finding short reconfiguration sequences between independent sets","authors":"Akanksha Agrawal , Soumita Hait , Amer E. Mouawad","doi":"10.1016/j.jcss.2024.103578","DOIUrl":"10.1016/j.jcss.2024.103578","url":null,"abstract":"<div><p><span>Token Sliding Optimization</span> asks whether there exists a sequence of at most <em>ℓ</em> steps that transforms independent set <em>S</em> into <em>T</em>, where at each step a token slides to an unoccupied neighboring vertex (while maintaining independence). In <span>Token Jumping Optimization</span>, we are instead allowed to jump from a vertex to any unoccupied vertex. Both problems are known to be <span>FPT</span> when parameterized by <em>ℓ</em> on nowhere dense graphs. In this work, we show that both problems are <span>FPT</span> for parameter <span><math><mi>k</mi><mo>+</mo><mi>ℓ</mi><mo>+</mo><mi>d</mi></math></span> on <em>d</em>-degenerate graphs as well as for parameter <span><math><mo>|</mo><mi>M</mi><mo>|</mo><mo>+</mo><mi>ℓ</mi><mo>+</mo><mi>Δ</mi></math></span> on graphs having a modulator <em>M</em> to maximum degree Δ. We complement these results by showing that for parameter <em>ℓ</em> both problems become hard already on 2-degenerate graphs. Finally, we show that using such families one can obtain a unified algorithm for the standard <span>Token Jumping</span> problem parameterized by <em>k</em> on degenerate and nowhere dense graphs.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"147 ","pages":"Article 103578"},"PeriodicalIF":1.1,"publicationDate":"2024-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142084354","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-29DOI: 10.1016/j.jcss.2024.103574
Guilherme C.M. Gomes , Clément Legrand-Duchesne , Reem Mahmoud , Amer E. Mouawad , Yoshio Okamoto , Vinicius F. dos Santos , Tom C. van der Zanden
We study the problem of reconfiguring s-t-separators on finite simple graphs. We consider several variants of the problem, focusing on the token sliding and jumping models. We begin with a polynomial-time algorithm that computes (if one exists) a shortest sequence of slides and another that decides if a sequence of jumps exists and outputs a witnessing sequence. We also show that deciding if a reconfiguration sequence of at most ℓ jumps exists is an -complete problem. To complement this result, we investigate the parameterized complexity of the natural parameterizations of the problem: by the size k of the minimum s-t-separators and by the number of jumps ℓ. We show that the problem is in FPT parameterized by k, but that it does not admit a polynomial kernel unless . Our final result is a kernel with vertices and edges.
{"title":"Minimum separator reconfiguration","authors":"Guilherme C.M. Gomes , Clément Legrand-Duchesne , Reem Mahmoud , Amer E. Mouawad , Yoshio Okamoto , Vinicius F. dos Santos , Tom C. van der Zanden","doi":"10.1016/j.jcss.2024.103574","DOIUrl":"10.1016/j.jcss.2024.103574","url":null,"abstract":"<div><p>We study the problem of reconfiguring <em>s</em>-<em>t</em>-separators on finite simple graphs. We consider several variants of the problem, focusing on the token sliding and jumping models. We begin with a polynomial-time algorithm that computes (if one exists) a shortest sequence of slides and another that decides if a sequence of jumps exists and outputs a witnessing sequence. We also show that deciding if a reconfiguration sequence of at most <em>ℓ</em> jumps exists is an <span><math><mtext>NP</mtext></math></span>-complete problem. To complement this result, we investigate the parameterized complexity of the natural parameterizations of the problem: by the size <em>k</em> of the minimum <em>s</em>-<em>t</em>-separators and by the number of jumps <em>ℓ</em>. We show that the problem is in <span>FPT</span> parameterized by <em>k</em>, but that it does not admit a polynomial kernel unless <span><math><mtext>NP</mtext><mo>⊆</mo><mtext>coNP/poly</mtext></math></span>. Our final result is a kernel with <span><math><mi>O</mi><mo>(</mo><msup><mrow><mi>ℓ</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>)</mo></math></span> vertices and edges.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"146 ","pages":"Article 103574"},"PeriodicalIF":1.1,"publicationDate":"2024-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141936525","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-29DOI: 10.1016/j.jcss.2024.103576
Lhouari Nourine , Jean-Marc Petit , Simon Vilmin
In real life, data are often of poor quality as a result, for instance, of uncertainty, mismeasurements, missing values or bad inputs. This issue hampers an implicit yet crucial operation of every database management system: equality testing. Indeed, equality is, in the end, a context-dependent operation with a plethora of interpretations. In practice, the treatment of different types of equality is left to programmers, who have to struggle with those interpretations in their code. We introduce a lattice-based declarative framework to address this problem. It allows specification of numerous semantics for equality at a high level of abstraction. To go beyond tuple equality, we study functional dependencies (FDs) in the light of our framework. First, we define abstract FDs, generalizing classical FDs. These lead to the consideration of particular interpretations of equality: realities. Building upon realities and possible/certain answers, we introduce possible/certain FDs and give some complexity results.
{"title":"Towards declarative comparabilities: Application to functional dependencies","authors":"Lhouari Nourine , Jean-Marc Petit , Simon Vilmin","doi":"10.1016/j.jcss.2024.103576","DOIUrl":"10.1016/j.jcss.2024.103576","url":null,"abstract":"<div><p>In real life, data are often of poor quality as a result, for instance, of uncertainty, mismeasurements, missing values or bad inputs. This issue hampers an implicit yet crucial operation of every database management system: equality testing. Indeed, equality is, in the end, a context-dependent operation with a plethora of interpretations. In practice, the treatment of different types of equality is left to programmers, who have to struggle with those interpretations in their code. We introduce a lattice-based declarative framework to address this problem. It allows specification of numerous semantics for equality at a high level of abstraction. To go beyond tuple equality, we study functional dependencies (FDs) in the light of our framework. First, we define abstract FDs, generalizing classical FDs. These lead to the consideration of particular interpretations of equality: realities. Building upon realities and possible/certain answers, we introduce possible/certain FDs and give some complexity results.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"146 ","pages":"Article 103576"},"PeriodicalIF":1.1,"publicationDate":"2024-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141936526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-25DOI: 10.1016/j.jcss.2024.103575
Arnaud Durand , Juha Kontinen , Jouko Väänänen
We study the complexity of reasoning tasks for logics in team semantics. Our main focus is on the data complexity of model checking but we also derive new results for logically defined counting and enumeration problems. Our approach is based on modular reductions of these problems into the corresponding problems of various classes of Boolean formulas. We illustrate our approach via several new tractability/intractability results.
{"title":"Modular SAT-based techniques for reasoning tasks in team semantics","authors":"Arnaud Durand , Juha Kontinen , Jouko Väänänen","doi":"10.1016/j.jcss.2024.103575","DOIUrl":"10.1016/j.jcss.2024.103575","url":null,"abstract":"<div><p>We study the complexity of reasoning tasks for logics in team semantics. Our main focus is on the data complexity of model checking but we also derive new results for logically defined counting and enumeration problems. Our approach is based on modular reductions of these problems into the corresponding problems of various classes of Boolean formulas. We illustrate our approach via several new tractability/intractability results.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"146 ","pages":"Article 103575"},"PeriodicalIF":1.1,"publicationDate":"2024-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0022000024000709/pdfft?md5=257fe45a7b50d68c8b72d3df843b4963&pid=1-s2.0-S0022000024000709-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141936332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-09DOI: 10.1016/j.jcss.2024.103564
Nina Klobas , George B. Mertzios , Hendrik Molter , Paul G. Spirakis
A graph is temporally connected if a strict temporal path exists from every vertex u to every other vertex v. This paper studies temporal design problems for undirected temporally connected graphs. Given a connected undirected graph G, the goal is to determine the smallest total number of time-labels needed to ensure temporal connectivity, where denotes the sum, over all edges, of the size of the set of labels associated to an edge. The basic problem, called Minimum Labeling (ML) can be solved optimally in polynomial time. We introduce the Min. Aged Labeling (MAL) problem, which involves connecting the graph with an upper-bound on the maximum label, the Min. Steiner Labeling (MSL) problem, focusing on connecting specific important vertices, and the age-restricted version of MSL, Min. Aged Steiner Labeling (MASL). We show that MAL is NP-complete, MASL is W[1]-hard, and while MSL remains NP-hard, it is FPT with respect to the number of terminals.
{"title":"The complexity of computing optimum labelings for temporal connectivity","authors":"Nina Klobas , George B. Mertzios , Hendrik Molter , Paul G. Spirakis","doi":"10.1016/j.jcss.2024.103564","DOIUrl":"10.1016/j.jcss.2024.103564","url":null,"abstract":"<div><p>A graph is temporally connected if a strict temporal path exists from every vertex <em>u</em> to every other vertex <em>v</em>. This paper studies <em>temporal design</em> problems for undirected temporally connected graphs. Given a connected undirected graph <em>G</em>, the goal is to determine the smallest total number of time-labels <span><math><mo>|</mo><mi>λ</mi><mo>|</mo></math></span> needed to ensure temporal connectivity, where <span><math><mo>|</mo><mi>λ</mi><mo>|</mo></math></span> denotes the sum, over all edges, of the size of the set of labels associated to an edge. The basic problem, called <span>Minimum Labeling</span> (<span>ML</span>) can be solved optimally in polynomial time. We introduce the <span>Min. Aged Labeling</span> (<span>MAL</span>) problem, which involves connecting the graph with an upper-bound on the maximum label, the <span>Min. Steiner Labeling</span> (<span>MSL</span>) problem, focusing on connecting specific important vertices, and the age-restricted version of <span>MSL</span>, <span>Min. Aged Steiner Labeling</span> (<span>MASL</span>). We show that <span>MAL</span> is NP-complete, <span>MASL</span> is W[1]-hard, and while <span>MSL</span> remains NP-hard, it is FPT with respect to the number of terminals.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"146 ","pages":"Article 103564"},"PeriodicalIF":1.1,"publicationDate":"2024-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S002200002400059X/pdfft?md5=47d92c214e02fc0c658d2c49a1fdf6d8&pid=1-s2.0-S002200002400059X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141719050","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-27DOI: 10.1016/j.jcss.2024.103563
Dietze's conjecture concerns the problem of equipping a tree automaton M with weights to make it probabilistic, in such a way that the resulting automaton N predicts a given corpus as accurately as possible. The conjecture states that the accuracy cannot increase if the states in M are merged with respect to an equivalence relation ∼ so that the result is a smaller automaton . Put differently, merging states can never improve predictions. This is under the assumption that both M and are bottom-up deterministic and accept every tree in . We prove that the conjecture holds, using a construction that turns any probabilistic version of into a probabilistic version N of M, such that N assigns at least as great a weight to each tree in as does.
迪茨猜想涉及的问题是为树状自动机 M 添加权重,使其具有概率性,从而使由此产生的自动机 N 能尽可能准确地预测给定语料 C。该猜想指出,如果根据等价关系 ∼ 合并 M 中的状态,从而得到一个更小的自动机 M∼,那么准确度就不会提高。换句话说,合并状态永远无法改善预测结果。我们使用一种构造证明猜想成立,这种构造将 M∼ 的任何概率版本 N 转变成 M 的概率版本 N,使得 N 对 C 中每棵树赋予的权重至少与 N 一样大。
{"title":"The impact of state merging on predictive accuracy in probabilistic tree automata: Dietze's conjecture revisited","authors":"","doi":"10.1016/j.jcss.2024.103563","DOIUrl":"10.1016/j.jcss.2024.103563","url":null,"abstract":"<div><p>Dietze's conjecture concerns the problem of equipping a tree automaton <em>M</em> with weights to make it probabilistic, in such a way that the resulting automaton <em>N</em> predicts a given corpus <span><math><mi>C</mi></math></span> as accurately as possible. The conjecture states that the accuracy cannot increase if the states in <em>M</em> are merged with respect to an equivalence relation ∼ so that the result is a smaller automaton <span><math><msup><mrow><mi>M</mi></mrow><mrow><mo>∼</mo></mrow></msup></math></span>. Put differently, merging states can never improve predictions. This is under the assumption that both <em>M</em> and <span><math><msup><mrow><mi>M</mi></mrow><mrow><mo>∼</mo></mrow></msup></math></span> are bottom-up deterministic and accept every tree in <span><math><mi>C</mi></math></span>. We prove that the conjecture holds, using a construction that turns any probabilistic version <span><math><msup><mrow><mi>N</mi></mrow><mrow><mo>∼</mo></mrow></msup></math></span> of <span><math><msup><mrow><mi>M</mi></mrow><mrow><mo>∼</mo></mrow></msup></math></span> into a probabilistic version <em>N</em> of <em>M</em>, such that <em>N</em> assigns at least as great a weight to each tree in <span><math><mi>C</mi></math></span> as <span><math><msup><mrow><mi>N</mi></mrow><mrow><mo>∼</mo></mrow></msup></math></span> does.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"146 ","pages":"Article 103563"},"PeriodicalIF":1.1,"publicationDate":"2024-06-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0022000024000588/pdfft?md5=9e1c1d599bbcfc040fd29b857c6c21e8&pid=1-s2.0-S0022000024000588-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141571800","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-10DOI: 10.1016/j.jcss.2024.103553
Anuj Dawar
{"title":"Corrigendum to “Homomorphism preservation on quasi-wide classes” [J. Comput. Syst. Sci. 76 (5) (2010) 324–332]","authors":"Anuj Dawar","doi":"10.1016/j.jcss.2024.103553","DOIUrl":"https://doi.org/10.1016/j.jcss.2024.103553","url":null,"abstract":"","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"145 ","pages":"Article 103553"},"PeriodicalIF":1.1,"publicationDate":"2024-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0022000024000485/pdfft?md5=958b77feeb0f3875c742d2e66ce417ce&pid=1-s2.0-S0022000024000485-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141297834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-29DOI: 10.1016/j.jcss.2024.103552
Zhao Wang , Yaping Mao , Sun-Yuan Hsieh , Ralf Klasing , Yuzhi Xiao
Connectivity is one of important parameters for the fault tolerant of an interconnection network. In 1996, Fàbrega and Fiol proposed the concept of g-extra connectivity. A subset of vertices S is said to be a cutset if is not connected. A cutset S is called an -cutset, where g is a non-negative integer, if every component of has at least vertices. If G has at least one -cutset, the g-extra connectivity of G, denoted by , is then defined as the minimum cardinality over all -cutsets of G. In this paper, we first obtain the exact value of g-extra connectivity for the lexicographic product of two general graphs. Next, the upper and lower sharp bounds of g-extra connectivity for the Cartesian product of two general graphs are given. In the end, we apply our results on grid graphs and 2-dimensional generalized hypercubes.
{"title":"The g-extra connectivity of graph products","authors":"Zhao Wang , Yaping Mao , Sun-Yuan Hsieh , Ralf Klasing , Yuzhi Xiao","doi":"10.1016/j.jcss.2024.103552","DOIUrl":"10.1016/j.jcss.2024.103552","url":null,"abstract":"<div><p>Connectivity is one of important parameters for the fault tolerant of an interconnection network. In 1996, Fàbrega and Fiol proposed the concept of <em>g</em>-extra connectivity. A subset of vertices <em>S</em> is said to be a <em>cutset</em> if <span><math><mi>G</mi><mo>−</mo><mi>S</mi></math></span> is not connected. A cutset <em>S</em> is called an <span><math><msub><mrow><mi>R</mi></mrow><mrow><mi>g</mi></mrow></msub></math></span><em>-cutset</em>, where <em>g</em> is a non-negative integer, if every component of <span><math><mi>G</mi><mo>−</mo><mi>S</mi></math></span> has at least <span><math><mi>g</mi><mo>+</mo><mn>1</mn></math></span> vertices. If <em>G</em> has at least one <span><math><msub><mrow><mi>R</mi></mrow><mrow><mi>g</mi></mrow></msub></math></span>-cutset, the <em>g-extra connectivity</em> of <em>G</em>, denoted by <span><math><msub><mrow><mi>κ</mi></mrow><mrow><mi>g</mi></mrow></msub><mo>(</mo><mi>G</mi><mo>)</mo></math></span>, is then defined as the minimum cardinality over all <span><math><msub><mrow><mi>R</mi></mrow><mrow><mi>g</mi></mrow></msub></math></span>-cutsets of <em>G</em>. In this paper, we first obtain the exact value of <em>g</em>-extra connectivity for the lexicographic product of two general graphs. Next, the upper and lower sharp bounds of <em>g</em>-extra connectivity for the Cartesian product of two general graphs are given. In the end, we apply our results on grid graphs and 2-dimensional generalized hypercubes.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"145 ","pages":"Article 103552"},"PeriodicalIF":1.1,"publicationDate":"2024-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141195346","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}