Pub Date : 2024-05-22DOI: 10.1016/j.jcss.2024.103548
Isnard Lopes Costa , Raul Lopes , Andrea Marino , Ana Silva
A temporal (directed) graph is one where edges are available only at specific times during its lifetime, τ. Paths in these graphs are sequences of adjacent edges whose appearing times are either strictly increasing or non-strictly increasing. Classical concepts of connected and unilateral components can be naturally extended to temporal graphs. We address fundamental questions in temporal graphs. (i) What is the complexity of deciding the existence of a component of size k, parameterized by τ, k, and ? The answer depends on the component definition and whether the graph is directed or undirected. (ii) What is the minimum running time to check if a subset of vertices is pairwise reachable? A quadratic-time algorithm exists, but a faster time is unlikely unless SETH fails. (iii) Can we verify if a subset of vertices forms a component in polynomial time? This is NP -complete depending on the temporal component definition.
{"title":"On computing large temporal (unilateral) connected components","authors":"Isnard Lopes Costa , Raul Lopes , Andrea Marino , Ana Silva","doi":"10.1016/j.jcss.2024.103548","DOIUrl":"https://doi.org/10.1016/j.jcss.2024.103548","url":null,"abstract":"<div><p>A temporal (directed) graph is one where edges are available only at specific times during its lifetime, <em>τ</em>. Paths in these graphs are sequences of adjacent edges whose appearing times are either strictly increasing or non-strictly increasing. Classical concepts of connected and unilateral components can be naturally extended to temporal graphs. We address fundamental questions in temporal graphs. (i) What is the complexity of deciding the existence of a component of size <em>k</em>, parameterized by <em>τ</em>, <em>k</em>, and <span><math><mi>k</mi><mo>+</mo><mi>τ</mi></math></span>? The answer depends on the component definition and whether the graph is directed or undirected. (ii) What is the minimum running time to check if a subset of vertices is pairwise reachable? A quadratic-time algorithm exists, but a faster time is unlikely unless <span>SETH</span> fails. (iii) Can we verify if a subset of vertices forms a component in polynomial time? This is <span>NP</span> -complete depending on the temporal component definition.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"144 ","pages":"Article 103548"},"PeriodicalIF":1.1,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141244778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-21DOI: 10.1016/j.jcss.2024.103547
Sebastian Ordyniak , Andre Schidler , Stefan Szeider
We introduce backdoor DNFs, as a tool to measure the theoretical hardness of CNF formulas. Like backdoor sets and backdoor trees, backdoor DNFs are defined relative to a tractable class of CNF formulas. Each conjunctive term of a backdoor DNF defines a partial assignment that moves the input CNF formula into the base class. Backdoor DNFs are more expressive and potentially smaller than their predecessors backdoor sets and backdoor trees. We establish the fixed-parameter tractability of the backdoor DNF detection problem. Our results hold for the fundamental base classes Horn and 2CNF, and their combination. We complement our theoretical findings by an empirical study. Our experiments show that backdoor DNFs provide a significant improvement over their predecessors.
{"title":"Backdoor DNFs","authors":"Sebastian Ordyniak , Andre Schidler , Stefan Szeider","doi":"10.1016/j.jcss.2024.103547","DOIUrl":"10.1016/j.jcss.2024.103547","url":null,"abstract":"<div><p>We introduce backdoor DNFs, as a tool to measure the theoretical hardness of CNF formulas. Like backdoor sets and backdoor trees, backdoor DNFs are defined relative to a tractable class of CNF formulas. Each conjunctive term of a backdoor DNF defines a partial assignment that moves the input CNF formula into the base class. Backdoor DNFs are more expressive and potentially smaller than their predecessors backdoor sets and backdoor trees. We establish the fixed-parameter tractability of the backdoor DNF detection problem. Our results hold for the fundamental base classes Horn and 2CNF, and their combination. We complement our theoretical findings by an empirical study. Our experiments show that backdoor DNFs provide a significant improvement over their predecessors.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"144 ","pages":"Article 103547"},"PeriodicalIF":1.1,"publicationDate":"2024-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0022000024000424/pdfft?md5=28e392df06776d3baaabe0cd651c38e8&pid=1-s2.0-S0022000024000424-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141150054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-20DOI: 10.1016/j.jcss.2024.103549
Hendrik Molter , Malte Renken , Philipp Zschoche
We study spreading processes in temporal graphs, that is, graphs whose connections change over time. More precisely, we investigate how such a spreading process, emerging from a given set of sources, can be contained to a small part of the graph. We consider two ways of modifying the graph, which are (1) deleting and (2) delaying connections. We show a close relationship between the two associated problems. It is known that both problems are W[1]-hard when parameterized by the number of modifications. We consider the number of vertices to which the spread is contained as a parameter. Surprisingly, we prove W[1]-hardness for the deletion variant but fixed-parameter tractability for the delaying variant. Furthermore, we give a polynomial time algorithm for both problem variants when the graph has a tree structure and show how to generalize this result to an FPT-algorithm for the so-called timed feedback vertex number as a parameter.
{"title":"Temporal reachability minimization: Delaying vs. deleting","authors":"Hendrik Molter , Malte Renken , Philipp Zschoche","doi":"10.1016/j.jcss.2024.103549","DOIUrl":"https://doi.org/10.1016/j.jcss.2024.103549","url":null,"abstract":"<div><p>We study spreading processes in temporal graphs, that is, graphs whose connections change over time. More precisely, we investigate how such a spreading process, emerging from a given set of sources, can be contained to a small part of the graph. We consider two ways of modifying the graph, which are (1) deleting and (2) delaying connections. We show a close relationship between the two associated problems. It is known that both problems are W[1]-hard when parameterized by the number of modifications. We consider the number of vertices to which the spread is contained as a parameter. Surprisingly, we prove W[1]-hardness for the deletion variant but fixed-parameter tractability for the delaying variant. Furthermore, we give a polynomial time algorithm for both problem variants when the graph has a tree structure and show how to generalize this result to an FPT-algorithm for the so-called timed feedback vertex number as a parameter.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"144 ","pages":"Article 103549"},"PeriodicalIF":1.1,"publicationDate":"2024-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141156323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The -complete graph problem Cluster Editing seeks to transform a static graph into a disjoint union of cliques by making the fewest possible edits to the edges. We introduce a natural interpretation of this problem in temporal graphs, whose edge sets change over time. This problem is -complete even when restricted to temporal graphs whose underlying graph is a path, but we obtain two polynomial-time algorithms for restricted cases. In the static setting, it is well-known that a graph is a disjoint union of cliques if and only if it contains no induced copy of ; we demonstrate that no general characterisation involving sets of at most four vertices can exist in the temporal setting, but obtain a complete characterisation involving forbidden configurations on at most five vertices. This characterisation gives rise to an algorithm parameterised simultaneously by the permitted number of modifications and the lifetime of the temporal graph.
{"title":"A new temporal interpretation of cluster editing","authors":"Cristiano Bocci , Chiara Capresi , Kitty Meeks , John Sylvester","doi":"10.1016/j.jcss.2024.103551","DOIUrl":"https://doi.org/10.1016/j.jcss.2024.103551","url":null,"abstract":"<div><p>The <span><math><mi>NP</mi></math></span>-complete graph problem <span>Cluster Editing</span> seeks to transform a static graph into a disjoint union of cliques by making the fewest possible edits to the edges. We introduce a natural interpretation of this problem in temporal graphs, whose edge sets change over time. This problem is <span><math><mi>NP</mi></math></span>-complete even when restricted to temporal graphs whose underlying graph is a path, but we obtain two polynomial-time algorithms for restricted cases. In the static setting, it is well-known that a graph is a disjoint union of cliques if and only if it contains no induced copy of <span><math><msub><mrow><mi>P</mi></mrow><mrow><mn>3</mn></mrow></msub></math></span>; we demonstrate that no general characterisation involving sets of at most four vertices can exist in the temporal setting, but obtain a complete characterisation involving forbidden configurations on at most five vertices. This characterisation gives rise to an <span><math><mi>FPT</mi></math></span> algorithm parameterised simultaneously by the permitted number of modifications and the lifetime of the temporal graph.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"144 ","pages":"Article 103551"},"PeriodicalIF":1.1,"publicationDate":"2024-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0022000024000461/pdfft?md5=3c7ceb30b0bccaa972030b25aefb334f&pid=1-s2.0-S0022000024000461-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141156308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-16DOI: 10.1016/j.jcss.2024.103546
Laurent Bulteau , Louxin Zhang
One strategy for inference of phylogenetic networks is to solve the phylogenetic network problem, which involves inferring phylogenetic trees first and subsequently computing the smallest phylogenetic network that displays all the trees. This approach capitalizes on exceptional tools available for inferring phylogenetic trees from biomolecular sequences. Since the vast space of phylogenetic networks poses difficulties in obtaining comprehensive sampling, the researchers switch their attention to inferring tree-child networks from multiple phylogenetic trees, where in a tree-child network each non-leaf node must have at least one child that is an indegree-one node. Three results are obtained in this work: (1) The shortest common supersequence problem remains NP-hard even for permutation strings. (2) Derived from the first result, the tree-child network inference problem is also established as NP-hard even for line trees (also known as caterpillar trees). (3) The parsimonious tree-child networks that display all the line trees are the same as those displaying all the binary trees and their hybridization number is for n taxa.
推断系统发育网络的一种策略是解决系统发育网络问题,即首先推断系统发育树,然后计算显示所有系统发育树的最小系统发育网络。这种方法充分利用了从生物分子序列推断系统发生树的特殊工具。由于庞大的系统发育网络难以获得全面的采样,研究人员将注意力转移到了从多个系统发育树推断树-子网络上,在树-子网络中,每个非叶节点必须至少有一个子节点是独立节点。这项工作获得了三个结果:(1) 即使对于置换字符串,最短公共超序列问题仍然是 NP 难的。(2) 根据第一个结果,树-子网络推理问题也被确定为 NP-难,即使对于行树(也称为毛毛虫树)也是如此。(3) 显示所有线状树的拟树子网络与显示所有二叉树的拟树子网络相同,对于 n 个类群,其杂交数为 Θ(n3)。
{"title":"The tree-child network inference problem for line trees and the shortest common supersequence problem for permutation strings","authors":"Laurent Bulteau , Louxin Zhang","doi":"10.1016/j.jcss.2024.103546","DOIUrl":"10.1016/j.jcss.2024.103546","url":null,"abstract":"<div><p>One strategy for inference of phylogenetic networks is to solve the phylogenetic network problem, which involves inferring phylogenetic trees first and subsequently computing the smallest phylogenetic network that displays all the trees. This approach capitalizes on exceptional tools available for inferring phylogenetic trees from biomolecular sequences. Since the vast space of phylogenetic networks poses difficulties in obtaining comprehensive sampling, the researchers switch their attention to inferring tree-child networks from multiple phylogenetic trees, where in a tree-child network each non-leaf node must have at least one child that is an indegree-one node. Three results are obtained in this work: (1) The shortest common supersequence problem remains NP-hard even for permutation strings. (2) Derived from the first result, the tree-child network inference problem is also established as NP-hard even for line trees (also known as <em>caterpillar</em> trees). (3) The parsimonious tree-child networks that display all the line trees are the same as those displaying all the binary trees and their hybridization number is <span><math><mi>Θ</mi><mo>(</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>3</mn></mrow></msup><mo>)</mo></math></span> for <em>n</em> taxa.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"144 ","pages":"Article 103546"},"PeriodicalIF":1.1,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141049268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Minimum vertex bisection is a graph partitioning problem in which the aim is to find a partition of the vertices into two equal parts that minimizes the number of vertices in one partition set that have a neighbor in the other set. In this work we are interested in providing asymptotically almost surely upper bounds on the minimum vertex bisection of random d-regular graphs, for constant values of d. Our approach is based on analyzing a greedy algorithm by using the differential equation method. In this way, we obtain the first known non-trivial upper bounds for the vertex bisection number in random regular graphs. The numerical approximations of these theoretical bounds are compared with the emprical ones, and with the lower bounds from Kolesnik and Wormald (2014) [30].
最小顶点分割是一个图分割问题,其目的是将顶点分成相等的两部分,使一个分割集中与另一个分割集中有邻居的顶点数量最小。在这项研究中,我们感兴趣的是在 d 值不变的情况下,为随机 d 不规则图的最小顶点分割提供近似几乎肯定的上界。通过这种方法,我们首次获得了随机规则图中顶点分叉数的非微观上界。我们将这些理论边界的数值近似值与实际边界以及 Kolesnik 和 Wormald(2014)[30] 的下限进行了比较。
{"title":"On minimum vertex bisection of random d-regular graphs","authors":"Josep Díaz , Öznur Yaşar Diner , Maria Serna , Oriol Serra","doi":"10.1016/j.jcss.2024.103550","DOIUrl":"10.1016/j.jcss.2024.103550","url":null,"abstract":"<div><p>Minimum vertex bisection is a graph partitioning problem in which the aim is to find a partition of the vertices into two equal parts that minimizes the number of vertices in one partition set that have a neighbor in the other set. In this work we are interested in providing asymptotically almost surely upper bounds on the minimum vertex bisection of random <em>d</em>-regular graphs, for constant values of <em>d</em>. Our approach is based on analyzing a greedy algorithm by using the differential equation method. In this way, we obtain the first known non-trivial upper bounds for the vertex bisection number in random regular graphs. The numerical approximations of these theoretical bounds are compared with the emprical ones, and with the lower bounds from Kolesnik and Wormald (2014) <span>[30]</span>.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"144 ","pages":"Article 103550"},"PeriodicalIF":1.1,"publicationDate":"2024-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S002200002400045X/pdfft?md5=5ad9b857ac0144723c133211748957a5&pid=1-s2.0-S002200002400045X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141027925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-18DOI: 10.1016/j.jcss.2024.103545
Spyros Angelopoulos , Christoph Dürr , Shendan Jin , Shahin Kamali , Marc Renault
We study a generalization of the advice complexity model of online computation in which the advice is provided by an untrusted source. Our objective is to quantify the impact of untrusted advice so as to design and analyze online algorithms that are robust if the advice is adversarial, and efficient is the advice is foolproof. We focus on four well-studied online problems, namely ski rental, online bidding, bin packing and list update. For ski rental and online bidding, we show how to obtain algorithms that are Pareto-optimal with respect to the competitive ratios achieved, whereas for bin packing and list update, we give online algorithms with worst-case tradeoffs in their competitiveness, depending on whether the advice is trusted or adversarial. More importantly, we demonstrate how to prove lower bounds, within this model, on the tradeoff between the number of advice bits and the competitiveness of any online algorithm.
{"title":"Online computation with untrusted advice","authors":"Spyros Angelopoulos , Christoph Dürr , Shendan Jin , Shahin Kamali , Marc Renault","doi":"10.1016/j.jcss.2024.103545","DOIUrl":"10.1016/j.jcss.2024.103545","url":null,"abstract":"<div><p>We study a generalization of the advice complexity model of online computation in which the advice is provided by an untrusted source. Our objective is to quantify the impact of untrusted advice so as to design and analyze online algorithms that are robust if the advice is adversarial, and efficient is the advice is foolproof. We focus on four well-studied online problems, namely ski rental, online bidding, bin packing and list update. For ski rental and online bidding, we show how to obtain algorithms that are Pareto-optimal with respect to the competitive ratios achieved, whereas for bin packing and list update, we give online algorithms with worst-case tradeoffs in their competitiveness, depending on whether the advice is trusted or adversarial. More importantly, we demonstrate how to prove lower bounds, within this model, on the tradeoff between the number of advice bits and the competitiveness of any online algorithm.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"144 ","pages":"Article 103545"},"PeriodicalIF":1.1,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140800465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Message-based systems usually consist of distributed components that communicate using asynchronous message passing. In such systems, particular message orderings may violate some required properties. Given an automata-based specification of unwanted message sequences, we propose a decentralized deadlock-free runtime enforcement algorithm to prevent the formation of such sequences. In our approach, components are equipped with monitors executed concurrently. A component is only blocked before sending or receiving the last message of a sequence, until its associated monitor checks that such a message does not complete an unwanted sequence. According to the specification of unwanted sequences, some blocked components may suffer from a deadlock. Our deadlock-free algorithm guarantees that monitors detect and resolve such deadlocks by improving the existing deadlock detection algorithms. We evaluate the efficiency and scalability of our approach in terms of the communication overhead, the prevention latency, and the overhead of deadlock detection through simulation.
{"title":"Decentralized deadlock-free enforcement of message orderings in message-based systems","authors":"Mahboubeh Samadi, Fatemeh Ghassemi, Ramtin Khosravi","doi":"10.1016/j.jcss.2024.103544","DOIUrl":"https://doi.org/10.1016/j.jcss.2024.103544","url":null,"abstract":"<div><p>Message-based systems usually consist of distributed components that communicate using asynchronous message passing. In such systems, particular message orderings may violate some required properties. Given an automata-based specification of unwanted message sequences, we propose a decentralized deadlock-free runtime enforcement algorithm to prevent the formation of such sequences. In our approach, components are equipped with monitors executed concurrently. A component is only blocked before sending or receiving the last message of a sequence, until its associated monitor checks that such a message does not complete an unwanted sequence. According to the specification of unwanted sequences, some blocked components may suffer from a deadlock. Our deadlock-free algorithm guarantees that monitors detect and resolve such deadlocks by improving the existing deadlock detection algorithms. We evaluate the efficiency and scalability of our approach in terms of the communication overhead, the prevention latency, and the overhead of deadlock detection through simulation.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"144 ","pages":"Article 103544"},"PeriodicalIF":1.1,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140645928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-04-12DOI: 10.1016/j.jcss.2024.103543
Victor Chepoi , Kolja Knauer , Manon Philibert
We show that the topes of a complex of oriented matroids (abbreviated COM) of VC-dimension d admit a proper labeled sample compression scheme of size d. This considerably extends results of Moran and Warmuth on ample classes, of Ben-David and Litman on affine arrangements of hyperplanes, and of the authors on complexes of uniform oriented matroids, and is a step towards the sample compression conjecture – one of the oldest open problems in computational learning theory. On the one hand, our approach exploits the rich combinatorial cell structure of COMs via oriented matroid theory. On the other hand, viewing tope graphs of COMs as partial cubes creates a fruitful link to metric graph theory.
这大大扩展了莫兰(Moran)和沃姆斯(Warmuth)关于充裕类、本-大卫(Ben-David)和利特曼(Litman)关于超平面仿射排列以及作者关于均匀定向矩阵复合物的研究成果,是向样本压缩猜想--计算学习理论中最古老的未决问题之一--迈出的一步。一方面,我们的方法通过定向矩阵理论利用了 COM 丰富的组合单元结构。另一方面,将 COM 的顶点图视为部分立方体,与度量图理论建立了富有成效的联系。
{"title":"Labeled sample compression schemes for complexes of oriented matroids","authors":"Victor Chepoi , Kolja Knauer , Manon Philibert","doi":"10.1016/j.jcss.2024.103543","DOIUrl":"https://doi.org/10.1016/j.jcss.2024.103543","url":null,"abstract":"<div><p>We show that the topes of a complex of oriented matroids (abbreviated COM) of VC-dimension <em>d</em> admit a proper labeled sample compression scheme of size <em>d</em>. This considerably extends results of Moran and Warmuth on ample classes, of Ben-David and Litman on affine arrangements of hyperplanes, and of the authors on complexes of uniform oriented matroids, and is a step towards the sample compression conjecture – one of the oldest open problems in computational learning theory. On the one hand, our approach exploits the rich combinatorial cell structure of COMs via oriented matroid theory. On the other hand, viewing tope graphs of COMs as partial cubes creates a fruitful link to metric graph theory.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"144 ","pages":"Article 103543"},"PeriodicalIF":1.1,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140605005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-29DOI: 10.1016/j.jcss.2024.103533
Danny Hermelin , Yuval Itzhaki , Hendrik Molter , Dvir Shabtay
We provide new parameterized complexity results for Interval Scheduling on Eligible Machines. In this problem, a set of n jobs is given to be processed non-preemptively on a set of m machines. Each job has a processing time, a deadline, a weight, and a set of eligible machines that can process it. The goal is to find a maximum weight subset of jobs that can each be processed on one of its eligible machines such that it completes exactly at its deadline. We focus on two parameters: The number m of machines, and the largest processing time . Our main contribution is showing W[1]-hardness when parameterized by m. This answers Open Problem 8 of Mnich and van Bevern's list of 15 open problems in parameterized complexity of scheduling problems [Computers & Operations Research, 2018]. Furthermore, we show NP-hardness even when and present an FPT-algorithm with for the combined parameter .
我们为合格机器上的间隔调度问题提供了新的参数化复杂度结果。在这个问题中,需要在一组 m 台机器上非抢占式地处理 n 个作业。每个作业都有一个处理时间、一个截止日期、一个权重和一组可以处理它的合格机器。我们的目标是找到一个最大权重的作业子集,每个作业都能在其中一台符合条件的机器上处理,从而在截止日期前完成作业。我们关注两个参数:机器数量 m 和最大处理时间 pmax。我们的主要贡献是证明了以 m 为参数时的 W[1]-hardness 性。这回答了 Mnich 和 van Bevern 列出的调度问题参数化复杂性 15 个开放问题中的开放问题 8 [Computers & Operations Research, 2018]。此外,我们还证明了即使 pmax=O(1) 时的 NP 难度,并提出了一种针对 m+pmax 组合参数的 FPT 算法。
{"title":"On the parameterized complexity of interval scheduling with eligible machine sets","authors":"Danny Hermelin , Yuval Itzhaki , Hendrik Molter , Dvir Shabtay","doi":"10.1016/j.jcss.2024.103533","DOIUrl":"10.1016/j.jcss.2024.103533","url":null,"abstract":"<div><p>We provide new parameterized complexity results for <span>Interval Scheduling on Eligible Machines</span>. In this problem, a set of <em>n</em> jobs is given to be processed non-preemptively on a set of <em>m</em> machines. Each job has a <em>processing time</em>, a <em>deadline</em>, a <em>weight</em>, and a set of <em>eligible machines</em> that can process it. The goal is to find a maximum weight subset of jobs that can each be processed on one of its eligible machines such that it completes exactly at its deadline. We focus on two parameters: The number <em>m</em> of machines, and the largest processing time <span><math><msub><mrow><mi>p</mi></mrow><mrow><mi>max</mi></mrow></msub></math></span>. Our main contribution is showing <span>W[1]</span>-hardness when parameterized by <em>m</em>. This answers Open Problem 8 of Mnich and van Bevern's list of 15 open problems in parameterized complexity of scheduling problems [Computers & Operations Research, 2018]. Furthermore, we show <span>NP</span>-hardness even when <span><math><msub><mrow><mi>p</mi></mrow><mrow><mi>max</mi></mrow></msub><mo>=</mo><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></math></span> and present an <span>FPT</span>-algorithm with for the combined parameter <span><math><mi>m</mi><mo>+</mo><msub><mrow><mi>p</mi></mrow><mrow><mi>max</mi></mrow></msub></math></span>.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"144 ","pages":"Article 103533"},"PeriodicalIF":1.1,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140402533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}