首页 > 最新文献

Journal of Computer and System Sciences最新文献

英文 中文
On computing large temporal (unilateral) connected components 关于计算大时间(单边)连接成分
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2024-05-22 DOI: 10.1016/j.jcss.2024.103548
Isnard Lopes Costa , Raul Lopes , Andrea Marino , Ana Silva

A temporal (directed) graph is one where edges are available only at specific times during its lifetime, τ. Paths in these graphs are sequences of adjacent edges whose appearing times are either strictly increasing or non-strictly increasing. Classical concepts of connected and unilateral components can be naturally extended to temporal graphs. We address fundamental questions in temporal graphs. (i) What is the complexity of deciding the existence of a component of size k, parameterized by τ, k, and k+τ? The answer depends on the component definition and whether the graph is directed or undirected. (ii) What is the minimum running time to check if a subset of vertices is pairwise reachable? A quadratic-time algorithm exists, but a faster time is unlikely unless SETH fails. (iii) Can we verify if a subset of vertices forms a component in polynomial time? This is NP -complete depending on the temporal component definition.

这些图中的路径是相邻边的序列,其出现时间要么严格递增,要么非严格递增。连通部分和单边部分的经典概念可以自然地扩展到时间图。我们要解决时间图中的基本问题。(i) 由 τ、k 和 k+τ 参数决定大小为 k 的分量是否存在的复杂度是多少?答案取决于组件的定义以及图是有向图还是无向图。(ii) 检查顶点子集是否成对可达的最小运行时间是多少?存在二次方时间算法,但除非 SETH 失败,否则不太可能有更快的时间。(iii) 我们能否在多项式时间内验证顶点子集是否构成一个组件?这取决于时间分量的定义,是 NP -complete 的。
{"title":"On computing large temporal (unilateral) connected components","authors":"Isnard Lopes Costa ,&nbsp;Raul Lopes ,&nbsp;Andrea Marino ,&nbsp;Ana Silva","doi":"10.1016/j.jcss.2024.103548","DOIUrl":"https://doi.org/10.1016/j.jcss.2024.103548","url":null,"abstract":"<div><p>A temporal (directed) graph is one where edges are available only at specific times during its lifetime, <em>τ</em>. Paths in these graphs are sequences of adjacent edges whose appearing times are either strictly increasing or non-strictly increasing. Classical concepts of connected and unilateral components can be naturally extended to temporal graphs. We address fundamental questions in temporal graphs. (i) What is the complexity of deciding the existence of a component of size <em>k</em>, parameterized by <em>τ</em>, <em>k</em>, and <span><math><mi>k</mi><mo>+</mo><mi>τ</mi></math></span>? The answer depends on the component definition and whether the graph is directed or undirected. (ii) What is the minimum running time to check if a subset of vertices is pairwise reachable? A quadratic-time algorithm exists, but a faster time is unlikely unless <span>SETH</span> fails. (iii) Can we verify if a subset of vertices forms a component in polynomial time? This is <span>NP</span> -complete depending on the temporal component definition.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"144 ","pages":"Article 103548"},"PeriodicalIF":1.1,"publicationDate":"2024-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141244778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Backdoor DNFs 后门 DNF
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2024-05-21 DOI: 10.1016/j.jcss.2024.103547
Sebastian Ordyniak , Andre Schidler , Stefan Szeider

We introduce backdoor DNFs, as a tool to measure the theoretical hardness of CNF formulas. Like backdoor sets and backdoor trees, backdoor DNFs are defined relative to a tractable class of CNF formulas. Each conjunctive term of a backdoor DNF defines a partial assignment that moves the input CNF formula into the base class. Backdoor DNFs are more expressive and potentially smaller than their predecessors backdoor sets and backdoor trees. We establish the fixed-parameter tractability of the backdoor DNF detection problem. Our results hold for the fundamental base classes Horn and 2CNF, and their combination. We complement our theoretical findings by an empirical study. Our experiments show that backdoor DNFs provide a significant improvement over their predecessors.

我们引入了后门 DNF,作为测量 CNF 公式理论硬度的工具。与后门集和后门树一样,后门 DNF 也是相对于一类可处理的 CNF 公式定义的。后门 DNF 的每个连接词都定义了一个部分赋值,可将输入的 CNF 公式移入基类。后门 DNF 比其前身后门集和后门树更具表现力,而且可能更小。我们建立了后门 DNF 检测问题的固定参数可操作性。我们的结果适用于基本基类 Horn 和 2CNF 以及它们的组合。我们通过实证研究补充了我们的理论发现。我们的实验表明,后门 DNF 与其前身相比有显著改进。
{"title":"Backdoor DNFs","authors":"Sebastian Ordyniak ,&nbsp;Andre Schidler ,&nbsp;Stefan Szeider","doi":"10.1016/j.jcss.2024.103547","DOIUrl":"10.1016/j.jcss.2024.103547","url":null,"abstract":"<div><p>We introduce backdoor DNFs, as a tool to measure the theoretical hardness of CNF formulas. Like backdoor sets and backdoor trees, backdoor DNFs are defined relative to a tractable class of CNF formulas. Each conjunctive term of a backdoor DNF defines a partial assignment that moves the input CNF formula into the base class. Backdoor DNFs are more expressive and potentially smaller than their predecessors backdoor sets and backdoor trees. We establish the fixed-parameter tractability of the backdoor DNF detection problem. Our results hold for the fundamental base classes Horn and 2CNF, and their combination. We complement our theoretical findings by an empirical study. Our experiments show that backdoor DNFs provide a significant improvement over their predecessors.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"144 ","pages":"Article 103547"},"PeriodicalIF":1.1,"publicationDate":"2024-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0022000024000424/pdfft?md5=28e392df06776d3baaabe0cd651c38e8&pid=1-s2.0-S0022000024000424-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141150054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Temporal reachability minimization: Delaying vs. deleting 时间可达性最小化:延迟与删除
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2024-05-20 DOI: 10.1016/j.jcss.2024.103549
Hendrik Molter , Malte Renken , Philipp Zschoche

We study spreading processes in temporal graphs, that is, graphs whose connections change over time. More precisely, we investigate how such a spreading process, emerging from a given set of sources, can be contained to a small part of the graph. We consider two ways of modifying the graph, which are (1) deleting and (2) delaying connections. We show a close relationship between the two associated problems. It is known that both problems are W[1]-hard when parameterized by the number of modifications. We consider the number of vertices to which the spread is contained as a parameter. Surprisingly, we prove W[1]-hardness for the deletion variant but fixed-parameter tractability for the delaying variant. Furthermore, we give a polynomial time algorithm for both problem variants when the graph has a tree structure and show how to generalize this result to an FPT-algorithm for the so-called timed feedback vertex number as a parameter.

我们研究的是时间图(即其连接随时间变化的图)中的传播过程。更准确地说,我们研究的是如何将这种从给定源集合中产生的传播过程控制在图的一小部分内。我们考虑了两种修改图的方法,即 (1) 删除和 (2) 延迟连接。我们展示了这两个相关问题之间的密切关系。众所周知,以修改次数为参数时,这两个问题都很难解决。我们将传播所包含的顶点数视为参数。令人惊讶的是,我们证明了删除变式的 W[1]-hardness 性,而延迟变式的固定参数可操作性。此外,我们还给出了当图形具有树形结构时这两个问题变体的多项式时间算法,并展示了如何将这一结果推广到以所谓的定时反馈顶点数为参数的 FPT 算法。
{"title":"Temporal reachability minimization: Delaying vs. deleting","authors":"Hendrik Molter ,&nbsp;Malte Renken ,&nbsp;Philipp Zschoche","doi":"10.1016/j.jcss.2024.103549","DOIUrl":"https://doi.org/10.1016/j.jcss.2024.103549","url":null,"abstract":"<div><p>We study spreading processes in temporal graphs, that is, graphs whose connections change over time. More precisely, we investigate how such a spreading process, emerging from a given set of sources, can be contained to a small part of the graph. We consider two ways of modifying the graph, which are (1) deleting and (2) delaying connections. We show a close relationship between the two associated problems. It is known that both problems are W[1]-hard when parameterized by the number of modifications. We consider the number of vertices to which the spread is contained as a parameter. Surprisingly, we prove W[1]-hardness for the deletion variant but fixed-parameter tractability for the delaying variant. Furthermore, we give a polynomial time algorithm for both problem variants when the graph has a tree structure and show how to generalize this result to an FPT-algorithm for the so-called timed feedback vertex number as a parameter.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"144 ","pages":"Article 103549"},"PeriodicalIF":1.1,"publicationDate":"2024-05-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141156323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A new temporal interpretation of cluster editing 集群编辑的新时间解释
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2024-05-17 DOI: 10.1016/j.jcss.2024.103551
Cristiano Bocci , Chiara Capresi , Kitty Meeks , John Sylvester

The NP-complete graph problem Cluster Editing seeks to transform a static graph into a disjoint union of cliques by making the fewest possible edits to the edges. We introduce a natural interpretation of this problem in temporal graphs, whose edge sets change over time. This problem is NP-complete even when restricted to temporal graphs whose underlying graph is a path, but we obtain two polynomial-time algorithms for restricted cases. In the static setting, it is well-known that a graph is a disjoint union of cliques if and only if it contains no induced copy of P3; we demonstrate that no general characterisation involving sets of at most four vertices can exist in the temporal setting, but obtain a complete characterisation involving forbidden configurations on at most five vertices. This characterisation gives rise to an FPT algorithm parameterised simultaneously by the permitted number of modifications and the lifetime of the temporal graph.

簇编辑(Cluster Editing)是一个 NP-complete(NP-complete)图问题,旨在通过对边进行尽可能少的编辑,将静态图转化为簇的不相邻联盟。我们在时间图中引入了对这一问题的自然解释,因为时间图的边集是随时间变化的。即使仅限于底层图为路径的时序图,这个问题也是 NP-完全的,但我们获得了两种针对受限情况的多项式时间算法。在静态设置中,众所周知,当且仅当一个图不包含 P3 的诱导副本时,它就是一个小群的不相交联盟;我们证明了在时间设置中不可能存在涉及最多四个顶点集的一般特征,但得到了涉及最多五个顶点上的禁止配置的完整特征。这种特性化产生了一种 FPT 算法,它同时以允许的修改次数和时序图的生命周期为参数。
{"title":"A new temporal interpretation of cluster editing","authors":"Cristiano Bocci ,&nbsp;Chiara Capresi ,&nbsp;Kitty Meeks ,&nbsp;John Sylvester","doi":"10.1016/j.jcss.2024.103551","DOIUrl":"https://doi.org/10.1016/j.jcss.2024.103551","url":null,"abstract":"<div><p>The <span><math><mi>NP</mi></math></span>-complete graph problem <span>Cluster Editing</span> seeks to transform a static graph into a disjoint union of cliques by making the fewest possible edits to the edges. We introduce a natural interpretation of this problem in temporal graphs, whose edge sets change over time. This problem is <span><math><mi>NP</mi></math></span>-complete even when restricted to temporal graphs whose underlying graph is a path, but we obtain two polynomial-time algorithms for restricted cases. In the static setting, it is well-known that a graph is a disjoint union of cliques if and only if it contains no induced copy of <span><math><msub><mrow><mi>P</mi></mrow><mrow><mn>3</mn></mrow></msub></math></span>; we demonstrate that no general characterisation involving sets of at most four vertices can exist in the temporal setting, but obtain a complete characterisation involving forbidden configurations on at most five vertices. This characterisation gives rise to an <span><math><mi>FPT</mi></math></span> algorithm parameterised simultaneously by the permitted number of modifications and the lifetime of the temporal graph.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"144 ","pages":"Article 103551"},"PeriodicalIF":1.1,"publicationDate":"2024-05-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0022000024000461/pdfft?md5=3c7ceb30b0bccaa972030b25aefb334f&pid=1-s2.0-S0022000024000461-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141156308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The tree-child network inference problem for line trees and the shortest common supersequence problem for permutation strings 线状树的树-子网络推理问题和排列字符串的最短公共超序列问题
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2024-05-16 DOI: 10.1016/j.jcss.2024.103546
Laurent Bulteau , Louxin Zhang

One strategy for inference of phylogenetic networks is to solve the phylogenetic network problem, which involves inferring phylogenetic trees first and subsequently computing the smallest phylogenetic network that displays all the trees. This approach capitalizes on exceptional tools available for inferring phylogenetic trees from biomolecular sequences. Since the vast space of phylogenetic networks poses difficulties in obtaining comprehensive sampling, the researchers switch their attention to inferring tree-child networks from multiple phylogenetic trees, where in a tree-child network each non-leaf node must have at least one child that is an indegree-one node. Three results are obtained in this work: (1) The shortest common supersequence problem remains NP-hard even for permutation strings. (2) Derived from the first result, the tree-child network inference problem is also established as NP-hard even for line trees (also known as caterpillar trees). (3) The parsimonious tree-child networks that display all the line trees are the same as those displaying all the binary trees and their hybridization number is Θ(n3) for n taxa.

推断系统发育网络的一种策略是解决系统发育网络问题,即首先推断系统发育树,然后计算显示所有系统发育树的最小系统发育网络。这种方法充分利用了从生物分子序列推断系统发生树的特殊工具。由于庞大的系统发育网络难以获得全面的采样,研究人员将注意力转移到了从多个系统发育树推断树-子网络上,在树-子网络中,每个非叶节点必须至少有一个子节点是独立节点。这项工作获得了三个结果:(1) 即使对于置换字符串,最短公共超序列问题仍然是 NP 难的。(2) 根据第一个结果,树-子网络推理问题也被确定为 NP-难,即使对于行树(也称为毛毛虫树)也是如此。(3) 显示所有线状树的拟树子网络与显示所有二叉树的拟树子网络相同,对于 n 个类群,其杂交数为 Θ(n3)。
{"title":"The tree-child network inference problem for line trees and the shortest common supersequence problem for permutation strings","authors":"Laurent Bulteau ,&nbsp;Louxin Zhang","doi":"10.1016/j.jcss.2024.103546","DOIUrl":"10.1016/j.jcss.2024.103546","url":null,"abstract":"<div><p>One strategy for inference of phylogenetic networks is to solve the phylogenetic network problem, which involves inferring phylogenetic trees first and subsequently computing the smallest phylogenetic network that displays all the trees. This approach capitalizes on exceptional tools available for inferring phylogenetic trees from biomolecular sequences. Since the vast space of phylogenetic networks poses difficulties in obtaining comprehensive sampling, the researchers switch their attention to inferring tree-child networks from multiple phylogenetic trees, where in a tree-child network each non-leaf node must have at least one child that is an indegree-one node. Three results are obtained in this work: (1) The shortest common supersequence problem remains NP-hard even for permutation strings. (2) Derived from the first result, the tree-child network inference problem is also established as NP-hard even for line trees (also known as <em>caterpillar</em> trees). (3) The parsimonious tree-child networks that display all the line trees are the same as those displaying all the binary trees and their hybridization number is <span><math><mi>Θ</mi><mo>(</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>3</mn></mrow></msup><mo>)</mo></math></span> for <em>n</em> taxa.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"144 ","pages":"Article 103546"},"PeriodicalIF":1.1,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141049268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On minimum vertex bisection of random d-regular graphs 论随机 d-Regular 图形的最小顶点平分
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2024-05-15 DOI: 10.1016/j.jcss.2024.103550
Josep Díaz , Öznur Yaşar Diner , Maria Serna , Oriol Serra

Minimum vertex bisection is a graph partitioning problem in which the aim is to find a partition of the vertices into two equal parts that minimizes the number of vertices in one partition set that have a neighbor in the other set. In this work we are interested in providing asymptotically almost surely upper bounds on the minimum vertex bisection of random d-regular graphs, for constant values of d. Our approach is based on analyzing a greedy algorithm by using the differential equation method. In this way, we obtain the first known non-trivial upper bounds for the vertex bisection number in random regular graphs. The numerical approximations of these theoretical bounds are compared with the emprical ones, and with the lower bounds from Kolesnik and Wormald (2014) [30].

最小顶点分割是一个图分割问题,其目的是将顶点分成相等的两部分,使一个分割集中与另一个分割集中有邻居的顶点数量最小。在这项研究中,我们感兴趣的是在 d 值不变的情况下,为随机 d 不规则图的最小顶点分割提供近似几乎肯定的上界。通过这种方法,我们首次获得了随机规则图中顶点分叉数的非微观上界。我们将这些理论边界的数值近似值与实际边界以及 Kolesnik 和 Wormald(2014)[30] 的下限进行了比较。
{"title":"On minimum vertex bisection of random d-regular graphs","authors":"Josep Díaz ,&nbsp;Öznur Yaşar Diner ,&nbsp;Maria Serna ,&nbsp;Oriol Serra","doi":"10.1016/j.jcss.2024.103550","DOIUrl":"10.1016/j.jcss.2024.103550","url":null,"abstract":"<div><p>Minimum vertex bisection is a graph partitioning problem in which the aim is to find a partition of the vertices into two equal parts that minimizes the number of vertices in one partition set that have a neighbor in the other set. In this work we are interested in providing asymptotically almost surely upper bounds on the minimum vertex bisection of random <em>d</em>-regular graphs, for constant values of <em>d</em>. Our approach is based on analyzing a greedy algorithm by using the differential equation method. In this way, we obtain the first known non-trivial upper bounds for the vertex bisection number in random regular graphs. The numerical approximations of these theoretical bounds are compared with the emprical ones, and with the lower bounds from Kolesnik and Wormald (2014) <span>[30]</span>.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"144 ","pages":"Article 103550"},"PeriodicalIF":1.1,"publicationDate":"2024-05-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S002200002400045X/pdfft?md5=5ad9b857ac0144723c133211748957a5&pid=1-s2.0-S002200002400045X-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141027925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online computation with untrusted advice 使用不可靠建议的在线计算
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2024-04-18 DOI: 10.1016/j.jcss.2024.103545
Spyros Angelopoulos , Christoph Dürr , Shendan Jin , Shahin Kamali , Marc Renault

We study a generalization of the advice complexity model of online computation in which the advice is provided by an untrusted source. Our objective is to quantify the impact of untrusted advice so as to design and analyze online algorithms that are robust if the advice is adversarial, and efficient is the advice is foolproof. We focus on four well-studied online problems, namely ski rental, online bidding, bin packing and list update. For ski rental and online bidding, we show how to obtain algorithms that are Pareto-optimal with respect to the competitive ratios achieved, whereas for bin packing and list update, we give online algorithms with worst-case tradeoffs in their competitiveness, depending on whether the advice is trusted or adversarial. More importantly, we demonstrate how to prove lower bounds, within this model, on the tradeoff between the number of advice bits and the competitiveness of any online algorithm.

我们研究的是在线计算建议复杂性模型的广义化,其中的建议是由不可信来源提供的。我们的目标是量化不可信建议的影响,从而设计和分析在线算法,在建议具有对抗性的情况下保持稳健,在建议万无一失的情况下保持高效。我们将重点放在四个经过充分研究的在线问题上,即滑雪场租赁、在线竞价、垃圾箱打包和列表更新。对于滑雪场租赁和在线竞价,我们展示了如何获得与所实现的竞争比率相关的帕累托最优算法,而对于垃圾箱打包和列表更新,我们给出了在线算法,根据建议是可信的还是对抗性的,在竞争性方面进行了最坏情况下的权衡。更重要的是,我们演示了如何在此模型内证明任何在线算法的建议位数与竞争力之间的折衷下限。
{"title":"Online computation with untrusted advice","authors":"Spyros Angelopoulos ,&nbsp;Christoph Dürr ,&nbsp;Shendan Jin ,&nbsp;Shahin Kamali ,&nbsp;Marc Renault","doi":"10.1016/j.jcss.2024.103545","DOIUrl":"10.1016/j.jcss.2024.103545","url":null,"abstract":"<div><p>We study a generalization of the advice complexity model of online computation in which the advice is provided by an untrusted source. Our objective is to quantify the impact of untrusted advice so as to design and analyze online algorithms that are robust if the advice is adversarial, and efficient is the advice is foolproof. We focus on four well-studied online problems, namely ski rental, online bidding, bin packing and list update. For ski rental and online bidding, we show how to obtain algorithms that are Pareto-optimal with respect to the competitive ratios achieved, whereas for bin packing and list update, we give online algorithms with worst-case tradeoffs in their competitiveness, depending on whether the advice is trusted or adversarial. More importantly, we demonstrate how to prove lower bounds, within this model, on the tradeoff between the number of advice bits and the competitiveness of any online algorithm.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"144 ","pages":"Article 103545"},"PeriodicalIF":1.1,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140800465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decentralized deadlock-free enforcement of message orderings in message-based systems 基于消息的系统中消息排序的去中心化无死锁执行
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2024-04-18 DOI: 10.1016/j.jcss.2024.103544
Mahboubeh Samadi, Fatemeh Ghassemi, Ramtin Khosravi

Message-based systems usually consist of distributed components that communicate using asynchronous message passing. In such systems, particular message orderings may violate some required properties. Given an automata-based specification of unwanted message sequences, we propose a decentralized deadlock-free runtime enforcement algorithm to prevent the formation of such sequences. In our approach, components are equipped with monitors executed concurrently. A component is only blocked before sending or receiving the last message of a sequence, until its associated monitor checks that such a message does not complete an unwanted sequence. According to the specification of unwanted sequences, some blocked components may suffer from a deadlock. Our deadlock-free algorithm guarantees that monitors detect and resolve such deadlocks by improving the existing deadlock detection algorithms. We evaluate the efficiency and scalability of our approach in terms of the communication overhead, the prevention latency, and the overhead of deadlock detection through simulation.

基于消息的系统通常由分布式组件组成,这些组件通过异步消息传递进行通信。在这类系统中,特定的消息排序可能会违反某些必要的属性。鉴于基于自动机的不需要的消息序列规范,我们提出了一种去中心化的无死锁运行时执行算法,以防止此类序列的形成。在我们的方法中,组件配备了并发执行的监控器。一个组件只有在发送或接收序列的最后一条信息之前才会被阻塞,直到其相关的监控器检查出该信息没有完成一个不需要的序列。根据不需要的序列规范,一些被阻塞的组件可能会陷入死锁。我们的无死锁算法通过改进现有的死锁检测算法,确保监控器能检测并解决此类死锁。我们通过仿真评估了我们的方法在通信开销、预防延迟和死锁检测开销方面的效率和可扩展性。
{"title":"Decentralized deadlock-free enforcement of message orderings in message-based systems","authors":"Mahboubeh Samadi,&nbsp;Fatemeh Ghassemi,&nbsp;Ramtin Khosravi","doi":"10.1016/j.jcss.2024.103544","DOIUrl":"https://doi.org/10.1016/j.jcss.2024.103544","url":null,"abstract":"<div><p>Message-based systems usually consist of distributed components that communicate using asynchronous message passing. In such systems, particular message orderings may violate some required properties. Given an automata-based specification of unwanted message sequences, we propose a decentralized deadlock-free runtime enforcement algorithm to prevent the formation of such sequences. In our approach, components are equipped with monitors executed concurrently. A component is only blocked before sending or receiving the last message of a sequence, until its associated monitor checks that such a message does not complete an unwanted sequence. According to the specification of unwanted sequences, some blocked components may suffer from a deadlock. Our deadlock-free algorithm guarantees that monitors detect and resolve such deadlocks by improving the existing deadlock detection algorithms. We evaluate the efficiency and scalability of our approach in terms of the communication overhead, the prevention latency, and the overhead of deadlock detection through simulation.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"144 ","pages":"Article 103544"},"PeriodicalIF":1.1,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140645928","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Labeled sample compression schemes for complexes of oriented matroids 定向矩阵复合体的标记样本压缩方案
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2024-04-12 DOI: 10.1016/j.jcss.2024.103543
Victor Chepoi , Kolja Knauer , Manon Philibert

We show that the topes of a complex of oriented matroids (abbreviated COM) of VC-dimension d admit a proper labeled sample compression scheme of size d. This considerably extends results of Moran and Warmuth on ample classes, of Ben-David and Litman on affine arrangements of hyperplanes, and of the authors on complexes of uniform oriented matroids, and is a step towards the sample compression conjecture – one of the oldest open problems in computational learning theory. On the one hand, our approach exploits the rich combinatorial cell structure of COMs via oriented matroid theory. On the other hand, viewing tope graphs of COMs as partial cubes creates a fruitful link to metric graph theory.

这大大扩展了莫兰(Moran)和沃姆斯(Warmuth)关于充裕类、本-大卫(Ben-David)和利特曼(Litman)关于超平面仿射排列以及作者关于均匀定向矩阵复合物的研究成果,是向样本压缩猜想--计算学习理论中最古老的未决问题之一--迈出的一步。一方面,我们的方法通过定向矩阵理论利用了 COM 丰富的组合单元结构。另一方面,将 COM 的顶点图视为部分立方体,与度量图理论建立了富有成效的联系。
{"title":"Labeled sample compression schemes for complexes of oriented matroids","authors":"Victor Chepoi ,&nbsp;Kolja Knauer ,&nbsp;Manon Philibert","doi":"10.1016/j.jcss.2024.103543","DOIUrl":"https://doi.org/10.1016/j.jcss.2024.103543","url":null,"abstract":"<div><p>We show that the topes of a complex of oriented matroids (abbreviated COM) of VC-dimension <em>d</em> admit a proper labeled sample compression scheme of size <em>d</em>. This considerably extends results of Moran and Warmuth on ample classes, of Ben-David and Litman on affine arrangements of hyperplanes, and of the authors on complexes of uniform oriented matroids, and is a step towards the sample compression conjecture – one of the oldest open problems in computational learning theory. On the one hand, our approach exploits the rich combinatorial cell structure of COMs via oriented matroid theory. On the other hand, viewing tope graphs of COMs as partial cubes creates a fruitful link to metric graph theory.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"144 ","pages":"Article 103543"},"PeriodicalIF":1.1,"publicationDate":"2024-04-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140605005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the parameterized complexity of interval scheduling with eligible machine sets 论带合格机器集的区间调度的参数化复杂性
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2024-03-29 DOI: 10.1016/j.jcss.2024.103533
Danny Hermelin , Yuval Itzhaki , Hendrik Molter , Dvir Shabtay

We provide new parameterized complexity results for Interval Scheduling on Eligible Machines. In this problem, a set of n jobs is given to be processed non-preemptively on a set of m machines. Each job has a processing time, a deadline, a weight, and a set of eligible machines that can process it. The goal is to find a maximum weight subset of jobs that can each be processed on one of its eligible machines such that it completes exactly at its deadline. We focus on two parameters: The number m of machines, and the largest processing time pmax. Our main contribution is showing W[1]-hardness when parameterized by m. This answers Open Problem 8 of Mnich and van Bevern's list of 15 open problems in parameterized complexity of scheduling problems [Computers & Operations Research, 2018]. Furthermore, we show NP-hardness even when pmax=O(1) and present an FPT-algorithm with for the combined parameter m+pmax.

我们为合格机器上的间隔调度问题提供了新的参数化复杂度结果。在这个问题中,需要在一组 m 台机器上非抢占式地处理 n 个作业。每个作业都有一个处理时间、一个截止日期、一个权重和一组可以处理它的合格机器。我们的目标是找到一个最大权重的作业子集,每个作业都能在其中一台符合条件的机器上处理,从而在截止日期前完成作业。我们关注两个参数:机器数量 m 和最大处理时间 pmax。我们的主要贡献是证明了以 m 为参数时的 W[1]-hardness 性。这回答了 Mnich 和 van Bevern 列出的调度问题参数化复杂性 15 个开放问题中的开放问题 8 [Computers & Operations Research, 2018]。此外,我们还证明了即使 pmax=O(1) 时的 NP 难度,并提出了一种针对 m+pmax 组合参数的 FPT 算法。
{"title":"On the parameterized complexity of interval scheduling with eligible machine sets","authors":"Danny Hermelin ,&nbsp;Yuval Itzhaki ,&nbsp;Hendrik Molter ,&nbsp;Dvir Shabtay","doi":"10.1016/j.jcss.2024.103533","DOIUrl":"10.1016/j.jcss.2024.103533","url":null,"abstract":"<div><p>We provide new parameterized complexity results for <span>Interval Scheduling on Eligible Machines</span>. In this problem, a set of <em>n</em> jobs is given to be processed non-preemptively on a set of <em>m</em> machines. Each job has a <em>processing time</em>, a <em>deadline</em>, a <em>weight</em>, and a set of <em>eligible machines</em> that can process it. The goal is to find a maximum weight subset of jobs that can each be processed on one of its eligible machines such that it completes exactly at its deadline. We focus on two parameters: The number <em>m</em> of machines, and the largest processing time <span><math><msub><mrow><mi>p</mi></mrow><mrow><mi>max</mi></mrow></msub></math></span>. Our main contribution is showing <span>W[1]</span>-hardness when parameterized by <em>m</em>. This answers Open Problem 8 of Mnich and van Bevern's list of 15 open problems in parameterized complexity of scheduling problems [Computers &amp; Operations Research, 2018]. Furthermore, we show <span>NP</span>-hardness even when <span><math><msub><mrow><mi>p</mi></mrow><mrow><mi>max</mi></mrow></msub><mo>=</mo><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></math></span> and present an <span>FPT</span>-algorithm with for the combined parameter <span><math><mi>m</mi><mo>+</mo><msub><mrow><mi>p</mi></mrow><mrow><mi>max</mi></mrow></msub></math></span>.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"144 ","pages":"Article 103533"},"PeriodicalIF":1.1,"publicationDate":"2024-03-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140402533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Computer and System Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1