首页 > 最新文献

Journal of Computer and System Sciences最新文献

英文 中文
Participatory budgeting with project groups 与项目小组进行参与式预算
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-08-28 DOI: 10.1016/j.jcss.2025.103702
Pallavi Jain , Krzysztof Sornat , Nimrod Talmon , Meirav Zehavi
We study a generalization of the standard approval-based model of participatory budgeting (PB), in which voters are providing approval ballots over a set of predefined projects and—in addition to a global budget limit, there are several groupings of the projects, each group with its own budget limit. We study the computational complexity of identifying project bundles that maximize voter satisfaction while respecting all budget limits. We show that the problem is generally intractable and describe efficient exact algorithms for several special cases, including instances with only few groups and instances where the group structure is close to be hierarchical, as well as efficient approximation algorithms. Our results could allow, e.g., municipalities to hold richer PB processes that are thematically and geographically inclusive.
我们研究了参与式预算(PB)标准的基于批准的模型的泛化,在这个模型中,选民对一组预定义的项目投赞成票,除了一个全局预算限制外,还有几个项目分组,每个分组都有自己的预算限制。我们研究了在尊重所有预算限制的情况下,识别最大化选民满意度的项目包的计算复杂性。我们证明了该问题通常是难以处理的,并描述了几种特殊情况下的有效精确算法,包括只有少数组的实例和组结构接近分层的实例,以及有效的近似算法。我们的结果可以允许,例如,市政当局举行主题和地理包容性更丰富的PB过程。
{"title":"Participatory budgeting with project groups","authors":"Pallavi Jain ,&nbsp;Krzysztof Sornat ,&nbsp;Nimrod Talmon ,&nbsp;Meirav Zehavi","doi":"10.1016/j.jcss.2025.103702","DOIUrl":"10.1016/j.jcss.2025.103702","url":null,"abstract":"<div><div>We study a generalization of the standard approval-based model of participatory budgeting (PB), in which voters are providing approval ballots over a set of predefined projects and—in addition to a global budget limit, there are several groupings of the projects, each group with its own budget limit. We study the computational complexity of identifying project bundles that maximize voter satisfaction while respecting all budget limits. We show that the problem is generally intractable and describe efficient exact algorithms for several special cases, including instances with only few groups and instances where the group structure is close to be hierarchical, as well as efficient approximation algorithms. Our results could allow, e.g., municipalities to hold richer PB processes that are thematically and geographically inclusive.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"156 ","pages":"Article 103702"},"PeriodicalIF":0.9,"publicationDate":"2025-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145060902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximate selection with unreliable comparisons in sublinear time 在亚线性时间内具有不可靠比较的近似选择
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-08-12 DOI: 10.1016/j.jcss.2025.103699
Shengyu Huang , Chih-Hung Liu , Daniel Rutschmann
Given n elements, an integer kn2 and a parameter ε1n, we study the problem of selecting an element with rank in (knε,k+nε] using unreliable comparisons where the outcome of each comparison is incorrect independently with a constant error probability, and multiple comparisons between the same pair of elements are independent. We develop a randomized algorithm that performs expected O(knε2log1Q) comparisons to achieve success probability at least 1Q. We also prove that even in the absence of comparison faults, any randomized algorithm with success probability at least 1Q performs expected Ω(min{n,knε2log1Q}) comparisons. In particular, our algorithm is optimal as long as n is large enough, i.e., when n=Ω(knε2log1Q); outside this parameter range, no algorithm performs a sublinear number of comparisons. Surprisingly, for constant Q, our algorithm performs expected O(knε2) comparisons with and without comparison faults, while for the exact selection problem, the expected number of comparisons is Θ(nlogk) with faults versus Θ(n) without faults.
给定n个元素,整数k≤n2,参数ε≥1n,我们研究了使用不可靠比较选择秩在(k−nε,k+nε]中的元素的问题,其中每次比较的结果都是独立的,错误概率为常数,并且同一对元素之间的多次比较是独立的。我们开发了一种随机算法,该算法执行预期的O(knε−2log (1Q))比较,以获得至少1−Q的成功概率。我们还证明了即使在没有比较错误的情况下,任何成功概率至少为1−Q的随机算法都可以执行预期的Ω(min (n,knε - 2log))比较。特别地,只要n足够大,我们的算法是最优的,即当n=Ω(knε−2log (1Q));在此参数范围之外,没有算法执行次线性数量的比较。令人惊讶的是,对于常数Q,我们的算法在有比较错误和没有比较错误的情况下执行预期的O(knε−2)比较,而对于精确的选择问题,预期的比较次数是Θ(nlog (k))有错误与Θ(n)没有错误。
{"title":"Approximate selection with unreliable comparisons in sublinear time","authors":"Shengyu Huang ,&nbsp;Chih-Hung Liu ,&nbsp;Daniel Rutschmann","doi":"10.1016/j.jcss.2025.103699","DOIUrl":"10.1016/j.jcss.2025.103699","url":null,"abstract":"<div><div>Given <em>n</em> elements, an integer <span><math><mi>k</mi><mo>≤</mo><mfrac><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></mfrac></math></span> and a parameter <span><math><mi>ε</mi><mo>≥</mo><mfrac><mrow><mn>1</mn></mrow><mrow><mi>n</mi></mrow></mfrac></math></span>, we study the problem of selecting an element with rank in <span><math><mo>(</mo><mi>k</mi><mo>−</mo><mi>n</mi><mi>ε</mi><mo>,</mo><mi>k</mi><mo>+</mo><mi>n</mi><mi>ε</mi><mo>]</mo></math></span> using <em>unreliable</em> comparisons where the outcome of each comparison is incorrect independently with a constant error probability, and multiple comparisons between the same pair of elements are independent. We develop a randomized algorithm that performs <em>expected</em> <span><math><mi>O</mi><mo>(</mo><mfrac><mrow><mi>k</mi></mrow><mrow><mi>n</mi></mrow></mfrac><msup><mrow><mi>ε</mi></mrow><mrow><mo>−</mo><mn>2</mn></mrow></msup><mi>log</mi><mo>⁡</mo><mfrac><mrow><mn>1</mn></mrow><mrow><mi>Q</mi></mrow></mfrac><mo>)</mo></math></span> comparisons to achieve success probability at least <span><math><mn>1</mn><mo>−</mo><mi>Q</mi></math></span>. We also prove that even in the absence of comparison faults, any randomized algorithm with success probability at least <span><math><mn>1</mn><mo>−</mo><mi>Q</mi></math></span> performs <em>expected</em> <span><math><mi>Ω</mi><mo>(</mo><mi>min</mi><mo>⁡</mo><mo>{</mo><mi>n</mi><mo>,</mo><mfrac><mrow><mi>k</mi></mrow><mrow><mi>n</mi></mrow></mfrac><msup><mrow><mi>ε</mi></mrow><mrow><mo>−</mo><mn>2</mn></mrow></msup><mi>log</mi><mo>⁡</mo><mfrac><mrow><mn>1</mn></mrow><mrow><mi>Q</mi></mrow></mfrac><mo>}</mo><mo>)</mo></math></span> comparisons. In particular, our algorithm is optimal as long as <em>n</em> is large enough, i.e., when <span><math><mi>n</mi><mo>=</mo><mi>Ω</mi><mrow><mo>(</mo><mfrac><mrow><mi>k</mi></mrow><mrow><mi>n</mi></mrow></mfrac><msup><mrow><mi>ε</mi></mrow><mrow><mo>−</mo><mn>2</mn></mrow></msup><mi>log</mi><mo>⁡</mo><mfrac><mrow><mn>1</mn></mrow><mrow><mi>Q</mi></mrow></mfrac><mo>)</mo></mrow></math></span>; outside this parameter range, no algorithm performs a sublinear number of comparisons. Surprisingly, for constant <em>Q</em>, our algorithm performs expected <span><math><mi>O</mi><mo>(</mo><mfrac><mrow><mi>k</mi></mrow><mrow><mi>n</mi></mrow></mfrac><msup><mrow><mi>ε</mi></mrow><mrow><mo>−</mo><mn>2</mn></mrow></msup><mo>)</mo></math></span> comparisons with and without comparison faults, while for the exact selection problem, the expected number of comparisons is <span><math><mi>Θ</mi><mo>(</mo><mi>n</mi><mi>log</mi><mo>⁡</mo><mi>k</mi><mo>)</mo></math></span> with faults versus <span><math><mi>Θ</mi><mo>(</mo><mi>n</mi><mo>)</mo></math></span> without faults.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"155 ","pages":"Article 103699"},"PeriodicalIF":0.9,"publicationDate":"2025-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144886722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How to tamper with a Parliament: Strategic campaigns in apportionment elections 如何篡改议会:分配选举中的战略运动
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-08-08 DOI: 10.1016/j.jcss.2025.103700
Robert Bredereck , Piotr Faliszewski , Michał Furdyna , Andrzej Kaczmarczyk , Joanna Kaczmarek , Martin Lackner , Christian Laußmann , Jörg Rothe , Tessa Seeger
In parliamentary elections, parties compete for a limited, typically fixed number of seats. Most parliaments are assembled using apportionment methods that distribute the seats based on the parties' vote counts. Common apportionment methods include divisor sequence methods (like D'Hondt or Sainte-Laguë), the largest-remainder method, and first-past-the-post. In many countries, an electoral threshold is implemented to prevent very small parties from entering the parliament. Further, several countries have apportionment systems that incorporate multiple districts. We study how computationally hard it is to change the election outcome (i.e., to increase or limit the influence of a distinguished party) by convincing a limited number of voters to change their vote. We refer to these bribery-style attacks as strategic campaigns and study the corresponding problems in terms of their computational (both classical and parameterized) complexity. We also run extensive experiments on real-world election data and study the effectiveness of optimal campaigns, in particular as opposed to using heuristic bribing strategies and with respect to the influence of the threshold and the influence of the number of districts. For apportionment elections with threshold, finally, we propose—as an alternative to the standard top-choice mode—the second-chance mode where voters of parties below the threshold receive a second chance to vote for another party, and we establish computational complexity results also in this setting.
在议会选举中,各党派争夺有限的、通常是固定数量的席位。大多数议会都采用分配方法,根据各党派的得票数分配席位。常见的分配方法包括除数序列方法(如D'Hondt或Sainte-Laguë)、最大余数法和多数制方法。在许多国家,实行选举门槛是为了防止很小的政党进入议会。此外,一些国家的分配制度包括多个地区。我们研究了通过说服有限数量的选民改变他们的投票来改变选举结果(即增加或限制一个杰出政党的影响力)在计算上有多困难。我们将这些贿赂式攻击称为战略活动,并根据其计算(经典和参数化)复杂性研究相应的问题。我们还对现实世界的选举数据进行了广泛的实验,并研究了最优竞选活动的有效性,特别是与使用启发式贿赂策略相对的,以及关于阈值的影响和地区数量的影响。最后,对于有阈值的分配选举,我们提出了第二次机会模式,作为标准首选模式的替代方案,其中低于阈值的政党的选民获得第二次机会投票给另一个政党,我们也在这种设置中建立了计算复杂性结果。
{"title":"How to tamper with a Parliament: Strategic campaigns in apportionment elections","authors":"Robert Bredereck ,&nbsp;Piotr Faliszewski ,&nbsp;Michał Furdyna ,&nbsp;Andrzej Kaczmarczyk ,&nbsp;Joanna Kaczmarek ,&nbsp;Martin Lackner ,&nbsp;Christian Laußmann ,&nbsp;Jörg Rothe ,&nbsp;Tessa Seeger","doi":"10.1016/j.jcss.2025.103700","DOIUrl":"10.1016/j.jcss.2025.103700","url":null,"abstract":"<div><div>In parliamentary elections, parties compete for a limited, typically fixed number of seats. Most parliaments are assembled using apportionment methods that distribute the seats based on the parties' vote counts. Common apportionment methods include divisor sequence methods (like D'Hondt or Sainte-Laguë), the largest-remainder method, and first-past-the-post. In many countries, an electoral threshold is implemented to prevent very small parties from entering the parliament. Further, several countries have apportionment systems that incorporate multiple districts. We study how computationally hard it is to change the election outcome (i.e., to increase or limit the influence of a distinguished party) by convincing a limited number of voters to change their vote. We refer to these bribery-style attacks as <em>strategic campaigns</em> and study the corresponding problems in terms of their computational (both classical and parameterized) complexity. We also run extensive experiments on real-world election data and study the effectiveness of optimal campaigns, in particular as opposed to using heuristic bribing strategies and with respect to the influence of the threshold and the influence of the number of districts. For apportionment elections with threshold, finally, we propose—as an alternative to the standard top-choice mode—the second-chance mode where voters of parties below the threshold receive a second chance to vote for another party, and we establish computational complexity results also in this setting.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"155 ","pages":"Article 103700"},"PeriodicalIF":0.9,"publicationDate":"2025-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144864523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Corrections to “On the data complexity of consistent query answering over graph databases [Journal of Computer and System Sciences 88 (2017) 164–194]” 对“基于图形数据库的一致性查询应答的数据复杂性”的修正[Journal of Computer and System Sciences] 88 (2017) 164-194]
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-08-05 DOI: 10.1016/j.jcss.2025.103694
Pablo Barceló , Gaëlle Fontaine , Sylvain Salvati , Sophie Tison
Applications of graph databases are prone to inconsistency due to interoperability issues. This raises the need for studying query answering over inconsistent graph databases in a simple but general framework. We follow the approach of consistent query answering (CQA), and study its data complexity over graph databases for conjunctive regular-path queries (CRPQs) and conjunctive regular-path constraints (CRPCs). We deal with subset, superset and symmetric-difference repairs. Without restrictions, CQA is undecidable for the semantics of superset- and symmetric-difference repairs, and Π2P-complete for subset-repairs. However, we identify restrictions on CRPCs and databases that lead to decidability, and even tractability of CQA.
由于互操作性问题,图形数据库应用程序容易出现不一致。这就需要在一个简单而通用的框架中研究不一致图数据库的查询应答。本文采用一致性查询应答(CQA)方法,研究了合取正则路径查询(CRPQs)和合取正则路径约束(crpc)在图数据库上的数据复杂度。我们处理子集、超集和对称差分修复。在没有限制的情况下,CQA对于超集和对称差分修复的语义是不可判定的,对于子集修复的语义是Π2P-complete。然而,我们确定了crpc和数据库的限制,导致CQA的可判定性,甚至可追溯性。
{"title":"Corrections to “On the data complexity of consistent query answering over graph databases [Journal of Computer and System Sciences 88 (2017) 164–194]”","authors":"Pablo Barceló ,&nbsp;Gaëlle Fontaine ,&nbsp;Sylvain Salvati ,&nbsp;Sophie Tison","doi":"10.1016/j.jcss.2025.103694","DOIUrl":"10.1016/j.jcss.2025.103694","url":null,"abstract":"<div><div>Applications of graph databases are prone to inconsistency due to interoperability issues. This raises the need for studying query answering over inconsistent graph databases in a simple but general framework. We follow the approach of consistent query answering (CQA), and study its data complexity over graph databases for conjunctive regular-path queries (CRPQs) and conjunctive regular-path constraints (CRPCs). We deal with subset, superset and symmetric-difference repairs. Without restrictions, CQA is undecidable for the semantics of superset- and symmetric-difference repairs, and <span><math><msubsup><mrow><mi>Π</mi></mrow><mrow><mn>2</mn></mrow><mrow><mtext>P</mtext></mrow></msubsup></math></span>-complete for subset-repairs. However, we identify restrictions on CRPCs and databases that lead to decidability, and even tractability of CQA.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"155 ","pages":"Article 103694"},"PeriodicalIF":0.9,"publicationDate":"2025-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144772499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Triangle evacuation of 2 agents in the wireless model & the power of choosing a starting point 无线模型中2个智能体的三角疏散&起点选择的权力
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-07-31 DOI: 10.1016/j.jcss.2025.103695
Konstantinos Georgiou , Woojin Jang
The input to the Triangle Evacuation problem is a non-obtuse triangle ABC. A feasible solution is two unit-speed trajectories of mobile agents that start at some point on the perimeter and eventually visit every point on the perimeter of ABC. The goal is to find trajectories that minimize the evacuation cost, defined as the supremum, over all points T, of the time when T is first visited by one agent plus the distance from T to the other agent at that time. We introduce 4 different algorithmic problems arising by letting the starting edge and/or the starting point S on that edge to be chosen either by the algorithm or the adversary. To that end, we provide a tight analysis for the algorithm that has been proved to be optimal for the previously studied search domains, as well as we provide lower bounds for each of the problems.
三角形疏散问题的输入是一个非钝角三角形ABC。一个可行的解决方案是移动代理的两个单位速度轨迹,它们从圆周上的某一点开始,最终访问ABC圆周上的每一个点。目标是找到最小化疏散成本的轨迹,定义为在所有点T上,当一个智能体第一次访问T时加上此时从T到另一个智能体的距离。我们介绍了4种不同的算法问题,这些问题是由算法或对手选择起始边和/或该边的起始点S引起的。为此,我们对算法进行了严密的分析,该算法已被证明是先前研究的搜索域的最佳算法,并为每个问题提供了下界。
{"title":"Triangle evacuation of 2 agents in the wireless model & the power of choosing a starting point","authors":"Konstantinos Georgiou ,&nbsp;Woojin Jang","doi":"10.1016/j.jcss.2025.103695","DOIUrl":"10.1016/j.jcss.2025.103695","url":null,"abstract":"<div><div>The input to the <em>Triangle Evacuation</em> problem is a non-obtuse triangle <em>ABC</em>. A feasible solution is two unit-speed trajectories of mobile agents that start at some point on the perimeter and eventually visit every point on the perimeter of <em>ABC</em>. The goal is to find trajectories that minimize the evacuation cost, defined as the supremum, over all points <em>T</em>, of the time when <em>T</em> is first visited by one agent plus the distance from <em>T</em> to the other agent at that time. We introduce 4 different algorithmic problems arising by letting the starting edge and/or the starting point <em>S</em> on that edge to be chosen either by the algorithm or the adversary. To that end, we provide a tight analysis for the algorithm that has been proved to be optimal for the previously studied search domains, as well as we provide lower bounds for each of the problems.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"155 ","pages":"Article 103695"},"PeriodicalIF":0.9,"publicationDate":"2025-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144766445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online knapsack with removal and recourse 在线背包与移除和追索权
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-07-30 DOI: 10.1016/j.jcss.2025.103697
Hans-Joachim Böckenhauer , Ralf Klasing , Tobias Mömke , Peter Rossmanith , Moritz Stocker , David Wehner
We analyze the competitive ratio of the proportional online knapsack problem with removal and limited recourse. In contrast to the classical online knapsack problem, packed items can be removed and a limited number of removed items can be re-inserted to the knapsack. The variant with removal only was analyzed by Iwama and Taketomi (ICALP, 2002). We show that even a single use of recourse can improve the performance of an algorithm. We give lower bounds for a constant number of k1 uses of recourse in total, matching upper bounds for 1k3, and a general upper bound for any value of k. For a variant where a constant number of k1 uses of recourse can be used per step, we give tight bounds for all k1. We further look at a scenario where an algorithm is informed when the instance ends and give improved upper bounds in both variants for this case.
我们分析了具有移除和有限追索权的比例在线背包问题的竞争率。与经典的在线背包问题相比,打包好的物品可以被移除,并且被移除的物品数量有限,可以重新插入背包。Iwama和Taketomi (ICALP, 2002)对仅去除的变异进行了分析。我们表明,即使是单次使用追索权也可以提高算法的性能。我们给出了总k≥1个追索权使用次数为常数的下界,1≤k≤3的匹配上界,以及任意k值的一般上界。对于每步可以使用k≥1个追索权使用次数为常数的变体,我们给出了所有k≥1的紧界。我们进一步研究这样一种场景,即在实例结束时通知算法,并在这种情况下给出两种变体的改进上界。
{"title":"Online knapsack with removal and recourse","authors":"Hans-Joachim Böckenhauer ,&nbsp;Ralf Klasing ,&nbsp;Tobias Mömke ,&nbsp;Peter Rossmanith ,&nbsp;Moritz Stocker ,&nbsp;David Wehner","doi":"10.1016/j.jcss.2025.103697","DOIUrl":"10.1016/j.jcss.2025.103697","url":null,"abstract":"<div><div>We analyze the competitive ratio of the proportional online knapsack problem with removal and limited recourse. In contrast to the classical online knapsack problem, packed items can be removed and a limited number of removed items can be re-inserted to the knapsack. The variant with removal only was analyzed by Iwama and Taketomi (ICALP, 2002). We show that even a single use of recourse can improve the performance of an algorithm. We give lower bounds for a constant number of <span><math><mi>k</mi><mo>≥</mo><mn>1</mn></math></span> uses of recourse in total, matching upper bounds for <span><math><mn>1</mn><mo>≤</mo><mi>k</mi><mo>≤</mo><mn>3</mn></math></span>, and a general upper bound for any value of <em>k</em>. For a variant where a constant number of <span><math><mi>k</mi><mo>≥</mo><mn>1</mn></math></span> uses of recourse can be used per step, we give tight bounds for all <span><math><mi>k</mi><mo>≥</mo><mn>1</mn></math></span>. We further look at a scenario where an algorithm is informed when the instance ends and give improved upper bounds in both variants for this case.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"155 ","pages":"Article 103697"},"PeriodicalIF":0.9,"publicationDate":"2025-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144766444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Join and subgraph sampling under degree constraints 度约束下的联接和子图采样
IF 1.1 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-07-22 DOI: 10.1016/j.jcss.2025.103693
Ru Wang, Yufei Tao
This article studies two problems related to sampling from the results of database queries. The first one is to uniformly sample a tuple from the result of a join obeying an acyclic set of degree constraints (the join itself need not be acyclic). The second is to uniformly sample a given subgraph pattern's occurrence (the pattern may contain cycles) in a directed data graph. It is shown that, after a linear expected-time preprocessing, both problems admit an algorithm drawing a sample in O(polymat/max{1,OUT}) expected time, where OUT and polymat are the “full result size” and “polymatroid bound” of the underlying problem, respectively (assuming data complexity). These results are derived with a new sampling algorithm for the former problem and a new graph-theoretic theorem for the latter.
本文研究了与数据库查询结果抽样相关的两个问题。第一种方法是从遵循无环度约束集的连接的结果中统一采样一个元组(连接本身不必是无环的)。第二种方法是在有向数据图中对给定子图模式的出现(模式可能包含循环)进行统一采样。结果表明,经过线性预期时间预处理后,两个问题都允许在O(polymat/max ({1,OUT})预期时间内绘制样本的算法,其中OUT和polymat分别是底层问题的“完整结果大小”和“多边形界”(假设数据复杂性)。这些结果是用前一个问题的一种新的采样算法和后一个问题的一个新的图论定理得到的。
{"title":"Join and subgraph sampling under degree constraints","authors":"Ru Wang,&nbsp;Yufei Tao","doi":"10.1016/j.jcss.2025.103693","DOIUrl":"10.1016/j.jcss.2025.103693","url":null,"abstract":"<div><div>This article studies two problems related to sampling from the results of database queries. The first one is to uniformly sample a tuple from the result of a join obeying an acyclic set of degree constraints (the join itself need not be acyclic). The second is to uniformly sample a given subgraph pattern's occurrence (the pattern may contain cycles) in a directed data graph. It is shown that, after a linear expected-time preprocessing, both problems admit an algorithm drawing a sample in <span><math><mi>O</mi><mo>(</mo><mrow><mi>polymat</mi></mrow><mo>/</mo><mi>max</mi><mo>⁡</mo><mo>{</mo><mn>1</mn><mo>,</mo><mrow><mi>OUT</mi></mrow><mo>}</mo><mo>)</mo></math></span> expected time, where OUT and <em>polymat</em> are the “full result size” and “polymatroid bound” of the underlying problem, respectively (assuming data complexity). These results are derived with a new sampling algorithm for the former problem and a new graph-theoretic theorem for the latter.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"155 ","pages":"Article 103693"},"PeriodicalIF":1.1,"publicationDate":"2025-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144703370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parameterized approaches to orthogonal compaction 正交压缩的参数化方法
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-07-21 DOI: 10.1016/j.jcss.2025.103692
Walter Didimo , Siddharth Gupta , Philipp Kindermann , Giuseppe Liotta , Alexander Wolff , Meirav Zehavi
Orthogonal graph drawings are used in applications such as UML diagrams, VLSI layout, cable plans, and metro maps. We focus on drawing planar graphs and assume that we are given an orthogonal representation that describes the desired shape, but not the exact coordinates of a drawing. Our aim is to compute an orthogonal drawing on the grid that has the minimum area among all grid drawings that adhere to the given orthogonal representation. This problem is called orthogonal compaction (OC) and is known to be NP-hard, even for orthogonal representations of cycles [Evans et al. 2022]. We investigate the complexity of OC with respect to several parameters. Among others, we show that OC is fixed-parameter tractable with respect to the most natural of these parameters, namely, the number of kitty corners of the orthogonal representation: the presence of pairs of kitty corners in an orthogonal representation makes the OC problem hard. Informally speaking, a pair of kitty corners is a pair of reflex corners of a face that point at each other. Accordingly, the number of kitty corners is the number of corners that are involved in some pair of kitty corners.
正交图用于UML图、VLSI布局、电缆计划和地铁地图等应用程序。我们专注于绘制平面图形,并假设我们得到了描述所需形状的正交表示,但不是绘图的确切坐标。我们的目标是在网格上计算一个正交图,该图在所有坚持给定正交表示的网格图中具有最小的面积。这个问题被称为正交压缩(OC),即使对于循环的正交表示也是np困难的[Evans等人,2022]。我们研究了OC相对于几个参数的复杂性。其中,我们证明了OC对于这些最自然的参数,即正交表示的kitty角的数量是固定参数可处理的:正交表示中kitty角对的存在使OC问题变得困难。非正式地说,一对猫咪角是一对互相指向对方的面部反射角。因此,猫咪角的数量是一些猫咪角对所涉及的角的数量。
{"title":"Parameterized approaches to orthogonal compaction","authors":"Walter Didimo ,&nbsp;Siddharth Gupta ,&nbsp;Philipp Kindermann ,&nbsp;Giuseppe Liotta ,&nbsp;Alexander Wolff ,&nbsp;Meirav Zehavi","doi":"10.1016/j.jcss.2025.103692","DOIUrl":"10.1016/j.jcss.2025.103692","url":null,"abstract":"<div><div>Orthogonal graph drawings are used in applications such as UML diagrams, VLSI layout, cable plans, and metro maps. We focus on drawing planar graphs and assume that we are given an <em>orthogonal representation</em> that describes the desired shape, but not the exact coordinates of a drawing. Our aim is to compute an orthogonal drawing on the grid that has the minimum area among all grid drawings that adhere to the given orthogonal representation. This problem is called orthogonal compaction (<span>OC</span>) and is known to be NP-hard, even for orthogonal representations of cycles [Evans et al. 2022]. We investigate the complexity of <span>OC</span> with respect to several parameters. Among others, we show that <span>OC</span> is fixed-parameter tractable with respect to the most natural of these parameters, namely, the number of <em>kitty corners</em> of the orthogonal representation: the presence of pairs of kitty corners in an orthogonal representation makes the <span>OC</span> problem hard. Informally speaking, a pair of kitty corners is a pair of reflex corners of a face that point at each other. Accordingly, the number of kitty corners is the number of corners that are involved in some pair of kitty corners.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"155 ","pages":"Article 103692"},"PeriodicalIF":0.9,"publicationDate":"2025-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144739439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sequentially swapping tokens: Further on graph classes 顺序交换令牌:进一步介绍图类
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-07-17 DOI: 10.1016/j.jcss.2025.103691
Hironori Kiya , Yuto Okada , Hirotaka Ono , Yota Otachi
In this paper, we study Sequential Token Swapping, which can be seen as a variant of the generalized 15 puzzle. Given a graph and two token placements on the vertices, the problem asks to find a walk of the minimum length (if any exists) such that the sequence of token swappings along the walk obtains one of the given token placements from the other one. This problem was introduced by Yamanaka et al. [JGAA 2019], who showed that the problem is intractable in general but polynomial-time solvable for trees, complete graphs, and cycles. In this paper, we present a polynomial-time algorithm for block-cactus graphs, which include all previously known cases. We also present general tools for showing the hardness of the problem on restricted graph classes such as chordal graphs and chordal bipartite graphs. We also show that the problem is hard on grids and king's graphs, which are the graphs corresponding to the 15 puzzle and its variant with relaxed moves.
在本文中,我们研究了顺序令牌交换,它可以看作是广义15难题的一种变体。给定一个图和顶点上的两个令牌放置位置,问题要求找到最小长度的遍历(如果存在的话),使得沿遍历的令牌交换序列从另一个给定的令牌放置位置中获得一个。这个问题是由Yamanaka等人提出的[JGAA 2019],他们表明这个问题一般来说是难以解决的,但对于树、完全图和循环来说是多项式时间可解的。在本文中,我们提出了一个多项式时间算法的块仙人掌图,其中包括所有已知的情况。我们也提供一般的工具来显示问题在受限图类,如弦图和弦二部图的硬度。我们还表明,这个问题在网格和国王图上是困难的,这是与15个谜题及其变体相对应的图,具有放松的移动。
{"title":"Sequentially swapping tokens: Further on graph classes","authors":"Hironori Kiya ,&nbsp;Yuto Okada ,&nbsp;Hirotaka Ono ,&nbsp;Yota Otachi","doi":"10.1016/j.jcss.2025.103691","DOIUrl":"10.1016/j.jcss.2025.103691","url":null,"abstract":"<div><div>In this paper, we study <span>Sequential Token Swapping</span>, which can be seen as a variant of the generalized 15 puzzle. Given a graph and two token placements on the vertices, the problem asks to find a walk of the minimum length (if any exists) such that the sequence of token swappings along the walk obtains one of the given token placements from the other one. This problem was introduced by Yamanaka et al. [JGAA 2019], who showed that the problem is intractable in general but polynomial-time solvable for trees, complete graphs, and cycles. In this paper, we present a polynomial-time algorithm for block-cactus graphs, which include all previously known cases. We also present general tools for showing the hardness of the problem on restricted graph classes such as chordal graphs and chordal bipartite graphs. We also show that the problem is hard on grids and king's graphs, which are the graphs corresponding to the 15 puzzle and its variant with relaxed moves.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"155 ","pages":"Article 103691"},"PeriodicalIF":0.9,"publicationDate":"2025-07-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144766443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the complexity of rainbow vertex colouring diametral path graphs 关于彩虹顶点对直径路径图着色的复杂性
IF 1.1 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-07-03 DOI: 10.1016/j.jcss.2025.103683
Jakob Dyrseth , Paloma T. de Lima
Given a graph and a colouring of its vertices, a rainbow path is a path such that all its internal nodes are coloured distinctly. A graph is rainbow vertex-connected if between every pair of vertices there exists a rainbow path. We study the problem of deciding whether a graph can be coloured using k colours such that it is rainbow vertex-connected. Heggernes et al. (MFCS, 2018) conjectured that if every induced subgraph in G has a dominating diametral path, then G can always be rainbow coloured with diam(G)1 colours. We confirm their conjecture for chordal, bipartite and claw-free diametral path graphs. We complement these results by showing the conjecture does not hold without the condition on every induced subgraph. In this case, even though diam(G) colours are enough, it is NP-complete to determine whether a graph with a dominating diametral path of length three can be rainbow coloured with two colours.
给定一个图形及其顶点的颜色,彩虹路径是这样一条路径,它的所有内部节点都有不同的颜色。如果在每一对顶点之间存在彩虹路径,则图是彩虹顶点连通的。我们研究了一个图是否可以用k种颜色着色,使得它是彩虹顶点连通的问题。Heggernes等人(MFCS, 2018)推测,如果G中的每个诱导子图都有一个主导直径路径,那么G总是可以用直径(G)−1的颜色呈现彩虹色。我们对弦、二部和无爪的径路图证实了他们的猜想。我们通过证明该猜想在每个诱导子图上都不成立来补充这些结果。在这种情况下,即使直径(G)的颜色就足够了,但要确定一个主要直径路径长度为3的图是否可以用两种颜色着色,这是np完全的。
{"title":"On the complexity of rainbow vertex colouring diametral path graphs","authors":"Jakob Dyrseth ,&nbsp;Paloma T. de Lima","doi":"10.1016/j.jcss.2025.103683","DOIUrl":"10.1016/j.jcss.2025.103683","url":null,"abstract":"<div><div>Given a graph and a colouring of its vertices, a rainbow path is a path such that all its internal nodes are coloured distinctly. A graph is rainbow vertex-connected if between every pair of vertices there exists a rainbow path. We study the problem of deciding whether a graph can be coloured using <em>k</em> colours such that it is rainbow vertex-connected. Heggernes et al. (MFCS, 2018) conjectured that if every induced subgraph in <em>G</em> has a dominating diametral path, then <em>G</em> can always be rainbow coloured with <span><math><mrow><mi>diam</mi></mrow><mo>(</mo><mi>G</mi><mo>)</mo><mo>−</mo><mn>1</mn></math></span> colours. We confirm their conjecture for chordal, bipartite and claw-free diametral path graphs. We complement these results by showing the conjecture does not hold without the condition on <em>every</em> induced subgraph. In this case, even though <span><math><mrow><mi>diam</mi></mrow><mo>(</mo><mi>G</mi><mo>)</mo></math></span> colours are enough, it is NP-complete to determine whether a graph with a dominating diametral path of length three can be rainbow coloured with two colours.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"155 ","pages":"Article 103683"},"PeriodicalIF":1.1,"publicationDate":"2025-07-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144572748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Computer and System Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1