Pub Date : 2023-10-18DOI: 10.1016/j.jcss.2023.103492
Keqin Li
We treat user equipments (UEs) and mobile edge clouds (MECs) as M/G/1 queueing systems, which are the most suitable, powerful, and manageable models. We propose a computation offloading strategy which can satisfy all UEs served by an MEC and develop an efficient method to find such a strategy. We use discrete-time Markov chains, continuous-time Markov chains, and semi-Markov processes to characterize the mobility of UEs, and calculate the joint probability distribution of the locations of UEs at any time. We extend our Markov chains to incorporate mobility cost into consideration, and are able to obtain the average response time of a UE with location change penalty. We can algorithmically predict the overall average response time of tasks generated on a UE and also demonstrate numerical data and examples. We consider the power constrained MEC speed setting problem and develop an algorithm to solve the problem for two power consumption models.
{"title":"Performance modeling and analysis for randomly walking mobile users with Markov chains","authors":"Keqin Li","doi":"10.1016/j.jcss.2023.103492","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.103492","url":null,"abstract":"<div><p>We treat user equipments (UEs) and mobile edge clouds (MECs) as M/G/1 queueing systems, which are the most suitable, powerful, and manageable models. We propose a computation offloading strategy which can satisfy all UEs served by an MEC and develop an efficient method to find such a strategy. We use discrete-time Markov chains, continuous-time Markov chains, and semi-Markov processes to characterize the mobility of UEs, and calculate the joint probability distribution of the locations of UEs at any time. We extend our Markov chains to incorporate mobility cost into consideration, and are able to obtain the average response time of a UE with location change penalty. We can algorithmically predict the overall average response time of tasks generated on a UE and also demonstrate numerical data and examples. We consider the power constrained MEC speed setting problem and develop an algorithm to solve the problem for two power consumption models.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"140 ","pages":"Article 103492"},"PeriodicalIF":1.1,"publicationDate":"2023-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"91987534","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-10-04DOI: 10.1016/j.jcss.2023.103480
Katharina T. Huber , Leo van Iersel , Remie Janssen , Mark Jones , Vincent Moulton , Yukihiro Murakami , Charles Semple
This paper studies the relationship between undirected (unrooted) and directed (rooted) phylogenetic networks. We describe a polynomial-time algorithm for deciding whether an undirected nonbinary phylogenetic network, given the locations of the root and reticulation vertices, can be oriented as a directed nonbinary phylogenetic network. Moreover, we characterize when this is possible and show that, in such instances, the resulting directed nonbinary phylogenetic network is unique. In addition, without being given the location of the root and the reticulation vertices, we describe an algorithm for deciding whether an undirected binary phylogenetic network N can be oriented as a directed binary phylogenetic network of a certain class. The algorithm is fixed-parameter tractable (FPT) when the parameter is the level of N and is applicable to classes of directed phylogenetic networks that satisfy certain conditions. As an example, we show that the well-studied class of binary tree-child networks satisfies these conditions.
{"title":"Orienting undirected phylogenetic networks","authors":"Katharina T. Huber , Leo van Iersel , Remie Janssen , Mark Jones , Vincent Moulton , Yukihiro Murakami , Charles Semple","doi":"10.1016/j.jcss.2023.103480","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.103480","url":null,"abstract":"<div><p>This paper studies the relationship between undirected (unrooted) and directed (rooted) phylogenetic networks. We describe a polynomial-time algorithm for deciding whether an undirected nonbinary phylogenetic network, given the locations of the root and reticulation vertices, can be oriented as a directed nonbinary phylogenetic network. Moreover, we characterize when this is possible and show that, in such instances, the resulting directed nonbinary phylogenetic network is unique. In addition, without being given the location of the root and the reticulation vertices, we describe an algorithm for deciding whether an undirected binary phylogenetic network <em>N</em> can be oriented as a directed binary phylogenetic network of a certain class. The algorithm is fixed-parameter tractable (FPT) when the parameter is the level of <em>N</em> and is applicable to classes of directed phylogenetic networks that satisfy certain conditions. As an example, we show that the well-studied class of binary tree-child networks satisfies these conditions.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"140 ","pages":"Article 103480"},"PeriodicalIF":1.1,"publicationDate":"2023-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49738295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-29DOI: 10.1016/j.jcss.2023.103481
Philipp Czerner, Roland Guttenberg, Martin Helfrich, Javier Esparza
In their 2006 seminal paper in Distributed Computing, Angluin et al. present a construction that, given any Presburger predicate, outputs a leaderless population protocol that decides the predicate. The protocol for a predicate of size m runs in expected number of interactions, which is almost optimal in n, the number of interacting agents. However, the number of states is exponential in m. Blondin et al. presented at STACS 2020 another construction that produces protocols with a polynomial number of states, but exponential expected number of interactions. We present a construction that produces protocols with states that run in expected interactions, optimal in n, for all inputs of size . For this, we introduce population computers, a generalization of population protocols, and show that our computers for Presburger predicates can be translated into fast and succinct population protocols.
{"title":"Fast and succinct population protocols for Presburger arithmetic","authors":"Philipp Czerner, Roland Guttenberg, Martin Helfrich, Javier Esparza","doi":"10.1016/j.jcss.2023.103481","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.103481","url":null,"abstract":"<div><p><span>In their 2006 seminal paper in Distributed Computing, Angluin et al. present a construction that, given any Presburger predicate, outputs a leaderless population protocol that decides the predicate. The protocol for a predicate of size </span><em>m</em> runs in <span><math><mi>O</mi><mo>(</mo><mi>m</mi><mo>⋅</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></msup><mi>log</mi><mo></mo><mi>n</mi><mo>)</mo></math></span> expected number of interactions, which is almost optimal in <em>n</em>, the number of interacting agents. However, the number of states is exponential in <em>m</em>. Blondin et al. presented at STACS 2020 another construction that produces protocols with a polynomial number of states, but exponential expected number of interactions. We present a construction that produces protocols with <span><math><mi>O</mi><mo>(</mo><mi>m</mi><mo>)</mo></math></span> states that run in expected <span><math><mi>O</mi><mo>(</mo><msup><mrow><mi>m</mi></mrow><mrow><mn>7</mn></mrow></msup><mo>⋅</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>)</mo></math></span> interactions, optimal in <em>n</em>, for all inputs of size <span><math><mi>Ω</mi><mo>(</mo><mi>m</mi><mo>)</mo></math></span>. For this, we introduce population computers, a generalization of population protocols, and show that our computers for Presburger predicates can be translated into fast and succinct population protocols.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"140 ","pages":"Article 103481"},"PeriodicalIF":1.1,"publicationDate":"2023-09-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"92122519","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-26DOI: 10.1016/j.jcss.2023.103477
Elise Deen , Leo van Iersel , Remie Janssen , Mark Jones , Yukihiro Murakami , Norbert Zeh
The maximum parsimony distance and the bounded-state maximum parsimony distance measure the difference between two phylogenetic trees in terms of the maximum difference between their parsimony scores for any character (with t a bound on the number of states in the character, in the case of ). While computing was previously shown to be fixed-parameter tractable with a linear kernel, no such result was known for . In this paper, we prove that computing is fixed-parameter tractable for all t. Specifically, we prove that this problem has a kernel of size , where . As the primary analysis tool, we introduce the concept of leg-disjoint incompatible quartets, which may be of independent interest.
{"title":"A near-linear kernel for bounded-state parsimony distance","authors":"Elise Deen , Leo van Iersel , Remie Janssen , Mark Jones , Yukihiro Murakami , Norbert Zeh","doi":"10.1016/j.jcss.2023.103477","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.103477","url":null,"abstract":"<div><p>The maximum parsimony distance <span><math><msub><mrow><mi>d</mi></mrow><mrow><mtext>MP</mtext></mrow></msub><mo>(</mo><msub><mrow><mi>T</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><msub><mrow><mi>T</mi></mrow><mrow><mn>2</mn></mrow></msub><mo>)</mo></math></span> and the bounded-state maximum parsimony distance <span><math><msubsup><mrow><mi>d</mi></mrow><mrow><mtext>MP</mtext></mrow><mrow><mi>t</mi></mrow></msubsup><mo>(</mo><msub><mrow><mi>T</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><msub><mrow><mi>T</mi></mrow><mrow><mn>2</mn></mrow></msub><mo>)</mo></math></span> measure the difference between two phylogenetic trees <span><math><msub><mrow><mi>T</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><msub><mrow><mi>T</mi></mrow><mrow><mn>2</mn></mrow></msub></math></span> in terms of the maximum difference between their parsimony scores for any character (with <em>t</em> a bound on the number of states in the character, in the case of <span><math><msubsup><mrow><mi>d</mi></mrow><mrow><mtext>MP</mtext></mrow><mrow><mi>t</mi></mrow></msubsup><mo>(</mo><msub><mrow><mi>T</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><msub><mrow><mi>T</mi></mrow><mrow><mn>2</mn></mrow></msub><mo>)</mo></math></span>). While computing <span><math><msub><mrow><mi>d</mi></mrow><mrow><mtext>MP</mtext></mrow></msub><mo>(</mo><msub><mrow><mi>T</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><msub><mrow><mi>T</mi></mrow><mrow><mn>2</mn></mrow></msub><mo>)</mo></math></span> was previously shown to be fixed-parameter tractable with a linear kernel, no such result was known for <span><math><msubsup><mrow><mi>d</mi></mrow><mrow><mtext>MP</mtext></mrow><mrow><mi>t</mi></mrow></msubsup><mo>(</mo><msub><mrow><mi>T</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><msub><mrow><mi>T</mi></mrow><mrow><mn>2</mn></mrow></msub><mo>)</mo></math></span>. In this paper, we prove that computing <span><math><msubsup><mrow><mi>d</mi></mrow><mrow><mtext>MP</mtext></mrow><mrow><mi>t</mi></mrow></msubsup><mo>(</mo><msub><mrow><mi>T</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><msub><mrow><mi>T</mi></mrow><mrow><mn>2</mn></mrow></msub><mo>)</mo></math></span> is fixed-parameter tractable for all <em>t</em>. Specifically, we prove that this problem has a kernel of size <span><math><mi>O</mi><mo>(</mo><mi>k</mi><mi>lg</mi><mo></mo><mi>k</mi><mo>)</mo></math></span>, where <span><math><mi>k</mi><mo>=</mo><msubsup><mrow><mi>d</mi></mrow><mrow><mtext>MP</mtext></mrow><mrow><mi>t</mi></mrow></msubsup><mo>(</mo><msub><mrow><mi>T</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><msub><mrow><mi>T</mi></mrow><mrow><mn>2</mn></mrow></msub><mo>)</mo></math></span>. As the primary analysis tool, we introduce the concept of leg-disjoint incompatible quartets, which may be of independent interest.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"140 ","pages":"Article 103477"},"PeriodicalIF":1.1,"publicationDate":"2023-09-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49726020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-15DOI: 10.1016/j.jcss.2023.103478
Miroslav Chodil, Antonín Kučera
We propose a generic method for proving the decidability of the finite satisfiability problem for PCTL fragments and demonstrate its applicability in several non-trivial examples.
{"title":"The satisfiability problem for a quantitative fragment of PCTL","authors":"Miroslav Chodil, Antonín Kučera","doi":"10.1016/j.jcss.2023.103478","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.103478","url":null,"abstract":"<div><p>We propose a generic method for proving the decidability of the finite satisfiability problem for PCTL fragments and demonstrate its applicability in several non-trivial examples.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"139 ","pages":"Article 103478"},"PeriodicalIF":1.1,"publicationDate":"2023-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725834","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-12DOI: 10.1016/j.jcss.2023.103479
René van Bevern , Artem M. Kirilin , Daniel A. Skachkov , Pavel V. Smirnov , Oxana Yu. Tsidulko
The NP-hard Multiple Hitting Set problem is the problem of finding a minimum-cardinality set intersecting each of the sets in a given input collection a given number of times. Generalizing a well-known data reduction algorithm due to Weihe, we show a problem kernel for Multiple Hitting Set parameterized by the Dilworth number, a graph parameter introduced by Foldes and Hammer in 1978 yet seemingly so far unexplored in the context of parameterized complexity theory. Using matrix multiplication, we speed up the algorithm to quadratic sequential time and logarithmic parallel time. We experimentally evaluate our algorithms. By implementing our algorithm on GPUs, we show the feasibility of realizing kernelization algorithms on SIMD (Single Instruction, Multiple Data) architectures.
{"title":"Serial and parallel kernelization of Multiple Hitting Set parameterized by the Dilworth number, implemented on the GPU","authors":"René van Bevern , Artem M. Kirilin , Daniel A. Skachkov , Pavel V. Smirnov , Oxana Yu. Tsidulko","doi":"10.1016/j.jcss.2023.103479","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.103479","url":null,"abstract":"<div><p>The NP-hard Multiple Hitting Set problem is the problem of finding a minimum-cardinality set intersecting each of the sets in a given input collection a given number of times. Generalizing a well-known data reduction<span> algorithm due to Weihe, we show a problem kernel for Multiple Hitting Set parameterized by the Dilworth number, a graph parameter introduced by Foldes and Hammer in 1978 yet seemingly so far unexplored in the context of parameterized complexity theory. Using matrix multiplication, we speed up the algorithm to quadratic sequential time and logarithmic parallel time. We experimentally evaluate our algorithms. By implementing our algorithm on GPUs, we show the feasibility of realizing kernelization algorithms on SIMD (Single Instruction, Multiple Data) architectures.</span></p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"139 ","pages":"Article 103479"},"PeriodicalIF":1.1,"publicationDate":"2023-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.1016/j.jcss.2023.03.007
Lukas Behrendt , Katrin Casel , Tobias Friedrich , J.A. Gregor Lagodzinski , Alexander Löser , Marcus Wilhelm
We generalize the tree doubling and Christofides algorithm to parameterized approximations for ATSP (constant factor approximations that invest more runtime with respect to a chosen parameter). The parameters we consider are upper bounded by the number of asymmetric distances, which yields algorithms to efficiently compute good approximations for moderately asymmetric TSP instances. As generalization of the Christofides algorithm, we derive a parameterized 2.5-approximation, with the size of a vertex cover for the subgraph induced by the edges with asymmetric distances as parameter. Our generalization of tree doubling gives a parameterized 3-approximation, where the parameter is the minimum number of asymmetric distances in a minimum spanning arborescence. Further, we combine these with a notion of symmetry relaxation which allows to trade approximation guarantee for runtime. Since the parameters we consider are theoretically incomparable, we present experimental results showing that generalized tree doubling frequently outperforms generalized Christofides with respect to parameter size.
{"title":"From symmetry to asymmetry: Generalizing TSP approximations by parametrization","authors":"Lukas Behrendt , Katrin Casel , Tobias Friedrich , J.A. Gregor Lagodzinski , Alexander Löser , Marcus Wilhelm","doi":"10.1016/j.jcss.2023.03.007","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.03.007","url":null,"abstract":"<div><p><span>We generalize the tree doubling and Christofides algorithm to parameterized approximations for ATSP (constant factor approximations that invest more runtime with respect to a chosen parameter). The parameters we consider are upper bounded by the number of </span><em>asymmetric distances</em><span>, which yields algorithms to efficiently compute good approximations for moderately asymmetric TSP instances. As generalization of the Christofides algorithm, we derive a parameterized 2.5-approximation, with the size of a vertex cover for the subgraph induced by the edges with asymmetric distances as parameter. Our generalization of tree doubling gives a parameterized 3-approximation, where the parameter is the minimum number of asymmetric distances in a minimum spanning arborescence. Further, we combine these with a notion of symmetry relaxation which allows to trade approximation guarantee for runtime. Since the parameters we consider are theoretically incomparable, we present experimental results showing that generalized tree doubling frequently outperforms generalized Christofides with respect to parameter size.</span></p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 157-170"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.1016/j.jcss.2023.04.001
Julio Aracena , Adrien Richard , Lilian Salinas
The asynchronous automaton of a Boolean network , considered in many applications, is the finite deterministic automaton where the set of states is , the alphabet is , and the action of letter i on a state x consists in either switching the ith component if or doing nothing otherwise. In this paper, we ask for the existence of synchronizing words for this automaton, and their minimal length, when f is the and-net over an arc-signed digraph G on : for every , if and only if () for every positive (negative) arc from j to i. Our main result is that if G is strongly connected and has no positive cycles, then either there exists a synchronizing word of length at most or G is a cycle and there are no synchronizing words. We also give complexity results showing that the situation is much more complex if one of the two hypothesis made on G is removed.
{"title":"Synchronizing Boolean networks asynchronously","authors":"Julio Aracena , Adrien Richard , Lilian Salinas","doi":"10.1016/j.jcss.2023.04.001","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.04.001","url":null,"abstract":"<div><p>The <span><em>asynchronous </em><em>automaton</em></span> of a Boolean network <span><math><mi>f</mi><mo>:</mo><msup><mrow><mo>{</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>}</mo></mrow><mrow><mi>n</mi></mrow></msup><mo>→</mo><msup><mrow><mo>{</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>}</mo></mrow><mrow><mi>n</mi></mrow></msup></math></span><span>, considered in many applications, is the finite deterministic automaton where the set of states is </span><span><math><msup><mrow><mo>{</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>}</mo></mrow><mrow><mi>n</mi></mrow></msup></math></span>, the alphabet is <span><math><mo>[</mo><mi>n</mi><mo>]</mo></math></span>, and the action of letter <em>i</em> on a state <em>x</em> consists in either switching the <em>i</em>th component if <span><math><msub><mrow><mi>f</mi></mrow><mrow><mi>i</mi></mrow></msub><mo>(</mo><mi>x</mi><mo>)</mo><mo>≠</mo><msub><mrow><mi>x</mi></mrow><mrow><mi>i</mi></mrow></msub></math></span> or doing nothing otherwise. In this paper, we ask for the existence of synchronizing words for this automaton, and their minimal length, when <em>f</em><span> is the and-net over an arc-signed digraph </span><em>G</em> on <span><math><mo>[</mo><mi>n</mi><mo>]</mo></math></span>: for every <span><math><mi>i</mi><mo>∈</mo><mo>[</mo><mi>n</mi><mo>]</mo></math></span>, <span><math><msub><mrow><mi>f</mi></mrow><mrow><mi>i</mi></mrow></msub><mo>(</mo><mi>x</mi><mo>)</mo><mo>=</mo><mn>1</mn></math></span> if and only if <span><math><msub><mrow><mi>x</mi></mrow><mrow><mi>j</mi></mrow></msub><mo>=</mo><mn>1</mn></math></span> (<span><math><msub><mrow><mi>x</mi></mrow><mrow><mi>j</mi></mrow></msub><mo>≠</mo><mn>0</mn></math></span>) for every positive (negative) arc from <em>j</em> to <em>i</em>. Our main result is that if <em>G</em> is strongly connected and has no positive cycles, then either there exists a synchronizing word of length at most <span><math><mn>10</mn><msup><mrow><mo>(</mo><msqrt><mrow><mn>5</mn></mrow></msqrt><mo>+</mo><mn>1</mn><mo>)</mo></mrow><mrow><mi>n</mi></mrow></msup></math></span> or <em>G</em> is a cycle and there are no synchronizing words. We also give complexity results showing that the situation is much more complex if one of the two hypothesis made on <em>G</em> is removed.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 249-279"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49738231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.1016/j.jcss.2023.03.005
Christel Baier , Stefan Kiefer , Joachim Klein , David Müller , James Worrell
Unambiguous automata are nondeterministic automata in which every word has at most one accepting run. In this paper we give a polynomial-time algorithm for model checking discrete-time Markov chains against ω-regular specifications represented as unambiguous automata. We furthermore show that the complexity of this model checking problem lies in NC: the subclass of P comprising those problems solvable in poly-logarithmic parallel time. These complexity bounds match the known bounds for model checking Markov chains against specifications given as deterministic automata, notwithstanding the fact that unambiguous automata can be exponentially more succinct than deterministic automata. We report on an implementation of our procedure, including an experiment in which the implementation is used to model check LTL formulas on Markov chains.
{"title":"Markov chains and unambiguous automata","authors":"Christel Baier , Stefan Kiefer , Joachim Klein , David Müller , James Worrell","doi":"10.1016/j.jcss.2023.03.005","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.03.005","url":null,"abstract":"<div><p>Unambiguous automata are nondeterministic automata in which every word has at most one accepting run. In this paper we give a polynomial-time algorithm for model checking discrete-time Markov chains against <em>ω</em>-regular specifications represented as unambiguous automata. We furthermore show that the complexity of this model checking problem lies in NC: the subclass of P comprising those problems solvable in poly-logarithmic parallel time. These complexity bounds match the known bounds for model checking Markov chains against specifications given as deterministic automata, notwithstanding the fact that unambiguous automata can be exponentially more succinct than deterministic automata. We report on an implementation of our procedure, including an experiment in which the implementation is used to model check LTL formulas on Markov chains.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 113-134"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.1016/j.jcss.2023.03.002
David Caballero , Timothy Gomez , Robert Schweller , Tim Wylie
We analyze the complexity of two fundamental verification problems within a generalization of the two-handed tile self-assembly model (2HAM) where initial system assemblies are not restricted to be singleton tiles, but may be larger prebuilt assemblies. Within this model we consider the producibility problem, which asks if a given tile system builds, or produces, a given assembly, and the unique assembly verification (UAV) problem, which asks if a given system uniquely produces a given assembly. We show that producibility is NP-complete and UAV is coNP-complete even when the initial assembly size and temperature threshold are both bounded by a constant. This is in stark contrast to results in the standard model with singleton input tiles where producibility is in P and UAV is coNP-complete with constant temperature. We further provide preliminary polynomial time results for producibility and UAV in the case of 1-dimensional linear assemblies with pre-built assemblies, as well as extend our results to the abstract Tile Assembly Model (aTAM) with constant-size attachable assemblies.
{"title":"Complexity of verification in self-assembly with prebuilt assemblies","authors":"David Caballero , Timothy Gomez , Robert Schweller , Tim Wylie","doi":"10.1016/j.jcss.2023.03.002","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.03.002","url":null,"abstract":"<div><p><span>We analyze the complexity of two fundamental verification problems within a generalization of the two-handed tile self-assembly model (2HAM) where initial system assemblies are not restricted to be singleton tiles, but may be larger prebuilt assemblies. Within this model we consider the </span><em>producibility</em> problem, which asks if a given tile system builds, or produces, a given assembly, and the <em>unique assembly verification</em> (UAV) problem, which asks if a given system <em>uniquely</em> produces a given assembly. We show that producibility is NP-complete and UAV is coNP<span><math><msup><mrow></mrow><mrow><mi>N</mi><mi>P</mi></mrow></msup></math></span><span>-complete even when the initial assembly size and temperature threshold are both bounded by a constant. This is in stark contrast to results in the standard model with singleton input tiles where producibility is in P and UAV is coNP-complete with constant temperature. We further provide preliminary polynomial time results for producibility and UAV in the case of 1-dimensional </span><em>linear</em> assemblies with pre-built assemblies, as well as extend our results to the abstract Tile Assembly Model (aTAM) with constant-size attachable assemblies.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 1-16"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49752946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}