首页 > 最新文献

Journal of Computer and System Sciences最新文献

英文 中文
Approximately covering vertices by order-5 or longer paths 通过o -5或更长的路径近似地覆盖顶点
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-09-03 DOI: 10.1016/j.jcss.2025.103704
Mingyang Gong , Zhi-Zhong Chen , Guohui Lin , Lusheng Wang
This paper studies MPCv5+, which is to cover as many vertices as possible in a given graph G=(V,E) by vertex-disjoint 5+-paths (i.e., paths each with at least five vertices). MPCv5+ is NP-hard and admits an existing local-search-based approximation algorithm which achieves a ratio of 1972.714 and runs in O(|V|6) time. In this paper, we present a new approximation algorithm for MPCv5+ which achieves a ratio of 2.511 and runs in O(|V|2.5|E|2) time. Unlike the previous algorithm, the new algorithm is based on maximum matching, maximum path-cycle cover, and recursion.
本文研究MPCv5+,即在给定的图G=(V,E)中,通过顶点不相交的5+路径(即每条路径至少有5个顶点)覆盖尽可能多的顶点。MPCv5+是NP-hard的,允许现有的基于局部搜索的近似算法,该算法的比率为197≈2.714,运行时间为O(|V|6)。在本文中,我们提出了一种新的MPCv5+近似算法,该算法实现了2.511的比率,运行时间为0 (|V|2.5|E|2)。与之前的算法不同,新算法基于最大匹配、最大路径循环覆盖和递归。
{"title":"Approximately covering vertices by order-5 or longer paths","authors":"Mingyang Gong ,&nbsp;Zhi-Zhong Chen ,&nbsp;Guohui Lin ,&nbsp;Lusheng Wang","doi":"10.1016/j.jcss.2025.103704","DOIUrl":"10.1016/j.jcss.2025.103704","url":null,"abstract":"<div><div>This paper studies <span><math><mi>M</mi><mi>P</mi><msubsup><mrow><mi>C</mi></mrow><mrow><mi>v</mi></mrow><mrow><mn>5</mn><mo>+</mo></mrow></msubsup></math></span>, which is to cover as many vertices as possible in a given graph <span><math><mi>G</mi><mo>=</mo><mo>(</mo><mi>V</mi><mo>,</mo><mi>E</mi><mo>)</mo></math></span> by vertex-disjoint <span><math><msup><mrow><mn>5</mn></mrow><mrow><mo>+</mo></mrow></msup></math></span>-paths (i.e., paths each with at least five vertices). <span><math><mi>M</mi><mi>P</mi><msubsup><mrow><mi>C</mi></mrow><mrow><mi>v</mi></mrow><mrow><mn>5</mn><mo>+</mo></mrow></msubsup></math></span> is NP-hard and admits an existing local-search-based approximation algorithm which achieves a ratio of <span><math><mfrac><mrow><mn>19</mn></mrow><mrow><mn>7</mn></mrow></mfrac><mo>≈</mo><mn>2.714</mn></math></span> and runs in <span><math><mi>O</mi><mo>(</mo><mo>|</mo><mi>V</mi><msup><mrow><mo>|</mo></mrow><mrow><mn>6</mn></mrow></msup><mo>)</mo></math></span> time. In this paper, we present a new approximation algorithm for <span><math><mi>M</mi><mi>P</mi><msubsup><mrow><mi>C</mi></mrow><mrow><mi>v</mi></mrow><mrow><mn>5</mn><mo>+</mo></mrow></msubsup></math></span> which achieves a ratio of 2.511 and runs in <span><math><mi>O</mi><mo>(</mo><mo>|</mo><mi>V</mi><msup><mrow><mo>|</mo></mrow><mrow><mn>2.5</mn></mrow></msup><mo>|</mo><mi>E</mi><msup><mrow><mo>|</mo></mrow><mrow><mn>2</mn></mrow></msup><mo>)</mo></math></span> time. Unlike the previous algorithm, the new algorithm is based on maximum matching, maximum path-cycle cover, and recursion.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"156 ","pages":"Article 103704"},"PeriodicalIF":0.9,"publicationDate":"2025-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144997693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Temporal Reachability Dominating Sets: Contagion in temporal graphs 时间可达性支配集:时间图中的传染
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-08-28 DOI: 10.1016/j.jcss.2025.103701
David C. Kutner , Laura Larios-Jones
Given a population with dynamic pairwise connections, we ask if the entire population could be (indirectly) infected by a small group of k initially infected individuals. We formalise this problem as the Temporal Reachability Dominating Set (TaRDiS) problem on temporal graphs. We provide positive and negative parameterized complexity results in four different parameters: the number k of initially infected, the lifetime τ of the graph, the number of locally earliest edges in the graph, and the treewidth of the footprint graph G. We additionally introduce and study the MaxMinTaRDiS problem, where the aim is to schedule connections between individuals so that at least k individuals must be infected for the entire population to become fully infected. We classify three variants of the problem: Strict, Nonstrict, and Happy. We show these to be coNP-complete, NP-hard, and Σ2P-complete, respectively. Interestingly, we obtain hardness of the Nonstrict variant by showing that a natural restriction is exactly the well-studied Distance-3 Independent Set problem on static graphs.
给定具有动态两两连接的种群,我们问整个种群是否会(间接)被k个初始感染个体的一小群感染。我们将这个问题形式化为时间图上的时间可达性支配集问题。我们提供了四个不同参数的正负参数化复杂度结果:初始感染的数量k、图的生命周期τ、图中局部最早边的数量和足迹图的树宽G↓。我们还引入并研究了MaxMinTaRDiS问题,该问题的目标是调度个体之间的连接,使整个群体至少感染k个个体才能完全感染。我们把这个问题分为三种:严格、不严格和快乐。我们分别证明它们是cp完全的、np困难的和Σ2P-complete。有趣的是,我们通过证明一个自然约束正是静态图上的距离-3独立集问题得到了非严格变量的硬度。
{"title":"Temporal Reachability Dominating Sets: Contagion in temporal graphs","authors":"David C. Kutner ,&nbsp;Laura Larios-Jones","doi":"10.1016/j.jcss.2025.103701","DOIUrl":"10.1016/j.jcss.2025.103701","url":null,"abstract":"<div><div>Given a population with dynamic pairwise connections, we ask if the entire population could be (indirectly) infected by a small group of <em>k</em> initially infected individuals. We formalise this problem as the <span>Temporal Reachability Dominating Set</span> (<span>TaRDiS</span>) problem on temporal graphs. We provide positive and negative parameterized complexity results in four different parameters: the number <em>k</em> of initially infected, the lifetime <em>τ</em> of the graph, the number of locally earliest edges in the graph, and the treewidth of the footprint graph <span><math><msub><mrow><mi>G</mi></mrow><mrow><mo>↓</mo></mrow></msub></math></span>. We additionally introduce and study the <span>MaxMinTaRDiS</span> problem, where the aim is to schedule connections between individuals so that at least <em>k</em> individuals must be infected for the entire population to become fully infected. We classify three variants of the problem: Strict, Nonstrict, and Happy. We show these to be coNP-complete, NP-hard, and <span><math><msubsup><mrow><mi>Σ</mi></mrow><mrow><mn>2</mn></mrow><mrow><mi>P</mi></mrow></msubsup></math></span>-complete, respectively. Interestingly, we obtain hardness of the Nonstrict variant by showing that a natural restriction is exactly the well-studied <span>Distance-3 Independent Set</span> problem on static graphs.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"155 ","pages":"Article 103701"},"PeriodicalIF":0.9,"publicationDate":"2025-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144931697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Participatory budgeting with project groups 与项目小组进行参与式预算
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-08-28 DOI: 10.1016/j.jcss.2025.103702
Pallavi Jain , Krzysztof Sornat , Nimrod Talmon , Meirav Zehavi
We study a generalization of the standard approval-based model of participatory budgeting (PB), in which voters are providing approval ballots over a set of predefined projects and—in addition to a global budget limit, there are several groupings of the projects, each group with its own budget limit. We study the computational complexity of identifying project bundles that maximize voter satisfaction while respecting all budget limits. We show that the problem is generally intractable and describe efficient exact algorithms for several special cases, including instances with only few groups and instances where the group structure is close to be hierarchical, as well as efficient approximation algorithms. Our results could allow, e.g., municipalities to hold richer PB processes that are thematically and geographically inclusive.
我们研究了参与式预算(PB)标准的基于批准的模型的泛化,在这个模型中,选民对一组预定义的项目投赞成票,除了一个全局预算限制外,还有几个项目分组,每个分组都有自己的预算限制。我们研究了在尊重所有预算限制的情况下,识别最大化选民满意度的项目包的计算复杂性。我们证明了该问题通常是难以处理的,并描述了几种特殊情况下的有效精确算法,包括只有少数组的实例和组结构接近分层的实例,以及有效的近似算法。我们的结果可以允许,例如,市政当局举行主题和地理包容性更丰富的PB过程。
{"title":"Participatory budgeting with project groups","authors":"Pallavi Jain ,&nbsp;Krzysztof Sornat ,&nbsp;Nimrod Talmon ,&nbsp;Meirav Zehavi","doi":"10.1016/j.jcss.2025.103702","DOIUrl":"10.1016/j.jcss.2025.103702","url":null,"abstract":"<div><div>We study a generalization of the standard approval-based model of participatory budgeting (PB), in which voters are providing approval ballots over a set of predefined projects and—in addition to a global budget limit, there are several groupings of the projects, each group with its own budget limit. We study the computational complexity of identifying project bundles that maximize voter satisfaction while respecting all budget limits. We show that the problem is generally intractable and describe efficient exact algorithms for several special cases, including instances with only few groups and instances where the group structure is close to be hierarchical, as well as efficient approximation algorithms. Our results could allow, e.g., municipalities to hold richer PB processes that are thematically and geographically inclusive.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"156 ","pages":"Article 103702"},"PeriodicalIF":0.9,"publicationDate":"2025-08-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145060902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximate selection with unreliable comparisons in sublinear time 在亚线性时间内具有不可靠比较的近似选择
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-08-12 DOI: 10.1016/j.jcss.2025.103699
Shengyu Huang , Chih-Hung Liu , Daniel Rutschmann
Given n elements, an integer kn2 and a parameter ε1n, we study the problem of selecting an element with rank in (knε,k+nε] using unreliable comparisons where the outcome of each comparison is incorrect independently with a constant error probability, and multiple comparisons between the same pair of elements are independent. We develop a randomized algorithm that performs expected O(knε2log1Q) comparisons to achieve success probability at least 1Q. We also prove that even in the absence of comparison faults, any randomized algorithm with success probability at least 1Q performs expected Ω(min{n,knε2log1Q}) comparisons. In particular, our algorithm is optimal as long as n is large enough, i.e., when n=Ω(knε2log1Q); outside this parameter range, no algorithm performs a sublinear number of comparisons. Surprisingly, for constant Q, our algorithm performs expected O(knε2) comparisons with and without comparison faults, while for the exact selection problem, the expected number of comparisons is Θ(nlogk) with faults versus Θ(n) without faults.
给定n个元素,整数k≤n2,参数ε≥1n,我们研究了使用不可靠比较选择秩在(k−nε,k+nε]中的元素的问题,其中每次比较的结果都是独立的,错误概率为常数,并且同一对元素之间的多次比较是独立的。我们开发了一种随机算法,该算法执行预期的O(knε−2log (1Q))比较,以获得至少1−Q的成功概率。我们还证明了即使在没有比较错误的情况下,任何成功概率至少为1−Q的随机算法都可以执行预期的Ω(min (n,knε - 2log))比较。特别地,只要n足够大,我们的算法是最优的,即当n=Ω(knε−2log (1Q));在此参数范围之外,没有算法执行次线性数量的比较。令人惊讶的是,对于常数Q,我们的算法在有比较错误和没有比较错误的情况下执行预期的O(knε−2)比较,而对于精确的选择问题,预期的比较次数是Θ(nlog (k))有错误与Θ(n)没有错误。
{"title":"Approximate selection with unreliable comparisons in sublinear time","authors":"Shengyu Huang ,&nbsp;Chih-Hung Liu ,&nbsp;Daniel Rutschmann","doi":"10.1016/j.jcss.2025.103699","DOIUrl":"10.1016/j.jcss.2025.103699","url":null,"abstract":"<div><div>Given <em>n</em> elements, an integer <span><math><mi>k</mi><mo>≤</mo><mfrac><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></mfrac></math></span> and a parameter <span><math><mi>ε</mi><mo>≥</mo><mfrac><mrow><mn>1</mn></mrow><mrow><mi>n</mi></mrow></mfrac></math></span>, we study the problem of selecting an element with rank in <span><math><mo>(</mo><mi>k</mi><mo>−</mo><mi>n</mi><mi>ε</mi><mo>,</mo><mi>k</mi><mo>+</mo><mi>n</mi><mi>ε</mi><mo>]</mo></math></span> using <em>unreliable</em> comparisons where the outcome of each comparison is incorrect independently with a constant error probability, and multiple comparisons between the same pair of elements are independent. We develop a randomized algorithm that performs <em>expected</em> <span><math><mi>O</mi><mo>(</mo><mfrac><mrow><mi>k</mi></mrow><mrow><mi>n</mi></mrow></mfrac><msup><mrow><mi>ε</mi></mrow><mrow><mo>−</mo><mn>2</mn></mrow></msup><mi>log</mi><mo>⁡</mo><mfrac><mrow><mn>1</mn></mrow><mrow><mi>Q</mi></mrow></mfrac><mo>)</mo></math></span> comparisons to achieve success probability at least <span><math><mn>1</mn><mo>−</mo><mi>Q</mi></math></span>. We also prove that even in the absence of comparison faults, any randomized algorithm with success probability at least <span><math><mn>1</mn><mo>−</mo><mi>Q</mi></math></span> performs <em>expected</em> <span><math><mi>Ω</mi><mo>(</mo><mi>min</mi><mo>⁡</mo><mo>{</mo><mi>n</mi><mo>,</mo><mfrac><mrow><mi>k</mi></mrow><mrow><mi>n</mi></mrow></mfrac><msup><mrow><mi>ε</mi></mrow><mrow><mo>−</mo><mn>2</mn></mrow></msup><mi>log</mi><mo>⁡</mo><mfrac><mrow><mn>1</mn></mrow><mrow><mi>Q</mi></mrow></mfrac><mo>}</mo><mo>)</mo></math></span> comparisons. In particular, our algorithm is optimal as long as <em>n</em> is large enough, i.e., when <span><math><mi>n</mi><mo>=</mo><mi>Ω</mi><mrow><mo>(</mo><mfrac><mrow><mi>k</mi></mrow><mrow><mi>n</mi></mrow></mfrac><msup><mrow><mi>ε</mi></mrow><mrow><mo>−</mo><mn>2</mn></mrow></msup><mi>log</mi><mo>⁡</mo><mfrac><mrow><mn>1</mn></mrow><mrow><mi>Q</mi></mrow></mfrac><mo>)</mo></mrow></math></span>; outside this parameter range, no algorithm performs a sublinear number of comparisons. Surprisingly, for constant <em>Q</em>, our algorithm performs expected <span><math><mi>O</mi><mo>(</mo><mfrac><mrow><mi>k</mi></mrow><mrow><mi>n</mi></mrow></mfrac><msup><mrow><mi>ε</mi></mrow><mrow><mo>−</mo><mn>2</mn></mrow></msup><mo>)</mo></math></span> comparisons with and without comparison faults, while for the exact selection problem, the expected number of comparisons is <span><math><mi>Θ</mi><mo>(</mo><mi>n</mi><mi>log</mi><mo>⁡</mo><mi>k</mi><mo>)</mo></math></span> with faults versus <span><math><mi>Θ</mi><mo>(</mo><mi>n</mi><mo>)</mo></math></span> without faults.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"155 ","pages":"Article 103699"},"PeriodicalIF":0.9,"publicationDate":"2025-08-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144886722","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How to tamper with a Parliament: Strategic campaigns in apportionment elections 如何篡改议会:分配选举中的战略运动
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-08-08 DOI: 10.1016/j.jcss.2025.103700
Robert Bredereck , Piotr Faliszewski , Michał Furdyna , Andrzej Kaczmarczyk , Joanna Kaczmarek , Martin Lackner , Christian Laußmann , Jörg Rothe , Tessa Seeger
In parliamentary elections, parties compete for a limited, typically fixed number of seats. Most parliaments are assembled using apportionment methods that distribute the seats based on the parties' vote counts. Common apportionment methods include divisor sequence methods (like D'Hondt or Sainte-Laguë), the largest-remainder method, and first-past-the-post. In many countries, an electoral threshold is implemented to prevent very small parties from entering the parliament. Further, several countries have apportionment systems that incorporate multiple districts. We study how computationally hard it is to change the election outcome (i.e., to increase or limit the influence of a distinguished party) by convincing a limited number of voters to change their vote. We refer to these bribery-style attacks as strategic campaigns and study the corresponding problems in terms of their computational (both classical and parameterized) complexity. We also run extensive experiments on real-world election data and study the effectiveness of optimal campaigns, in particular as opposed to using heuristic bribing strategies and with respect to the influence of the threshold and the influence of the number of districts. For apportionment elections with threshold, finally, we propose—as an alternative to the standard top-choice mode—the second-chance mode where voters of parties below the threshold receive a second chance to vote for another party, and we establish computational complexity results also in this setting.
在议会选举中,各党派争夺有限的、通常是固定数量的席位。大多数议会都采用分配方法,根据各党派的得票数分配席位。常见的分配方法包括除数序列方法(如D'Hondt或Sainte-Laguë)、最大余数法和多数制方法。在许多国家,实行选举门槛是为了防止很小的政党进入议会。此外,一些国家的分配制度包括多个地区。我们研究了通过说服有限数量的选民改变他们的投票来改变选举结果(即增加或限制一个杰出政党的影响力)在计算上有多困难。我们将这些贿赂式攻击称为战略活动,并根据其计算(经典和参数化)复杂性研究相应的问题。我们还对现实世界的选举数据进行了广泛的实验,并研究了最优竞选活动的有效性,特别是与使用启发式贿赂策略相对的,以及关于阈值的影响和地区数量的影响。最后,对于有阈值的分配选举,我们提出了第二次机会模式,作为标准首选模式的替代方案,其中低于阈值的政党的选民获得第二次机会投票给另一个政党,我们也在这种设置中建立了计算复杂性结果。
{"title":"How to tamper with a Parliament: Strategic campaigns in apportionment elections","authors":"Robert Bredereck ,&nbsp;Piotr Faliszewski ,&nbsp;Michał Furdyna ,&nbsp;Andrzej Kaczmarczyk ,&nbsp;Joanna Kaczmarek ,&nbsp;Martin Lackner ,&nbsp;Christian Laußmann ,&nbsp;Jörg Rothe ,&nbsp;Tessa Seeger","doi":"10.1016/j.jcss.2025.103700","DOIUrl":"10.1016/j.jcss.2025.103700","url":null,"abstract":"<div><div>In parliamentary elections, parties compete for a limited, typically fixed number of seats. Most parliaments are assembled using apportionment methods that distribute the seats based on the parties' vote counts. Common apportionment methods include divisor sequence methods (like D'Hondt or Sainte-Laguë), the largest-remainder method, and first-past-the-post. In many countries, an electoral threshold is implemented to prevent very small parties from entering the parliament. Further, several countries have apportionment systems that incorporate multiple districts. We study how computationally hard it is to change the election outcome (i.e., to increase or limit the influence of a distinguished party) by convincing a limited number of voters to change their vote. We refer to these bribery-style attacks as <em>strategic campaigns</em> and study the corresponding problems in terms of their computational (both classical and parameterized) complexity. We also run extensive experiments on real-world election data and study the effectiveness of optimal campaigns, in particular as opposed to using heuristic bribing strategies and with respect to the influence of the threshold and the influence of the number of districts. For apportionment elections with threshold, finally, we propose—as an alternative to the standard top-choice mode—the second-chance mode where voters of parties below the threshold receive a second chance to vote for another party, and we establish computational complexity results also in this setting.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"155 ","pages":"Article 103700"},"PeriodicalIF":0.9,"publicationDate":"2025-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144864523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Corrections to “On the data complexity of consistent query answering over graph databases [Journal of Computer and System Sciences 88 (2017) 164–194]” 对“基于图形数据库的一致性查询应答的数据复杂性”的修正[Journal of Computer and System Sciences] 88 (2017) 164-194]
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-08-05 DOI: 10.1016/j.jcss.2025.103694
Pablo Barceló , Gaëlle Fontaine , Sylvain Salvati , Sophie Tison
Applications of graph databases are prone to inconsistency due to interoperability issues. This raises the need for studying query answering over inconsistent graph databases in a simple but general framework. We follow the approach of consistent query answering (CQA), and study its data complexity over graph databases for conjunctive regular-path queries (CRPQs) and conjunctive regular-path constraints (CRPCs). We deal with subset, superset and symmetric-difference repairs. Without restrictions, CQA is undecidable for the semantics of superset- and symmetric-difference repairs, and Π2P-complete for subset-repairs. However, we identify restrictions on CRPCs and databases that lead to decidability, and even tractability of CQA.
由于互操作性问题,图形数据库应用程序容易出现不一致。这就需要在一个简单而通用的框架中研究不一致图数据库的查询应答。本文采用一致性查询应答(CQA)方法,研究了合取正则路径查询(CRPQs)和合取正则路径约束(crpc)在图数据库上的数据复杂度。我们处理子集、超集和对称差分修复。在没有限制的情况下,CQA对于超集和对称差分修复的语义是不可判定的,对于子集修复的语义是Π2P-complete。然而,我们确定了crpc和数据库的限制,导致CQA的可判定性,甚至可追溯性。
{"title":"Corrections to “On the data complexity of consistent query answering over graph databases [Journal of Computer and System Sciences 88 (2017) 164–194]”","authors":"Pablo Barceló ,&nbsp;Gaëlle Fontaine ,&nbsp;Sylvain Salvati ,&nbsp;Sophie Tison","doi":"10.1016/j.jcss.2025.103694","DOIUrl":"10.1016/j.jcss.2025.103694","url":null,"abstract":"<div><div>Applications of graph databases are prone to inconsistency due to interoperability issues. This raises the need for studying query answering over inconsistent graph databases in a simple but general framework. We follow the approach of consistent query answering (CQA), and study its data complexity over graph databases for conjunctive regular-path queries (CRPQs) and conjunctive regular-path constraints (CRPCs). We deal with subset, superset and symmetric-difference repairs. Without restrictions, CQA is undecidable for the semantics of superset- and symmetric-difference repairs, and <span><math><msubsup><mrow><mi>Π</mi></mrow><mrow><mn>2</mn></mrow><mrow><mtext>P</mtext></mrow></msubsup></math></span>-complete for subset-repairs. However, we identify restrictions on CRPCs and databases that lead to decidability, and even tractability of CQA.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"155 ","pages":"Article 103694"},"PeriodicalIF":0.9,"publicationDate":"2025-08-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144772499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Triangle evacuation of 2 agents in the wireless model & the power of choosing a starting point 无线模型中2个智能体的三角疏散&起点选择的权力
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-07-31 DOI: 10.1016/j.jcss.2025.103695
Konstantinos Georgiou , Woojin Jang
The input to the Triangle Evacuation problem is a non-obtuse triangle ABC. A feasible solution is two unit-speed trajectories of mobile agents that start at some point on the perimeter and eventually visit every point on the perimeter of ABC. The goal is to find trajectories that minimize the evacuation cost, defined as the supremum, over all points T, of the time when T is first visited by one agent plus the distance from T to the other agent at that time. We introduce 4 different algorithmic problems arising by letting the starting edge and/or the starting point S on that edge to be chosen either by the algorithm or the adversary. To that end, we provide a tight analysis for the algorithm that has been proved to be optimal for the previously studied search domains, as well as we provide lower bounds for each of the problems.
三角形疏散问题的输入是一个非钝角三角形ABC。一个可行的解决方案是移动代理的两个单位速度轨迹,它们从圆周上的某一点开始,最终访问ABC圆周上的每一个点。目标是找到最小化疏散成本的轨迹,定义为在所有点T上,当一个智能体第一次访问T时加上此时从T到另一个智能体的距离。我们介绍了4种不同的算法问题,这些问题是由算法或对手选择起始边和/或该边的起始点S引起的。为此,我们对算法进行了严密的分析,该算法已被证明是先前研究的搜索域的最佳算法,并为每个问题提供了下界。
{"title":"Triangle evacuation of 2 agents in the wireless model & the power of choosing a starting point","authors":"Konstantinos Georgiou ,&nbsp;Woojin Jang","doi":"10.1016/j.jcss.2025.103695","DOIUrl":"10.1016/j.jcss.2025.103695","url":null,"abstract":"<div><div>The input to the <em>Triangle Evacuation</em> problem is a non-obtuse triangle <em>ABC</em>. A feasible solution is two unit-speed trajectories of mobile agents that start at some point on the perimeter and eventually visit every point on the perimeter of <em>ABC</em>. The goal is to find trajectories that minimize the evacuation cost, defined as the supremum, over all points <em>T</em>, of the time when <em>T</em> is first visited by one agent plus the distance from <em>T</em> to the other agent at that time. We introduce 4 different algorithmic problems arising by letting the starting edge and/or the starting point <em>S</em> on that edge to be chosen either by the algorithm or the adversary. To that end, we provide a tight analysis for the algorithm that has been proved to be optimal for the previously studied search domains, as well as we provide lower bounds for each of the problems.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"155 ","pages":"Article 103695"},"PeriodicalIF":0.9,"publicationDate":"2025-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144766445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online knapsack with removal and recourse 在线背包与移除和追索权
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-07-30 DOI: 10.1016/j.jcss.2025.103697
Hans-Joachim Böckenhauer , Ralf Klasing , Tobias Mömke , Peter Rossmanith , Moritz Stocker , David Wehner
We analyze the competitive ratio of the proportional online knapsack problem with removal and limited recourse. In contrast to the classical online knapsack problem, packed items can be removed and a limited number of removed items can be re-inserted to the knapsack. The variant with removal only was analyzed by Iwama and Taketomi (ICALP, 2002). We show that even a single use of recourse can improve the performance of an algorithm. We give lower bounds for a constant number of k1 uses of recourse in total, matching upper bounds for 1k3, and a general upper bound for any value of k. For a variant where a constant number of k1 uses of recourse can be used per step, we give tight bounds for all k1. We further look at a scenario where an algorithm is informed when the instance ends and give improved upper bounds in both variants for this case.
我们分析了具有移除和有限追索权的比例在线背包问题的竞争率。与经典的在线背包问题相比,打包好的物品可以被移除,并且被移除的物品数量有限,可以重新插入背包。Iwama和Taketomi (ICALP, 2002)对仅去除的变异进行了分析。我们表明,即使是单次使用追索权也可以提高算法的性能。我们给出了总k≥1个追索权使用次数为常数的下界,1≤k≤3的匹配上界,以及任意k值的一般上界。对于每步可以使用k≥1个追索权使用次数为常数的变体,我们给出了所有k≥1的紧界。我们进一步研究这样一种场景,即在实例结束时通知算法,并在这种情况下给出两种变体的改进上界。
{"title":"Online knapsack with removal and recourse","authors":"Hans-Joachim Böckenhauer ,&nbsp;Ralf Klasing ,&nbsp;Tobias Mömke ,&nbsp;Peter Rossmanith ,&nbsp;Moritz Stocker ,&nbsp;David Wehner","doi":"10.1016/j.jcss.2025.103697","DOIUrl":"10.1016/j.jcss.2025.103697","url":null,"abstract":"<div><div>We analyze the competitive ratio of the proportional online knapsack problem with removal and limited recourse. In contrast to the classical online knapsack problem, packed items can be removed and a limited number of removed items can be re-inserted to the knapsack. The variant with removal only was analyzed by Iwama and Taketomi (ICALP, 2002). We show that even a single use of recourse can improve the performance of an algorithm. We give lower bounds for a constant number of <span><math><mi>k</mi><mo>≥</mo><mn>1</mn></math></span> uses of recourse in total, matching upper bounds for <span><math><mn>1</mn><mo>≤</mo><mi>k</mi><mo>≤</mo><mn>3</mn></math></span>, and a general upper bound for any value of <em>k</em>. For a variant where a constant number of <span><math><mi>k</mi><mo>≥</mo><mn>1</mn></math></span> uses of recourse can be used per step, we give tight bounds for all <span><math><mi>k</mi><mo>≥</mo><mn>1</mn></math></span>. We further look at a scenario where an algorithm is informed when the instance ends and give improved upper bounds in both variants for this case.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"155 ","pages":"Article 103697"},"PeriodicalIF":0.9,"publicationDate":"2025-07-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144766444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Join and subgraph sampling under degree constraints 度约束下的联接和子图采样
IF 1.1 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-07-22 DOI: 10.1016/j.jcss.2025.103693
Ru Wang, Yufei Tao
This article studies two problems related to sampling from the results of database queries. The first one is to uniformly sample a tuple from the result of a join obeying an acyclic set of degree constraints (the join itself need not be acyclic). The second is to uniformly sample a given subgraph pattern's occurrence (the pattern may contain cycles) in a directed data graph. It is shown that, after a linear expected-time preprocessing, both problems admit an algorithm drawing a sample in O(polymat/max{1,OUT}) expected time, where OUT and polymat are the “full result size” and “polymatroid bound” of the underlying problem, respectively (assuming data complexity). These results are derived with a new sampling algorithm for the former problem and a new graph-theoretic theorem for the latter.
本文研究了与数据库查询结果抽样相关的两个问题。第一种方法是从遵循无环度约束集的连接的结果中统一采样一个元组(连接本身不必是无环的)。第二种方法是在有向数据图中对给定子图模式的出现(模式可能包含循环)进行统一采样。结果表明,经过线性预期时间预处理后,两个问题都允许在O(polymat/max ({1,OUT})预期时间内绘制样本的算法,其中OUT和polymat分别是底层问题的“完整结果大小”和“多边形界”(假设数据复杂性)。这些结果是用前一个问题的一种新的采样算法和后一个问题的一个新的图论定理得到的。
{"title":"Join and subgraph sampling under degree constraints","authors":"Ru Wang,&nbsp;Yufei Tao","doi":"10.1016/j.jcss.2025.103693","DOIUrl":"10.1016/j.jcss.2025.103693","url":null,"abstract":"<div><div>This article studies two problems related to sampling from the results of database queries. The first one is to uniformly sample a tuple from the result of a join obeying an acyclic set of degree constraints (the join itself need not be acyclic). The second is to uniformly sample a given subgraph pattern's occurrence (the pattern may contain cycles) in a directed data graph. It is shown that, after a linear expected-time preprocessing, both problems admit an algorithm drawing a sample in <span><math><mi>O</mi><mo>(</mo><mrow><mi>polymat</mi></mrow><mo>/</mo><mi>max</mi><mo>⁡</mo><mo>{</mo><mn>1</mn><mo>,</mo><mrow><mi>OUT</mi></mrow><mo>}</mo><mo>)</mo></math></span> expected time, where OUT and <em>polymat</em> are the “full result size” and “polymatroid bound” of the underlying problem, respectively (assuming data complexity). These results are derived with a new sampling algorithm for the former problem and a new graph-theoretic theorem for the latter.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"155 ","pages":"Article 103693"},"PeriodicalIF":1.1,"publicationDate":"2025-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144703370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parameterized approaches to orthogonal compaction 正交压缩的参数化方法
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-07-21 DOI: 10.1016/j.jcss.2025.103692
Walter Didimo , Siddharth Gupta , Philipp Kindermann , Giuseppe Liotta , Alexander Wolff , Meirav Zehavi
Orthogonal graph drawings are used in applications such as UML diagrams, VLSI layout, cable plans, and metro maps. We focus on drawing planar graphs and assume that we are given an orthogonal representation that describes the desired shape, but not the exact coordinates of a drawing. Our aim is to compute an orthogonal drawing on the grid that has the minimum area among all grid drawings that adhere to the given orthogonal representation. This problem is called orthogonal compaction (OC) and is known to be NP-hard, even for orthogonal representations of cycles [Evans et al. 2022]. We investigate the complexity of OC with respect to several parameters. Among others, we show that OC is fixed-parameter tractable with respect to the most natural of these parameters, namely, the number of kitty corners of the orthogonal representation: the presence of pairs of kitty corners in an orthogonal representation makes the OC problem hard. Informally speaking, a pair of kitty corners is a pair of reflex corners of a face that point at each other. Accordingly, the number of kitty corners is the number of corners that are involved in some pair of kitty corners.
正交图用于UML图、VLSI布局、电缆计划和地铁地图等应用程序。我们专注于绘制平面图形,并假设我们得到了描述所需形状的正交表示,但不是绘图的确切坐标。我们的目标是在网格上计算一个正交图,该图在所有坚持给定正交表示的网格图中具有最小的面积。这个问题被称为正交压缩(OC),即使对于循环的正交表示也是np困难的[Evans等人,2022]。我们研究了OC相对于几个参数的复杂性。其中,我们证明了OC对于这些最自然的参数,即正交表示的kitty角的数量是固定参数可处理的:正交表示中kitty角对的存在使OC问题变得困难。非正式地说,一对猫咪角是一对互相指向对方的面部反射角。因此,猫咪角的数量是一些猫咪角对所涉及的角的数量。
{"title":"Parameterized approaches to orthogonal compaction","authors":"Walter Didimo ,&nbsp;Siddharth Gupta ,&nbsp;Philipp Kindermann ,&nbsp;Giuseppe Liotta ,&nbsp;Alexander Wolff ,&nbsp;Meirav Zehavi","doi":"10.1016/j.jcss.2025.103692","DOIUrl":"10.1016/j.jcss.2025.103692","url":null,"abstract":"<div><div>Orthogonal graph drawings are used in applications such as UML diagrams, VLSI layout, cable plans, and metro maps. We focus on drawing planar graphs and assume that we are given an <em>orthogonal representation</em> that describes the desired shape, but not the exact coordinates of a drawing. Our aim is to compute an orthogonal drawing on the grid that has the minimum area among all grid drawings that adhere to the given orthogonal representation. This problem is called orthogonal compaction (<span>OC</span>) and is known to be NP-hard, even for orthogonal representations of cycles [Evans et al. 2022]. We investigate the complexity of <span>OC</span> with respect to several parameters. Among others, we show that <span>OC</span> is fixed-parameter tractable with respect to the most natural of these parameters, namely, the number of <em>kitty corners</em> of the orthogonal representation: the presence of pairs of kitty corners in an orthogonal representation makes the <span>OC</span> problem hard. Informally speaking, a pair of kitty corners is a pair of reflex corners of a face that point at each other. Accordingly, the number of kitty corners is the number of corners that are involved in some pair of kitty corners.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"155 ","pages":"Article 103692"},"PeriodicalIF":0.9,"publicationDate":"2025-07-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144739439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Computer and System Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1