首页 > 最新文献

Journal of Computer and System Sciences最新文献

英文 中文
On the parallel complexity of group isomorphism via Weisfeiler–Leman 用Weisfeiler-Leman论群同构的并行复杂性
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2026-03-01 Epub Date: 2025-09-05 DOI: 10.1016/j.jcss.2025.103703
Joshua A. Grochow , Michael Levet
We leverage the Weisfeiler–Leman algorithm for groups (Brachter & Schweitzer, LICS 2020) to improve parallel complexity upper bounds on isomorphism testing for several families of groups. We first show that groups with an Abelian normal Hall subgroup whose complement is O(1)-generated are identified by constant-dimensional Weisfeiler–Leman using O(1)-rounds. This places isomorphism testing for this family of groups into L; the previous upper bound for isomorphism testing was P (Qiao, Sarma, & Tang, STACS 2011). We next use the individualize-and-refine paradigm to obtain an isomorphism test for groups without Abelian normal subgroups by SAC circuits of depth O(logn) and size nO(loglogn), previously only known to be in P (Babai, Codenotti, & Qiao, ICALP 2012) and quasiSAC1 (Chattopadhyay, Torán, & Wagner, ACM Trans. Comput. Theory, 2013). We next extend a result of Brachter & Schweitzer (ESA, 2022) on direct products of groups to the parallel setting. Namely, we how that Weisfeiler–Leman can identify direct products in parallel, provided it can identify each of the indecomposable direct factors in parallel. They previously showed the analogous result for P. We finally consider the count-free Weisfeiler–Leman algorithm, where we show that count-free WL is unable to even distinguish Abelian groups in polynomial-time. Nonetheless, we use count-free WL in tandem with bounded non-determinism and limited counting to obtain a new upper bound of β1MAC0(FOLL) for isomorphism testing of Abelian groups. This improves upon the previous TC0(FOLL) upper bound due to Chattopadhyay, Torán, & Wagner (ACM Trans. Comput. Theory, 2013).
我们利用群的Weisfeiler-Leman算法(Brachter & Schweitzer, LICS 2020)来提高几个群族同构测试的并行复杂度上界。我们首先证明了具有补为O(1)-生成的Abelian正规Hall子群的群是用O(1)-轮由常维weisfeiller - leman识别的。这就把这个群族的同构检验放到了L中;以前同构检验的上界为P (Qiao, Sarma, & Tang, STACS 2011)。接下来,我们使用个性化和细化范式,通过深度为O(log (n))和大小为nO(log (n))的SAC电路,获得了没有阿贝尔正规子群的群的同构检验,以前只知道在P (Babai, Codenotti, & Qiao, ICALP 2012)和准isac1 (Chattopadhyay, Torán, & Wagner, ACM Trans)中存在。第一版。理论,2013)。接下来,我们将Brachter &; Schweitzer (ESA, 2022)关于群的直接积的结果扩展到平行设置。也就是说,如果Weisfeiler-Leman能并行地识别每个不可分解的直接因子,我们就能并行地识别直接产物。我们最后考虑无计数的Weisfeiler-Leman算法,其中我们表明无计数的WL甚至无法在多项式时间内区分阿贝尔群。尽管如此,我们将无计数WL与有界不确定性和有限计数相结合,获得了用于阿贝尔群同态检验的β1MAC0(FOLL)的新上界。这改进了之前由于Chattopadhyay, Torán, & Wagner (ACM Trans.)提出的TC0(FOLL)上界。第一版。理论,2013)。
{"title":"On the parallel complexity of group isomorphism via Weisfeiler–Leman","authors":"Joshua A. Grochow ,&nbsp;Michael Levet","doi":"10.1016/j.jcss.2025.103703","DOIUrl":"10.1016/j.jcss.2025.103703","url":null,"abstract":"<div><div>We leverage the Weisfeiler–Leman algorithm for groups (Brachter &amp; Schweitzer, LICS 2020) to improve parallel complexity upper bounds on isomorphism testing for several families of groups. We first show that groups with an Abelian normal Hall subgroup whose complement is <span><math><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></math></span>-generated are identified by constant-dimensional Weisfeiler–Leman using <span><math><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></math></span>-rounds. This places isomorphism testing for this family of groups into <span><math><mtext>L</mtext></math></span>; the previous upper bound for isomorphism testing was <span><math><mi>P</mi></math></span> (Qiao, Sarma, &amp; Tang, STACS 2011). We next use the individualize-and-refine paradigm to obtain an isomorphism test for groups without Abelian normal subgroups by <span><math><mi>SAC</mi></math></span> circuits of depth <span><math><mi>O</mi><mo>(</mo><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>)</mo></math></span> and size <span><math><msup><mrow><mi>n</mi></mrow><mrow><mi>O</mi><mo>(</mo><mi>log</mi><mo>⁡</mo><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>)</mo></mrow></msup></math></span>, previously only known to be in <span><math><mi>P</mi></math></span> (Babai, Codenotti, &amp; Qiao, ICALP 2012) and <span><math><msup><mrow><mi>quasiSAC</mi></mrow><mrow><mn>1</mn></mrow></msup></math></span> (Chattopadhyay, Torán, &amp; Wagner, <em>ACM Trans. Comput. Theory</em>, 2013). We next extend a result of Brachter &amp; Schweitzer (ESA, 2022) on direct products of groups to the parallel setting. Namely, we how that Weisfeiler–Leman can identify direct products in parallel, provided it can identify each of the indecomposable direct factors in parallel. They previously showed the analogous result for <span><math><mi>P</mi></math></span>. We finally consider the count-free Weisfeiler–Leman algorithm, where we show that count-free WL is unable to even distinguish Abelian groups in polynomial-time. Nonetheless, we use count-free WL in tandem with bounded non-determinism and limited counting to obtain a new upper bound of <span><math><msub><mrow><mi>β</mi></mrow><mrow><mn>1</mn></mrow></msub><msup><mrow><mtext>MAC</mtext></mrow><mrow><mn>0</mn></mrow></msup><mo>(</mo><mtext>FOLL</mtext><mo>)</mo></math></span> for isomorphism testing of Abelian groups. This improves upon the previous <span><math><msup><mrow><mtext>TC</mtext></mrow><mrow><mn>0</mn></mrow></msup><mo>(</mo><mtext>FOLL</mtext><mo>)</mo></math></span> upper bound due to Chattopadhyay, Torán, &amp; Wagner (<em>ACM Trans. Comput. Theory</em>, 2013).</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"156 ","pages":"Article 103703"},"PeriodicalIF":0.9,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145049766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bringing memory to Boolean networks: A unifying framework 将内存引入布尔网络:一个统一的框架
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2026-03-01 Epub Date: 2025-10-30 DOI: 10.1016/j.jcss.2025.103729
Maximilien Gadouleau , Loïc Paulevé , Sara Riva
Boolean networks are extensively applied as models of complex dynamical systems, aiming at capturing essential features related to causality and synchronicity of the state changes of components along time. Dynamics of Boolean networks result from the application of their Boolean map according to a so-called update mode, specifying the possible transitions between network configurations. In this paper, we explore update modes that possess a memory on past configurations, and provide a generic framework to define them. We show that recently introduced modes such as the most permissive and interval modes can be naturally expressed in this framework, and we propose novel update modes, the history-based, trapping, and subcube-based modes. Building on the unified definitions, we provide a comprehensive comparison of memory-based update modes, resulting in their hierarchy by simulation and weak simulation. Finally, we highlight consequences of introducing memory on the notions of trajectory and attractors.
布尔网络作为复杂动力系统的模型被广泛应用,其目的是捕捉部件状态随时间变化的因果性和同步性等本质特征。布尔网络的动态是根据所谓的更新模式应用其布尔映射而产生的,该模式指定了网络配置之间可能的转换。在本文中,我们探索了具有过去配置记忆的更新模式,并提供了一个通用框架来定义它们。我们证明了最近引入的模式,如最允许模式和间隔模式,可以在这个框架中自然地表达,我们提出了新的更新模式,基于历史的,捕获的,和基于子立方体的模式。在统一定义的基础上,我们对基于内存的更新模式进行了全面的比较,得出了基于仿真和弱仿真的层次结构。最后,我们强调了引入记忆对轨迹和吸引子概念的影响。
{"title":"Bringing memory to Boolean networks: A unifying framework","authors":"Maximilien Gadouleau ,&nbsp;Loïc Paulevé ,&nbsp;Sara Riva","doi":"10.1016/j.jcss.2025.103729","DOIUrl":"10.1016/j.jcss.2025.103729","url":null,"abstract":"<div><div>Boolean networks are extensively applied as models of complex dynamical systems, aiming at capturing essential features related to causality and synchronicity of the state changes of components along time. Dynamics of Boolean networks result from the application of their Boolean map according to a so-called update mode, specifying the possible transitions between network configurations. In this paper, we explore update modes that possess a memory on past configurations, and provide a generic framework to define them. We show that recently introduced modes such as the most permissive and interval modes can be naturally expressed in this framework, and we propose novel update modes, the history-based, trapping, and subcube-based modes. Building on the unified definitions, we provide a comprehensive comparison of memory-based update modes, resulting in their hierarchy by simulation and weak simulation. Finally, we highlight consequences of introducing memory on the notions of trajectory and attractors.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"156 ","pages":"Article 103729"},"PeriodicalIF":0.9,"publicationDate":"2026-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145473539","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sequentially swapping tokens: Further on graph classes 顺序交换令牌:进一步介绍图类
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2026-02-01 Epub Date: 2025-07-17 DOI: 10.1016/j.jcss.2025.103691
Hironori Kiya , Yuto Okada , Hirotaka Ono , Yota Otachi
In this paper, we study Sequential Token Swapping, which can be seen as a variant of the generalized 15 puzzle. Given a graph and two token placements on the vertices, the problem asks to find a walk of the minimum length (if any exists) such that the sequence of token swappings along the walk obtains one of the given token placements from the other one. This problem was introduced by Yamanaka et al. [JGAA 2019], who showed that the problem is intractable in general but polynomial-time solvable for trees, complete graphs, and cycles. In this paper, we present a polynomial-time algorithm for block-cactus graphs, which include all previously known cases. We also present general tools for showing the hardness of the problem on restricted graph classes such as chordal graphs and chordal bipartite graphs. We also show that the problem is hard on grids and king's graphs, which are the graphs corresponding to the 15 puzzle and its variant with relaxed moves.
在本文中,我们研究了顺序令牌交换,它可以看作是广义15难题的一种变体。给定一个图和顶点上的两个令牌放置位置,问题要求找到最小长度的遍历(如果存在的话),使得沿遍历的令牌交换序列从另一个给定的令牌放置位置中获得一个。这个问题是由Yamanaka等人提出的[JGAA 2019],他们表明这个问题一般来说是难以解决的,但对于树、完全图和循环来说是多项式时间可解的。在本文中,我们提出了一个多项式时间算法的块仙人掌图,其中包括所有已知的情况。我们也提供一般的工具来显示问题在受限图类,如弦图和弦二部图的硬度。我们还表明,这个问题在网格和国王图上是困难的,这是与15个谜题及其变体相对应的图,具有放松的移动。
{"title":"Sequentially swapping tokens: Further on graph classes","authors":"Hironori Kiya ,&nbsp;Yuto Okada ,&nbsp;Hirotaka Ono ,&nbsp;Yota Otachi","doi":"10.1016/j.jcss.2025.103691","DOIUrl":"10.1016/j.jcss.2025.103691","url":null,"abstract":"<div><div>In this paper, we study <span>Sequential Token Swapping</span>, which can be seen as a variant of the generalized 15 puzzle. Given a graph and two token placements on the vertices, the problem asks to find a walk of the minimum length (if any exists) such that the sequence of token swappings along the walk obtains one of the given token placements from the other one. This problem was introduced by Yamanaka et al. [JGAA 2019], who showed that the problem is intractable in general but polynomial-time solvable for trees, complete graphs, and cycles. In this paper, we present a polynomial-time algorithm for block-cactus graphs, which include all previously known cases. We also present general tools for showing the hardness of the problem on restricted graph classes such as chordal graphs and chordal bipartite graphs. We also show that the problem is hard on grids and king's graphs, which are the graphs corresponding to the 15 puzzle and its variant with relaxed moves.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"155 ","pages":"Article 103691"},"PeriodicalIF":0.9,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144766443","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Join and subgraph sampling under degree constraints 度约束下的联接和子图采样
IF 1.1 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2026-02-01 Epub Date: 2025-07-22 DOI: 10.1016/j.jcss.2025.103693
Ru Wang, Yufei Tao
This article studies two problems related to sampling from the results of database queries. The first one is to uniformly sample a tuple from the result of a join obeying an acyclic set of degree constraints (the join itself need not be acyclic). The second is to uniformly sample a given subgraph pattern's occurrence (the pattern may contain cycles) in a directed data graph. It is shown that, after a linear expected-time preprocessing, both problems admit an algorithm drawing a sample in O(polymat/max{1,OUT}) expected time, where OUT and polymat are the “full result size” and “polymatroid bound” of the underlying problem, respectively (assuming data complexity). These results are derived with a new sampling algorithm for the former problem and a new graph-theoretic theorem for the latter.
本文研究了与数据库查询结果抽样相关的两个问题。第一种方法是从遵循无环度约束集的连接的结果中统一采样一个元组(连接本身不必是无环的)。第二种方法是在有向数据图中对给定子图模式的出现(模式可能包含循环)进行统一采样。结果表明,经过线性预期时间预处理后,两个问题都允许在O(polymat/max ({1,OUT})预期时间内绘制样本的算法,其中OUT和polymat分别是底层问题的“完整结果大小”和“多边形界”(假设数据复杂性)。这些结果是用前一个问题的一种新的采样算法和后一个问题的一个新的图论定理得到的。
{"title":"Join and subgraph sampling under degree constraints","authors":"Ru Wang,&nbsp;Yufei Tao","doi":"10.1016/j.jcss.2025.103693","DOIUrl":"10.1016/j.jcss.2025.103693","url":null,"abstract":"<div><div>This article studies two problems related to sampling from the results of database queries. The first one is to uniformly sample a tuple from the result of a join obeying an acyclic set of degree constraints (the join itself need not be acyclic). The second is to uniformly sample a given subgraph pattern's occurrence (the pattern may contain cycles) in a directed data graph. It is shown that, after a linear expected-time preprocessing, both problems admit an algorithm drawing a sample in <span><math><mi>O</mi><mo>(</mo><mrow><mi>polymat</mi></mrow><mo>/</mo><mi>max</mi><mo>⁡</mo><mo>{</mo><mn>1</mn><mo>,</mo><mrow><mi>OUT</mi></mrow><mo>}</mo><mo>)</mo></math></span> expected time, where OUT and <em>polymat</em> are the “full result size” and “polymatroid bound” of the underlying problem, respectively (assuming data complexity). These results are derived with a new sampling algorithm for the former problem and a new graph-theoretic theorem for the latter.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"155 ","pages":"Article 103693"},"PeriodicalIF":1.1,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144703370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Corrections to “On the data complexity of consistent query answering over graph databases [Journal of Computer and System Sciences 88 (2017) 164–194]” 对“基于图形数据库的一致性查询应答的数据复杂性”的修正[Journal of Computer and System Sciences] 88 (2017) 164-194]
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2026-02-01 Epub Date: 2025-08-05 DOI: 10.1016/j.jcss.2025.103694
Pablo Barceló , Gaëlle Fontaine , Sylvain Salvati , Sophie Tison
Applications of graph databases are prone to inconsistency due to interoperability issues. This raises the need for studying query answering over inconsistent graph databases in a simple but general framework. We follow the approach of consistent query answering (CQA), and study its data complexity over graph databases for conjunctive regular-path queries (CRPQs) and conjunctive regular-path constraints (CRPCs). We deal with subset, superset and symmetric-difference repairs. Without restrictions, CQA is undecidable for the semantics of superset- and symmetric-difference repairs, and Π2P-complete for subset-repairs. However, we identify restrictions on CRPCs and databases that lead to decidability, and even tractability of CQA.
由于互操作性问题,图形数据库应用程序容易出现不一致。这就需要在一个简单而通用的框架中研究不一致图数据库的查询应答。本文采用一致性查询应答(CQA)方法,研究了合取正则路径查询(CRPQs)和合取正则路径约束(crpc)在图数据库上的数据复杂度。我们处理子集、超集和对称差分修复。在没有限制的情况下,CQA对于超集和对称差分修复的语义是不可判定的,对于子集修复的语义是Π2P-complete。然而,我们确定了crpc和数据库的限制,导致CQA的可判定性,甚至可追溯性。
{"title":"Corrections to “On the data complexity of consistent query answering over graph databases [Journal of Computer and System Sciences 88 (2017) 164–194]”","authors":"Pablo Barceló ,&nbsp;Gaëlle Fontaine ,&nbsp;Sylvain Salvati ,&nbsp;Sophie Tison","doi":"10.1016/j.jcss.2025.103694","DOIUrl":"10.1016/j.jcss.2025.103694","url":null,"abstract":"<div><div>Applications of graph databases are prone to inconsistency due to interoperability issues. This raises the need for studying query answering over inconsistent graph databases in a simple but general framework. We follow the approach of consistent query answering (CQA), and study its data complexity over graph databases for conjunctive regular-path queries (CRPQs) and conjunctive regular-path constraints (CRPCs). We deal with subset, superset and symmetric-difference repairs. Without restrictions, CQA is undecidable for the semantics of superset- and symmetric-difference repairs, and <span><math><msubsup><mrow><mi>Π</mi></mrow><mrow><mn>2</mn></mrow><mrow><mtext>P</mtext></mrow></msubsup></math></span>-complete for subset-repairs. However, we identify restrictions on CRPCs and databases that lead to decidability, and even tractability of CQA.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"155 ","pages":"Article 103694"},"PeriodicalIF":0.9,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144772499","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the complexity of rainbow vertex colouring diametral path graphs 关于彩虹顶点对直径路径图着色的复杂性
IF 1.1 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2026-02-01 Epub Date: 2025-07-03 DOI: 10.1016/j.jcss.2025.103683
Jakob Dyrseth , Paloma T. de Lima
Given a graph and a colouring of its vertices, a rainbow path is a path such that all its internal nodes are coloured distinctly. A graph is rainbow vertex-connected if between every pair of vertices there exists a rainbow path. We study the problem of deciding whether a graph can be coloured using k colours such that it is rainbow vertex-connected. Heggernes et al. (MFCS, 2018) conjectured that if every induced subgraph in G has a dominating diametral path, then G can always be rainbow coloured with diam(G)1 colours. We confirm their conjecture for chordal, bipartite and claw-free diametral path graphs. We complement these results by showing the conjecture does not hold without the condition on every induced subgraph. In this case, even though diam(G) colours are enough, it is NP-complete to determine whether a graph with a dominating diametral path of length three can be rainbow coloured with two colours.
给定一个图形及其顶点的颜色,彩虹路径是这样一条路径,它的所有内部节点都有不同的颜色。如果在每一对顶点之间存在彩虹路径,则图是彩虹顶点连通的。我们研究了一个图是否可以用k种颜色着色,使得它是彩虹顶点连通的问题。Heggernes等人(MFCS, 2018)推测,如果G中的每个诱导子图都有一个主导直径路径,那么G总是可以用直径(G)−1的颜色呈现彩虹色。我们对弦、二部和无爪的径路图证实了他们的猜想。我们通过证明该猜想在每个诱导子图上都不成立来补充这些结果。在这种情况下,即使直径(G)的颜色就足够了,但要确定一个主要直径路径长度为3的图是否可以用两种颜色着色,这是np完全的。
{"title":"On the complexity of rainbow vertex colouring diametral path graphs","authors":"Jakob Dyrseth ,&nbsp;Paloma T. de Lima","doi":"10.1016/j.jcss.2025.103683","DOIUrl":"10.1016/j.jcss.2025.103683","url":null,"abstract":"<div><div>Given a graph and a colouring of its vertices, a rainbow path is a path such that all its internal nodes are coloured distinctly. A graph is rainbow vertex-connected if between every pair of vertices there exists a rainbow path. We study the problem of deciding whether a graph can be coloured using <em>k</em> colours such that it is rainbow vertex-connected. Heggernes et al. (MFCS, 2018) conjectured that if every induced subgraph in <em>G</em> has a dominating diametral path, then <em>G</em> can always be rainbow coloured with <span><math><mrow><mi>diam</mi></mrow><mo>(</mo><mi>G</mi><mo>)</mo><mo>−</mo><mn>1</mn></math></span> colours. We confirm their conjecture for chordal, bipartite and claw-free diametral path graphs. We complement these results by showing the conjecture does not hold without the condition on <em>every</em> induced subgraph. In this case, even though <span><math><mrow><mi>diam</mi></mrow><mo>(</mo><mi>G</mi><mo>)</mo></math></span> colours are enough, it is NP-complete to determine whether a graph with a dominating diametral path of length three can be rainbow coloured with two colours.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"155 ","pages":"Article 103683"},"PeriodicalIF":1.1,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144572748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online knapsack with removal and recourse 在线背包与移除和追索权
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2026-02-01 Epub Date: 2025-07-30 DOI: 10.1016/j.jcss.2025.103697
Hans-Joachim Böckenhauer , Ralf Klasing , Tobias Mömke , Peter Rossmanith , Moritz Stocker , David Wehner
We analyze the competitive ratio of the proportional online knapsack problem with removal and limited recourse. In contrast to the classical online knapsack problem, packed items can be removed and a limited number of removed items can be re-inserted to the knapsack. The variant with removal only was analyzed by Iwama and Taketomi (ICALP, 2002). We show that even a single use of recourse can improve the performance of an algorithm. We give lower bounds for a constant number of k1 uses of recourse in total, matching upper bounds for 1k3, and a general upper bound for any value of k. For a variant where a constant number of k1 uses of recourse can be used per step, we give tight bounds for all k1. We further look at a scenario where an algorithm is informed when the instance ends and give improved upper bounds in both variants for this case.
我们分析了具有移除和有限追索权的比例在线背包问题的竞争率。与经典的在线背包问题相比,打包好的物品可以被移除,并且被移除的物品数量有限,可以重新插入背包。Iwama和Taketomi (ICALP, 2002)对仅去除的变异进行了分析。我们表明,即使是单次使用追索权也可以提高算法的性能。我们给出了总k≥1个追索权使用次数为常数的下界,1≤k≤3的匹配上界,以及任意k值的一般上界。对于每步可以使用k≥1个追索权使用次数为常数的变体,我们给出了所有k≥1的紧界。我们进一步研究这样一种场景,即在实例结束时通知算法,并在这种情况下给出两种变体的改进上界。
{"title":"Online knapsack with removal and recourse","authors":"Hans-Joachim Böckenhauer ,&nbsp;Ralf Klasing ,&nbsp;Tobias Mömke ,&nbsp;Peter Rossmanith ,&nbsp;Moritz Stocker ,&nbsp;David Wehner","doi":"10.1016/j.jcss.2025.103697","DOIUrl":"10.1016/j.jcss.2025.103697","url":null,"abstract":"<div><div>We analyze the competitive ratio of the proportional online knapsack problem with removal and limited recourse. In contrast to the classical online knapsack problem, packed items can be removed and a limited number of removed items can be re-inserted to the knapsack. The variant with removal only was analyzed by Iwama and Taketomi (ICALP, 2002). We show that even a single use of recourse can improve the performance of an algorithm. We give lower bounds for a constant number of <span><math><mi>k</mi><mo>≥</mo><mn>1</mn></math></span> uses of recourse in total, matching upper bounds for <span><math><mn>1</mn><mo>≤</mo><mi>k</mi><mo>≤</mo><mn>3</mn></math></span>, and a general upper bound for any value of <em>k</em>. For a variant where a constant number of <span><math><mi>k</mi><mo>≥</mo><mn>1</mn></math></span> uses of recourse can be used per step, we give tight bounds for all <span><math><mi>k</mi><mo>≥</mo><mn>1</mn></math></span>. We further look at a scenario where an algorithm is informed when the instance ends and give improved upper bounds in both variants for this case.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"155 ","pages":"Article 103697"},"PeriodicalIF":0.9,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144766444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Temporal Reachability Dominating Sets: Contagion in temporal graphs 时间可达性支配集:时间图中的传染
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2026-02-01 Epub Date: 2025-08-28 DOI: 10.1016/j.jcss.2025.103701
David C. Kutner , Laura Larios-Jones
Given a population with dynamic pairwise connections, we ask if the entire population could be (indirectly) infected by a small group of k initially infected individuals. We formalise this problem as the Temporal Reachability Dominating Set (TaRDiS) problem on temporal graphs. We provide positive and negative parameterized complexity results in four different parameters: the number k of initially infected, the lifetime τ of the graph, the number of locally earliest edges in the graph, and the treewidth of the footprint graph G. We additionally introduce and study the MaxMinTaRDiS problem, where the aim is to schedule connections between individuals so that at least k individuals must be infected for the entire population to become fully infected. We classify three variants of the problem: Strict, Nonstrict, and Happy. We show these to be coNP-complete, NP-hard, and Σ2P-complete, respectively. Interestingly, we obtain hardness of the Nonstrict variant by showing that a natural restriction is exactly the well-studied Distance-3 Independent Set problem on static graphs.
给定具有动态两两连接的种群,我们问整个种群是否会(间接)被k个初始感染个体的一小群感染。我们将这个问题形式化为时间图上的时间可达性支配集问题。我们提供了四个不同参数的正负参数化复杂度结果:初始感染的数量k、图的生命周期τ、图中局部最早边的数量和足迹图的树宽G↓。我们还引入并研究了MaxMinTaRDiS问题,该问题的目标是调度个体之间的连接,使整个群体至少感染k个个体才能完全感染。我们把这个问题分为三种:严格、不严格和快乐。我们分别证明它们是cp完全的、np困难的和Σ2P-complete。有趣的是,我们通过证明一个自然约束正是静态图上的距离-3独立集问题得到了非严格变量的硬度。
{"title":"Temporal Reachability Dominating Sets: Contagion in temporal graphs","authors":"David C. Kutner ,&nbsp;Laura Larios-Jones","doi":"10.1016/j.jcss.2025.103701","DOIUrl":"10.1016/j.jcss.2025.103701","url":null,"abstract":"<div><div>Given a population with dynamic pairwise connections, we ask if the entire population could be (indirectly) infected by a small group of <em>k</em> initially infected individuals. We formalise this problem as the <span>Temporal Reachability Dominating Set</span> (<span>TaRDiS</span>) problem on temporal graphs. We provide positive and negative parameterized complexity results in four different parameters: the number <em>k</em> of initially infected, the lifetime <em>τ</em> of the graph, the number of locally earliest edges in the graph, and the treewidth of the footprint graph <span><math><msub><mrow><mi>G</mi></mrow><mrow><mo>↓</mo></mrow></msub></math></span>. We additionally introduce and study the <span>MaxMinTaRDiS</span> problem, where the aim is to schedule connections between individuals so that at least <em>k</em> individuals must be infected for the entire population to become fully infected. We classify three variants of the problem: Strict, Nonstrict, and Happy. We show these to be coNP-complete, NP-hard, and <span><math><msubsup><mrow><mi>Σ</mi></mrow><mrow><mn>2</mn></mrow><mrow><mi>P</mi></mrow></msubsup></math></span>-complete, respectively. Interestingly, we obtain hardness of the Nonstrict variant by showing that a natural restriction is exactly the well-studied <span>Distance-3 Independent Set</span> problem on static graphs.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"155 ","pages":"Article 103701"},"PeriodicalIF":0.9,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144931697","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parameterized approaches to orthogonal compaction 正交压缩的参数化方法
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2026-02-01 Epub Date: 2025-07-21 DOI: 10.1016/j.jcss.2025.103692
Walter Didimo , Siddharth Gupta , Philipp Kindermann , Giuseppe Liotta , Alexander Wolff , Meirav Zehavi
Orthogonal graph drawings are used in applications such as UML diagrams, VLSI layout, cable plans, and metro maps. We focus on drawing planar graphs and assume that we are given an orthogonal representation that describes the desired shape, but not the exact coordinates of a drawing. Our aim is to compute an orthogonal drawing on the grid that has the minimum area among all grid drawings that adhere to the given orthogonal representation. This problem is called orthogonal compaction (OC) and is known to be NP-hard, even for orthogonal representations of cycles [Evans et al. 2022]. We investigate the complexity of OC with respect to several parameters. Among others, we show that OC is fixed-parameter tractable with respect to the most natural of these parameters, namely, the number of kitty corners of the orthogonal representation: the presence of pairs of kitty corners in an orthogonal representation makes the OC problem hard. Informally speaking, a pair of kitty corners is a pair of reflex corners of a face that point at each other. Accordingly, the number of kitty corners is the number of corners that are involved in some pair of kitty corners.
正交图用于UML图、VLSI布局、电缆计划和地铁地图等应用程序。我们专注于绘制平面图形,并假设我们得到了描述所需形状的正交表示,但不是绘图的确切坐标。我们的目标是在网格上计算一个正交图,该图在所有坚持给定正交表示的网格图中具有最小的面积。这个问题被称为正交压缩(OC),即使对于循环的正交表示也是np困难的[Evans等人,2022]。我们研究了OC相对于几个参数的复杂性。其中,我们证明了OC对于这些最自然的参数,即正交表示的kitty角的数量是固定参数可处理的:正交表示中kitty角对的存在使OC问题变得困难。非正式地说,一对猫咪角是一对互相指向对方的面部反射角。因此,猫咪角的数量是一些猫咪角对所涉及的角的数量。
{"title":"Parameterized approaches to orthogonal compaction","authors":"Walter Didimo ,&nbsp;Siddharth Gupta ,&nbsp;Philipp Kindermann ,&nbsp;Giuseppe Liotta ,&nbsp;Alexander Wolff ,&nbsp;Meirav Zehavi","doi":"10.1016/j.jcss.2025.103692","DOIUrl":"10.1016/j.jcss.2025.103692","url":null,"abstract":"<div><div>Orthogonal graph drawings are used in applications such as UML diagrams, VLSI layout, cable plans, and metro maps. We focus on drawing planar graphs and assume that we are given an <em>orthogonal representation</em> that describes the desired shape, but not the exact coordinates of a drawing. Our aim is to compute an orthogonal drawing on the grid that has the minimum area among all grid drawings that adhere to the given orthogonal representation. This problem is called orthogonal compaction (<span>OC</span>) and is known to be NP-hard, even for orthogonal representations of cycles [Evans et al. 2022]. We investigate the complexity of <span>OC</span> with respect to several parameters. Among others, we show that <span>OC</span> is fixed-parameter tractable with respect to the most natural of these parameters, namely, the number of <em>kitty corners</em> of the orthogonal representation: the presence of pairs of kitty corners in an orthogonal representation makes the <span>OC</span> problem hard. Informally speaking, a pair of kitty corners is a pair of reflex corners of a face that point at each other. Accordingly, the number of kitty corners is the number of corners that are involved in some pair of kitty corners.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"155 ","pages":"Article 103692"},"PeriodicalIF":0.9,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144739439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How to tamper with a Parliament: Strategic campaigns in apportionment elections 如何篡改议会:分配选举中的战略运动
IF 0.9 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2026-02-01 Epub Date: 2025-08-08 DOI: 10.1016/j.jcss.2025.103700
Robert Bredereck , Piotr Faliszewski , Michał Furdyna , Andrzej Kaczmarczyk , Joanna Kaczmarek , Martin Lackner , Christian Laußmann , Jörg Rothe , Tessa Seeger
In parliamentary elections, parties compete for a limited, typically fixed number of seats. Most parliaments are assembled using apportionment methods that distribute the seats based on the parties' vote counts. Common apportionment methods include divisor sequence methods (like D'Hondt or Sainte-Laguë), the largest-remainder method, and first-past-the-post. In many countries, an electoral threshold is implemented to prevent very small parties from entering the parliament. Further, several countries have apportionment systems that incorporate multiple districts. We study how computationally hard it is to change the election outcome (i.e., to increase or limit the influence of a distinguished party) by convincing a limited number of voters to change their vote. We refer to these bribery-style attacks as strategic campaigns and study the corresponding problems in terms of their computational (both classical and parameterized) complexity. We also run extensive experiments on real-world election data and study the effectiveness of optimal campaigns, in particular as opposed to using heuristic bribing strategies and with respect to the influence of the threshold and the influence of the number of districts. For apportionment elections with threshold, finally, we propose—as an alternative to the standard top-choice mode—the second-chance mode where voters of parties below the threshold receive a second chance to vote for another party, and we establish computational complexity results also in this setting.
在议会选举中,各党派争夺有限的、通常是固定数量的席位。大多数议会都采用分配方法,根据各党派的得票数分配席位。常见的分配方法包括除数序列方法(如D'Hondt或Sainte-Laguë)、最大余数法和多数制方法。在许多国家,实行选举门槛是为了防止很小的政党进入议会。此外,一些国家的分配制度包括多个地区。我们研究了通过说服有限数量的选民改变他们的投票来改变选举结果(即增加或限制一个杰出政党的影响力)在计算上有多困难。我们将这些贿赂式攻击称为战略活动,并根据其计算(经典和参数化)复杂性研究相应的问题。我们还对现实世界的选举数据进行了广泛的实验,并研究了最优竞选活动的有效性,特别是与使用启发式贿赂策略相对的,以及关于阈值的影响和地区数量的影响。最后,对于有阈值的分配选举,我们提出了第二次机会模式,作为标准首选模式的替代方案,其中低于阈值的政党的选民获得第二次机会投票给另一个政党,我们也在这种设置中建立了计算复杂性结果。
{"title":"How to tamper with a Parliament: Strategic campaigns in apportionment elections","authors":"Robert Bredereck ,&nbsp;Piotr Faliszewski ,&nbsp;Michał Furdyna ,&nbsp;Andrzej Kaczmarczyk ,&nbsp;Joanna Kaczmarek ,&nbsp;Martin Lackner ,&nbsp;Christian Laußmann ,&nbsp;Jörg Rothe ,&nbsp;Tessa Seeger","doi":"10.1016/j.jcss.2025.103700","DOIUrl":"10.1016/j.jcss.2025.103700","url":null,"abstract":"<div><div>In parliamentary elections, parties compete for a limited, typically fixed number of seats. Most parliaments are assembled using apportionment methods that distribute the seats based on the parties' vote counts. Common apportionment methods include divisor sequence methods (like D'Hondt or Sainte-Laguë), the largest-remainder method, and first-past-the-post. In many countries, an electoral threshold is implemented to prevent very small parties from entering the parliament. Further, several countries have apportionment systems that incorporate multiple districts. We study how computationally hard it is to change the election outcome (i.e., to increase or limit the influence of a distinguished party) by convincing a limited number of voters to change their vote. We refer to these bribery-style attacks as <em>strategic campaigns</em> and study the corresponding problems in terms of their computational (both classical and parameterized) complexity. We also run extensive experiments on real-world election data and study the effectiveness of optimal campaigns, in particular as opposed to using heuristic bribing strategies and with respect to the influence of the threshold and the influence of the number of districts. For apportionment elections with threshold, finally, we propose—as an alternative to the standard top-choice mode—the second-chance mode where voters of parties below the threshold receive a second chance to vote for another party, and we establish computational complexity results also in this setting.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"155 ","pages":"Article 103700"},"PeriodicalIF":0.9,"publicationDate":"2026-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144864523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Computer and System Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1