Pub Date : 2023-09-01DOI: 10.1016/j.jcss.2023.04.004
Miika Hannula , Xinyi Li , Sebastian Link
Codd's rule of entity integrity stipulates that every table has a primary key. Key sets can control entity integrity when primary keys do not exist. While key set validation is quadratic, update maintenance for unary key sets is efficient when incomplete values only occur in few key columns. We establish a binary axiomatization for the implication problem, and prove its coNP-completeness. However, the implication of unary by arbitrary key sets has better properties. The fragment enjoys a unary axiomatization and is decidable in quadratic time. Hence, we can minimize overheads before validating key sets. While Armstrong relations do not always exist, we show how to compute them for any instance of our fragment. Similarly, we show how unary keys sets can be mined from relations using hypergraph transversals. Finally, we establish an axiomatization and computational complexity for the implication problem of key sets combined with NOT NULL constraints.
{"title":"Controlling entity integrity with key sets","authors":"Miika Hannula , Xinyi Li , Sebastian Link","doi":"10.1016/j.jcss.2023.04.004","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.04.004","url":null,"abstract":"<div><p><span>Codd's rule of entity integrity stipulates that every table has a primary key. Key sets can control entity integrity when primary keys do not exist. While key set validation is quadratic, update maintenance for unary key sets is efficient when incomplete values only occur in few key columns. We establish a binary axiomatization for the implication problem, and prove its </span><span>coNP</span><span><span>-completeness. However, the implication of unary by arbitrary key sets has better properties. The fragment enjoys a unary axiomatization and is decidable in quadratic time. Hence, we can minimize overheads before validating key sets. While Armstrong relations do not always exist, we show how to compute them for any instance of our fragment. Similarly, we show how unary keys sets can be mined from relations using hypergraph transversals. Finally, we establish an axiomatization and </span>computational complexity for the implication problem of key sets combined with </span><span>NOT NULL</span> constraints.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 195-219"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.1016/j.jcss.2023.03.004
Ashwin Jacob , Diptapriyo Majumdar , Venkatesh Raman
The problem of deletion of vertices to a hereditary graph class is a well-studied problem in parameterized complexity. Recently, a natural extension of the problem was initiated where we are given a finite set of hereditary graph classes and we determine whether k vertices can be deleted from a given graph so that the connected components of the resulting graph belong to one of the given hereditary graph classes. The problem is shown to be fixed parameter tractable (FPT) when the deletion problem to each of the given hereditary graph classes is fixed-parameter tractable, and the property of being in any of the graph classes is expressible in the counting monodic second order (CMSO) logic. This paper focuses on pairs of specific graph classes () in which we would like the connected components of the resulting graph to belong to, and design simpler and more efficient FPT algorithms.
{"title":"Deletion to scattered graph classes II - improved FPT algorithms for deletion to pairs of graph classes","authors":"Ashwin Jacob , Diptapriyo Majumdar , Venkatesh Raman","doi":"10.1016/j.jcss.2023.03.004","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.03.004","url":null,"abstract":"<div><p>The problem of deletion of vertices to a hereditary graph class is a well-studied problem in parameterized complexity. Recently, a natural extension of the problem was initiated where we are given a finite set of hereditary graph classes and we determine whether <em>k</em> vertices can be deleted from a given graph so that the connected components of the resulting graph belong to one of the given hereditary graph classes. The problem is shown to be fixed parameter tractable (FPT) when the deletion problem to each of the given hereditary graph classes is fixed-parameter tractable, and the property of being in any of the graph classes is expressible in the counting monodic second order (CMSO) logic. This paper focuses on pairs of specific graph classes (<span><math><msub><mrow><mi>Π</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><msub><mrow><mi>Π</mi></mrow><mrow><mn>2</mn></mrow></msub></math></span><span>) in which we would like the connected components of the resulting graph to belong to, and design simpler and more efficient FPT algorithms.</span></p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 280-301"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.1016/j.jcss.2023.03.006
Fedor V. Fomin, Petr A. Golovach, Nidhi Purohit
In the Categorical Clustering problem, we are given a set of vectors (matrix) over , where Σ is a finite alphabet, and integers k and B. The task is to partition A into k clusters such that the median objective of the clustering in the Hamming norm is at most B. Fomin, Golovach, and Panolan [ICALP 2018] proved that the problem is fixed-parameter tractable for the binary case . We extend this algorithmic result to a popular capacitated clustering model, where in addition the sizes of the clusters are lower and upper bounded by integer parameters p and q, respectively. Our main theorem is that the problem is solvable in time .
{"title":"Parameterized complexity of categorical clustering with size constraints","authors":"Fedor V. Fomin, Petr A. Golovach, Nidhi Purohit","doi":"10.1016/j.jcss.2023.03.006","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.03.006","url":null,"abstract":"<div><p>In the <span>Categorical Clustering</span> problem, we are given a set of vectors (matrix) <span><math><mi>A</mi><mo>=</mo><mo>{</mo><msub><mrow><mi>a</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><mo>…</mo><mo>,</mo><msub><mrow><mi>a</mi></mrow><mrow><mi>n</mi></mrow></msub><mo>}</mo></math></span> over <span><math><msup><mrow><mi>Σ</mi></mrow><mrow><mi>m</mi></mrow></msup></math></span>, where Σ is a finite alphabet, and integers <em>k</em> and <em>B</em>. The task is to partition <strong>A</strong> into <em>k</em> clusters such that the median objective of the clustering in the Hamming norm is at most <em>B</em>. Fomin, Golovach, and Panolan [ICALP 2018] proved that the problem is fixed-parameter tractable for the binary case <span><math><mi>Σ</mi><mo>=</mo><mo>{</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>}</mo></math></span>. We extend this algorithmic result to a popular capacitated clustering model, where in addition the sizes of the clusters are lower and upper bounded by integer parameters <em>p</em> and <em>q</em>, respectively. Our main theorem is that the problem is solvable in time <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>O</mi><mo>(</mo><mi>B</mi><mi>log</mi><mo></mo><mi>B</mi><mo>)</mo></mrow></msup><mo>|</mo><mi>Σ</mi><msup><mrow><mo>|</mo></mrow><mrow><mi>B</mi></mrow></msup><mo>⋅</mo><msup><mrow><mo>(</mo><mi>m</mi><mi>n</mi><mo>)</mo></mrow><mrow><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></mrow></msup></math></span>.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 171-194"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.1016/j.jcss.2023.02.008
Siddharth Gupta , Guy Sa'ar , Meirav Zehavi
Over the past few decades, a large body of works studied the (in)tractability of various computational problems on grid graphs, which often yield substantially faster algorithms than general graphs. Unfortunately, the recognition of a grid graph is hard—it was shown to be NP-hard already in 1987. In this paper, we provide several positive results in this regard in the framework of parameterized complexity. Specifically, our contribution is threefold. First, we show that the problem is FPT parameterized by where is the maximum size of a connected component of G. Second, we present a new parameterization, denoted , relating graph distance to geometric distance. We show that the problem is para-NP-hard parameterized by , but FPT parameterized by on trees, as well as FPT parameterized by . Third, we show that the recognition of grid graphs is NP-hard on graphs of pathwidth 2 where .
{"title":"Grid recognition: Classical and parameterized computational perspectives","authors":"Siddharth Gupta , Guy Sa'ar , Meirav Zehavi","doi":"10.1016/j.jcss.2023.02.008","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.02.008","url":null,"abstract":"<div><p>Over the past few decades, a large body of works studied the (in)tractability of various computational problems on grid graphs, which often yield substantially faster algorithms than general graphs. Unfortunately, the recognition of a grid graph is hard—it was shown to be NP-hard already in 1987. In this paper, we provide several positive results in this regard in the framework of parameterized complexity. Specifically, our contribution is threefold. First, we show that the problem is FPT parameterized by <span><math><mi>k</mi><mo>+</mo><mrow><mi>mcc</mi></mrow></math></span> where <span><math><mi>mcc</mi></math></span> is the maximum size of a connected component of <em>G</em>. Second, we present a new parameterization, denoted <span><math><msub><mrow><mi>a</mi></mrow><mrow><mi>G</mi></mrow></msub></math></span><span><span>, relating graph distance to </span>geometric distance. We show that the problem is para-NP-hard parameterized by </span><span><math><msub><mrow><mi>a</mi></mrow><mrow><mi>G</mi></mrow></msub></math></span>, but FPT parameterized by <span><math><msub><mrow><mi>a</mi></mrow><mrow><mi>G</mi></mrow></msub></math></span> on trees, as well as FPT parameterized by <span><math><mi>k</mi><mo>+</mo><msub><mrow><mi>a</mi></mrow><mrow><mi>G</mi></mrow></msub></math></span>. Third, we show that the recognition of <span><math><mi>k</mi><mo>×</mo><mi>r</mi></math></span> grid graphs is NP-hard on graphs of pathwidth 2 where <span><math><mi>k</mi><mo>=</mo><mn>3</mn></math></span>.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 17-62"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.1016/j.jcss.2023.03.001
Tomoyuki Yamakami
We aim at investigating the solvability/insolvability of nondeterministic logarithmic-space (NL) decision, search, and optimization problems parameterized by natural size parameters using simultaneously polynomial time and sub-linear space. We are particularly focused on —a restricted variant of the 2CNF Boolean (propositional) formula satisfiability problem in which each variable of a given 2CNF formula appears at most 3 times in the form of literals—parameterized by the total number of variables of each given Boolean formula ϕ. We propose a new, practical working hypothesis, called the linear space hypothesis (LSH), which asserts that cannot be solved in polynomial time using only “sub-linear” space (i.e., space for a constant ) on all instances x. Immediate consequences of LSH include , , and . For our investigation, we fully utilize a key notion of “short reductions”, under which the class PsubLIN of all parameterized polynomial-time sub-linear-space solvable problems is indeed closed.
{"title":"The 2CNF Boolean formula satisfiability problem and the linear space hypothesis","authors":"Tomoyuki Yamakami","doi":"10.1016/j.jcss.2023.03.001","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.03.001","url":null,"abstract":"<div><p><span><span>We aim at investigating the solvability/insolvability of nondeterministic logarithmic-space (NL) decision, search, and optimization problems parameterized by natural size parameters using simultaneously </span>polynomial time and sub-linear space. We are particularly focused on </span><span><math><msub><mrow><mn>2SAT</mn></mrow><mrow><mn>3</mn></mrow></msub></math></span><span>—a restricted variant of the 2CNF Boolean (propositional) formula satisfiability problem in which each variable of a given 2CNF formula appears at most 3 times in the form of literals—parameterized by the total number </span><span><math><msub><mrow><mi>m</mi></mrow><mrow><mi>v</mi><mi>b</mi><mi>l</mi></mrow></msub><mo>(</mo><mi>ϕ</mi><mo>)</mo></math></span><span> of variables of each given Boolean formula </span><em>ϕ</em>. We propose a new, practical working hypothesis, called the linear space hypothesis (LSH), which asserts that <span><math><mo>(</mo><msub><mrow><mn>2SAT</mn></mrow><mrow><mn>3</mn></mrow></msub><mo>,</mo><msub><mrow><mi>m</mi></mrow><mrow><mi>v</mi><mi>b</mi><mi>l</mi></mrow></msub><mo>)</mo></math></span> cannot be solved in polynomial time using only “sub-linear” space (i.e., <span><math><msub><mrow><mi>m</mi></mrow><mrow><mi>v</mi><mi>b</mi><mi>l</mi></mrow></msub><msup><mrow><mo>(</mo><mi>x</mi><mo>)</mo></mrow><mrow><mi>ε</mi></mrow></msup><mspace></mspace><mi>p</mi><mi>o</mi><mi>l</mi><mi>y</mi><mi>l</mi><mi>o</mi><mi>g</mi><mo>(</mo><mo>|</mo><mi>x</mi><mo>|</mo><mo>)</mo></math></span> space for a constant <span><math><mi>ε</mi><mo>∈</mo><mo>[</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>)</mo></math></span>) on all instances <em>x</em>. Immediate consequences of LSH include <span><math><mi>L</mi><mo>≠</mo><mrow><mi>NL</mi></mrow></math></span>, <span><math><mrow><mi>LOGDCFL</mi></mrow><mo>≠</mo><mrow><mi>LOGCFL</mi></mrow></math></span>, and <span><math><mrow><mi>SC</mi></mrow><mo>≠</mo><mrow><mi>NSC</mi></mrow></math></span>. For our investigation, we fully utilize a key notion of “short reductions”, under which the class PsubLIN of all parameterized polynomial-time sub-linear-space solvable problems is indeed closed.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 88-112"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49738284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.1016/j.jcss.2023.03.003
Paloma T. Lima , Vinicius F. dos Santos , Ignasi Sau , Uéverton S. Souza , Prafullkumar Tale
Given a graph G on n vertices and two integers k and d, the Contraction(vc) problem asks whether one can contract at most k edges to reduce the vertex cover number of G by at least d. Recently, Lima et al. [JCSS 2021] proved that Contraction(vc) admits an XP algorithm running in time . They asked whether this problem is FPT under this parameterization. In this article, we prove that: (i) Contraction(vc) is W[1]-hard parameterized by . Moreover, unless the ETH fails, the problem does not admit an algorithm running in time for any function f. This answers negatively the open question stated in Lima et al. [JCSS 2021]. (ii) Contraction(vc) is NP-hard even when . (iii) Contraction(vc) can be solved in time . This improves the algorithm of Lima et al. [JCSS 2021], and shows that when , Contraction(vc) is FPT parameterized by d (or by k).
{"title":"Reducing the vertex cover number via edge contractions","authors":"Paloma T. Lima , Vinicius F. dos Santos , Ignasi Sau , Uéverton S. Souza , Prafullkumar Tale","doi":"10.1016/j.jcss.2023.03.003","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.03.003","url":null,"abstract":"<div><p>Given a graph <em>G</em> on <em>n</em> vertices and two integers <em>k</em> and <em>d</em>, the <span>Contraction(<span>vc</span>)</span> problem asks whether one can contract at most <em>k</em> edges to reduce the vertex cover number of <em>G</em> by at least <em>d</em>. Recently, Lima et al. [JCSS 2021] proved that <span>Contraction(<span>vc</span>)</span> admits an <span>XP</span> algorithm running in time <span><math><mi>f</mi><mo>(</mo><mi>d</mi><mo>)</mo><mo>⋅</mo><msup><mrow><mi>n</mi></mrow><mrow><mi>O</mi><mo>(</mo><mi>d</mi><mo>)</mo></mrow></msup></math></span>. They asked whether this problem is <span>FPT</span> under this parameterization. In this article, we prove that: (i) <span>Contraction(<span>vc</span>)</span> is <span>W</span>[1]-<span>hard</span> parameterized by <span><math><mi>k</mi><mo>+</mo><mi>d</mi></math></span>. Moreover, unless the <span>ETH</span> fails, the problem does not admit an algorithm running in time <span><math><mi>f</mi><mo>(</mo><mi>k</mi><mo>+</mo><mi>d</mi><mo>)</mo><mo>⋅</mo><msup><mrow><mi>n</mi></mrow><mrow><mi>o</mi><mo>(</mo><mi>k</mi><mo>+</mo><mi>d</mi><mo>)</mo></mrow></msup></math></span> for any function <em>f</em>. This answers negatively the open question stated in Lima et al. [JCSS 2021]. (ii) <span>Contraction(<span>vc</span>)</span> is <span>NP</span>-<span>hard</span> even when <span><math><mi>k</mi><mo>=</mo><mi>d</mi></math></span>. (iii) <span>Contraction(<span>vc</span>)</span> can be solved in time <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>O</mi><mo>(</mo><mi>d</mi><mo>)</mo></mrow></msup><mo>⋅</mo><msup><mrow><mi>n</mi></mrow><mrow><mi>k</mi><mo>−</mo><mi>d</mi><mo>+</mo><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></mrow></msup></math></span>. This improves the algorithm of Lima et al. [JCSS 2021], and shows that when <span><math><mi>k</mi><mo>=</mo><mi>d</mi></math></span>, <span>Contraction(<span>vc</span>)</span> is <span>FPT</span> parameterized by <em>d</em> (or by <em>k</em>).</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 63-87"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.1016/j.jcss.2023.03.008
Valentin Bartier , Nicolas Bousquet , Amer E. Mouawad
Given a graph G and two independent sets and of size k, the Independent Set Reconfiguration problem asks whether there exists a sequence of independent sets that transforms to such that each independent set is obtained from the previous one using a so-called reconfiguration step. Viewing each independent set as a collection of k tokens placed on the vertices of a graph G, the two most studied reconfiguration steps are token jumping and token sliding. Over a series of papers, it was shown that the Token Jumping problem is fixed-parameter tractable (for parameter k) when restricted to sparse graph classes, such as planar, bounded treewidth, and nowhere dense graphs. As for the Token Sliding problem, almost nothing is known. We remedy this situation by showing that Token Sliding is fixed-parameter tractable on graphs of bounded degree, planar graphs, and chordal graphs of bounded clique number.
{"title":"Galactic token sliding","authors":"Valentin Bartier , Nicolas Bousquet , Amer E. Mouawad","doi":"10.1016/j.jcss.2023.03.008","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.03.008","url":null,"abstract":"<div><p>Given a graph <em>G</em><span> and two independent sets </span><span><math><msub><mrow><mi>I</mi></mrow><mrow><mi>s</mi></mrow></msub></math></span> and <span><math><msub><mrow><mi>I</mi></mrow><mrow><mi>t</mi></mrow></msub></math></span> of size <em>k</em>, the <span>Independent Set Reconfiguration</span> problem asks whether there exists a sequence of independent sets that transforms <span><math><msub><mrow><mi>I</mi></mrow><mrow><mi>s</mi></mrow></msub></math></span> to <span><math><msub><mrow><mi>I</mi></mrow><mrow><mi>t</mi></mrow></msub></math></span> such that each independent set is obtained from the previous one using a so-called reconfiguration step. Viewing each independent set as a collection of <em>k</em> tokens placed on the vertices of a graph <em>G</em>, the two most studied reconfiguration steps are token jumping and token sliding. Over a series of papers, it was shown that the <span>Token Jumping</span> problem is fixed-parameter tractable (for parameter <em>k</em>) when restricted to sparse graph classes, such as planar, bounded treewidth, and nowhere dense graphs. As for the <span>Token Sliding</span> problem, almost nothing is known. We remedy this situation by showing that <span>Token Sliding</span><span> is fixed-parameter tractable on graphs of bounded degree, planar graphs<span>, and chordal graphs of bounded clique number.</span></span></p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 220-248"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49738230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.1016/j.jcss.2023.04.002
Bharat Adsul , Saptarshi Sarkar , A.V. Sreejith
We contribute to the refined understanding of language-logic-algebra interplay in a recent algebraic framework over countable words. Algebraic characterizations of the one variable fragment of FO as well as the boolean closure of the existential fragment of FO are established. We develop a seamless integration of the block product operation in the countable setting, and generalize well-known decompositional characterizations of FO and its two variable fragment. We propose an extension of FO admitting infinitary quantifiers to reason about inherent infinitary properties of countable words, and obtain a natural hierarchical block-product based characterization of this extension. Properties expressible in this extension can be simultaneously expressed in the classical logical systems such as WMSO and FO[cut]. We also rule out the possibility of a finite-basis for a block-product based characterization of these logical systems. Finally, we report algebraic characterizations of one variable fragments of the hierarchies of the new extension.
{"title":"Algebraic characterizations and block product decompositions for first order logic and its infinitary quantifier extensions over countable words","authors":"Bharat Adsul , Saptarshi Sarkar , A.V. Sreejith","doi":"10.1016/j.jcss.2023.04.002","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.04.002","url":null,"abstract":"<div><p>We contribute to the refined understanding of language-logic-algebra interplay in a recent algebraic framework over countable words. Algebraic characterizations of the one variable fragment of FO as well as the boolean closure of the existential fragment of FO are established. We develop a seamless integration of the block product operation in the countable setting, and generalize well-known decompositional characterizations of FO and its two variable fragment. We propose an extension of FO admitting infinitary quantifiers to reason about inherent infinitary properties of countable words, and obtain a natural hierarchical block-product based characterization of this extension. Properties expressible in this extension can be simultaneously expressed in the classical logical systems such as WMSO and FO[cut]. We also rule out the possibility of a finite-basis for a block-product based characterization of these logical systems. Finally, we report algebraic characterizations of one variable fragments of the hierarchies of the new extension.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 302-326"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49752944","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.1016/j.jcss.2023.103475
Francesco Betti Sorbelli , Alfredo Navarra , Lorenzo Palazzetti , Cristina M. Pinotti , Giuseppe Prencipe
We consider Internet of Things (IoT) sensors deployed inside an area to be monitored. Drones can be used to collect the data from the sensors, but they are constrained in energy and storage. Therefore, all drones need to select a subset of sensors whose data are the most relevant to be acquired, modeled by assigning a reward. We present an optimization problem called Multiple-drone Data-collection Maximization Problem (MDMP) whose objective is to plan a set of drones' missions aimed at maximizing the overall reward from the collected data, and such that each individual drone's mission energy cost and total collected data are within the energy and storage limits, respectively. We optimally solve MDMP by proposing an Integer Linear Programming based algorithm. Since MDMP is NP-hard, we devise suboptimal algorithms for single- and multiple-drone scenarios. Finally, we thoroughly evaluate our algorithms on the basis of random generated synthetic data.
{"title":"Wireless IoT sensors data collection reward maximization by leveraging multiple energy- and storage-constrained UAVs","authors":"Francesco Betti Sorbelli , Alfredo Navarra , Lorenzo Palazzetti , Cristina M. Pinotti , Giuseppe Prencipe","doi":"10.1016/j.jcss.2023.103475","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.103475","url":null,"abstract":"<div><p>We consider Internet of Things (IoT) sensors deployed inside an area to be monitored. Drones can be used to collect the data from the sensors, but they are constrained in energy and storage. Therefore, all drones need to select a subset of sensors whose data are the most relevant to be acquired, modeled by assigning a reward. We present an optimization problem called <em>Multiple-drone Data-collection Maximization Problem</em> (<span>MDMP</span>) whose objective is to plan a set of drones' missions aimed at maximizing the overall reward from the collected data, and such that each individual drone's mission energy cost and total collected data are within the energy and storage limits, respectively. We optimally solve <span>MDMP</span> by proposing an Integer Linear Programming based algorithm. Since <span>MDMP</span> is <em>NP</em>-hard, we devise suboptimal algorithms for single- and multiple-drone scenarios. Finally, we thoroughly evaluate our algorithms on the basis of random generated synthetic data.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"139 ","pages":"Article 103475"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-09-01DOI: 10.1016/j.jcss.2023.04.003
Sanjay Jain , Xiaodong Jia , Ammar Fathin Sabili , Frank Stephan
Floyd and Knuth investigated in 1990 register machines which can add, subtract and compare integers as primitive operations. They asked whether their current bound on the number of registers for multiplying and dividing fast (running in time linear in the size of the input) can be improved and whether one can output fast the powers of two summing up to a positive integer in subquadratic time. Both questions are answered positively. Furthermore, it is shown that every function computed by only one register is automatic and that the automatic functions with one input can be computed with four registers in linear time; automatic functions with a larger number of inputs can be computed with 5 registers in linear time. There is a nonautomatic function with one input which can be computed with two registers in linear time.
{"title":"Addition machines, automatic functions and open problems of Floyd and Knuth","authors":"Sanjay Jain , Xiaodong Jia , Ammar Fathin Sabili , Frank Stephan","doi":"10.1016/j.jcss.2023.04.003","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.04.003","url":null,"abstract":"<div><p>Floyd and Knuth investigated in 1990 register machines which can add, subtract and compare integers as primitive operations. They asked whether their current bound on the number of registers for multiplying and dividing fast (running in time linear in the size of the input) can be improved and whether one can output fast the powers of two summing up to a positive integer in subquadratic time. Both questions are answered positively. Furthermore, it is shown that every function computed by only one register is automatic and that the automatic functions with one input can be computed with four registers in linear time; automatic functions with a larger number of inputs can be computed with 5 registers in linear time. There is a nonautomatic function with one input which can be computed with two registers in linear time.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 135-156"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}