首页 > 最新文献

Journal of Computer and System Sciences最新文献

英文 中文
Serial and parallel kernelization of Multiple Hitting Set parameterized by the Dilworth number, implemented on the GPU 以Dilworth数为参数的多命中集的串行和并行核化,在GPU上实现
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2023-09-12 DOI: 10.1016/j.jcss.2023.103479
René van Bevern , Artem M. Kirilin , Daniel A. Skachkov , Pavel V. Smirnov , Oxana Yu. Tsidulko

The NP-hard Multiple Hitting Set problem is the problem of finding a minimum-cardinality set intersecting each of the sets in a given input collection a given number of times. Generalizing a well-known data reduction algorithm due to Weihe, we show a problem kernel for Multiple Hitting Set parameterized by the Dilworth number, a graph parameter introduced by Foldes and Hammer in 1978 yet seemingly so far unexplored in the context of parameterized complexity theory. Using matrix multiplication, we speed up the algorithm to quadratic sequential time and logarithmic parallel time. We experimentally evaluate our algorithms. By implementing our algorithm on GPUs, we show the feasibility of realizing kernelization algorithms on SIMD (Single Instruction, Multiple Data) architectures.

NP困难的多重命中集问题是找到与给定输入集合中的每个集相交给定次数的最小基数集的问题。推广了Weihe的一个著名的数据约简算法,我们给出了由Dilworth数参数化的多重打击集的问题核。Dilworth数是Foldes和Hammer于1978年引入的一个图参数,但在参数化复杂性理论的背景下似乎迄今尚未探索。利用矩阵乘法,将算法加速到二次序列时间和对数并行时间。我们通过实验评估了我们的算法。通过在GPU上实现我们的算法,我们展示了在SIMD(单指令,多数据)架构上实现核化算法的可行性。
{"title":"Serial and parallel kernelization of Multiple Hitting Set parameterized by the Dilworth number, implemented on the GPU","authors":"René van Bevern ,&nbsp;Artem M. Kirilin ,&nbsp;Daniel A. Skachkov ,&nbsp;Pavel V. Smirnov ,&nbsp;Oxana Yu. Tsidulko","doi":"10.1016/j.jcss.2023.103479","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.103479","url":null,"abstract":"<div><p>The NP-hard Multiple Hitting Set problem is the problem of finding a minimum-cardinality set intersecting each of the sets in a given input collection a given number of times. Generalizing a well-known data reduction<span> algorithm due to Weihe, we show a problem kernel for Multiple Hitting Set parameterized by the Dilworth number, a graph parameter introduced by Foldes and Hammer in 1978 yet seemingly so far unexplored in the context of parameterized complexity theory. Using matrix multiplication, we speed up the algorithm to quadratic sequential time and logarithmic parallel time. We experimentally evaluate our algorithms. By implementing our algorithm on GPUs, we show the feasibility of realizing kernelization algorithms on SIMD (Single Instruction, Multiple Data) architectures.</span></p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"139 ","pages":"Article 103479"},"PeriodicalIF":1.1,"publicationDate":"2023-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725571","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
From symmetry to asymmetry: Generalizing TSP approximations by parametrization 从对称到不对称:用参数化推广TSP近似
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2023-09-01 DOI: 10.1016/j.jcss.2023.03.007
Lukas Behrendt , Katrin Casel , Tobias Friedrich , J.A. Gregor Lagodzinski , Alexander Löser , Marcus Wilhelm

We generalize the tree doubling and Christofides algorithm to parameterized approximations for ATSP (constant factor approximations that invest more runtime with respect to a chosen parameter). The parameters we consider are upper bounded by the number of asymmetric distances, which yields algorithms to efficiently compute good approximations for moderately asymmetric TSP instances. As generalization of the Christofides algorithm, we derive a parameterized 2.5-approximation, with the size of a vertex cover for the subgraph induced by the edges with asymmetric distances as parameter. Our generalization of tree doubling gives a parameterized 3-approximation, where the parameter is the minimum number of asymmetric distances in a minimum spanning arborescence. Further, we combine these with a notion of symmetry relaxation which allows to trade approximation guarantee for runtime. Since the parameters we consider are theoretically incomparable, we present experimental results showing that generalized tree doubling frequently outperforms generalized Christofides with respect to parameter size.

我们将树加倍和Christofides算法推广到ATSP的参数化近似(相对于所选参数投入更多运行时间的常数因子近似)。我们考虑的参数是非对称距离数的上界,这产生了有效计算中等不对称TSP实例的良好近似值的算法。作为Christofides算法的推广,我们导出了一个参数化的2.5近似,以具有不对称距离的边诱导的子图的顶点覆盖的大小为参数。我们对树加倍的推广给出了一个参数化的3-近似,其中参数是最小生成树场景中非对称距离的最小数目。此外,我们将这些与对称松弛的概念相结合,该概念允许用近似保证换取运行时。由于我们考虑的参数在理论上是不可比的,我们给出的实验结果表明,广义树加倍在参数大小方面经常优于广义Christofides。
{"title":"From symmetry to asymmetry: Generalizing TSP approximations by parametrization","authors":"Lukas Behrendt ,&nbsp;Katrin Casel ,&nbsp;Tobias Friedrich ,&nbsp;J.A. Gregor Lagodzinski ,&nbsp;Alexander Löser ,&nbsp;Marcus Wilhelm","doi":"10.1016/j.jcss.2023.03.007","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.03.007","url":null,"abstract":"<div><p><span>We generalize the tree doubling and Christofides algorithm to parameterized approximations for ATSP (constant factor approximations that invest more runtime with respect to a chosen parameter). The parameters we consider are upper bounded by the number of </span><em>asymmetric distances</em><span>, which yields algorithms to efficiently compute good approximations for moderately asymmetric TSP instances. As generalization of the Christofides algorithm, we derive a parameterized 2.5-approximation, with the size of a vertex cover for the subgraph induced by the edges with asymmetric distances as parameter. Our generalization of tree doubling gives a parameterized 3-approximation, where the parameter is the minimum number of asymmetric distances in a minimum spanning arborescence. Further, we combine these with a notion of symmetry relaxation which allows to trade approximation guarantee for runtime. Since the parameters we consider are theoretically incomparable, we present experimental results showing that generalized tree doubling frequently outperforms generalized Christofides with respect to parameter size.</span></p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 157-170"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Synchronizing Boolean networks asynchronously 异步同步布尔网络
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2023-09-01 DOI: 10.1016/j.jcss.2023.04.001
Julio Aracena , Adrien Richard , Lilian Salinas

The asynchronous automaton of a Boolean network f:{0,1}n{0,1}n, considered in many applications, is the finite deterministic automaton where the set of states is {0,1}n, the alphabet is [n], and the action of letter i on a state x consists in either switching the ith component if fi(x)xi or doing nothing otherwise. In this paper, we ask for the existence of synchronizing words for this automaton, and their minimal length, when f is the and-net over an arc-signed digraph G on [n]: for every i[n], fi(x)=1 if and only if xj=1 (xj0) for every positive (negative) arc from j to i. Our main result is that if G is strongly connected and has no positive cycles, then either there exists a synchronizing word of length at most 10(5+1)n or G is a cycle and there are no synchronizing words. We also give complexity results showing that the situation is much more complex if one of the two hypothesis made on G is removed.

布尔网络的异步自动机f:{0,1}n→{0,1}n,在许多应用中被认为是有限确定性自动机,其中状态集为{0,1}n,字母表是[n],字母i在状态x上的作用在于,如果fi(x)≠xi,则切换第i个分量,或者不做其他事情。在本文中,当f是在[n]上的弧有符号有向图G上的和网时,我们要求该自动机同步字的存在性及其最小长度:对于每个i∈[n],fi(x)=1当且仅当对于从j到i的每个正(负)弧xj=1(xj≠0),则存在长度至多为10(5+1)n的同步字,或者G是一个周期而不存在同步字。我们还给出了复杂性结果,表明如果去掉对G的两个假设中的一个,情况会复杂得多。
{"title":"Synchronizing Boolean networks asynchronously","authors":"Julio Aracena ,&nbsp;Adrien Richard ,&nbsp;Lilian Salinas","doi":"10.1016/j.jcss.2023.04.001","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.04.001","url":null,"abstract":"<div><p>The <span><em>asynchronous </em><em>automaton</em></span> of a Boolean network <span><math><mi>f</mi><mo>:</mo><msup><mrow><mo>{</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>}</mo></mrow><mrow><mi>n</mi></mrow></msup><mo>→</mo><msup><mrow><mo>{</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>}</mo></mrow><mrow><mi>n</mi></mrow></msup></math></span><span>, considered in many applications, is the finite deterministic automaton where the set of states is </span><span><math><msup><mrow><mo>{</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>}</mo></mrow><mrow><mi>n</mi></mrow></msup></math></span>, the alphabet is <span><math><mo>[</mo><mi>n</mi><mo>]</mo></math></span>, and the action of letter <em>i</em> on a state <em>x</em> consists in either switching the <em>i</em>th component if <span><math><msub><mrow><mi>f</mi></mrow><mrow><mi>i</mi></mrow></msub><mo>(</mo><mi>x</mi><mo>)</mo><mo>≠</mo><msub><mrow><mi>x</mi></mrow><mrow><mi>i</mi></mrow></msub></math></span> or doing nothing otherwise. In this paper, we ask for the existence of synchronizing words for this automaton, and their minimal length, when <em>f</em><span> is the and-net over an arc-signed digraph </span><em>G</em> on <span><math><mo>[</mo><mi>n</mi><mo>]</mo></math></span>: for every <span><math><mi>i</mi><mo>∈</mo><mo>[</mo><mi>n</mi><mo>]</mo></math></span>, <span><math><msub><mrow><mi>f</mi></mrow><mrow><mi>i</mi></mrow></msub><mo>(</mo><mi>x</mi><mo>)</mo><mo>=</mo><mn>1</mn></math></span> if and only if <span><math><msub><mrow><mi>x</mi></mrow><mrow><mi>j</mi></mrow></msub><mo>=</mo><mn>1</mn></math></span> (<span><math><msub><mrow><mi>x</mi></mrow><mrow><mi>j</mi></mrow></msub><mo>≠</mo><mn>0</mn></math></span>) for every positive (negative) arc from <em>j</em> to <em>i</em>. Our main result is that if <em>G</em> is strongly connected and has no positive cycles, then either there exists a synchronizing word of length at most <span><math><mn>10</mn><msup><mrow><mo>(</mo><msqrt><mrow><mn>5</mn></mrow></msqrt><mo>+</mo><mn>1</mn><mo>)</mo></mrow><mrow><mi>n</mi></mrow></msup></math></span> or <em>G</em> is a cycle and there are no synchronizing words. We also give complexity results showing that the situation is much more complex if one of the two hypothesis made on <em>G</em> is removed.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 249-279"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49738231","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Markov chains and unambiguous automata 马尔可夫链和无二义自动机
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2023-09-01 DOI: 10.1016/j.jcss.2023.03.005
Christel Baier , Stefan Kiefer , Joachim Klein , David Müller , James Worrell

Unambiguous automata are nondeterministic automata in which every word has at most one accepting run. In this paper we give a polynomial-time algorithm for model checking discrete-time Markov chains against ω-regular specifications represented as unambiguous automata. We furthermore show that the complexity of this model checking problem lies in NC: the subclass of P comprising those problems solvable in poly-logarithmic parallel time. These complexity bounds match the known bounds for model checking Markov chains against specifications given as deterministic automata, notwithstanding the fact that unambiguous automata can be exponentially more succinct than deterministic automata. We report on an implementation of our procedure, including an experiment in which the implementation is used to model check LTL formulas on Markov chains.

无歧义自动机是一种不确定性自动机,其中每个单词最多有一个可接受的游程。在本文中,我们给出了一个多项式时间算法,用于针对以模糊自动机表示的ω-正则规范对离散时间马尔可夫链进行模型检查。我们进一步证明了这个模型检验问题的复杂性在于NC:P的子类包括那些在多对数并行时间内可解的问题。这些复杂度边界与根据确定性自动机给出的规范对马尔可夫链进行模型检查的已知边界相匹配,尽管无模糊自动机可以比确定性自动机更简洁。我们报告了我们的过程的实现,包括一个实验,其中该实现用于对马尔可夫链上的LTL公式进行建模检查。
{"title":"Markov chains and unambiguous automata","authors":"Christel Baier ,&nbsp;Stefan Kiefer ,&nbsp;Joachim Klein ,&nbsp;David Müller ,&nbsp;James Worrell","doi":"10.1016/j.jcss.2023.03.005","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.03.005","url":null,"abstract":"<div><p>Unambiguous automata are nondeterministic automata in which every word has at most one accepting run. In this paper we give a polynomial-time algorithm for model checking discrete-time Markov chains against <em>ω</em>-regular specifications represented as unambiguous automata. We furthermore show that the complexity of this model checking problem lies in NC: the subclass of P comprising those problems solvable in poly-logarithmic parallel time. These complexity bounds match the known bounds for model checking Markov chains against specifications given as deterministic automata, notwithstanding the fact that unambiguous automata can be exponentially more succinct than deterministic automata. We report on an implementation of our procedure, including an experiment in which the implementation is used to model check LTL formulas on Markov chains.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 113-134"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Complexity of verification in self-assembly with prebuilt assemblies 预组装自组装验证的复杂性
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2023-09-01 DOI: 10.1016/j.jcss.2023.03.002
David Caballero , Timothy Gomez , Robert Schweller , Tim Wylie

We analyze the complexity of two fundamental verification problems within a generalization of the two-handed tile self-assembly model (2HAM) where initial system assemblies are not restricted to be singleton tiles, but may be larger prebuilt assemblies. Within this model we consider the producibility problem, which asks if a given tile system builds, or produces, a given assembly, and the unique assembly verification (UAV) problem, which asks if a given system uniquely produces a given assembly. We show that producibility is NP-complete and UAV is coNPNP-complete even when the initial assembly size and temperature threshold are both bounded by a constant. This is in stark contrast to results in the standard model with singleton input tiles where producibility is in P and UAV is coNP-complete with constant temperature. We further provide preliminary polynomial time results for producibility and UAV in the case of 1-dimensional linear assemblies with pre-built assemblies, as well as extend our results to the abstract Tile Assembly Model (aTAM) with constant-size attachable assemblies.

我们在双手瓦片自组装模型(2HAM)的推广中分析了两个基本验证问题的复杂性,其中初始系统组件不限于单个瓦片,而是可能是更大的预构建组件。在这个模型中,我们考虑了可生产性问题,该问题询问给定的瓦片系统是否构建或生产给定的组件,以及唯一的组件验证(UAV)问题,该问题询问给定的系统是否唯一地生产给定的组装。我们证明,即使初始组装尺寸和温度阈值都受常数约束,可生产性也是NP完全的,无人机也是coNPNP完全的。这与具有单一输入瓦片的标准模型中的结果形成了鲜明对比,其中可生产性为P,无人机在恒定温度下为coNP完全。我们进一步提供了具有预制组件的一维线性组件的可生产性和无人机的初步多项式时间结果,并将我们的结果扩展到具有恒定尺寸可连接组件的抽象瓷砖组件模型(aTAM)。
{"title":"Complexity of verification in self-assembly with prebuilt assemblies","authors":"David Caballero ,&nbsp;Timothy Gomez ,&nbsp;Robert Schweller ,&nbsp;Tim Wylie","doi":"10.1016/j.jcss.2023.03.002","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.03.002","url":null,"abstract":"<div><p><span>We analyze the complexity of two fundamental verification problems within a generalization of the two-handed tile self-assembly model (2HAM) where initial system assemblies are not restricted to be singleton tiles, but may be larger prebuilt assemblies. Within this model we consider the </span><em>producibility</em> problem, which asks if a given tile system builds, or produces, a given assembly, and the <em>unique assembly verification</em> (UAV) problem, which asks if a given system <em>uniquely</em> produces a given assembly. We show that producibility is NP-complete and UAV is coNP<span><math><msup><mrow></mrow><mrow><mi>N</mi><mi>P</mi></mrow></msup></math></span><span>-complete even when the initial assembly size and temperature threshold are both bounded by a constant. This is in stark contrast to results in the standard model with singleton input tiles where producibility is in P and UAV is coNP-complete with constant temperature. We further provide preliminary polynomial time results for producibility and UAV in the case of 1-dimensional </span><em>linear</em> assemblies with pre-built assemblies, as well as extend our results to the abstract Tile Assembly Model (aTAM) with constant-size attachable assemblies.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 1-16"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49752946","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Controlling entity integrity with key sets 用键集控制实体完整性
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2023-09-01 DOI: 10.1016/j.jcss.2023.04.004
Miika Hannula , Xinyi Li , Sebastian Link

Codd's rule of entity integrity stipulates that every table has a primary key. Key sets can control entity integrity when primary keys do not exist. While key set validation is quadratic, update maintenance for unary key sets is efficient when incomplete values only occur in few key columns. We establish a binary axiomatization for the implication problem, and prove its coNP-completeness. However, the implication of unary by arbitrary key sets has better properties. The fragment enjoys a unary axiomatization and is decidable in quadratic time. Hence, we can minimize overheads before validating key sets. While Armstrong relations do not always exist, we show how to compute them for any instance of our fragment. Similarly, we show how unary keys sets can be mined from relations using hypergraph transversals. Finally, we establish an axiomatization and computational complexity for the implication problem of key sets combined with NOT NULL constraints.

Codd的实体完整性规则规定每个表都有一个主键。当主键不存在时,密钥集可以控制实体的完整性。虽然密钥集验证是二次的,但当不完全值只出现在少数密钥列中时,一元密钥集的更新维护是有效的。我们为蕴涵问题建立了一个二元公理化,并证明了它的coNP完备性。然而,任意键集的一元蕴涵具有更好的性质。片段享有一元公理化,并且在二次时间内是可判定的。因此,在验证密钥集之前,我们可以最大限度地减少开销。虽然阿姆斯特朗关系并不总是存在,但我们展示了如何为我们的碎片的任何实例计算它们。类似地,我们展示了如何使用超图横截从关系中挖掘一元密钥集。最后,我们建立了与NOT NULL约束相结合的密钥集蕴涵问题的公理化和计算复杂性。
{"title":"Controlling entity integrity with key sets","authors":"Miika Hannula ,&nbsp;Xinyi Li ,&nbsp;Sebastian Link","doi":"10.1016/j.jcss.2023.04.004","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.04.004","url":null,"abstract":"<div><p><span>Codd's rule of entity integrity stipulates that every table has a primary key. Key sets can control entity integrity when primary keys do not exist. While key set validation is quadratic, update maintenance for unary key sets is efficient when incomplete values only occur in few key columns. We establish a binary axiomatization for the implication problem, and prove its </span><span>coNP</span><span><span>-completeness. However, the implication of unary by arbitrary key sets has better properties. The fragment enjoys a unary axiomatization and is decidable in quadratic time. Hence, we can minimize overheads before validating key sets. While Armstrong relations do not always exist, we show how to compute them for any instance of our fragment. Similarly, we show how unary keys sets can be mined from relations using hypergraph transversals. Finally, we establish an axiomatization and </span>computational complexity for the implication problem of key sets combined with </span><span>NOT NULL</span> constraints.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 195-219"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725739","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deletion to scattered graph classes II - improved FPT algorithms for deletion to pairs of graph classes 对分散图类的删除II -改进的FPT算法对图类的删除
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2023-09-01 DOI: 10.1016/j.jcss.2023.03.004
Ashwin Jacob , Diptapriyo Majumdar , Venkatesh Raman

The problem of deletion of vertices to a hereditary graph class is a well-studied problem in parameterized complexity. Recently, a natural extension of the problem was initiated where we are given a finite set of hereditary graph classes and we determine whether k vertices can be deleted from a given graph so that the connected components of the resulting graph belong to one of the given hereditary graph classes. The problem is shown to be fixed parameter tractable (FPT) when the deletion problem to each of the given hereditary graph classes is fixed-parameter tractable, and the property of being in any of the graph classes is expressible in the counting monodic second order (CMSO) logic. This paper focuses on pairs of specific graph classes (Π1,Π2) in which we would like the connected components of the resulting graph to belong to, and design simpler and more efficient FPT algorithms.

遗传图类的顶点删除问题是参数化复杂度中一个研究得很好的问题。最近,该问题的一个自然扩展被提出,其中我们得到了一组有限的遗传图类,并且我们确定是否可以从给定的图中删除k个顶点,使得得到的图的连接分量属于给定的遗传图类别之一。当每个给定的遗传图类的删除问题都是固定参数可处理的,并且在任何一个图类中的性质都可以用计数二阶(CMSO)逻辑表示时,该问题被证明是固定参数易处理的(FPT)。本文重点研究了一对特定的图类(π1,π2),我们希望得到的图的连通分量属于这些图类,并设计了更简单、更有效的FPT算法。
{"title":"Deletion to scattered graph classes II - improved FPT algorithms for deletion to pairs of graph classes","authors":"Ashwin Jacob ,&nbsp;Diptapriyo Majumdar ,&nbsp;Venkatesh Raman","doi":"10.1016/j.jcss.2023.03.004","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.03.004","url":null,"abstract":"<div><p>The problem of deletion of vertices to a hereditary graph class is a well-studied problem in parameterized complexity. Recently, a natural extension of the problem was initiated where we are given a finite set of hereditary graph classes and we determine whether <em>k</em> vertices can be deleted from a given graph so that the connected components of the resulting graph belong to one of the given hereditary graph classes. The problem is shown to be fixed parameter tractable (FPT) when the deletion problem to each of the given hereditary graph classes is fixed-parameter tractable, and the property of being in any of the graph classes is expressible in the counting monodic second order (CMSO) logic. This paper focuses on pairs of specific graph classes (<span><math><msub><mrow><mi>Π</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><msub><mrow><mi>Π</mi></mrow><mrow><mn>2</mn></mrow></msub></math></span><span>) in which we would like the connected components of the resulting graph to belong to, and design simpler and more efficient FPT algorithms.</span></p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 280-301"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Parameterized complexity of categorical clustering with size constraints 具有大小约束的分类聚类的参数化复杂度
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2023-09-01 DOI: 10.1016/j.jcss.2023.03.006
Fedor V. Fomin, Petr A. Golovach, Nidhi Purohit

In the Categorical Clustering problem, we are given a set of vectors (matrix) A={a1,,an} over Σm, where Σ is a finite alphabet, and integers k and B. The task is to partition A into k clusters such that the median objective of the clustering in the Hamming norm is at most B. Fomin, Golovach, and Panolan [ICALP 2018] proved that the problem is fixed-parameter tractable for the binary case Σ={0,1}. We extend this algorithmic result to a popular capacitated clustering model, where in addition the sizes of the clusters are lower and upper bounded by integer parameters p and q, respectively. Our main theorem is that the problem is solvable in time 2O(BlogB)|Σ|B(mn)O(1).

在范畴聚类问题中,我们给出了∑m上的一组向量(矩阵)a={a1,…,an},其中∑是有限字母表,以及整数k和B。任务是将a划分为k个聚类,使得Hamming范数中聚类的中值目标至多为B.Fomin,Golovach,和Panolan[ICALP 2018]证明了该问题对于二进制情况∑={0,1}是可处理的固定参数问题。我们将该算法结果扩展到一个流行的容量聚类模型,其中聚类的大小分别由整数参数p和q的下界和上界。我们的主要定理是这个问题在时间2O内是可解的(博客⁡B) |∑|B·(mn)O(1)。
{"title":"Parameterized complexity of categorical clustering with size constraints","authors":"Fedor V. Fomin,&nbsp;Petr A. Golovach,&nbsp;Nidhi Purohit","doi":"10.1016/j.jcss.2023.03.006","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.03.006","url":null,"abstract":"<div><p>In the <span>Categorical Clustering</span> problem, we are given a set of vectors (matrix) <span><math><mi>A</mi><mo>=</mo><mo>{</mo><msub><mrow><mi>a</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><mo>…</mo><mo>,</mo><msub><mrow><mi>a</mi></mrow><mrow><mi>n</mi></mrow></msub><mo>}</mo></math></span> over <span><math><msup><mrow><mi>Σ</mi></mrow><mrow><mi>m</mi></mrow></msup></math></span>, where Σ is a finite alphabet, and integers <em>k</em> and <em>B</em>. The task is to partition <strong>A</strong> into <em>k</em> clusters such that the median objective of the clustering in the Hamming norm is at most <em>B</em>. Fomin, Golovach, and Panolan [ICALP 2018] proved that the problem is fixed-parameter tractable for the binary case <span><math><mi>Σ</mi><mo>=</mo><mo>{</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>}</mo></math></span>. We extend this algorithmic result to a popular capacitated clustering model, where in addition the sizes of the clusters are lower and upper bounded by integer parameters <em>p</em> and <em>q</em>, respectively. Our main theorem is that the problem is solvable in time <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>O</mi><mo>(</mo><mi>B</mi><mi>log</mi><mo>⁡</mo><mi>B</mi><mo>)</mo></mrow></msup><mo>|</mo><mi>Σ</mi><msup><mrow><mo>|</mo></mrow><mrow><mi>B</mi></mrow></msup><mo>⋅</mo><msup><mrow><mo>(</mo><mi>m</mi><mi>n</mi><mo>)</mo></mrow><mrow><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></mrow></msup></math></span>.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 171-194"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Grid recognition: Classical and parameterized computational perspectives 网格识别:经典和参数化计算视角
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2023-09-01 DOI: 10.1016/j.jcss.2023.02.008
Siddharth Gupta , Guy Sa'ar , Meirav Zehavi

Over the past few decades, a large body of works studied the (in)tractability of various computational problems on grid graphs, which often yield substantially faster algorithms than general graphs. Unfortunately, the recognition of a grid graph is hard—it was shown to be NP-hard already in 1987. In this paper, we provide several positive results in this regard in the framework of parameterized complexity. Specifically, our contribution is threefold. First, we show that the problem is FPT parameterized by k+mcc where mcc is the maximum size of a connected component of G. Second, we present a new parameterization, denoted aG, relating graph distance to geometric distance. We show that the problem is para-NP-hard parameterized by aG, but FPT parameterized by aG on trees, as well as FPT parameterized by k+aG. Third, we show that the recognition of k×r grid graphs is NP-hard on graphs of pathwidth 2 where k=3.

在过去的几十年里,大量的工作研究了网格图上各种计算问题的可处理性,这些问题通常比一般图产生更快的算法。不幸的是,网格图的识别是困难的——1987年就已经证明它是NP困难的。在本文中,我们在参数化复杂性的框架下提供了这方面的几个积极结果。具体而言,我们的贡献有三方面。首先,我们证明了问题是由k+mcc参数化的FPT,其中mcc是G的连通分量的最大大小。其次,我们提出了一个新的参数化,表示为aG,将图距离与几何距离联系起来。我们证明了该问题是由aG参数化的准NP困难问题,但在树上由aG进行参数化的FPT,以及由k+aG进行的FPT。第三,我们证明了在路径宽度为2的图上,当k=3时,k×r网格图的识别是NP困难的。
{"title":"Grid recognition: Classical and parameterized computational perspectives","authors":"Siddharth Gupta ,&nbsp;Guy Sa'ar ,&nbsp;Meirav Zehavi","doi":"10.1016/j.jcss.2023.02.008","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.02.008","url":null,"abstract":"<div><p>Over the past few decades, a large body of works studied the (in)tractability of various computational problems on grid graphs, which often yield substantially faster algorithms than general graphs. Unfortunately, the recognition of a grid graph is hard—it was shown to be NP-hard already in 1987. In this paper, we provide several positive results in this regard in the framework of parameterized complexity. Specifically, our contribution is threefold. First, we show that the problem is FPT parameterized by <span><math><mi>k</mi><mo>+</mo><mrow><mi>mcc</mi></mrow></math></span> where <span><math><mi>mcc</mi></math></span> is the maximum size of a connected component of <em>G</em>. Second, we present a new parameterization, denoted <span><math><msub><mrow><mi>a</mi></mrow><mrow><mi>G</mi></mrow></msub></math></span><span><span>, relating graph distance to </span>geometric distance. We show that the problem is para-NP-hard parameterized by </span><span><math><msub><mrow><mi>a</mi></mrow><mrow><mi>G</mi></mrow></msub></math></span>, but FPT parameterized by <span><math><msub><mrow><mi>a</mi></mrow><mrow><mi>G</mi></mrow></msub></math></span> on trees, as well as FPT parameterized by <span><math><mi>k</mi><mo>+</mo><msub><mrow><mi>a</mi></mrow><mrow><mi>G</mi></mrow></msub></math></span>. Third, we show that the recognition of <span><math><mi>k</mi><mo>×</mo><mi>r</mi></math></span> grid graphs is NP-hard on graphs of pathwidth 2 where <span><math><mi>k</mi><mo>=</mo><mn>3</mn></math></span>.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 17-62"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49725808","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The 2CNF Boolean formula satisfiability problem and the linear space hypothesis 2CNF布尔公式可满足性问题与线性空间假设
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2023-09-01 DOI: 10.1016/j.jcss.2023.03.001
Tomoyuki Yamakami

We aim at investigating the solvability/insolvability of nondeterministic logarithmic-space (NL) decision, search, and optimization problems parameterized by natural size parameters using simultaneously polynomial time and sub-linear space. We are particularly focused on 2SAT3—a restricted variant of the 2CNF Boolean (propositional) formula satisfiability problem in which each variable of a given 2CNF formula appears at most 3 times in the form of literals—parameterized by the total number mvbl(ϕ) of variables of each given Boolean formula ϕ. We propose a new, practical working hypothesis, called the linear space hypothesis (LSH), which asserts that (2SAT3,mvbl) cannot be solved in polynomial time using only “sub-linear” space (i.e., mvbl(x)εpolylog(|x|) space for a constant ε[0,1)) on all instances x. Immediate consequences of LSH include LNL, LOGDCFLLOGCFL, and SCNSC. For our investigation, we fully utilize a key notion of “short reductions”, under which the class PsubLIN of all parameterized polynomial-time sub-linear-space solvable problems is indeed closed.

我们的目的是研究由自然大小参数参数化的非确定对数空间(NL)决策、搜索和优化问题的可解性/不可解性,同时使用多项式时间和亚线性空间。我们特别关注2SAT3——2CNF布尔(命题)公式可满足性问题的一个受限变体,其中给定2CNF公式的每个变量最多以文字的形式出现3次——由每个给定布尔公式的变量总数mvbl(ξ)参数化。我们提出了一个新的、实用的工作假设,称为线性空间假设(LSH),它断言(2SAT3,mvbl)不能在多项式时间内在所有实例x上仅使用“次线性”空间(即,常数ε∈[0,1)的mvbl(x)εpolylog(|x|)空间)求解。LSH的直接后果包括L≠NL、LOGDCFL≠LOGCFL和SC≠NSC。在我们的研究中,我们充分利用了“短约简”的一个关键概念,在该概念下,所有参数化多项式时间-次线性空间可解问题的类PsubLIN确实是封闭的。
{"title":"The 2CNF Boolean formula satisfiability problem and the linear space hypothesis","authors":"Tomoyuki Yamakami","doi":"10.1016/j.jcss.2023.03.001","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.03.001","url":null,"abstract":"<div><p><span><span>We aim at investigating the solvability/insolvability of nondeterministic logarithmic-space (NL) decision, search, and optimization problems parameterized by natural size parameters using simultaneously </span>polynomial time and sub-linear space. We are particularly focused on </span><span><math><msub><mrow><mn>2SAT</mn></mrow><mrow><mn>3</mn></mrow></msub></math></span><span>—a restricted variant of the 2CNF Boolean (propositional) formula satisfiability problem in which each variable of a given 2CNF formula appears at most 3 times in the form of literals—parameterized by the total number </span><span><math><msub><mrow><mi>m</mi></mrow><mrow><mi>v</mi><mi>b</mi><mi>l</mi></mrow></msub><mo>(</mo><mi>ϕ</mi><mo>)</mo></math></span><span> of variables of each given Boolean formula </span><em>ϕ</em>. We propose a new, practical working hypothesis, called the linear space hypothesis (LSH), which asserts that <span><math><mo>(</mo><msub><mrow><mn>2SAT</mn></mrow><mrow><mn>3</mn></mrow></msub><mo>,</mo><msub><mrow><mi>m</mi></mrow><mrow><mi>v</mi><mi>b</mi><mi>l</mi></mrow></msub><mo>)</mo></math></span> cannot be solved in polynomial time using only “sub-linear” space (i.e., <span><math><msub><mrow><mi>m</mi></mrow><mrow><mi>v</mi><mi>b</mi><mi>l</mi></mrow></msub><msup><mrow><mo>(</mo><mi>x</mi><mo>)</mo></mrow><mrow><mi>ε</mi></mrow></msup><mspace></mspace><mi>p</mi><mi>o</mi><mi>l</mi><mi>y</mi><mi>l</mi><mi>o</mi><mi>g</mi><mo>(</mo><mo>|</mo><mi>x</mi><mo>|</mo><mo>)</mo></math></span> space for a constant <span><math><mi>ε</mi><mo>∈</mo><mo>[</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>)</mo></math></span>) on all instances <em>x</em>. Immediate consequences of LSH include <span><math><mi>L</mi><mo>≠</mo><mrow><mi>NL</mi></mrow></math></span>, <span><math><mrow><mi>LOGDCFL</mi></mrow><mo>≠</mo><mrow><mi>LOGCFL</mi></mrow></math></span>, and <span><math><mrow><mi>SC</mi></mrow><mo>≠</mo><mrow><mi>NSC</mi></mrow></math></span>. For our investigation, we fully utilize a key notion of “short reductions”, under which the class PsubLIN of all parameterized polynomial-time sub-linear-space solvable problems is indeed closed.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"136 ","pages":"Pages 88-112"},"PeriodicalIF":1.1,"publicationDate":"2023-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49738284","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Computer and System Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1