首页 > 最新文献

Journal of Computer and System Sciences最新文献

英文 中文
An FPT algorithm for timeline cover 时间线覆盖的FPT算法
IF 1.1 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-12-01 Epub Date: 2025-05-22 DOI: 10.1016/j.jcss.2025.103679
Riccardo Dondi , Manuel Lafond
One of the most studied problem in theoretical computer science, Vertex Cover, has been recently considered in the temporal graph framework. Here we study a Vertex Cover variant, called k-TimelineCover. Given a temporal graph k-TimelineCover asks to define an interval for each vertex so that for every temporal edge existing in a timestamp t, at least one of the endpoints has an interval that includes t. The goal is to decide whether it is possible to cover every temporal edge while using vertex intervals of total span at most k. k-TimelineCover has been shown to be NP-hard, but its parameterized complexity has not been fully understood when parameterizing by the span of the solution. We settle this open problem by giving an FPT algorithm that combines two techniques, a modified form of iterative compression and a reduction to Digraph Pair Cut.
顶点覆盖是理论计算机科学中研究最多的问题之一,最近在时间图框架中得到了考虑。这里我们研究一个顶点覆盖的变体,称为k-TimelineCover。给定一个时序图k-TimelineCover要求为每个顶点定义一个间隔,这样每时间边缘存在一个时间戳t,至少有一个端点的一个区间,其中包括t。我们的目标是决定是否可以覆盖每一个时间边缘在使用顶点总跨度的间隔最多k k-TimelineCover已被证明是np困难,但其参数化的复杂性尚未完全理解当张成的空间参数化的解决方案。我们给出了一种FPT算法,该算法结合了两种技术,一种改进的迭代压缩形式和对有向图对切割的简化。
{"title":"An FPT algorithm for timeline cover","authors":"Riccardo Dondi ,&nbsp;Manuel Lafond","doi":"10.1016/j.jcss.2025.103679","DOIUrl":"10.1016/j.jcss.2025.103679","url":null,"abstract":"<div><div>One of the most studied problem in theoretical computer science, <span>Vertex Cover</span>, has been recently considered in the temporal graph framework. Here we study a <span>Vertex Cover</span> variant, called k-<span>TimelineCover</span>. Given a temporal graph k-<span>TimelineCover</span> asks to define an interval for each vertex so that for every temporal edge existing in a timestamp <em>t</em>, at least one of the endpoints has an interval that includes <em>t</em>. The goal is to decide whether it is possible to cover every temporal edge while using vertex intervals of total span at most <em>k</em>. k-<span>TimelineCover</span> has been shown to be NP-hard, but its parameterized complexity has not been fully understood when parameterizing by the span of the solution. We settle this open problem by giving an FPT algorithm that combines two techniques, a modified form of iterative compression and a reduction to <span>Digraph Pair Cut</span>.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"154 ","pages":"Article 103679"},"PeriodicalIF":1.1,"publicationDate":"2025-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144134844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Finding diameter-reducing shortcuts in trees 在树上寻找减少直径的捷径
IF 1.1 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-11-01 Epub Date: 2025-04-23 DOI: 10.1016/j.jcss.2025.103658
Davide Bilò , Luciano Gualà , Stefano Leucci , Luca Pepè Sciarria
In the k-Diameter-Optimally Augmenting Tree Problem we are given a tree T of n vertices embedded in an unknown metric space. An oracle can report the cost of any edge in constant time, and we want to augment T with k shortcuts to minimize the resulting diameter. When k=1, O(nlogn)-time algorithms exist for paths and trees. We show that o(n2) queries cannot provide a better than 10/9-approximation for trees when k3. For any constant ε>0, we design a linear-time (1+ε)-approximation algorithm for paths when k=o(logn), thus establishing a dichotomy between paths and trees for k3. Our algorithm employs an ad-hoc data structure, which we also use in a linear-time 4-approximation algorithm for trees, and to compute the diameter of (possibly non-metric) graphs with n+k1 edges in time O(nklogn).
在k-直径最优增广树问题中,我们给出了一棵树,其中有n个顶点嵌入在未知度量空间中。oracle可以在常数时间内报告任何边的成本,我们想用k个捷径来增加T,以最小化结果的直径。当k=1时,对于路径和树存在O(nlog (n))时间算法。我们证明,当k≥3时,o(n2)查询不能提供优于10/9的近似。对于任意常数ε>;0,我们设计了k=o(log (n))时路径的线性时间(1+ε)逼近算法,从而建立了k≥3时路径与树之间的二分类。我们的算法采用了一种特别的数据结构,我们也在树的线性时间4近似算法中使用它,并在时间O(nklog (n))中计算具有n+k−1条边的(可能是非度量的)图的直径。
{"title":"Finding diameter-reducing shortcuts in trees","authors":"Davide Bilò ,&nbsp;Luciano Gualà ,&nbsp;Stefano Leucci ,&nbsp;Luca Pepè Sciarria","doi":"10.1016/j.jcss.2025.103658","DOIUrl":"10.1016/j.jcss.2025.103658","url":null,"abstract":"<div><div>In the <em>k-Diameter-Optimally Augmenting Tree Problem</em> we are given a tree <em>T</em> of <em>n</em> vertices embedded in an unknown <em>metric</em> space. An oracle can report the cost of any edge in constant time, and we want to augment <em>T</em> with <em>k</em> shortcuts to minimize the resulting diameter. When <span><math><mi>k</mi><mo>=</mo><mn>1</mn></math></span>, <span><math><mi>O</mi><mo>(</mo><mi>n</mi><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>)</mo></math></span>-time algorithms exist for paths and trees. We show that <span><math><mi>o</mi><mo>(</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>)</mo></math></span> queries cannot provide a better than 10/9-approximation for trees when <span><math><mi>k</mi><mo>≥</mo><mn>3</mn></math></span>. For any constant <span><math><mi>ε</mi><mo>&gt;</mo><mn>0</mn></math></span>, we design a linear-time <span><math><mo>(</mo><mn>1</mn><mo>+</mo><mi>ε</mi><mo>)</mo></math></span>-approximation algorithm for paths when <span><math><mi>k</mi><mo>=</mo><mi>o</mi><mo>(</mo><msqrt><mrow><mi>log</mi><mo>⁡</mo><mi>n</mi></mrow></msqrt><mo>)</mo></math></span>, thus establishing a dichotomy between paths and trees for <span><math><mi>k</mi><mo>≥</mo><mn>3</mn></math></span>. Our algorithm employs an ad-hoc data structure, which we also use in a linear-time 4-approximation algorithm for trees, and to compute the diameter of (possibly non-metric) graphs with <span><math><mi>n</mi><mo>+</mo><mi>k</mi><mo>−</mo><mn>1</mn></math></span> edges in time <span><math><mi>O</mi><mo>(</mo><mi>n</mi><mi>k</mi><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>)</mo></math></span>.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"153 ","pages":"Article 103658"},"PeriodicalIF":1.1,"publicationDate":"2025-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143879465","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Near-optimal dispersion on arbitrary anonymous graphs 任意匿名图上的近最优色散
IF 1.1 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-09-01 Epub Date: 2025-03-22 DOI: 10.1016/j.jcss.2025.103656
Ajay D. Kshemkalyani , Gokarna Sharma
Given an undirected, anonymous, port-labeled graph of n memory-less nodes, m edges, and degree Δ, we consider the problem of dispersing kn robots (or tokens) positioned initially arbitrarily on the nodes of the graph to exactly k different nodes, one on each node. The objective is to simultaneously minimize time and memory requirement at each robot. The best previously known algorithm solves this problem in O(min{m,kΔ}log) time storing O(log(k+Δ)) bits at each robot, where k/2 is the number of nodes with multiple robots positioned on them in the initial configuration. In this paper, we present a novel multi-source DFS traversal algorithm solving this problem in O(min{m,kΔ}) time with O(log(k+Δ)) bits at each robot. The memory complexity of our algorithm is already asymptotically optimal and the time complexity is asymptotically optimal for the graphs of constant degree Δ=O(1). The result holds in both synchronous and asynchronous settings.
给定一个有n个无内存节点、m条边和Δ度的无向、匿名、端口标记的图,我们考虑将k≤n个机器人(或令牌)分散到恰好k个不同的节点上的问题,每个节点上一个。目标是同时最小化每个机器人的时间和内存需求。目前已知的最好的算法在每个机器人上用O(min (m,kΔ)}⋅log (r))时间存储O(log (k+Δ))个比特来解决这个问题,其中,r≤k/2是初始配置中有多个机器人定位在其上的节点数量。在本文中,我们提出了一种新的多源DFS遍历算法,在O(min (m,kΔ)})时间内用O(log (k+Δ))位在每个机器人上解决了这个问题。对于常次图Δ=O(1),我们算法的内存复杂度已经是渐近最优的,时间复杂度也是渐近最优的。结果在同步和异步设置中都成立。
{"title":"Near-optimal dispersion on arbitrary anonymous graphs","authors":"Ajay D. Kshemkalyani ,&nbsp;Gokarna Sharma","doi":"10.1016/j.jcss.2025.103656","DOIUrl":"10.1016/j.jcss.2025.103656","url":null,"abstract":"<div><div>Given an undirected, anonymous, port-labeled graph of <em>n</em> memory-less nodes, <em>m</em> edges, and degree Δ, we consider the problem of dispersing <span><math><mi>k</mi><mo>≤</mo><mi>n</mi></math></span> robots (or tokens) positioned initially arbitrarily on the nodes of the graph to exactly <em>k</em> different nodes, one on each node. The objective is to simultaneously minimize time and memory requirement at each robot. The best previously known algorithm solves this problem in <span><math><mi>O</mi><mo>(</mo><mi>min</mi><mo>⁡</mo><mo>{</mo><mi>m</mi><mo>,</mo><mi>k</mi><mi>Δ</mi><mo>}</mo><mo>⋅</mo><mi>log</mi><mo>⁡</mo><mi>ℓ</mi><mo>)</mo></math></span> time storing <span><math><mi>O</mi><mo>(</mo><mi>log</mi><mo>⁡</mo><mo>(</mo><mi>k</mi><mo>+</mo><mi>Δ</mi><mo>)</mo><mo>)</mo></math></span> bits at each robot, where <span><math><mi>ℓ</mi><mo>≤</mo><mi>k</mi><mo>/</mo><mn>2</mn></math></span> is the number of nodes with multiple robots positioned on them in the initial configuration. In this paper, we present a novel multi-source DFS traversal algorithm solving this problem in <span><math><mi>O</mi><mo>(</mo><mi>min</mi><mo>⁡</mo><mo>{</mo><mi>m</mi><mo>,</mo><mi>k</mi><mi>Δ</mi><mo>}</mo><mo>)</mo></math></span> time with <span><math><mi>O</mi><mo>(</mo><mi>log</mi><mo>⁡</mo><mo>(</mo><mi>k</mi><mo>+</mo><mi>Δ</mi><mo>)</mo><mo>)</mo></math></span> bits at each robot. The memory complexity of our algorithm is already asymptotically optimal and the time complexity is asymptotically optimal for the graphs of constant degree <span><math><mi>Δ</mi><mo>=</mo><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></math></span>. The result holds in both synchronous and asynchronous settings.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"152 ","pages":"Article 103656"},"PeriodicalIF":1.1,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143739196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bounding the number of reticulation events for displaying multiple trees in a phylogenetic network 限制在系统发育网络中显示多个树的网状事件的数量
IF 1.1 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-09-01 Epub Date: 2025-03-20 DOI: 10.1016/j.jcss.2025.103657
Yufeng Wu , Louxin Zhang
Reconstructing a parsimonious phylogenetic network that displays multiple phylogenetic trees is an important problem in phylogenetics, where the complexity of the inferred networks is measured by reticulation numbers. The reticulation number for a set of trees is defined as the minimum number of reticulations in a phylogenetic network that displays those trees. A mathematical problem is bounding the reticulation number for multiple trees over a fixed number of taxa. While this problem has been extensively studied for two trees, much less is known about the upper bounds on the reticulation numbers for three or more arbitrary trees. In this paper, we present a few non-trivial upper bounds on reticulation numbers for three or more trees.
重建显示多个系统发育树的简约系统发育网络是系统发育学中的一个重要问题,其中推断网络的复杂性是通过网状数来衡量的。一组树的网状数被定义为显示这些树的系统发育网络中的最小网状数。一个数学问题是限定在固定数量的分类群上的多棵树的网状数。虽然这个问题已经广泛地研究了两棵树,但对于三棵或更多任意树的网格数的上界知之甚少。本文给出了三棵或多棵树的网数的几个非平凡上界。
{"title":"Bounding the number of reticulation events for displaying multiple trees in a phylogenetic network","authors":"Yufeng Wu ,&nbsp;Louxin Zhang","doi":"10.1016/j.jcss.2025.103657","DOIUrl":"10.1016/j.jcss.2025.103657","url":null,"abstract":"<div><div>Reconstructing a parsimonious phylogenetic network that displays multiple phylogenetic trees is an important problem in phylogenetics, where the complexity of the inferred networks is measured by reticulation numbers. The reticulation number for a set of trees is defined as the minimum number of reticulations in a phylogenetic network that displays those trees. A mathematical problem is bounding the reticulation number for multiple trees over a fixed number of taxa. While this problem has been extensively studied for two trees, much less is known about the upper bounds on the reticulation numbers for three or more arbitrary trees. In this paper, we present a few non-trivial upper bounds on reticulation numbers for three or more trees.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"152 ","pages":"Article 103657"},"PeriodicalIF":1.1,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143739197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A linear delay algorithm in SD set system and its application to subgraph enumeration SD集合系统中的一种线性延迟算法及其在子图枚举中的应用
IF 1.1 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-09-01 Epub Date: 2025-02-21 DOI: 10.1016/j.jcss.2025.103637
Takumi Tada, Kazuya Haraguchi
For a set system (V,C2V), we call each CC a component. A nonempty subset YC is a removable set (RS) of C if CY is a component. We say that a set system has subset-disjoint (SD) property if, for any two components C,C with CC, every minimal RS Y of C satisfies either YC or YC=. Assuming that an SD set system is implicitly given by an oracle that returns a minimal RS of a component, we provide an algorithm that enumerates all components in linear time/space with respect to |V| and oracle running time/space. We then extend this algorithm to linear-delay enumeration of all 2-edge-connected (or 2-vertex-connected) induced subgraphs in an undirected graph and of all strongly connected subgraphs in a digraph.
对于集合系统(V,C≤2V),我们称每个C∈C为一个分量。如果C≠Y是一个分量,一个非空子集Y≠C是C的一个可移动集(RS)。如果对于任意两个分量C,C′与C′≠C,则C的每一个极小RS Y满足Y≠C′或Y∩C′=∅,则我们说一个集合系统具有子集不相交(SD)性质。假设一个SD集合系统是由一个oracle隐式给出的,它返回一个组件的最小RS,我们提供了一个算法,该算法在线性时间/空间中枚举关于|V|和oracle运行时间/空间的所有组件。然后,我们将该算法推广到无向图中所有2边连通(或2点连通)诱导子图和有向图中所有强连通子图的线性延迟枚举。
{"title":"A linear delay algorithm in SD set system and its application to subgraph enumeration","authors":"Takumi Tada,&nbsp;Kazuya Haraguchi","doi":"10.1016/j.jcss.2025.103637","DOIUrl":"10.1016/j.jcss.2025.103637","url":null,"abstract":"<div><div>For a set system <span><math><mo>(</mo><mi>V</mi><mo>,</mo><mi>C</mi><mo>⊆</mo><msup><mrow><mn>2</mn></mrow><mrow><mi>V</mi></mrow></msup><mo>)</mo></math></span>, we call each <span><math><mi>C</mi><mo>∈</mo><mi>C</mi></math></span> a component. A nonempty subset <span><math><mi>Y</mi><mo>⊊</mo><mi>C</mi></math></span> is a removable set (RS) of <em>C</em> if <span><math><mi>C</mi><mo>∖</mo><mi>Y</mi></math></span> is a component. We say that a set system has subset-disjoint (SD) property if, for any two components <span><math><mi>C</mi><mo>,</mo><msup><mrow><mi>C</mi></mrow><mrow><mo>′</mo></mrow></msup></math></span> with <span><math><msup><mrow><mi>C</mi></mrow><mrow><mo>′</mo></mrow></msup><mo>⊊</mo><mi>C</mi></math></span>, every minimal RS <em>Y</em> of <em>C</em> satisfies either <span><math><mi>Y</mi><mo>⊆</mo><msup><mrow><mi>C</mi></mrow><mrow><mo>′</mo></mrow></msup></math></span> or <span><math><mi>Y</mi><mo>∩</mo><msup><mrow><mi>C</mi></mrow><mrow><mo>′</mo></mrow></msup><mo>=</mo><mo>∅</mo></math></span>. Assuming that an SD set system is implicitly given by an oracle that returns a minimal RS of a component, we provide an algorithm that enumerates all components in linear time/space with respect to <span><math><mo>|</mo><mi>V</mi><mo>|</mo></math></span> and oracle running time/space. We then extend this algorithm to linear-delay enumeration of all 2-edge-connected (or 2-vertex-connected) induced subgraphs in an undirected graph and of all strongly connected subgraphs in a digraph.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"152 ","pages":"Article 103637"},"PeriodicalIF":1.1,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143509232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Instability of backoff protocols with arbitrary arrival rates 任意到达率下退避方案的不稳定性
IF 1.1 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-09-01 Epub Date: 2025-03-04 DOI: 10.1016/j.jcss.2025.103638
Leslie Ann Goldberg, John Lapinskas
In contention resolution, multiple processors are trying to coordinate to send discrete messages through a shared channel with limited communication. If two processors send at the same time, the messages collide and are not transmitted successfully. Queue-free backoff protocols are an important special case — for example, Google Drive and AWS instruct their users to implement binary exponential backoff to handle busy periods. It is a long-standing conjecture of Aldous (1987) [4] that no stable backoff protocols exist for any positive arrival rate of processors. This foundational question remains open; instability is only known in general when the arrival rate of processors is at least 0.42 (Goldberg et al., 2004 [13]). We prove Aldous' conjecture for all backoff protocols outside of a tightly-constrained special case using a new domination technique to get around the main difficulty, which is the strong dependencies between messages.
在争用解决中,多个处理器试图通过有限通信的共享通道协调发送离散消息。如果两个处理器同时发送消息,则消息会发生冲突,无法成功传输。无队列回退协议是一个重要的特例——例如,谷歌Drive和AWS指导他们的用户实现二进制指数回退来处理繁忙时段。Aldous(1987)[4]的一个长期猜想是,对于任何正的处理器到达率,不存在稳定的后退协议。这个基本问题仍然悬而未决;一般来说,只有当处理器到达率至少为0.42时,才知道不稳定性(Goldberg et al., 2004[13])。我们使用一种新的支配技术证明了除严格约束的特殊情况外所有退退协议的Aldous猜想,以绕过消息之间的强依赖关系这一主要困难。
{"title":"Instability of backoff protocols with arbitrary arrival rates","authors":"Leslie Ann Goldberg,&nbsp;John Lapinskas","doi":"10.1016/j.jcss.2025.103638","DOIUrl":"10.1016/j.jcss.2025.103638","url":null,"abstract":"<div><div>In contention resolution, multiple processors are trying to coordinate to send discrete messages through a shared channel with limited communication. If two processors send at the same time, the messages collide and are not transmitted successfully. Queue-free backoff protocols are an important special case — for example, Google Drive and AWS instruct their users to implement binary exponential backoff to handle busy periods. It is a long-standing conjecture of Aldous (1987) <span><span>[4]</span></span> that no stable backoff protocols exist for any positive arrival rate of processors. This foundational question remains open; instability is only known in general when the arrival rate of processors is at least 0.42 (Goldberg et al., 2004 <span><span>[13]</span></span>). We prove Aldous' conjecture for all backoff protocols outside of a tightly-constrained special case using a new domination technique to get around the main difficulty, which is the strong dependencies between messages.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"152 ","pages":"Article 103638"},"PeriodicalIF":1.1,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143577062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reconstructing semi-directed level-1 networks using few quarnets 利用少四元重构半有向一级网络
IF 1.1 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-09-01 Epub Date: 2025-03-19 DOI: 10.1016/j.jcss.2025.103655
Martin Frohn , Niels Holtgrefe , Leo van Iersel , Mark Jones , Steven Kelk
Semi-directed networks are partially directed graphs that model evolution where the directed edges represent reticulate evolutionary events. We present an algorithm that reconstructs binary n-leaf semi-directed level-1 networks in O(n2) time from its quarnets (4-leaf subnetworks). Our method assumes we have direct access to all quarnets, yet uses only an asymptotically optimal number of O(nlogn) quarnets. When the network is assumed to contain no triangles, our method instead relies only on four-cycle quarnets and the splits of the other quarnets. A variant of our algorithm works with quartets rather than quarnets and we show that it reconstructs most of a semi-directed level-1 network from an asymptotically optimal O(nlogn) of the quartets it displays. Additionally, we provide an O(n3) time algorithm that reconstructs the tree-of-blobs of any binary n-leaf semi-directed network with unbounded level from O(n3) splits of its quarnets.
半有向网络是模拟进化的部分有向图,其中有向边表示网状进化事件。提出了一种从四叶子网(四叶子网)在O(n2)时间内重构二元n叶半有向level-1网络的算法。我们的方法假设我们可以直接访问所有quarnets,但只使用渐进最优数量的O(nlog (n) quarnets。当假设网络不包含三角形时,我们的方法只依赖于四循环quarnets和其他quarnets的分裂。我们的算法的一个变体适用于四元而不是四元,并且我们表明它从它显示的四元的渐近最优O(nlog ln n)重建了大部分半定向一级网络。此外,我们还提供了一种O(n3)时间算法,该算法从其quarnets的O(n3)个分裂重构任意具有无界水平的二元n叶半有向网络的blobs树。
{"title":"Reconstructing semi-directed level-1 networks using few quarnets","authors":"Martin Frohn ,&nbsp;Niels Holtgrefe ,&nbsp;Leo van Iersel ,&nbsp;Mark Jones ,&nbsp;Steven Kelk","doi":"10.1016/j.jcss.2025.103655","DOIUrl":"10.1016/j.jcss.2025.103655","url":null,"abstract":"<div><div>Semi-directed networks are partially directed graphs that model evolution where the directed edges represent reticulate evolutionary events. We present an algorithm that reconstructs binary <em>n</em>-leaf semi-directed level-1 networks in <span><math><mi>O</mi><mo>(</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>)</mo></math></span> time from its quarnets (4-leaf subnetworks). Our method assumes we have direct access to all quarnets, yet uses only an asymptotically optimal number of <span><math><mi>O</mi><mo>(</mo><mi>n</mi><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>)</mo></math></span> quarnets. When the network is assumed to contain no triangles, our method instead relies only on four-cycle quarnets and the splits of the other quarnets. A variant of our algorithm works with quartets rather than quarnets and we show that it reconstructs most of a semi-directed level-1 network from an asymptotically optimal <span><math><mi>O</mi><mo>(</mo><mi>n</mi><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>)</mo></math></span> of the quartets it displays. Additionally, we provide an <span><math><mi>O</mi><mo>(</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>3</mn></mrow></msup><mo>)</mo></math></span> time algorithm that reconstructs the tree-of-blobs of any binary <em>n</em>-leaf semi-directed network with unbounded level from <span><math><mi>O</mi><mo>(</mo><msup><mrow><mi>n</mi></mrow><mrow><mn>3</mn></mrow></msup><mo>)</mo></math></span> splits of its quarnets.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"152 ","pages":"Article 103655"},"PeriodicalIF":1.1,"publicationDate":"2025-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143715791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Languages given by finite automata over the unary alphabet 有限自动机在一元字母表上给出的语言
IF 1.1 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-08-01 Epub Date: 2025-02-05 DOI: 10.1016/j.jcss.2025.103634
Wojciech Czerwiński , Maciej Dębski , Tomasz Gogasz , Gordon Hoi , Sanjay Jain , Michał Skrzypczak , Frank Stephan , Christopher Tan
This paper studies the complexity of operations on finite automata and the complexity of their decision problems when the alphabet is unary. Let n denote the number of states of the input automata considered. The following main results are obtained:
(1) Equality and inclusion of NFAs can be decided within time 2O((nlogn)1/3). The previous upper bound 2O((nlogn)1/2) was by Chrobak (1986).
(2) One can determine a UFA (unambiguous finite automata) for complement of another UFA or union of two UFAs using at most quasipolynomial number of states. However, for concatenation of two n-state UFAs, the worst case is a UFA having 2Θ((nlog2n)1/3) states.
(3) Results when an infinite ω-word given by a UFA or an NFA is a member of a given regular ω-language are obtained.
本文研究了有限自动机在字母表为一元时的运算复杂性及其决策问题的复杂性。设n表示所考虑的输入自动机的状态数。得到了以下主要结果:(1)在2O((nlog ln n)1/3)时间内,可以确定NFAs是否相等和是否包含。以前的上界2O((nlog (n)1/2)是由Chrobak(1986)提出的。(2)可以用最多拟多项式的状态数来确定另一个UFA的补或两个UFA的并的UFA(无二义有限自动机)。然而,对于两个n态UFA的连接,最坏的情况是UFA具有2Θ((nlog2 (n)1/3)状态。(3)当UFA或NFA给出的无限ω词是给定正则ω语言的成员时,得到了结果。
{"title":"Languages given by finite automata over the unary alphabet","authors":"Wojciech Czerwiński ,&nbsp;Maciej Dębski ,&nbsp;Tomasz Gogasz ,&nbsp;Gordon Hoi ,&nbsp;Sanjay Jain ,&nbsp;Michał Skrzypczak ,&nbsp;Frank Stephan ,&nbsp;Christopher Tan","doi":"10.1016/j.jcss.2025.103634","DOIUrl":"10.1016/j.jcss.2025.103634","url":null,"abstract":"<div><div>This paper studies the complexity of operations on finite automata and the complexity of their decision problems when the alphabet is unary. Let <em>n</em> denote the number of states of the input automata considered. The following main results are obtained:</div><div>(1) Equality and inclusion of NFAs can be decided within time <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>O</mi><mo>(</mo><msup><mrow><mo>(</mo><mi>n</mi><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>)</mo></mrow><mrow><mn>1</mn><mo>/</mo><mn>3</mn></mrow></msup><mo>)</mo></mrow></msup></math></span>. The previous upper bound <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>O</mi><mo>(</mo><msup><mrow><mo>(</mo><mi>n</mi><mi>log</mi><mo>⁡</mo><mi>n</mi><mo>)</mo></mrow><mrow><mn>1</mn><mo>/</mo><mn>2</mn></mrow></msup><mo>)</mo></mrow></msup></math></span> was by Chrobak (1986).</div><div>(2) One can determine a UFA (unambiguous finite automata) for complement of another UFA or union of two UFAs using at most quasipolynomial number of states. However, for concatenation of two <em>n</em>-state UFAs, the worst case is a UFA having <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>Θ</mi><mo>(</mo><msup><mrow><mo>(</mo><mi>n</mi><msup><mrow><mi>log</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>⁡</mo><mi>n</mi><mo>)</mo></mrow><mrow><mn>1</mn><mo>/</mo><mn>3</mn></mrow></msup><mo>)</mo></mrow></msup></math></span> states.</div><div>(3) Results when an infinite <em>ω</em>-word given by a UFA or an NFA is a member of a given regular <em>ω</em>-language are obtained.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"151 ","pages":"Article 103634"},"PeriodicalIF":1.1,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143419429","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Induced tree covering and the generalized Yutsis property 诱导树木覆盖和广义Yutsis性质
IF 1.1 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-08-01 Epub Date: 2025-02-13 DOI: 10.1016/j.jcss.2025.103636
Luís Cunha , Gabriel Duarte , Fábio Protti , Loana Nogueira , Uéverton Souza
The Yutsis property of a graph G is the property of partitioning its vertex set into two induced trees. Although recognizing Yutsis graphs is NP-complete even on planar graphs, it is still possible to consider two even more challenging problems: (i) recognizing k-Yutsis graphs, which are graphs that have their vertex sets partitioned into k induced trees, for a fixed k2; (ii) determining the tree cover number of a given graph G, i.e., the minimum number of vertex-disjoint induced trees covering all vertices of G. We prove that determining the tree cover number of a split graph G is NP-hard, contrasting with the polynomial-time recognition of k-Yutsis chordal graphs. We also investigate the tree cover number computation and the k-Yutsis graph recognition concerning treewidth and clique-width parameterizations.
图G的Yutsis性质是将其顶点集划分为两个诱导树的性质。尽管在平面图上识别Yutsis图是np完全的,但仍然可以考虑两个更具挑战性的问题:(i)识别k-Yutsis图,k-Yutsis图是顶点集划分为k个诱导树的图,k≥2是固定的;(ii)确定给定图G的树覆盖数,即覆盖G的所有顶点的顶点不相交诱导树的最小个数。我们证明了与k-Yutsis弦图的多项式时间识别相比,确定分割图G的树覆盖数是np困难的。我们还研究了基于树宽和团宽参数化的树盖数计算和k-Yutsis图识别。
{"title":"Induced tree covering and the generalized Yutsis property","authors":"Luís Cunha ,&nbsp;Gabriel Duarte ,&nbsp;Fábio Protti ,&nbsp;Loana Nogueira ,&nbsp;Uéverton Souza","doi":"10.1016/j.jcss.2025.103636","DOIUrl":"10.1016/j.jcss.2025.103636","url":null,"abstract":"<div><div>The Yutsis property of a graph <em>G</em> is the property of partitioning its vertex set into two induced trees. Although recognizing Yutsis graphs is NP-complete even on planar graphs, it is still possible to consider two even more challenging problems: (i) recognizing <em>k</em>-Yutsis graphs, which are graphs that have their vertex sets partitioned into <em>k</em> induced trees, for a fixed <span><math><mi>k</mi><mo>≥</mo><mn>2</mn></math></span>; (ii) determining the tree cover number of a given graph <em>G</em>, i.e., the minimum number of vertex-disjoint induced trees covering all vertices of <em>G</em>. We prove that determining the tree cover number of a split graph <em>G</em> is NP-hard, contrasting with the polynomial-time recognition of <em>k</em>-Yutsis chordal graphs. We also investigate the tree cover number computation and the <em>k</em>-Yutsis graph recognition concerning treewidth and clique-width parameterizations.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"151 ","pages":"Article 103636"},"PeriodicalIF":1.1,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143419432","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Destroying densest subgraphs is hard 破坏最密集的子图是困难的
IF 1.1 3区 计算机科学 Q1 BUSINESS, FINANCE Pub Date : 2025-08-01 Epub Date: 2025-02-13 DOI: 10.1016/j.jcss.2025.103635
Cristina Bazgan , André Nichterlein , Sofia Vazquez Alferez
We analyze the computational complexity of the following computational problems called Bounded-Density Edge Deletion and Bounded-Density Vertex Deletion: Given a graph G, a budget k and a target density τρ, are there k edges (k vertices) whose removal from G results in a graph where the densest subgraph has density at most τρ? Here, the density of a graph is the number of its edges divided by the number of its vertices. We prove that both problems are polynomial-time solvable on trees and cliques but are NP-complete on planar bipartite graphs and split graphs. From a parameterized point of view, we show that both problems are fixed-parameter tractable with respect to the vertex cover number but W[1]-hard with respect to the solution size. Furthermore, we prove that Bounded-Density Edge Deletion is W[1]-hard with respect to the feedback edge number, demonstrating that the problem remains hard on very sparse graphs.
我们分析了以下计算问题的计算复杂性,称为有界密度边删除和有界密度顶点删除:给定一个图G,一个预算k和一个目标密度τρ,是否有k个边(k个顶点)从G中移除,结果是图中最密集的子图的密度最大τρ?这里,图的密度是它的边数除以顶点数。我们证明了这两个问题在树和团上是多项式时间可解的,而在平面二部图和分裂图上是np完全的。从参数化的角度来看,我们证明了这两个问题就顶点覆盖数而言是固定参数可处理的,但就解的大小而言是W[1]-难处理的。此外,我们证明了有界密度边删除相对于反馈边数是W[1]-困难的,表明该问题在非常稀疏的图上仍然困难。
{"title":"Destroying densest subgraphs is hard","authors":"Cristina Bazgan ,&nbsp;André Nichterlein ,&nbsp;Sofia Vazquez Alferez","doi":"10.1016/j.jcss.2025.103635","DOIUrl":"10.1016/j.jcss.2025.103635","url":null,"abstract":"<div><div>We analyze the computational complexity of the following computational problems called <span>Bounded-Density Edge Deletion</span> and <span>Bounded-Density Vertex Deletion</span>: Given a graph <em>G</em>, a budget <em>k</em> and a target density <span><math><msub><mrow><mi>τ</mi></mrow><mrow><mi>ρ</mi></mrow></msub></math></span>, are there <em>k</em> edges (<em>k</em> vertices) whose removal from <em>G</em> results in a graph where the densest subgraph has density at most <span><math><msub><mrow><mi>τ</mi></mrow><mrow><mi>ρ</mi></mrow></msub></math></span>? Here, the density of a graph is the number of its edges divided by the number of its vertices. We prove that both problems are polynomial-time solvable on trees and cliques but are NP-complete on planar bipartite graphs and split graphs. From a parameterized point of view, we show that both problems are fixed-parameter tractable with respect to the vertex cover number but W[1]-hard with respect to the solution size. Furthermore, we prove that <span>Bounded-Density Edge Deletion</span> is W[1]-hard with respect to the feedback edge number, demonstrating that the problem remains hard on very sparse graphs.</div></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"151 ","pages":"Article 103635"},"PeriodicalIF":1.1,"publicationDate":"2025-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143444148","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Computer and System Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1