首页 > 最新文献

Journal of Computer and System Sciences最新文献

英文 中文
Etherless Ethereum tokens: Simulating native tokens in Ethereum 以太坊代币:在以太坊中模拟原生代币
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2023-08-01 DOI: 10.1016/j.jcss.2023.02.001
John Andrews , Michele Ciampi , Vassilis Zikas

Standardized Ethereum tokens, e.g., ERC-20 tokens, have become the norm in fundraising (through ICOs) and kicking off blockchain-based DeFi applications. However, they require the user's wallet to hold both tokens and ether to pay the gas fee for making a transaction. This makes for a cumbersome user experience, and complicates, from the user perspective, the process of transitioning to a different smart-contract enabled blockchain, or to a newly launched blockchain. We formalize, instantiate, and analyze in a composable manner a system that we call Etherless Ethereum Tokens (in short, EETs), which allows the token users to transact in a closed-economy manner, i.e., having only tokens on their wallet and paying any transaction fees in tokens rather than Ether/Gas. In the process, we devise a methodology for capturing Ethereum token-contracts in the Universal Composability (UC) framework, which can be of independent interest.

标准化的以太坊代币,如ERC-20代币,已成为筹款(通过ICO)和启动基于区块链的DeFi应用程序的常态。然而,他们要求用户的钱包同时持有代币和以太币,以支付交易的汽油费。这导致了繁琐的用户体验,并从用户的角度使过渡到不同的智能合约区块链或新推出的区块链的过程变得复杂。我们以可组合的方式形式化、实例化和分析一个我们称之为无以太坊代币(简而言之,EET)的系统,该系统允许代币用户以封闭经济的方式进行交易,即钱包上只有代币,并用代币而不是以太币/天然气支付任何交易费用。在此过程中,我们设计了一种在通用可组合性(UC)框架中捕获以太坊代币合约的方法,这可能具有独立的兴趣。
{"title":"Etherless Ethereum tokens: Simulating native tokens in Ethereum","authors":"John Andrews ,&nbsp;Michele Ciampi ,&nbsp;Vassilis Zikas","doi":"10.1016/j.jcss.2023.02.001","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.02.001","url":null,"abstract":"<div><p>Standardized Ethereum tokens, e.g., ERC-20 tokens, have become the norm in fundraising (through ICOs) and kicking off blockchain-based DeFi applications. However, they require the user's wallet to hold both tokens and ether to pay the gas fee for making a transaction. This makes for a cumbersome user experience, and complicates, from the user perspective, the process of transitioning to a different smart-contract enabled blockchain, or to a newly launched blockchain. We formalize, instantiate, and analyze in a composable manner a system that we call <em>Etherless Ethereum Tokens</em> (in short, EETs), which allows the token users to transact in a closed-economy manner, i.e., having only tokens on their wallet and paying any transaction fees in tokens rather than Ether/Gas. In the process, we devise a methodology for capturing Ethereum token-contracts in the Universal Composability (UC) framework, which can be of independent interest.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"135 ","pages":"Pages 55-72"},"PeriodicalIF":1.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49739651","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parameterized complexity of graph planarity with restricted cyclic orders 受限循环阶图平面性的参数化复杂度
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2023-08-01 DOI: 10.1016/j.jcss.2023.02.007
Giuseppe Liotta , Ignaz Rutter , Alessandra Tappini

We study the complexity of testing whether a biconnected graph G=(V,E) is planar with the constraint that some cyclic orders of the edges incident to its vertices are allowed while some others are forbidden. The allowed cyclic orders are described by associating every vertex v of G with a set D(v) of FPQ-trees. Let tw be the treewidth of G and let Dmax be the maximum number of FPQ-trees per vertex. We show that the problem is FPT when parameterized by tw+Dmax, paraNP-hard when parameterized by Dmax, and W[1]-hard when parameterized by tw. We also consider NodeTrix planar representations of clustered graphs, where clusters are adjacency matrices and inter-cluster edges are non-intersecting simple curves. We prove that NodeTrix planarity with fixed sides is FPT when parameterized by the size of clusters plus the treewidth of the graph obtained by collapsing clusters to single vertices, provided that this graph is biconnected.

我们研究了检验双连通图G=(V,E)是否是平面图的复杂性,该图的约束条件是允许某些边的循环阶入射到其顶点,而禁止其他循环阶。通过将G的每个顶点v与FPQ树的集合D(v)相关联来描述允许的循环阶。设tw为G的树宽,设Dmax为每个顶点的FPQ树的最大数量。我们证明了当用tw+Dmax参数化时问题是FPT,当用Dmax参数化成paraNP-hard,当用tw参数化成W[1]-hard。我们还考虑了簇图的NodeTrix平面表示,其中簇是邻接矩阵,簇间边是不相交的简单曲线。我们证明了当通过簇的大小加上通过将簇折叠到单个顶点而获得的图的树宽来参数化时,具有固定边的NodeTrix平面性是FPT,前提是该图是双连通的。
{"title":"Parameterized complexity of graph planarity with restricted cyclic orders","authors":"Giuseppe Liotta ,&nbsp;Ignaz Rutter ,&nbsp;Alessandra Tappini","doi":"10.1016/j.jcss.2023.02.007","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.02.007","url":null,"abstract":"<div><p>We study the complexity of testing whether a biconnected graph <span><math><mi>G</mi><mo>=</mo><mo>(</mo><mi>V</mi><mo>,</mo><mi>E</mi><mo>)</mo></math></span> is planar with the constraint that some cyclic orders of the edges incident to its vertices are allowed while some others are forbidden. The allowed cyclic orders are described by associating every vertex <em>v</em> of <em>G</em> with a set <span><math><mi>D</mi><mo>(</mo><mi>v</mi><mo>)</mo></math></span> of FPQ-trees. Let <em>tw</em> be the treewidth of <em>G</em> and let <span><math><msub><mrow><mi>D</mi></mrow><mrow><mi>max</mi></mrow></msub></math></span> be the maximum number of FPQ-trees per vertex. We show that the problem is FPT when parameterized by <span><math><mtext>tw</mtext><mo>+</mo><msub><mrow><mi>D</mi></mrow><mrow><mi>max</mi></mrow></msub></math></span>, paraNP-hard when parameterized by <span><math><msub><mrow><mi>D</mi></mrow><mrow><mi>max</mi></mrow></msub></math></span>, and W[1]-hard when parameterized by <em>tw</em>. We also consider NodeTrix planar representations of clustered graphs, where clusters are adjacency matrices and inter-cluster edges are non-intersecting simple curves. We prove that NodeTrix planarity with fixed sides is FPT when parameterized by the size of clusters plus the treewidth of the graph obtained by collapsing clusters to single vertices, provided that this graph is biconnected.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"135 ","pages":"Pages 125-144"},"PeriodicalIF":1.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49739733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Complexity of word problems for HNN-extensions HNN扩展词问题的复杂性
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2023-08-01 DOI: 10.1016/j.jcss.2023.02.005
Markus Lohrey

The computational complexity of the word problem in HNN-extension of groups is studied. HNN-extension is a fundamental construction in combinatorial group theory. It is shown that the word problem for an ascending HNN-extension of a group H is logspace reducible to the so-called compressed word problem for H. The main result of the paper states that the word problem for an HNN-extension of a hyperbolic group H with cyclic associated subgroups can be solved in polynomial time. This result can be easily extended to fundamental groups of graphs of groups with hyperbolic vertex groups and cyclic edge groups.

研究了群的HNN扩展中单词问题的计算复杂性。HNN可拓是组合群论中的一个基本结构。证明了群H的上升HNN扩张的词问题在对数空间上可归结为H的压缩词问题。本文的主要结果表明,具有循环相关子群的双曲群H的HNN扩张问题可以在多项式时间内求解。这个结果可以很容易地推广到具有双曲顶点群和循环边群的群的图的基本群。
{"title":"Complexity of word problems for HNN-extensions","authors":"Markus Lohrey","doi":"10.1016/j.jcss.2023.02.005","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.02.005","url":null,"abstract":"<div><p><span>The computational complexity of the word problem in HNN-extension of groups is studied. HNN-extension is a fundamental construction in combinatorial group theory. It is shown that the word problem for an ascending HNN-extension of a group </span><em>H</em> is logspace reducible to the so-called compressed word problem for <em>H</em>. The main result of the paper states that the word problem for an HNN-extension of a hyperbolic group <em>H</em><span> with cyclic associated subgroups can be solved in polynomial time<span>. This result can be easily extended to fundamental groups of graphs of groups with hyperbolic vertex groups and cyclic edge groups.</span></span></p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"135 ","pages":"Pages 145-157"},"PeriodicalIF":1.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49762899","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bankrupting Sybil despite churn 让西比尔破产,尽管搅拌
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2023-08-01 DOI: 10.1016/j.jcss.2023.02.004
Diksha Gupta , Jared Saia , Maxwell Young

A Sybil attack occurs when an adversary controls multiple system identifiers (IDs). Limiting the number of Sybil (bad) IDs to a minority is critical for tolerating malicious behavior. A popular tool for enforcing a bad minority is resource burning (RB): the verifiable consumption of a network resource. Unfortunately, typical RB defenses require non-Sybil (good) IDs to consume at least as many resources as the adversary. We present a new defense, Ergo, that guarantees (1) there is always a bad minority; and (2) during a significant attack, the good IDs consume asymptotically less resources than the bad. Specifically, despite high churn, the good-ID RB rate is O(TJ+J), where T is the adversary's RB rate, and J is the good-ID join rate. We show this RB rate is asymptotically optimal for a large class of algorithms, and we empirically demonstrate the benefits of Ergo.

当对手控制多个系统标识符(ID)时,就会发生Sybil攻击。将Sybil(坏)ID的数量限制在少数对于容忍恶意行为至关重要。一个流行的强制执行坏少数的工具是资源燃烧(RB):网络资源的可验证消耗。不幸的是,典型的RB防御需要非西比尔(良好)ID来消耗至少与对手一样多的资源。我们提出了一种新的防御,埃尔戈,它保证(1)总有一个坏的少数;以及(2)在显著攻击期间,好的ID消耗的资源渐近地少于坏的ID。具体地说,尽管流失率很高,但好的ID RB率是O(TJ+J),其中T是对手的RB率,J是好的ID加入率。我们证明了这个RB速率对于一大类算法是渐近最优的,并且我们实证地证明了Ergo的好处。
{"title":"Bankrupting Sybil despite churn","authors":"Diksha Gupta ,&nbsp;Jared Saia ,&nbsp;Maxwell Young","doi":"10.1016/j.jcss.2023.02.004","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.02.004","url":null,"abstract":"<div><p><span>A Sybil attack<span> occurs when an adversary controls multiple system identifiers (IDs). Limiting the number of Sybil (bad) IDs to a minority is critical for tolerating malicious behavior. A popular tool for enforcing a bad minority is resource burning (RB): the verifiable consumption of a network resource. Unfortunately, typical RB defenses require non-Sybil (good) IDs to consume at least as many resources as the adversary. We present a new defense, </span></span><span>Ergo</span>, that guarantees (1) there is always a bad minority; and (2) during a significant attack, the good IDs consume asymptotically less resources than the bad. Specifically, despite high churn, the good-ID RB rate is <span><math><mi>O</mi><mo>(</mo><msqrt><mrow><mi>T</mi><mi>J</mi></mrow></msqrt><mo>+</mo><mi>J</mi><mo>)</mo></math></span>, where <em>T</em> is the adversary's RB rate, and <em>J</em> is the good-ID join rate. We show this RB rate is asymptotically optimal for a large class of algorithms, and we empirically demonstrate the benefits of <span>Ergo</span>.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"135 ","pages":"Pages 89-124"},"PeriodicalIF":1.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49739543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
How heavy independent sets help to find arborescences with many leaves in DAGs 重独立集如何帮助在dag中找到具有许多叶片的乔木
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2023-08-01 DOI: 10.1016/j.jcss.2023.02.006
Cristina G. Fernandes , Carla N. Lintzmayer

Trees with many leaves have applications for broadcasting a message to all recipients simultaneously. Internal nodes of a broadcasting tree require more expensive technology to forward the messages received. We address a problem that captures the main goal: finding spanning trees with few internal nodes in a given network. The Maximum Leaf Spanning Arborescence problem consists of, given a directed graph D, finding a spanning arborescence of D, if one exists, with the maximum number of leaves. This problem is NP-hard in general and MaxSNP-hard in the rooted directed acyclic graphs class. This paper explores a relationship between Maximum Leaf Spanning Arborescence in rooted directed acyclic graphs and maximum weight set packing. The latter problem is related to independent sets on particular classes of intersection graphs. Exploiting this relation, we derive a 7/5-approximation for Maximum Leaf Spanning Arborescence on rooted directed acyclic graphs, improving on the previous 3/2-approximation.

具有许多叶子的树具有同时向所有接收者广播消息的应用程序。广播树的内部节点需要更昂贵的技术来转发接收到的消息。我们解决了一个抓住主要目标的问题:在给定的网络中找到内部节点很少的生成树。在给定有向图D的情况下,最大叶生成树状图问题包括找到具有最大叶数的D的生成树状图(如果存在)。这个问题一般是NP难的,在根有向无环图类中是MaxSNP难的。本文研究了根有向无环图的最大展叶树期和最大权集填充之间的关系。后一个问题与特定类交集图上的独立集有关。利用这个关系,我们得到了根有向无环图上最大叶展树期的7/5近似,改进了以前的3/2近似。
{"title":"How heavy independent sets help to find arborescences with many leaves in DAGs","authors":"Cristina G. Fernandes ,&nbsp;Carla N. Lintzmayer","doi":"10.1016/j.jcss.2023.02.006","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.02.006","url":null,"abstract":"<div><p>Trees with many leaves have applications for broadcasting a message to all recipients simultaneously. Internal nodes of a broadcasting tree require more expensive technology to forward the messages received. We address a problem that captures the main goal: finding spanning trees with few internal nodes in a given network. The <span>Maximum Leaf Spanning Arborescence</span> problem consists of, given a directed graph <em>D</em>, finding a spanning arborescence of <em>D</em>, if one exists, with the maximum number of leaves. This problem is NP-hard in general and MaxSNP-hard in the rooted directed acyclic graphs class. This paper explores a relationship between <span>Maximum Leaf Spanning Arborescence</span> in rooted directed acyclic graphs and maximum weight set packing. The latter problem is related to independent sets on particular classes of intersection graphs. Exploiting this relation, we derive a 7/5-approximation for <span>Maximum Leaf Spanning Arborescence</span> on rooted directed acyclic graphs, improving on the previous 3/2-approximation.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"135 ","pages":"Pages 158-174"},"PeriodicalIF":1.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49739308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On the exact amount of missing information that makes finding possible winners hard 缺失信息的确切数量使得找到可能的赢家变得困难
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2023-08-01 DOI: 10.1016/j.jcss.2023.02.003
Palash Dey , Neeldhara Misra

In the possible winner problem, we need to compute if a set of partial votes can be completed such that a given candidate wins the election under some specific voting rule. In this paper, we determine the smallest number of undetermined pairs per partial vote for which the Possible Winner problem is NP-complete. In particular, we find the exact values of t for which the Possible Winner problem transitions to being NP-complete from being in P, where t is the maximum number of undetermined pairs in every vote. We demonstrate tight results for a broad class of scoring rules, Copelandα for every α[0,1], maximin, and Bucklin voting rules. A somewhat surprising aspect of our results is that for many of these rules, the Possible Winner problem turns out to be hard even if every vote has at most one undetermined pair of candidates.

在可能的获胜者问题中,我们需要计算一组部分选票是否可以完成,从而使给定的候选人在特定的投票规则下赢得选举。在本文中,我们确定了每个部分投票的最小数量的未确定对,其中可能的赢家问题是NP完全的。特别地,我们找到了t的精确值,对于该值,可能的赢家问题从处于P中转变为NP完全,其中t是每次投票中未确定对的最大数量。我们证明了一类广泛的评分规则的严密结果,Copelandα对于每个α∈[0,1],maximin和Bucklin投票规则。我们的结果有点令人惊讶的一点是,对于其中许多规则,即使每张选票最多有一对未确定的候选人,“可能的赢家”问题也很难解决。
{"title":"On the exact amount of missing information that makes finding possible winners hard","authors":"Palash Dey ,&nbsp;Neeldhara Misra","doi":"10.1016/j.jcss.2023.02.003","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.02.003","url":null,"abstract":"<div><p>In the <em>possible winner</em> problem, we need to compute if a set of partial votes can be completed such that a given candidate wins the election under some specific voting rule. In this paper, we determine the smallest number of undetermined pairs per partial vote for which the <span>Possible Winner</span> problem is <span><math><mi>NP</mi></math></span>-complete. In particular, we find the exact values of <em>t</em> for which the <span>Possible Winner</span> problem transitions to being <span><math><mi>NP</mi></math></span>-complete from being in <span><math><mi>P</mi></math></span>, where <em>t</em> is the maximum number of undetermined pairs in every vote. We demonstrate tight results for a broad class of scoring rules, Copeland<sup><em>α</em></sup> for every <span><math><mi>α</mi><mo>∈</mo><mo>[</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>]</mo></math></span>, maximin, and Bucklin voting rules. A somewhat surprising aspect of our results is that for many of these rules, the <span>Possible Winner</span> problem turns out to be hard even if every vote has at most one undetermined pair of candidates.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"135 ","pages":"Pages 32-54"},"PeriodicalIF":1.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49739540","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Parameterised temporal exploration problems 参数化时间探索问题
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2023-08-01 DOI: 10.1016/j.jcss.2023.01.003
Thomas Erlebach , Jakob T. Spooner

We study the fixed-parameter tractability of the problem of deciding whether a given temporal graph admits a temporal walk that visits all vertices (temporal exploration) or, in some variants, a certain subset of the vertices. In the strict variant, edges must be traversed in strictly increasing timesteps; in the non-strict variant, any number of edges can be traversed in each timestep. For both variants, we give FPT algorithms for finding a temporal walk that visits a given set X of vertices, parameterised by |X|, and for finding a temporal walk that visits at least k distinct vertices, parameterised by k. We also show W[2]-hardness for a set version of temporal exploration. For the non-strict variant, we give an FPT algorithm for temporal exploration parameterised by the lifetime, and show that temporal exploration can be solved in polynomial time if the graph in each timestep has at most two connected components.

我们研究了决定给定时间图是否允许访问所有顶点的时间行走(时间探索),或者在某些变体中,是否允许访问顶点的某个子集的问题的固定参数可处理性。在严格变体中,必须以严格增加的时间步长遍历边;在非严格变体中,在每个时间步长中可以遍历任意数量的边。对于这两种变体,我们给出了FPT算法,用于寻找访问给定顶点集X的时间行走,用|X|参数化,以及用于寻找访问至少k个不同顶点的时间行走(用k参数化)。我们还展示了时间探索的集合版本的W[2]硬度。对于非严格变量,我们给出了一个由寿命参数化的时间探索的FPT算法,并证明如果每个时间步长中的图最多有两个连通分量,则时间探索可以在多项式时间内求解。
{"title":"Parameterised temporal exploration problems","authors":"Thomas Erlebach ,&nbsp;Jakob T. Spooner","doi":"10.1016/j.jcss.2023.01.003","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.01.003","url":null,"abstract":"<div><p>We study the fixed-parameter tractability of the problem of deciding whether a given temporal graph admits a temporal walk that visits all vertices (temporal exploration) or, in some variants, a certain subset of the vertices. In the strict variant, edges must be traversed in strictly increasing timesteps; in the non-strict variant, any number of edges can be traversed in each timestep. For both variants, we give <span>FPT</span> algorithms for finding a temporal walk that visits a given set <em>X</em> of vertices, parameterised by <span><math><mo>|</mo><mi>X</mi><mo>|</mo></math></span>, and for finding a temporal walk that visits at least <em>k</em> distinct vertices, parameterised by <em>k</em>. We also show <span><math><mtext>W</mtext><mo>[</mo><mn>2</mn><mo>]</mo></math></span>-hardness for a set version of temporal exploration. For the non-strict variant, we give an <span>FPT</span> algorithm for temporal exploration parameterised by the lifetime, and show that temporal exploration can be solved in polynomial time if the graph in each timestep has at most two connected components.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"135 ","pages":"Pages 73-88"},"PeriodicalIF":1.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49739635","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bipartite 3-regular counting problems with mixed signs 具有混合符号的二分3-正则计数问题
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2023-08-01 DOI: 10.1016/j.jcss.2023.01.006
Jin-Yi Cai, Austen Z. Fan, Yin Liu

We prove a complexity dichotomy for a class of counting problems expressible as bipartite 3-regular Holant problems. These are also counting CSP problems where every constraint has arity 3 and every variable is read-thrice. For every problem of the form Holant(f|=3), where f is any integer (or equivalently, rational)-valued ternary symmetric constraint function on Boolean variables, we prove that it is either P-time computable or #P-hard, depending on an explicit criterion of f. The constraint function can take both positive and negative values, allowing for cancellations. In addition, we discover a new phenomenon: there is a set F with the property that for every fF the problem Holant(f|=3) is planar P-time computable but #P-hard in general, yet its planar tractability is by a combination of a holographic transformation by [1111] to FKT together with an independent global argument.

我们证明了一类可表示为二分3-正则Holant问题的计数问题的复杂性二分法。这些还包括CSP问题,其中每个约束具有arity 3,并且每个变量读取三次。对于形式为Holant(f|=3)的每一个问题,其中f是布尔变量上的任何整数(或等价地,有理)值三元对称约束函数,我们证明它是P-时间可计算的或#P-硬的,这取决于f的显式标准。约束函数可以取正值和负值,允许消去。此外,我们还发现了一个新的现象:存在一个集合F,其性质是,对于每个F∈F,问题Holant(F|=3)是平面P时间可计算的,但通常是#P困难的,但其平面可处理性是由[111−1]到FKT的全息变换与独立的全局自变量相结合。
{"title":"Bipartite 3-regular counting problems with mixed signs","authors":"Jin-Yi Cai,&nbsp;Austen Z. Fan,&nbsp;Yin Liu","doi":"10.1016/j.jcss.2023.01.006","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.01.006","url":null,"abstract":"<div><p>We prove a complexity dichotomy for a class of counting problems expressible as bipartite 3-regular Holant problems. These are also counting CSP problems where every constraint has arity 3 and every variable is read-thrice. For every problem of the form <span><math><mi>Holant</mi><mspace></mspace><mrow><mo>(</mo><mi>f</mi><mo>|</mo><msub><mrow><mo>=</mo></mrow><mrow><mn>3</mn></mrow></msub><mo>)</mo></mrow></math></span>, where <em>f</em> is any integer (or equivalently, rational)-valued ternary symmetric constraint function on Boolean variables, we prove that it is either P-time computable or #P-hard, depending on an explicit criterion of <em>f</em>. The constraint function can take both positive and negative values, allowing for cancellations. In addition, we discover a new phenomenon: there is a set <span><math><mi>F</mi></math></span> with the property that for every <span><math><mi>f</mi><mo>∈</mo><mi>F</mi></math></span> the problem <span><math><mi>Holant</mi><mspace></mspace><mrow><mo>(</mo><mi>f</mi><mo>|</mo><msub><mrow><mo>=</mo></mrow><mrow><mn>3</mn></mrow></msub><mo>)</mo></mrow></math></span> is planar P-time computable but #P-hard in general, yet its planar tractability is by a <em>combination</em> of a holographic transformation by <span><math><mo>[</mo><mtable><mtr><mtd><mn>1</mn></mtd><mtd><mn>1</mn></mtd></mtr><mtr><mtd><mn>1</mn></mtd><mtd><mo>−</mo><mn>1</mn></mtd></mtr></mtable><mo>]</mo></math></span> to FKT <em>together</em> with an independent global argument.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"135 ","pages":"Pages 15-31"},"PeriodicalIF":1.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49762896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On finding separators in temporal split and permutation graphs 关于在时间分裂图和置换图中寻找分隔符
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2023-08-01 DOI: 10.1016/j.jcss.2023.01.004
Nicolas Maack , Hendrik Molter , Rolf Niedermeier , Malte Renken

We study the NP-hard Temporal (s,z)-Separation problem on temporal graphs, which are graphs with fixed vertex sets but edge sets that change over discrete time steps. We tackle Temporal (s,z)-Separation by restricting the layers (i.e., graphs characterized by edges that are present at a certain point in time) to specific graph classes. We restrict the layers of the temporal graphs to be either all split graphs or all permutation graphs (both being perfect graph classes) and provide both intractability and tractability results. In particular, we show that in general Temporal (s,z)-Separation remains NP-hard both on temporal split and temporal permutation graphs, but we also spot promising islands of fixed-parameter tractability particularly based on parameterizations that measure the amount of “change over time”.

我们研究了时态图上的NP难时态(s,z)-分离问题,时态图是具有固定顶点集但边集随离散时间步长变化的图。我们通过将层(即,以某个时间点存在的边为特征的图)限制到特定的图类来处理时态(s,z)-分离。我们将时间图的层限制为全分裂图或全置换图(两者都是完美图类),并提供难处理性和易处理性结果。特别是,我们表明,在一般情况下,时间(s,z)-分离在时间分裂图和时间排列图上都是NP困难的,但我们也发现了固定参数可处理性的有希望的岛屿,特别是基于测量“随时间变化”量的参数化。
{"title":"On finding separators in temporal split and permutation graphs","authors":"Nicolas Maack ,&nbsp;Hendrik Molter ,&nbsp;Rolf Niedermeier ,&nbsp;Malte Renken","doi":"10.1016/j.jcss.2023.01.004","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.01.004","url":null,"abstract":"<div><p>We study the NP-hard <span>Temporal</span> <span><math><mo>(</mo><mi>s</mi><mo>,</mo><mi>z</mi><mo>)</mo></math></span><span>-Separation</span><span> problem on temporal graphs<span>, which are graphs with fixed vertex sets but edge sets that change over discrete time steps. We tackle </span></span><span>Temporal</span> <span><math><mo>(</mo><mi>s</mi><mo>,</mo><mi>z</mi><mo>)</mo></math></span><span>-Separation</span><span> by restricting the layers (i.e., graphs characterized by edges that are present at a certain point in time) to specific graph classes. We restrict the layers of the temporal graphs to be either all split graphs or all permutation graphs (both being perfect graph classes) and provide both intractability and tractability results. In particular, we show that in general </span><span>Temporal</span> <span><math><mo>(</mo><mi>s</mi><mo>,</mo><mi>z</mi><mo>)</mo></math></span><span>-Separation</span> remains NP-hard both on temporal split and temporal permutation graphs, but we also spot promising islands of fixed-parameter tractability particularly based on parameterizations that measure the amount of “change over time”.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"135 ","pages":"Pages 1-14"},"PeriodicalIF":1.1,"publicationDate":"2023-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49762893","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Restrained medium access control on adversarial shared channels 对抗性共享信道上的受限介质访问控制
IF 1.1 3区 计算机科学 Q2 Mathematics Pub Date : 2023-07-07 DOI: 10.1016/j.jcss.2023.103463
Elijah Hradovich , Marek Klonowski , Dariusz R. Kowalski

We study the fundamental problem of utilization of the channel shared by stations competing to transmit packets on the channel. In their turn, packets are continuously injected into stations' queues by an adversary at a rate at most ρ packets per round. The aim of the distributed medium access control algorithms is to successfully transmit packets and maintain system stability (bounded queues). We further restrain algorithms by introducing an upper bound k on the allowed number of active stations in any given round. We construct adaptive and full sensing protocols with optimal throughput 1 and almost optimal throughput 1ϵ (for any positive ϵ), respectively, in a constant-restrained channel. On the opposite side, we show that restricted protocols based on schedules known in advance suffer from a substantial drop of throughput, at most min{kn,1logn}. We compare our algorithms experimentally with well-known backoff protocols.

我们研究了竞争在信道上传输数据包的站点共享信道的利用率的基本问题。反过来,数据包被对手以每轮最多ρ个数据包的速率连续注入站点队列。分布式介质访问控制算法的目的是成功地传输数据包并保持系统稳定性(有界队列)。我们通过在任何给定轮中允许的活动站数量上引入上界k来进一步约束算法。在恒定约束信道中,我们分别构建了具有最优吞吐量1和几乎最优吞吐量1-(对于任何正的)的自适应和全感知协议。另一方面,我们表明,基于预先已知的调度的受限协议的吞吐量会大幅下降,最高可达分钟⁡{kn,1log⁡n} 。我们将我们的算法与众所周知的退避协议进行了实验比较。
{"title":"Restrained medium access control on adversarial shared channels","authors":"Elijah Hradovich ,&nbsp;Marek Klonowski ,&nbsp;Dariusz R. Kowalski","doi":"10.1016/j.jcss.2023.103463","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.103463","url":null,"abstract":"<div><p>We study the fundamental problem of utilization of the channel shared by stations competing to transmit packets on the channel. In their turn, packets are continuously injected into stations' queues by an adversary at a rate at most <em>ρ</em><span> packets per round. The aim of the distributed medium access control algorithms is to successfully transmit packets and maintain system stability (bounded queues). We further restrain algorithms by introducing an upper bound </span><em>k</em> on the allowed number of active stations in any given round. We construct adaptive and full sensing protocols with optimal throughput 1 and almost optimal throughput <span><math><mn>1</mn><mo>−</mo><mi>ϵ</mi></math></span> (for any positive <em>ϵ</em>), respectively, in a constant-restrained channel. On the opposite side, we show that restricted protocols based on schedules known in advance suffer from a substantial drop of throughput, at most <span><math><mi>min</mi><mo>⁡</mo><mo>{</mo><mfrac><mrow><mi>k</mi></mrow><mrow><mi>n</mi></mrow></mfrac><mo>,</mo><mfrac><mrow><mn>1</mn></mrow><mrow><mi>log</mi><mo>⁡</mo><mi>n</mi></mrow></mfrac><mo>}</mo></math></span>. We compare our algorithms experimentally with well-known backoff protocols.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"138 ","pages":"Article 103463"},"PeriodicalIF":1.1,"publicationDate":"2023-07-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49723748","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Computer and System Sciences
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1