Pub Date : 2023-06-28DOI: 10.1016/j.jcss.2023.103464
Dorothea Baumeister , Marc Neveling , Magnus Roos , Jörg Rothe , Lena Schend , Robin Weishaupt , Lirong Xia
The original possible winner problem consists of an unweighted election with partial preferences and a distinguished candidate c and asks whether the preferences can be extended to total ones such that c wins the given election. We introduce a novel variant of this problem: possible winner with uncertain weights. In this variant, for a given weighted election, not some of the preferences but some of the preferences' weights are uncertain. We introduce a general framework to study this problem for nonnegative integer and rational weights as well as for four different variations of the problem itself: with and without given upper bounds on the total weight and with and without given ranges to choose weights from. We study the complexity of these problems for important voting systems such as scoring protocols, (simplified) Bucklin and fallback voting, plurality with runoff and veto with runoff, , ranked pairs, and Borda.
{"title":"The possible winner with uncertain weights problem","authors":"Dorothea Baumeister , Marc Neveling , Magnus Roos , Jörg Rothe , Lena Schend , Robin Weishaupt , Lirong Xia","doi":"10.1016/j.jcss.2023.103464","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.103464","url":null,"abstract":"<div><p>The original possible winner problem consists of an unweighted election with partial preferences and a distinguished candidate <em>c</em> and asks whether the preferences can be extended to total ones such that <em>c</em><span> wins the given election. We introduce a novel variant of this problem: possible winner with uncertain weights. In this variant, for a given weighted election, not some of the preferences but some of the preferences' weights are uncertain. We introduce a general framework to study this problem for nonnegative integer and rational weights as well as for four different variations of the problem itself: with and without given upper bounds on the total weight and with and without given ranges to choose weights from. We study the complexity of these problems for important voting systems such as scoring protocols, (simplified) Bucklin and fallback voting, plurality with runoff and veto with runoff, </span><span><math><msup><mrow><mtext>Copeland</mtext></mrow><mrow><mi>α</mi></mrow></msup></math></span>, ranked pairs, and Borda.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"138 ","pages":"Article 103464"},"PeriodicalIF":1.1,"publicationDate":"2023-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49723479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-20DOI: 10.1016/j.jcss.2023.103462
Robert M. Alaniz , David Caballero , Sonya C. Cirlos , Timothy Gomez , Elise Grizzell , Andrew Rodriguez , Robert Schweller , Armando Tenorio , Tim Wylie
Tile Automata is a recently defined model of self-assembly that borrows many concepts from cellular automata to create active self-assembling systems where changes may be occurring within an assembly without requiring attachment. This model has been shown to be powerful even with limited assembly size, but many fundamental questions have yet to be explored. Here, we study the state complexity of assembling squares in seeded Tile Automata systems where growth starts from a seed and tiles attach one at a time, similar to the abstract Tile Assembly Model. We provide optimal bounds for three classes of seeded Tile Automata systems (all without detachment), which vary in the amount of complexity allowed in the transition rules. We show that, in general, seeded Tile Automata systems require states. For single-transition systems, where only one state may change in a transition rule, we show a bound of , and for deterministic systems, where each pair of states may only have one associated transition rule, a bound of . Along the way, we provide optimal bounds for the subroutines of building binary strings and building rectangles.
{"title":"Building squares with optimal state complexity in restricted active self-assembly","authors":"Robert M. Alaniz , David Caballero , Sonya C. Cirlos , Timothy Gomez , Elise Grizzell , Andrew Rodriguez , Robert Schweller , Armando Tenorio , Tim Wylie","doi":"10.1016/j.jcss.2023.103462","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.103462","url":null,"abstract":"<div><p><span><span>Tile Automata is a recently defined model of self-assembly that borrows many concepts from </span>cellular automata to create active self-assembling systems where changes may be occurring within an assembly without requiring attachment. This model has been shown to be powerful even with limited assembly size, but many fundamental questions have yet to be explored. Here, we study the state complexity of assembling </span><span><math><mi>n</mi><mo>×</mo><mi>n</mi></math></span> squares in seeded Tile Automata systems where growth starts from a seed and tiles attach one at a time, similar to the abstract Tile Assembly Model. We provide optimal bounds for three classes of seeded Tile Automata systems (all without detachment), which vary in the amount of complexity allowed in the transition rules. We show that, in general, seeded Tile Automata systems require <span><math><mi>Θ</mi><mo>(</mo><msup><mrow><mi>log</mi></mrow><mrow><mfrac><mrow><mn>1</mn></mrow><mrow><mn>4</mn></mrow></mfrac></mrow></msup><mo></mo><mi>n</mi><mo>)</mo></math></span> states. For single-transition systems, where only one state may change in a transition rule, we show a bound of <span><math><mi>Θ</mi><mo>(</mo><msup><mrow><mi>log</mi></mrow><mrow><mfrac><mrow><mn>1</mn></mrow><mrow><mn>3</mn></mrow></mfrac></mrow></msup><mo></mo><mi>n</mi><mo>)</mo></math></span>, and for deterministic systems, where each pair of states may only have one associated transition rule, a bound of <span><math><mi>Θ</mi><mo>(</mo><msup><mrow><mo>(</mo><mfrac><mrow><mi>log</mi><mo></mo><mi>n</mi></mrow><mrow><mi>log</mi><mo></mo><mi>log</mi><mo></mo><mi>n</mi></mrow></mfrac><mo>)</mo></mrow><mrow><mfrac><mrow><mn>1</mn></mrow><mrow><mn>2</mn></mrow></mfrac></mrow></msup><mo>)</mo></math></span>. Along the way, we provide optimal bounds for the subroutines of building binary strings and building <span><math><mi>O</mi><mo>(</mo><mi>log</mi><mo></mo><mi>n</mi><mo>)</mo><mo>×</mo><mi>n</mi></math></span> rectangles.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"138 ","pages":"Article 103462"},"PeriodicalIF":1.1,"publicationDate":"2023-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49737155","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-15DOI: 10.1016/j.jcss.2023.05.005
Ashwin Jacob , Jari J.H. de Kroon , Diptapriyo Majumdar , Venkatesh Raman
Graph-deletion problems involve deleting a small number of vertices so that the resulting graph belong to a given hereditary graph class. We initiate a study of a natural variation of the problem of deletion to scattered graph classes. We want to delete at most k vertices so that each connected component of the resulting graph belongs to one of the constant number of graph classes. As our main result, we show that this problem is non-uniformly fixed-parameter tractable (FPT) when the deletion problem corresponding to each of the constant number of graph classes is known to be FPT and the properties that a graph belongs to these classes are expressible in Counting Monodic Second Order (CMSO) logic. While this is shown using some black box theorems in parameterized complexity, we give a faster FPT algorithm when each of the graph classes has a finite forbidden set.
{"title":"Deletion to scattered graph classes I - Case of finite number of graph classes","authors":"Ashwin Jacob , Jari J.H. de Kroon , Diptapriyo Majumdar , Venkatesh Raman","doi":"10.1016/j.jcss.2023.05.005","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.05.005","url":null,"abstract":"<div><p>Graph-deletion problems involve deleting a small number of vertices so that the resulting graph belong to a given hereditary graph class. We initiate a study of a natural variation of the problem of deletion to <em>scattered graph classes</em>. We want to delete at most <em>k</em><span> vertices so that each connected component of the resulting graph belongs to one of the constant number of graph classes. As our main result, we show that this problem is non-uniformly fixed-parameter tractable (FPT) when the deletion problem corresponding to each of the constant number of graph classes is known to be FPT and the properties that a graph belongs to these classes are expressible in Counting Monodic Second Order (CMSO) logic. While this is shown using some black box theorems in parameterized complexity, we give a faster FPT algorithm when each of the graph classes has a finite forbidden set.</span></p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"138 ","pages":"Article 103460"},"PeriodicalIF":1.1,"publicationDate":"2023-06-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49723543","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-05DOI: 10.1016/j.jcss.2023.05.006
Huib Donkers, Bart M.P. Jansen , Jari J.H. de Kroon
We revisit the k-Secluded Tree problem. Given a vertex-weighted undirected graph G, its objective is to find a maximum-weight induced subtree T whose open neighborhood has size at most k. We present a fixed-parameter tractable algorithm that solves the problem in time , improving on a double-exponential running time from earlier work by Golovach, Heggernes, Lima, and Montealegre. Starting from a single vertex, our algorithm grows a k-secluded tree by branching on vertices in the open neighborhood of the current tree T. To bound the branching depth, we prove a structural result that can be used to identify a vertex that belongs to the neighborhood of any k-secluded supertree once the open neighborhood of T becomes sufficiently large. We extend the algorithm to enumerate compact descriptions of all maximum-weight k-secluded trees, which allows us to count them as well.
{"title":"Finding k-secluded trees faster","authors":"Huib Donkers, Bart M.P. Jansen , Jari J.H. de Kroon","doi":"10.1016/j.jcss.2023.05.006","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.05.006","url":null,"abstract":"<div><p>We revisit the <em>k</em><span>-Secluded Tree</span> problem. Given a vertex-weighted undirected graph <em>G</em>, its objective is to find a maximum-weight induced subtree <em>T</em> whose open neighborhood has size at most <em>k</em>. We present a fixed-parameter tractable algorithm that solves the problem in time <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>O</mi><mo>(</mo><mi>k</mi><mi>log</mi><mo></mo><mi>k</mi><mo>)</mo></mrow></msup><mo>⋅</mo><msup><mrow><mi>n</mi></mrow><mrow><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></mrow></msup></math></span>, improving on a double-exponential running time from earlier work by Golovach, Heggernes, Lima, and Montealegre. Starting from a single vertex, our algorithm grows a <em>k</em>-secluded tree by branching on vertices in the open neighborhood of the current tree <em>T</em>. To bound the branching depth, we prove a structural result that can be used to identify a vertex that belongs to the neighborhood of any <em>k</em>-secluded supertree <span><math><msup><mrow><mi>T</mi></mrow><mrow><mo>′</mo></mrow></msup><mo>⊇</mo><mi>T</mi></math></span> once the open neighborhood of <em>T</em> becomes sufficiently large. We extend the algorithm to enumerate compact descriptions of all maximum-weight <em>k</em>-secluded trees, which allows us to count them as well.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"138 ","pages":"Article 103461"},"PeriodicalIF":1.1,"publicationDate":"2023-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49737158","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-01DOI: 10.1016/j.jcss.2023.01.001
Sebastian Berndt , Leah Epstein , Klaus Jansen , Asaf Levin , Marten Maack , Lars Rohwedder
Semi-online models where decisions may be revoked in a limited way have been studied extensively in the last years. A well-studied measure of the amount of decisions that can be revoked is the (constant) migration factor. When an object arrives, the decisions for objects of total size at most the migration factor times its size may be revoked. This means that a small object only leads to small changes. We extensively study the bin covering problem with migration in different scenarios. We develop algorithms both for the static case where only insertions are allowed, and for the dynamic case, where items may also depart. We also develop lower bounds for these scenarios both for amortized migration and for worst-case migration showing that our algorithms have nearly optimal migration factor and asymptotic competitive ratio. We therefore resolve the competitiveness of the bin covering problem with migration.
{"title":"Online bin covering with limited migration","authors":"Sebastian Berndt , Leah Epstein , Klaus Jansen , Asaf Levin , Marten Maack , Lars Rohwedder","doi":"10.1016/j.jcss.2023.01.001","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.01.001","url":null,"abstract":"<div><p>Semi-online models where decisions may be revoked in a limited way have been studied extensively in the last years. A well-studied measure of the amount of decisions that can be revoked is the (constant) migration factor. When an object arrives, the decisions for objects of total size at most the migration factor times its size may be revoked. This means that a small object only leads to small changes. We extensively study the bin covering problem with migration in different scenarios. We develop algorithms both for the static case where only insertions are allowed, and for the dynamic case, where items may also depart. We also develop lower bounds for these scenarios both for amortized migration and for worst-case migration showing that our algorithms have nearly optimal migration factor and asymptotic competitive ratio. We therefore resolve the competitiveness of the bin covering problem with migration.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"134 ","pages":"Pages 42-72"},"PeriodicalIF":1.1,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49753162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-01DOI: 10.1016/j.jcss.2023.01.002
Solène J. Esnay , Alonso Núñez , Ilkka Törmä
The generic limit set of a dynamical system is the smallest set that attracts most of the space in a topological sense: it is the smallest closed set with a comeager basin of attraction. Introduced by Milnor, it has been studied in the context of one-dimensional cellular automata by Djenaoui and Guillon, Delacourt, and Törmä. In this article we present complexity bounds on realizations of generic limit sets of cellular automata with prescribed properties. We show that generic limit sets have a language if they are inclusion-minimal, a language if the cellular automaton has equicontinuous points, and that these bounds are tight. We also prove that many chain mixing subshifts and all chain mixing subshifts are realizable as generic limit sets. As a corollary, we characterize the minimal subshifts that occur as generic limit sets.
{"title":"Arithmetical complexity of the language of generic limit sets of cellular automata","authors":"Solène J. Esnay , Alonso Núñez , Ilkka Törmä","doi":"10.1016/j.jcss.2023.01.002","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.01.002","url":null,"abstract":"<div><p><span>The generic limit set of a dynamical system<span><span> is the smallest set that attracts most of the space in a topological sense: it is the smallest closed set with a comeager basin of attraction. Introduced by Milnor, it has been studied in the context of one-dimensional </span>cellular automata by Djenaoui and Guillon, Delacourt, and Törmä. In this article we present complexity bounds on realizations of generic limit sets of cellular automata with prescribed properties. We show that generic limit sets have a </span></span><span><math><msubsup><mrow><mi>Π</mi></mrow><mrow><mn>2</mn></mrow><mrow><mn>0</mn></mrow></msubsup></math></span> language if they are inclusion-minimal, a <span><math><msubsup><mrow><mi>Σ</mi></mrow><mrow><mn>1</mn></mrow><mrow><mn>0</mn></mrow></msubsup></math></span> language if the cellular automaton has equicontinuous points, and that these bounds are tight. We also prove that many chain mixing <span><math><msubsup><mrow><mi>Π</mi></mrow><mrow><mn>2</mn></mrow><mrow><mn>0</mn></mrow></msubsup></math></span> subshifts and all chain mixing <span><math><msubsup><mrow><mi>Δ</mi></mrow><mrow><mn>2</mn></mrow><mrow><mn>0</mn></mrow></msubsup></math></span> subshifts are realizable as generic limit sets. As a corollary, we characterize the minimal subshifts that occur as generic limit sets.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"134 ","pages":"Pages 20-41"},"PeriodicalIF":1.1,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49753160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-01DOI: 10.1016/j.jcss.2022.12.001
Eduard Eiben , Robert Ganian , Iyad Kanj , Sebastian Ordyniak , Stefan Szeider
We study fundamental clustering problems for incomplete data. Specifically, given a set of incomplete d-dimensional vectors (representing rows of a matrix), the goal is to complete the missing vector entries in a way that admits a partitioning of the vectors into at most k clusters with radius or diameter at most r. We give characterizations of the parameterized complexity of these problems with respect to the parameters k, r, and the minimum number of rows and columns needed to cover all the missing entries. We show that the considered problems are fixed-parameter tractable when parameterized by the three parameters combined, and that dropping any of the three parameters results in parameterized intractability. A byproduct of our results is that, for the complete data setting, all problems under consideration are fixed-parameter tractable parameterized by .
{"title":"On the parameterized complexity of clustering problems for incomplete data","authors":"Eduard Eiben , Robert Ganian , Iyad Kanj , Sebastian Ordyniak , Stefan Szeider","doi":"10.1016/j.jcss.2022.12.001","DOIUrl":"https://doi.org/10.1016/j.jcss.2022.12.001","url":null,"abstract":"<div><p>We study fundamental clustering problems for incomplete data. Specifically, given a set of incomplete <em>d</em>-dimensional vectors (representing rows of a matrix), the goal is to complete the missing vector entries in a way that admits a partitioning of the vectors into at most <em>k</em> clusters with radius or diameter at most <em>r</em>. We give characterizations of the parameterized complexity of these problems with respect to the parameters <em>k</em>, <em>r</em><span>, and the minimum number of rows and columns needed to cover all the missing entries. We show that the considered problems are fixed-parameter tractable when parameterized by the three parameters combined, and that dropping any of the three parameters results in parameterized intractability. A byproduct of our results is that, for the complete data setting, all problems under consideration are fixed-parameter tractable parameterized by </span><span><math><mi>k</mi><mo>+</mo><mi>r</mi></math></span>.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"134 ","pages":"Pages 1-19"},"PeriodicalIF":1.1,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49737851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-01DOI: 10.1016/j.jcss.2023.01.005
Ishay Haviv , Michal Parnas
A matrix is said to be regular if all of its rows and columns have the same number of ones. We prove that for infinitely many integers k, there exists a square regular matrix with binary rank k, such that the Boolean rank of its complement is . This settles, in a strong form, a question of Pullman (1988) [27] and a conjecture of Hefner et al. (1990) [18]. The result can be viewed as a regular analogue of a recent result of Balodis et al. (2021) [2], motivated by the clique vs. independent set problem in communication complexity and by the (disproved) Alon-Saks-Seymour conjecture in graph theory. As an application of the produced regular matrices, we obtain regular counterexamples to the Alon-Saks-Seymour conjecture and prove that for infinitely many integers k, there exists a regular graph with biclique partition number k and chromatic number .
{"title":"On the binary and Boolean rank of regular matrices","authors":"Ishay Haviv , Michal Parnas","doi":"10.1016/j.jcss.2023.01.005","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.01.005","url":null,"abstract":"<div><p>A <span><math><mn>0</mn><mo>,</mo><mn>1</mn></math></span> matrix is said to be regular if all of its rows and columns have the same number of ones. We prove that for infinitely many integers <em>k</em>, there exists a square regular <span><math><mn>0</mn><mo>,</mo><mn>1</mn></math></span> matrix with binary rank <em>k</em>, such that the Boolean rank of its complement is <span><math><msup><mrow><mi>k</mi></mrow><mrow><mover><mrow><mi>Ω</mi></mrow><mrow><mo>˜</mo></mrow></mover><mo>(</mo><mi>log</mi><mo></mo><mi>k</mi><mo>)</mo></mrow></msup></math></span>. This settles, in a strong form, a question of Pullman (1988) <span>[27]</span> and a conjecture of Hefner et al. (1990) <span>[18]</span>. The result can be viewed as a regular analogue of a recent result of Balodis et al. (2021) <span>[2]</span><span>, motivated by the clique vs. independent set problem in communication complexity and by the (disproved) Alon-Saks-Seymour conjecture in graph theory. As an application of the produced regular matrices, we obtain regular counterexamples to the Alon-Saks-Seymour conjecture and prove that for infinitely many integers </span><em>k</em><span>, there exists a regular graph with biclique partition number </span><em>k</em><span> and chromatic number </span><span><math><msup><mrow><mi>k</mi></mrow><mrow><mover><mrow><mi>Ω</mi></mrow><mrow><mo>˜</mo></mrow></mover><mo>(</mo><mi>log</mi><mo></mo><mi>k</mi><mo>)</mo></mrow></msup></math></span>.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"134 ","pages":"Pages 73-86"},"PeriodicalIF":1.1,"publicationDate":"2023-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49753163","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-30DOI: 10.1016/j.jcss.2023.05.002
Spyros Angelopoulos , Konstantinos Panagiotou
We study the general setting of weighted search in which a number of weighted targets are hidden in a star-like environment, and a mobile searcher must locate a subset of targets with aggregate weight at least a given value W. The cost of the strategy is the distance traversed by the searcher, and its performance is measured by the worst-case ratio of the cost incurred by the searcher over the cost of an on optimal, offline strategy. This is the first study of a setting that generalizes several problems in search theory such as searching for a single target and searching for unit-weighted targets. We present and analyze a near-optimal strategy using an approach based on parameterized analysis. This problem formulates settings of resource allocation among parallel tasks under uncertainty; specifically, we demonstrate further applications in the design of interruptible systems based on adaptive scheduling of contract algorithms.
{"title":"Weighted online search","authors":"Spyros Angelopoulos , Konstantinos Panagiotou","doi":"10.1016/j.jcss.2023.05.002","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.05.002","url":null,"abstract":"<div><p>We study the general setting of <em>weighted search</em> in which a number of weighted targets are hidden in a star-like environment, and a mobile searcher must locate a subset of targets with aggregate weight at least a given value <em>W</em>. The cost of the strategy is the distance traversed by the searcher, and its performance is measured by the worst-case ratio of the cost incurred by the searcher over the cost of an on optimal, offline strategy. This is the first study of a setting that generalizes several problems in search theory such as searching for a single target and searching for unit-weighted targets. We present and analyze a near-optimal strategy using an approach based on parameterized analysis. This problem formulates settings of resource allocation among parallel tasks under uncertainty; specifically, we demonstrate further applications in the design of interruptible systems based on <em>adaptive</em> scheduling of contract algorithms.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"138 ","pages":"Article 103457"},"PeriodicalIF":1.1,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49723345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-30DOI: 10.1016/j.jcss.2023.05.004
Catherine Greenhill , Bernard Mans , Ali Pourmiri
We consider a variation of balls-into-bins which randomly allocates m balls into n bins. Following Godfrey's model (SODA, 2008), we assume that each ball t, , comes with a hypergraph , and each edge contains at least a logarithmic number of bins. Given , our d-choice algorithm chooses an edge , uniformly at random, and then chooses a set D of d random bins from the selected edge B. The ball is allocated to a least-loaded bin from D. We prove that if the hypergraphs satisfy a balancedness condition and have low pair visibility, then after allocating balls, the maximum load of any bin is at most , with high probability. Moreover, we establish a lower bound for the maximum load attained by the balanced allocation for a sequence of hypergraphs in terms of pair visibility.
{"title":"Balanced allocation on hypergraphs","authors":"Catherine Greenhill , Bernard Mans , Ali Pourmiri","doi":"10.1016/j.jcss.2023.05.004","DOIUrl":"https://doi.org/10.1016/j.jcss.2023.05.004","url":null,"abstract":"<div><p>We consider a variation of balls-into-bins which randomly allocates <em>m</em> balls into <em>n</em> bins. Following Godfrey's model (SODA, 2008), we assume that each ball <em>t</em>, <span><math><mn>1</mn><mo>⩽</mo><mi>t</mi><mo>⩽</mo><mi>m</mi></math></span>, comes with a hypergraph <span><math><msup><mrow><mi>H</mi></mrow><mrow><mo>(</mo><mi>t</mi><mo>)</mo></mrow></msup><mo>=</mo><mo>{</mo><msub><mrow><mi>B</mi></mrow><mrow><mn>1</mn></mrow></msub><mo>,</mo><msub><mrow><mi>B</mi></mrow><mrow><mn>2</mn></mrow></msub><mo>,</mo><mo>…</mo><mo>,</mo><msub><mrow><mi>B</mi></mrow><mrow><msub><mrow><mi>s</mi></mrow><mrow><mi>t</mi></mrow></msub></mrow></msub><mo>}</mo></math></span>, and each edge <span><math><mi>B</mi><mo>∈</mo><msup><mrow><mi>H</mi></mrow><mrow><mo>(</mo><mi>t</mi><mo>)</mo></mrow></msup></math></span> contains at least a logarithmic number of bins. Given <span><math><mi>d</mi><mo>⩾</mo><mn>2</mn></math></span>, our <em>d</em>-choice algorithm chooses an edge <span><math><mi>B</mi><mo>∈</mo><msup><mrow><mi>H</mi></mrow><mrow><mo>(</mo><mi>t</mi><mo>)</mo></mrow></msup></math></span>, uniformly at random, and then chooses a set <em>D</em> of <em>d</em> random bins from the selected edge <em>B</em>. The ball is allocated to a least-loaded bin from <em>D</em>. We prove that if the hypergraphs <span><math><msup><mrow><mi>H</mi></mrow><mrow><mo>(</mo><mn>1</mn><mo>)</mo></mrow></msup><mo>,</mo><mo>…</mo><mo>,</mo><msup><mrow><mi>H</mi></mrow><mrow><mo>(</mo><mi>m</mi><mo>)</mo></mrow></msup></math></span> satisfy a <em>balancedness</em> condition and have low <em>pair visibility</em>, then after allocating <span><math><mi>m</mi><mo>=</mo><mi>Θ</mi><mo>(</mo><mi>n</mi><mo>)</mo></math></span> balls, the maximum load of any bin is at most <span><math><msub><mrow><mi>log</mi></mrow><mrow><mi>d</mi></mrow></msub><mo></mo><mi>log</mi><mo></mo><mi>n</mi><mo>+</mo><mi>O</mi><mo>(</mo><mn>1</mn><mo>)</mo></math></span>, with high probability. Moreover, we establish a lower bound for the maximum load attained by the balanced allocation for a sequence of hypergraphs in terms of pair visibility.</p></div>","PeriodicalId":50224,"journal":{"name":"Journal of Computer and System Sciences","volume":"138 ","pages":"Article 103459"},"PeriodicalIF":1.1,"publicationDate":"2023-05-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49723343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}