首页 > 最新文献

Journal of Combinatorial Optimization最新文献

英文 中文
Approximation algorithms for solving the trip-constrained vehicle routing cover problems 解决行程受限车辆路由覆盖问题的近似算法
IF 1 4区 数学 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2024-10-07 DOI: 10.1007/s10878-024-01216-9
Jianping Li, Ping Yang, Junran Lichen, Pengxiang Pan
<p>In this paper, we address the trip-constrained vehicle routing cover problem (the TcVRC problem). Specifically, given a metric complete graph <span>(G=(V,E;w))</span> with a set <i>D</i> <span>((subseteq V))</span> of depots, a set <i>J</i> <span>((=Vbackslash D))</span> of customer locations, each customer having unsplittable demand 1, and <i>k</i> vehicles with capacity <i>Q</i>, it is asked to find a set <span>({mathcal {C}})</span> <span>(={C_i~|~i=1,2,ldots ,k})</span> of <i>k</i> tours for <i>k</i> vehicles to service all customers, each tour for a vehicle starts and ends at one depot in <i>D</i> and permits to be replenished at some other depots in <i>D</i> before continuously servicing at most <i>Q</i> customers, i.e., the number of customers continuously serviced in per trip of each tour is at most <i>Q</i> (except the two end-vertices of that trip), where each trip is a path or cycle, starting at a depot and ending at other depot (maybe the same depot) in <i>D</i>, such that there are no other depots in the interior of that path or cycle, the objective is to minimize the maximum weight of such <i>k</i> tours in <span>({mathcal {C}})</span>, i.e., <span>(min _{{mathcal {C}}}max {w(C_i)~|~i=1,2,ldots ,k })</span>, where <span>(w(C_i))</span> is the total weight of edges in that tour <span>(C_i)</span>. Considering <i>k</i> vehicles whether to have common depot or suppliers, we consider three variations of the TcVRC problem, i.e., (1) the trip-constrained vehicle routing cover problem with multiple suppliers (the TcVRC-MS problem) is asked to find a set <span>({mathcal {C}}={C_i~|~i=1,2,ldots ,k })</span> of <i>k</i> tours mentioned-above, the objective is to minimize the maximum weight of such <i>k</i> tours in <span>({mathcal {C}})</span>; (2) the trip-constrained vehicle routing cover problem with common depot and multiple suppliers (the TcVRC-CDMS problem) is asked to find a set <span>({mathcal {C}}={C_i~|~i=1,2,ldots ,k })</span> of <i>k</i> tours mentioned-above, where each tour starts and ends at same depot <i>v</i> in <i>D</i>, each vehicle having its suppliers at some depots in <i>D</i> (possibly including <i>v</i>), the objective is to minimize the maximum weight of such <i>k</i> tours in <span>({mathcal {C}})</span>; (3) the trip-constrained <i>k</i>-traveling salesman problem with non-suppliers (the Tc<i>k</i>TS-NS problem, simply the Tc<i>k</i>TSP-NS) is asked to find a set <span>({mathcal {C}}={C_i~|~i=1,2,ldots ,k})</span> of <i>k</i> tours mentioned-above, where each tour starts and ends at same depot <i>v</i> in <i>D</i>, each vehicle having non-suppliers, the objective is to minimize the maximum weight of such <i>k</i> tours in <span>({mathcal {C}})</span>. As for the main contributions, we design some approximation algorithms to solve these three aforementioned problems in polynomial time, whose approximation ratios achieve three constants <span>(8-frac{2}{k})</span>, <span>(frac{7}{2}-frac{1}{k})</span> and 5, respec
本文探讨了行程受限车辆路由覆盖问题(TcVRC 问题)。具体来说,给定一个度量完整图(G=(V,E;w)),其中有一组仓库 D((subseteq V)),一组客户位置 J((=Vbackslash D)),每个客户都有不可拆分的需求 1,以及 k 辆运力为 Q 的车辆,要求找到一组 ({mathcal {C}}) (={C_i~|~i=1、2,ldots ,k}) k辆车的k次巡回服务所有客户,每辆车的每次巡回都在D中的一个仓库开始和结束,并允许在连续服务最多Q个客户之前在D中的一些其他仓库进行补充,也就是说,每辆车的每次巡回都在D中的一个仓库开始和结束,并允许在连续服务最多Q个客户之前在D中的一些其他仓库进行补充。e.,每次巡回的每个行程中连续服务的客户数最多为 Q(该行程的两个终点顶点除外),其中每个行程都是一条路径或循环,从 D 中的一个车厂开始,到另一个车厂(可能是同一个车厂)结束,这样在该路径或循环的内部就没有其他车厂,目标是最小化 ({mathcal {C}}) 中这 k 个巡回的最大权重,即、(min_{{/mathcal{C}}}max{w(C_i)~|~i=1,2,ldots,k}),其中(w(C_i))是该游程(C_i)中边的总权重。考虑到 k 辆车是否有共同的仓库或供应商,我们考虑了 TcVRC 问题的三种变化,即(1)有多个供应商的行程受限车辆路由覆盖问题(TcVRC-MS 问题)要求找到上述 k 个巡回的集合 ({mathcal {C}}={C_i~|~i=1,2,ldots ,k }),目标是最小化这 k 个巡回在 ({mathcal {C}}) 中的最大权重;(2)具有共同仓库和多个供应商的行程受限车辆路由覆盖问题(TcVRC-CDMS问题)要求找到上述k个巡回的集合({mathcal {C}}={C_i~|~i=1,2,ldots ,k })、其中每个旅行的起点和终点都在 D 中的同一个仓库 v,每辆车的供应商都在 D 中的一些仓库(可能包括 v),目标是最小化这 k 个旅行在 ({mathcal {C}}) 中的最大权重;(3) 非供应商的行程受限 k-traveling salesman 问题(TckTS-NS 问题,简称 TckTSP-NS)要求找到一组 ({mathcal {C}}={C_i~|~i=1,2,ldots 、上面提到的 k 个旅行团,其中每个旅行团的起点和终点都是 D 中的同一个仓库 v,每个车辆都有非供应商,目标是最小化 ({mathcal {C}}) 中这 k 个旅行团的最大权重。)至于主要贡献,我们设计了一些近似算法来在多项式时间内解决上述三个问题,其近似率分别达到了三个常数 (8-frac{2}{k})、(frac{7}{2}-frac{1}{k})和 5。
{"title":"Approximation algorithms for solving the trip-constrained vehicle routing cover problems","authors":"Jianping Li, Ping Yang, Junran Lichen, Pengxiang Pan","doi":"10.1007/s10878-024-01216-9","DOIUrl":"https://doi.org/10.1007/s10878-024-01216-9","url":null,"abstract":"&lt;p&gt;In this paper, we address the trip-constrained vehicle routing cover problem (the TcVRC problem). Specifically, given a metric complete graph &lt;span&gt;(G=(V,E;w))&lt;/span&gt; with a set &lt;i&gt;D&lt;/i&gt; &lt;span&gt;((subseteq V))&lt;/span&gt; of depots, a set &lt;i&gt;J&lt;/i&gt; &lt;span&gt;((=Vbackslash D))&lt;/span&gt; of customer locations, each customer having unsplittable demand 1, and &lt;i&gt;k&lt;/i&gt; vehicles with capacity &lt;i&gt;Q&lt;/i&gt;, it is asked to find a set &lt;span&gt;({mathcal {C}})&lt;/span&gt; &lt;span&gt;(={C_i~|~i=1,2,ldots ,k})&lt;/span&gt; of &lt;i&gt;k&lt;/i&gt; tours for &lt;i&gt;k&lt;/i&gt; vehicles to service all customers, each tour for a vehicle starts and ends at one depot in &lt;i&gt;D&lt;/i&gt; and permits to be replenished at some other depots in &lt;i&gt;D&lt;/i&gt; before continuously servicing at most &lt;i&gt;Q&lt;/i&gt; customers, i.e., the number of customers continuously serviced in per trip of each tour is at most &lt;i&gt;Q&lt;/i&gt; (except the two end-vertices of that trip), where each trip is a path or cycle, starting at a depot and ending at other depot (maybe the same depot) in &lt;i&gt;D&lt;/i&gt;, such that there are no other depots in the interior of that path or cycle, the objective is to minimize the maximum weight of such &lt;i&gt;k&lt;/i&gt; tours in &lt;span&gt;({mathcal {C}})&lt;/span&gt;, i.e., &lt;span&gt;(min _{{mathcal {C}}}max {w(C_i)~|~i=1,2,ldots ,k })&lt;/span&gt;, where &lt;span&gt;(w(C_i))&lt;/span&gt; is the total weight of edges in that tour &lt;span&gt;(C_i)&lt;/span&gt;. Considering &lt;i&gt;k&lt;/i&gt; vehicles whether to have common depot or suppliers, we consider three variations of the TcVRC problem, i.e., (1) the trip-constrained vehicle routing cover problem with multiple suppliers (the TcVRC-MS problem) is asked to find a set &lt;span&gt;({mathcal {C}}={C_i~|~i=1,2,ldots ,k })&lt;/span&gt; of &lt;i&gt;k&lt;/i&gt; tours mentioned-above, the objective is to minimize the maximum weight of such &lt;i&gt;k&lt;/i&gt; tours in &lt;span&gt;({mathcal {C}})&lt;/span&gt;; (2) the trip-constrained vehicle routing cover problem with common depot and multiple suppliers (the TcVRC-CDMS problem) is asked to find a set &lt;span&gt;({mathcal {C}}={C_i~|~i=1,2,ldots ,k })&lt;/span&gt; of &lt;i&gt;k&lt;/i&gt; tours mentioned-above, where each tour starts and ends at same depot &lt;i&gt;v&lt;/i&gt; in &lt;i&gt;D&lt;/i&gt;, each vehicle having its suppliers at some depots in &lt;i&gt;D&lt;/i&gt; (possibly including &lt;i&gt;v&lt;/i&gt;), the objective is to minimize the maximum weight of such &lt;i&gt;k&lt;/i&gt; tours in &lt;span&gt;({mathcal {C}})&lt;/span&gt;; (3) the trip-constrained &lt;i&gt;k&lt;/i&gt;-traveling salesman problem with non-suppliers (the Tc&lt;i&gt;k&lt;/i&gt;TS-NS problem, simply the Tc&lt;i&gt;k&lt;/i&gt;TSP-NS) is asked to find a set &lt;span&gt;({mathcal {C}}={C_i~|~i=1,2,ldots ,k})&lt;/span&gt; of &lt;i&gt;k&lt;/i&gt; tours mentioned-above, where each tour starts and ends at same depot &lt;i&gt;v&lt;/i&gt; in &lt;i&gt;D&lt;/i&gt;, each vehicle having non-suppliers, the objective is to minimize the maximum weight of such &lt;i&gt;k&lt;/i&gt; tours in &lt;span&gt;({mathcal {C}})&lt;/span&gt;. As for the main contributions, we design some approximation algorithms to solve these three aforementioned problems in polynomial time, whose approximation ratios achieve three constants &lt;span&gt;(8-frac{2}{k})&lt;/span&gt;, &lt;span&gt;(frac{7}{2}-frac{1}{k})&lt;/span&gt; and 5, respec","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"4 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2024-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142384373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Faster algorithms for evacuation problems in networks with a single sink of small degree and bounded capacitated edges 具有小度单汇和有界容纳边的网络中疏散问题的更快算法
IF 1 4区 数学 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2024-10-07 DOI: 10.1007/s10878-024-01213-y
Yuya Higashikawa, Naoki Katoh, Junichi Teruyama, Yuki Tokuni

In this paper, we propose new algorithms for evacuation problems defined on dynamic flow networks. A dynamic flow network is a directed graph in which source nodes are given supplies and a single sink node is given a demand. The evacuation problem seeks a dynamic flow that sends all supplies from sources to the sink such that its demand is satisfied in the minimum feasible time horizon. For this problem, the current best algorithms are developed by Schlöter (2018) and Kamiyama (2019), which run in strongly polynomial time but with high-order polynomial time complexity because they use submodular function minimization as a subroutine. In this paper, we propose new algorithms that do not explicitly execute submodular function minimization, and we prove that they are faster than the current best algorithms when an input network is restricted such that the sink has a small in-degree and every edge has the same capacity.

在本文中,我们针对动态流动网络上定义的疏散问题提出了新的算法。动态流动网络是一个有向图,其中源节点给出供应,单个汇节点给出需求。疏散问题寻求的是一种动态流,它能将所有供应从源节点发送到汇节点,从而在最小可行时间范围内满足其需求。对于这个问题,目前最好的算法是由 Schlöter (2018) 和 Kamiyama (2019) 开发的,其运行时间为强多项式时间,但具有高阶多项式时间复杂度,因为它们使用了子模函数最小化作为子程序。在本文中,我们提出了不显式执行子模函数最小化的新算法,并证明当输入网络受到限制,使得汇的内度很小且每条边的容量相同时,这些算法比目前最好的算法更快。
{"title":"Faster algorithms for evacuation problems in networks with a single sink of small degree and bounded capacitated edges","authors":"Yuya Higashikawa, Naoki Katoh, Junichi Teruyama, Yuki Tokuni","doi":"10.1007/s10878-024-01213-y","DOIUrl":"https://doi.org/10.1007/s10878-024-01213-y","url":null,"abstract":"<p>In this paper, we propose new algorithms for <i>evacuation problems</i> defined on <i>dynamic flow networks</i>. A dynamic flow network is a directed graph in which <i>source</i> nodes are given supplies and a single <i>sink</i> node is given a demand. The evacuation problem seeks a dynamic flow that sends all supplies from sources to the sink such that its demand is satisfied in the minimum feasible time horizon. For this problem, the current best algorithms are developed by Schlöter (2018) and Kamiyama (2019), which run in strongly polynomial time but with high-order polynomial time complexity because they use submodular function minimization as a subroutine. In this paper, we propose new algorithms that do not explicitly execute submodular function minimization, and we prove that they are faster than the current best algorithms when an input network is restricted such that the sink has a small in-degree and every edge has the same capacity.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"52 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2024-10-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142383953","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The k-th Roman domination problem is polynomial on interval graphs 第 k 个罗马支配问题在区间图上是多项式问题
IF 1 4区 数学 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2024-10-05 DOI: 10.1007/s10878-024-01206-x
Peng Li

Let G be some simple graph and k be any positive integer. Take (h: V(G)rightarrow {0,1,ldots ,k+1}) and (v in V(G)), let (AN_{h}(v)) denote the set of vertices (win N_{G}(v)) with (h(w)ge 1). Let (AN_{h}[v] = AN_{h}(v)cup {v}). The function h is a [k]-Roman dominating function of G if (h(AN_{h}[v]) ge |AN_{h}(v)| + k) holds for any (v in V(G)). The minimum weight of such a function is called the k-th Roman Domination number of G, which is denoted by (gamma _{kR}(G)). In 2020, Banerjee et al. presented linear time algorithms to compute the double Roman domination number on proper interval graphs and block graphs. They posed the open question that whether there is some polynomial time algorithm to solve the double Roman domination problem on interval graphs. It is argued that the interval graph is a nontrivial graph class. In this article, we design a simple dynamic polynomial time algorithm to solve the k-th Roman domination problem on interval graphs for each fixed integer (k>1).

让 G 是某个简单图形,k 是任意正整数。取(h:V(G)rightarrow {0,1,ldots ,k+1}) 和 (v in V(G)), let (AN_{h}(v)) denote the set of vertices (win N_{G}(v)) with (h(w)ge 1).让(AN_{h}[v] = AN_{h}(v)cup {v})。函数 h 是 G 的 [k]-Roman 主导函数,如果对于任意 (v in V(G)) (h(AN_{h}[v]) ge |AN_{h}(v)| + k) 成立。这样一个函数的最小权重被称为 G 的第 k 个罗马支配数,用 (gamma _{kR}(G)) 表示。2020 年,Banerjee 等人提出了在适当区间图和块图上计算双罗马支配数的线性时间算法。他们提出了一个开放性问题,即是否存在某种多项式时间算法来解决区间图上的双罗马支配数问题。他们认为区间图是一个非难图类。在本文中,我们设计了一种简单的动态多项式时间算法来解决区间图上每个固定整数 (k>1)的 k-th Roman domination 问题。
{"title":"The k-th Roman domination problem is polynomial on interval graphs","authors":"Peng Li","doi":"10.1007/s10878-024-01206-x","DOIUrl":"https://doi.org/10.1007/s10878-024-01206-x","url":null,"abstract":"<p>Let <i>G</i> be some simple graph and <i>k</i> be any positive integer. Take <span>(h: V(G)rightarrow {0,1,ldots ,k+1})</span> and <span>(v in V(G))</span>, let <span>(AN_{h}(v))</span> denote the set of vertices <span>(win N_{G}(v))</span> with <span>(h(w)ge 1)</span>. Let <span>(AN_{h}[v] = AN_{h}(v)cup {v})</span>. The function <i>h</i> is a [<i>k</i>]-Roman dominating function of <i>G</i> if <span>(h(AN_{h}[v]) ge |AN_{h}(v)| + k)</span> holds for any <span>(v in V(G))</span>. The minimum weight of such a function is called the <i>k</i>-th Roman Domination number of <i>G</i>, which is denoted by <span>(gamma _{kR}(G))</span>. In 2020, Banerjee et al. presented linear time algorithms to compute the double Roman domination number on proper interval graphs and block graphs. They posed the open question that whether there is some polynomial time algorithm to solve the double Roman domination problem on interval graphs. It is argued that the interval graph is a nontrivial graph class. In this article, we design a simple dynamic polynomial time algorithm to solve the <i>k</i>-th Roman domination problem on interval graphs for each fixed integer <span>(k&gt;1)</span>.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"224 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2024-10-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142379283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient branch-and-bound algorithms for finding triangle-constrained 2-clubs 寻找三角形受限 2-club 的高效分支和约束算法
IF 1 4区 数学 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2024-09-21 DOI: 10.1007/s10878-024-01204-z
Niels Grüttemeier, Philipp Heinrich Keßler, Christian Komusiewicz, Frank Sommer

In the Vertex Triangle 2-Club problem, we are given an undirected graph G and aim to find a maximum-vertex subgraph of G that has diameter at most 2 and in which every vertex is contained in at least (ell ) triangles in the subgraph. So far, the only algorithm for solving Vertex Triangle 2-Club relies on an ILP formulation (Almeida and Brás in Comput Oper Res 111:258–270, 2019). In this work, we develop a combinatorial branch-and-bound algorithm that, coupled with a set of data reduction rules, outperforms the existing implementation and is able to find optimal solutions on sparse real-world graphs with more than 100,000 vertices in a few minutes. We also extend our algorithm to the Edge Triangle 2-Club problem where the triangle constraint is imposed on all edges of the subgraph.

在顶点三角形 2-Club 问题中,我们给定了一个无向图 G,目的是找到 G 的最大顶点子图,该子图的直径最多为 2,其中每个顶点至少包含在子图中的(ell )个三角形中。迄今为止,解决顶点三角形 2-Club 的唯一算法依赖于 ILP 表述(Almeida 和 Brás 发表于 Comput Oper Res 111:258-270, 2019)。在这项工作中,我们开发了一种组合式分支与边界算法,该算法与一组数据缩减规则相结合,性能优于现有实现,能够在几分钟内找到具有 10 万多个顶点的稀疏真实世界图的最优解。我们还将算法扩展到边缘三角形 2-Club 问题,在该问题中,子图的所有边缘都施加了三角形约束。
{"title":"Efficient branch-and-bound algorithms for finding triangle-constrained 2-clubs","authors":"Niels Grüttemeier, Philipp Heinrich Keßler, Christian Komusiewicz, Frank Sommer","doi":"10.1007/s10878-024-01204-z","DOIUrl":"https://doi.org/10.1007/s10878-024-01204-z","url":null,"abstract":"<p>In the <span>Vertex Triangle 2-Club</span> problem, we are given an undirected graph <i>G</i> and aim to find a maximum-vertex subgraph of <i>G</i> that has diameter at most 2 and in which every vertex is contained in at least <span>(ell )</span> triangles in the subgraph. So far, the only algorithm for solving <span>Vertex Triangle 2-Club</span> relies on an ILP formulation (Almeida and Brás in Comput Oper Res 111:258–270, 2019). In this work, we develop a combinatorial branch-and-bound algorithm that, coupled with a set of data reduction rules, outperforms the existing implementation and is able to find optimal solutions on sparse real-world graphs with more than 100,000 vertices in a few minutes. We also extend our algorithm to the <span>Edge Triangle 2-Club</span> problem where the triangle constraint is imposed on all edges of the subgraph.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"70 2 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2024-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142276008","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Minmax regret 1-sink location problems on dynamic flow path networks with parametric weights 带参数权重的动态流路网络上的最小遗憾 1 汇定位问题
IF 1 4区 数学 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2024-08-26 DOI: 10.1007/s10878-024-01199-7
Tetsuya Fujie, Yuya Higashikawa, Naoki Katoh, Junichi Teruyama, Yuki Tokuni

This paper addresses the minmax regret 1-sink location problem on a dynamic flow path network with parametric weights. A dynamic flow path network consists of an undirected path with positive edge lengths, positive edge capacities, and nonnegative vertex weights. A path can be considered as a road, an edge length as the distance along the road, and a vertex weight as the number of people at the site. An edge capacity limits the number of people that can enter the edge per unit time. We consider the problem of locating a sink where all the people evacuate quickly. In our model, each weight is represented by a linear function of a common parameter t, and the decision maker who determines the sink location does not know the value of t. We formulate the problem under such uncertainty as the minmax regret problem. Given t and sink location x, the cost is the sum of arrival times at x for all the people determined by t. The regret for x under t is the gap between this cost and the optimal cost under t. The problem is to find the sink location minimizing the maximum regret over all t. For the problem, we propose an (O(n^4 2^{alpha (n)} alpha (n)^2 log n)) time algorithm, where n is the number of vertices in the network and (alpha (cdot )) is the inverse Ackermann function. Also, for the special case in which every edge has the same capacity, we show that the complexity can be reduced to (O(n^3 2^{alpha (n)} alpha (n) log n)).

本文解决的是具有参数权重的动态流动路径网络上的最小遗憾单汇定位问题。动态流动路径网络由具有正边长、正边容量和非负顶点权重的无向路径组成。路径可视为一条道路,边长可视为沿路的距离,顶点权重可视为该地点的人数。边的容量限制了单位时间内能进入边的人数。我们考虑的问题是找到一个汇集点,让所有的人都能快速撤离。在我们的模型中,每个权重都由一个共同参数 t 的线性函数来表示,而决定水槽位置的决策者并不知道 t 的值。给定 t 和水槽位置 x,成本是由 t 决定的所有人员到达 x 的时间之和。x 在 t 条件下的遗憾是该成本与 t 条件下最优成本之间的差距。对于这个问题,我们提出了一种耗时(O(n^4 2^{alpha (n)} alpha (n)^2 log n)的算法,其中 n 是网络中的顶点数,(alpha (cdot ))是反阿克曼函数。另外,对于每条边都有相同容量的特殊情况,我们证明复杂度可以降低到 (O(n^3 2^{alpha (n)} alpha (n) log n))。
{"title":"Minmax regret 1-sink location problems on dynamic flow path networks with parametric weights","authors":"Tetsuya Fujie, Yuya Higashikawa, Naoki Katoh, Junichi Teruyama, Yuki Tokuni","doi":"10.1007/s10878-024-01199-7","DOIUrl":"https://doi.org/10.1007/s10878-024-01199-7","url":null,"abstract":"<p>This paper addresses the minmax regret 1-sink location problem on a dynamic flow path network with parametric weights. A <i>dynamic flow path network</i> consists of an undirected path with positive edge lengths, positive edge capacities, and nonnegative vertex weights. A path can be considered as a road, an edge length as the distance along the road, and a vertex weight as the number of people at the site. An edge capacity limits the number of people that can enter the edge per unit time. We consider the problem of locating a <i>sink</i> where all the people evacuate quickly. In our model, each weight is represented by a linear function of a common parameter <i>t</i>, and the decision maker who determines the sink location does not know the value of <i>t</i>. We formulate the problem under such uncertainty as the <i>minmax regret problem</i>. Given <i>t</i> and sink location <i>x</i>, the cost is the sum of arrival times at <i>x</i> for all the people determined by <i>t</i>. The regret for <i>x</i> under <i>t</i> is the gap between this cost and the optimal cost under <i>t</i>. The problem is to find the sink location minimizing the maximum regret over all <i>t</i>. For the problem, we propose an <span>(O(n^4 2^{alpha (n)} alpha (n)^2 log n))</span> time algorithm, where <i>n</i> is the number of vertices in the network and <span>(alpha (cdot ))</span> is the inverse Ackermann function. Also, for the special case in which every edge has the same capacity, we show that the complexity can be reduced to <span>(O(n^3 2^{alpha (n)} alpha (n) log n))</span>.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"12 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142084848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient estimation of the modified Gromov–Hausdorff distance between unweighted graphs 非加权图之间修正的格罗莫夫-豪斯多夫距离的有效估算
IF 1 4区 数学 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2024-08-23 DOI: 10.1007/s10878-024-01202-1
Vladyslav Oles, Nathan Lemons, Alexander Panchenko

Gromov–Hausdorff distances measure shape difference between the objects representable as compact metric spaces, e.g. point clouds, manifolds, or graphs. Computing any Gromov–Hausdorff distance is equivalent to solving an NP-hard optimization problem, deeming the notion impractical for applications. In this paper we propose a polynomial algorithm for estimating the so-called modified Gromov–Hausdorff (mGH) distance, a relaxation of the standard Gromov–Hausdorff (GH) distance with similar topological properties. We implement the algorithm for the case of compact metric spaces induced by unweighted graphs as part of Python library scikit-tda, and demonstrate its performance on real-world and synthetic networks. The algorithm finds the mGH distances exactly on most graphs with the scale-free property. We use the computed mGH distances to successfully detect outliers in real-world social and computer networks.

格罗莫夫-豪斯多夫距离测量可表示为紧凑度量空间(如点云、流形或图形)的对象之间的形状差异。计算任何 Gromov-Hausdorff 距离都等同于解决一个 NP 难优化问题,因此这一概念在应用中并不实用。在本文中,我们提出了一种多项式算法,用于估算所谓的修正格罗莫夫-豪斯多夫(mGH)距离,它是标准格罗莫夫-豪斯多夫(GH)距离的一种松弛,具有类似的拓扑特性。作为 Python 库 scikit-tda 的一部分,我们针对无权重图引起的紧凑度量空间实现了该算法,并在真实世界和合成网络上演示了其性能。该算法能在大多数具有无标度特性的图上精确找到 mGH 距离。我们利用计算出的 mGH 距离成功地检测了现实世界社交和计算机网络中的异常值。
{"title":"Efficient estimation of the modified Gromov–Hausdorff distance between unweighted graphs","authors":"Vladyslav Oles, Nathan Lemons, Alexander Panchenko","doi":"10.1007/s10878-024-01202-1","DOIUrl":"https://doi.org/10.1007/s10878-024-01202-1","url":null,"abstract":"<p>Gromov–Hausdorff distances measure shape difference between the objects representable as compact metric spaces, e.g. point clouds, manifolds, or graphs. Computing any Gromov–Hausdorff distance is equivalent to solving an NP-hard optimization problem, deeming the notion impractical for applications. In this paper we propose a polynomial algorithm for estimating the so-called modified Gromov–Hausdorff (mGH) distance, a relaxation of the standard Gromov–Hausdorff (GH) distance with similar topological properties. We implement the algorithm for the case of compact metric spaces induced by unweighted graphs as part of Python library <span>scikit-tda</span>, and demonstrate its performance on real-world and synthetic networks. The algorithm finds the mGH distances exactly on most graphs with the scale-free property. We use the computed mGH distances to successfully detect outliers in real-world social and computer networks.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"50 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2024-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142045389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Meta-heuristic-based hybrid deep learning model for vulnerability detection and prevention in software system 基于元启发式的混合深度学习模型用于软件系统的漏洞检测和预防
IF 1 4区 数学 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2024-08-20 DOI: 10.1007/s10878-024-01185-z
Lijin Shaji, R. Suji Pramila

Software vulnerabilities are flaws that may be exploited to cause loss or harm. Various automated machine-learning techniques have been developed in preceding studies to detect software vulnerabilities. This work tries to develop a technique for securing the software on the basis of their vulnerabilities that are already known, by developing a hybrid deep learning model to detect those vulnerabilities. Moreover, certain countermeasures are suggested based on the types of vulnerability to prevent the attack further. For different software projects taken as the dataset, feature fusion is done by utilizing canonical correlation analysis together with Deep Residual Network (DRN). A hybrid deep learning technique trained using AdamW-Rat Swarm Optimizer (AdamW-RSO) is designed to detect software vulnerability. Hybrid deep learning makes use of the Deep Belief Network (DBN) and Generative Adversarial Network (GAN). For every vulnerability, its location of occurrence within the software development procedures and techniques of alleviation via implementation level or design level activities are described. Thus, it helps in understanding the appearance of vulnerabilities, suggesting the use of various countermeasures during the initial phases of software design, and therefore, assures software security. Evaluating the performance of vulnerability detection by the proposed technique regarding recall, precision, and f-measure, it is found to be more effective than the existing methods.

软件漏洞是指可能被利用造成损失或伤害的缺陷。在之前的研究中,已经开发了各种自动化机器学习技术来检测软件漏洞。这项工作试图通过开发一种混合深度学习模型来检测这些漏洞,从而在已知漏洞的基础上开发一种确保软件安全的技术。此外,还根据漏洞类型提出了一些对策,以进一步防止攻击。对于作为数据集的不同软件项目,利用典型相关分析和深度残差网络(DRN)进行特征融合。使用 AdamW-Rat Swarm Optimizer(AdamW-RSO)训练的混合深度学习技术旨在检测软件漏洞。混合深度学习利用了深度信念网络(DBN)和生成对抗网络(GAN)。对于每个漏洞,都会描述其在软件开发程序中出现的位置,以及通过实施级或设计级活动来缓解的技术。因此,它有助于了解漏洞的出现,建议在软件设计的初始阶段使用各种对策,从而确保软件的安全性。通过评估拟议技术在召回率、精确度和 f-measure 方面的漏洞检测性能,发现它比现有方法更有效。
{"title":"Meta-heuristic-based hybrid deep learning model for vulnerability detection and prevention in software system","authors":"Lijin Shaji, R. Suji Pramila","doi":"10.1007/s10878-024-01185-z","DOIUrl":"https://doi.org/10.1007/s10878-024-01185-z","url":null,"abstract":"<p>Software vulnerabilities are flaws that may be exploited to cause loss or harm. Various automated machine-learning techniques have been developed in preceding studies to detect software vulnerabilities. This work tries to develop a technique for securing the software on the basis of their vulnerabilities that are already known, by developing a hybrid deep learning model to detect those vulnerabilities. Moreover, certain countermeasures are suggested based on the types of vulnerability to prevent the attack further. For different software projects taken as the dataset, feature fusion is done by utilizing canonical correlation analysis together with Deep Residual Network (DRN). A hybrid deep learning technique trained using AdamW-Rat Swarm Optimizer (AdamW-RSO) is designed to detect software vulnerability. Hybrid deep learning makes use of the Deep Belief Network (DBN) and Generative Adversarial Network (GAN). For every vulnerability, its location of occurrence within the software development procedures and techniques of alleviation via implementation level or design level activities are described. Thus, it helps in understanding the appearance of vulnerabilities, suggesting the use of various countermeasures during the initial phases of software design, and therefore, assures software security. Evaluating the performance of vulnerability detection by the proposed technique regarding recall, precision, and f-measure, it is found to be more effective than the existing methods.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"10 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2024-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142013797","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The prize-collecting single machine scheduling with bounds and penalties 有约束和惩罚的单机有奖调度
IF 1 4区 数学 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2024-08-16 DOI: 10.1007/s10878-024-01203-0
Guojun Hu, Pengxiang Pan, Suding Liu, Ping Yang, Runtao Xie

This study investigates the prize-collecting single machine scheduling with bounds and penalties (PC-SMS-BP). In this problem, a set of n jobs and a single machine are considered, where each job (J_j) has a processing time (p_{j}), a profit (pi _{j}) and a rejection penalty (w_{j}). The upper bound on the processing number is U. The objective of this study is to find a feasible schedule that minimizes the makespan of the accepted jobs and the total rejection penalty of the rejected jobs under the condition that the number of the accepted jobs does not exceed a given threshold U while the total profit of the accepted jobs does not fall below a specified profit bound (varPi ). We first demonstrate that this problem is NP-hard. Then, a pseudo-polynomial time dynamic programming algorithm and a fully polynomial time approximation scheme (FPTAS) are proposed. Finally, numerical experiments are conducted to compare the effectiveness of the two proposed algorithms.

本研究探讨了带约束和惩罚的单机有奖调度(PC-SMS-BP)。在这个问题中,考虑了一组 n 个作业和一台单机,其中每个作业 (J_j) 有一个处理时间 (p_{j})、一个利润 (pi_{j})和一个拒绝惩罚 (w_{j})。本研究的目标是找到一个可行的时间表,在接受的作业数量不超过给定阈值 U,同时接受作业的总利润不低于指定利润阈值 (varPi )的条件下,使接受作业的工作时间和拒绝作业的总拒绝惩罚最小化。我们首先证明这个问题是 NP 难的。然后,我们提出了一种伪多项式时间动态编程算法和一种全多项式时间近似方案(FPTAS)。最后,我们通过数值实验比较了两种算法的有效性。
{"title":"The prize-collecting single machine scheduling with bounds and penalties","authors":"Guojun Hu, Pengxiang Pan, Suding Liu, Ping Yang, Runtao Xie","doi":"10.1007/s10878-024-01203-0","DOIUrl":"https://doi.org/10.1007/s10878-024-01203-0","url":null,"abstract":"<p>This study investigates the prize-collecting single machine scheduling with bounds and penalties (PC-SMS-BP). In this problem, a set of <i>n</i> jobs and a single machine are considered, where each job <span>(J_j)</span> has a processing time <span>(p_{j})</span>, a profit <span>(pi _{j})</span> and a rejection penalty <span>(w_{j})</span>. The upper bound on the processing number is <i>U</i>. The objective of this study is to find a feasible schedule that minimizes the makespan of the accepted jobs and the total rejection penalty of the rejected jobs under the condition that the number of the accepted jobs does not exceed a given threshold <i>U</i> while the total profit of the accepted jobs does not fall below a specified profit bound <span>(varPi )</span>. We first demonstrate that this problem is <i>NP</i>-hard. Then, a pseudo-polynomial time dynamic programming algorithm and a fully polynomial time approximation scheme (FPTAS) are proposed. Finally, numerical experiments are conducted to compare the effectiveness of the two proposed algorithms.\u0000</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"25 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2024-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141994521","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the complexity of minimum maximal acyclic matchings 论最小最大非循环匹配的复杂性
IF 1 4区 数学 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2024-08-07 DOI: 10.1007/s10878-024-01200-3
Juhi Chaudhary, Sounaka Mishra, B. S. Panda

Low-Acy-Matching asks to find a maximal matching M in a given graph G of minimum cardinality such that the set of M-saturated vertices induces an acyclic subgraph in G. The decision version of Low-Acy-Matching is known to be ({textsf{NP}})-complete. In this paper, we strengthen this result by proving that the decision version of Low-Acy-Matching remains ({textsf{NP}})-complete for bipartite graphs with maximum degree 6 and planar perfect elimination bipartite graphs. We also show the hardness difference between Low-Acy-Matching and Max-Acy-Matching. Furthermore, we prove that, even for bipartite graphs, Low-Acy-Matching cannot be approximated within a ratio of (n^{1-epsilon }) for any (epsilon >0) unless ({textsf{P}}={textsf{NP}}). Finally, we establish that Low-Acy-Matching exhibits (textsf{APX})-hardness when restricted to 4-regular graphs.

Low-Acy-Matching要求在给定图G中找到一个最大匹配M,该匹配M的最小卡数使得M饱和顶点集在G中诱导出一个无环子图。已知Low-Acy-Matching的决策版本是({textsf{NP}})-完全的。在本文中,我们通过证明对于最大阶数为 6 的双峰图和平面完全消元双峰图,Low-Acy-Matching 的决策版本仍然是 ({textsf{NP}}) -complete 的,从而加强了这一结果。我们还展示了 Low-Acy-Matching 和 Max-Acy-Matching 之间的难度差异。此外,我们还证明了,即使对于双峰图,对于任意 (epsilon >0),Low-Acy-Matching 也不能在 (n^{1-epsilon }) 的比率内被近似,除非 ({textsf{P}}={textsf{NP}}).最后,我们证明了当限制在 4-regular graphs 时,Low-Acy-Matching 展示了 (textsf{APX})-hardness。
{"title":"On the complexity of minimum maximal acyclic matchings","authors":"Juhi Chaudhary, Sounaka Mishra, B. S. Panda","doi":"10.1007/s10878-024-01200-3","DOIUrl":"https://doi.org/10.1007/s10878-024-01200-3","url":null,"abstract":"<p><span>Low-Acy-Matching</span> asks to find a maximal matching <i>M</i> in a given graph <i>G</i> of minimum cardinality such that the set of <i>M</i>-saturated vertices induces an acyclic subgraph in <i>G</i>. The decision version of <span>Low-Acy-Matching</span> is known to be <span>({textsf{NP}})</span>-complete. In this paper, we strengthen this result by proving that the decision version of <span>Low-Acy-Matching</span> remains <span>({textsf{NP}})</span>-complete for bipartite graphs with maximum degree 6 and planar perfect elimination bipartite graphs. We also show the hardness difference between <span>Low-Acy-Matching</span> and <span>Max-Acy-Matching</span>. Furthermore, we prove that, even for bipartite graphs, <span>Low-Acy-Matching</span> cannot be approximated within a ratio of <span>(n^{1-epsilon })</span> for any <span>(epsilon &gt;0)</span> unless <span>({textsf{P}}={textsf{NP}})</span>. Finally, we establish that <span>Low-Acy-Matching</span> exhibits <span>(textsf{APX})</span>-hardness when restricted to 4-regular graphs.\u0000</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"190 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2024-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141899467","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Polynomial algorithms for sparse spanners on subcubic graphs 亚立方图上稀疏跨度的多项式算法
IF 1 4区 数学 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2024-08-07 DOI: 10.1007/s10878-024-01197-9
R. Gómez, F. K. Miyazawa, Y. Wakababayashi

Let G be a connected graph and (t ge 1) a (rational) constant. A t-spanner of G is a spanning subgraph of G in which the distance between any pair of vertices is at most t times its distance in G. We address two problems on spanners. The first one, known as the minimum t-spanner problem (MinS (_t)), seeks in a connected graph a t-spanner with the smallest possible number of edges. In the second one, called minimum cost tree t-spanner problem (MCTS (_t)), the input graph has costs assigned to its edges and seeks a t-spanner that is a tree with minimum cost. It is an optimization version of the tree t-spanner problem (TreeS (_t)), a decision problem concerning the existence of a t-spanner that is a tree. MinS (_t) is known to be ({textsc {NP}})-hard for every (t ge 2). On the other hand, TreeS (_t) admits a polynomial-time algorithm for (t le 2) and is ({textsc {NP}})-complete for (t ge 4); but its complexity for (t=3) remains open. We focus on the class of subcubic graphs. First, we show that for such graphs MinS (_3) can be solved in polynomial time. These results yield a practical polynomial algorithm for TreeS (_3) that is of a combinatorial nature. We also show that MCTS (_2) can be solved in polynomial time. To obtain this last result, we prove a complete linear characterization of the polytope defined by the incidence vectors of the tree 2-spanners of a subcubic graph. A recent result showing that MinS (_3) on graphs with maximum degree at most 5 is NP-hard, together with the current result on subcubic graphs, leaves open only the complexity of MinS (_3) on graphs with maximum degree 4.

让 G 是一个连通图,(t)是一个(有理)常数。G 的一个 t 跨子图是 G 的一个跨子图,其中任意一对顶点之间的距离最多是它在 G 中距离的 t 倍。第一个问题被称为最小跨度问题(MinS (_t)),它在一个连通图中寻找一个边数尽可能少的跨度。第二个问题被称为最小成本树 t-spanner 问题(MCTS (_t)),输入图的边都有成本,寻求的 t-spanner 是成本最小的树。它是树 t-spanner 问题(TreeS (_t))的优化版本,是一个关于是否存在树 t-spanner 的决策问题。众所周知,MinS (_t )对于每一个 t (ge 2 )来说都是({textsc {NP}})困难的。另一方面,TreeS (_t)对于 (t le 2) 允许一个多项式时间算法,并且对于 (t ge 4) 是 ({textsc {NP}})-complete 的;但是它对于 (t=3) 的复杂性仍然是未知的。我们将重点放在亚立方图类上。首先,我们证明对于这类图,MinS (_3)可以在多项式时间内求解。这些结果为 TreeS (_3)提供了一种具有组合性质的实用多项式算法。我们还证明了 MCTS (_2)可以在多项式时间内求解。为了得到最后一个结果,我们证明了由亚立方体图的树 2-spanners 的入射向量定义的多面体的完整线性特征。最近的一个结果表明,在最大度最多为 5 的图上 MinS (_3) 是 NP 难的,加上目前关于亚立方图的结果,只剩下最大度为 4 的图上 MinS (_3) 的复杂性还没有解决。
{"title":"Polynomial algorithms for sparse spanners on subcubic graphs","authors":"R. Gómez, F. K. Miyazawa, Y. Wakababayashi","doi":"10.1007/s10878-024-01197-9","DOIUrl":"https://doi.org/10.1007/s10878-024-01197-9","url":null,"abstract":"<p>Let <i>G</i> be a connected graph and <span>(t ge 1)</span> a (rational) constant. A <i>t</i>-<i>spanner</i> of <i>G</i> is a spanning subgraph of <i>G</i> in which the distance between any pair of vertices is at most <i>t</i> times its distance in <i>G</i>. We address two problems on spanners. The first one, known as the <i>minimum</i> <i>t</i>-<i>spanner problem</i> (<span>MinS</span> <span>(_t)</span>), seeks in a connected graph a <i>t</i>-spanner with the smallest possible number of edges. In the second one, called <i>minimum cost tree</i> <i>t</i>-<i>spanner problem</i> (<span>MCTS</span> <span>(_t)</span>), the input graph has costs assigned to its edges and seeks a <i>t</i>-spanner that is a tree with minimum cost. It is an optimization version of the <i>tree</i> <i>t</i>-<i>spanner problem</i> (<span>TreeS</span> <span>(_t)</span>), a decision problem concerning the existence of a <i>t</i>-spanner that is a tree. <span>MinS</span> <span>(_t)</span> is known to be <span>({textsc {NP}})</span>-hard for every <span>(t ge 2)</span>. On the other hand, <span>TreeS</span> <span>(_t)</span> admits a polynomial-time algorithm for <span>(t le 2)</span> and is <span>({textsc {NP}})</span>-complete for <span>(t ge 4)</span>; but its complexity for <span>(t=3)</span> remains open. We focus on the class of subcubic graphs. First, we show that for such graphs <span>MinS</span> <span>(_3)</span> can be solved in polynomial time. These results yield a practical polynomial algorithm for <span>TreeS</span> <span>(_3)</span> that is of a combinatorial nature. We also show that <span>MCTS</span> <span>(_2)</span> can be solved in polynomial time. To obtain this last result, we prove a complete linear characterization of the polytope defined by the incidence vectors of the tree 2-spanners of a subcubic graph. A recent result showing that <span>MinS</span> <span>(_3)</span> on graphs with maximum degree at most 5 is NP-hard, together with the current result on subcubic graphs, leaves open only the complexity of <span>MinS</span> <span>(_3)</span> on graphs with maximum degree 4.\u0000</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"299 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2024-08-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141899478","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Combinatorial Optimization
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1