首页 > 最新文献

Journal of Combinatorial Optimization最新文献

英文 中文
Improved approximation algorithms for multiprocessor indivisible coflow scheduling 多处理机不可分共流调度的改进逼近算法
IF 1 4区 数学 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-25 DOI: 10.1007/s10878-025-01325-z
Mingyang Gong, Guangting Chen, Guohui Lin, Bing Su

Coflow scheduling is a challenging optimization problem that underlies many data transmission and parallel computing applications. In this paper, we study the indivisible coflow scheduling problem on parallel identical machines with the objective to minimize the makespan, i.e., the completion time of the last flow. In our problem setting, the number of the input/output ports in each machine is a fixed constant, each port has a unit capacity, and all the flows inside a coflow should be scheduled on the same machine. We present a ((2 + epsilon ))-approximation algorithm for the problem, for any (epsilon > 0), in which the number of machines can be either a fixed constant or part of the input.

协同流调度是一个具有挑战性的优化问题,是许多数据传输和并行计算应用的基础。本文研究了并行相同机器上的不可分共流调度问题,其目标是最小化最大完工时间,即最后一个流程的完成时间。在我们的问题设置中,每台机器的输入/输出端口的数量是一个固定的常数,每个端口都有一个单位容量,并且coflow中的所有流都应该安排在同一台机器上。对于任意(epsilon > 0),我们提出了一个((2 + epsilon )) -近似算法,其中机器数量可以是固定常数或输入的一部分。
{"title":"Improved approximation algorithms for multiprocessor indivisible coflow scheduling","authors":"Mingyang Gong, Guangting Chen, Guohui Lin, Bing Su","doi":"10.1007/s10878-025-01325-z","DOIUrl":"https://doi.org/10.1007/s10878-025-01325-z","url":null,"abstract":"<p>Coflow scheduling is a challenging optimization problem that underlies many data transmission and parallel computing applications. In this paper, we study the <i>indivisible</i> coflow scheduling problem on parallel identical machines with the objective to minimize the makespan, i.e., the completion time of the last flow. In our problem setting, the number of the input/output ports in each machine is a fixed constant, each port has a unit capacity, and all the flows inside a coflow should be scheduled on the same machine. We present a <span>((2 + epsilon ))</span>-approximation algorithm for the problem, for any <span>(epsilon &gt; 0)</span>, in which the number of machines can be either a fixed constant or part of the input.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"133 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144137113","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
ZeSAI: AI vigilant malware detection in email security with zero shot-based hybrid network and threat intelligence integration ZeSAI:基于零射击混合网络和威胁情报集成的电子邮件安全AI警惕恶意软件检测
IF 1 4区 数学 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-25 DOI: 10.1007/s10878-025-01306-2
Venkadeshan Ramalingam, R. Gopal, Syed Ziaur Rahman, R. Senthil

In this ever-evolving world of threats, e-mail security is becoming one of the biggest concerns because attackers are constantly searching for new techniques to bypass the existing security measures. Emails containing phishing, malware and other security threats have become far more common place, which is why there is a need to implement new and more efficient adaptive threat detection frameworks. Typically, email security products are outdated within these emerging threats hence the need to evolve into something more effective and smarter in the detection systems. In this regard, Zero Short learning based Artificial Intelligence (ZeSAI)-model is proposed as a new approach to improve threat identification in the context of email security. Initially, to ensure generalization and robust performance, the model uses three broad sets of input data: augmented data based on Context-Preserving Synthetic Email Generation (CPSEG) method and adversarial data, both generated from six datasets and Threat Intelligence feeds offering real-time updates. The proposed ZeSAI model enhances email threat detection through a structured workflow: eXtreme Language Network (XLNet) first generates bidirectional contextual embeddings from email content, capturing nuanced semantic relationships. The Recurrent GRU Network (RGN) then analyses temporal patterns in the email data, identifying complex relationships and variations over time. These RGN-extracted features are integrated with XLNet-generated semantic embeddings in the Cross-Modal Fusion Layer. Finally, Zero-Shot Learning (ZSL) utilizes these combined semantic descriptions and contextual insights to identify new threats based on their similarities to known threats, enabling robust and adaptive threat detection. The proposed approach yields good accuracy and other performance measures; precision, recall, and F1-score; under fivefold and tenfold cross-validation. An ablation study is also carried out to pinpoint the contribution of each module. Specifically, ZeSAI has accuracy of 98.51% in Business Email Compromise (BEC) threat detection, 96.8% in spam detection, 99.18% in phishing detection, 97.2% in malware attachment detection and 98.58% in detecting insider threats.

在这个威胁不断发展的世界里,电子邮件安全正成为最大的问题之一,因为攻击者不断寻找新的技术来绕过现有的安全措施。包含网络钓鱼、恶意软件和其他安全威胁的电子邮件已经变得越来越普遍,这就是为什么需要实施新的、更有效的自适应威胁检测框架。通常,电子邮件安全产品在这些新出现的威胁中已经过时,因此需要在检测系统中发展成更有效和更智能的东西。为此,本文提出了基于零短学习的人工智能(ZeSAI)模型,作为提高电子邮件安全背景下威胁识别的新方法。最初,为了确保泛化和鲁棒性,该模型使用三种广泛的输入数据集:基于上下文保留合成电子邮件生成(CPSEG)方法的增强数据和对抗数据,这两种数据集都是从六个数据集和提供实时更新的威胁情报馈电中生成的。提出的ZeSAI模型通过结构化工作流增强了电子邮件威胁检测:极限语言网络(XLNet)首先从电子邮件内容中生成双向上下文嵌入,捕获细微的语义关系。然后,循环GRU网络(RGN)分析电子邮件数据中的时间模式,识别复杂的关系和随时间的变化。这些rgn提取的特征与跨模态融合层中xlnet生成的语义嵌入集成在一起。最后,零射击学习(Zero-Shot Learning, ZSL)利用这些组合的语义描述和上下文洞察力,根据新威胁与已知威胁的相似性来识别新威胁,从而实现鲁棒性和自适应威胁检测。提出的方法产生了良好的准确性和其他性能指标;准确率、召回率和f1分;在五倍和十倍交叉验证下。还进行了烧蚀研究,以确定每个模块的贡献。其中,商务邮件泄露(BEC)威胁检测准确率为98.51%,垃圾邮件检测准确率为96.8%,网络钓鱼检测准确率为99.18%,恶意软件附件检测准确率为97.2%,内部威胁检测准确率为98.58%。
{"title":"ZeSAI: AI vigilant malware detection in email security with zero shot-based hybrid network and threat intelligence integration","authors":"Venkadeshan Ramalingam, R. Gopal, Syed Ziaur Rahman, R. Senthil","doi":"10.1007/s10878-025-01306-2","DOIUrl":"https://doi.org/10.1007/s10878-025-01306-2","url":null,"abstract":"<p>In this ever-evolving world of threats, e-mail security is becoming one of the biggest concerns because attackers are constantly searching for new techniques to bypass the existing security measures. Emails containing phishing, malware and other security threats have become far more common place, which is why there is a need to implement new and more efficient adaptive threat detection frameworks. Typically, email security products are outdated within these emerging threats hence the need to evolve into something more effective and smarter in the detection systems. In this regard, Zero Short learning based Artificial Intelligence (ZeSAI)-model is proposed as a new approach to improve threat identification in the context of email security. Initially, to ensure generalization and robust performance, the model uses three broad sets of input data: augmented data based on Context-Preserving Synthetic Email Generation (CPSEG) method and adversarial data, both generated from six datasets and Threat Intelligence feeds offering real-time updates. The proposed ZeSAI model enhances email threat detection through a structured workflow: eXtreme Language Network (XLNet) first generates bidirectional contextual embeddings from email content, capturing nuanced semantic relationships. The Recurrent GRU Network (RGN) then analyses temporal patterns in the email data, identifying complex relationships and variations over time. These RGN-extracted features are integrated with XLNet-generated semantic embeddings in the Cross-Modal Fusion Layer. Finally, Zero-Shot Learning (ZSL) utilizes these combined semantic descriptions and contextual insights to identify new threats based on their similarities to known threats, enabling robust and adaptive threat detection. The proposed approach yields good accuracy and other performance measures; precision, recall, and F1-score; under fivefold and tenfold cross-validation. An ablation study is also carried out to pinpoint the contribution of each module. Specifically, ZeSAI has accuracy of 98.51% in Business Email Compromise (BEC) threat detection, 96.8% in spam detection, 99.18% in phishing detection, 97.2% in malware attachment detection and 98.58% in detecting insider threats.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"47 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144137117","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The influence of carbon sink trading on carbon emission reduction in agricultural supply chains 碳汇交易对农业供应链碳减排的影响
IF 1 4区 数学 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-25 DOI: 10.1007/s10878-025-01316-0
Tingting Meng, Yukun Cheng, Xujin Pu, Rui Li

As global climate change intensifies, the agricultural sector, responsible for over 30% of global greenhouse gas emissions, faces an urgent imperative to mitigate emissions and align with international climate commitments. Carbon sink trading, a market-based mechanism that incentivizes emission reductions through sequestration credits, has emerged as an important tool for accelerating carbon peaking and neutrality goals. This study investigates the influence of carbon sink trading on the strategic interactions between farmers and retailers in agricultural supply chains. Employing differential game theory, we construct three cooperative models: decentralized, Stackelberg leader-follower, and centralized, and derive equilibrium strategies for each using the Hamilton-Jacobi-Bellman framework. Through numerical simulations, we evaluate the influence of carbon sink trading on the emission reduction efforts of farmers and retailers, the extent of emission reductions in the supply chain, and the overall profits. Comparative analysis against baseline scenarios without carbon trading reveals that the integration of carbon sink markets enhances profit margins across all models and improves the level of emission reduction in the agricultural supply chain. In addition, our results show that the centralized model outperforms other configurations, followed by the Stackelberg model, with the decentralized model exhibiting the least effectiveness. These findings provide actionable insights for policymakers and supply chain managers to design carbon trading frameworks that harmonize economic incentives with ecological sustainability.

随着全球气候变化加剧,占全球温室气体排放量30%以上的农业部门迫切需要减少排放,并与国际气候承诺保持一致。碳汇交易是一种以市场为基础的机制,通过封存信用额度激励减排,已成为加速实现碳峰值和中和目标的重要工具。本研究探讨碳汇交易对农业供应链中农户与零售商战略互动的影响。运用微分博弈论,构建了分散、Stackelberg领导-追随者和集中式三种合作模型,并利用Hamilton-Jacobi-Bellman框架推导了每种合作模型的均衡策略。通过数值模拟,我们评估了碳汇交易对农民和零售商减排努力、供应链减排程度和整体利润的影响。与没有碳交易的基线情景的比较分析表明,碳汇市场的整合提高了所有模式的利润率,并提高了农业供应链的减排水平。此外,我们的研究结果表明,集中式模型优于其他配置,其次是Stackelberg模型,分散模型的有效性最低。这些发现为决策者和供应链管理者设计协调经济激励与生态可持续性的碳交易框架提供了可行的见解。
{"title":"The influence of carbon sink trading on carbon emission reduction in agricultural supply chains","authors":"Tingting Meng, Yukun Cheng, Xujin Pu, Rui Li","doi":"10.1007/s10878-025-01316-0","DOIUrl":"https://doi.org/10.1007/s10878-025-01316-0","url":null,"abstract":"<p>As global climate change intensifies, the agricultural sector, responsible for over 30% of global greenhouse gas emissions, faces an urgent imperative to mitigate emissions and align with international climate commitments. Carbon sink trading, a market-based mechanism that incentivizes emission reductions through sequestration credits, has emerged as an important tool for accelerating carbon peaking and neutrality goals. This study investigates the influence of carbon sink trading on the strategic interactions between farmers and retailers in agricultural supply chains. Employing differential game theory, we construct three cooperative models: decentralized, Stackelberg leader-follower, and centralized, and derive equilibrium strategies for each using the Hamilton-Jacobi-Bellman framework. Through numerical simulations, we evaluate the influence of carbon sink trading on the emission reduction efforts of farmers and retailers, the extent of emission reductions in the supply chain, and the overall profits. Comparative analysis against baseline scenarios without carbon trading reveals that the integration of carbon sink markets enhances profit margins across all models and improves the level of emission reduction in the agricultural supply chain. In addition, our results show that the centralized model outperforms other configurations, followed by the Stackelberg model, with the decentralized model exhibiting the least effectiveness. These findings provide actionable insights for policymakers and supply chain managers to design carbon trading frameworks that harmonize economic incentives with ecological sustainability.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"40 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144137114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An exponential cone integer programming and piece-wise linear approximation approach for 0-1 fractional programming 0-1分式规划的指数锥整数规划及分段线性逼近方法
IF 1 4区 数学 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-25 DOI: 10.1007/s10878-025-01318-y
Hoang Giang Pham, Thuy Anh Ta, Tien Mai

We study a class of binary fractional programs commonly encountered in important application domains such as assortment optimization and facility location. These problems are known to be NP-hard to approximate within any constant factor, and existing solution approaches typically rely on mixed-integer linear programming or second-order cone programming reformulations. These methods often utilize linearization techniques (e.g., big-M or McCormick inequalities), which can result in weak continuous relaxations. In this work, we propose a novel approach based on an exponential cone reformulation combined with piecewise linear approximation. This allows the problem to be solved efficiently using standard cutting-plane or branch-and-cut procedures. We further provide a theoretical analysis of the approximation quality yielded by our reformulation and discuss strategies for optimizing the problem size of the exponential cone formulation. Experiments on instances of various sizes demonstrate that our approach delivers competitive performance on small and medium instances while offering superior performance on large instances compared to state-of-the-art baselines.

本文研究了一类在分类优化和设备定位等重要应用领域中经常遇到的二元分数型程序。众所周知,这些问题在任何常数因子内都是np困难的,现有的解决方法通常依赖于混合整数线性规划或二阶锥规划的重新表述。这些方法通常利用线性化技术(例如,大m或麦考密克不等式),这可能导致弱连续松弛。在这项工作中,我们提出了一种基于指数锥重构与分段线性近似相结合的新方法。这允许使用标准切割平面或分支切割程序有效地解决问题。我们进一步从理论上分析了我们的重构所产生的近似质量,并讨论了优化指数锥公式的问题大小的策略。在各种规模的实例上进行的实验表明,我们的方法在中小型实例上提供了具有竞争力的性能,同时在大型实例上提供了优于最先进基线的性能。
{"title":"An exponential cone integer programming and piece-wise linear approximation approach for 0-1 fractional programming","authors":"Hoang Giang Pham, Thuy Anh Ta, Tien Mai","doi":"10.1007/s10878-025-01318-y","DOIUrl":"https://doi.org/10.1007/s10878-025-01318-y","url":null,"abstract":"<p>We study a class of binary fractional programs commonly encountered in important application domains such as assortment optimization and facility location. These problems are known to be NP-hard to approximate within any constant factor, and existing solution approaches typically rely on mixed-integer linear programming or second-order cone programming reformulations. These methods often utilize linearization techniques (e.g., big-M or McCormick inequalities), which can result in weak continuous relaxations. In this work, we propose a novel approach based on an exponential cone reformulation combined with piecewise linear approximation. This allows the problem to be solved efficiently using standard cutting-plane or branch-and-cut procedures. We further provide a theoretical analysis of the approximation quality yielded by our reformulation and discuss strategies for optimizing the problem size of the exponential cone formulation. Experiments on instances of various sizes demonstrate that our approach delivers competitive performance on small and medium instances while offering superior performance on large instances compared to state-of-the-art baselines.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"19 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144137119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximation algorithms for the partition set cover problem with penalties 带惩罚的分区集覆盖问题的近似算法
IF 1 4区 数学 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-21 DOI: 10.1007/s10878-025-01317-z
Qi Wang, Bo Hou, Gengsheng Zhang, Yisheng Zhou, Wen Liu

In this paper, we consider the partition set cover problem with penalties. In this problem, we have a universe U, a partition (mathscr {P}={P_{1},ldots ,P_{r}}) of U, and a collection (mathscr {S}={S_{1},ldots ,S_{m}}) of nonempty subsets of U satisfying (bigcup _{S_iin mathscr {S}} S_i=U). In addition, each (P_t) ((tin [r])) is associated with a covering requirement (k_t) as well as a penalty (pi _t), and each (S_i) ((iin [m])) is associated with a cost. A class (P_t) attains its covering requirement by a subcollection (mathscr {A}) of (mathscr {S}) if at least (k_t) elements in (P_t) are contained in (bigcup _{S_iin mathscr {A}} S_i). Each (P_t) is either attaining its covering requirement or paid with its penalty. The objective is to find a subcollection (mathscr {A}) of (mathscr {S}) such that the sum of the cost of (mathscr {A}) and the penalties of classes not attaining covering requirements by (mathscr {A}) is minimized. We present two approximation algorithms for this problem. The first is based on the LP-rounding technique with approximation ratio (K+O(beta +ln r)), where (K=max _{tin [r]}k_t), and (beta ) denotes the approximation guarantee for a related set cover instance obtained by rounding the standard LP. The second is based on the primal-dual method with approximation ratio lf, where (f=max _{ein U}|{S_iin mathscr {S}mid ein S_i}|) and (l=max _{tin [r]}|P_t|).

本文考虑带有惩罚的划分集覆盖问题。在这个问题中,我们有一个全域U, U的一个分区(mathscr {P}={P_{1},ldots ,P_{r}}),以及U满足(bigcup _{S_iin mathscr {S}} S_i=U)的非空子集的集合(mathscr {S}={S_{1},ldots ,S_{m}})。此外,每个(P_t)((tin [r]))都与覆盖要求(k_t)和处罚(pi _t)相关联,每个(S_i)((iin [m]))都与成本相关联。如果(P_t)中的至少(k_t)个元素包含在(bigcup _{S_iin mathscr {A}} S_i)中,则类(P_t)通过(mathscr {S})的子集合(mathscr {A})实现其覆盖要求。每个(P_t)要么达到其覆盖要求,要么支付罚款。我们的目标是找到(mathscr {S})的子集合(mathscr {A}),使(mathscr {A})的成本和到(mathscr {A})时未满足要求的类的惩罚的总和最小化。针对这一问题,我们提出了两种近似算法。第一种是基于近似比为(K+O(beta +ln r))的LP舍入技术,其中(K=max _{tin [r]}k_t), (beta )表示通过对标准LP进行舍入得到的相关集覆盖实例的近似保证。第二种是基于近似比为lf的原对偶方法,其中(f=max _{ein U}|{S_iin mathscr {S}mid ein S_i}|)和(l=max _{tin [r]}|P_t|)。
{"title":"Approximation algorithms for the partition set cover problem with penalties","authors":"Qi Wang, Bo Hou, Gengsheng Zhang, Yisheng Zhou, Wen Liu","doi":"10.1007/s10878-025-01317-z","DOIUrl":"https://doi.org/10.1007/s10878-025-01317-z","url":null,"abstract":"<p>In this paper, we consider the partition set cover problem with penalties. In this problem, we have a universe <i>U</i>, a partition <span>(mathscr {P}={P_{1},ldots ,P_{r}})</span> of <i>U</i>, and a collection <span>(mathscr {S}={S_{1},ldots ,S_{m}})</span> of nonempty subsets of <i>U</i> satisfying <span>(bigcup _{S_iin mathscr {S}} S_i=U)</span>. In addition, each <span>(P_t)</span> <span>((tin [r]))</span> is associated with a covering requirement <span>(k_t)</span> as well as a penalty <span>(pi _t)</span>, and each <span>(S_i)</span> <span>((iin [m]))</span> is associated with a cost. A class <span>(P_t)</span> attains its covering requirement by a subcollection <span>(mathscr {A})</span> of <span>(mathscr {S})</span> if at least <span>(k_t)</span> elements in <span>(P_t)</span> are contained in <span>(bigcup _{S_iin mathscr {A}} S_i)</span>. Each <span>(P_t)</span> is either attaining its covering requirement or paid with its penalty. The objective is to find a subcollection <span>(mathscr {A})</span> of <span>(mathscr {S})</span> such that the sum of the cost of <span>(mathscr {A})</span> and the penalties of classes not attaining covering requirements by <span>(mathscr {A})</span> is minimized. We present two approximation algorithms for this problem. The first is based on the LP-rounding technique with approximation ratio <span>(K+O(beta +ln r))</span>, where <span>(K=max _{tin [r]}k_t)</span>, and <span>(beta )</span> denotes the approximation guarantee for a related set cover instance obtained by rounding the standard LP. The second is based on the primal-dual method with approximation ratio <i>lf</i>, where <span>(f=max _{ein U}|{S_iin mathscr {S}mid ein S_i}|)</span> and <span>(l=max _{tin [r]}|P_t|)</span>.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"32 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144114073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximating combinatorial contracts with a cardinality constraint 用基数约束逼近组合契约
IF 1 4区 数学 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-21 DOI: 10.1007/s10878-025-01307-1
Qinqin Gong, Ling Gai, Yanjun Jiang, Yang Lv, Ruiqi Yang

We explore the problem of combinatorial contract design, a subject introduced and studied by Dütting et al. (2023). Previous research has focused on the challenge of selecting an unconstrained subset of agents, particularly when the principal’s utility function exhibits XOS or submodular characteristics related to the subset of agents that exert effort. Our study extends this existing line of research by examining scenarios in which the principal aims to select a subset of agents with a specific k-cardinality constraint. In these scenarios, the actions that each agent can take are binary values: effort or no effort. We focus on linear contracts, where the expected reward function is XOS or submodular. Our contribution is an approximation of 0.0197 for the problem of designing multi-agent hidden-action principal-agent contracts with the k-cardinality constraint. This result stands in contrast to the unconstrained setting, where Dütting et al. (2023) achieved an approximation of nearly 0.0039.

我们探讨了组合契约设计问题,这是d等人(2023)介绍和研究的主题。以前的研究主要集中在选择一个不受约束的代理子集的挑战上,特别是当委托人的效用函数表现出与付出努力的代理子集相关的XOS或子模块特征时。我们的研究扩展了现有的研究路线,通过检查场景,其中委托人旨在选择具有特定k-基数约束的代理子集。在这些场景中,每个代理可以采取的操作是二元值:努力或不努力。我们关注线性契约,其中预期奖励函数是XOS或子模块。对于设计具有k-基数约束的多代理隐藏行为委托代理契约的问题,我们的贡献近似为0.0197。这一结果与不受约束的设置形成对比,d等人(2023)实现了接近0.0039的近似值。
{"title":"Approximating combinatorial contracts with a cardinality constraint","authors":"Qinqin Gong, Ling Gai, Yanjun Jiang, Yang Lv, Ruiqi Yang","doi":"10.1007/s10878-025-01307-1","DOIUrl":"https://doi.org/10.1007/s10878-025-01307-1","url":null,"abstract":"<p>We explore the problem of combinatorial contract design, a subject introduced and studied by Dütting et al. (2023). Previous research has focused on the challenge of selecting an unconstrained subset of agents, particularly when the principal’s utility function exhibits XOS or submodular characteristics related to the subset of agents that exert effort. Our study extends this existing line of research by examining scenarios in which the principal aims to select a subset of agents with a specific <i>k</i>-cardinality constraint. In these scenarios, the actions that each agent can take are binary values: effort or no effort. We focus on linear contracts, where the expected reward function is XOS or submodular. Our contribution is an approximation of 0.0197 for the problem of designing multi-agent hidden-action principal-agent contracts with the <i>k</i>-cardinality constraint. This result stands in contrast to the unconstrained setting, where Dütting et al. (2023) achieved an approximation of nearly 0.0039.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"44 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144114064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximation algorithms for the W-prize-collecting scheduling problem on a single machine with submodular rejection penalties 具有次模拒绝处罚的单机w奖回收调度问题的近似算法
IF 1 4区 数学 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-21 DOI: 10.1007/s10878-025-01314-2
Tianjiao Guo, Wen Liu, Gengsheng Zhang, Bo Hou

In this paper, we consider the W-prize-collecting scheduling problem on a single machine with submodular rejection penalties. In this problem, we are given one machine, n jobs and a value W. Every job has a processing time and a profit. Each job is either accepted and processed on the machine, or rejected and a rejection penalty is paid. The objective is to minimize the sum of the makespan of the accepted jobs and the rejection penalties of the rejected jobs which is determined by a submodular function, provided that the total profit of the accepted jobs is at least W. Under the assumption that the submodular penalty function is polymatriod, we design a 2-approximation algorithm based on the primal-dual framework.

在本文中,我们考虑了具有次模拒绝惩罚的单机上的w奖回收调度问题。在这个问题中,我们有一台机器,n个作业和一个值w,每个作业都有一个处理时间和利润。每个作业要么被接受并在机器上处理,要么被拒绝并支付拒绝罚款。目标是在接受作业的总利润至少为w的条件下,最小化由子模函数决定的接受作业的完工时间和拒绝作业的拒绝处罚之和。在子模惩罚函数为多矩阵的假设下,我们设计了一个基于原对偶框架的2-逼近算法。
{"title":"Approximation algorithms for the W-prize-collecting scheduling problem on a single machine with submodular rejection penalties","authors":"Tianjiao Guo, Wen Liu, Gengsheng Zhang, Bo Hou","doi":"10.1007/s10878-025-01314-2","DOIUrl":"https://doi.org/10.1007/s10878-025-01314-2","url":null,"abstract":"<p>In this paper, we consider the <i>W</i>-prize-collecting scheduling problem on a single machine with submodular rejection penalties. In this problem, we are given one machine, <i>n</i> jobs and a value <i>W</i>. Every job has a processing time and a profit. Each job is either accepted and processed on the machine, or rejected and a rejection penalty is paid. The objective is to minimize the sum of the makespan of the accepted jobs and the rejection penalties of the rejected jobs which is determined by a submodular function, provided that the total profit of the accepted jobs is at least <i>W</i>. Under the assumption that the submodular penalty function is polymatriod, we design a 2-approximation algorithm based on the primal-dual framework.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"35 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144114065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mechanism Design with Predictions for Facility Location Games with Candidate Locations 具有候选地点的设施位置博弈的预测机制设计
IF 1 4区 数学 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-21 DOI: 10.1007/s10878-025-01310-6
Jiazhu Fang, Qizhi Fang, Wenjing Liu, Qingqin Nong, Alexandros A. Voudouris

We study mechanism design with predictions in the single (obnoxious) facility location games with candidate locations on the real line, which complements the existing literature on mechanism design with predictions. We first consider the single facility location games with candidate locations, where each agent prefers the facility (e.g., a school) to be located as close to her as possible. We study two social objectives: minimizing the maximum cost and the social cost, and provide deterministic, anonymous, and group strategy-proof mechanisms with predictions that achieve the best possible trade-offs between consistency and robustness, respectively. Additionally, we represent the approximation ratio as a function of the prediction error, indicating that mechanisms can achieve better performance even when predictions are not fully accurate. We also consider the single obnoxious facility location games with candidate locations, where each agent prefers the facility (e.g., a garbage transfer station) to be located as far away from her as possible. For the objective of maximizing the minimum utility, we prove that any strategy-proof mechanism with predictions is unbounded robust. For the objective of maximizing the social utility, we provide a deterministic, anonymous, and group strategy-proof mechanism with prediction that achieves the best possible trade-off between consistency and robustness.

我们在单一(令人讨厌的)设施选址博弈中研究了带预测的机制设计,候选地点在真实线上,这补充了现有的带预测的机制设计文献。我们首先考虑具有候选位置的单一设施位置博弈,其中每个代理都希望设施(例如,学校)位于尽可能靠近她的位置。我们研究了两个社会目标:最小化最大成本和社会成本,并提供确定性、匿名和群体策略证明机制,这些机制的预测分别在一致性和鲁棒性之间实现了最佳的权衡。此外,我们将近似比率表示为预测误差的函数,表明即使在预测不完全准确的情况下,机制也可以实现更好的性能。我们还考虑了具有候选位置的单个令人讨厌的设施位置博弈,其中每个代理都希望设施(例如,垃圾转运站)位于离她尽可能远的地方。以最小效用最大化为目标,证明了任何具有预测的防策略机制都是无界鲁棒的。为了实现社会效用最大化的目标,我们提供了一种确定性的、匿名的、具有预测能力的群体策略证明机制,在一致性和鲁棒性之间实现了最佳的权衡。
{"title":"Mechanism Design with Predictions for Facility Location Games with Candidate Locations","authors":"Jiazhu Fang, Qizhi Fang, Wenjing Liu, Qingqin Nong, Alexandros A. Voudouris","doi":"10.1007/s10878-025-01310-6","DOIUrl":"https://doi.org/10.1007/s10878-025-01310-6","url":null,"abstract":"<p>We study mechanism design with predictions in the single (obnoxious) facility location games with candidate locations on the real line, which complements the existing literature on mechanism design with predictions. We first consider the single facility location games with candidate locations, where each agent prefers the facility (e.g., a school) to be located as close to her as possible. We study two social objectives: minimizing the maximum cost and the social cost, and provide deterministic, anonymous, and group strategy-proof mechanisms with predictions that achieve the best possible trade-offs between consistency and robustness, respectively. Additionally, we represent the approximation ratio as a function of the prediction error, indicating that mechanisms can achieve better performance even when predictions are not fully accurate. We also consider the single obnoxious facility location games with candidate locations, where each agent prefers the facility (e.g., a garbage transfer station) to be located as far away from her as possible. For the objective of maximizing the minimum utility, we prove that any strategy-proof mechanism with predictions is unbounded robust. For the objective of maximizing the social utility, we provide a deterministic, anonymous, and group strategy-proof mechanism with prediction that achieves the best possible trade-off between consistency and robustness.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"135 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144114066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Impact of payment schemes on performance in a medical cost-sharing system: bundled payment vs. total prepayment 医疗费用分担系统中支付方案对绩效的影响:捆绑支付vs.全部预付
IF 1 4区 数学 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-21 DOI: 10.1007/s10878-025-01301-7
Miao Yu, Wang Zhou, Yu Zhao

Currently, many countries are on the process of reforming their health care payment systems from post-payment to pre-payment. To explore the impact of pre-payment schemes on health system performance we investigate the two payment schemes, bundled payment (BP) and total prepayment (TP), on performance in a medical cost-sharing system. Under the BP scheme, the government compensates hospitals with a lump sum for the entire course of each patient’s care. Under the TP scheme, the government provides the total amount of integrated compensation within a period. A three Stackelberg game with an embedded queueing model is used to explore the interactions among participants: government, hospital, and patients. The government determines the compensation received by hospitals and the copayment paid by patients to maximize social welfare. Next, the hospital determines its service rate for each medical episode to maximize profit. Last, patients make decisions on whether to appeal to the hospital for medical services. We derive the optimal strategy for the participants under the BP and TP schemes, and compare the system performance through numerical analysis. Results show that BP is better than TP in reducing patient expected waiting time, while it outperforms TP in terms of system accessibility and service quality. Our study is the first to consider the total prepayment scheme in the healthcare system decision analysis and the findings offer important insights for policymakers regarding implementing medical insurance reform in practice.

目前,许多国家正在对其医疗保健支付制度进行改革,从后支付改为预付费。为了探讨预付费方案对医疗系统绩效的影响,我们研究了两种支付方案,捆绑支付(BP)和总预付费(TP),对医疗成本分担系统的绩效。在BP计划下,政府向医院一次性支付每位病人整个治疗过程的费用。在计划下,政府在一段时间内提供综合补偿的总额。采用一个嵌入排队模型的三Stackelberg博弈来探讨政府、医院和患者三者之间的相互作用。政府决定医院收到的补偿和患者支付的共同费用,以最大限度地提高社会福利。接下来,医院确定每个医疗事件的服务率,以实现利润最大化。最后,患者自行决定是否向医院申诉医疗服务。推导了BP和TP方案下参与者的最优策略,并通过数值分析比较了系统性能。结果表明,BP在减少患者期望等待时间方面优于TP,而在系统可及性和服务质量方面优于TP。我们的研究首次在医疗保健系统决策分析中考虑了总预付方案,研究结果为政策制定者在实践中实施医疗保险改革提供了重要的见解。
{"title":"Impact of payment schemes on performance in a medical cost-sharing system: bundled payment vs. total prepayment","authors":"Miao Yu, Wang Zhou, Yu Zhao","doi":"10.1007/s10878-025-01301-7","DOIUrl":"https://doi.org/10.1007/s10878-025-01301-7","url":null,"abstract":"<p>Currently, many countries are on the process of reforming their health care payment systems from post-payment to pre-payment. To explore the impact of pre-payment schemes on health system performance we investigate the two payment schemes, bundled payment (BP) and total prepayment (TP), on performance in a medical cost-sharing system. Under the BP scheme, the government compensates hospitals with a lump sum for the entire course of each patient’s care. Under the TP scheme, the government provides the total amount of integrated compensation within a period. A three Stackelberg game with an embedded queueing model is used to explore the interactions among participants: government, hospital, and patients. The government determines the compensation received by hospitals and the copayment paid by patients to maximize social welfare. Next, the hospital determines its service rate for each medical episode to maximize profit. Last, patients make decisions on whether to appeal to the hospital for medical services. We derive the optimal strategy for the participants under the BP and TP schemes, and compare the system performance through numerical analysis. Results show that BP is better than TP in reducing patient expected waiting time, while it outperforms TP in terms of system accessibility and service quality. Our study is the first to consider the total prepayment scheme in the healthcare system decision analysis and the findings offer important insights for policymakers regarding implementing medical insurance reform in practice.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"57 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144114063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pseudo-Shapley value for weak games of threats 弱威胁博弈的伪沙普利值
IF 1 4区 数学 Q4 COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS Pub Date : 2025-05-21 DOI: 10.1007/s10878-025-01319-x
Daniel Li Li, Erfang Shan

For a real number (omega ), a weak game of threats (Nv) consists of a set N of n players and a function (v:2^Nrightarrow mathbb {R}) such that (omega v(emptyset )+(1-omega )v(N)=0), where (v(emptyset )ne 0) possibly. It is shown that there exists a unique value with respect to (omega ) for weak games of threats that satisfies efficiency, linearity, symmetry and the null player property.

对于一个实数(omega ),一个弱博弈威胁(N, v)由N个参与者和一个函数(v:2^Nrightarrow mathbb {R})组成,使得(omega v(emptyset )+(1-omega )v(N)=0),其中(v(emptyset )ne 0)可能。证明了对于满足效率、线性、对称和空参与人性质的弱威胁对策,存在一个关于(omega )的唯一值。
{"title":"Pseudo-Shapley value for weak games of threats","authors":"Daniel Li Li, Erfang Shan","doi":"10.1007/s10878-025-01319-x","DOIUrl":"https://doi.org/10.1007/s10878-025-01319-x","url":null,"abstract":"<p>For a real number <span>(omega )</span>, a weak game of threats (<i>N</i>, <i>v</i>) consists of a set <i>N</i> of <i>n</i> players and a function <span>(v:2^Nrightarrow mathbb {R})</span> such that <span>(omega v(emptyset )+(1-omega )v(N)=0)</span>, where <span>(v(emptyset )ne 0)</span> possibly. It is shown that there exists a unique value with respect to <span>(omega )</span> for weak games of threats that satisfies efficiency, linearity, symmetry and the null player property.</p>","PeriodicalId":50231,"journal":{"name":"Journal of Combinatorial Optimization","volume":"42 1","pages":""},"PeriodicalIF":1.0,"publicationDate":"2025-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144114068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Journal of Combinatorial Optimization
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1