首页 > 最新文献

International Journal of Foundations of Computer Science最新文献

英文 中文
Edge-Disjoint Hamiltonian Cycles in Balanced Hypercubes with Applications to Fault-Tolerant Data Broadcasting 平衡超立方体中的边缘不相交哈密顿循环及其在容错数据广播中的应用
IF 0.8 4区 计算机科学 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-04-18 DOI: 10.1142/s0129054124500047
Shuai Liu, Yan Wang, Jianxi Fan, Baolei Cheng

The existence of multiple edge-disjoint Hamiltonian cycles (EDHCs for short) is a desirable property of interconnection networks. These parallel cycles can provide an advantage for algorithms that require a ring structure. Additionally, EDHCs can enhance all-to-all data broadcasting and edge fault tolerance in network communications. In this paper, we investigate the construction of EDHCs in the balanced hypercube, which is a variant of the hypercube with many attractive properties, such as strong connectivity, regularity, and symmetry. In particular, each processor in the balanced hypercube has a backup processor that shares the common neighbors, enabling fault tolerance and efficient system reconfiguration. In 2019, Lü et al. provided an algorithm to construct two EDHCs in an n-dimensional balanced hypercube BHn for n2. We further study this topic and give some construction schemes to construct 2log2n EDHCs in BHn for n2. Since BHn is 2n-regular, our result is optimal for n=2r (r1). In addition, we simulate the fault-tolerant data broadcasting through these parallel cycles as transmission channels.

存在多个边缘相交的哈密顿循环(简称 EDHC)是互连网络的一个理想特性。这些并行循环可为需要环形结构的算法提供优势。此外,EDHC 还能增强网络通信中的全对全数据广播和边缘容错能力。在本文中,我们研究了在平衡超立方体中构建 EDHC 的问题,平衡超立方体是超立方体的一种变体,具有许多吸引人的特性,如强连接性、规则性和对称性。特别是,平衡超立方体中的每个处理器都有一个共享公共邻居的备份处理器,从而实现容错和高效的系统重新配置。2019 年,Lü 等人提供了一种在 n≥2 时在 n 维平衡超立方体 BHn 中构造两个 EDHC 的算法。我们进一步研究这一课题,给出了一些构造方案,在 n≥2 时在 BHn 中构造 2⌊log2n⌋ EDHC。由于 BHn 是 2n-regular 的,因此我们的结果在 n=2r (r≥1) 时是最优的。此外,我们还模拟了通过这些并行循环作为传输通道进行容错数据广播的情况。
{"title":"Edge-Disjoint Hamiltonian Cycles in Balanced Hypercubes with Applications to Fault-Tolerant Data Broadcasting","authors":"Shuai Liu, Yan Wang, Jianxi Fan, Baolei Cheng","doi":"10.1142/s0129054124500047","DOIUrl":"https://doi.org/10.1142/s0129054124500047","url":null,"abstract":"<p>The existence of multiple edge-disjoint Hamiltonian cycles (EDHCs for short) is a desirable property of interconnection networks. These parallel cycles can provide an advantage for algorithms that require a ring structure. Additionally, EDHCs can enhance all-to-all data broadcasting and edge fault tolerance in network communications. In this paper, we investigate the construction of EDHCs in the balanced hypercube, which is a variant of the hypercube with many attractive properties, such as strong connectivity, regularity, and symmetry. In particular, each processor in the balanced hypercube has a backup processor that shares the common neighbors, enabling fault tolerance and efficient system reconfiguration. In 2019, Lü <i>et al.</i> provided an algorithm to construct two EDHCs in an <span><math altimg=\"eq-00002.gif\" display=\"inline\" overflow=\"scroll\"><mi>n</mi></math></span><span></span>-dimensional balanced hypercube <span><math altimg=\"eq-00003.gif\" display=\"inline\" overflow=\"scroll\"><mi>B</mi><msub><mrow><mi>H</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span><span></span> for <span><math altimg=\"eq-00004.gif\" display=\"inline\" overflow=\"scroll\"><mi>n</mi><mo>≥</mo><mn>2</mn></math></span><span></span>. We further study this topic and give some construction schemes to construct <span><math altimg=\"eq-00005.gif\" display=\"inline\" overflow=\"scroll\"><msup><mrow><mn>2</mn></mrow><mrow><mo stretchy=\"false\">⌊</mo><msub><mrow><mo>log</mo></mrow><mrow><mn>2</mn></mrow></msub><mi>n</mi><mo stretchy=\"false\">⌋</mo></mrow></msup></math></span><span></span> EDHCs in <span><math altimg=\"eq-00006.gif\" display=\"inline\" overflow=\"scroll\"><mi>B</mi><msub><mrow><mi>H</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span><span></span> for <span><math altimg=\"eq-00007.gif\" display=\"inline\" overflow=\"scroll\"><mi>n</mi><mo>≥</mo><mn>2</mn></math></span><span></span>. Since <span><math altimg=\"eq-00008.gif\" display=\"inline\" overflow=\"scroll\"><mi>B</mi><msub><mrow><mi>H</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span><span></span> is <span><math altimg=\"eq-00009.gif\" display=\"inline\" overflow=\"scroll\"><mn>2</mn><mi>n</mi></math></span><span></span>-regular, our result is optimal for <span><math altimg=\"eq-00010.gif\" display=\"inline\" overflow=\"scroll\"><mi>n</mi><mo>=</mo><msup><mrow><mn>2</mn></mrow><mrow><mi>r</mi></mrow></msup></math></span><span></span> (<span><math altimg=\"eq-00011.gif\" display=\"inline\" overflow=\"scroll\"><mi>r</mi><mo>≥</mo><mn>1</mn></math></span><span></span>). In addition, we simulate the fault-tolerant data broadcasting through these parallel cycles as transmission channels.</p>","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":"1 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2024-04-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140630649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Algorithmic Aspects of Outer-Independent Double Roman Domination in Graphs 图中与外无关的双罗马支配的算法方面
IF 0.8 4区 计算机科学 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-03-28 DOI: 10.1142/s0129054124500059
Amit Sharma, P. Venkata Subba Reddy, S. Arumugam, Jakkepalli Pavan Kumar
<p>Let <span><math altimg="eq-00001.gif" display="inline" overflow="scroll"><mi>G</mi><mo>=</mo><mo stretchy="false">(</mo><mi>V</mi><mo>,</mo><mi>E</mi><mo stretchy="false">)</mo></math></span><span></span> be graph. For any function <span><math altimg="eq-00002.gif" display="inline" overflow="scroll"><mi>h</mi><mo>:</mo><mi>V</mi><mo>→</mo><mo stretchy="false">{</mo><mn>0</mn><mo>,</mo><mn>1</mn><mo>,</mo><mn>2</mn><mo>,</mo><mn>3</mn><mo stretchy="false">}</mo></math></span><span></span>, let <span><math altimg="eq-00003.gif" display="inline" overflow="scroll"><msub><mrow><mi>V</mi></mrow><mrow><mi>i</mi></mrow></msub><mo>=</mo><mo stretchy="false">{</mo><mi>v</mi><mo>∈</mo><mi>V</mi><mo>:</mo><mi>h</mi><mo stretchy="false">(</mo><mi>v</mi><mo stretchy="false">)</mo><mo>=</mo><mi>i</mi><mo stretchy="false">}</mo></math></span><span></span>, <span><math altimg="eq-00004.gif" display="inline" overflow="scroll"><mn>0</mn><mo>≤</mo><mi>i</mi><mo>≤</mo><mn>3</mn></math></span><span></span>. The function <span><math altimg="eq-00005.gif" display="inline" overflow="scroll"><mi>h</mi></math></span><span></span> is called an outer-independent double Roman dominating function (OIDRDF) if the following conditions are satisfied.</p><table border="0" list-type="order" width="95%"><tr><td valign="top"><sup>(i)</sup></td><td colspan="5" valign="top"><p>If <span><math altimg="eq-00006.gif" display="inline" overflow="scroll"><mi>v</mi><mo>∈</mo><msub><mrow><mi>V</mi></mrow><mrow><mn>0</mn></mrow></msub></math></span><span></span>, then <span><math altimg="eq-00007.gif" display="inline" overflow="scroll"><mo>|</mo><mi>N</mi><mo stretchy="false">(</mo><mi>v</mi><mo stretchy="false">)</mo><mo stretchy="false">∩</mo><msub><mrow><mi>V</mi></mrow><mrow><mn>3</mn></mrow></msub><mo>|</mo><mo>≥</mo><mn>1</mn></math></span><span></span> or <span><math altimg="eq-00008.gif" display="inline" overflow="scroll"><mo>|</mo><mi>N</mi><mo stretchy="false">(</mo><mi>v</mi><mo stretchy="false">)</mo><mo stretchy="false">∩</mo><msub><mrow><mi>V</mi></mrow><mrow><mn>2</mn></mrow></msub><mo>|</mo><mo>≥</mo><mn>2</mn></math></span><span></span></p></td></tr><tr><td valign="top"><sup>(ii)</sup></td><td colspan="5" valign="top"><p>If <span><math altimg="eq-00009.gif" display="inline" overflow="scroll"><mi>v</mi><mo>∈</mo><msub><mrow><mi>V</mi></mrow><mrow><mn>1</mn></mrow></msub></math></span><span></span>, then <span><math altimg="eq-00010.gif" display="inline" overflow="scroll"><mo>|</mo><mi>N</mi><mo stretchy="false">(</mo><mi>v</mi><mo stretchy="false">)</mo><mo stretchy="false">∩</mo><mo stretchy="false">(</mo><msub><mrow><mi>V</mi></mrow><mrow><mn>2</mn></mrow></msub><mo stretchy="false">∪</mo><msub><mrow><mi>V</mi></mrow><mrow><mn>3</mn></mrow></msub><mo stretchy="false">)</mo><mo>|</mo><mo>≥</mo><mn>1</mn></math></span><span></span></p></td></tr><tr><td valign="top"><sup>(iii)</sup></td><td colspan="5" valign="top"><p><span><math altimg="eq-00011.gif" display="inline" overflow=
设 G=(V,E) 为图。对于任意函数 h:V→{0,1,2,3},设 Vi={v∈V:h(v)=i},0≤i≤3。如果满足以下条件,函数 h 称为外部独立双罗马支配函数(OIDRDF):(i)如果 v∈V0,则|N(v)∩V3|≥1 或|N(v)∩V2|≥2(ii)如果 v∈V1,则|N(v)∩(V2∪V3)|≥1(iii)V0 是独立的。G 的外独立双罗马支配数定义为 γoidR(G)=min∑v∈Vh(v):h 是 G 的一个 OIDRDF。我们证明,与 γoidR(G) 对应的决策问题 MOIDRDP 对于分裂图来说是 NP-完全的。我们还证明,对于连通的阈值图和有界树宽图,它是线性时间可解的。最后,我们证明 MOIDRDP 和 domination 在计算复杂性方面并不等同。
{"title":"Algorithmic Aspects of Outer-Independent Double Roman Domination in Graphs","authors":"Amit Sharma, P. Venkata Subba Reddy, S. Arumugam, Jakkepalli Pavan Kumar","doi":"10.1142/s0129054124500059","DOIUrl":"https://doi.org/10.1142/s0129054124500059","url":null,"abstract":"&lt;p&gt;Let &lt;span&gt;&lt;math altimg=\"eq-00001.gif\" display=\"inline\" overflow=\"scroll\"&gt;&lt;mi&gt;G&lt;/mi&gt;&lt;mo&gt;=&lt;/mo&gt;&lt;mo stretchy=\"false\"&gt;(&lt;/mo&gt;&lt;mi&gt;V&lt;/mi&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mi&gt;E&lt;/mi&gt;&lt;mo stretchy=\"false\"&gt;)&lt;/mo&gt;&lt;/math&gt;&lt;/span&gt;&lt;span&gt;&lt;/span&gt; be graph. For any function &lt;span&gt;&lt;math altimg=\"eq-00002.gif\" display=\"inline\" overflow=\"scroll\"&gt;&lt;mi&gt;h&lt;/mi&gt;&lt;mo&gt;:&lt;/mo&gt;&lt;mi&gt;V&lt;/mi&gt;&lt;mo&gt;→&lt;/mo&gt;&lt;mo stretchy=\"false\"&gt;{&lt;/mo&gt;&lt;mn&gt;0&lt;/mn&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;mn&gt;3&lt;/mn&gt;&lt;mo stretchy=\"false\"&gt;}&lt;/mo&gt;&lt;/math&gt;&lt;/span&gt;&lt;span&gt;&lt;/span&gt;, let &lt;span&gt;&lt;math altimg=\"eq-00003.gif\" display=\"inline\" overflow=\"scroll\"&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;V&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;i&lt;/mi&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;=&lt;/mo&gt;&lt;mo stretchy=\"false\"&gt;{&lt;/mo&gt;&lt;mi&gt;v&lt;/mi&gt;&lt;mo&gt;∈&lt;/mo&gt;&lt;mi&gt;V&lt;/mi&gt;&lt;mo&gt;:&lt;/mo&gt;&lt;mi&gt;h&lt;/mi&gt;&lt;mo stretchy=\"false\"&gt;(&lt;/mo&gt;&lt;mi&gt;v&lt;/mi&gt;&lt;mo stretchy=\"false\"&gt;)&lt;/mo&gt;&lt;mo&gt;=&lt;/mo&gt;&lt;mi&gt;i&lt;/mi&gt;&lt;mo stretchy=\"false\"&gt;}&lt;/mo&gt;&lt;/math&gt;&lt;/span&gt;&lt;span&gt;&lt;/span&gt;, &lt;span&gt;&lt;math altimg=\"eq-00004.gif\" display=\"inline\" overflow=\"scroll\"&gt;&lt;mn&gt;0&lt;/mn&gt;&lt;mo&gt;≤&lt;/mo&gt;&lt;mi&gt;i&lt;/mi&gt;&lt;mo&gt;≤&lt;/mo&gt;&lt;mn&gt;3&lt;/mn&gt;&lt;/math&gt;&lt;/span&gt;&lt;span&gt;&lt;/span&gt;. The function &lt;span&gt;&lt;math altimg=\"eq-00005.gif\" display=\"inline\" overflow=\"scroll\"&gt;&lt;mi&gt;h&lt;/mi&gt;&lt;/math&gt;&lt;/span&gt;&lt;span&gt;&lt;/span&gt; is called an outer-independent double Roman dominating function (OIDRDF) if the following conditions are satisfied.&lt;/p&gt;&lt;table border=\"0\" list-type=\"order\" width=\"95%\"&gt;&lt;tr&gt;&lt;td valign=\"top\"&gt;&lt;sup&gt;(i)&lt;/sup&gt;&lt;/td&gt;&lt;td colspan=\"5\" valign=\"top\"&gt;&lt;p&gt;If &lt;span&gt;&lt;math altimg=\"eq-00006.gif\" display=\"inline\" overflow=\"scroll\"&gt;&lt;mi&gt;v&lt;/mi&gt;&lt;mo&gt;∈&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;V&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mn&gt;0&lt;/mn&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;/math&gt;&lt;/span&gt;&lt;span&gt;&lt;/span&gt;, then &lt;span&gt;&lt;math altimg=\"eq-00007.gif\" display=\"inline\" overflow=\"scroll\"&gt;&lt;mo&gt;|&lt;/mo&gt;&lt;mi&gt;N&lt;/mi&gt;&lt;mo stretchy=\"false\"&gt;(&lt;/mo&gt;&lt;mi&gt;v&lt;/mi&gt;&lt;mo stretchy=\"false\"&gt;)&lt;/mo&gt;&lt;mo stretchy=\"false\"&gt;∩&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;V&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mn&gt;3&lt;/mn&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;|&lt;/mo&gt;&lt;mo&gt;≥&lt;/mo&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;/math&gt;&lt;/span&gt;&lt;span&gt;&lt;/span&gt; or &lt;span&gt;&lt;math altimg=\"eq-00008.gif\" display=\"inline\" overflow=\"scroll\"&gt;&lt;mo&gt;|&lt;/mo&gt;&lt;mi&gt;N&lt;/mi&gt;&lt;mo stretchy=\"false\"&gt;(&lt;/mo&gt;&lt;mi&gt;v&lt;/mi&gt;&lt;mo stretchy=\"false\"&gt;)&lt;/mo&gt;&lt;mo stretchy=\"false\"&gt;∩&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;V&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo&gt;|&lt;/mo&gt;&lt;mo&gt;≥&lt;/mo&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;/math&gt;&lt;/span&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td valign=\"top\"&gt;&lt;sup&gt;(ii)&lt;/sup&gt;&lt;/td&gt;&lt;td colspan=\"5\" valign=\"top\"&gt;&lt;p&gt;If &lt;span&gt;&lt;math altimg=\"eq-00009.gif\" display=\"inline\" overflow=\"scroll\"&gt;&lt;mi&gt;v&lt;/mi&gt;&lt;mo&gt;∈&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;V&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;/math&gt;&lt;/span&gt;&lt;span&gt;&lt;/span&gt;, then &lt;span&gt;&lt;math altimg=\"eq-00010.gif\" display=\"inline\" overflow=\"scroll\"&gt;&lt;mo&gt;|&lt;/mo&gt;&lt;mi&gt;N&lt;/mi&gt;&lt;mo stretchy=\"false\"&gt;(&lt;/mo&gt;&lt;mi&gt;v&lt;/mi&gt;&lt;mo stretchy=\"false\"&gt;)&lt;/mo&gt;&lt;mo stretchy=\"false\"&gt;∩&lt;/mo&gt;&lt;mo stretchy=\"false\"&gt;(&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;V&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mn&gt;2&lt;/mn&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo stretchy=\"false\"&gt;∪&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;V&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mn&gt;3&lt;/mn&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo stretchy=\"false\"&gt;)&lt;/mo&gt;&lt;mo&gt;|&lt;/mo&gt;&lt;mo&gt;≥&lt;/mo&gt;&lt;mn&gt;1&lt;/mn&gt;&lt;/math&gt;&lt;/span&gt;&lt;span&gt;&lt;/span&gt;&lt;/p&gt;&lt;/td&gt;&lt;/tr&gt;&lt;tr&gt;&lt;td valign=\"top\"&gt;&lt;sup&gt;(iii)&lt;/sup&gt;&lt;/td&gt;&lt;td colspan=\"5\" valign=\"top\"&gt;&lt;p&gt;&lt;span&gt;&lt;math altimg=\"eq-00011.gif\" display=\"inline\" overflow=","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":"26 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2024-03-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140316560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Note of Reliability Analysis of SM-λ in Folded-Crossed Hypercube with Conditional Faults 带条件故障的折叠交叉超立方体中 SM-λ 的可靠性分析说明
IF 0.8 4区 计算机科学 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-03-19 DOI: 10.1142/s0129054124500035
Jinjie Ma, Mingzu Zhang, Chenxi Li, Hengji Qiao, Yang Fan
<p>The fault tolerance of an interconnection network of parallel and distributed systems can be evaluated by various topological parameters of its underlying graph <span><math altimg="eq-00003.gif" display="inline" overflow="scroll"><mi>G</mi></math></span><span></span>, with strong Menger edge connectivity being a vital parameter in this regard. A connected graph <span><math altimg="eq-00004.gif" display="inline" overflow="scroll"><mi>G</mi></math></span><span></span> is called strongly Menger edge connected (SM-<span><math altimg="eq-00005.gif" display="inline" overflow="scroll"><mi>λ</mi></math></span><span></span>) if it connects any pair of vertices <span><math altimg="eq-00006.gif" display="inline" overflow="scroll"><mi>u</mi></math></span><span></span> and <span><math altimg="eq-00007.gif" display="inline" overflow="scroll"><mi>v</mi></math></span><span></span> with <span><math altimg="eq-00008.gif" display="inline" overflow="scroll"><mo>min</mo><mo stretchy="false">{</mo><msub><mrow><mi>d</mi></mrow><mrow><mi>G</mi></mrow></msub><mo stretchy="false">(</mo><mi>u</mi><mo stretchy="false">)</mo><mo>,</mo><msub><mrow><mi>d</mi></mrow><mrow><mi>G</mi></mrow></msub><mo stretchy="false">(</mo><mi>v</mi><mo stretchy="false">)</mo><mo stretchy="false">}</mo></math></span><span></span> number of edge-disjoint paths. Under the uniform distribution of faults in a large interconnection network, it is improbable that each faulty edge incident to a vertex will occur simultaneously. Thus, <span><math altimg="eq-00009.gif" display="inline" overflow="scroll"><mi>m</mi></math></span><span></span>-strongly Menger edge connected of order <span><math altimg="eq-00010.gif" display="inline" overflow="scroll"><mi>t</mi></math></span><span></span> was introduced in 2018 by He <i>et al.</i> Here, <span><math altimg="eq-00011.gif" display="inline" overflow="scroll"><mi>G</mi></math></span><span></span> is called as <span><math altimg="eq-00012.gif" display="inline" overflow="scroll"><mi>m</mi></math></span><span></span>-strongly Menger edge connected of order <span><math altimg="eq-00013.gif" display="inline" overflow="scroll"><mi>t</mi></math></span><span></span>, if <span><math altimg="eq-00014.gif" display="inline" overflow="scroll"><mi>G</mi><mo stretchy="false">−</mo><mi>F</mi></math></span><span></span> remains SM-<span><math altimg="eq-00015.gif" display="inline" overflow="scroll"><mi>λ</mi></math></span><span></span>, where <span><math altimg="eq-00016.gif" display="inline" overflow="scroll"><mi>F</mi></math></span><span></span> is an arbitrary edge set in a graph <span><math altimg="eq-00017.gif" display="inline" overflow="scroll"><mi>G</mi></math></span><span></span> with <span><math altimg="eq-00018.gif" display="inline" overflow="scroll"><mo>|</mo><mi>F</mi><mo>|</mo><mo>≤</mo><mi>m</mi></math></span><span></span> and the minimum degree of the remaining graph <span><math altimg="eq-00019.gif" display="inline" overflow="scroll"><mi>δ</mi><mo stretchy="fal
并行和分布式系统互连网络的容错性可通过其底层图 G 的各种拓扑参数来评估,而强门格尔边连接性是这方面的一个重要参数。如果连通图 G 连接任意一对顶点 u 和 v 的边缘相交路径数最小为{dG(u),dG(v)},则称其为强门格尔边缘连接图(SM-λ)。在大型互连网络的故障均匀分布情况下,顶点的每条故障边不可能同时出现。因此,He等人在2018年提出了阶数为t的m-strongly Menger edge connected,这里,如果G-F保持SM-λ,则称G为阶数为t的m-strongly Menger edge connected,其中F是图G中的任意边集,|F|≤m,且剩余图的最小度δ(G-F)≥t。保持 G-F 是 SM-λ 的最大 m 表示为 smλt(G)。在超立方体的变体中,n 维折叠交叉超立方体 FCQn 近年来备受关注。本文主要计算 FCQn 的最大条件边缘容错数 t 阶的精确值,即 smλt(FCQn)=2t(n+1-t)-(n+1),对于两个整数 1≤t≤n-2 和 n≥3。
{"title":"A Note of Reliability Analysis of SM-λ in Folded-Crossed Hypercube with Conditional Faults","authors":"Jinjie Ma, Mingzu Zhang, Chenxi Li, Hengji Qiao, Yang Fan","doi":"10.1142/s0129054124500035","DOIUrl":"https://doi.org/10.1142/s0129054124500035","url":null,"abstract":"&lt;p&gt;The fault tolerance of an interconnection network of parallel and distributed systems can be evaluated by various topological parameters of its underlying graph &lt;span&gt;&lt;math altimg=\"eq-00003.gif\" display=\"inline\" overflow=\"scroll\"&gt;&lt;mi&gt;G&lt;/mi&gt;&lt;/math&gt;&lt;/span&gt;&lt;span&gt;&lt;/span&gt;, with strong Menger edge connectivity being a vital parameter in this regard. A connected graph &lt;span&gt;&lt;math altimg=\"eq-00004.gif\" display=\"inline\" overflow=\"scroll\"&gt;&lt;mi&gt;G&lt;/mi&gt;&lt;/math&gt;&lt;/span&gt;&lt;span&gt;&lt;/span&gt; is called strongly Menger edge connected (SM-&lt;span&gt;&lt;math altimg=\"eq-00005.gif\" display=\"inline\" overflow=\"scroll\"&gt;&lt;mi&gt;λ&lt;/mi&gt;&lt;/math&gt;&lt;/span&gt;&lt;span&gt;&lt;/span&gt;) if it connects any pair of vertices &lt;span&gt;&lt;math altimg=\"eq-00006.gif\" display=\"inline\" overflow=\"scroll\"&gt;&lt;mi&gt;u&lt;/mi&gt;&lt;/math&gt;&lt;/span&gt;&lt;span&gt;&lt;/span&gt; and &lt;span&gt;&lt;math altimg=\"eq-00007.gif\" display=\"inline\" overflow=\"scroll\"&gt;&lt;mi&gt;v&lt;/mi&gt;&lt;/math&gt;&lt;/span&gt;&lt;span&gt;&lt;/span&gt; with &lt;span&gt;&lt;math altimg=\"eq-00008.gif\" display=\"inline\" overflow=\"scroll\"&gt;&lt;mo&gt;min&lt;/mo&gt;&lt;mo stretchy=\"false\"&gt;{&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;d&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;G&lt;/mi&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo stretchy=\"false\"&gt;(&lt;/mo&gt;&lt;mi&gt;u&lt;/mi&gt;&lt;mo stretchy=\"false\"&gt;)&lt;/mo&gt;&lt;mo&gt;,&lt;/mo&gt;&lt;msub&gt;&lt;mrow&gt;&lt;mi&gt;d&lt;/mi&gt;&lt;/mrow&gt;&lt;mrow&gt;&lt;mi&gt;G&lt;/mi&gt;&lt;/mrow&gt;&lt;/msub&gt;&lt;mo stretchy=\"false\"&gt;(&lt;/mo&gt;&lt;mi&gt;v&lt;/mi&gt;&lt;mo stretchy=\"false\"&gt;)&lt;/mo&gt;&lt;mo stretchy=\"false\"&gt;}&lt;/mo&gt;&lt;/math&gt;&lt;/span&gt;&lt;span&gt;&lt;/span&gt; number of edge-disjoint paths. Under the uniform distribution of faults in a large interconnection network, it is improbable that each faulty edge incident to a vertex will occur simultaneously. Thus, &lt;span&gt;&lt;math altimg=\"eq-00009.gif\" display=\"inline\" overflow=\"scroll\"&gt;&lt;mi&gt;m&lt;/mi&gt;&lt;/math&gt;&lt;/span&gt;&lt;span&gt;&lt;/span&gt;-strongly Menger edge connected of order &lt;span&gt;&lt;math altimg=\"eq-00010.gif\" display=\"inline\" overflow=\"scroll\"&gt;&lt;mi&gt;t&lt;/mi&gt;&lt;/math&gt;&lt;/span&gt;&lt;span&gt;&lt;/span&gt; was introduced in 2018 by He &lt;i&gt;et al.&lt;/i&gt; Here, &lt;span&gt;&lt;math altimg=\"eq-00011.gif\" display=\"inline\" overflow=\"scroll\"&gt;&lt;mi&gt;G&lt;/mi&gt;&lt;/math&gt;&lt;/span&gt;&lt;span&gt;&lt;/span&gt; is called as &lt;span&gt;&lt;math altimg=\"eq-00012.gif\" display=\"inline\" overflow=\"scroll\"&gt;&lt;mi&gt;m&lt;/mi&gt;&lt;/math&gt;&lt;/span&gt;&lt;span&gt;&lt;/span&gt;-strongly Menger edge connected of order &lt;span&gt;&lt;math altimg=\"eq-00013.gif\" display=\"inline\" overflow=\"scroll\"&gt;&lt;mi&gt;t&lt;/mi&gt;&lt;/math&gt;&lt;/span&gt;&lt;span&gt;&lt;/span&gt;, if &lt;span&gt;&lt;math altimg=\"eq-00014.gif\" display=\"inline\" overflow=\"scroll\"&gt;&lt;mi&gt;G&lt;/mi&gt;&lt;mo stretchy=\"false\"&gt;−&lt;/mo&gt;&lt;mi&gt;F&lt;/mi&gt;&lt;/math&gt;&lt;/span&gt;&lt;span&gt;&lt;/span&gt; remains SM-&lt;span&gt;&lt;math altimg=\"eq-00015.gif\" display=\"inline\" overflow=\"scroll\"&gt;&lt;mi&gt;λ&lt;/mi&gt;&lt;/math&gt;&lt;/span&gt;&lt;span&gt;&lt;/span&gt;, where &lt;span&gt;&lt;math altimg=\"eq-00016.gif\" display=\"inline\" overflow=\"scroll\"&gt;&lt;mi&gt;F&lt;/mi&gt;&lt;/math&gt;&lt;/span&gt;&lt;span&gt;&lt;/span&gt; is an arbitrary edge set in a graph &lt;span&gt;&lt;math altimg=\"eq-00017.gif\" display=\"inline\" overflow=\"scroll\"&gt;&lt;mi&gt;G&lt;/mi&gt;&lt;/math&gt;&lt;/span&gt;&lt;span&gt;&lt;/span&gt; with &lt;span&gt;&lt;math altimg=\"eq-00018.gif\" display=\"inline\" overflow=\"scroll\"&gt;&lt;mo&gt;|&lt;/mo&gt;&lt;mi&gt;F&lt;/mi&gt;&lt;mo&gt;|&lt;/mo&gt;&lt;mo&gt;≤&lt;/mo&gt;&lt;mi&gt;m&lt;/mi&gt;&lt;/math&gt;&lt;/span&gt;&lt;span&gt;&lt;/span&gt; and the minimum degree of the remaining graph &lt;span&gt;&lt;math altimg=\"eq-00019.gif\" display=\"inline\" overflow=\"scroll\"&gt;&lt;mi&gt;δ&lt;/mi&gt;&lt;mo stretchy=\"fal","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":"56 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2024-03-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140196741","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Non-Adaptive and Adaptive Two-Sided Search with Fast Objects 快速对象的非适应性和适应性双面搜索
IF 0.8 4区 计算机科学 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2024-02-29 DOI: 10.1142/s0129054124500023
Alexey Lebedev, Christian Deppe

In 1946, Koopman introduced a two-sided search model. In this model, a searched object is active and can move, at most, one step after each test. We analyze the model of a combinatorial two-sided search by allowing more moves of the searched object after each test. We give strategies and show that they are optimal. We consider adaptive and non-adaptive strategies. We show the surprising result that with the combinatorial two-sided search on a path graph, the optimal non-adaptive search needs the same number of tests as the corresponding adaptive strategy does. The strategy obtained can also be used as an encoding strategy to sent the position of a moving element through a transmission channel.

1946 年,库普曼提出了一种双面搜索模型。在这个模型中,搜索对象是活动的,每次测试后最多只能移动一步。我们分析了组合式双面搜索模型,允许搜索对象在每次测试后有更多的移动。我们给出了策略,并证明这些策略是最优的。我们考虑了自适应和非自适应策略。我们展示了一个令人惊讶的结果:在路径图上进行组合双面搜索时,最优的非自适应搜索所需的测试次数与相应的自适应策略相同。所获得的策略还可用作编码策略,通过传输信道发送移动元素的位置。
{"title":"Non-Adaptive and Adaptive Two-Sided Search with Fast Objects","authors":"Alexey Lebedev, Christian Deppe","doi":"10.1142/s0129054124500023","DOIUrl":"https://doi.org/10.1142/s0129054124500023","url":null,"abstract":"<p>In 1946, Koopman introduced a two-sided search model. In this model, a searched object is active and can move, at most, one step after each test. We analyze the model of a combinatorial two-sided search by allowing more moves of the searched object after each test. We give strategies and show that they are optimal. We consider adaptive and non-adaptive strategies. We show the surprising result that with the combinatorial two-sided search on a path graph, the optimal non-adaptive search needs the same number of tests as the corresponding adaptive strategy does. The strategy obtained can also be used as an encoding strategy to sent the position of a moving element through a transmission channel.</p>","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":"271 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2024-02-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140045330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Smooth Subsum Search A Heuristic for Practical Integer Factorization 用于实用整数因式分解的平滑子和搜索启发式
IF 0.8 4区 计算机科学 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-12-29 DOI: 10.1142/s0129054123500296
Markus Hittmeir

The two currently fastest general-purpose integer factorization algorithms are the Quadratic Sieve and the Number Field Sieve. Both techniques are used to find so-called smooth values of certain polynomials, i.e., values that factor completely over a set of small primes (the factor base). As the names of the methods suggest, a sieving procedure is used for the task of quickly identifying smooth values among the candidates in a certain range. While the Number Field Sieve is asymptotically faster, the Quadratic Sieve is still considered the most efficient factorization technique for numbers up to around 100 digits. In this paper, we challenge the Quadratic Sieve by presenting a novel approach based on representing smoothness candidates as sums that are always divisible by several of the primes in the factor base. The resulting values are generally smaller than those considered in the Quadratic Sieve, increasing the likelihood of them being smooth. Using the fastest implementations of the Self-initializing Quadratic Sieve in Python as benchmarks, a Python implementation of our approach runs consistently 5 to 7 times faster for numbers with 45–100 digits, and around 10 times faster for numbers with 30–40 digits. We discuss several avenues for further improvements and applications of the technique.

目前最快的两种通用整数因式分解算法是二次筛法和数域筛法。这两种技术都用于寻找某些多项式的所谓平滑值,即在一组小素数(因数基)上完全因数分解的值。正如这两种方法的名称所暗示的,筛分程序用于在一定范围内的候选值中快速找出平滑值。虽然数域筛法在渐进上更快,但对于 100 位以内的数字,二次筛法仍被认为是最有效的因式分解技术。在本文中,我们提出了一种新方法,将平滑度候选数表示为总是能被因数基中的几个素数整除的和,从而对二次筛法提出了挑战。这样得到的值通常比二次筛法中考虑的值要小,从而增加了它们成为平滑值的可能性。以 Python 中自初始化二次筛的最快实现为基准,我们方法的 Python 实现在处理 45-100 位数的数字时,运行速度持续提高 5 到 7 倍,在处理 30-40 位数的数字时,运行速度提高约 10 倍。我们讨论了进一步改进和应用该技术的几种途径。
{"title":"Smooth Subsum Search A Heuristic for Practical Integer Factorization","authors":"Markus Hittmeir","doi":"10.1142/s0129054123500296","DOIUrl":"https://doi.org/10.1142/s0129054123500296","url":null,"abstract":"<p>The two currently fastest general-purpose integer factorization algorithms are the Quadratic Sieve and the Number Field Sieve. Both techniques are used to find so-called smooth values of certain polynomials, i.e., values that factor completely over a set of small primes (the factor base). As the names of the methods suggest, a sieving procedure is used for the task of quickly identifying smooth values among the candidates in a certain range. While the Number Field Sieve is asymptotically faster, the Quadratic Sieve is still considered the most efficient factorization technique for numbers up to around 100 digits. In this paper, we challenge the Quadratic Sieve by presenting a novel approach based on representing smoothness candidates as sums that are always divisible by several of the primes in the factor base. The resulting values are generally smaller than those considered in the Quadratic Sieve, increasing the likelihood of them being smooth. Using the fastest implementations of the Self-initializing Quadratic Sieve in Python as benchmarks, a Python implementation of our approach runs consistently 5 to 7 times faster for numbers with 45–100 digits, and around 10 times faster for numbers with 30–40 digits. We discuss several avenues for further improvements and applications of the technique.</p>","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":"4311 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2023-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140045282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Verifiable Multi-Secret Sharing Scheme Based on ℓ-Intersection Pair of Cyclic Codes 基于ℓ-交集对循环码的可验证多密共享方案
IF 0.8 4区 计算机科学 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-11-29 DOI: 10.1142/s0129054123500284
Md Ajaharul Hossain, Ramakrishna Bandi
A verifiable multi-secret sharing (VMSS) scheme addresses various security issues, helping in cheating detection and cheater identification. The dimension of the intersection of a given pair of cyclic codes over a finite field [Formula: see text] is represented by [Formula: see text]. In this paper, we propose a VMSS scheme based on an [Formula: see text]-intersection pair of cyclic codes. The proposed scheme is very useful for sharing a large number of secrets. If [Formula: see text] is the number of secrets in a threshold [Formula: see text] scheme, then for [Formula: see text], the computational complexity and the public values required in the reconstruction phase are much less compared to many existing schemes in the literature. Overall, the proposed scheme comprises nearly all the features, like being verifiable, testing participants’ integrity, checking Verifier frauds, and most importantly, it is of multi-use type.
可验证多机密共享(VMSS)方案解决了各种安全问题,有助于发现作弊和识别作弊者。有限域上一对给定循环码的交集维数[公式:见正文]用[公式:见正文]表示。在本文中,我们提出了一种基于一对循环码[式:见正文]交集的 VMSS 方案。所提出的方案对于共享大量秘密非常有用。如果[公式:见正文]是阈值[公式:见正文]方案中的秘密数量,那么对于[公式:见正文],与文献中的许多现有方案相比,计算复杂度和重构阶段所需的公共值都要少得多。总之,所提出的方案几乎包含了所有特点,如可验证、测试参与者的完整性、检查验证者的欺诈行为,最重要的是,它是多用途类型的。
{"title":"A Verifiable Multi-Secret Sharing Scheme Based on ℓ-Intersection Pair of Cyclic Codes","authors":"Md Ajaharul Hossain, Ramakrishna Bandi","doi":"10.1142/s0129054123500284","DOIUrl":"https://doi.org/10.1142/s0129054123500284","url":null,"abstract":"A verifiable multi-secret sharing (VMSS) scheme addresses various security issues, helping in cheating detection and cheater identification. The dimension of the intersection of a given pair of cyclic codes over a finite field [Formula: see text] is represented by [Formula: see text]. In this paper, we propose a VMSS scheme based on an [Formula: see text]-intersection pair of cyclic codes. The proposed scheme is very useful for sharing a large number of secrets. If [Formula: see text] is the number of secrets in a threshold [Formula: see text] scheme, then for [Formula: see text], the computational complexity and the public values required in the reconstruction phase are much less compared to many existing schemes in the literature. Overall, the proposed scheme comprises nearly all the features, like being verifiable, testing participants’ integrity, checking Verifier frauds, and most importantly, it is of multi-use type.","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":"4 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2023-11-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139209229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Tree-Based Generation of Restricted Graph Languages 基于树的受限图语言生成
IF 0.8 4区 计算机科学 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-11-24 DOI: 10.1142/s0129054123480106
Henrik Björklund, Johanna Björklund, Petter Ericson
Order-preserving DAG grammars (OPDGs) is a formalism for representing languages of structurally restricted graphs. As demonstrated in [17], they are sufficiently expressive to model abstract meaning representations in natural language processing, a graph-based form of semantic representation in which nodes encode objects and edges relations. At the same time, they can be parsed in [Formula: see text], where [Formula: see text] and [Formula: see text] are the sizes of the grammar and the input graph, respectively. In this work, we provide an initial algebra semantic for OPDGs, which allows us to view them as regular tree grammars under an equivalence theory. This makes it possible to transfer results from the field of formal tree languages to the domain of OPDGs, both in the unweighted and the weighted case. In particular, we show that deterministic OPDGs can be minimised efficiently, and that they are learnable under the “minimal adequeate teacher” paradigm, that is, by querying an oracle for equivalence between languages, and membership of individual graphs. To conclude, we demonstrate that the languages generated by OPDGs are definable in monadic second-order logic.
保序 DAG 语法(OPDGs)是一种表示结构受限图语言的形式主义。正如文献[17]所证明的,OPDGs 有足够的表现力来模拟自然语言处理中的抽象意义表示,这是一种基于图的语义表示形式,其中节点编码对象,边编码关系。同时,它们可以用[公式:见正文]进行解析,其中[公式:见正文]和[公式:见正文]分别是语法和输入图的大小。在这项工作中,我们为 OPDGs 提供了一个初始代数语义,使我们可以将其视为等价理论下的规则树语法。这使得我们有可能将形式树语言领域的结果转移到 OPDGs 领域,包括无权和有权情况。特别是,我们证明了确定性 OPDGs 可以高效地最小化,而且它们可以在 "最小拟合教师 "范式下学习,即通过查询语言之间的等价性和单个图的成员资格。最后,我们证明了 OPDGs 生成的语言可在一元二阶逻辑中定义。
{"title":"Tree-Based Generation of Restricted Graph Languages","authors":"Henrik Björklund, Johanna Björklund, Petter Ericson","doi":"10.1142/s0129054123480106","DOIUrl":"https://doi.org/10.1142/s0129054123480106","url":null,"abstract":"Order-preserving DAG grammars (OPDGs) is a formalism for representing languages of structurally restricted graphs. As demonstrated in [17], they are sufficiently expressive to model abstract meaning representations in natural language processing, a graph-based form of semantic representation in which nodes encode objects and edges relations. At the same time, they can be parsed in [Formula: see text], where [Formula: see text] and [Formula: see text] are the sizes of the grammar and the input graph, respectively. In this work, we provide an initial algebra semantic for OPDGs, which allows us to view them as regular tree grammars under an equivalence theory. This makes it possible to transfer results from the field of formal tree languages to the domain of OPDGs, both in the unweighted and the weighted case. In particular, we show that deterministic OPDGs can be minimised efficiently, and that they are learnable under the “minimal adequeate teacher” paradigm, that is, by querying an oracle for equivalence between languages, and membership of individual graphs. To conclude, we demonstrate that the languages generated by OPDGs are definable in monadic second-order logic.","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":"86 10","pages":""},"PeriodicalIF":0.8,"publicationDate":"2023-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139240397","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Author Index Volume 34 (2023) 作者索引 第 34 卷(2023 年)
IF 0.8 4区 计算机科学 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-11-20 DOI: 10.1142/s0129054123990010
{"title":"Author Index Volume 34 (2023)","authors":"","doi":"10.1142/s0129054123990010","DOIUrl":"https://doi.org/10.1142/s0129054123990010","url":null,"abstract":"","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":"102 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2023-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139257455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximating Minimum k-Tree Cover of a Connected Graph Inspired by the Multi-Ferry Routing in Delay Tolerant Networks 以容错网络中的多渡轮路由为启发逼近连通图的最小 k 树覆盖率
IF 0.8 4区 计算机科学 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-11-16 DOI: 10.1142/s0129054123500235
Fujita Satoshi
In this paper, we consider the problem of covering the vertex set of a given graph by [Formula: see text] trees so as to minimize the maximum weight of the trees, as a subproblem of the multi-ferry scheduling problem proposed by Zhao and Ammar. After pointing out that the approximation ratio of a greedy scheme based on the Kruskal’s algorithm is provably bad, we show that the approximation ratio cannot be better than 3/2 for [Formula: see text] even when the edge selection criterion is modified so as to minimize the increase in the maximum weight in the collection of trees. We then propose two polynomial-time algorithms with a guaranteed approximation ratio. The first algorithm achieves 3-approximation for the class of graphs in which the edge weights satisfy the triangle inequality. The second algorithm achieves 4-approximation for any connected graph with arbitrary edge weights.
在本文中,我们将赵和阿玛尔提出的多渡轮调度问题的一个子问题--用[公式:见正文]树覆盖给定图的顶点集以便使树的最大权重最小化--视为问题。在指出基于 Kruskal 算法的贪婪方案的近似率很差之后,我们证明了即使修改边选择标准以最小化树集合中最大权重的增加,[公式:见正文] 的近似率也不会优于 3/2。然后,我们提出了两种保证近似率的多项式时间算法。对于边权重满足三角形不等式的图类,第一种算法可实现 3 近似值。第二种算法对任意边权重的任何连通图都能达到 4 近似值。
{"title":"Approximating Minimum k-Tree Cover of a Connected Graph Inspired by the Multi-Ferry Routing in Delay Tolerant Networks","authors":"Fujita Satoshi","doi":"10.1142/s0129054123500235","DOIUrl":"https://doi.org/10.1142/s0129054123500235","url":null,"abstract":"In this paper, we consider the problem of covering the vertex set of a given graph by [Formula: see text] trees so as to minimize the maximum weight of the trees, as a subproblem of the multi-ferry scheduling problem proposed by Zhao and Ammar. After pointing out that the approximation ratio of a greedy scheme based on the Kruskal’s algorithm is provably bad, we show that the approximation ratio cannot be better than 3/2 for [Formula: see text] even when the edge selection criterion is modified so as to minimize the increase in the maximum weight in the collection of trees. We then propose two polynomial-time algorithms with a guaranteed approximation ratio. The first algorithm achieves 3-approximation for the class of graphs in which the edge weights satisfy the triangle inequality. The second algorithm achieves 4-approximation for any connected graph with arbitrary edge weights.","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":"62 2","pages":""},"PeriodicalIF":0.8,"publicationDate":"2023-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139270076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Weighted Linear Dynamic Logic 加权线性动态逻辑
IF 0.8 4区 计算机科学 Q4 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-11-16 DOI: 10.1142/s0129054123480088
Manfred Droste, Gustav Grabolle, George Rahonis

We introduce a weighted linear dynamic logic (weighted LDL for short) and show the expressive equivalence of its formulas to weighted rational expressions. This adds a new characterization for recognizable series to the fundamental Schützenberger theorem. Surprisingly, the equivalence does not require any restriction to our weighted LDL. Our results hold over arbitrary (resp. totally complete) semirings for finite (resp. infinite) words. As a consequence, the equivalence problem for weighted LDL formulas over fields is decidable in doubly exponential time. In contrast to classical logics, we show that our weighted LDL is expressively incomparable to weighted LTL for finite words. We determine a fragment of the weighted LTL such that series over finite and infinite words definable by LTL formulas in this fragment are definable also by weighted LDL formulas. This is an extended version of [17].

我们引入了加权线性动态逻辑(简称加权 LDL),并展示了其公式与加权有理表达式的表达等价性。这为基本 Schützenberger 定理的可识别数列添加了新的特征。令人惊讶的是,等价性并不需要对我们的加权 LDL 做任何限制。我们的结果适用于有限(或无限)词的任意(或完全)语义。因此,域上加权 LDL 公式的等价问题可在双指数时间内解决。与经典逻辑不同的是,我们证明我们的加权 LDL 在表达上无法与有限词的加权 LTL 相提并论。我们确定了加权 LTL 的一个片段,使得该片段中可由 LTL 公式定义的有限词和无限词上的数列也可由加权 LDL 公式定义。这是 [17] 的扩展版本。
{"title":"Weighted Linear Dynamic Logic","authors":"Manfred Droste, Gustav Grabolle, George Rahonis","doi":"10.1142/s0129054123480088","DOIUrl":"https://doi.org/10.1142/s0129054123480088","url":null,"abstract":"<p>We introduce a weighted linear dynamic logic (weighted LDL for short) and show the expressive equivalence of its formulas to weighted rational expressions. This adds a new characterization for recognizable series to the fundamental Schützenberger theorem. Surprisingly, the equivalence does not require any restriction to our weighted LDL. Our results hold over arbitrary (resp. totally complete) semirings for finite (resp. infinite) words. As a consequence, the equivalence problem for weighted LDL formulas over fields is decidable in doubly exponential time. In contrast to classical logics, we show that our weighted LDL is expressively incomparable to weighted LTL for finite words. We determine a fragment of the weighted LTL such that series over finite and infinite words definable by LTL formulas in this fragment are definable also by weighted LDL formulas. This is an extended version of [17].</p>","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":"38 1","pages":""},"PeriodicalIF":0.8,"publicationDate":"2023-11-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140075369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Foundations of Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1