Pub Date : 2023-06-30DOI: 10.1142/s0129054123420066
Kazuo Iwama, Shuichi Miyazaki
This paper has two objectives. One is to give a linear time algorithm that solves the stable roommates problem (i.e., obtains one stable matching) using the stable marriage problem. The idea is that a stable matching of a roommate instance [Formula: see text] is a stable matching (that however must satisfy a certain condition) of some marriage instance [Formula: see text]. [Formula: see text] is obtained just by making two copies of [Formula: see text], one for the men’s table and the other for the women’s table. The second objective is to investigate the possibility of reducing the roommate problem to the marriage problem (with one-to-one correspondence between their stable matchings) in polynomial time. For a given [Formula: see text], we construct the rotation POSET [Formula: see text] of [Formula: see text] and then we “halve” it to obtain [Formula: see text], by which we can forget the above condition and can use all the closed subsets of [Formula: see text] for all the stable matchings of [Formula: see text]. Unfortunately this approach works (runs in polynomial time) only for restricted instances.
本文有两个目的。一是给出一个线性时间算法,利用稳定婚姻问题求解稳定室友问题(即得到一个稳定匹配)。其思想是,室友实例的稳定匹配[公式:见文本]是某些婚姻实例的稳定匹配(但必须满足特定条件)[公式:见文本]。只需将[公式:见文]复制两份即可得到[公式:见文],一份用于男子牌桌,另一份用于女子牌桌。第二个目标是研究在多项式时间内将室友问题简化为婚姻问题的可能性(他们的稳定匹配之间有一对一的对应关系)。对于给定的[Formula: see text],我们构造[Formula: see text]的旋转POSET [Formula: see text],然后将其“对半”得到[Formula: see text],这样我们就可以忽略上述条件,并且可以使用[Formula: see text]的所有闭子集来进行[Formula: see text]的所有稳定匹配。不幸的是,这种方法只适用于有限的实例(在多项式时间内运行)。
{"title":"Marriage and Roommate","authors":"Kazuo Iwama, Shuichi Miyazaki","doi":"10.1142/s0129054123420066","DOIUrl":"https://doi.org/10.1142/s0129054123420066","url":null,"abstract":"This paper has two objectives. One is to give a linear time algorithm that solves the stable roommates problem (i.e., obtains one stable matching) using the stable marriage problem. The idea is that a stable matching of a roommate instance [Formula: see text] is a stable matching (that however must satisfy a certain condition) of some marriage instance [Formula: see text]. [Formula: see text] is obtained just by making two copies of [Formula: see text], one for the men’s table and the other for the women’s table. The second objective is to investigate the possibility of reducing the roommate problem to the marriage problem (with one-to-one correspondence between their stable matchings) in polynomial time. For a given [Formula: see text], we construct the rotation POSET [Formula: see text] of [Formula: see text] and then we “halve” it to obtain [Formula: see text], by which we can forget the above condition and can use all the closed subsets of [Formula: see text] for all the stable matchings of [Formula: see text]. Unfortunately this approach works (runs in polynomial time) only for restricted instances.","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136016632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-28DOI: 10.1142/s0129054123480015
Christof Löding, W. Thomas
The class of Boolean combinations of tree languages recognized by deterministic top-down tree automata (also known as deterministic root-to-frontier automata) is studied. The problem of determining for a given regular tree language whether it belongs to this class is open. We provide some progress by two results: First, a characterization of this class by a natural extension of deterministic top-down tree automata is presented, and as an application we obtain a convenient method to show that certain regular tree languages are outside this class. In the second result, it is shown that, for fixed [Formula: see text], it is decidable whether a regular tree language is a Boolean combination of [Formula: see text] tree languages recognized by deterministic top-down tree automata.
{"title":"On the Boolean Closure of Deterministic Top-Down Tree Automata","authors":"Christof Löding, W. Thomas","doi":"10.1142/s0129054123480015","DOIUrl":"https://doi.org/10.1142/s0129054123480015","url":null,"abstract":"The class of Boolean combinations of tree languages recognized by deterministic top-down tree automata (also known as deterministic root-to-frontier automata) is studied. The problem of determining for a given regular tree language whether it belongs to this class is open. We provide some progress by two results: First, a characterization of this class by a natural extension of deterministic top-down tree automata is presented, and as an application we obtain a convenient method to show that certain regular tree languages are outside this class. In the second result, it is shown that, for fixed [Formula: see text], it is decidable whether a regular tree language is a Boolean combination of [Formula: see text] tree languages recognized by deterministic top-down tree automata.","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":" ","pages":""},"PeriodicalIF":0.8,"publicationDate":"2023-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44301054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-28DOI: 10.1142/s0129054123410071
Pooja Goyal, B. S. Panda
A set [Formula: see text] of a graph [Formula: see text] is called a connected power dominating set of [Formula: see text] if [Formula: see text], the subgraph induced by [Formula: see text], is connected and every vertex in the graph can be observed from [Formula: see text], following the two observation rules for power system monitoring: Rule [Formula: see text]: if [Formula: see text], then [Formula: see text] can observe itself and all its neighbors, and Rule [Formula: see text]: for an already observed vertex whose all neighbors except one are observed, then the only unobserved neighbor becomes observed as well. Given a graph [Formula: see text], Minimum Connected Power Domination is to find a connected power dominating set of minimum cardinality of [Formula: see text] and Decide Connected Power Domination is the decision version of Minimum Connected Power Domination. Decide Connected Power Domination is known to be NP -complete for general graphs. In this paper, we prove that Decide Connected Power Domination remains NP -complete for star-convex bipartite graphs, perfect elimination bipartite graphs and split graphs. This answers some open problems posed in [B. Brimkov, D. Mikesell and L. Smith, Connected power domination in graphs, J. Comb. Optim. 38(1) (2019) 292–315]. On the positive side, we show that Minimum Connected Power Domination is polynomial-time solvable for chain graphs, a proper subclass of perfect elimination bipartite graph, and for threshold graphs, a proper subclass of split graphs. Further, we show that Minimum Connected Power Domination cannot be approximated within [Formula: see text] for any [Formula: see text] unless [Formula: see text], for bipartite graphs as well as for chordal graphs. Finally, we show that Minimum Connected Power Domination is APX -hard for bounded degree graphs.
{"title":"Hardness Results of Connected Power Domination for Bipartite Graphs and Chordal Graphs","authors":"Pooja Goyal, B. S. Panda","doi":"10.1142/s0129054123410071","DOIUrl":"https://doi.org/10.1142/s0129054123410071","url":null,"abstract":"A set [Formula: see text] of a graph [Formula: see text] is called a connected power dominating set of [Formula: see text] if [Formula: see text], the subgraph induced by [Formula: see text], is connected and every vertex in the graph can be observed from [Formula: see text], following the two observation rules for power system monitoring: Rule [Formula: see text]: if [Formula: see text], then [Formula: see text] can observe itself and all its neighbors, and Rule [Formula: see text]: for an already observed vertex whose all neighbors except one are observed, then the only unobserved neighbor becomes observed as well. Given a graph [Formula: see text], Minimum Connected Power Domination is to find a connected power dominating set of minimum cardinality of [Formula: see text] and Decide Connected Power Domination is the decision version of Minimum Connected Power Domination. Decide Connected Power Domination is known to be NP -complete for general graphs. In this paper, we prove that Decide Connected Power Domination remains NP -complete for star-convex bipartite graphs, perfect elimination bipartite graphs and split graphs. This answers some open problems posed in [B. Brimkov, D. Mikesell and L. Smith, Connected power domination in graphs, J. Comb. Optim. 38(1) (2019) 292–315]. On the positive side, we show that Minimum Connected Power Domination is polynomial-time solvable for chain graphs, a proper subclass of perfect elimination bipartite graph, and for threshold graphs, a proper subclass of split graphs. Further, we show that Minimum Connected Power Domination cannot be approximated within [Formula: see text] for any [Formula: see text] unless [Formula: see text], for bipartite graphs as well as for chordal graphs. Finally, we show that Minimum Connected Power Domination is APX -hard for bounded degree graphs.","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":"185 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135260004","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-28DOI: 10.1142/s0129054123500089
V. Mkrtchyan, Ojas D. Parekh, K. Subramani
This paper is concerned with designing algorithms for and analyzing the computational complexity of the partial vertex cover problem in trees. Graphs (and trees) are frequently used to model risk management in various systems. In particular, Caskurlu et al. in [4] have considered a system which essentially represents a tripartite graph. The goal in this model is to reduce the risk in the system below a predefined risk threshold level. It can be shown that the main goal in this risk management system can be formulated as a Partial Vertex Cover problem on bipartite graphs. In this paper, we focus on a special case of the partial vertex cover problem, when the input graph is a tree. We consider four possible versions of this setting, depending on whether or not, the vertices and edges are weighted. Two of these versions, where edges are assumed to be unweighted, are known to be polynomial-time solvable. However, the computational complexity of this problem with weighted edges, and possibly with weighted vertices, remained open. The main contribution of this paper is to resolve these questions by fully characterizing which variants of partial vertex cover remain NP-hard in trees, and which can be solved in polynomial time. In the paper, we propose two pseudo-polynomial DP-based algorithms for the most general case in which weights are present on both the edges and the vertices of the tree. One of these algorithms leads to a polynomial-time procedure, when weights are confined to the edges of the tree. The insights used in this algorithm are combined with additional scaling ideas to derive an FPTAS for the general case. A secondary contribution of this work is to propose a novel way of using centroid decompositions in trees, which could be useful in other settings as well.
{"title":"Approximation Algorithms for Partial Vertex Covers in Trees","authors":"V. Mkrtchyan, Ojas D. Parekh, K. Subramani","doi":"10.1142/s0129054123500089","DOIUrl":"https://doi.org/10.1142/s0129054123500089","url":null,"abstract":"This paper is concerned with designing algorithms for and analyzing the computational complexity of the partial vertex cover problem in trees. Graphs (and trees) are frequently used to model risk management in various systems. In particular, Caskurlu et al. in [4] have considered a system which essentially represents a tripartite graph. The goal in this model is to reduce the risk in the system below a predefined risk threshold level. It can be shown that the main goal in this risk management system can be formulated as a Partial Vertex Cover problem on bipartite graphs. In this paper, we focus on a special case of the partial vertex cover problem, when the input graph is a tree. We consider four possible versions of this setting, depending on whether or not, the vertices and edges are weighted. Two of these versions, where edges are assumed to be unweighted, are known to be polynomial-time solvable. However, the computational complexity of this problem with weighted edges, and possibly with weighted vertices, remained open. The main contribution of this paper is to resolve these questions by fully characterizing which variants of partial vertex cover remain NP-hard in trees, and which can be solved in polynomial time. In the paper, we propose two pseudo-polynomial DP-based algorithms for the most general case in which weights are present on both the edges and the vertices of the tree. One of these algorithms leads to a polynomial-time procedure, when weights are confined to the edges of the tree. The insights used in this algorithm are combined with additional scaling ideas to derive an FPTAS for the general case. A secondary contribution of this work is to propose a novel way of using centroid decompositions in trees, which could be useful in other settings as well.","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":" ","pages":""},"PeriodicalIF":0.8,"publicationDate":"2023-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44076317","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-28DOI: 10.1142/s0129054123500144
Zhiwei Wang, Chen Tian, Zhanlin Wang, Yuhang Wang
Robust subgroup multisignature allows any subgroup of signers from a global set to sign a given message on behalf of the whole group, and the individual signatures should be verified before the combination process, which resists poison signature attacks. An emerging application of robust subgroup multisignatures in blockchain is that a qualified subgroup of a global set of users has reached agreement. In the integrated blockchain and edge computing system, the edge server can naturally act as a combiner in multisignatures and help other end devices produce the final aggregate signature. In this paper, we propose a robust subgroup multisignature with one-time public keys in order that has two advantages for solving the signers ordering problem and one-time public key problem simultaneously. Our scheme is a nontrivial extension of Galindo et al.’s robust subgroup multisignature scheme and can be proven unforgeable, robust and chronological in random oracles. Our scheme can also be suitable for the consortium blockchain by adding a noninteractive zero-knowledge (NIZK) proof system for certifying the one-time public keys.
{"title":"Robust Subgroup Multisignature with One-Time Public Keys in Order","authors":"Zhiwei Wang, Chen Tian, Zhanlin Wang, Yuhang Wang","doi":"10.1142/s0129054123500144","DOIUrl":"https://doi.org/10.1142/s0129054123500144","url":null,"abstract":"Robust subgroup multisignature allows any subgroup of signers from a global set to sign a given message on behalf of the whole group, and the individual signatures should be verified before the combination process, which resists poison signature attacks. An emerging application of robust subgroup multisignatures in blockchain is that a qualified subgroup of a global set of users has reached agreement. In the integrated blockchain and edge computing system, the edge server can naturally act as a combiner in multisignatures and help other end devices produce the final aggregate signature. In this paper, we propose a robust subgroup multisignature with one-time public keys in order that has two advantages for solving the signers ordering problem and one-time public key problem simultaneously. Our scheme is a nontrivial extension of Galindo et al.’s robust subgroup multisignature scheme and can be proven unforgeable, robust and chronological in random oracles. Our scheme can also be suitable for the consortium blockchain by adding a noninteractive zero-knowledge (NIZK) proof system for certifying the one-time public keys.","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":" ","pages":""},"PeriodicalIF":0.8,"publicationDate":"2023-06-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41719676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-23DOI: 10.1142/s0129054123500120
Huifen Ge, Shumin Zhang, Chengfu Ye
The alternating group network [Formula: see text] can be used to model the topology structure of a large-scale parallel network system. In this work, the structure fault tolerance of alternating group networks based on the star and path structures is investigated. For a graph [Formula: see text] and its a connected subgraph [Formula: see text], the [Formula: see text]-structure connectivity [Formula: see text] (resp. [Formula: see text]-substructure connectivity [Formula: see text]) of [Formula: see text] is the cardinality of a minimum family [Formula: see text] whose every element is isomorphic to [Formula: see text] (resp. isomorphic to a subgraph of [Formula: see text]) such that [Formula: see text] is disconnected. Specifically, we determine [Formula: see text] and [Formula: see text] for [Formula: see text].
{"title":"The Structure Fault Tolerance of Alternating Group Networks","authors":"Huifen Ge, Shumin Zhang, Chengfu Ye","doi":"10.1142/s0129054123500120","DOIUrl":"https://doi.org/10.1142/s0129054123500120","url":null,"abstract":"The alternating group network [Formula: see text] can be used to model the topology structure of a large-scale parallel network system. In this work, the structure fault tolerance of alternating group networks based on the star and path structures is investigated. For a graph [Formula: see text] and its a connected subgraph [Formula: see text], the [Formula: see text]-structure connectivity [Formula: see text] (resp. [Formula: see text]-substructure connectivity [Formula: see text]) of [Formula: see text] is the cardinality of a minimum family [Formula: see text] whose every element is isomorphic to [Formula: see text] (resp. isomorphic to a subgraph of [Formula: see text]) such that [Formula: see text] is disconnected. Specifically, we determine [Formula: see text] and [Formula: see text] for [Formula: see text].","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":" ","pages":""},"PeriodicalIF":0.8,"publicationDate":"2023-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45661814","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-23DOI: 10.1142/s0129054123420054
T. Asano
Suppose we are given a graph with nodes characterized by amounts of supplies and demands of multiple commodities. The amounts of commodities stored at nodes (supplies) are given by positive numbers while those of demands at nodes are given by negative numbers. To meet demands we send commodities from nodes to neighbors by using vehicles, one at each node, with some loading capacity moving to and from neighbors. In this paper we adopt a one-way transportation model in which we just send commodities from a node to one of its neighbors along an edge. When we choose one neighbor at each node, we have a set of trips which naturally define a graph such that each connected component has at most one cycle, which is known as a pseudoforest. We present a linear-time algorithm for deciding whether there is a set of trips that meet all demands using one-way multi-commodity transportations on a pseudoforest with node degrees bounded by a constant. Using the algorithm, we first present an efficient algorithm for finding an optimal set of one-way one-commodity trips that minimize the maximum unmet demand on a pseudoforest, and then extend the idea to a multi-commodity problem on a pseudoforest with node degrees bounded by a constant.
{"title":"Minimizing Maximum Unmet Demand by Transportations Between Adjacent Nodes Characterized by Supplies and Demands","authors":"T. Asano","doi":"10.1142/s0129054123420054","DOIUrl":"https://doi.org/10.1142/s0129054123420054","url":null,"abstract":"Suppose we are given a graph with nodes characterized by amounts of supplies and demands of multiple commodities. The amounts of commodities stored at nodes (supplies) are given by positive numbers while those of demands at nodes are given by negative numbers. To meet demands we send commodities from nodes to neighbors by using vehicles, one at each node, with some loading capacity moving to and from neighbors. In this paper we adopt a one-way transportation model in which we just send commodities from a node to one of its neighbors along an edge. When we choose one neighbor at each node, we have a set of trips which naturally define a graph such that each connected component has at most one cycle, which is known as a pseudoforest. We present a linear-time algorithm for deciding whether there is a set of trips that meet all demands using one-way multi-commodity transportations on a pseudoforest with node degrees bounded by a constant. Using the algorithm, we first present an efficient algorithm for finding an optimal set of one-way one-commodity trips that minimize the maximum unmet demand on a pseudoforest, and then extend the idea to a multi-commodity problem on a pseudoforest with node degrees bounded by a constant.","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":" ","pages":""},"PeriodicalIF":0.8,"publicationDate":"2023-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42306103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-23DOI: 10.1142/s0129054123500107
Baohua Niu, Shuming Zhou, Tao Tian, Qifan Zhang
The fault diameter and wide diameter are commonly used to measure the fault tolerance and transmission delay of interconnection networks beyond traditional diameter. The [Formula: see text]-wide diameter of graph [Formula: see text], denoted by [Formula: see text], is the minimum integer [Formula: see text] such that there exist at least [Formula: see text] internally vertex disjoint paths of length at most [Formula: see text] for any two distinct vertices in [Formula: see text]. The [Formula: see text]-fault diameter of graph [Formula: see text], denoted by [Formula: see text], is the maximum diameter of the survival graph obtained by deleting at most [Formula: see text] vertices in [Formula: see text]. The exchanged crossed cube, as a compounded interconnection network denoted by [Formula: see text], holds the desirable properties of both crossed cube and exchanged hypercube, while achieving a better balanced between cost and performance of the parallel computing systems. In this paper, we construct [Formula: see text] internally vertex disjoint paths between any two distinct vertices of [Formula: see text]. Moreover, we determine the upper and lower bounds of [Formula: see text]-wide diameter and [Formula: see text]-fault diameter of [Formula: see text], i.e., [Formula: see text], which shows that the exchanged crossed cube has better efficiency and reliability than that of the exchanged hypercube.
{"title":"The Wide Diameter and Fault Diameter of Exchanged Crossed Cube","authors":"Baohua Niu, Shuming Zhou, Tao Tian, Qifan Zhang","doi":"10.1142/s0129054123500107","DOIUrl":"https://doi.org/10.1142/s0129054123500107","url":null,"abstract":"The fault diameter and wide diameter are commonly used to measure the fault tolerance and transmission delay of interconnection networks beyond traditional diameter. The [Formula: see text]-wide diameter of graph [Formula: see text], denoted by [Formula: see text], is the minimum integer [Formula: see text] such that there exist at least [Formula: see text] internally vertex disjoint paths of length at most [Formula: see text] for any two distinct vertices in [Formula: see text]. The [Formula: see text]-fault diameter of graph [Formula: see text], denoted by [Formula: see text], is the maximum diameter of the survival graph obtained by deleting at most [Formula: see text] vertices in [Formula: see text]. The exchanged crossed cube, as a compounded interconnection network denoted by [Formula: see text], holds the desirable properties of both crossed cube and exchanged hypercube, while achieving a better balanced between cost and performance of the parallel computing systems. In this paper, we construct [Formula: see text] internally vertex disjoint paths between any two distinct vertices of [Formula: see text]. Moreover, we determine the upper and lower bounds of [Formula: see text]-wide diameter and [Formula: see text]-fault diameter of [Formula: see text], i.e., [Formula: see text], which shows that the exchanged crossed cube has better efficiency and reliability than that of the exchanged hypercube.","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":" ","pages":""},"PeriodicalIF":0.8,"publicationDate":"2023-06-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45306627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-17DOI: 10.1142/s0129054123480027
Erik Paul
We show that the equivalence, unambiguity, and sequentiality problems are decidable for finitely ambiguous max-plus tree automata. A max-plus tree automaton is a weighted tree automaton over the max-plus semiring. A max-plus tree automaton is called finitely ambiguous if the number of accepting runs on every tree is bounded by a global constant and it is called unambiguous if there exists at most one accepting run on every tree. For the equivalence problem, we show that for two finitely ambiguous max-plus tree automata, it is decidable whether both assign the same weight to every tree. For the unambiguity and sequentiality problems, we show that for every finitely ambiguous max-plus tree automaton, both the existence of an equivalent unambiguous automaton and the existence of an equivalent deterministic automaton are decidable.
{"title":"Equivalence, Unambiguity, and Sequentiality of Finitely Ambiguous Max-Plus Tree Automata","authors":"Erik Paul","doi":"10.1142/s0129054123480027","DOIUrl":"https://doi.org/10.1142/s0129054123480027","url":null,"abstract":"We show that the equivalence, unambiguity, and sequentiality problems are decidable for finitely ambiguous max-plus tree automata. A max-plus tree automaton is a weighted tree automaton over the max-plus semiring. A max-plus tree automaton is called finitely ambiguous if the number of accepting runs on every tree is bounded by a global constant and it is called unambiguous if there exists at most one accepting run on every tree. For the equivalence problem, we show that for two finitely ambiguous max-plus tree automata, it is decidable whether both assign the same weight to every tree. For the unambiguity and sequentiality problems, we show that for every finitely ambiguous max-plus tree automaton, both the existence of an equivalent unambiguous automaton and the existence of an equivalent deterministic automaton are decidable.","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":" ","pages":""},"PeriodicalIF":0.8,"publicationDate":"2023-06-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46104198","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-06-16DOI: 10.1142/s0129054123420078
Shin-Ichi Nakano
In this paper we design efficient algorithms for enumerating (1) the rooted trees with exactly [Formula: see text] vertices, (2) the maximal planar graphs with exactly [Formula: see text] vertices and (3) the linear extensions of a given poset. Those algorithms are based on tree structures of objects, called the family trees. The first algorithm enumerates each ordered tree with exactly [Formula: see text] vertices in [Formula: see text] time for each after [Formula: see text] time preprocessing. The second algorithm enumerates each maximal planar graph with exactly [Formula: see text] vertices in [Formula: see text] time for each on average. The third algorithm enumerates each linear extension of a given poset in [Formula: see text] time for each after [Formula: see text] time preprocessing, where [Formula: see text] is the number of the element in the set of the poset.
在本文中,我们设计了有效的算法来枚举(1)具有完全[公式:见文]顶点的根树,(2)具有完全[公式:见文]顶点的最大平面图,以及(3)给定序集的线性扩展。这些算法基于对象的树状结构,称为家谱。第一种算法在[公式:见文本]时间内,为每一个经过[公式:见文本]时间预处理的有序树精确地枚举[公式:见文本]顶点。第二种算法在[公式:见文本]的平均时间内,精确地枚举每个顶点的每个最大平面图。第三种算法在[Formula: see text]时间内枚举给定偏序集的每个线性扩展,在[Formula: see text]时间预处理后的每个扩展,其中[Formula: see text]是偏序集集合中元素的编号。
{"title":"Family Trees for Enumeration","authors":"Shin-Ichi Nakano","doi":"10.1142/s0129054123420078","DOIUrl":"https://doi.org/10.1142/s0129054123420078","url":null,"abstract":"In this paper we design efficient algorithms for enumerating (1) the rooted trees with exactly [Formula: see text] vertices, (2) the maximal planar graphs with exactly [Formula: see text] vertices and (3) the linear extensions of a given poset. Those algorithms are based on tree structures of objects, called the family trees. The first algorithm enumerates each ordered tree with exactly [Formula: see text] vertices in [Formula: see text] time for each after [Formula: see text] time preprocessing. The second algorithm enumerates each maximal planar graph with exactly [Formula: see text] vertices in [Formula: see text] time for each on average. The third algorithm enumerates each linear extension of a given poset in [Formula: see text] time for each after [Formula: see text] time preprocessing, where [Formula: see text] is the number of the element in the set of the poset.","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":" ","pages":""},"PeriodicalIF":0.8,"publicationDate":"2023-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42717376","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}