首页 > 最新文献

International Journal of Foundations of Computer Science最新文献

英文 中文
The B-Prize-Collecting Multicut Problem in Paths, Spider Graphs and Rings 路径、蜘蛛图和环中的b奖收集多切问题
IF 0.8 4区 计算机科学 Q4 Computer Science Pub Date : 2023-03-22 DOI: 10.1142/s0129054123460012
Xiaofei Liu, Weidong Li
Given a graph [Formula: see text], a set of [Formula: see text] source-sink pairs [Formula: see text] [Formula: see text] and a profit bound [Formula: see text], every edge [Formula: see text] has a cost [Formula: see text], and every source-sink pair [Formula: see text] has a profit [Formula: see text] and a penalty [Formula: see text]. The [Formula: see text]-prize-collecting multicut problem ([Formula: see text]-PCMP) is to find a multicut [Formula: see text] such that the objective cost, which consists of the total cost of the edges in [Formula: see text] and the total penalty of the pairs still connected after removing [Formula: see text], is minimized and the total profit of the disconnected pairs by removing [Formula: see text] is at least [Formula: see text]. In this paper, we firstly consider the [Formula: see text]-PCMP in paths, and prove that it is [Formula: see text]-hard even when [Formula: see text] for any [Formula: see text]. Then, we present a fully polynomial time approximation scheme (FPTAS) whose running time is [Formula: see text] for the [Formula: see text]-PCMP in paths. Based on this algorithm, we present an FPTAS whose running time is [Formula: see text] for the [Formula: see text]-PCMP in spider graphs, and an FPTAS whose running time is [Formula: see text] for the [Formula: see text]-PCMP in rings, respectively, where [Formula: see text] is the number of leaves of spider graph.
给定一个图[公式:见文],一组[公式:见文]源汇对[公式:见文][公式:见文]和一个利润界限[公式:见文],每条边[公式:见文]都有一个成本[公式:见文],每个源汇对[公式:见文]都有一个利润[公式:见文]和一个损失[公式:见文]。[公式:见文]-计奖多切口问题([公式:见文]-PCMP)是寻找一个多切口[公式:见文],使[公式:见文]中边缘的总成本和去除[公式:见文]后仍然连接的对的总惩罚的客观成本最小,并且通过去除[公式:见文]而断开的对的总利润至少为[公式:见文]。本文首先考虑路径中的[Formula: see text]-PCMP,并证明对于任何[Formula: see text],即使[Formula: see text]是[Formula: see text]-hard。然后,我们提出了一个完全多项式时间近似方案(FPTAS),其运行时间为[公式:见文本]-路径中的pcmp。在此算法的基础上,我们提出了一个运行时间为[公式:见文]的蜘蛛图-PCMP的FPTAS,以及一个运行时间为[公式:见文]的[公式:见文]的[圆环]-PCMP的FPTAS,其中[公式:见文]为蜘蛛图的叶子数。
{"title":"The B-Prize-Collecting Multicut Problem in Paths, Spider Graphs and Rings","authors":"Xiaofei Liu, Weidong Li","doi":"10.1142/s0129054123460012","DOIUrl":"https://doi.org/10.1142/s0129054123460012","url":null,"abstract":"Given a graph [Formula: see text], a set of [Formula: see text] source-sink pairs [Formula: see text] [Formula: see text] and a profit bound [Formula: see text], every edge [Formula: see text] has a cost [Formula: see text], and every source-sink pair [Formula: see text] has a profit [Formula: see text] and a penalty [Formula: see text]. The [Formula: see text]-prize-collecting multicut problem ([Formula: see text]-PCMP) is to find a multicut [Formula: see text] such that the objective cost, which consists of the total cost of the edges in [Formula: see text] and the total penalty of the pairs still connected after removing [Formula: see text], is minimized and the total profit of the disconnected pairs by removing [Formula: see text] is at least [Formula: see text]. In this paper, we firstly consider the [Formula: see text]-PCMP in paths, and prove that it is [Formula: see text]-hard even when [Formula: see text] for any [Formula: see text]. Then, we present a fully polynomial time approximation scheme (FPTAS) whose running time is [Formula: see text] for the [Formula: see text]-PCMP in paths. Based on this algorithm, we present an FPTAS whose running time is [Formula: see text] for the [Formula: see text]-PCMP in spider graphs, and an FPTAS whose running time is [Formula: see text] for the [Formula: see text]-PCMP in rings, respectively, where [Formula: see text] is the number of leaves of spider graph.","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2023-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45350162","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Node and Link Vulnerability in Complete Multipartite Networks 完全多方网络中的节点和链路漏洞
IF 0.8 4区 计算机科学 Q4 Computer Science Pub Date : 2023-03-21 DOI: 10.1142/s0129054123500077
Zeynep Nihan Berberler, A. Aytaç
Networks are known to be prone to node or link failures. A central issue in the analysis of networks is the assessment of their stability and reliability. A central concept that is used to assess stability and robustness of the performance of a network under failures is that of vulnerability. Node and link residual closeness are novel sensitive graph based characteristics for network vulnerability analysis. Node and link residual closeness measure the vulnerability even when the removal of nodes or links does not disconnect the network. Node and link residual closeness are of great theoretical and practical significance to network design and optimization. In this paper, vulnerabilities of multipartite network type topologies to the failure of individual nodes and links are computed via node and link residual closeness which provides a much fuller characterization of the network. Then, how multipartite network type topologies perform when they suffer a node or a link failure is analyzed.
众所周知,网络容易出现节点或链路故障。网络分析的一个中心问题是对其稳定性和可靠性的评估。用于评估故障下网络性能的稳定性和健壮性的一个中心概念是脆弱性。节点和链路残差接近度是一种新的基于敏感图的网络脆弱性分析特征。节点和链路的剩余紧密度衡量的是即使移除节点或链路也不会导致网络断开的脆弱性。节点和链路剩余紧密度对网络设计和优化具有重要的理论和现实意义。本文通过节点和链路残差接近度计算了多部网络类型拓扑对单个节点和链路失效的脆弱性,从而提供了更全面的网络表征。然后,分析了多部网络类型拓扑在遭受节点或链路故障时的表现。
{"title":"Node and Link Vulnerability in Complete Multipartite Networks","authors":"Zeynep Nihan Berberler, A. Aytaç","doi":"10.1142/s0129054123500077","DOIUrl":"https://doi.org/10.1142/s0129054123500077","url":null,"abstract":"Networks are known to be prone to node or link failures. A central issue in the analysis of networks is the assessment of their stability and reliability. A central concept that is used to assess stability and robustness of the performance of a network under failures is that of vulnerability. Node and link residual closeness are novel sensitive graph based characteristics for network vulnerability analysis. Node and link residual closeness measure the vulnerability even when the removal of nodes or links does not disconnect the network. Node and link residual closeness are of great theoretical and practical significance to network design and optimization. In this paper, vulnerabilities of multipartite network type topologies to the failure of individual nodes and links are computed via node and link residual closeness which provides a much fuller characterization of the network. Then, how multipartite network type topologies perform when they suffer a node or a link failure is analyzed.","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2023-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41565969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The Range of State Complexities of Languages Resulting from the Cascade Product — The Unary Case 由级联积引起的语言状态复杂性的范围-一元情况
IF 0.8 4区 计算机科学 Q4 Computer Science Pub Date : 2023-03-18 DOI: 10.1142/s0129054123430049
M. Holzer, C. Rauch
We investigate the state complexity of languages resulting from the cascade product of two minimal deterministic finite automata with [Formula: see text] and [Formula: see text] states, respectively. More precisely we study the magic number problem of the cascade product operation and show what range of complexities can be produced in case the left automaton is unary, that is, has only a singleton letter alphabet. Here we distinguish the cases when the involved automata are reset automata, permutation automata, permutation-reset automata, or do not have any restriction on their structure. It turns out that the picture on the obtained state complexities of the cascade product is diverse, and for all cases, except where the left automaton is a unary permutation(-reset) or a deterministic finite automaton without structural restrictions, and the right one is a reset automaton or a deterministic finite automaton without structural restrictions, we are able to identify state sizes that cannot be reached — these numbers are called “magic.”
我们研究了由两个最小确定性有限自动机的级联积所产生的语言的状态复杂性,它们分别具有[公式:见文]和[公式:见文]状态。更准确地说,我们研究了级联积运算的幻数问题,并展示了当左自动机是一元的情况下,即只有一个单字母字母表时,可以产生的复杂性范围。在这里,我们区分了所涉及的自动机是重置自动机、置换自动机、置换-重置自动机,以及对其结构没有任何限制的情况。结果表明,获得的级联积状态复杂性的图像是多种多样的,对于所有情况,除了左边的自动机是一元排列(重置)或没有结构限制的确定性有限自动机,右边的是重置自动机或没有结构限制的确定性有限自动机,我们能够识别无法达到的状态大小-这些数字被称为“魔法”。
{"title":"The Range of State Complexities of Languages Resulting from the Cascade Product — The Unary Case","authors":"M. Holzer, C. Rauch","doi":"10.1142/s0129054123430049","DOIUrl":"https://doi.org/10.1142/s0129054123430049","url":null,"abstract":"We investigate the state complexity of languages resulting from the cascade product of two minimal deterministic finite automata with [Formula: see text] and [Formula: see text] states, respectively. More precisely we study the magic number problem of the cascade product operation and show what range of complexities can be produced in case the left automaton is unary, that is, has only a singleton letter alphabet. Here we distinguish the cases when the involved automata are reset automata, permutation automata, permutation-reset automata, or do not have any restriction on their structure. It turns out that the picture on the obtained state complexities of the cascade product is diverse, and for all cases, except where the left automaton is a unary permutation(-reset) or a deterministic finite automaton without structural restrictions, and the right one is a reset automaton or a deterministic finite automaton without structural restrictions, we are able to identify state sizes that cannot be reached — these numbers are called “magic.”","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2023-03-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42807655","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Linear Codes and Linear Complementary Pairs of Codes Over a Non-Chain Ring 非链环上的线性码和线性互补码对
IF 0.8 4区 计算机科学 Q4 Computer Science Pub Date : 2023-03-14 DOI: 10.1142/s012905412350003x
Xiangdong Cheng, X. Cao, Liqin Qian
Let [Formula: see text] be an odd prime number, [Formula: see text] for a positive integer [Formula: see text], let [Formula: see text] be the finite field with [Formula: see text] elements and [Formula: see text] be a primitive element of [Formula: see text]. We first give an orthogonal decomposition of the ring [Formula: see text], where [Formula: see text] and [Formula: see text] for a fixed integer [Formula: see text]. In addition, Galois dual of a linear code over [Formula: see text] is discussed. Meanwhile, constacyclic codes and cyclic codes over the ring [Formula: see text] are investigated as well. Remarkably, we obtain that if linear codes [Formula: see text] and [Formula: see text] are a complementary pair, then the code [Formula: see text] and the dual code [Formula: see text] of [Formula: see text] are equivalent to each other.
设[Former:see-text]为奇数素数,[Former:see-text]表示正整数[Former:see-text],设[FormName:see-text]=具有[Former:see-text][Former:see-txt]元素的有限域,[FormName:see-text][former:see-text的基元。我们首先给出了环的正交分解[Former:see-text],其中[Former:see-text]和[Former:see-text]是固定整数[Former:see-text]。此外,还讨论了[公式:见正文]上线性码的Galois对偶。同时,还研究了环上的常循环码和循环码[公式:见正文]。值得注意的是,我们得到了如果线性码[Former:see-text]和[Former:see-text]是一对互补码,那么代码[Former:see-text]和[公式:see-text'的对偶码[Formm:see-text]。
{"title":"Linear Codes and Linear Complementary Pairs of Codes Over a Non-Chain Ring","authors":"Xiangdong Cheng, X. Cao, Liqin Qian","doi":"10.1142/s012905412350003x","DOIUrl":"https://doi.org/10.1142/s012905412350003x","url":null,"abstract":"Let [Formula: see text] be an odd prime number, [Formula: see text] for a positive integer [Formula: see text], let [Formula: see text] be the finite field with [Formula: see text] elements and [Formula: see text] be a primitive element of [Formula: see text]. We first give an orthogonal decomposition of the ring [Formula: see text], where [Formula: see text] and [Formula: see text] for a fixed integer [Formula: see text]. In addition, Galois dual of a linear code over [Formula: see text] is discussed. Meanwhile, constacyclic codes and cyclic codes over the ring [Formula: see text] are investigated as well. Remarkably, we obtain that if linear codes [Formula: see text] and [Formula: see text] are a complementary pair, then the code [Formula: see text] and the dual code [Formula: see text] of [Formula: see text] are equivalent to each other.","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2023-03-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47356782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ambiguity Hierarchies for Weighted Tree Automata 加权树自动机的歧义层次
4区 计算机科学 Q4 Computer Science Pub Date : 2023-03-02 DOI: 10.1142/s0129054123430013
Andreas Maletti, Teodora Nasz, Kevin Stier, Markus Ulbricht
Weighted tree automata (WTA) extend classical weighted automata (WA) to the non-linear structure of trees. The expressive power of WA with varying degrees of ambiguity has been extensively studied. Unambiguous, finitely ambiguous, and polynomially ambiguous WA over the tropical (as well as the arctic) semiring strictly increase in expressive power. The recently developed pumping results of Mazowiecki and Riveros (STACS 2018) are lifted to trees in order to achieve the same strict hierarchy for WTA over the tropical (as well as the arctic) semiring.
加权树自动机(Weighted tree automata, WTA)是将经典加权自动机扩展到树的非线性结构。不同程度歧义的WA的表达能力已被广泛研究。在热带(以及北极)半环上,无模糊、有限模糊和多项式模糊的WA在表达能力上严格增加。Mazowiecki和Riveros最近开发的泵送结果(STACS 2018)被提升到树木上,以便在热带(以及北极)半采油中实现同样严格的WTA等级。
{"title":"Ambiguity Hierarchies for Weighted Tree Automata","authors":"Andreas Maletti, Teodora Nasz, Kevin Stier, Markus Ulbricht","doi":"10.1142/s0129054123430013","DOIUrl":"https://doi.org/10.1142/s0129054123430013","url":null,"abstract":"Weighted tree automata (WTA) extend classical weighted automata (WA) to the non-linear structure of trees. The expressive power of WA with varying degrees of ambiguity has been extensively studied. Unambiguous, finitely ambiguous, and polynomially ambiguous WA over the tropical (as well as the arctic) semiring strictly increase in expressive power. The recently developed pumping results of Mazowiecki and Riveros (STACS 2018) are lifted to trees in order to achieve the same strict hierarchy for WTA over the tropical (as well as the arctic) semiring.","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.0,"publicationDate":"2023-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135423678","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Preface 前言
IF 0.8 4区 计算机科学 Q4 Computer Science Pub Date : 2023-02-23 DOI: 10.1142/s0129054123020021
Sebastian Maneth
{"title":"Preface","authors":"Sebastian Maneth","doi":"10.1142/s0129054123020021","DOIUrl":"https://doi.org/10.1142/s0129054123020021","url":null,"abstract":"","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44140166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hamiltonian-Based Efficient Algorithms for Legalization with Neighbor Diffusion Effect 基于哈密顿量的具有邻居扩散效应的合法化有效算法
IF 0.8 4区 计算机科学 Q4 Computer Science Pub Date : 2023-02-16 DOI: 10.1142/s0129054122460108
Hao Sun, Longkun Guo, Xiaoyan Zhang
Neighbor diffusion effect (NDE) is a crucial aspect in advanced technology node that is well-known for its infamous consequence of significant performance decrement of the circuit. In this paper, we observe that NDE is caused by different diffusion heights (the number of fins) between two adjacent cells, and consider reducing the number of height differences in single row to reduce NDE violations. Ignoring the movement of the cells, we first propose a Hamiltonian-completion-based algorithm that reorders the cells in the row such that the number of NDE violations is reduced to a near-optimal value. Then, for a given fixed integer [Formula: see text], we devise an algorithm to compute the new positions of cells, such that the number of NDE violations is bounded by [Formula: see text] and the maximum displacement is minimized. Moreover, we extend our algorithm for legalization in multiple rows against mixed-height cells. Experimental results show that our algorithm reduces the NDE violations to a near-optimal minimum without any area overheads while achieving a better practical running time compared to baselines conforming with the theoretical analysis.
邻居扩散效应(NDE)是先进技术节点中的一个关键方面,它以电路性能显著下降的臭名昭著的后果而闻名。在本文中,我们观察到NDE是由两个相邻单元之间不同的扩散高度(翅片数量)引起的,并考虑减少单行中的高度差数量,以减少NDE违规行为。忽略单元的移动,我们首先提出了一种基于哈密顿完成的算法,该算法对行中的单元进行重新排序,从而将NDE违规次数减少到接近最优的值。然后,对于给定的固定整数[公式:见正文],我们设计了一种算法来计算单元的新位置,使得无损检测违规的数量受[公式:参见正文]的限制,并且最大位移最小化。此外,我们扩展了针对混合高度单元格的多行合法化算法。实验结果表明,与符合理论分析的基线相比,我们的算法在没有任何面积开销的情况下将NDE违规减少到接近最优的最小值,同时实现了更好的实际运行时间。
{"title":"Hamiltonian-Based Efficient Algorithms for Legalization with Neighbor Diffusion Effect","authors":"Hao Sun, Longkun Guo, Xiaoyan Zhang","doi":"10.1142/s0129054122460108","DOIUrl":"https://doi.org/10.1142/s0129054122460108","url":null,"abstract":"Neighbor diffusion effect (NDE) is a crucial aspect in advanced technology node that is well-known for its infamous consequence of significant performance decrement of the circuit. In this paper, we observe that NDE is caused by different diffusion heights (the number of fins) between two adjacent cells, and consider reducing the number of height differences in single row to reduce NDE violations. Ignoring the movement of the cells, we first propose a Hamiltonian-completion-based algorithm that reorders the cells in the row such that the number of NDE violations is reduced to a near-optimal value. Then, for a given fixed integer [Formula: see text], we devise an algorithm to compute the new positions of cells, such that the number of NDE violations is bounded by [Formula: see text] and the maximum displacement is minimized. Moreover, we extend our algorithm for legalization in multiple rows against mixed-height cells. Experimental results show that our algorithm reduces the NDE violations to a near-optimal minimum without any area overheads while achieving a better practical running time compared to baselines conforming with the theoretical analysis.","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2023-02-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44766452","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Novel Image Clustering Algorithm Based on Supported Nearest Neighbors 一种新的基于支持近邻的图像聚类算法
IF 0.8 4区 计算机科学 Q4 Computer Science Pub Date : 2023-02-08 DOI: 10.1142/s0129054122460017
Lin Li, Feng Zhang, Jiashuai Zhang, Qiang Hua, Chun-Ru Dong, C. Lim
Unsupervised image clustering is a challenging task in computer vision. Recently, various deep clustering algorithms based on contrastive learning have achieved promising performance and some distinguishable features representation were obtained only by taking different augmented views of same image as positive pairs and maximizing their similarities, whereas taking other images’ augmentations in the same batch as negative pairs and minimizing their similarities. However, due to the fact that there is more than one image in a batch belong to the same class, simply pushing the negative instances apart will result in inter-class conflictions and lead to the clustering performance degradation. In order to solve this problem, we propose a deep clustering algorithm based on supported nearest neighbors (SNDC), which constructs positive pairs of current images by maintaining a support set and find its k nearest neighbors from the support set. By going beyond single instance positive, SNDC can learn more generalized features representation with inherent semantic meaning and therefore alleviating inter-class conflictions. Experimental results on multiple benchmark datasets show that the performance of SNDC is superior to the state-of-the-art clustering models, with accuracy improvement of 6.2% and 20.5% on CIFAR-10 and ImageNet-Dogs respectively.
无监督图像聚类是计算机视觉中一项具有挑战性的任务。近年来,各种基于对比学习的深度聚类算法取得了良好的性能,仅通过将同一图像的不同增强视图作为正对并最大化其相似性,而将同一批次中的其他图像的增强视为负对并最小化其相似性就可以获得一些可区分的特征表示。然而,由于一个批中有多个映像属于同一类,简单地将负面实例分开会导致类间冲突,并导致集群性能下降。为了解决这个问题,我们提出了一种基于支持近邻的深度聚类算法(SNDC),该算法通过维护一个支持集来构造当前图像的正对,并从支持集中找到其k个近邻。通过超越单实例正态,SNDC可以学习到更多具有内在语义的广义特征表示,从而缓解类间冲突。在多个基准数据集上的实验结果表明,SNDC的性能优于最先进的聚类模型,在CIFAR-10和ImageNet Dogs上的准确率分别提高了6.2%和20.5%。
{"title":"A Novel Image Clustering Algorithm Based on Supported Nearest Neighbors","authors":"Lin Li, Feng Zhang, Jiashuai Zhang, Qiang Hua, Chun-Ru Dong, C. Lim","doi":"10.1142/s0129054122460017","DOIUrl":"https://doi.org/10.1142/s0129054122460017","url":null,"abstract":"Unsupervised image clustering is a challenging task in computer vision. Recently, various deep clustering algorithms based on contrastive learning have achieved promising performance and some distinguishable features representation were obtained only by taking different augmented views of same image as positive pairs and maximizing their similarities, whereas taking other images’ augmentations in the same batch as negative pairs and minimizing their similarities. However, due to the fact that there is more than one image in a batch belong to the same class, simply pushing the negative instances apart will result in inter-class conflictions and lead to the clustering performance degradation. In order to solve this problem, we propose a deep clustering algorithm based on supported nearest neighbors (SNDC), which constructs positive pairs of current images by maintaining a support set and find its k nearest neighbors from the support set. By going beyond single instance positive, SNDC can learn more generalized features representation with inherent semantic meaning and therefore alleviating inter-class conflictions. Experimental results on multiple benchmark datasets show that the performance of SNDC is superior to the state-of-the-art clustering models, with accuracy improvement of 6.2% and 20.5% on CIFAR-10 and ImageNet-Dogs respectively.","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2023-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48434727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Influential Node Identification of Network Based on Agglomeration Operation 基于聚集运算的网络影响节点识别
IF 0.8 4区 计算机科学 Q4 Computer Science Pub Date : 2023-02-08 DOI: 10.1142/s0129054123500028
Baohua Niu, Shuming Zhou, Hong Zhang
Networks with distinct topological structures varies in the ability to resist different kinds of attacks. Node protection in terms of node importance is an effective way to ensure the reliable communication of networks. Thus, the protection of influential node detected by node importance evaluation is beneficial to strengthen the invulnerability and robustness of networks. In this work, the network agglomeration method based on node contraction is utilized to evaluate the influence of nodes and identify important nodes in five kinds of interconnection networks. We show that the agglomeration method, which takes both the degree and position into account, is valid and feasible for these five interconnection networks.
具有不同拓扑结构的网络,其抵御不同类型攻击的能力也不同。从节点重要性的角度来说,节点保护是保证网络可靠通信的有效手段。因此,通过节点重要性评估检测对影响节点的保护,有利于增强网络的不脆弱性和鲁棒性。本文利用基于节点收缩的网络集聚方法,在五种互联网络中评估节点的影响,识别重要节点。结果表明,考虑程度和位置的集聚方法对这五种互联网络是有效和可行的。
{"title":"Influential Node Identification of Network Based on Agglomeration Operation","authors":"Baohua Niu, Shuming Zhou, Hong Zhang","doi":"10.1142/s0129054123500028","DOIUrl":"https://doi.org/10.1142/s0129054123500028","url":null,"abstract":"Networks with distinct topological structures varies in the ability to resist different kinds of attacks. Node protection in terms of node importance is an effective way to ensure the reliable communication of networks. Thus, the protection of influential node detected by node importance evaluation is beneficial to strengthen the invulnerability and robustness of networks. In this work, the network agglomeration method based on node contraction is utilized to evaluate the influence of nodes and identify important nodes in five kinds of interconnection networks. We show that the agglomeration method, which takes both the degree and position into account, is valid and feasible for these five interconnection networks.","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2023-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42435034","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Balanced Even-Variable Rotation Symmetric Boolean Functions with Optimal Algebraic Immunity, Maximum Algebraic Degree and Higher Nonlinearity 具有最优代数免疫、最大代数度和高非线性的平衡偶变旋转对称布尔函数
IF 0.8 4区 计算机科学 Q4 Computer Science Pub Date : 2023-02-06 DOI: 10.1142/s0129054123500016
Fei Guo, Zilong Wang
Rotation symmetric Boolean functions are good candidates for stream ciphers because they have such advantages as simple structure, high operational speed and low implement cost. Recently, Mesnager et al. proposed for the first time an efficient method to construct balanced rotation symmetric Boolean functions with optimal algebraic immunity and good nonlinearity for an arbitrary even number of variables. However, the algebraic degree of their constructed [Formula: see text]-variable ([Formula: see text]) function is always less than the maximum value [Formula: see text]. In this paper, by modifying the support of Boolean functions from Mesnager et al.’s construction, we present two new constructions of balanced even-variable rotation symmetric Boolean functions with optimal algebraic immunity as well as higher algebraic degree and nonlinearity. The algebraic degree of Boolean functions in the first construction reaches the maximum value [Formula: see text] if [Formula: see text] is odd and [Formula: see text] or [Formula: see text] for integer [Formula: see text], while that of the second construction reaches the maximum value for all [Formula: see text]. Moreover, the nonlinearities of Boolean functions in both two constructions are higher than that of Mesnager et al.’s construction.
旋转对称布尔函数具有结构简单、运算速度快、实现成本低等优点,是流密码的理想选择。最近,Mesnager等人首次提出了一种构造对任意偶数变量具有最优代数免疫和良好非线性的平衡旋转对称布尔函数的有效方法。然而,它们构造的[公式:见文]-变量([公式:见文])函数的代数度总是小于最大值[公式:见文]。本文通过对Mesnager等构造的布尔函数的支持进行修正,给出了两种具有最优代数免疫、较高代数度和非线性的平衡偶变旋转对称布尔函数的新构造。当[Formula: see text]为奇数,[Formula: see text]或[Formula: see text]为整数[Formula: see text]时,第一种结构中的布尔函数的代数度达到最大值[公式:见文],而第二种结构中的布尔函数的代数度达到所有[公式:见文]的最大值。而且,这两种构造的布尔函数的非线性程度都高于Mesnager等人的构造。
{"title":"Balanced Even-Variable Rotation Symmetric Boolean Functions with Optimal Algebraic Immunity, Maximum Algebraic Degree and Higher Nonlinearity","authors":"Fei Guo, Zilong Wang","doi":"10.1142/s0129054123500016","DOIUrl":"https://doi.org/10.1142/s0129054123500016","url":null,"abstract":"Rotation symmetric Boolean functions are good candidates for stream ciphers because they have such advantages as simple structure, high operational speed and low implement cost. Recently, Mesnager et al. proposed for the first time an efficient method to construct balanced rotation symmetric Boolean functions with optimal algebraic immunity and good nonlinearity for an arbitrary even number of variables. However, the algebraic degree of their constructed [Formula: see text]-variable ([Formula: see text]) function is always less than the maximum value [Formula: see text]. In this paper, by modifying the support of Boolean functions from Mesnager et al.’s construction, we present two new constructions of balanced even-variable rotation symmetric Boolean functions with optimal algebraic immunity as well as higher algebraic degree and nonlinearity. The algebraic degree of Boolean functions in the first construction reaches the maximum value [Formula: see text] if [Formula: see text] is odd and [Formula: see text] or [Formula: see text] for integer [Formula: see text], while that of the second construction reaches the maximum value for all [Formula: see text]. Moreover, the nonlinearities of Boolean functions in both two constructions are higher than that of Mesnager et al.’s construction.","PeriodicalId":50323,"journal":{"name":"International Journal of Foundations of Computer Science","volume":null,"pages":null},"PeriodicalIF":0.8,"publicationDate":"2023-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"47867507","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
International Journal of Foundations of Computer Science
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1