Pub Date : 2023-05-01DOI: 10.1016/j.disopt.2023.100773
Natalia de Castro , María A. Garrido-Vizuete , Rafael Robles , María Trinidad Villar-Liñán
In this paper we present the notion of greyscale of a graph as a colouring of its vertices that uses colours from the real interval [0,1]. Any greyscale induces another colouring by assigning to each edge the non-negative difference between the colours of its vertices. These edge colours are ordered in lexicographical decreasing ordering and give rise to a new element of the graph: the gradation vector. We introduce the notion of minimum gradation vector as a new invariant for the graph and give polynomial algorithms to obtain it. These algorithms also output all greyscales that produce the minimum gradation vector. This way we tackle and solve a novel vectorial optimization problem in graphs that may generate more satisfactory solutions than those generated by known scalar optimization approaches.
{"title":"Minimum gradation in greyscales of graphs","authors":"Natalia de Castro , María A. Garrido-Vizuete , Rafael Robles , María Trinidad Villar-Liñán","doi":"10.1016/j.disopt.2023.100773","DOIUrl":"https://doi.org/10.1016/j.disopt.2023.100773","url":null,"abstract":"<div><p>In this paper we present the notion of greyscale of a graph as a colouring of its vertices that uses colours from the real interval [0,1]. Any greyscale induces another colouring by assigning to each edge the non-negative difference between the colours of its vertices. These edge colours are ordered in lexicographical decreasing ordering and give rise to a new element of the graph: the gradation vector. We introduce the notion of minimum gradation vector as a new invariant for the graph and give polynomial algorithms to obtain it. These algorithms also output all greyscales that produce the minimum gradation vector. This way we tackle and solve a novel vectorial optimization problem in graphs that may generate more satisfactory solutions than those generated by known scalar optimization approaches.</p></div>","PeriodicalId":50571,"journal":{"name":"Discrete Optimization","volume":"48 ","pages":"Article 100773"},"PeriodicalIF":1.1,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49809019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-05-01DOI: 10.1016/j.disopt.2023.100771
Jan Boeckmann , Clemens Thielen , Ulrich Pferschy
We present a fully polynomial-time approximation scheme (FPTAS) for a very general version of the well-known knapsack problem. This generalization covers, with few exceptions, all versions of knapsack problems that have been studied in the literature so far and allows for an objective function consisting of sums or products of possibly nonlinear, separable item profits, while the knapsack constraint states an upper bound on the sum of possibly nonlinear, separable item weights. Moreover, we extend our FPTAS to a multi-objective fully polynomial-time approximation scheme (MFPTAS) for the multi-objective version of the problem.
As applications of our general algorithms, we obtain the first FPTAS for the recently-introduced 0–1 time-bomb knapsack problem as well as FPTASs for a variety of robust knapsack problems. Moreover, we extend our FPTAS to the minimization version of our general problem, which, in particular, allows us to explicitly state an FPTAS for the classical minimization knapsack problem, which has been missing in the literature so far.
{"title":"Approximating single- and multi-objective nonlinear sum and product knapsack problems","authors":"Jan Boeckmann , Clemens Thielen , Ulrich Pferschy","doi":"10.1016/j.disopt.2023.100771","DOIUrl":"https://doi.org/10.1016/j.disopt.2023.100771","url":null,"abstract":"<div><p>We present a fully polynomial-time approximation scheme (FPTAS) for a very general version of the well-known knapsack problem. This generalization covers, with few exceptions, all versions of knapsack problems that have been studied in the literature so far and allows for an objective function consisting of sums or products of possibly nonlinear, separable item profits, while the knapsack constraint states an upper bound on the sum of possibly nonlinear, separable item weights. Moreover, we extend our FPTAS to a multi-objective fully polynomial-time approximation scheme (MFPTAS) for the multi-objective version of the problem.</p><p>As applications of our general algorithms, we obtain the first FPTAS for the recently-introduced 0–1 time-bomb knapsack problem as well as FPTASs for a variety of robust knapsack problems. Moreover, we extend our FPTAS to the minimization version of our general problem, which, in particular, allows us to explicitly state an FPTAS for the classical minimization knapsack problem, which has been missing in the literature so far.</p></div>","PeriodicalId":50571,"journal":{"name":"Discrete Optimization","volume":"48 ","pages":"Article 100771"},"PeriodicalIF":1.1,"publicationDate":"2023-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49809024","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-01DOI: 10.1016/j.disopt.2022.100753
Sven Jäger
Most practical scheduling applications involve some uncertainty about the arriving times and lengths of the jobs. Stochastic online scheduling is a well-established model capturing this. Here the arrivals occur online, while the processing times are random. For this model, Gupta, Moseley, Uetz, and Xie recently devised an efficient policy for non-preemptive scheduling on unrelated machines with the objective to minimize the expected total weighted completion time. We improve upon this policy by adroitly combining greedy job assignment with -point scheduling on each machine. In this way we obtain a -competitive deterministic and an -competitive randomized stochastic online scheduling policy, where is an upper bound on the squared coefficients of variation of the processing times. We also give constant performance guarantees for these policies within the class of all fixed-assignment policies. The -point scheduling on a single machine can be enhanced when the upper bound is known a priori or the processing times are known to be -NBUE for some . This implies improved competitive ratios for unrelated machines but may also be of independent interest.
{"title":"An improved greedy algorithm for stochastic online scheduling on unrelated machines","authors":"Sven Jäger","doi":"10.1016/j.disopt.2022.100753","DOIUrl":"https://doi.org/10.1016/j.disopt.2022.100753","url":null,"abstract":"<div><p>Most practical scheduling applications involve some uncertainty about the arriving times and lengths of the jobs. Stochastic online scheduling is a well-established model capturing this. Here the arrivals occur online, while the processing times are random. For this model, Gupta, Moseley, Uetz, and Xie recently devised an efficient policy for non-preemptive scheduling on unrelated machines with the objective to minimize the expected total weighted completion time. We improve upon this policy by adroitly combining greedy job assignment with <span><math><msub><mrow><mi>α</mi></mrow><mrow><mi>j</mi></mrow></msub></math></span>-point scheduling on each machine. In this way we obtain a <span><math><mrow><mrow><mo>(</mo><mn>3</mn><mo>+</mo><msqrt><mrow><mn>5</mn></mrow></msqrt><mo>)</mo></mrow><mrow><mo>(</mo><mn>2</mn><mo>+</mo><mi>Δ</mi><mo>)</mo></mrow></mrow></math></span>-competitive deterministic and an <span><math><mrow><mo>(</mo><mn>8</mn><mo>+</mo><mn>4</mn><mi>Δ</mi><mo>)</mo></mrow></math></span>-competitive randomized stochastic online scheduling policy, where <span><math><mi>Δ</mi></math></span> is an upper bound on the squared coefficients of variation of the processing times. We also give constant performance guarantees for these policies within the class of all fixed-assignment policies. The <span><math><msub><mrow><mi>α</mi></mrow><mrow><mi>j</mi></mrow></msub></math></span>-point scheduling on a single machine can be enhanced when the upper bound <span><math><mi>Δ</mi></math></span> is known a priori or the processing times are known to be <span><math><mi>δ</mi></math></span>-NBUE for some <span><math><mrow><mi>δ</mi><mo>≥</mo><mn>1</mn></mrow></math></span><span>. This implies improved competitive ratios for unrelated machines but may also be of independent interest.</span></p></div>","PeriodicalId":50571,"journal":{"name":"Discrete Optimization","volume":"47 ","pages":"Article 100753"},"PeriodicalIF":1.1,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49731728","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-01DOI: 10.1016/j.disopt.2023.100760
Daniel Berend , Shahar Golan , Yochai Twitto
In this paper, we introduce the concept of saver variables in Max Sat and demonstrate their contribution to the performance of solvers for this problem. We present two types of saver variables: high-rank savers and consensual savers. We show how to incorporate them in various ways into an iterated algorithm, CHAMP, for Max Sat. We conduct an extensive empirical evaluation on two collections of instances — instances from a past Max Sat competition and random instances. It turns out that, by using savers, the number of unsatisfied clauses may be reduced by more than 70% in some families. Moreover, a refined version CHAMP+ of CHAMP improves the results even further. We show that by combining CHAMP+ with CCLS, a state-of-the-art solver, we obtain better solutions for many Max Sat instances.
{"title":"CHAMP: A multipass algorithm for Max Sat based on saver variables","authors":"Daniel Berend , Shahar Golan , Yochai Twitto","doi":"10.1016/j.disopt.2023.100760","DOIUrl":"https://doi.org/10.1016/j.disopt.2023.100760","url":null,"abstract":"<div><p>In this paper, we introduce the concept of saver variables in Max Sat and demonstrate their contribution to the performance of solvers for this problem. We present two types of saver variables: high-rank savers and consensual savers. We show how to incorporate them in various ways into an iterated algorithm, CHAMP, for Max Sat. We conduct an extensive empirical evaluation on two collections of instances — instances from a past Max Sat competition and random instances. It turns out that, by using savers, the number of unsatisfied clauses may be reduced by more than 70% in some families. Moreover, a refined version CHAMP+ of CHAMP improves the results even further. We show that by combining CHAMP+ with CCLS, a state-of-the-art solver, we obtain better solutions for many Max Sat instances.</p></div>","PeriodicalId":50571,"journal":{"name":"Discrete Optimization","volume":"47 ","pages":"Article 100760"},"PeriodicalIF":1.1,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49715046","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-01DOI: 10.1016/j.disopt.2022.100757
Bjoern Andres , Silvia Di Gregorio , Jannik Irmai , Jan-Hendrik Lange
Fundamental to many applications in data analysis are the decompositions of a graph, i.e. partitions of the node set into component-inducing subsets. One way of encoding decompositions is by multicuts, the subsets of those edges that straddle distinct components. Recently, a lifting of multicuts from a graph to an augmented graph has been proposed in the field of image analysis, with the goal of obtaining a more expressive characterization of graph decompositions in which it is made explicit also for pairs of non-neighboring nodes whether these are in the same or distinct components. In this work, we study in detail the polytope in whose vertices are precisely the characteristic vectors of multicuts of lifted from , connecting it, in particular, to the rich body of prior work on the clique partitioning and multilinear polytope.
{"title":"A polyhedral study of lifted multicuts","authors":"Bjoern Andres , Silvia Di Gregorio , Jannik Irmai , Jan-Hendrik Lange","doi":"10.1016/j.disopt.2022.100757","DOIUrl":"https://doi.org/10.1016/j.disopt.2022.100757","url":null,"abstract":"<div><p>Fundamental to many applications in data analysis are the decompositions of a graph, i.e. partitions of the node set into component-inducing subsets. One way of encoding decompositions is by multicuts, the subsets of those edges that straddle distinct components. Recently, a lifting of multicuts from a graph <span><math><mrow><mi>G</mi><mo>=</mo><mrow><mo>(</mo><mi>V</mi><mo>,</mo><mi>E</mi><mo>)</mo></mrow></mrow></math></span> to an augmented graph <span><math><mrow><mover><mrow><mi>G</mi></mrow><mrow><mo>̂</mo></mrow></mover><mo>=</mo><mrow><mo>(</mo><mi>V</mi><mo>,</mo><mi>E</mi><mo>∪</mo><mi>F</mi><mo>)</mo></mrow></mrow></math></span> has been proposed in the field of image analysis, with the goal of obtaining a more expressive characterization of graph decompositions in which it is made explicit also for pairs <span><math><mrow><mi>F</mi><mo>⊆</mo><mfenced><mfrac><mrow><mi>V</mi></mrow><mrow><mn>2</mn></mrow></mfrac></mfenced><mo>∖</mo><mi>E</mi></mrow></math></span> of non-neighboring nodes whether these are in the same or distinct components. In this work, we study in detail the polytope in <span><math><msup><mrow><mi>R</mi></mrow><mrow><mi>E</mi><mo>∪</mo><mi>F</mi></mrow></msup></math></span> whose vertices are precisely the characteristic vectors of multicuts of <span><math><mover><mrow><mi>G</mi></mrow><mrow><mo>̂</mo></mrow></mover></math></span> lifted from <span><math><mi>G</mi></math></span>, connecting it, in particular, to the rich body of prior work on the clique partitioning and multilinear polytope.</p></div>","PeriodicalId":50571,"journal":{"name":"Discrete Optimization","volume":"47 ","pages":"Article 100757"},"PeriodicalIF":1.1,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49731914","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-01DOI: 10.1016/j.disopt.2022.100756
Václav Blažej, Pratibha Choudhary, Dušan Knop, Jan Matyáš Křišťan, Ondřej Suchý, Tomáš Valla
Consider a vertex-weighted graph with a source and a target . Tracking Paths requires finding a minimum weight set of vertices (trackers) such that the sequence of trackers in each path from to is unique. In this work, we derive a factor 6-approximation algorithm for Tracking Paths in weighted graphs and a factor 4-approximation algorithm if the input is unweighted. This is the first constant factor approximation for this problem. While doing so, we also study approximation of the closely related r-Fault Tolerant Feedback Vertex Set problem. There, for a fixed integer and a given vertex-weighted graph , the task is to find a minimum weight set of vertices intersecting every cycle of in at least vertices. We give a factor approximation algorithm for r-Fault Tolerant Feedback Vertex Set if is a constant.
{"title":"Constant factor approximation for tracking paths and fault tolerant feedback vertex set","authors":"Václav Blažej, Pratibha Choudhary, Dušan Knop, Jan Matyáš Křišťan, Ondřej Suchý, Tomáš Valla","doi":"10.1016/j.disopt.2022.100756","DOIUrl":"https://doi.org/10.1016/j.disopt.2022.100756","url":null,"abstract":"<div><p>Consider a vertex-weighted graph <span><math><mi>G</mi></math></span> with a source <span><math><mi>s</mi></math></span> and a target <span><math><mi>t</mi></math></span>. <span>Tracking Paths</span> requires finding a minimum weight set of vertices (<em>trackers</em>) such that the sequence of trackers in each path from <span><math><mi>s</mi></math></span> to <span><math><mi>t</mi></math></span> is unique. In this work, we derive a factor 6-approximation algorithm for <span>Tracking Paths</span> in weighted graphs and a factor 4-approximation algorithm if the input is unweighted. This is the first constant factor approximation for this problem. While doing so, we also study approximation of the closely related <em>r</em>-<span>Fault Tolerant Feedback Vertex Set</span> problem. There, for a fixed integer <span><math><mi>r</mi></math></span> and a given vertex-weighted graph <span><math><mi>G</mi></math></span>, the task is to find a minimum weight set of vertices intersecting every cycle of <span><math><mi>G</mi></math></span> in at least <span><math><mrow><mi>r</mi><mo>+</mo><mn>1</mn></mrow></math></span> vertices. We give a factor <span><math><mrow><mi>O</mi><mrow><mo>(</mo><mi>r</mi><mo>)</mo></mrow></mrow></math></span> approximation algorithm for <em>r</em>-<span>Fault Tolerant Feedback Vertex Set</span> if <span><math><mi>r</mi></math></span> is a constant.</p></div>","PeriodicalId":50571,"journal":{"name":"Discrete Optimization","volume":"47 ","pages":"Article 100756"},"PeriodicalIF":1.1,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49731732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-02-01DOI: 10.1016/j.disopt.2022.100746
Robert Carr , Arash Haddadan , Cynthia A. Phillips
We present a new algorithm, Fractional Decomposition Tree (FDT), for finding a feasible solution for an integer program (IP) where all variables are binary. FDT runs in polynomial time and is guaranteed to find a feasible integer solution provided the integrality gap of an instance’s polyhedron, independent of objective function, is bounded. The algorithm gives a construction for Carr and Vempala’s theorem that any feasible solution to the IP’s linear-programming relaxation, when scaled by the instance integrality gap, dominates a convex combination of feasible solutions. FDT is also a tool for studying the integrality gap of IP formulations. The upper bound on the integrality gap of an FDT solution can be exponentially large. However our experiments demonstrate that FDT can be effective in practice. We study the integrality gap of two problems: optimally augmenting a tree to a 2-edge-connected graph and finding a minimum-cost 2-edge-connected multi-subgraph (2EC). We also give a simplified algorithm, DomToIP, that finds a feasible solution to an IP instance, or concludes that it has unbounded integrality gap. We show that FDT’s speed and approximation quality compare well to that of the original feasibility pump heuristic on moderate-sized instances of the vertex cover problem. For a particular set of hard-to-decompose fractional 2EC solutions, FDT always gave a better integer solution than the Best-of-Many Christofides Algorithm (BOMC).
{"title":"Fractional Decomposition Tree Algorithm: A tool for studying the integrality gap of Integer Programs","authors":"Robert Carr , Arash Haddadan , Cynthia A. Phillips","doi":"10.1016/j.disopt.2022.100746","DOIUrl":"https://doi.org/10.1016/j.disopt.2022.100746","url":null,"abstract":"<div><p><span><span>We present a new algorithm, Fractional Decomposition Tree (FDT), for finding a feasible solution for an integer program (IP) where all variables are binary. FDT runs in polynomial time and is guaranteed to find a feasible integer solution provided the integrality gap of an instance’s </span>polyhedron, independent of objective function, is bounded. The algorithm gives a construction for Carr and Vempala’s theorem that any feasible solution to the IP’s linear-programming relaxation, when scaled by the instance integrality gap, dominates a </span>convex combination of feasible solutions. FDT is also a tool for studying the integrality gap of IP formulations. The upper bound on the integrality gap of an FDT solution can be exponentially large. However our experiments demonstrate that FDT can be effective in practice. We study the integrality gap of two problems: optimally augmenting a tree to a 2-edge-connected graph and finding a minimum-cost 2-edge-connected multi-subgraph (2EC). We also give a simplified algorithm, DomToIP, that finds a feasible solution to an IP instance, or concludes that it has unbounded integrality gap. We show that FDT’s speed and approximation quality compare well to that of the original feasibility pump heuristic on moderate-sized instances of the vertex cover problem. For a particular set of hard-to-decompose fractional 2EC solutions, FDT always gave a better integer solution than the Best-of-Many Christofides Algorithm (BOMC).</p></div>","PeriodicalId":50571,"journal":{"name":"Discrete Optimization","volume":"47 ","pages":"Article 100746"},"PeriodicalIF":1.1,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49714804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-01-01DOI: 10.1016/j.disopt.2023.100759
Homa Ataei , Mansoor Davoodi
{"title":"The p-center problem under locational uncertainty of demand points","authors":"Homa Ataei , Mansoor Davoodi","doi":"10.1016/j.disopt.2023.100759","DOIUrl":"https://doi.org/10.1016/j.disopt.2023.100759","url":null,"abstract":"","PeriodicalId":50571,"journal":{"name":"Discrete Optimization","volume":"47 ","pages":"100759"},"PeriodicalIF":1.1,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"49715309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2022-11-01DOI: 10.1016/j.disopt.2022.100744
Rebekah Herrman
Leaky-forcing is a recently introduced variant of zero forcing that has been studied for families of graphs including paths, cycles, wheels, grids, and trees. In this paper, we extend previous results on the leaky forcing number of the -dimensional hypercube, , to show that the -leaky forcing number of is . We also examine a question about the relationship between the size of a minimum -leaky-forcing set and a minimum zero forcing set for a graph .
{"title":"The (d−2)-leaky forcing number of Qd and ℓ-leaky forcing number of GP(n,1)","authors":"Rebekah Herrman","doi":"10.1016/j.disopt.2022.100744","DOIUrl":"10.1016/j.disopt.2022.100744","url":null,"abstract":"<div><p>Leaky-forcing is a recently introduced variant of zero forcing that has been studied for families of graphs including paths, cycles, wheels, grids, and trees. In this paper, we extend previous results on the leaky forcing number of the <span><math><mi>d</mi></math></span>-dimensional hypercube, <span><math><msub><mrow><mi>Q</mi></mrow><mrow><mi>d</mi></mrow></msub></math></span>, to show that the <span><math><mrow><mo>(</mo><mi>d</mi><mo>−</mo><mn>2</mn><mo>)</mo></mrow></math></span>-leaky forcing number of <span><math><msub><mrow><mi>Q</mi></mrow><mrow><mi>d</mi></mrow></msub></math></span> is <span><math><msup><mrow><mn>2</mn></mrow><mrow><mi>d</mi><mo>−</mo><mn>1</mn></mrow></msup></math></span>. We also examine a question about the relationship between the size of a minimum <span><math><mi>ℓ</mi></math></span>-leaky-forcing set and a minimum zero forcing set for a graph <span><math><mi>G</mi></math></span>.</p></div>","PeriodicalId":50571,"journal":{"name":"Discrete Optimization","volume":"46 ","pages":"Article 100744"},"PeriodicalIF":1.1,"publicationDate":"2022-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"54146676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"数学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}