首页 > 最新文献

Algorithmica最新文献

英文 中文
Energy Constrained Depth First Search 能量受限深度优先搜索
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-10-12 DOI: 10.1007/s00453-024-01275-8
Shantanu Das, Dariusz Dereniowski, Przemysław Uznański

Depth first search is a natural algorithmic technique for constructing a closed route that visits all vertices of a graph. The length of such a route equals, in an edge-weighted tree, twice the total weight of all edges of the tree and this is asymptotically optimal over all exploration strategies. This paper considers a variant of such search strategies where the length of each route is bounded by a positive integer B (e.g. due to limited energy resources of the searcher). The objective is to cover all the edges of a tree T using the minimum number of routes, each starting and ending at the root and each being of length at most B. To this end, we analyze the following natural greedy tree traversal process that is based on decomposing a depth first search traversal into a sequence of limited length routes. Given any arbitrary depth first search traversal R of the tree T, we cover R with routes (R_1,ldots ,R_l), each of length at most B such that: (R_i) starts at the root, reaches directly the farthest point of R visited by (R_{i-1}), then (R_i) continues along the path R as far as possible, and finally (R_i) returns to the root. We call the above algorithm piecemeal-DFS and we prove that it achieves the asymptotically minimal number of routes l, regardless of the choice of R. Our analysis also shows that the total length of the traversal (and thus the traversal time) of piecemeal-DFS is asymptotically minimum over all energy-constrained exploration strategies. The fact that R can be chosen arbitrarily means that the exploration strategy can be constructed in an online fashion when the input tree T is not known in advance. Each route (R_i) can be constructed without any knowledge of the yet unvisited part of T. Surprisingly, our results show that depth first search is efficient for energy constrained exploration of trees, even though it is known that the same does not hold for energy constrained exploration of arbitrary graphs.

深度优先搜索是一种天然的算法技术,用于构建一条能访问图中所有顶点的封闭路径。在有边加权的树中,这种路径的长度等于树中所有边总重量的两倍,而且在所有探索策略中,这是渐近最优的。本文考虑的是这种搜索策略的一种变体,即每条路径的长度由正整数 B 限定(例如,由于搜索者的能源资源有限)。我们的目标是用最少的路径覆盖树 T 的所有边,每条路径以根为起点和终点,每条路径的长度最多为 B。为此,我们分析了以下自然贪婪树遍历过程,该过程基于将深度优先搜索遍历分解为长度有限的路径序列。给定树 T 的任意深度优先搜索遍历 R,我们用路径 (R_1,ldots,R_l)覆盖 R,每个路径的长度最多为 B,这样(R_i)从根开始,直接到达(R_{i-1})访问过的R的最远点,然后(R_i)尽可能地沿着R的路径继续前进,最后(R_i)返回根。我们称上述算法为零碎-DFS,并证明无论 R 如何选择,它都能实现渐近最小的路径数 l。我们的分析还表明,在所有能量受限的探索策略中,零碎-DFS 的遍历总长度(以及遍历时间)都是渐近最小的。R 可以任意选择这一事实意味着,当输入树 T 事先未知时,探索策略可以在线构建。令人惊讶的是,我们的结果表明,深度优先搜索对于能量受限的树探索是有效的,尽管众所周知,对于任意图的能量受限探索来说,这一点并不成立。
{"title":"Energy Constrained Depth First Search","authors":"Shantanu Das,&nbsp;Dariusz Dereniowski,&nbsp;Przemysław Uznański","doi":"10.1007/s00453-024-01275-8","DOIUrl":"10.1007/s00453-024-01275-8","url":null,"abstract":"<div><p>Depth first search is a natural algorithmic technique for constructing a closed route that visits all vertices of a graph. The length of such a route equals, in an edge-weighted tree, twice the total weight of all edges of the tree and this is asymptotically optimal over all exploration strategies. This paper considers a variant of such search strategies where the length of each route is bounded by a positive integer <i>B</i> (e.g. due to limited energy resources of the searcher). The objective is to cover all the edges of a tree <i>T</i> using the minimum number of routes, each starting and ending at the root and each being of length at most <i>B</i>. To this end, we analyze the following natural greedy tree traversal process that is based on decomposing a depth first search traversal into a sequence of limited length routes. Given any arbitrary depth first search traversal <i>R</i> of the tree <i>T</i>, we cover <i>R</i> with routes <span>(R_1,ldots ,R_l)</span>, each of length at most <i>B</i> such that: <span>(R_i)</span> starts at the root, reaches directly the farthest point of <i>R</i> visited by <span>(R_{i-1})</span>, then <span>(R_i)</span> continues along the path <i>R</i> as far as possible, and finally <span>(R_i)</span> returns to the root. We call the above algorithm <i>piecemeal-DFS</i> and we prove that it achieves the asymptotically minimal number of routes <i>l</i>, regardless of the choice of <i>R</i>. Our analysis also shows that the total length of the traversal (and thus the traversal time) of piecemeal-DFS is asymptotically minimum over all energy-constrained exploration strategies. The fact that <i>R</i> can be chosen arbitrarily means that the exploration strategy can be constructed in an online fashion when the input tree <i>T</i> is not known in advance. Each route <span>(R_i)</span> can be constructed without any knowledge of the yet unvisited part of <i>T</i>. Surprisingly, our results show that depth first search is efficient for energy constrained exploration of trees, even though it is known that the same does not hold for energy constrained exploration of arbitrary graphs.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 12","pages":"3759 - 3782"},"PeriodicalIF":0.9,"publicationDate":"2024-10-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01275-8.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142636684","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Recovering the Original Simplicity: Succinct and Exact Quantum Algorithm for the Welded Tree Problem 恢复原始的简单性:焊接树问题的简洁精确量子算法
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-10-04 DOI: 10.1007/s00453-024-01273-w
Guanzhong Li, Lvzhou Li, Jingquan Luo

This work revisits quantum algorithms for the well-known welded tree problem, proposing a succinct quantum algorithm based on the simple coined quantum walks. It iterates the naturally defined coined quantum walk operator for a classically precomputed number of iterations, and measures. The number of iterations is linear in the depth of the tree. The success probability of this procedure is inversely linear in the depth of the tree. Moreover, it is the same for all instances of the problem of a fixed size, therefore, we can use the exact quantum amplitude amplification subroutine to answer with probability 1. This gives an exponential speedup over any classical algorithm for the same problem. The significance of the results may be seen as follows. (i) Our algorithm is rather simple compared with the one in (Jeffery and Zur, STOC’2023), which not only breaks the stereotype that coined quantum walks can only achieve quadratic speedups over classical algorithms, but also demonstrates the power of the simplest quantum walk model. (ii) Our algorithm achieves certainty of success for the first time. Thus, it becomes one of the few examples that exhibit exponential separation between exact quantum and randomized query complexities.

这项研究重新审视了众所周知的焊接树问题的量子算法,提出了一种基于简单的内联量子行走的简洁量子算法。它对自然定义的巧合量子行走算子进行迭代,迭代次数按经典方法预先计算,并进行测量。迭代次数与树的深度成线性关系。这个过程的成功概率与树的深度成反比。此外,对于大小固定的所有问题实例,成功概率都是相同的,因此,我们可以使用精确量子振幅放大子程序,以 1 的概率回答问题。这比任何经典算法对同一问题的处理速度都快了指数级。这些结果的意义如下。(i) 与(Jeffery 和 Zur,STOC'2023)中的算法相比,我们的算法相当简单,这不仅打破了创造性量子行走只能比经典算法实现二次加速的刻板印象,而且展示了最简单量子行走模型的威力。(ii) 我们的算法首次实现了成功的确定性。因此,它成为在精确量子和随机查询复杂性之间表现出指数级分离的少数例子之一。
{"title":"Recovering the Original Simplicity: Succinct and Exact Quantum Algorithm for the Welded Tree Problem","authors":"Guanzhong Li,&nbsp;Lvzhou Li,&nbsp;Jingquan Luo","doi":"10.1007/s00453-024-01273-w","DOIUrl":"10.1007/s00453-024-01273-w","url":null,"abstract":"<div><p>This work revisits quantum algorithms for the well-known welded tree problem, proposing a succinct quantum algorithm based on the simple coined quantum walks. It iterates the naturally defined coined quantum walk operator for a classically precomputed number of iterations, and measures. The number of iterations is linear in the depth of the tree. The success probability of this procedure is inversely linear in the depth of the tree. Moreover, it is the same for all instances of the problem of a fixed size, therefore, we can use the exact quantum amplitude amplification subroutine to answer with probability 1. This gives an exponential speedup over any classical algorithm for the same problem. The significance of the results may be seen as follows. (i) Our algorithm is rather simple compared with the one in (Jeffery and Zur, STOC’2023), which not only breaks the stereotype that coined quantum walks can only achieve quadratic speedups over classical algorithms, but also demonstrates the power of the simplest quantum walk model. (ii) Our algorithm achieves certainty of success for the first time. Thus, it becomes one of the few examples that exhibit exponential separation between exact quantum and randomized query complexities.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 12","pages":"3719 - 3758"},"PeriodicalIF":0.9,"publicationDate":"2024-10-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142636718","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Permutation-constrained Common String Partitions with Applications 排列受限的普通字符串分区及其应用
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-09-30 DOI: 10.1007/s00453-024-01276-7
Manuel Lafond, Binhai Zhu

We study a new combinatorial problem based on the famous Minimum Common String Partition problem, which we call Permutation-constrained Common String Partition (PCSP for short). In PCSP, we are given two sequences/genomes s and t with the same length and a permutation (pi ) on ([ell ]), the question is to decide whether it is possible to decompose s and t into (ell ) blocks that can be matched according to some specified requirements, and that conform with the permutation (pi ). Our main result is that PCSP is FPT in parameter (ell + d), where d is the maximum number of occurrences that any symbol may have in s or t. We also study a variant where the input specifies whether each matched pair of block needs to be preserved as is, or reversed. With this result on PCSP, we show that a series of genome rearrangement problems are FPT (k + d), where k is the rearrangement distance between two genomes of interest.

我们在著名的最小公共字符串分割(Minimum Common String Partition)问题的基础上研究了一个新的组合问题,我们称之为 "排列约束公共字符串分割"(Permutation-constrained Common String Partition,简称 PCSP)。在 PCSP 中,我们给定了两个长度相同的序列/基因组 s 和 t,以及一个关于 ([ell ]) 的排列组合 (pi),问题是要决定是否有可能把 s 和 t 分解成可以根据某些指定要求匹配的、符合排列组合 (pi)的块((ell ))。我们的主要结果是 PCSP 在参数 (ell + d) 中是 FPT,其中 d 是任何符号在 s 或 t 中可能出现的最大次数。我们还研究了一种变体,即输入指定了每一对匹配的块是需要原样保留,还是需要反转。利用 PCSP 的这一结果,我们证明了一系列基因组重排问题都是 FPT (k + d) ,其中 k 是两个相关基因组之间的重排距离。
{"title":"Permutation-constrained Common String Partitions with Applications","authors":"Manuel Lafond,&nbsp;Binhai Zhu","doi":"10.1007/s00453-024-01276-7","DOIUrl":"10.1007/s00453-024-01276-7","url":null,"abstract":"<div><p>We study a new combinatorial problem based on the famous Minimum Common String Partition problem, which we call Permutation-constrained Common String Partition (PCSP for short). In PCSP, we are given two sequences/genomes <i>s</i> and <i>t</i> with the same length and a permutation <span>(pi )</span> on <span>([ell ])</span>, the question is to decide whether it is possible to decompose <i>s</i> and <i>t</i> into <span>(ell )</span> blocks that can be matched according to some specified requirements, and that conform with the permutation <span>(pi )</span>. Our main result is that PCSP is FPT in parameter <span>(ell + d)</span>, where <i>d</i> is the maximum number of occurrences that any symbol may have in <i>s</i> or <i>t</i>. We also study a variant where the input specifies whether each matched pair of block needs to be preserved as is, or reversed. With this result on PCSP, we show that a series of genome rearrangement problems are FPT <span>(k + d)</span>, where <i>k</i> is the rearrangement distance between two genomes of interest.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 12","pages":"3684 - 3718"},"PeriodicalIF":0.9,"publicationDate":"2024-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142636949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reachability of Fair Allocations via Sequential Exchanges 通过顺序交换实现公平分配的可达性
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-09-21 DOI: 10.1007/s00453-024-01271-y
Ayumi Igarashi, Naoyuki Kamiyama, Warut Suksompong, Sheung Man Yuen

In the allocation of indivisible goods, a prominent fairness notion is envy-freeness up to one good (EF1). We initiate the study of reachability problems in fair division by investigating the problem of whether one EF1 allocation can be reached from another EF1 allocation via a sequence of exchanges such that every intermediate allocation is also EF1. We show that two EF1 allocations may not be reachable from each other even in the case of two agents, and deciding their reachability is PSPACE-complete in general. On the other hand, we prove that reachability is guaranteed for two agents with identical or binary utilities as well as for any number of agents with identical binary utilities. We also examine the complexity of deciding whether there is an EF1 exchange sequence that is optimal in the number of exchanges required.

在不可分割物品的分配中,一个突出的公平概念是一种物品的无嫉妒(EF1)。我们开始研究公平分配中的可达性问题,研究一个 EF1 分配是否可以通过一系列交换从另一个 EF1 分配到达,使得每个中间分配也是 EF1。我们证明,即使在有两个代理的情况下,两个 EF1 分配也不一定能相互到达,而且决定它们的可到达性在一般情况下是 PSPACE-complete。另一方面,我们证明,对于具有相同或二进制效用的两个代理,以及具有相同二进制效用的任意数量的代理,都能保证可达性。我们还研究了决定是否存在所需的交换次数最优的 EF1 交换序列的复杂性。
{"title":"Reachability of Fair Allocations via Sequential Exchanges","authors":"Ayumi Igarashi,&nbsp;Naoyuki Kamiyama,&nbsp;Warut Suksompong,&nbsp;Sheung Man Yuen","doi":"10.1007/s00453-024-01271-y","DOIUrl":"10.1007/s00453-024-01271-y","url":null,"abstract":"<div><p>In the allocation of indivisible goods, a prominent fairness notion is envy-freeness up to one good (EF1). We initiate the study of reachability problems in fair division by investigating the problem of whether one EF1 allocation can be reached from another EF1 allocation via a sequence of exchanges such that every intermediate allocation is also EF1. We show that two EF1 allocations may not be reachable from each other even in the case of two agents, and deciding their reachability is PSPACE-complete in general. On the other hand, we prove that reachability is guaranteed for two agents with identical or binary utilities as well as for any number of agents with identical binary utilities. We also examine the complexity of deciding whether there is an EF1 exchange sequence that is optimal in the number of exchanges required.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 12","pages":"3653 - 3683"},"PeriodicalIF":0.9,"publicationDate":"2024-09-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01271-y.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142636704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Flipping the Fréchet Distance 关于翻转弗雷谢特距离
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-09-20 DOI: 10.1007/s00453-024-01267-8
Omrit Filtser, Mayank Goswami, Joseph S. B. Mitchell, Valentin Polishchuk

The classical and extensively-studied Fréchet distance between two curves is defined as an inf max, where the infimum is over all traversals of the curves, and the maximum is over all concurrent positions of the two agents. In this article we investigate a “flipped” Fréchet measure defined by a sup min – the supremum is over all traversals of the curves, and the minimum is over all concurrent positions of the two agents. This measure produces a notion of “social distance” between two curves (or general domains), where agents traverse curves while trying to stay as far apart as possible. We first study the flipped Fréchet measure between two polygonal curves in one and two dimensions, providing conditional lower bounds and matching algorithms. We then consider this measure on polygons, where it denotes the minimum distance that two agents can maintain while restricted to travel in or on the boundary of the same polygon. We investigate several variants of the problem in this setting, for some of which we provide linear-time algorithms. We draw connections between our proposed flipped Fréchet measure and existing related work in computational geometry, hoping that our new measure may spawn investigations akin to those performed for the Fréchet distance, and into further interesting problems that arise.

两条曲线之间的弗雷谢特距离被定义为 inf max,其中最小值是曲线的所有遍历,最大值是两个代理的所有同时位置。在本文中,我们将研究一种 "翻转 "的弗雷谢特度量,其定义为 sup min - 上极大值是曲线的所有遍历,而最小值是两个代理的所有同时位置。这种度量产生了两个曲线(或一般域)之间的 "社会距离 "概念,即代理人在穿越曲线时尽量保持距离。我们首先研究了一维和二维两条多边形曲线之间的翻转弗雷谢特度量,提供了条件下限和匹配算法。然后,我们考虑多边形上的这一度量,它表示两个代理在被限制在同一多边形内或边界上行进时所能保持的最小距离。我们研究了该问题在这种情况下的几种变体,并为其中一些变体提供了线性时间算法。我们将我们提出的翻转弗雷谢特度量与计算几何中现有的相关工作联系起来,希望我们的新度量能引发与弗雷谢特距离类似的研究,并引发更多有趣的问题。
{"title":"On Flipping the Fréchet Distance","authors":"Omrit Filtser,&nbsp;Mayank Goswami,&nbsp;Joseph S. B. Mitchell,&nbsp;Valentin Polishchuk","doi":"10.1007/s00453-024-01267-8","DOIUrl":"10.1007/s00453-024-01267-8","url":null,"abstract":"<div><p>The classical and extensively-studied <i>Fréchet distance</i> between two curves is defined as an <i>inf max</i>, where the infimum is over all traversals of the curves, and the maximum is over all concurrent positions of the two agents. In this article we investigate a “flipped” Fréchet measure defined by a <i>sup min</i> – the supremum is over all traversals of the curves, and the minimum is over all concurrent positions of the two agents. This measure produces a notion of “social distance” between two curves (or general domains), where agents traverse curves while trying to stay as far apart as possible. We first study the flipped Fréchet measure between two polygonal curves in one and two dimensions, providing conditional lower bounds and matching algorithms. We then consider this measure on polygons, where it denotes the minimum distance that two agents can maintain while restricted to travel in or on the boundary of the same polygon. We investigate several variants of the problem in this setting, for some of which we provide linear-time algorithms. We draw connections between our proposed flipped Fréchet measure and existing related work in computational geometry, hoping that our new measure may spawn investigations akin to those performed for the Fréchet distance, and into further interesting problems that arise.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 12","pages":"3629 - 3652"},"PeriodicalIF":0.9,"publicationDate":"2024-09-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142636679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semi-streaming Algorithms for Submodular Function Maximization Under b-Matching, Matroid, and Matchoid Constraints b-匹配、Matroid 和 Matchoid 约束条件下的次模态函数最大化半流算法
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-09-14 DOI: 10.1007/s00453-024-01272-x
Chien-Chung Huang, François Sellier

We consider the problem of maximizing a non-negative submodular function under the b-matching constraint, in the semi-streaming model. When the function is linear, monotone, and non-monotone, we obtain the approximation ratios of (2+varepsilon ), (3 + 2 sqrt{2} approx 5.828), and (4 + 2 sqrt{3} approx 7.464), respectively. We also consider a generalized problem, where a k-uniform hypergraph is given, along with an extra matroid or a (k')-matchoid constraint imposed on the edges, with the same goal of finding a b-matching that maximizes a submodular function. When the extra constraint is a matroid, we obtain the approximation ratios of (k + 1 + varepsilon ), (k + 2sqrt{k+1} + 2), and (k + 2sqrt{k + 2} + 3) for linear, monotone and non-monotone submodular functions, respectively. When the extra constraint is a (k')-matchoid, we attain the approximation ratio (frac{8}{3}k+ frac{64}{9}k' + O(1)) for general submodular functions.

我们在半流模型中考虑了在 b 匹配约束条件下最大化一个非负次模函数的问题。当函数为线性、单调和非单调时,我们得到的近似率分别为(2+varepsilon )、(3 + 2 sqrt{2} approx 5.828) 和(4 + 2 sqrt{3} approx 7.464)。我们还考虑了一个广义问题,即给定一个 k-uniform 超图,同时在边上施加一个额外的 matroid 或 (k')-matchoid 约束,目标同样是找到一个最大化子模函数的 b-匹配。当额外的约束条件是一个 matroid 时,我们分别得到了线性、单调和非单调子模函数的近似率:(k + 1 + varepsilon )、(k + 2sqrt{k+1} + 2) 和(k + 2sqrt{k + 2} + 3) 。当额外的约束条件是一个 (k')-matchoid 时,对于一般的子模态函数,我们可以得到 (frac{8}{3}k+ frac{64}{9}k' + O(1)) 的近似率。
{"title":"Semi-streaming Algorithms for Submodular Function Maximization Under b-Matching, Matroid, and Matchoid Constraints","authors":"Chien-Chung Huang,&nbsp;François Sellier","doi":"10.1007/s00453-024-01272-x","DOIUrl":"10.1007/s00453-024-01272-x","url":null,"abstract":"<div><p>We consider the problem of maximizing a non-negative submodular function under the <i>b</i>-matching constraint, in the semi-streaming model. When the function is linear, monotone, and non-monotone, we obtain the approximation ratios of <span>(2+varepsilon )</span>, <span>(3 + 2 sqrt{2} approx 5.828)</span>, and <span>(4 + 2 sqrt{3} approx 7.464)</span>, respectively. We also consider a generalized problem, where a <i>k</i>-uniform hypergraph is given, along with an extra matroid or a <span>(k')</span>-matchoid constraint imposed on the edges, with the same goal of finding a <i>b</i>-matching that maximizes a submodular function. When the extra constraint is a matroid, we obtain the approximation ratios of <span>(k + 1 + varepsilon )</span>, <span>(k + 2sqrt{k+1} + 2)</span>, and <span>(k + 2sqrt{k + 2} + 3)</span> for linear, monotone and non-monotone submodular functions, respectively. When the extra constraint is a <span>(k')</span>-matchoid, we attain the approximation ratio <span>(frac{8}{3}k+ frac{64}{9}k' + O(1))</span> for general submodular functions.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 11","pages":"3598 - 3628"},"PeriodicalIF":0.9,"publicationDate":"2024-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142248533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Parameterized Complexity of Compact Set Packing 论紧凑集合打包的参数化复杂性
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-09-13 DOI: 10.1007/s00453-024-01269-6
Ameet Gadekar

The Set Packing problem is, given a collection of sets (mathcal {S}) over a ground set U, to find a maximum collection of sets that are pairwise disjoint. The problem is among the most fundamental NP-hard optimization problems that have been studied extensively in various computational regimes. The focus of this work is on parameterized complexity, Parameterized Set Packing (PSP): Given parameter (r in {mathbb N}), is there a collection ( mathcal {S}' subseteq mathcal {S}: |mathcal {S}'| = r) such that the sets in (mathcal {S}') are pairwise disjoint? Unfortunately, the problem is not fixed parameter tractable unless (textsf {W[1]} = textsf {FPT} ), and, in fact, an “enumerative” running time of (|mathcal {S}|^{Omega (r)}) is required unless the exponential time hypothesis (ETH) fails. This paper is a quest for tractable instances of Set Packing from parameterized complexity perspectives. We say that the input (({U},mathcal {S})) is “compact” if (|{U}| = f(r)cdot textsf {poly} ( log |mathcal {S}|)), for some (f(r) ge r). In the Compact PSP problem, we are given a compact instance of PSP. In this direction, we present a “dichotomy” result of PSP: When (|{U}| = f(r)cdot o(log |mathcal {S}|)), PSP is in FPT, while for (|{U}| = rcdot Theta (log (|mathcal {S}|))), the problem is W[1]-hard; moreover, assuming ETH, Compact PSP does not admit (|mathcal {S}|^{o(r/log r)}) time algorithm even when (|{U}| = rcdot Theta (log (|mathcal {S}|))). Although certain results in the literature imply hardness of compact versions of related problems such as Set (r)-Covering and Exact (r)-Covering, these constructions fail to extend to Compact PSP. A novel contribution of our work is the identification and construction of a gadget, which we call Compatible Intersecting Set System pair, that is crucial in obtaining the hardness result for Compact PSP. Finally, our framework can be extended to obtain improved running time lower bounds for Compact (r)-VectorSum.

集合打包(Set Packing)问题是,给定地面集合 U 上的集合集合((mathcal {S})),找出成对不相交的集合的最大集合。这个问题是最基本的 NP-困难优化问题之一,在各种计算环境中都得到了广泛的研究。这项工作的重点是参数化复杂性,即参数化集合打包(Parameterized Set Packing,PSP):给定参数({mathbb N}中的r),是否存在一个集合( mathcal {S}' subseteq mathcal {S}: |mathcal {S}'| = r) 使得(mathcal {S}') 中的集合是成对不相交的?不幸的是,除非 (textsf {W[1]} = textsf {FPT} ),否则这个问题不具有固定参数的可操作性,事实上,除非指数时间假设(ETH)失效,否则需要 (|mathcal {S}|^{Omega (r)}) 的 "枚举 "运行时间。本文从参数化复杂性的角度出发,探索集合打包的可处理实例。如果 (|{U}| = f(r)cdot textsf {poly} ( log |mathcal {S}|)), 对于某个 (f(r) ge r), 我们说输入 (({U},mathcal {S})) 是 "紧凑的"。在紧凑 PSP 问题中,我们得到了一个紧凑的 PSP 实例。在这个方向上,我们提出了 PSP 的 "二分法 "结果:当 |{U}| = f(r)cdot o(log |mathcal {S}|))时,PSP 在 FPT 中,而对于 (|{U}| = rcdot Theta (log (|mathcal {S}|))),问题是 W[1]-hard 的;此外,假设 ETH,即使当 |(|{U}| = rcdot Theta (log (|mathcal {S}|))) 时,Compact PSP 也不接受 (|mathcal {S}|^{o(r/log r)}) 时间算法。尽管文献中的某些结果暗示了相关问题(如集合覆盖(Set (r)-Covering )和精确覆盖(Exact (r)-Covering ))的紧凑版本的困难性,但这些构造未能扩展到紧凑型 PSP。我们工作的一个新贡献是识别并构建了一个小工具,我们称之为相容相交集合系统对,它对于获得 Compact PSP 的硬度结果至关重要。最后,我们的框架可以扩展用于获得 Compact (r)-VectorSum 的改进运行时间下界。
{"title":"On the Parameterized Complexity of Compact Set Packing","authors":"Ameet Gadekar","doi":"10.1007/s00453-024-01269-6","DOIUrl":"10.1007/s00453-024-01269-6","url":null,"abstract":"<div><p>The <span>Set Packing</span> problem is, given a collection of sets <span>(mathcal {S})</span> over a ground set <i>U</i>, to find a maximum collection of sets that are pairwise disjoint. The problem is among the most fundamental NP-hard optimization problems that have been studied extensively in various computational regimes. The focus of this work is on parameterized complexity, <span>Parameterized Set Packing</span> (<span>PSP</span>): Given parameter <span>(r in {mathbb N})</span>, is there a collection <span>( mathcal {S}' subseteq mathcal {S}: |mathcal {S}'| = r)</span> such that the sets in <span>(mathcal {S}')</span> are pairwise disjoint? Unfortunately, the problem is not fixed parameter tractable unless <span>(textsf {W[1]} = textsf {FPT} )</span>, and, in fact, an “enumerative” running time of <span>(|mathcal {S}|^{Omega (r)})</span> is required unless the exponential time hypothesis (ETH) fails. This paper is a quest for tractable instances of <span>Set Packing</span> from parameterized complexity perspectives. We say that the input <span>(({U},mathcal {S}))</span> is “compact” if <span>(|{U}| = f(r)cdot textsf {poly} ( log |mathcal {S}|))</span>, for some <span>(f(r) ge r)</span>. In the <span>Compact PSP</span> problem, we are given a compact instance of <span>PSP</span>. In this direction, we present a “dichotomy” result of <span>PSP</span>: When <span>(|{U}| = f(r)cdot o(log |mathcal {S}|))</span>, <span>PSP</span> is in <span>FPT</span>, while for <span>(|{U}| = rcdot Theta (log (|mathcal {S}|)))</span>, the problem is <span>W[1]</span>-hard; moreover, assuming ETH, <span>Compact PSP</span> does not admit <span>(|mathcal {S}|^{o(r/log r)})</span> time algorithm even when <span>(|{U}| = rcdot Theta (log (|mathcal {S}|)))</span>. Although certain results in the literature imply hardness of compact versions of related problems such as <span>Set</span> <span>(r)</span><span>-Covering</span> and <span>Exact</span> <span>(r)</span><span>-Covering</span>, these constructions fail to extend to <span>Compact PSP</span>. A novel contribution of our work is the identification and construction of a gadget, which we call Compatible Intersecting Set System pair, that is crucial in obtaining the hardness result for <span>Compact PSP</span>. Finally, our framework can be extended to obtain improved running time lower bounds for <span>Compact</span> <span>(r)</span><span>-VectorSum</span>.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 11","pages":"3579 - 3597"},"PeriodicalIF":0.9,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01269-6.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Ultimate Greedy Approximation of Independent Sets in Subcubic Graphs 子立方图中独立集的终极贪婪逼近
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-09-12 DOI: 10.1007/s00453-024-01268-7
Piotr Krysta, Mathieu Mari, Nan Zhi

We study the approximability of the maximum size independent set (MIS) problem in bounded degree graphs. This is one of the most classic and widely studied NP-hard optimization problems. It is known for its inherent hardness of approximation. We focus on the well known minimum-degree greedy algorithm for this problem. This algorithm iteratively chooses a minimum degree vertex in the graph, adds it to the solution and removes its neighbors, until the remaining graph is empty. The approximation ratios of this algorithm have been widely studied, where it is augmented with an advice that tells the greedy algorithm which minimum degree vertex to choose if it is not unique. Our main contribution is a new mathematical theory for the design of such greedy algorithms for MIS with efficiently computable advice and for the analysis of their approximation ratios. Using this theory we obtain the ultimate approximation ratio of 5/4 for greedy algorithms on graphs with maximum degree 3, which completely solves an open problem from the paper by Halldórsson and Yoshihara (in: Staples, Eades, Katoh, Moffat (eds) Algorithms and computations—ISAAC ’95, in 2026 LNCS, Springer, Berlin, Heidelberg, 1995) . Our algorithm is the fastest currently known algorithm for MIS with this approximation ratio on such graphs. We also obtain a simple and short proof of the ((Delta +2)/3)-approximation ratio of any greedy algorithms on graphs with maximum degree (Delta ), the result proved previously by Halldórsson and Radhakrishnan (Nord J Comput 1:475–492, 1994) . We almost match this ratio by showing a lower bound of ((Delta +1)/3) on the ratio of a greedy algorithm that can use an advice. We apply our new algorithm to the minimum vertex cover problem on graphs with maximum degree 3 to obtain a substantially faster 6/5-approximation algorithm than the one currently known. We complement our algorithmic, upper bound results with lower bound results, which show that the problem of designing good advice for greedy algorithms for MIS is computationally hard and even hard to approximate on various classes of graphs. These results significantly improve on the previously known hardness results. Moreover, these results suggest that obtaining the upper bound results on the design and analysis of the greedy advice is non-trivial.

我们研究了有界度图中最大独立集(MIS)问题的近似性。这是最经典、研究最广泛的 NP 难优化问题之一。它因其固有的近似难度而闻名。我们的重点是针对这一问题的众所周知的最小度贪婪算法。该算法在图中反复选择一个最小度顶点,将其添加到解决方案中,并移除其邻近顶点,直到剩余图为空。该算法的近似率已被广泛研究,其中增加了一个建议,告诉贪心算法如果最小度顶点不是唯一的,该选择哪个顶点。我们的主要贡献是提出了一种新的数学理论,用于设计这种带有可有效计算建议的 MIS 贪婪算法,并分析其近似率。利用这一理论,我们得到了最大阶数为 3 的图上的贪心算法的最终近似率为 5/4,这完全解决了 Halldórsson 和 Yoshihara 的论文(in:Staples, Eades, Katoh, Moffat (eds) Algorithms and computations-ISAAC '95, in 2026 LNCS, Springer, Berlin, Heidelberg, 1995)。我们的算法是目前已知在此类图上具有此近似率的最快 MIS 算法。我们还得到了一个简单而简短的证明,即在最大度数为 (Delta )的图上,任何贪婪算法的近似率为 ((Delta +2)/3) ,这个结果之前由 Halldórsson 和 Radhakrishnan 证明过(Nord J Comput 1:475-492, 1994)。我们几乎与这一比率不相上下,显示了可以使用建议的贪婪算法的比率下限为 ((Delta +1)/3)。我们将新算法应用于最大阶数为 3 的图上的最小顶点覆盖问题,得到了比目前已知算法更快的 6/5 近似算法。我们用下限结果补充了我们的算法上限结果,这些结果表明,为 MIS 贪婪算法设计良好建议的问题在计算上是困难的,甚至在各种图类上都很难近似。这些结果大大改进了之前已知的难度结果。此外,这些结果还表明,获得贪婪建议设计和分析的上界结果并非易事。
{"title":"Ultimate Greedy Approximation of Independent Sets in Subcubic Graphs","authors":"Piotr Krysta,&nbsp;Mathieu Mari,&nbsp;Nan Zhi","doi":"10.1007/s00453-024-01268-7","DOIUrl":"10.1007/s00453-024-01268-7","url":null,"abstract":"<div><p>We study the approximability of the maximum size independent set (MIS) problem in bounded degree graphs. This is one of the most classic and widely studied NP-hard optimization problems. It is known for its inherent hardness of approximation. We focus on the well known minimum-degree greedy algorithm for this problem. This algorithm iteratively chooses a minimum degree vertex in the graph, adds it to the solution and removes its neighbors, until the remaining graph is empty. The approximation ratios of this algorithm have been widely studied, where it is augmented with an advice that tells the greedy algorithm which minimum degree vertex to choose if it is not unique. Our main contribution is a new mathematical theory for the design of such greedy algorithms for MIS with efficiently computable advice and for the analysis of their approximation ratios. Using this theory we obtain the ultimate approximation ratio of 5/4 for greedy algorithms on graphs with maximum degree 3, which completely solves an open problem from the paper by Halldórsson and Yoshihara (in: Staples, Eades, Katoh, Moffat (eds) Algorithms and computations—ISAAC ’95, in 2026 LNCS, Springer, Berlin, Heidelberg, 1995) . Our algorithm is the fastest currently known algorithm for MIS with this approximation ratio on such graphs. We also obtain a simple and short proof of the <span>((Delta +2)/3)</span>-approximation ratio of any greedy algorithms on graphs with maximum degree <span>(Delta )</span>, the result proved previously by Halldórsson and Radhakrishnan (Nord J Comput 1:475–492, 1994) . We almost match this ratio by showing a lower bound of <span>((Delta +1)/3)</span> on the ratio of a greedy algorithm that can use an advice. We apply our new algorithm to the minimum vertex cover problem on graphs with maximum degree 3 to obtain a substantially faster 6/5-approximation algorithm than the one currently known. We complement our algorithmic, upper bound results with lower bound results, which show that the problem of designing good advice for greedy algorithms for MIS is computationally hard and even hard to approximate on various classes of graphs. These results significantly improve on the previously known hardness results. Moreover, these results suggest that obtaining the upper bound results on the design and analysis of the greedy advice is non-trivial.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 11","pages":"3518 - 3578"},"PeriodicalIF":0.9,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Testing Connectedness of Images 测试图像的关联性
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-09-12 DOI: 10.1007/s00453-024-01248-x
Piotr Berman, Meiram Murzabulatov, Sofya Raskhodnikova, Dragos-Florian Ristache

We investigate algorithms for testing whether an image is connected. Given a proximity parameter ({epsilon }in (0,1)) and query access to a black-and-white image represented by an (ntimes n) matrix of Boolean pixel values, a (1-sided error) connectedness tester accepts if the image is connected and rejects with probability at least 2/3 if the image is ({epsilon })-far from connected. We show that connectedness can be tested nonadaptively with (OBig (frac{1}{{epsilon }^2}Big )) queries and adaptively with (OBig (frac{1}{{epsilon }^{3/2}} sqrt{log frac{1}{{epsilon }}}Big )) queries. The best connectedness tester to date, by Berman, Raskhodnikova, and Yaroslavtsev (STOC 2014) had query complexity (OBig (frac{1}{{epsilon }^2}log frac{1}{{epsilon }}Big )) and was adaptive. We also prove that every nonadaptive, 1-sided error tester for connectedness must make (Omega Big (frac{1}{{epsilon }}log frac{1}{{epsilon }}Big )) queries.

我们研究了测试图像是否相连的算法。给定一个邻近度参数({epsilon }in (0,1)),并查询访问由布尔像素值矩阵表示的黑白图像,如果图像是连通的,则连通性测试仪(单边误差)接受;如果图像离连通很远,则拒绝概率至少为 2/3。我们证明,连通性可以用 (OBig (frac{1}{{epsilon }^2}Big )查询进行非适应性测试,用 (OBig (frac{1}{{epsilon }^{3/2}} sqrt{log frac{1}{{epsilon }}Big )查询进行适应性测试。迄今为止,Berman、Raskhodnikova 和 Yaroslavtsev(STOC 2014)的最佳连通性测试仪的查询复杂度为 (OBig (frac{1}{epsilon }^2}log frac{1}{epsilon }}Big )) 并且是自适应的。我们还证明了每一个非自适应的、单边错误的连通性测试器都必须进行 (Omega Big (frac{1}{{epsilon }}}log frac{1}{{epsilon }}Big ))查询。
{"title":"Testing Connectedness of Images","authors":"Piotr Berman,&nbsp;Meiram Murzabulatov,&nbsp;Sofya Raskhodnikova,&nbsp;Dragos-Florian Ristache","doi":"10.1007/s00453-024-01248-x","DOIUrl":"10.1007/s00453-024-01248-x","url":null,"abstract":"<div><p>We investigate algorithms for testing whether an image is connected. Given a proximity parameter <span>({epsilon }in (0,1))</span> and query access to a black-and-white image represented by an <span>(ntimes n)</span> matrix of Boolean pixel values, a (1-sided error) connectedness tester accepts if the image is connected and rejects with probability at least 2/3 if the image is <span>({epsilon })</span>-far from connected. We show that connectedness can be tested nonadaptively with <span>(OBig (frac{1}{{epsilon }^2}Big ))</span> queries and adaptively with <span>(OBig (frac{1}{{epsilon }^{3/2}} sqrt{log frac{1}{{epsilon }}}Big ))</span> queries. The best connectedness tester to date, by Berman, Raskhodnikova, and Yaroslavtsev (STOC 2014) had query complexity <span>(OBig (frac{1}{{epsilon }^2}log frac{1}{{epsilon }}Big ))</span> and was adaptive. We also prove that every nonadaptive, 1-sided error tester for connectedness must make <span>(Omega Big (frac{1}{{epsilon }}log frac{1}{{epsilon }}Big ))</span> queries.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 11","pages":"3496 - 3517"},"PeriodicalIF":0.9,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Romeo and Juliet Meeting in Forest Like Regions 罗密欧与朱丽叶在森林般的地区相遇
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-09-03 DOI: 10.1007/s00453-024-01264-x
Neeldhara Misra, Manas Mulpuri, Prafullkumar Tale, Gaurav Viramgami

The game of rendezvous with adversaries is a game on a graph played by two players: Facilitator and Divider. Facilitator has two agents and Divider has a team of (k ge 1) agents. While the initial positions of Facilitator’s agents are fixed, Divider gets to select the initial positions of his agents. Then, they take turns to move their agents to adjacent vertices (or stay put) with Facilitator’s goal to bring both her agents at same vertex and Divider’s goal to prevent it. The computational question of interest is to determine if Facilitator has a winning strategy against Divider with k agents. Fomin, Golovach, and Thilikos [WG, 2021] introduced this game and proved that it is PSPACE-hard and co-W[2]-hard parameterized by the number of agents. This hardness naturally motivates the structural parameterization of the problem. The authors proved that it admits an FPT algorithm when parameterized by the modular width and the number of allowed rounds. However, they left open the complexity of the problem from the perspective of other structural parameters. In particular, they explicitly asked whether the problem admits an FPT or XP-algorithm with respect to the treewidth of the input graph. We answer this question in the negative and show that Rendezvous is co-NP-hard even for graphs of constant treewidth. Further, we show that the problem is co-W[1]-hard when parameterized by the feedback vertex set number and the number of agents, and is unlikely to admit a polynomial kernel when parameterized by the vertex cover number and the number of agents. Complementing these hardness results, we show that the Rendezvous is FPT when parameterized by both the vertex cover number and the solution size. Finally, for graphs of treewidth at most two and girds, we show that the problem can be solved in polynomial time.

与对手会合游戏是由两名玩家在图形上进行的游戏:促进者和分割者。促进者有两个代理人,而分割者有一个由(k ge 1 )个代理人组成的团队。促进者的代理人的初始位置是固定的,而分割者可以选择他的代理人的初始位置。然后,他们轮流将自己的代理移动到相邻的顶点(或原地不动),促进者的目标是将她的代理都移动到同一个顶点,而分割者的目标是防止这种情况发生。我们感兴趣的计算问题是,在有 k 个代理的情况下,确定调解人是否有战胜分割人的策略。Fomin、Golovach 和 Thilikos [WG, 2021] 引入了这一博弈,并证明它是 PSPACE-硬博弈,而且是以代理数为参数的 co-W[2] -硬博弈。这种难度自然而然地促使人们对问题进行结构参数化。作者证明,当以模块宽度和允许回合数为参数时,它允许一种 FPT 算法。但是,他们没有从其他结构参数的角度来考虑问题的复杂性。特别是,他们明确提出了这样一个问题:就输入图的树宽而言,该问题是采用 FPT 算法还是 XP 算法?我们对这个问题的回答是否定的,并证明即使对于恒定树宽的图,Rendezvous 也是共 NP 难的。此外,我们还证明,当以反馈顶点集数和代理数为参数时,该问题是共 W[1]-hard 的,而当以顶点覆盖数和代理数为参数时,该问题不太可能有多项式内核。作为对这些困难性结果的补充,我们证明了当以顶点覆盖数和解大小为参数时,"会聚 "是 FPT。最后,对于树宽最多为 2 且有树枝的图,我们证明该问题可以在多项式时间内求解。
{"title":"Romeo and Juliet Meeting in Forest Like Regions","authors":"Neeldhara Misra,&nbsp;Manas Mulpuri,&nbsp;Prafullkumar Tale,&nbsp;Gaurav Viramgami","doi":"10.1007/s00453-024-01264-x","DOIUrl":"10.1007/s00453-024-01264-x","url":null,"abstract":"<div><p>The game of rendezvous with adversaries is a game on a graph played by two players: <i>Facilitator</i> and <i>Divider</i>. Facilitator has two agents and Divider has a team of <span>(k ge 1)</span> agents. While the initial positions of Facilitator’s agents are fixed, Divider gets to select the initial positions of his agents. Then, they take turns to move their agents to adjacent vertices (or stay put) with Facilitator’s goal to bring both her agents at same vertex and Divider’s goal to prevent it. The computational question of interest is to determine if Facilitator has a winning strategy against Divider with <i>k</i> agents. Fomin, Golovach, and Thilikos [WG, 2021] introduced this game and proved that it is <span>PSPACE</span>-<span>hard</span> and <span>co</span>-<span>W</span>[2]-<span>hard</span> parameterized by the number of agents. This hardness naturally motivates the structural parameterization of the problem. The authors proved that it admits an <span>FPT</span> algorithm when parameterized by the modular width and the number of allowed rounds. However, they left open the complexity of the problem from the perspective of other structural parameters. In particular, they explicitly asked whether the problem admits an <span>FPT</span> or <span>XP</span>-algorithm with respect to the treewidth of the input graph. We answer this question in the negative and show that <span>Rendezvous</span> is <span>co</span>-<span>NP</span>-<span>hard</span> even for graphs of constant treewidth. Further, we show that the problem is <span>co</span>-<span>W</span>[1]-<span>hard</span> when parameterized by the feedback vertex set number and the number of agents, and is unlikely to admit a polynomial kernel when parameterized by the vertex cover number and the number of agents. Complementing these hardness results, we show that the <span>Rendezvous</span> is <span>FPT</span> when parameterized by both the vertex cover number and the solution size. Finally, for graphs of treewidth at most two and girds, we show that the problem can be solved in polynomial time.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 11","pages":"3465 - 3495"},"PeriodicalIF":0.9,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Algorithmica
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1