Pub Date : 2024-09-14DOI: 10.1007/s00453-024-01272-x
Chien-Chung Huang, François Sellier
We consider the problem of maximizing a non-negative submodular function under the b-matching constraint, in the semi-streaming model. When the function is linear, monotone, and non-monotone, we obtain the approximation ratios of (2+varepsilon ), (3 + 2 sqrt{2} approx 5.828), and (4 + 2 sqrt{3} approx 7.464), respectively. We also consider a generalized problem, where a k-uniform hypergraph is given, along with an extra matroid or a (k')-matchoid constraint imposed on the edges, with the same goal of finding a b-matching that maximizes a submodular function. When the extra constraint is a matroid, we obtain the approximation ratios of (k + 1 + varepsilon ), (k + 2sqrt{k+1} + 2), and (k + 2sqrt{k + 2} + 3) for linear, monotone and non-monotone submodular functions, respectively. When the extra constraint is a (k')-matchoid, we attain the approximation ratio (frac{8}{3}k+ frac{64}{9}k' + O(1)) for general submodular functions.
{"title":"Semi-streaming Algorithms for Submodular Function Maximization Under b-Matching, Matroid, and Matchoid Constraints","authors":"Chien-Chung Huang, François Sellier","doi":"10.1007/s00453-024-01272-x","DOIUrl":"10.1007/s00453-024-01272-x","url":null,"abstract":"<div><p>We consider the problem of maximizing a non-negative submodular function under the <i>b</i>-matching constraint, in the semi-streaming model. When the function is linear, monotone, and non-monotone, we obtain the approximation ratios of <span>(2+varepsilon )</span>, <span>(3 + 2 sqrt{2} approx 5.828)</span>, and <span>(4 + 2 sqrt{3} approx 7.464)</span>, respectively. We also consider a generalized problem, where a <i>k</i>-uniform hypergraph is given, along with an extra matroid or a <span>(k')</span>-matchoid constraint imposed on the edges, with the same goal of finding a <i>b</i>-matching that maximizes a submodular function. When the extra constraint is a matroid, we obtain the approximation ratios of <span>(k + 1 + varepsilon )</span>, <span>(k + 2sqrt{k+1} + 2)</span>, and <span>(k + 2sqrt{k + 2} + 3)</span> for linear, monotone and non-monotone submodular functions, respectively. When the extra constraint is a <span>(k')</span>-matchoid, we attain the approximation ratio <span>(frac{8}{3}k+ frac{64}{9}k' + O(1))</span> for general submodular functions.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 11","pages":"3598 - 3628"},"PeriodicalIF":0.9,"publicationDate":"2024-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142248533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-13DOI: 10.1007/s00453-024-01269-6
Ameet Gadekar
The Set Packing problem is, given a collection of sets (mathcal {S}) over a ground set U, to find a maximum collection of sets that are pairwise disjoint. The problem is among the most fundamental NP-hard optimization problems that have been studied extensively in various computational regimes. The focus of this work is on parameterized complexity, Parameterized Set Packing (PSP): Given parameter (r in {mathbb N}), is there a collection ( mathcal {S}' subseteq mathcal {S}: |mathcal {S}'| = r) such that the sets in (mathcal {S}') are pairwise disjoint? Unfortunately, the problem is not fixed parameter tractable unless (textsf {W[1]} = textsf {FPT} ), and, in fact, an “enumerative” running time of (|mathcal {S}|^{Omega (r)}) is required unless the exponential time hypothesis (ETH) fails. This paper is a quest for tractable instances of Set Packing from parameterized complexity perspectives. We say that the input (({U},mathcal {S})) is “compact” if (|{U}| = f(r)cdot textsf {poly} ( log |mathcal {S}|)), for some (f(r) ge r). In the Compact PSP problem, we are given a compact instance of PSP. In this direction, we present a “dichotomy” result of PSP: When (|{U}| = f(r)cdot o(log |mathcal {S}|)), PSP is in FPT, while for (|{U}| = rcdot Theta (log (|mathcal {S}|))), the problem is W[1]-hard; moreover, assuming ETH, Compact PSP does not admit (|mathcal {S}|^{o(r/log r)}) time algorithm even when (|{U}| = rcdot Theta (log (|mathcal {S}|))). Although certain results in the literature imply hardness of compact versions of related problems such as Set(r)-Covering and Exact(r)-Covering, these constructions fail to extend to Compact PSP. A novel contribution of our work is the identification and construction of a gadget, which we call Compatible Intersecting Set System pair, that is crucial in obtaining the hardness result for Compact PSP. Finally, our framework can be extended to obtain improved running time lower bounds for Compact(r)-VectorSum.
{"title":"On the Parameterized Complexity of Compact Set Packing","authors":"Ameet Gadekar","doi":"10.1007/s00453-024-01269-6","DOIUrl":"10.1007/s00453-024-01269-6","url":null,"abstract":"<div><p>The <span>Set Packing</span> problem is, given a collection of sets <span>(mathcal {S})</span> over a ground set <i>U</i>, to find a maximum collection of sets that are pairwise disjoint. The problem is among the most fundamental NP-hard optimization problems that have been studied extensively in various computational regimes. The focus of this work is on parameterized complexity, <span>Parameterized Set Packing</span> (<span>PSP</span>): Given parameter <span>(r in {mathbb N})</span>, is there a collection <span>( mathcal {S}' subseteq mathcal {S}: |mathcal {S}'| = r)</span> such that the sets in <span>(mathcal {S}')</span> are pairwise disjoint? Unfortunately, the problem is not fixed parameter tractable unless <span>(textsf {W[1]} = textsf {FPT} )</span>, and, in fact, an “enumerative” running time of <span>(|mathcal {S}|^{Omega (r)})</span> is required unless the exponential time hypothesis (ETH) fails. This paper is a quest for tractable instances of <span>Set Packing</span> from parameterized complexity perspectives. We say that the input <span>(({U},mathcal {S}))</span> is “compact” if <span>(|{U}| = f(r)cdot textsf {poly} ( log |mathcal {S}|))</span>, for some <span>(f(r) ge r)</span>. In the <span>Compact PSP</span> problem, we are given a compact instance of <span>PSP</span>. In this direction, we present a “dichotomy” result of <span>PSP</span>: When <span>(|{U}| = f(r)cdot o(log |mathcal {S}|))</span>, <span>PSP</span> is in <span>FPT</span>, while for <span>(|{U}| = rcdot Theta (log (|mathcal {S}|)))</span>, the problem is <span>W[1]</span>-hard; moreover, assuming ETH, <span>Compact PSP</span> does not admit <span>(|mathcal {S}|^{o(r/log r)})</span> time algorithm even when <span>(|{U}| = rcdot Theta (log (|mathcal {S}|)))</span>. Although certain results in the literature imply hardness of compact versions of related problems such as <span>Set</span> <span>(r)</span><span>-Covering</span> and <span>Exact</span> <span>(r)</span><span>-Covering</span>, these constructions fail to extend to <span>Compact PSP</span>. A novel contribution of our work is the identification and construction of a gadget, which we call Compatible Intersecting Set System pair, that is crucial in obtaining the hardness result for <span>Compact PSP</span>. Finally, our framework can be extended to obtain improved running time lower bounds for <span>Compact</span> <span>(r)</span><span>-VectorSum</span>.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 11","pages":"3579 - 3597"},"PeriodicalIF":0.9,"publicationDate":"2024-09-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01269-6.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197060","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-12DOI: 10.1007/s00453-024-01268-7
Piotr Krysta, Mathieu Mari, Nan Zhi
We study the approximability of the maximum size independent set (MIS) problem in bounded degree graphs. This is one of the most classic and widely studied NP-hard optimization problems. It is known for its inherent hardness of approximation. We focus on the well known minimum-degree greedy algorithm for this problem. This algorithm iteratively chooses a minimum degree vertex in the graph, adds it to the solution and removes its neighbors, until the remaining graph is empty. The approximation ratios of this algorithm have been widely studied, where it is augmented with an advice that tells the greedy algorithm which minimum degree vertex to choose if it is not unique. Our main contribution is a new mathematical theory for the design of such greedy algorithms for MIS with efficiently computable advice and for the analysis of their approximation ratios. Using this theory we obtain the ultimate approximation ratio of 5/4 for greedy algorithms on graphs with maximum degree 3, which completely solves an open problem from the paper by Halldórsson and Yoshihara (in: Staples, Eades, Katoh, Moffat (eds) Algorithms and computations—ISAAC ’95, in 2026 LNCS, Springer, Berlin, Heidelberg, 1995) . Our algorithm is the fastest currently known algorithm for MIS with this approximation ratio on such graphs. We also obtain a simple and short proof of the ((Delta +2)/3)-approximation ratio of any greedy algorithms on graphs with maximum degree (Delta ), the result proved previously by Halldórsson and Radhakrishnan (Nord J Comput 1:475–492, 1994) . We almost match this ratio by showing a lower bound of ((Delta +1)/3) on the ratio of a greedy algorithm that can use an advice. We apply our new algorithm to the minimum vertex cover problem on graphs with maximum degree 3 to obtain a substantially faster 6/5-approximation algorithm than the one currently known. We complement our algorithmic, upper bound results with lower bound results, which show that the problem of designing good advice for greedy algorithms for MIS is computationally hard and even hard to approximate on various classes of graphs. These results significantly improve on the previously known hardness results. Moreover, these results suggest that obtaining the upper bound results on the design and analysis of the greedy advice is non-trivial.
我们研究了有界度图中最大独立集(MIS)问题的近似性。这是最经典、研究最广泛的 NP 难优化问题之一。它因其固有的近似难度而闻名。我们的重点是针对这一问题的众所周知的最小度贪婪算法。该算法在图中反复选择一个最小度顶点,将其添加到解决方案中,并移除其邻近顶点,直到剩余图为空。该算法的近似率已被广泛研究,其中增加了一个建议,告诉贪心算法如果最小度顶点不是唯一的,该选择哪个顶点。我们的主要贡献是提出了一种新的数学理论,用于设计这种带有可有效计算建议的 MIS 贪婪算法,并分析其近似率。利用这一理论,我们得到了最大阶数为 3 的图上的贪心算法的最终近似率为 5/4,这完全解决了 Halldórsson 和 Yoshihara 的论文(in:Staples, Eades, Katoh, Moffat (eds) Algorithms and computations-ISAAC '95, in 2026 LNCS, Springer, Berlin, Heidelberg, 1995)。我们的算法是目前已知在此类图上具有此近似率的最快 MIS 算法。我们还得到了一个简单而简短的证明,即在最大度数为 (Delta )的图上,任何贪婪算法的近似率为 ((Delta +2)/3) ,这个结果之前由 Halldórsson 和 Radhakrishnan 证明过(Nord J Comput 1:475-492, 1994)。我们几乎与这一比率不相上下,显示了可以使用建议的贪婪算法的比率下限为 ((Delta +1)/3)。我们将新算法应用于最大阶数为 3 的图上的最小顶点覆盖问题,得到了比目前已知算法更快的 6/5 近似算法。我们用下限结果补充了我们的算法上限结果,这些结果表明,为 MIS 贪婪算法设计良好建议的问题在计算上是困难的,甚至在各种图类上都很难近似。这些结果大大改进了之前已知的难度结果。此外,这些结果还表明,获得贪婪建议设计和分析的上界结果并非易事。
{"title":"Ultimate Greedy Approximation of Independent Sets in Subcubic Graphs","authors":"Piotr Krysta, Mathieu Mari, Nan Zhi","doi":"10.1007/s00453-024-01268-7","DOIUrl":"10.1007/s00453-024-01268-7","url":null,"abstract":"<div><p>We study the approximability of the maximum size independent set (MIS) problem in bounded degree graphs. This is one of the most classic and widely studied NP-hard optimization problems. It is known for its inherent hardness of approximation. We focus on the well known minimum-degree greedy algorithm for this problem. This algorithm iteratively chooses a minimum degree vertex in the graph, adds it to the solution and removes its neighbors, until the remaining graph is empty. The approximation ratios of this algorithm have been widely studied, where it is augmented with an advice that tells the greedy algorithm which minimum degree vertex to choose if it is not unique. Our main contribution is a new mathematical theory for the design of such greedy algorithms for MIS with efficiently computable advice and for the analysis of their approximation ratios. Using this theory we obtain the ultimate approximation ratio of 5/4 for greedy algorithms on graphs with maximum degree 3, which completely solves an open problem from the paper by Halldórsson and Yoshihara (in: Staples, Eades, Katoh, Moffat (eds) Algorithms and computations—ISAAC ’95, in 2026 LNCS, Springer, Berlin, Heidelberg, 1995) . Our algorithm is the fastest currently known algorithm for MIS with this approximation ratio on such graphs. We also obtain a simple and short proof of the <span>((Delta +2)/3)</span>-approximation ratio of any greedy algorithms on graphs with maximum degree <span>(Delta )</span>, the result proved previously by Halldórsson and Radhakrishnan (Nord J Comput 1:475–492, 1994) . We almost match this ratio by showing a lower bound of <span>((Delta +1)/3)</span> on the ratio of a greedy algorithm that can use an advice. We apply our new algorithm to the minimum vertex cover problem on graphs with maximum degree 3 to obtain a substantially faster 6/5-approximation algorithm than the one currently known. We complement our algorithmic, upper bound results with lower bound results, which show that the problem of designing good advice for greedy algorithms for MIS is computationally hard and even hard to approximate on various classes of graphs. These results significantly improve on the previously known hardness results. Moreover, these results suggest that obtaining the upper bound results on the design and analysis of the greedy advice is non-trivial.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 11","pages":"3518 - 3578"},"PeriodicalIF":0.9,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-09-12DOI: 10.1007/s00453-024-01248-x
Piotr Berman, Meiram Murzabulatov, Sofya Raskhodnikova, Dragos-Florian Ristache
We investigate algorithms for testing whether an image is connected. Given a proximity parameter ({epsilon }in (0,1)) and query access to a black-and-white image represented by an (ntimes n) matrix of Boolean pixel values, a (1-sided error) connectedness tester accepts if the image is connected and rejects with probability at least 2/3 if the image is ({epsilon })-far from connected. We show that connectedness can be tested nonadaptively with (OBig (frac{1}{{epsilon }^2}Big )) queries and adaptively with (OBig (frac{1}{{epsilon }^{3/2}} sqrt{log frac{1}{{epsilon }}}Big )) queries. The best connectedness tester to date, by Berman, Raskhodnikova, and Yaroslavtsev (STOC 2014) had query complexity (OBig (frac{1}{{epsilon }^2}log frac{1}{{epsilon }}Big )) and was adaptive. We also prove that every nonadaptive, 1-sided error tester for connectedness must make (Omega Big (frac{1}{{epsilon }}log frac{1}{{epsilon }}Big )) queries.
{"title":"Testing Connectedness of Images","authors":"Piotr Berman, Meiram Murzabulatov, Sofya Raskhodnikova, Dragos-Florian Ristache","doi":"10.1007/s00453-024-01248-x","DOIUrl":"10.1007/s00453-024-01248-x","url":null,"abstract":"<div><p>We investigate algorithms for testing whether an image is connected. Given a proximity parameter <span>({epsilon }in (0,1))</span> and query access to a black-and-white image represented by an <span>(ntimes n)</span> matrix of Boolean pixel values, a (1-sided error) connectedness tester accepts if the image is connected and rejects with probability at least 2/3 if the image is <span>({epsilon })</span>-far from connected. We show that connectedness can be tested nonadaptively with <span>(OBig (frac{1}{{epsilon }^2}Big ))</span> queries and adaptively with <span>(OBig (frac{1}{{epsilon }^{3/2}} sqrt{log frac{1}{{epsilon }}}Big ))</span> queries. The best connectedness tester to date, by Berman, Raskhodnikova, and Yaroslavtsev (STOC 2014) had query complexity <span>(OBig (frac{1}{{epsilon }^2}log frac{1}{{epsilon }}Big ))</span> and was adaptive. We also prove that every nonadaptive, 1-sided error tester for connectedness must make <span>(Omega Big (frac{1}{{epsilon }}log frac{1}{{epsilon }}Big ))</span> queries.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 11","pages":"3496 - 3517"},"PeriodicalIF":0.9,"publicationDate":"2024-09-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The game of rendezvous with adversaries is a game on a graph played by two players: Facilitator and Divider. Facilitator has two agents and Divider has a team of (k ge 1) agents. While the initial positions of Facilitator’s agents are fixed, Divider gets to select the initial positions of his agents. Then, they take turns to move their agents to adjacent vertices (or stay put) with Facilitator’s goal to bring both her agents at same vertex and Divider’s goal to prevent it. The computational question of interest is to determine if Facilitator has a winning strategy against Divider with k agents. Fomin, Golovach, and Thilikos [WG, 2021] introduced this game and proved that it is PSPACE-hard and co-W[2]-hard parameterized by the number of agents. This hardness naturally motivates the structural parameterization of the problem. The authors proved that it admits an FPT algorithm when parameterized by the modular width and the number of allowed rounds. However, they left open the complexity of the problem from the perspective of other structural parameters. In particular, they explicitly asked whether the problem admits an FPT or XP-algorithm with respect to the treewidth of the input graph. We answer this question in the negative and show that Rendezvous is co-NP-hard even for graphs of constant treewidth. Further, we show that the problem is co-W[1]-hard when parameterized by the feedback vertex set number and the number of agents, and is unlikely to admit a polynomial kernel when parameterized by the vertex cover number and the number of agents. Complementing these hardness results, we show that the Rendezvous is FPT when parameterized by both the vertex cover number and the solution size. Finally, for graphs of treewidth at most two and girds, we show that the problem can be solved in polynomial time.
与对手会合游戏是由两名玩家在图形上进行的游戏:促进者和分割者。促进者有两个代理人,而分割者有一个由(k ge 1 )个代理人组成的团队。促进者的代理人的初始位置是固定的,而分割者可以选择他的代理人的初始位置。然后,他们轮流将自己的代理移动到相邻的顶点(或原地不动),促进者的目标是将她的代理都移动到同一个顶点,而分割者的目标是防止这种情况发生。我们感兴趣的计算问题是,在有 k 个代理的情况下,确定调解人是否有战胜分割人的策略。Fomin、Golovach 和 Thilikos [WG, 2021] 引入了这一博弈,并证明它是 PSPACE-硬博弈,而且是以代理数为参数的 co-W[2] -硬博弈。这种难度自然而然地促使人们对问题进行结构参数化。作者证明,当以模块宽度和允许回合数为参数时,它允许一种 FPT 算法。但是,他们没有从其他结构参数的角度来考虑问题的复杂性。特别是,他们明确提出了这样一个问题:就输入图的树宽而言,该问题是采用 FPT 算法还是 XP 算法?我们对这个问题的回答是否定的,并证明即使对于恒定树宽的图,Rendezvous 也是共 NP 难的。此外,我们还证明,当以反馈顶点集数和代理数为参数时,该问题是共 W[1]-hard 的,而当以顶点覆盖数和代理数为参数时,该问题不太可能有多项式内核。作为对这些困难性结果的补充,我们证明了当以顶点覆盖数和解大小为参数时,"会聚 "是 FPT。最后,对于树宽最多为 2 且有树枝的图,我们证明该问题可以在多项式时间内求解。
{"title":"Romeo and Juliet Meeting in Forest Like Regions","authors":"Neeldhara Misra, Manas Mulpuri, Prafullkumar Tale, Gaurav Viramgami","doi":"10.1007/s00453-024-01264-x","DOIUrl":"10.1007/s00453-024-01264-x","url":null,"abstract":"<div><p>The game of rendezvous with adversaries is a game on a graph played by two players: <i>Facilitator</i> and <i>Divider</i>. Facilitator has two agents and Divider has a team of <span>(k ge 1)</span> agents. While the initial positions of Facilitator’s agents are fixed, Divider gets to select the initial positions of his agents. Then, they take turns to move their agents to adjacent vertices (or stay put) with Facilitator’s goal to bring both her agents at same vertex and Divider’s goal to prevent it. The computational question of interest is to determine if Facilitator has a winning strategy against Divider with <i>k</i> agents. Fomin, Golovach, and Thilikos [WG, 2021] introduced this game and proved that it is <span>PSPACE</span>-<span>hard</span> and <span>co</span>-<span>W</span>[2]-<span>hard</span> parameterized by the number of agents. This hardness naturally motivates the structural parameterization of the problem. The authors proved that it admits an <span>FPT</span> algorithm when parameterized by the modular width and the number of allowed rounds. However, they left open the complexity of the problem from the perspective of other structural parameters. In particular, they explicitly asked whether the problem admits an <span>FPT</span> or <span>XP</span>-algorithm with respect to the treewidth of the input graph. We answer this question in the negative and show that <span>Rendezvous</span> is <span>co</span>-<span>NP</span>-<span>hard</span> even for graphs of constant treewidth. Further, we show that the problem is <span>co</span>-<span>W</span>[1]-<span>hard</span> when parameterized by the feedback vertex set number and the number of agents, and is unlikely to admit a polynomial kernel when parameterized by the vertex cover number and the number of agents. Complementing these hardness results, we show that the <span>Rendezvous</span> is <span>FPT</span> when parameterized by both the vertex cover number and the solution size. Finally, for graphs of treewidth at most two and girds, we show that the problem can be solved in polynomial time.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 11","pages":"3465 - 3495"},"PeriodicalIF":0.9,"publicationDate":"2024-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Motivated by an application from geodesy, we study the connected k-center problem and the connected k-diameter problem. The former problem has been introduced by Ge et al. (ACM Trans Knowl Discov Data 2(2):1–35, 2008. https://doi.org/10.1145/1376815.1376816) to model clustering of data sets with both attribute and relationship data. These problems arise from the classical k-center and k-diameter problems by adding a side constraint. For the side constraint, we are given an undirected connectivity graphG on the input points, and a clustering is now only feasible if every cluster induces a connected subgraph in G. Usually in clustering problems one assumes that the clusters are pairwise disjoint. We study this case but additionally also the case that clusters are allowed to be non-disjoint. This can help to satisfy the connectivity constraints. Our main result is an (O(log ^2k))-approximation algorithm for the disjoint connected k-center and k-diameter problem. For Euclidean spaces of constant dimension and for metrics with constant doubling dimension, the approximation factor improves to O(1). Our algorithm works by computing a non-disjoint connected clustering first and transforming it into a disjoint connected clustering. We complement these upper bounds by several upper and lower bounds for variations and special cases of the model.
受大地测量学应用的启发,我们研究了连接 k 中心问题和连接 k 直径问题。前一个问题由 Ge 等人提出(ACM Trans Knowl Discov Data 2(2):1-35, 2008. https://doi.org/10.1145/1376815.1376816),用于对同时包含属性数据和关系数据的数据集进行聚类建模。这些问题是在经典的 k 中心问题和 k 直径问题的基础上增加一个侧面约束而产生的。对于侧约束,我们给定了输入点上的无向连接图 G,现在只有当每个聚类都在 G 中诱导出一个连接子图时,聚类才是可行的。我们在研究这种情况的同时,还研究了允许聚类不相交的情况。这有助于满足连接性约束。我们的主要成果是针对互不相交的 k 中心和 k 直径问题的 (O(log ^2k))-approximation 算法。对于维度恒定的欧几里得空间和维度恒定加倍的度量,近似因子提高到了 O(1)。我们的算法首先计算非相交连接聚类,然后将其转换为相交连接聚类。我们还针对模型的变化和特例给出了一些上下限,以补充这些上限。
{"title":"Connected k-Center and k-Diameter Clustering","authors":"Lukas Drexler, Jan Eube, Kelin Luo, Dorian Reineccius, Heiko Röglin, Melanie Schmidt, Julian Wargalla","doi":"10.1007/s00453-024-01266-9","DOIUrl":"10.1007/s00453-024-01266-9","url":null,"abstract":"<div><p>Motivated by an application from geodesy, we study the <i>connected k-center problem</i> and the <i>connected k-diameter problem</i>. The former problem has been introduced by Ge et al. (ACM Trans Knowl Discov Data 2(2):1–35, 2008. https://doi.org/10.1145/1376815.1376816) to model clustering of data sets with both attribute and relationship data. These problems arise from the classical <i>k</i>-center and <i>k</i>-diameter problems by adding a side constraint. For the side constraint, we are given an undirected <i>connectivity graph</i> <i>G</i> on the input points, and a clustering is now only feasible if every cluster induces a connected subgraph in <i>G</i>. Usually in clustering problems one assumes that the clusters are pairwise disjoint. We study this case but additionally also the case that clusters are allowed to be non-disjoint. This can help to satisfy the connectivity constraints. Our main result is an <span>(O(log ^2k))</span>-approximation algorithm for the disjoint connected <i>k</i>-center and <i>k</i>-diameter problem. For Euclidean spaces of constant dimension and for metrics with constant doubling dimension, the approximation factor improves to <i>O</i>(1). Our algorithm works by computing a non-disjoint connected clustering first and transforming it into a disjoint connected clustering. We complement these upper bounds by several upper and lower bounds for variations and special cases of the model.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 11","pages":"3425 - 3464"},"PeriodicalIF":0.9,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01266-9.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Given a graph and two vertex sets satisfying a certain feasibility condition, a reconfiguration problem asks whether we can reach one vertex set from the other by repeating prescribed modification steps while maintaining feasibility. In this setting, as reported by Mouawad et al. (IPEC, Springer, Berlin, 2014) presented an algorithmic meta-theorem for reconfiguration problems that says if the feasibility can be expressed in monadic second-order logic (MSO), then the problem is fixed-parameter tractable parameterized by (text {treewidth} + ell ), where (ell ) is the number of steps allowed to reach the target set. On the other hand, it is shown by Wrochna (J Comput Syst Sci 93:1–10, 2018). https://doi.org/10.1016/j.jcss.2017.11.003) that if (ell ) is not part of the parameter, then the problem is PSPACE-complete even on graphs of constant bandwidth. In this paper, we present the first algorithmic meta-theorems for the case where (ell ) is not part of the parameter, using some structural graph parameters incomparable with bandwidth. We show that if the feasibility is defined in MSO, then the reconfiguration problem under the so-called token jumping rule is fixed-parameter tractable parameterized by neighborhood diversity. We also show that the problem is fixed-parameter tractable parameterized by (text {treedepth} + k), where k is the size of sets being transformed. We finally complement the positive result for treedepth by showing that the problem is PSPACE-complete on forests of depth 3.
{"title":"Algorithmic Meta-Theorems for Combinatorial Reconfiguration Revisited","authors":"Tatsuya Gima, Takehiro Ito, Yasuaki Kobayashi, Yota Otachi","doi":"10.1007/s00453-024-01261-0","DOIUrl":"10.1007/s00453-024-01261-0","url":null,"abstract":"<div><p>Given a graph and two vertex sets satisfying a certain feasibility condition, a reconfiguration problem asks whether we can reach one vertex set from the other by repeating prescribed modification steps while maintaining feasibility. In this setting, as reported by Mouawad et al. (IPEC, Springer, Berlin, 2014) presented an algorithmic meta-theorem for reconfiguration problems that says if the feasibility can be expressed in monadic second-order logic (MSO), then the problem is fixed-parameter tractable parameterized by <span>(text {treewidth} + ell )</span>, where <span>(ell )</span> is the number of steps allowed to reach the target set. On the other hand, it is shown by Wrochna (J Comput Syst Sci 93:1–10, 2018). https://doi.org/10.1016/j.jcss.2017.11.003) that if <span>(ell )</span> is not part of the parameter, then the problem is PSPACE-complete even on graphs of constant bandwidth. In this paper, we present the first algorithmic meta-theorems for the case where <span>(ell )</span> is not part of the parameter, using some structural graph parameters incomparable with bandwidth. We show that if the feasibility is defined in MSO, then the reconfiguration problem under the so-called token jumping rule is fixed-parameter tractable parameterized by neighborhood diversity. We also show that the problem is fixed-parameter tractable parameterized by <span>(text {treedepth} + k)</span>, where <i>k</i> is the size of sets being transformed. We finally complement the positive result for treedepth by showing that the problem is PSPACE-complete on forests of depth 3.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 11","pages":"3395 - 3424"},"PeriodicalIF":0.9,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-31DOI: 10.1007/s00453-024-01259-8
Idan Attias, Edith Cohen, Moshe Shechner, Uri Stemmer
Classical streaming algorithms operate under the (not always reasonable) assumption that the input stream is fixed in advance. Recently, there is a growing interest in designing robust streaming algorithms that provide provable guarantees even when the input stream is chosen adaptively as the execution progresses. We propose a new framework for robust streaming that combines techniques from two recently suggested frameworks by Hassidim et al. (NeurIPS 2020) and by Woodruff and Zhou (FOCS 2021). These recently suggested frameworks rely on very different ideas, each with its own strengths and weaknesses. We combine these two frameworks into a single hybrid framework that obtains the “best of both worlds”, thereby solving a question left open by Woodruff and Zhou.
{"title":"A Framework for Adversarial Streaming Via Differential Privacy and Difference Estimators","authors":"Idan Attias, Edith Cohen, Moshe Shechner, Uri Stemmer","doi":"10.1007/s00453-024-01259-8","DOIUrl":"10.1007/s00453-024-01259-8","url":null,"abstract":"<div><p>Classical streaming algorithms operate under the (not always reasonable) assumption that the input stream is fixed in advance. Recently, there is a growing interest in designing <i>robust streaming algorithms</i> that provide provable guarantees even when the input stream is chosen adaptively as the execution progresses. We propose a new framework for robust streaming that combines techniques from two recently suggested frameworks by Hassidim et al. (NeurIPS 2020) and by Woodruff and Zhou (FOCS 2021). These recently suggested frameworks rely on very different ideas, each with its own strengths and weaknesses. We combine these two frameworks into a single hybrid framework that obtains the “best of both worlds”, thereby solving a question left open by Woodruff and Zhou.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 11","pages":"3339 - 3394"},"PeriodicalIF":0.9,"publicationDate":"2024-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01259-8.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Reconfiguring two shortest paths in a graph means modifying one shortest path to the other by changing one vertex at a time so that all the intermediate paths are also shortest paths. This problem has several natural applications, namely: (a) repaving road networks, (b) rerouting data packets in a synchronous multiprocessing setting, (c) the shipping container stowage problem, and (d) the train marshalling problem. When modelled as graph problems, (a) is the most general case while (b), (c), (d) are restrictions to different graph classes. We show that (a) does not admit polynomial-time algorithms (assuming ({{,mathrm{texttt {P}},}}ne {{,mathrm{texttt {NP}},}})), even for relaxed variants of the problem (assuming ({{,mathrm{texttt {P}},}}ne {{,mathrm{texttt {PSPACE}},}})). For (b), (c), (d), we present polynomial-time algorithms to solve the respective problems. We also generalize the problem to when at most k (for a fixed integer (kge 2)) contiguous vertices on a shortest path can be changed at a time.
{"title":"Reconfiguring Shortest Paths in Graphs","authors":"Kshitij Gajjar, Agastya Vibhuti Jha, Manish Kumar, Abhiruk Lahiri","doi":"10.1007/s00453-024-01263-y","DOIUrl":"10.1007/s00453-024-01263-y","url":null,"abstract":"<div><p>Reconfiguring two shortest paths in a graph means modifying one shortest path to the other by changing one vertex at a time so that all the intermediate paths are also shortest paths. This problem has several natural applications, namely: (a) repaving road networks, (b) rerouting data packets in a synchronous multiprocessing setting, (c) the shipping container stowage problem, and (d) the train marshalling problem. When modelled as graph problems, (a) is the most general case while (b), (c), (d) are restrictions to different graph classes. We show that (a) does not admit polynomial-time algorithms (assuming <span>({{,mathrm{texttt {P}},}}ne {{,mathrm{texttt {NP}},}})</span>), even for relaxed variants of the problem (assuming <span>({{,mathrm{texttt {P}},}}ne {{,mathrm{texttt {PSPACE}},}})</span>). For (b), (c), (d), we present polynomial-time algorithms to solve the respective problems. We also generalize the problem to when at most <i>k</i> (for a fixed integer <span>(kge 2)</span>) contiguous vertices on a shortest path can be changed at a time.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 10","pages":"3309 - 3338"},"PeriodicalIF":0.9,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01263-y.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-26DOI: 10.1007/s00453-024-01262-z
Alexandre Cooper, Stephanie Maaz, Amer E. Mouawad, Naomi Nishimura
Our work is motivated by the challenges presented in preparing arrays of atoms for use in quantum simulation. The recently-developed process of loading atoms into traps results in approximately half of the traps being filled. To consolidate the atoms so that they form a dense and regular arrangement, such as all locations in a grid, atoms are rearranged using moving optical tweezers. Time is of the essence, as the longer that the process takes and the more that atoms are moved, the higher the chance that atoms will be lost in the process. Viewed as a problem on graphs, we wish to solve the problem of reconfiguring one arrangement of tokens (representing atoms) to another using as few moves as possible. Because the problem is NP-complete on general graphs as well as on grids, we focus on the parameterized complexity for various parameters, considering both undirected and directed graphs, and tokens with and without labels. For unlabelled tokens, the problem is fixed-parameter tractable when parameterized by the number of tokens, the number of moves, or the number of moves plus the number of vertices without tokens in either the source or target configuration, but intractable when parameterized by the difference between the number of moves and the number of differences in the placement of tokens in the source and target configurations. When labels are added to tokens, however, most of the tractability results are replaced by hardness results.
{"title":"Parameterized Complexity of Reconfiguration of Atoms","authors":"Alexandre Cooper, Stephanie Maaz, Amer E. Mouawad, Naomi Nishimura","doi":"10.1007/s00453-024-01262-z","DOIUrl":"10.1007/s00453-024-01262-z","url":null,"abstract":"<div><p>Our work is motivated by the challenges presented in preparing arrays of atoms for use in quantum simulation. The recently-developed process of loading atoms into traps results in approximately half of the traps being filled. To consolidate the atoms so that they form a dense and regular arrangement, such as all locations in a grid, atoms are rearranged using moving optical tweezers. Time is of the essence, as the longer that the process takes and the more that atoms are moved, the higher the chance that atoms will be lost in the process. Viewed as a problem on graphs, we wish to solve the problem of reconfiguring one arrangement of tokens (representing atoms) to another using as few moves as possible. Because the problem is <span>NP</span>-complete on general graphs as well as on grids, we focus on the parameterized complexity for various parameters, considering both undirected and directed graphs, and tokens with and without labels. For unlabelled tokens, the problem is fixed-parameter tractable when parameterized by the number of tokens, the number of moves, or the number of moves plus the number of vertices without tokens in either the source or target configuration, but intractable when parameterized by the difference between the number of moves and the number of differences in the placement of tokens in the source and target configurations. When labels are added to tokens, however, most of the tractability results are replaced by hardness results.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 10","pages":"3284 - 3308"},"PeriodicalIF":0.9,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}