Motivated by an application from geodesy, we study the connected k-center problem and the connected k-diameter problem. The former problem has been introduced by Ge et al. (ACM Trans Knowl Discov Data 2(2):1–35, 2008. https://doi.org/10.1145/1376815.1376816) to model clustering of data sets with both attribute and relationship data. These problems arise from the classical k-center and k-diameter problems by adding a side constraint. For the side constraint, we are given an undirected connectivity graphG on the input points, and a clustering is now only feasible if every cluster induces a connected subgraph in G. Usually in clustering problems one assumes that the clusters are pairwise disjoint. We study this case but additionally also the case that clusters are allowed to be non-disjoint. This can help to satisfy the connectivity constraints. Our main result is an (O(log ^2k))-approximation algorithm for the disjoint connected k-center and k-diameter problem. For Euclidean spaces of constant dimension and for metrics with constant doubling dimension, the approximation factor improves to O(1). Our algorithm works by computing a non-disjoint connected clustering first and transforming it into a disjoint connected clustering. We complement these upper bounds by several upper and lower bounds for variations and special cases of the model.
受大地测量学应用的启发,我们研究了连接 k 中心问题和连接 k 直径问题。前一个问题由 Ge 等人提出(ACM Trans Knowl Discov Data 2(2):1-35, 2008. https://doi.org/10.1145/1376815.1376816),用于对同时包含属性数据和关系数据的数据集进行聚类建模。这些问题是在经典的 k 中心问题和 k 直径问题的基础上增加一个侧面约束而产生的。对于侧约束,我们给定了输入点上的无向连接图 G,现在只有当每个聚类都在 G 中诱导出一个连接子图时,聚类才是可行的。我们在研究这种情况的同时,还研究了允许聚类不相交的情况。这有助于满足连接性约束。我们的主要成果是针对互不相交的 k 中心和 k 直径问题的 (O(log ^2k))-approximation 算法。对于维度恒定的欧几里得空间和维度恒定加倍的度量,近似因子提高到了 O(1)。我们的算法首先计算非相交连接聚类,然后将其转换为相交连接聚类。我们还针对模型的变化和特例给出了一些上下限,以补充这些上限。
{"title":"Connected k-Center and k-Diameter Clustering","authors":"Lukas Drexler, Jan Eube, Kelin Luo, Dorian Reineccius, Heiko Röglin, Melanie Schmidt, Julian Wargalla","doi":"10.1007/s00453-024-01266-9","DOIUrl":"10.1007/s00453-024-01266-9","url":null,"abstract":"<div><p>Motivated by an application from geodesy, we study the <i>connected k-center problem</i> and the <i>connected k-diameter problem</i>. The former problem has been introduced by Ge et al. (ACM Trans Knowl Discov Data 2(2):1–35, 2008. https://doi.org/10.1145/1376815.1376816) to model clustering of data sets with both attribute and relationship data. These problems arise from the classical <i>k</i>-center and <i>k</i>-diameter problems by adding a side constraint. For the side constraint, we are given an undirected <i>connectivity graph</i> <i>G</i> on the input points, and a clustering is now only feasible if every cluster induces a connected subgraph in <i>G</i>. Usually in clustering problems one assumes that the clusters are pairwise disjoint. We study this case but additionally also the case that clusters are allowed to be non-disjoint. This can help to satisfy the connectivity constraints. Our main result is an <span>(O(log ^2k))</span>-approximation algorithm for the disjoint connected <i>k</i>-center and <i>k</i>-diameter problem. For Euclidean spaces of constant dimension and for metrics with constant doubling dimension, the approximation factor improves to <i>O</i>(1). Our algorithm works by computing a non-disjoint connected clustering first and transforming it into a disjoint connected clustering. We complement these upper bounds by several upper and lower bounds for variations and special cases of the model.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 11","pages":"3425 - 3464"},"PeriodicalIF":0.9,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01266-9.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Given a graph and two vertex sets satisfying a certain feasibility condition, a reconfiguration problem asks whether we can reach one vertex set from the other by repeating prescribed modification steps while maintaining feasibility. In this setting, as reported by Mouawad et al. (IPEC, Springer, Berlin, 2014) presented an algorithmic meta-theorem for reconfiguration problems that says if the feasibility can be expressed in monadic second-order logic (MSO), then the problem is fixed-parameter tractable parameterized by (text {treewidth} + ell ), where (ell ) is the number of steps allowed to reach the target set. On the other hand, it is shown by Wrochna (J Comput Syst Sci 93:1–10, 2018). https://doi.org/10.1016/j.jcss.2017.11.003) that if (ell ) is not part of the parameter, then the problem is PSPACE-complete even on graphs of constant bandwidth. In this paper, we present the first algorithmic meta-theorems for the case where (ell ) is not part of the parameter, using some structural graph parameters incomparable with bandwidth. We show that if the feasibility is defined in MSO, then the reconfiguration problem under the so-called token jumping rule is fixed-parameter tractable parameterized by neighborhood diversity. We also show that the problem is fixed-parameter tractable parameterized by (text {treedepth} + k), where k is the size of sets being transformed. We finally complement the positive result for treedepth by showing that the problem is PSPACE-complete on forests of depth 3.
{"title":"Algorithmic Meta-Theorems for Combinatorial Reconfiguration Revisited","authors":"Tatsuya Gima, Takehiro Ito, Yasuaki Kobayashi, Yota Otachi","doi":"10.1007/s00453-024-01261-0","DOIUrl":"10.1007/s00453-024-01261-0","url":null,"abstract":"<div><p>Given a graph and two vertex sets satisfying a certain feasibility condition, a reconfiguration problem asks whether we can reach one vertex set from the other by repeating prescribed modification steps while maintaining feasibility. In this setting, as reported by Mouawad et al. (IPEC, Springer, Berlin, 2014) presented an algorithmic meta-theorem for reconfiguration problems that says if the feasibility can be expressed in monadic second-order logic (MSO), then the problem is fixed-parameter tractable parameterized by <span>(text {treewidth} + ell )</span>, where <span>(ell )</span> is the number of steps allowed to reach the target set. On the other hand, it is shown by Wrochna (J Comput Syst Sci 93:1–10, 2018). https://doi.org/10.1016/j.jcss.2017.11.003) that if <span>(ell )</span> is not part of the parameter, then the problem is PSPACE-complete even on graphs of constant bandwidth. In this paper, we present the first algorithmic meta-theorems for the case where <span>(ell )</span> is not part of the parameter, using some structural graph parameters incomparable with bandwidth. We show that if the feasibility is defined in MSO, then the reconfiguration problem under the so-called token jumping rule is fixed-parameter tractable parameterized by neighborhood diversity. We also show that the problem is fixed-parameter tractable parameterized by <span>(text {treedepth} + k)</span>, where <i>k</i> is the size of sets being transformed. We finally complement the positive result for treedepth by showing that the problem is PSPACE-complete on forests of depth 3.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 11","pages":"3395 - 3424"},"PeriodicalIF":0.9,"publicationDate":"2024-09-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-31DOI: 10.1007/s00453-024-01259-8
Idan Attias, Edith Cohen, Moshe Shechner, Uri Stemmer
Classical streaming algorithms operate under the (not always reasonable) assumption that the input stream is fixed in advance. Recently, there is a growing interest in designing robust streaming algorithms that provide provable guarantees even when the input stream is chosen adaptively as the execution progresses. We propose a new framework for robust streaming that combines techniques from two recently suggested frameworks by Hassidim et al. (NeurIPS 2020) and by Woodruff and Zhou (FOCS 2021). These recently suggested frameworks rely on very different ideas, each with its own strengths and weaknesses. We combine these two frameworks into a single hybrid framework that obtains the “best of both worlds”, thereby solving a question left open by Woodruff and Zhou.
{"title":"A Framework for Adversarial Streaming Via Differential Privacy and Difference Estimators","authors":"Idan Attias, Edith Cohen, Moshe Shechner, Uri Stemmer","doi":"10.1007/s00453-024-01259-8","DOIUrl":"10.1007/s00453-024-01259-8","url":null,"abstract":"<div><p>Classical streaming algorithms operate under the (not always reasonable) assumption that the input stream is fixed in advance. Recently, there is a growing interest in designing <i>robust streaming algorithms</i> that provide provable guarantees even when the input stream is chosen adaptively as the execution progresses. We propose a new framework for robust streaming that combines techniques from two recently suggested frameworks by Hassidim et al. (NeurIPS 2020) and by Woodruff and Zhou (FOCS 2021). These recently suggested frameworks rely on very different ideas, each with its own strengths and weaknesses. We combine these two frameworks into a single hybrid framework that obtains the “best of both worlds”, thereby solving a question left open by Woodruff and Zhou.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 11","pages":"3339 - 3394"},"PeriodicalIF":0.9,"publicationDate":"2024-08-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01259-8.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Reconfiguring two shortest paths in a graph means modifying one shortest path to the other by changing one vertex at a time so that all the intermediate paths are also shortest paths. This problem has several natural applications, namely: (a) repaving road networks, (b) rerouting data packets in a synchronous multiprocessing setting, (c) the shipping container stowage problem, and (d) the train marshalling problem. When modelled as graph problems, (a) is the most general case while (b), (c), (d) are restrictions to different graph classes. We show that (a) does not admit polynomial-time algorithms (assuming ({{,mathrm{texttt {P}},}}ne {{,mathrm{texttt {NP}},}})), even for relaxed variants of the problem (assuming ({{,mathrm{texttt {P}},}}ne {{,mathrm{texttt {PSPACE}},}})). For (b), (c), (d), we present polynomial-time algorithms to solve the respective problems. We also generalize the problem to when at most k (for a fixed integer (kge 2)) contiguous vertices on a shortest path can be changed at a time.
{"title":"Reconfiguring Shortest Paths in Graphs","authors":"Kshitij Gajjar, Agastya Vibhuti Jha, Manish Kumar, Abhiruk Lahiri","doi":"10.1007/s00453-024-01263-y","DOIUrl":"10.1007/s00453-024-01263-y","url":null,"abstract":"<div><p>Reconfiguring two shortest paths in a graph means modifying one shortest path to the other by changing one vertex at a time so that all the intermediate paths are also shortest paths. This problem has several natural applications, namely: (a) repaving road networks, (b) rerouting data packets in a synchronous multiprocessing setting, (c) the shipping container stowage problem, and (d) the train marshalling problem. When modelled as graph problems, (a) is the most general case while (b), (c), (d) are restrictions to different graph classes. We show that (a) does not admit polynomial-time algorithms (assuming <span>({{,mathrm{texttt {P}},}}ne {{,mathrm{texttt {NP}},}})</span>), even for relaxed variants of the problem (assuming <span>({{,mathrm{texttt {P}},}}ne {{,mathrm{texttt {PSPACE}},}})</span>). For (b), (c), (d), we present polynomial-time algorithms to solve the respective problems. We also generalize the problem to when at most <i>k</i> (for a fixed integer <span>(kge 2)</span>) contiguous vertices on a shortest path can be changed at a time.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 10","pages":"3309 - 3338"},"PeriodicalIF":0.9,"publicationDate":"2024-08-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01263-y.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197067","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-26DOI: 10.1007/s00453-024-01262-z
Alexandre Cooper, Stephanie Maaz, Amer E. Mouawad, Naomi Nishimura
Our work is motivated by the challenges presented in preparing arrays of atoms for use in quantum simulation. The recently-developed process of loading atoms into traps results in approximately half of the traps being filled. To consolidate the atoms so that they form a dense and regular arrangement, such as all locations in a grid, atoms are rearranged using moving optical tweezers. Time is of the essence, as the longer that the process takes and the more that atoms are moved, the higher the chance that atoms will be lost in the process. Viewed as a problem on graphs, we wish to solve the problem of reconfiguring one arrangement of tokens (representing atoms) to another using as few moves as possible. Because the problem is NP-complete on general graphs as well as on grids, we focus on the parameterized complexity for various parameters, considering both undirected and directed graphs, and tokens with and without labels. For unlabelled tokens, the problem is fixed-parameter tractable when parameterized by the number of tokens, the number of moves, or the number of moves plus the number of vertices without tokens in either the source or target configuration, but intractable when parameterized by the difference between the number of moves and the number of differences in the placement of tokens in the source and target configurations. When labels are added to tokens, however, most of the tractability results are replaced by hardness results.
{"title":"Parameterized Complexity of Reconfiguration of Atoms","authors":"Alexandre Cooper, Stephanie Maaz, Amer E. Mouawad, Naomi Nishimura","doi":"10.1007/s00453-024-01262-z","DOIUrl":"10.1007/s00453-024-01262-z","url":null,"abstract":"<div><p>Our work is motivated by the challenges presented in preparing arrays of atoms for use in quantum simulation. The recently-developed process of loading atoms into traps results in approximately half of the traps being filled. To consolidate the atoms so that they form a dense and regular arrangement, such as all locations in a grid, atoms are rearranged using moving optical tweezers. Time is of the essence, as the longer that the process takes and the more that atoms are moved, the higher the chance that atoms will be lost in the process. Viewed as a problem on graphs, we wish to solve the problem of reconfiguring one arrangement of tokens (representing atoms) to another using as few moves as possible. Because the problem is <span>NP</span>-complete on general graphs as well as on grids, we focus on the parameterized complexity for various parameters, considering both undirected and directed graphs, and tokens with and without labels. For unlabelled tokens, the problem is fixed-parameter tractable when parameterized by the number of tokens, the number of moves, or the number of moves plus the number of vertices without tokens in either the source or target configuration, but intractable when parameterized by the difference between the number of moves and the number of differences in the placement of tokens in the source and target configurations. When labels are added to tokens, however, most of the tractability results are replaced by hardness results.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 10","pages":"3284 - 3308"},"PeriodicalIF":0.9,"publicationDate":"2024-08-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-13DOI: 10.1007/s00453-024-01254-z
Jakob Bossek, Dirk Sudholt
Quality diversity (QD) is a branch of evolutionary computation that gained increasing interest in recent years. The Map-Elites QD approach defines a feature space, i.e., a partition of the search space, and stores the best solution for each cell of this space. We study a simple QD algorithm in the context of pseudo-Boolean optimisation on the “number of ones” feature space, where the ith cell stores the best solution amongst those with a number of ones in ([(i-1)k, ik-1]). Here k is a granularity parameter (1 le k le n+1). We give a tight bound on the expected time until all cells are covered for arbitrary fitness functions and for all k and analyse the expected optimisation time of QD on OneMax and other problems whose structure aligns favourably with the feature space. On combinatorial problems we show that QD finds a ({(1-1/e)})-approximation when maximising any monotone sub-modular function with a single uniform cardinality constraint efficiently. Defining the feature space as the number of connected components of an edge-weighted graph, we show that QD finds a minimum spanning forest in expected polynomial time. We further consider QD’s performance on classes of transformed functions in which the feature space is not well aligned with the problem. The asymptotic performance is unaffected by transformations on easy functions like OneMax. Applying a worst-case transformation to a deceptive problem increases the expected optimisation time from (O(n^2 log n)) to an exponential time. However, QD is still faster than a (1+1) EA by an exponential factor.
质量多样性(QD)是进化计算的一个分支,近年来越来越受到关注。Map-Elites QD 方法定义了一个特征空间,即搜索空间的一个分区,并为该空间的每个单元存储最佳解决方案。我们在 "1 的个数 "特征空间的伪布尔优化背景下研究了一种简单的 QD 算法,其中第 i 个单元格存储了 1 的个数在 ([(i-1)k, ik-1]) 中的最佳解决方案。这里 k 是一个粒度参数(1 le k le n+1)。我们给出了在任意拟合函数和所有 k 条件下直到覆盖所有单元的预期时间的严格约束,并分析了 QD 在 OneMax 和其他结构与特征空间一致的问题上的预期优化时间。在组合问题上,我们证明当最大化任何单调子模函数时,QD能高效地找到一个({(1-1/e)}/)近似值,该函数具有一个单一的均匀万有引力约束。将特征空间定义为边缘加权图的连接成分数,我们证明 QD 可以在预期多项式时间内找到最小生成林。我们进一步考虑了 QD 在特征空间与问题不完全一致的变换函数类别中的性能。渐近性能不受 OneMax 等简单函数变换的影响。将最坏情况下的转换应用到欺骗性问题上,预期优化时间会从(O(n^2 log n))增加到指数时间。然而,QD 仍比 (1+1) EA 快指数倍。
{"title":"Runtime Analysis of Quality Diversity Algorithms","authors":"Jakob Bossek, Dirk Sudholt","doi":"10.1007/s00453-024-01254-z","DOIUrl":"10.1007/s00453-024-01254-z","url":null,"abstract":"<div><p>Quality diversity (QD) is a branch of evolutionary computation that gained increasing interest in recent years. The Map-Elites QD approach defines a feature space, i.e., a partition of the search space, and stores the best solution for each cell of this space. We study a simple QD algorithm in the context of pseudo-Boolean optimisation on the “number of ones” feature space, where the <i>i</i>th cell stores the best solution amongst those with a number of ones in <span>([(i-1)k, ik-1])</span>. Here <i>k</i> is a granularity parameter <span>(1 le k le n+1)</span>. We give a tight bound on the expected time until all cells are covered for arbitrary fitness functions and for all <i>k</i> and analyse the expected optimisation time of QD on <span>OneMax</span> and other problems whose structure aligns favourably with the feature space. On combinatorial problems we show that QD finds a <span>({(1-1/e)})</span>-approximation when maximising any monotone sub-modular function with a single uniform cardinality constraint efficiently. Defining the feature space as the number of connected components of an edge-weighted graph, we show that QD finds a minimum spanning forest in expected polynomial time. We further consider QD’s performance on classes of transformed functions in which the feature space is not well aligned with the problem. The asymptotic performance is unaffected by transformations on easy functions like <span>OneMax</span>. Applying a worst-case transformation to a deceptive problem increases the expected optimisation time from <span>(O(n^2 log n))</span> to an exponential time. However, QD is still faster than a (1+1) EA by an exponential factor.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 10","pages":"3252 - 3283"},"PeriodicalIF":0.9,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01254-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142197069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-04DOI: 10.1007/s00453-024-01260-1
Emilio Di Giacomo, Walter Didimo, Giuseppe Liotta, Fabrizio Montecchiani, Giacomo Ortali
Computing planar orthogonal drawings with the minimum number of bends is one of the most studied topics in Graph Drawing. The problem is known to be NP-hard, even when we want to test the existence of a rectilinear planar drawing, i.e., an orthogonal drawing without bends (Garg and Tamassia in SIAM J Comput 31(2):601–625, 2001). From the parameterized complexity perspective, the problem is fixed-parameter tractable when parameterized by the sum of three parameters: the number b of bends, the number k of vertices of degree at most two, and the treewidth (textsf{tw}) of the input graph (Di Giacomo et al. in J Comput Syst Sci 125:129–148, 2022). We improve this last result by showing that the problem remains fixed-parameter tractable when parameterized only by (b+k). As a consequence, rectilinear planarity testing lies in FPT parameterized by the number of vertices of degree at most two. We also prove that our choice of parameters is minimal, as deciding if an orthogonal drawing with at most b bends exists is already NP-hard when k is zero (i.e., the problem is para-NP-hard parameterized in k); hence, there is neither an FPT nor an XP algorithm parameterized only by the parameter k (unless P = NP). In addition, we prove that the problem is W[1]-hard parameterized by (k+textsf{tw}), complementing a recent result (Jansen et al. in Upward and orthogonal planarity are W[1]-hard parameterized by treewidth. CoRR, abs/2309.01264, 2023; in: Bekos MA, Chimani M (eds) Graph Drawing and Network Visualization, vol 14466, Springer, Cham, pp 203–217, 2023) that shows W[1]-hardness for the parameterization (b+textsf{tw}). As a consequence, we are able to trace a clear parameterized tractability landscape for the bend-minimum orthogonal planarity problem with respect to the three parameters b, k, and (textsf{tw}).
计算弯曲次数最少的平面正交图是图形绘制中研究最多的课题之一。众所周知,即使我们想测试是否存在直角平面图,即没有弯曲的正交图,这个问题也是 NP 难(Garg 和 Tamassia 在 SIAM J Comput 31(2):601-625, 2001 中)。从参数化复杂度的角度来看,当以三个参数之和为参数时,问题是固定参数可控的:弯曲数 b、阶数至多为 2 的顶点数 k 以及输入图的树宽(textsf{tw})(Di Giacomo 等人在 J Comput Syst Sci 125:129-148, 2022 中)。我们改进了最后一个结果,证明当参数仅为 (b+k)时,问题仍然是固定参数可控的。因此,直角平面性检验属于以最多两个度的顶点数为参数的 FPT。我们还证明了我们对参数的选择是最小的,因为当 k 为零时,决定是否存在一个最多有 b 个弯曲的正交图形已经是 NP-困难的了(即该问题是以 k 为参数的准 NP-困难问题);因此,既不存在仅以参数 k 为参数的 FPT 算法,也不存在仅以参数 k 为参数的 XP 算法(除非 P = NP)。此外,我们证明了该问题是以(k+textsf{tw})为参数的 W[1]-hard,补充了最近的一个结果(Jansen 等人,在 Upward and orthogonal planarity are W[1]-hard parameterized by treewidth.CoRR, abs/2309.01264, 2023; in:Bekos MA, Chimani M (eds) Graph Drawing and Network Visualization, vol 14466, Springer, Cham, pp 203-217, 2023)中显示了参数化 (b+textsf{tw}) 的 W[1]-hardness 性。因此,我们能够根据 b、k 和 (textsf{tw})这三个参数,为弯曲最小正交平面问题追踪出一个清晰的参数化可操作性图景。
{"title":"On the Parameterized Complexity of Bend-Minimum Orthogonal Planarity","authors":"Emilio Di Giacomo, Walter Didimo, Giuseppe Liotta, Fabrizio Montecchiani, Giacomo Ortali","doi":"10.1007/s00453-024-01260-1","DOIUrl":"10.1007/s00453-024-01260-1","url":null,"abstract":"<div><p>Computing planar orthogonal drawings with the minimum number of bends is one of the most studied topics in Graph Drawing. The problem is known to be NP-hard, even when we want to test the existence of a rectilinear planar drawing, i.e., an orthogonal drawing without bends (Garg and Tamassia in SIAM J Comput 31(2):601–625, 2001). From the parameterized complexity perspective, the problem is fixed-parameter tractable when parameterized by the sum of three parameters: the number <i>b</i> of bends, the number <i>k</i> of vertices of degree at most two, and the treewidth <span>(textsf{tw})</span> of the input graph (Di Giacomo et al. in J Comput Syst Sci 125:129–148, 2022). We improve this last result by showing that the problem remains fixed-parameter tractable when parameterized only by <span>(b+k)</span>. As a consequence, rectilinear planarity testing lies in FPT parameterized by the number of vertices of degree at most two. We also prove that our choice of parameters is minimal, as deciding if an orthogonal drawing with at most <i>b</i> bends exists is already NP-hard when <i>k</i> is zero (i.e., the problem is para-NP-hard parameterized in <i>k</i>); hence, there is neither an FPT nor an XP algorithm parameterized only by the parameter <i>k</i> (unless P = NP). In addition, we prove that the problem is W[1]-hard parameterized by <span>(k+textsf{tw})</span>, complementing a recent result (Jansen et al. in Upward and orthogonal planarity are W[1]-hard parameterized by treewidth. CoRR, abs/2309.01264, 2023; in: Bekos MA, Chimani M (eds) Graph Drawing and Network Visualization, vol 14466, Springer, Cham, pp 203–217, 2023) that shows W[1]-hardness for the parameterization <span>(b+textsf{tw})</span>. As a consequence, we are able to trace a clear parameterized tractability landscape for the bend-minimum orthogonal planarity problem with respect to the three parameters <i>b</i>, <i>k</i>, and <span>(textsf{tw})</span>.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 10","pages":"3231 - 3251"},"PeriodicalIF":0.9,"publicationDate":"2024-08-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01260-1.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141948974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-31DOI: 10.1007/s00453-024-01256-x
Jessica Enright, Duncan Lee, Kitty Meeks, William Pettersson, John Sylvester
Understanding spatial correlation is vital in many fields including epidemiology and social science. Lee et al. (Stat Comput 31(4):51, 2021. https://doi.org/10.1007/s11222-021-10025-7) recently demonstrated that improved inference for areal unit count data can be achieved by carrying out modifications to a graph representing spatial correlations; specifically, they delete edges of the planar graph derived from border-sharing between geographic regions in order to maximise a specific objective function. In this paper, we address the computational complexity of the associated graph optimisation problem. We demonstrate that this optimisation problem is NP-hard; we further show intractability for two simpler variants of the problem. We follow these results with two parameterised algorithms that exactly solve the problem. The first is parameterised by both treewidth and maximum degree, while the second is parameterised by the maximum number of edges that can be removed and is also restricted to settings where the input graph has maximum degree three. Both of these algorithms solve not only the decision problem, but also enumerate all solutions with polynomial time precalculation, delay, and postcalculation time in respective restricted settings. For this problem, efficient enumeration allows the uncertainty in the spatial correlation to be utilised in the modelling. The first enumeration algorithm utilises dynamic programming on a tree decomposition of the input graph, and has polynomial time precalculation and linear delay if both the treewidth and maximum degree are bounded. The second algorithm is restricted to problem instances with maximum degree three, as may arise from triangulations of planar surfaces, but can output all solutions with FPT precalculation time and linear delay when the maximum number of edges that can be removed is taken as the parameter.
{"title":"The Complexity of Finding and Enumerating Optimal Subgraphs to Represent Spatial Correlation","authors":"Jessica Enright, Duncan Lee, Kitty Meeks, William Pettersson, John Sylvester","doi":"10.1007/s00453-024-01256-x","DOIUrl":"10.1007/s00453-024-01256-x","url":null,"abstract":"<div><p>Understanding spatial correlation is vital in many fields including epidemiology and social science. Lee et al. (Stat Comput 31(4):51, 2021. https://doi.org/10.1007/s11222-021-10025-7) recently demonstrated that improved inference for areal unit count data can be achieved by carrying out modifications to a graph representing spatial correlations; specifically, they delete edges of the planar graph derived from border-sharing between geographic regions in order to maximise a specific objective function. In this paper, we address the computational complexity of the associated graph optimisation problem. We demonstrate that this optimisation problem is NP-hard; we further show intractability for two simpler variants of the problem. We follow these results with two parameterised algorithms that exactly solve the problem. The first is parameterised by both treewidth and maximum degree, while the second is parameterised by the maximum number of edges that can be removed and is also restricted to settings where the input graph has maximum degree three. Both of these algorithms solve not only the decision problem, but also enumerate all solutions with polynomial time precalculation, delay, and postcalculation time in respective restricted settings. For this problem, efficient enumeration allows the uncertainty in the spatial correlation to be utilised in the modelling. The first enumeration algorithm utilises dynamic programming on a tree decomposition of the input graph, and has polynomial time precalculation and linear delay if both the treewidth and maximum degree are bounded. The second algorithm is restricted to problem instances with maximum degree three, as may arise from triangulations of planar surfaces, but can output all solutions with FPT precalculation time and linear delay when the maximum number of edges that can be removed is taken as the parameter.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 10","pages":"3186 - 3230"},"PeriodicalIF":0.9,"publicationDate":"2024-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01256-x.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141882957","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-29DOI: 10.1007/s00453-024-01251-2
William M. Hoza, Edward Pyne, Salil Vadhan
The classic Impagliazzo–Nisan–Wigderson (INW) pseudorandom generator (PRG) (STOC ‘94) for space-bounded computation uses a seed of length (O(log n cdot log (nw/varepsilon )+log d)) to fool ordered branching programs of length n, width w, and alphabet size d to within error (varepsilon ). A series of works have shown that the analysis of the INW generator can be improved for the class of permutation branching programs or the more general regular branching programs, improving the (O(log ^2 n)) dependence on the length n to (O(log n)) or ({tilde{O}}(log n)). However, when also considering the dependence on the other parameters, these analyses still fall short of the optimal PRG seed length (O(log (nwd/varepsilon ))). In this paper, we prove that any “spectral analysis” of the INW generator requires seed length
to fool ordered permutation branching programs of length n, width w, and alphabet size d to within error (varepsilon ). By “spectral analysis” we mean an analysis of the INW generator that relies only on the spectral expansion of the graphs used to construct the generator; this encompasses all prior analyses of the INW generator. Our lower bound matches the upper bound of Braverman–Rao–Raz–Yehudayoff (FOCS 2010, SICOMP 2014) for regular branching programs of alphabet size (d=2) except for a gap between their (Oleft( log n cdot log log nright) ) term and our (Omega left( log n cdot log log min {n,d}right) ) term. It also matches the upper bounds of Koucký–Nimbhorkar–Pudlák (STOC 2011), De (CCC 2011), and Steinke (ECCC 2012) for constant-width ((w=O(1))) permutation branching programs of alphabet size (d=2) to within a constant factor. To fool permutation branching programs in the measure of spectral norm, we prove that any spectral analysis of the INW generator requires a seed of length (Omega left( log ncdot log log n+log ncdot log (1/varepsilon )right) ) when the width is at least polynomial in n ((w=n^{Omega (1)})), matching the recent upper bound of Hoza–Pyne–Vadhan (ITCS 2021) to within a constant factor.
{"title":"Limitations of the Impagliazzo–Nisan–Wigderson Pseudorandom Generator Against Permutation Branching Programs","authors":"William M. Hoza, Edward Pyne, Salil Vadhan","doi":"10.1007/s00453-024-01251-2","DOIUrl":"10.1007/s00453-024-01251-2","url":null,"abstract":"<div><p>The classic Impagliazzo–Nisan–Wigderson (INW) pseudorandom generator (PRG) (STOC ‘94) for space-bounded computation uses a seed of length <span>(O(log n cdot log (nw/varepsilon )+log d))</span> to fool ordered branching programs of length <i>n</i>, width <i>w</i>, and alphabet size <i>d</i> to within error <span>(varepsilon )</span>. A series of works have shown that the analysis of the INW generator can be improved for the class of <i>permutation</i> branching programs or the more general <i>regular</i> branching programs, improving the <span>(O(log ^2 n))</span> dependence on the length <i>n</i> to <span>(O(log n))</span> or <span>({tilde{O}}(log n))</span>. However, when also considering the dependence on the other parameters, these analyses still fall short of the optimal PRG seed length <span>(O(log (nwd/varepsilon )))</span>. In this paper, we prove that any “spectral analysis” of the INW generator requires seed length </p><div><div><span>$$begin{aligned} Omega left( log ncdot log log left( min {n,d}right) +log ncdot log left( w/varepsilon right) +log dright) end{aligned}$$</span></div></div><p>to fool ordered permutation branching programs of length <i>n</i>, width <i>w</i>, and alphabet size <i>d</i> to within error <span>(varepsilon )</span>. By “spectral analysis” we mean an analysis of the INW generator that relies only on the spectral expansion of the graphs used to construct the generator; this encompasses all prior analyses of the INW generator. Our lower bound matches the upper bound of Braverman–Rao–Raz–Yehudayoff (FOCS 2010, SICOMP 2014) for regular branching programs of alphabet size <span>(d=2)</span> except for a gap between their <span>(Oleft( log n cdot log log nright) )</span> term and our <span>(Omega left( log n cdot log log min {n,d}right) )</span> term. It also matches the upper bounds of Koucký–Nimbhorkar–Pudlák (STOC 2011), De (CCC 2011), and Steinke (ECCC 2012) for constant-width (<span>(w=O(1))</span>) permutation branching programs of alphabet size <span>(d=2)</span> to within a constant factor. To fool permutation branching programs in the measure of <i>spectral norm</i>, we prove that any spectral analysis of the INW generator requires a seed of length <span>(Omega left( log ncdot log log n+log ncdot log (1/varepsilon )right) )</span> when the width is at least polynomial in <i>n</i> (<span>(w=n^{Omega (1)})</span>), matching the recent upper bound of Hoza–Pyne–Vadhan (ITCS 2021) to within a constant factor.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 10","pages":"3153 - 3185"},"PeriodicalIF":0.9,"publicationDate":"2024-07-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01251-2.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141868112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-22DOI: 10.1007/s00453-024-01253-0
Yiqin Gao, Li Han, Jing Liu, Yves Robert, Frédéric Vivien
As real-time systems are safety critical, guaranteeing a high reliability threshold is as important as meeting all deadlines. Periodic tasks are replicated to mitigate the negative impact of transient faults, which leads to redundancy and high energy consumption. On the other hand, energy saving is widely identified as increasingly relevant issues in real-time systems. In this paper, we formalize this challenging tri-criteria optimization problem, i.e., minimizing the expected energy consumption while enforcing the reliability threshold and meeting all task deadlines, and propose several mapping and scheduling heuristics to solve it. Specifically, a novel approach is designed to (i) map an arbitrary number of replicas onto processors, (ii) schedule each replica of each task instance on its assigned processor with less temporal overlap. The platform is composed of processing units with different characteristics, including speed profile, energy cost and fault rate. The heterogeneity of the computing platform makes the problem more complicated, because different mappings achieve different levels of reliability and consume different amounts of energy. Moreover, scheduling plays an important role in energy saving, as the expected energy consumption is the average over all failure scenarios. Once a task replica is successful, the other replicas of that task instance can be canceled, which calls for minimizing the overlap between any replica pair. Finally, to quantitatively analyze our methods, we derive a theoretical lower-bound for the expected energy consumption. Comprehensive experiments are conducted on a large set of execution scenarios and parameters. The comparison results reveal that our strategies perform better than the random baseline under almost all settings, with an average gain in energy consumption of more than 40%, and our best heuristic achieves an excellent performance: its energy saving is only 2% less than the lower-bound on average.
{"title":"Minimizing Energy Consumption for Real-Time Tasks on Heterogeneous Platforms Under Deadline and Reliability Constraints","authors":"Yiqin Gao, Li Han, Jing Liu, Yves Robert, Frédéric Vivien","doi":"10.1007/s00453-024-01253-0","DOIUrl":"10.1007/s00453-024-01253-0","url":null,"abstract":"<div><p>As real-time systems are safety critical, guaranteeing a high reliability threshold is as important as meeting all deadlines. Periodic tasks are replicated to mitigate the negative impact of transient faults, which leads to redundancy and high energy consumption. On the other hand, energy saving is widely identified as increasingly relevant issues in real-time systems. In this paper, we formalize this challenging tri-criteria optimization problem, i.e., minimizing the expected energy consumption while enforcing the reliability threshold and meeting all task deadlines, and propose several mapping and scheduling heuristics to solve it. Specifically, a novel approach is designed to (i) map an arbitrary number of replicas onto processors, (ii) schedule each replica of each task instance on its assigned processor with less temporal overlap. The platform is composed of processing units with different characteristics, including speed profile, energy cost and fault rate. The heterogeneity of the computing platform makes the problem more complicated, because different mappings achieve different levels of reliability and consume different amounts of energy. Moreover, scheduling plays an important role in energy saving, as the expected energy consumption is the average over all failure scenarios. Once a task replica is successful, the other replicas of that task instance can be canceled, which calls for minimizing the overlap between any replica pair. Finally, to quantitatively analyze our methods, we derive a theoretical lower-bound for the expected energy consumption. Comprehensive experiments are conducted on a large set of execution scenarios and parameters. The comparison results reveal that our strategies perform better than the random baseline under almost all settings, with an average gain in energy consumption of more than 40%, and our best heuristic achieves an excellent performance: its energy saving is only 2% less than the lower-bound on average.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 10","pages":"3079 - 3114"},"PeriodicalIF":0.9,"publicationDate":"2024-07-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141740782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}