Pub Date : 2024-03-15DOI: 10.1007/s00453-024-01214-7
Fedor V. Fomin, Petr A. Golovach, Lars Jaffke, Geevarghese Philip, Danil Sagunov
We initiate the study of the Diverse Pair of (Maximum/ Perfect) Matchings problems which given a graph G and an integer k, ask whether G has two (maximum/perfect) matchings whose symmetric difference is at least k. Diverse Pair of Matchings (asking for two not necessarily maximum or perfect matchings) is (textsf{NP})-complete on general graphs if k is part of the input, and we consider two restricted variants. First, we show that on bipartite graphs, the problem is polynomial-time solvable, and second we show that Diverse Pair of Maximum Matchings is (textsf{FPT}) parameterized by k. We round off the work by showing that Diverse Pair of Matchings has a kernel on ({mathcal {O}}(k^2)) vertices.
我们开始研究"(最大/完美)匹配的多样性对"(Diverse Pair of (Maximum/ Perfect) Matchings)问题,给定一个图 G 和一个整数 k,问 G 是否有两个对称差至少为 k 的(最大/完美)匹配。首先,我们证明了在二叉图上,这个问题是多项式时间可解的;其次,我们证明了以 k 为参数的 Diverse Pair of Maximum Matchings 是 (textsf{FPT})的。
{"title":"Diverse Pairs of Matchings","authors":"Fedor V. Fomin, Petr A. Golovach, Lars Jaffke, Geevarghese Philip, Danil Sagunov","doi":"10.1007/s00453-024-01214-7","DOIUrl":"10.1007/s00453-024-01214-7","url":null,"abstract":"<div><p>We initiate the study of the <span>Diverse Pair of (Maximum/ Perfect) Matchings</span> problems which given a graph <i>G</i> and an integer <i>k</i>, ask whether <i>G</i> has two (maximum/perfect) matchings whose symmetric difference is at least <i>k</i>. <span>Diverse Pair of Matchings</span> (asking for two not necessarily maximum or perfect matchings) is <span>(textsf{NP})</span>-complete on general graphs if <i>k</i> is part of the input, and we consider two restricted variants. First, we show that on bipartite graphs, the problem is polynomial-time solvable, and second we show that <span>Diverse Pair of Maximum Matchings</span> is <span>(textsf{FPT})</span> parameterized by <i>k</i>. We round off the work by showing that <span>Diverse Pair of Matchings</span> has a kernel on <span>({mathcal {O}}(k^2))</span> vertices.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"2026 - 2040"},"PeriodicalIF":0.9,"publicationDate":"2024-03-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01214-7.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140150835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A finite group of order n can be represented by its Cayley table. In the word-RAM model the Cayley table of a group of order n can be stored using (O(n^2)) words and can be used to answer a multiplication query in constant time. It is interesting to ask if we can design a data structure to store a group of order n that uses (o(n^2)) space but can still answer a multiplication query in constant time. Das et al. (J Comput Syst Sci 114:137–146, 2020) showed that for any finite group G of order n and for any (delta in [1/log {n}, 1]), a data structure can be constructed for G that uses (O(n^{1+delta }/delta )) space and answers a multiplication query in time (O(1/delta )). Farzan and Munro (ISSAC, 2006) gave an information theoretic lower bound of (Omega (n)) on the number of words to store a group of order n. We design a constant query-time data structure that can store any finite group using O(n) words where n is the order of the group. Since our data structure achieves the information theoretic lower bound and answers queries in constant time, it is optimal in both space usage and query-time. A crucial step in the process is essentially to design linear space and constant query-time data structures for nonabelian simple groups. The data structures for nonabelian simple groups are designed using a lemma that we prove using the Classification Theorem for Finite Simple Groups.
摘要 阶数为 n 的有限群可以用它的 Cayley 表来表示。在字 RAM 模型中,一个 n 阶群的 Cayley 表可以用 (O(n^2)) 字来存储,并且可以用来在恒定时间内回答乘法查询。有趣的是,我们是否可以设计一种数据结构来存储阶数为 n 的组,这种结构使用 (o(n^2) 空间,但仍然可以在恒定时间内回答乘法查询。Das 等人(J Comput Syst Sci 114:137-146, 2020)的研究表明,对于任何阶数为 n 的有限群组 G 以及任何 (delta in [1/log {n}, 1]),都可以为 G 构建一个数据结构,它使用 (O(n^{1+delta }/delta )) 空间,并且可以在 (O(1/delta )) 时间内回答乘法查询。Farzan 和 Munro (ISSAC, 2006)给出了存储阶数为 n 的组的字数的信息论下限((Omega (n)) )。我们设计了一种恒定查询时间的数据结构,可以用 O(n) 个字存储任何有限组,其中 n 是组的阶数。由于我们的数据结构实现了信息论下限,并能在恒定时间内回答查询,因此在空间使用和查询时间上都是最优的。这一过程的关键步骤是为非标简单群设计线性空间和恒定查询时间的数据结构。非阿贝尔简单群的数据结构是利用我们用有限简单群分类定理证明的一个 Lemma 来设计的。
{"title":"Linear Space Data Structures for Finite Groups with Constant Query-Time","authors":"Bireswar Das, Anant Kumar, Shivdutt Sharma, Dhara Thakkar","doi":"10.1007/s00453-024-01212-9","DOIUrl":"10.1007/s00453-024-01212-9","url":null,"abstract":"<div><p>A finite group of order <i>n</i> can be represented by its Cayley table. In the word-RAM model the Cayley table of a group of order <i>n</i> can be stored using <span>(O(n^2))</span> words and can be used to answer a multiplication query in constant time. It is interesting to ask if we can design a data structure to store a group of order <i>n</i> that uses <span>(o(n^2))</span> space but can still answer a multiplication query in constant time. Das et al. (J Comput Syst Sci 114:137–146, 2020) showed that for any finite group <i>G</i> of order <i>n</i> and for any <span>(delta in [1/log {n}, 1])</span>, a data structure can be constructed for <i>G</i> that uses <span>(O(n^{1+delta }/delta ))</span> space and answers a multiplication query in time <span>(O(1/delta ))</span>. Farzan and Munro (ISSAC, 2006) gave an information theoretic lower bound of <span>(Omega (n))</span> on the number of words to store a group of order <i>n</i>. We design a constant query-time data structure that can store any finite group using <i>O</i>(<i>n</i>) words where <i>n</i> is the order of the group. Since our data structure achieves the information theoretic lower bound and answers queries in constant time, it is optimal in both space usage and query-time. A crucial step in the process is essentially to design linear space and constant query-time data structures for nonabelian simple groups. The data structures for nonabelian simple groups are designed using a lemma that we prove using the Classification Theorem for Finite Simple Groups.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"1979 - 2025"},"PeriodicalIF":0.9,"publicationDate":"2024-03-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140097564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-06DOI: 10.1007/s00453-024-01213-8
Panagiotis Charalampopoulos, Huiping Chen, Peter Christen, Grigorios Loukides, Nadia Pisanti, Solon P. Pissis, Jakub Radoszewski
<div><p>Data masking is a common technique for sanitizing sensitive data maintained in database systems which is becoming increasingly important in various application areas, such as in record linkage of personal data. This work formalizes the Pattern Masking for Dictionary Matching (<span>PMDM</span>) problem: given a dictionary <span>(mathscr {D})</span> of <i>d</i> strings, each of length <span>(ell )</span>, a query string <i>q</i> of length <span>(ell )</span>, and a positive integer <i>z</i>, we are asked to compute a smallest set <span>(Ksubseteq {1,ldots ,ell })</span>, so that if <i>q</i>[<i>i</i>] is replaced by a wildcard for all <span>(iin K)</span>, then <i>q</i> matches at least <i>z</i> strings from <span>(mathscr {D})</span>. Solving <span>PMDM</span> allows providing data utility guarantees as opposed to existing approaches. We first show, through a reduction from the well-known <i>k</i>-Clique problem, that a decision version of the <span>PMDM</span> problem is NP-complete, even for binary strings. We thus approach the problem from a more practical perspective. We show a combinatorial <span>(mathscr {O}((dell )^{|K|/3}+dell ))</span>-time and <span>(mathscr {O}(dell ))</span>-space algorithm for <span>PMDM</span> for <span>(|K|=mathscr {O}(1))</span>. In fact, we show that we cannot hope for a faster combinatorial algorithm, unless the combinatorial <i>k</i>-Clique hypothesis fails (Abboud et al. in SIAM J Comput 47:2527–2555, 2018; Lincoln et al., in: 29th ACM-SIAM Symposium on Discrete Algorithms (SODA), 2018). Our combinatorial algorithm, executed with small |<i>K</i>|, is the backbone of a greedy heuristic that we propose. Our experiments on real-world and synthetic datasets show that our heuristic finds nearly-optimal solutions in practice and is also very efficient. We also generalize this algorithm for the problem of masking multiple query strings simultaneously so that every string has at least <i>z</i> matches in <span>(mathscr {D})</span>. <span>PMDM</span> can be viewed as a generalization of the decision version of the dictionary matching with mismatches problem: by querying a <span>PMDM</span> data structure with string <i>q</i> and <span>(z=1)</span>, one obtains the minimal number of mismatches of <i>q</i> with any string from <span>(mathscr {D})</span>. The query time or space of all known data structures for the <i>more restricted</i> problem of dictionary matching with at most <i>k</i> mismatches incurs some exponential factor with respect to <i>k</i>. A simple exact algorithm for <span>PMDM</span> runs in time <span>(mathscr {O}(2^ell d))</span>. We present a data structure for <span>PMDM</span> that answers queries over <span>(mathscr {D})</span> in time <span>(mathscr {O}(2^{ell /2}(2^{ell /2}+tau )ell ))</span> and requires space <span>(mathscr {O}(2^{ell }d^2/tau ^2+2^{ell /2}d))</span>, for any parameter <span>(tau in [1,d])</span>. We complement our results by showing a two-way polynomial-time reduction
{"title":"Pattern Masking for Dictionary Matching: Theory and Practice","authors":"Panagiotis Charalampopoulos, Huiping Chen, Peter Christen, Grigorios Loukides, Nadia Pisanti, Solon P. Pissis, Jakub Radoszewski","doi":"10.1007/s00453-024-01213-8","DOIUrl":"10.1007/s00453-024-01213-8","url":null,"abstract":"<div><p>Data masking is a common technique for sanitizing sensitive data maintained in database systems which is becoming increasingly important in various application areas, such as in record linkage of personal data. This work formalizes the Pattern Masking for Dictionary Matching (<span>PMDM</span>) problem: given a dictionary <span>(mathscr {D})</span> of <i>d</i> strings, each of length <span>(ell )</span>, a query string <i>q</i> of length <span>(ell )</span>, and a positive integer <i>z</i>, we are asked to compute a smallest set <span>(Ksubseteq {1,ldots ,ell })</span>, so that if <i>q</i>[<i>i</i>] is replaced by a wildcard for all <span>(iin K)</span>, then <i>q</i> matches at least <i>z</i> strings from <span>(mathscr {D})</span>. Solving <span>PMDM</span> allows providing data utility guarantees as opposed to existing approaches. We first show, through a reduction from the well-known <i>k</i>-Clique problem, that a decision version of the <span>PMDM</span> problem is NP-complete, even for binary strings. We thus approach the problem from a more practical perspective. We show a combinatorial <span>(mathscr {O}((dell )^{|K|/3}+dell ))</span>-time and <span>(mathscr {O}(dell ))</span>-space algorithm for <span>PMDM</span> for <span>(|K|=mathscr {O}(1))</span>. In fact, we show that we cannot hope for a faster combinatorial algorithm, unless the combinatorial <i>k</i>-Clique hypothesis fails (Abboud et al. in SIAM J Comput 47:2527–2555, 2018; Lincoln et al., in: 29th ACM-SIAM Symposium on Discrete Algorithms (SODA), 2018). Our combinatorial algorithm, executed with small |<i>K</i>|, is the backbone of a greedy heuristic that we propose. Our experiments on real-world and synthetic datasets show that our heuristic finds nearly-optimal solutions in practice and is also very efficient. We also generalize this algorithm for the problem of masking multiple query strings simultaneously so that every string has at least <i>z</i> matches in <span>(mathscr {D})</span>. <span>PMDM</span> can be viewed as a generalization of the decision version of the dictionary matching with mismatches problem: by querying a <span>PMDM</span> data structure with string <i>q</i> and <span>(z=1)</span>, one obtains the minimal number of mismatches of <i>q</i> with any string from <span>(mathscr {D})</span>. The query time or space of all known data structures for the <i>more restricted</i> problem of dictionary matching with at most <i>k</i> mismatches incurs some exponential factor with respect to <i>k</i>. A simple exact algorithm for <span>PMDM</span> runs in time <span>(mathscr {O}(2^ell d))</span>. We present a data structure for <span>PMDM</span> that answers queries over <span>(mathscr {D})</span> in time <span>(mathscr {O}(2^{ell /2}(2^{ell /2}+tau )ell ))</span> and requires space <span>(mathscr {O}(2^{ell }d^2/tau ^2+2^{ell /2}d))</span>, for any parameter <span>(tau in [1,d])</span>. We complement our results by showing a two-way polynomial-time reduction ","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"1948 - 1978"},"PeriodicalIF":0.9,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01213-8.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140055360","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-06DOI: 10.1007/s00453-023-01204-1
Elisabet Burjons, Fabian Frei, Edith Hemaspaandra, Dennis Komm, David Wehner
Can we efficiently compute optimal solutions to instances of a hard problem from optimal solutions to neighbor instances, that is, instances with one local modification? For example, can we efficiently compute an optimal coloring for a graph from optimal colorings for all one-edge-deleted subgraphs? Studying such questions not only gives detailed insight into the structure of the problem itself, but also into the complexity of related problems, most notably, graph theory’s core notion of critical graphs (e.g., graphs whose chromatic number decreases under deletion of an arbitrary edge) and the complexity-theoretic notion of minimality problems (also called criticality problems, e.g., recognizing graphs that become 3-colorable when an arbitrary edge is deleted). We focus on two prototypical graph problems, colorability and vertex cover. For example, we show that it is (text {NP})-hard to compute an optimal coloring for a graph from optimal colorings for all its one-vertex-deleted subgraphs, and that this remains true even when optimal solutions for all one-edge-deleted subgraphs are given. In contrast, computing an optimal coloring from all (or even just two) one-edge-added supergraphs is in (text {P}). We observe that vertex cover exhibits a remarkably different behavior, demonstrating the power of our model to delineate problems from each other more precisely on a structural level. Moreover, we provide a number of new complexity results for minimality and criticality problems. For example, we prove that Minimal-3-UnColorability is complete for (text {DP}) (differences of (text {NP}) sets), which was previously known only for the more amenable case of deleting vertices rather than edges. For vertex cover, we show that recognizing (beta )-vertex-critical graphs is complete for (Theta _2^text {p}) (parallel access to (text {NP})), obtaining the first completeness result for a criticality problem for this class.
{"title":"Finding Optimal Solutions with Neighborly Help","authors":"Elisabet Burjons, Fabian Frei, Edith Hemaspaandra, Dennis Komm, David Wehner","doi":"10.1007/s00453-023-01204-1","DOIUrl":"10.1007/s00453-023-01204-1","url":null,"abstract":"<div><p>Can we efficiently compute optimal solutions to instances of a hard problem from optimal solutions to neighbor instances, that is, instances with one local modification? For example, can we efficiently compute an optimal coloring for a graph from optimal colorings for all one-edge-deleted subgraphs? Studying such questions not only gives detailed insight into the structure of the problem itself, but also into the complexity of related problems, most notably, graph theory’s core notion of critical graphs (e.g., graphs whose chromatic number decreases under deletion of an arbitrary edge) and the complexity-theoretic notion of minimality problems (also called criticality problems, e.g., recognizing graphs that become 3-colorable when an arbitrary edge is deleted). We focus on two prototypical graph problems, colorability and vertex cover. For example, we show that it is <span>(text {NP})</span>-hard to compute an optimal coloring for a graph from optimal colorings for <i>all</i> its one-vertex-deleted subgraphs, and that this remains true even when optimal solutions for <i>all</i> one-edge-deleted subgraphs are given. In contrast, computing an optimal coloring from all (or even just two) one-edge-added supergraphs is in <span>(text {P})</span>. We observe that vertex cover exhibits a remarkably different behavior, demonstrating the power of our model to delineate problems from each other more precisely on a structural level. Moreover, we provide a number of new complexity results for minimality and criticality problems. For example, we prove that <span>Minimal</span>-3-<span>UnColorability</span> is complete for <span>(text {DP})</span> (differences of <span>(text {NP})</span> sets), which was previously known only for the more amenable case of deleting vertices rather than edges. For vertex cover, we show that recognizing <span>(beta )</span>-vertex-critical graphs is complete for <span>(Theta _2^text {p})</span> (parallel access to <span>(text {NP})</span>), obtaining the first completeness result for a criticality problem for this class.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"1921 - 1947"},"PeriodicalIF":0.9,"publicationDate":"2024-03-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-023-01204-1.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140055369","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-05DOI: 10.1007/s00453-024-01225-4
Cristina Bazgan, Henning Fernau
{"title":"Preface of the Special Issue Dedicated to Selected Papers from IWOCA 2022","authors":"Cristina Bazgan, Henning Fernau","doi":"10.1007/s00453-024-01225-4","DOIUrl":"10.1007/s00453-024-01225-4","url":null,"abstract":"","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 3","pages":"695 - 696"},"PeriodicalIF":0.9,"publicationDate":"2024-03-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140078949","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-03-02DOI: 10.1007/s00453-024-01215-6
Telikepalli Kavitha
We consider a matching problem in a bipartite graph (G = (A cup B, E)) where vertices in A rank their neighbors in a strict order of preference while vertices in B are allowed to have weak rankings, i.e., ties are allowed in their rankings. Stable matchings always exist in G and are easy to find, however popular matchings need not exist in G and it is NP-complete to decide if one exists. This motivates the “approximately popular” matching problem. A well-known measure of approximate popularity is low unpopularity factor. We show that when each tie in G has length at most k, there always exists a stable matching whose unpopularity factor is at most k and such a matching can be computed in polynomial time. Thus when ties have bounded length, there always exists a near-popular stable matching. This can be considered to be a generalization of Gärdenfors’ result (1975) which showed that when rankings are strict, every stable matching is popular. We then extend our result to the hospitals/residents setting, i.e., vertices in B have capacities. There are several applications where the size of the matching is its most important attribute. When ties are one-sided and of length at most k, we show a polynomial time algorithm to find a maximum matching whose unpopularity factor within the set of maximum matchings is at most 2k.
我们考虑的是(G = (A cup B, E))双瓣图中的匹配问题,其中 A 中的顶点按照严格的偏好顺序排列它们的邻居,而 B 中的顶点允许弱排序,即允许它们的排序出现平局。稳定匹配总是存在于 G 中,而且很容易找到,但是流行匹配不一定存在于 G 中,而且判断是否存在流行匹配是一个 NP 难点。这就产生了 "近似流行 "匹配问题。近似受欢迎程度的一个众所周知的衡量标准是低不受欢迎系数。我们的研究表明,当 G 中每条领带的长度最多为 k 时,总会存在一个不受欢迎系数最多为 k 的稳定匹配,而且这种匹配可以在多项式时间内计算出来。因此,当领带长度有界时,总是存在一个接近流行的稳定匹配。这可以看作是 Gärdenfors 结果(1975 年)的推广,Gärdenfors 的结果表明,当排名严格时,每个稳定匹配都是受欢迎的。然后,我们将结果扩展到医院/住院病人设置,即 B 中的顶点具有容量。在一些应用中,匹配的大小是其最重要的属性。当纽带是单边的且长度最多为 k 时,我们展示了一种多项式时间算法,可以找到最大匹配集合中不受欢迎系数最多为 2k 的最大匹配。
{"title":"Stable Matchings, One-Sided Ties, and Approximate Popularity","authors":"Telikepalli Kavitha","doi":"10.1007/s00453-024-01215-6","DOIUrl":"10.1007/s00453-024-01215-6","url":null,"abstract":"<div><p>We consider a matching problem in a bipartite graph <span>(G = (A cup B, E))</span> where vertices in <i>A</i> rank their neighbors in a strict order of preference while vertices in <i>B</i> are allowed to have <i>weak</i> rankings, i.e., ties are allowed in their rankings. Stable matchings always exist in <i>G</i> and are easy to find, however popular matchings need not exist in <i>G</i> and it is NP-complete to decide if one exists. This motivates the “approximately popular” matching problem. A well-known measure of approximate popularity is <i>low unpopularity factor</i>. We show that when each tie in <i>G</i> has length at most <i>k</i>, there always exists a stable matching whose unpopularity factor is at most <i>k</i> and such a matching can be computed in polynomial time. Thus when ties have bounded length, there always exists a <i>near-popular</i> stable matching. This can be considered to be a generalization of Gärdenfors’ result (1975) which showed that when rankings are strict, every stable matching is popular. We then extend our result to the hospitals/residents setting, i.e., vertices in <i>B</i> have capacities. There are several applications where the size of the matching is its most important attribute. When ties are one-sided and of length at most <i>k</i>, we show a polynomial time algorithm to find a maximum matching whose unpopularity factor <i>within</i> the set of maximum matchings is at most 2<i>k</i>.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"1888 - 1920"},"PeriodicalIF":0.9,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140016673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-14DOI: 10.1007/s00453-024-01211-w
Faisal N. Abu-Khzam, Henning Fernau, Kevin Mann
Roman domination is one of the many variants of domination that keeps most of the complexity features of the classical domination problem. We prove that Roman domination behaves differently in two aspects: enumeration and extension. We develop non-trivial enumeration algorithms for minimal Roman dominating functions with polynomial delay and polynomial space. Recall that the existence of a similar enumeration result for minimal dominating sets is open for decades. Our result is based on a polynomial-time algorithm for Extension Roman Domination: Given a graph (G=(V,E)) and a function (f:Vrightarrow {0,1,2}), is there a minimal Roman dominating function (tilde{f}) with (fle tilde{f})? Here, (le ) lifts (0< 1< 2) pointwise; minimality is understood in this order. Our enumeration algorithm is also analyzed from an input-sensitive viewpoint, leading to a run-time estimate of (mathcal {O}(1.9332^n)) for graphs of order n; this is complemented by a lower bound example of (Omega (1.7441^n)).
摘要 罗马支配法是支配法的众多变体之一,它保留了经典支配法问题的大部分复杂性特征。我们证明罗马支配在枚举和扩展两个方面表现不同。我们以多项式延迟和多项式空间为最小罗马支配函数开发了非难枚举算法。回想一下,类似的枚举结果对于最小支配集的存在已经有几十年的历史了。我们的结果基于 Extension Roman Domination 的多项式时间算法:给定一个图(G=(V,E))和一个函数(f:Vrightarrow {0,1,2}),是否存在一个最小罗马支配函数(tilde{f})与(fle tilde{f})?在这里,(le )点对点地提升(0< 1< 2); 最小性是按这个顺序理解的。我们的枚举算法还从输入敏感的角度进行了分析,从而得出了对于阶数为 n 的图,运行时间估计值为 (mathcal {O}(1.9332^n)) ;这一估计值还得到了 (Omega (1.7441^n)) 的下限实例的补充。
{"title":"Minimal Roman Dominating Functions: Extensions and Enumeration","authors":"Faisal N. Abu-Khzam, Henning Fernau, Kevin Mann","doi":"10.1007/s00453-024-01211-w","DOIUrl":"10.1007/s00453-024-01211-w","url":null,"abstract":"<div><p>Roman domination is one of the many variants of domination that keeps most of the complexity features of the classical domination problem. We prove that Roman domination behaves differently in two aspects: enumeration and extension. We develop non-trivial enumeration algorithms for minimal Roman dominating functions with polynomial delay and polynomial space. Recall that the existence of a similar enumeration result for minimal dominating sets is open for decades. Our result is based on a polynomial-time algorithm for <span>Extension Roman Domination</span>: Given a graph <span>(G=(V,E))</span> and a function <span>(f:Vrightarrow {0,1,2})</span>, is there a minimal Roman dominating function <span>(tilde{f})</span> with <span>(fle tilde{f})</span>? Here, <span>(le )</span> lifts <span>(0< 1< 2)</span> pointwise; minimality is understood in this order. Our enumeration algorithm is also analyzed from an input-sensitive viewpoint, leading to a run-time estimate of <span>(mathcal {O}(1.9332^n))</span> for graphs of order <i>n</i>; this is complemented by a lower bound example of <span>(Omega (1.7441^n))</span>.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"1862 - 1887"},"PeriodicalIF":0.9,"publicationDate":"2024-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01211-w.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139750959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-13DOI: 10.1007/s00453-024-01209-4
Kyrill Winkler, Ami Paz, Hugo Rincon Galeana, Stefan Schmid, Ulrich Schmid
We study the problem of solving consensus in synchronous directed dynamic networks, in which communication is controlled by an oblivious message adversary that picks the communication graph to be used in a round from a fixed set of graphs (textbf{D}) arbitrarily. In this fundamental model, determining consensus solvability and designing efficient consensus algorithms is surprisingly difficult. Enabled by a decision procedure that is derived from a well-established previous consensus solvability characterization for a given set (textbf{D}), we study, for the first time, the time complexity of solving consensus in this model: We provide both upper and lower bounds for this time complexity, and also relate it to the number of iterations required by the decision procedure. Among other results, we find that reaching consensus under an oblivious message adversary can take exponentially longer than both deciding consensus solvability and broadcasting the input value of some unknown process to all other processes.
{"title":"The Time Complexity of Consensus Under Oblivious Message Adversaries","authors":"Kyrill Winkler, Ami Paz, Hugo Rincon Galeana, Stefan Schmid, Ulrich Schmid","doi":"10.1007/s00453-024-01209-4","DOIUrl":"10.1007/s00453-024-01209-4","url":null,"abstract":"<div><p>We study the problem of solving consensus in synchronous directed dynamic networks, in which communication is controlled by an oblivious message adversary that picks the communication graph to be used in a round from a fixed set of graphs <span>(textbf{D})</span> arbitrarily. In this fundamental model, determining consensus solvability and designing efficient consensus algorithms is surprisingly difficult. Enabled by a decision procedure that is derived from a well-established previous consensus solvability characterization for a given set <span>(textbf{D})</span>, we study, for the first time, the time complexity of solving consensus in this model: We provide both upper and lower bounds for this time complexity, and also relate it to the number of iterations required by the decision procedure. Among other results, we find that reaching consensus under an oblivious message adversary can take exponentially longer than both deciding consensus solvability and broadcasting the input value of some unknown process to all other processes.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"1830 - 1861"},"PeriodicalIF":0.9,"publicationDate":"2024-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01209-4.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139750870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-12DOI: 10.1007/s00453-024-01208-5
Rajarshi Bhattacharjee, Gregory Dexter, Petros Drineas, Cameron Musco, Archan Ray
We study the problem of approximating the eigenspectrum of a symmetric matrix (textbf{A} in mathbb {R}^{n times n}) with bounded entries (i.e., (Vert textbf{A}Vert _{infty } le 1)). We present a simple sublinear time algorithm that approximates all eigenvalues of (textbf{A}) up to additive error (pm epsilon n) using those of a randomly sampled ({tilde{O}}left( frac{log ^3 n}{epsilon ^3}right) times {{tilde{O}}}left( frac{log ^3 n}{epsilon ^3}right) ) principal submatrix. Our result can be viewed as a concentration bound on the complete eigenspectrum of a random submatrix, significantly extending known bounds on just the singular values (the magnitudes of the eigenvalues). We give improved error bounds of (pm epsilon sqrt{text {nnz}(textbf{A})}) and (pm epsilon Vert textbf{A}Vert _F) when the rows of (textbf{A}) can be sampled with probabilities proportional to their sparsities or their squared (ell _2) norms respectively. Here (text {nnz}(textbf{A})) is the number of non-zero entries in (textbf{A}) and (Vert textbf{A}Vert _F) is its Frobenius norm. Even for the strictly easier problems of approximating the singular values or testing the existence of large negative eigenvalues (Bakshi, Chepurko, and Jayaram, FOCS ’20), our results are the first that take advantage of non-uniform sampling to give improved error bounds. From a technical perspective, our results require several new eigenvalue concentration and perturbation bounds for matrices with bounded entries. Our non-uniform sampling bounds require a new algorithmic approach, which judiciously zeroes out entries of a randomly sampled submatrix to reduce variance, before computing the eigenvalues of that submatrix as estimates for those of (textbf{A}). We complement our theoretical results with numerical simulations, which demonstrate the effectiveness of our algorithms in practice.
我们研究的问题是近似具有有界条目(即 (Vert textbf{A}Vert _{infty } le 1)) 的对称矩阵 (textbf{A} in mathbb {R}^{n times n}) 的特征谱。我们提出了一种简单的亚线性时间算法,它可以用随机采样的times {{tilde{O}}}left(frac{log ^3 n}{epsilon ^3}right) 主子矩阵。我们的结果可以看作是对随机子矩阵完整特征谱的集中约束,极大地扩展了对奇异值(特征值的大小)的已知约束。当 (textbf{A}) 的行可以分别以与它们的稀疏度或它们的平方(ell _2)规范成比例的概率进行采样时,我们给出了 (pm epsilon sqrttext {nnz}(textbf{A})}) 和 (pm epsilon Vert textbf{A}Vert _F)的改进误差约束。这里,(text {nnz}(textbf{A}))是(textbf{A})中的非零条目数,(Vert textbf{A}Vert _F)是它的弗罗贝尼斯规范。即使对于近似奇异值或检验是否存在大负特征值这种严格意义上更容易的问题(Bakshi, Chepurko, and Jayaram, FOCS '20),我们的结果也是第一个利用非均匀采样给出改进误差边界的结果。从技术角度看,我们的结果要求对有界项的矩阵进行若干新的特征值集中和扰动约束。我们的非均匀抽样边界需要一种新的算法方法,即在计算该子矩阵的特征值作为 (textbf{A}) 的估计值之前,明智地将随机抽样子矩阵的条目清零以减少方差。我们用数值模拟补充了理论结果,证明了我们的算法在实践中的有效性。
{"title":"Sublinear Time Eigenvalue Approximation via Random Sampling","authors":"Rajarshi Bhattacharjee, Gregory Dexter, Petros Drineas, Cameron Musco, Archan Ray","doi":"10.1007/s00453-024-01208-5","DOIUrl":"10.1007/s00453-024-01208-5","url":null,"abstract":"<div><p>We study the problem of approximating the eigenspectrum of a symmetric matrix <span>(textbf{A} in mathbb {R}^{n times n})</span> with bounded entries (i.e., <span>(Vert textbf{A}Vert _{infty } le 1)</span>). We present a simple sublinear time algorithm that approximates all eigenvalues of <span>(textbf{A})</span> up to additive error <span>(pm epsilon n)</span> using those of a randomly sampled <span>({tilde{O}}left( frac{log ^3 n}{epsilon ^3}right) times {{tilde{O}}}left( frac{log ^3 n}{epsilon ^3}right) )</span> principal submatrix. Our result can be viewed as a concentration bound on the complete eigenspectrum of a random submatrix, significantly extending known bounds on just the singular values (the magnitudes of the eigenvalues). We give improved error bounds of <span>(pm epsilon sqrt{text {nnz}(textbf{A})})</span> and <span>(pm epsilon Vert textbf{A}Vert _F)</span> when the rows of <span>(textbf{A})</span> can be sampled with probabilities proportional to their sparsities or their squared <span>(ell _2)</span> norms respectively. Here <span>(text {nnz}(textbf{A}))</span> is the number of non-zero entries in <span>(textbf{A})</span> and <span>(Vert textbf{A}Vert _F)</span> is its Frobenius norm. Even for the strictly easier problems of approximating the singular values or testing the existence of large negative eigenvalues (Bakshi, Chepurko, and Jayaram, FOCS ’20), our results are the first that take advantage of non-uniform sampling to give improved error bounds. From a technical perspective, our results require several new eigenvalue concentration and perturbation bounds for matrices with bounded entries. Our non-uniform sampling bounds require a new algorithmic approach, which judiciously zeroes out entries of a randomly sampled submatrix to reduce variance, before computing the eigenvalues of that submatrix as estimates for those of <span>(textbf{A})</span>. We complement our theoretical results with numerical simulations, which demonstrate the effectiveness of our algorithms in practice.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"1764 - 1829"},"PeriodicalIF":0.9,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139751014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}