Pub Date : 2024-03-02DOI: 10.1007/s00453-024-01215-6
Telikepalli Kavitha
We consider a matching problem in a bipartite graph (G = (A cup B, E)) where vertices in A rank their neighbors in a strict order of preference while vertices in B are allowed to have weak rankings, i.e., ties are allowed in their rankings. Stable matchings always exist in G and are easy to find, however popular matchings need not exist in G and it is NP-complete to decide if one exists. This motivates the “approximately popular” matching problem. A well-known measure of approximate popularity is low unpopularity factor. We show that when each tie in G has length at most k, there always exists a stable matching whose unpopularity factor is at most k and such a matching can be computed in polynomial time. Thus when ties have bounded length, there always exists a near-popular stable matching. This can be considered to be a generalization of Gärdenfors’ result (1975) which showed that when rankings are strict, every stable matching is popular. We then extend our result to the hospitals/residents setting, i.e., vertices in B have capacities. There are several applications where the size of the matching is its most important attribute. When ties are one-sided and of length at most k, we show a polynomial time algorithm to find a maximum matching whose unpopularity factor within the set of maximum matchings is at most 2k.
我们考虑的是(G = (A cup B, E))双瓣图中的匹配问题,其中 A 中的顶点按照严格的偏好顺序排列它们的邻居,而 B 中的顶点允许弱排序,即允许它们的排序出现平局。稳定匹配总是存在于 G 中,而且很容易找到,但是流行匹配不一定存在于 G 中,而且判断是否存在流行匹配是一个 NP 难点。这就产生了 "近似流行 "匹配问题。近似受欢迎程度的一个众所周知的衡量标准是低不受欢迎系数。我们的研究表明,当 G 中每条领带的长度最多为 k 时,总会存在一个不受欢迎系数最多为 k 的稳定匹配,而且这种匹配可以在多项式时间内计算出来。因此,当领带长度有界时,总是存在一个接近流行的稳定匹配。这可以看作是 Gärdenfors 结果(1975 年)的推广,Gärdenfors 的结果表明,当排名严格时,每个稳定匹配都是受欢迎的。然后,我们将结果扩展到医院/住院病人设置,即 B 中的顶点具有容量。在一些应用中,匹配的大小是其最重要的属性。当纽带是单边的且长度最多为 k 时,我们展示了一种多项式时间算法,可以找到最大匹配集合中不受欢迎系数最多为 2k 的最大匹配。
{"title":"Stable Matchings, One-Sided Ties, and Approximate Popularity","authors":"Telikepalli Kavitha","doi":"10.1007/s00453-024-01215-6","DOIUrl":"10.1007/s00453-024-01215-6","url":null,"abstract":"<div><p>We consider a matching problem in a bipartite graph <span>(G = (A cup B, E))</span> where vertices in <i>A</i> rank their neighbors in a strict order of preference while vertices in <i>B</i> are allowed to have <i>weak</i> rankings, i.e., ties are allowed in their rankings. Stable matchings always exist in <i>G</i> and are easy to find, however popular matchings need not exist in <i>G</i> and it is NP-complete to decide if one exists. This motivates the “approximately popular” matching problem. A well-known measure of approximate popularity is <i>low unpopularity factor</i>. We show that when each tie in <i>G</i> has length at most <i>k</i>, there always exists a stable matching whose unpopularity factor is at most <i>k</i> and such a matching can be computed in polynomial time. Thus when ties have bounded length, there always exists a <i>near-popular</i> stable matching. This can be considered to be a generalization of Gärdenfors’ result (1975) which showed that when rankings are strict, every stable matching is popular. We then extend our result to the hospitals/residents setting, i.e., vertices in <i>B</i> have capacities. There are several applications where the size of the matching is its most important attribute. When ties are one-sided and of length at most <i>k</i>, we show a polynomial time algorithm to find a maximum matching whose unpopularity factor <i>within</i> the set of maximum matchings is at most 2<i>k</i>.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"1888 - 1920"},"PeriodicalIF":0.9,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140016673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-14DOI: 10.1007/s00453-024-01211-w
Faisal N. Abu-Khzam, Henning Fernau, Kevin Mann
Roman domination is one of the many variants of domination that keeps most of the complexity features of the classical domination problem. We prove that Roman domination behaves differently in two aspects: enumeration and extension. We develop non-trivial enumeration algorithms for minimal Roman dominating functions with polynomial delay and polynomial space. Recall that the existence of a similar enumeration result for minimal dominating sets is open for decades. Our result is based on a polynomial-time algorithm for Extension Roman Domination: Given a graph (G=(V,E)) and a function (f:Vrightarrow {0,1,2}), is there a minimal Roman dominating function (tilde{f}) with (fle tilde{f})? Here, (le ) lifts (0< 1< 2) pointwise; minimality is understood in this order. Our enumeration algorithm is also analyzed from an input-sensitive viewpoint, leading to a run-time estimate of (mathcal {O}(1.9332^n)) for graphs of order n; this is complemented by a lower bound example of (Omega (1.7441^n)).
摘要 罗马支配法是支配法的众多变体之一,它保留了经典支配法问题的大部分复杂性特征。我们证明罗马支配在枚举和扩展两个方面表现不同。我们以多项式延迟和多项式空间为最小罗马支配函数开发了非难枚举算法。回想一下,类似的枚举结果对于最小支配集的存在已经有几十年的历史了。我们的结果基于 Extension Roman Domination 的多项式时间算法:给定一个图(G=(V,E))和一个函数(f:Vrightarrow {0,1,2}),是否存在一个最小罗马支配函数(tilde{f})与(fle tilde{f})?在这里,(le )点对点地提升(0< 1< 2); 最小性是按这个顺序理解的。我们的枚举算法还从输入敏感的角度进行了分析,从而得出了对于阶数为 n 的图,运行时间估计值为 (mathcal {O}(1.9332^n)) ;这一估计值还得到了 (Omega (1.7441^n)) 的下限实例的补充。
{"title":"Minimal Roman Dominating Functions: Extensions and Enumeration","authors":"Faisal N. Abu-Khzam, Henning Fernau, Kevin Mann","doi":"10.1007/s00453-024-01211-w","DOIUrl":"10.1007/s00453-024-01211-w","url":null,"abstract":"<div><p>Roman domination is one of the many variants of domination that keeps most of the complexity features of the classical domination problem. We prove that Roman domination behaves differently in two aspects: enumeration and extension. We develop non-trivial enumeration algorithms for minimal Roman dominating functions with polynomial delay and polynomial space. Recall that the existence of a similar enumeration result for minimal dominating sets is open for decades. Our result is based on a polynomial-time algorithm for <span>Extension Roman Domination</span>: Given a graph <span>(G=(V,E))</span> and a function <span>(f:Vrightarrow {0,1,2})</span>, is there a minimal Roman dominating function <span>(tilde{f})</span> with <span>(fle tilde{f})</span>? Here, <span>(le )</span> lifts <span>(0< 1< 2)</span> pointwise; minimality is understood in this order. Our enumeration algorithm is also analyzed from an input-sensitive viewpoint, leading to a run-time estimate of <span>(mathcal {O}(1.9332^n))</span> for graphs of order <i>n</i>; this is complemented by a lower bound example of <span>(Omega (1.7441^n))</span>.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"1862 - 1887"},"PeriodicalIF":0.9,"publicationDate":"2024-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01211-w.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139750959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-13DOI: 10.1007/s00453-024-01209-4
Kyrill Winkler, Ami Paz, Hugo Rincon Galeana, Stefan Schmid, Ulrich Schmid
We study the problem of solving consensus in synchronous directed dynamic networks, in which communication is controlled by an oblivious message adversary that picks the communication graph to be used in a round from a fixed set of graphs (textbf{D}) arbitrarily. In this fundamental model, determining consensus solvability and designing efficient consensus algorithms is surprisingly difficult. Enabled by a decision procedure that is derived from a well-established previous consensus solvability characterization for a given set (textbf{D}), we study, for the first time, the time complexity of solving consensus in this model: We provide both upper and lower bounds for this time complexity, and also relate it to the number of iterations required by the decision procedure. Among other results, we find that reaching consensus under an oblivious message adversary can take exponentially longer than both deciding consensus solvability and broadcasting the input value of some unknown process to all other processes.
{"title":"The Time Complexity of Consensus Under Oblivious Message Adversaries","authors":"Kyrill Winkler, Ami Paz, Hugo Rincon Galeana, Stefan Schmid, Ulrich Schmid","doi":"10.1007/s00453-024-01209-4","DOIUrl":"10.1007/s00453-024-01209-4","url":null,"abstract":"<div><p>We study the problem of solving consensus in synchronous directed dynamic networks, in which communication is controlled by an oblivious message adversary that picks the communication graph to be used in a round from a fixed set of graphs <span>(textbf{D})</span> arbitrarily. In this fundamental model, determining consensus solvability and designing efficient consensus algorithms is surprisingly difficult. Enabled by a decision procedure that is derived from a well-established previous consensus solvability characterization for a given set <span>(textbf{D})</span>, we study, for the first time, the time complexity of solving consensus in this model: We provide both upper and lower bounds for this time complexity, and also relate it to the number of iterations required by the decision procedure. Among other results, we find that reaching consensus under an oblivious message adversary can take exponentially longer than both deciding consensus solvability and broadcasting the input value of some unknown process to all other processes.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"1830 - 1861"},"PeriodicalIF":0.9,"publicationDate":"2024-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01209-4.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139750870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-12DOI: 10.1007/s00453-024-01208-5
Rajarshi Bhattacharjee, Gregory Dexter, Petros Drineas, Cameron Musco, Archan Ray
We study the problem of approximating the eigenspectrum of a symmetric matrix (textbf{A} in mathbb {R}^{n times n}) with bounded entries (i.e., (Vert textbf{A}Vert _{infty } le 1)). We present a simple sublinear time algorithm that approximates all eigenvalues of (textbf{A}) up to additive error (pm epsilon n) using those of a randomly sampled ({tilde{O}}left( frac{log ^3 n}{epsilon ^3}right) times {{tilde{O}}}left( frac{log ^3 n}{epsilon ^3}right) ) principal submatrix. Our result can be viewed as a concentration bound on the complete eigenspectrum of a random submatrix, significantly extending known bounds on just the singular values (the magnitudes of the eigenvalues). We give improved error bounds of (pm epsilon sqrt{text {nnz}(textbf{A})}) and (pm epsilon Vert textbf{A}Vert _F) when the rows of (textbf{A}) can be sampled with probabilities proportional to their sparsities or their squared (ell _2) norms respectively. Here (text {nnz}(textbf{A})) is the number of non-zero entries in (textbf{A}) and (Vert textbf{A}Vert _F) is its Frobenius norm. Even for the strictly easier problems of approximating the singular values or testing the existence of large negative eigenvalues (Bakshi, Chepurko, and Jayaram, FOCS ’20), our results are the first that take advantage of non-uniform sampling to give improved error bounds. From a technical perspective, our results require several new eigenvalue concentration and perturbation bounds for matrices with bounded entries. Our non-uniform sampling bounds require a new algorithmic approach, which judiciously zeroes out entries of a randomly sampled submatrix to reduce variance, before computing the eigenvalues of that submatrix as estimates for those of (textbf{A}). We complement our theoretical results with numerical simulations, which demonstrate the effectiveness of our algorithms in practice.
我们研究的问题是近似具有有界条目(即 (Vert textbf{A}Vert _{infty } le 1)) 的对称矩阵 (textbf{A} in mathbb {R}^{n times n}) 的特征谱。我们提出了一种简单的亚线性时间算法,它可以用随机采样的times {{tilde{O}}}left(frac{log ^3 n}{epsilon ^3}right) 主子矩阵。我们的结果可以看作是对随机子矩阵完整特征谱的集中约束,极大地扩展了对奇异值(特征值的大小)的已知约束。当 (textbf{A}) 的行可以分别以与它们的稀疏度或它们的平方(ell _2)规范成比例的概率进行采样时,我们给出了 (pm epsilon sqrttext {nnz}(textbf{A})}) 和 (pm epsilon Vert textbf{A}Vert _F)的改进误差约束。这里,(text {nnz}(textbf{A}))是(textbf{A})中的非零条目数,(Vert textbf{A}Vert _F)是它的弗罗贝尼斯规范。即使对于近似奇异值或检验是否存在大负特征值这种严格意义上更容易的问题(Bakshi, Chepurko, and Jayaram, FOCS '20),我们的结果也是第一个利用非均匀采样给出改进误差边界的结果。从技术角度看,我们的结果要求对有界项的矩阵进行若干新的特征值集中和扰动约束。我们的非均匀抽样边界需要一种新的算法方法,即在计算该子矩阵的特征值作为 (textbf{A}) 的估计值之前,明智地将随机抽样子矩阵的条目清零以减少方差。我们用数值模拟补充了理论结果,证明了我们的算法在实践中的有效性。
{"title":"Sublinear Time Eigenvalue Approximation via Random Sampling","authors":"Rajarshi Bhattacharjee, Gregory Dexter, Petros Drineas, Cameron Musco, Archan Ray","doi":"10.1007/s00453-024-01208-5","DOIUrl":"10.1007/s00453-024-01208-5","url":null,"abstract":"<div><p>We study the problem of approximating the eigenspectrum of a symmetric matrix <span>(textbf{A} in mathbb {R}^{n times n})</span> with bounded entries (i.e., <span>(Vert textbf{A}Vert _{infty } le 1)</span>). We present a simple sublinear time algorithm that approximates all eigenvalues of <span>(textbf{A})</span> up to additive error <span>(pm epsilon n)</span> using those of a randomly sampled <span>({tilde{O}}left( frac{log ^3 n}{epsilon ^3}right) times {{tilde{O}}}left( frac{log ^3 n}{epsilon ^3}right) )</span> principal submatrix. Our result can be viewed as a concentration bound on the complete eigenspectrum of a random submatrix, significantly extending known bounds on just the singular values (the magnitudes of the eigenvalues). We give improved error bounds of <span>(pm epsilon sqrt{text {nnz}(textbf{A})})</span> and <span>(pm epsilon Vert textbf{A}Vert _F)</span> when the rows of <span>(textbf{A})</span> can be sampled with probabilities proportional to their sparsities or their squared <span>(ell _2)</span> norms respectively. Here <span>(text {nnz}(textbf{A}))</span> is the number of non-zero entries in <span>(textbf{A})</span> and <span>(Vert textbf{A}Vert _F)</span> is its Frobenius norm. Even for the strictly easier problems of approximating the singular values or testing the existence of large negative eigenvalues (Bakshi, Chepurko, and Jayaram, FOCS ’20), our results are the first that take advantage of non-uniform sampling to give improved error bounds. From a technical perspective, our results require several new eigenvalue concentration and perturbation bounds for matrices with bounded entries. Our non-uniform sampling bounds require a new algorithmic approach, which judiciously zeroes out entries of a randomly sampled submatrix to reduce variance, before computing the eigenvalues of that submatrix as estimates for those of <span>(textbf{A})</span>. We complement our theoretical results with numerical simulations, which demonstrate the effectiveness of our algorithms in practice.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"1764 - 1829"},"PeriodicalIF":0.9,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139751014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-02-03DOI: 10.1007/s00453-023-01205-0
Naoto Ohsaka
In the Determinant Maximization problem, given an (n times n) positive semi-definite matrix ({textbf {A}} ) in (mathbb {Q}^{n times n}) and an integer k, we are required to find a (k times k) principal submatrix of ({textbf {A}} ) having the maximum determinant. This problem is known to be NP-hard and further proven to be W[1]-hard with respect to k by Koutis (Inf Process Lett 100:8–13, 2006); i.e., a (f(k)n^{{{,mathrm{mathcal {O}},}}(1)})-time algorithm is unlikely to exist for any computable function f. However, there is still room to explore its parameterized complexity in the restricted case, in the hope of overcoming the general-case parameterized intractability. In this study, we rule out the fixed-parameter tractability of Determinant Maximization even if an input matrix is extremely sparse or low rank, or an approximate solution is acceptable. We first prove that Determinant Maximization is NP-hard and W[1]-hard even if an input matrix is an arrowhead matrix; i.e., the underlying graph formed by nonzero entries is a star, implying that the structural sparsity is not helpful. By contrast, Determinant Maximization is known to be solvable in polynomial time on tridiagonal matrices (Al-Thani and Lee, in: LAGOS, 2021). Thereafter, we demonstrate the W[1]-hardness with respect to the rankr of an input matrix. Our result is stronger than Koutis’ result in the sense that any (k times k) principal submatrix is singular whenever (k > r). We finally give evidence that it is W[1]-hard to approximate Determinant Maximization parameterized by k within a factor of (2^{-csqrt{k}}) for some universal constant (c > 0). Our hardness result is conditional on the Parameterized Inapproximability Hypothesis posed by Lokshtanov et al. (in: SODA, 2020), which asserts that a gap version of Binary Constraint Satisfaction Problem is W[1]-hard. To complement this result, we develop an (varepsilon )-additive approximation algorithm that runs in (varepsilon ^{-r^2} cdot r^{{{,mathrm{mathcal {O}},}}(r^3)} cdot n^{{{,mathrm{mathcal {O}},}}(1)}) time for the rank r of an input matrix, provided that the diagonal entries are bounded.
摘要 在行列式最大化问题中,给定一个在(mathbb {Q}^{n times n})中的正半有限矩阵({textbf {A}} )和一个整数k,我们需要找到一个具有最大行列式的({textbf {A}} )的(k times k) 主子矩阵。众所周知,这个问题是 NP-困难的,Koutis(Inf Process Lett 100:8-13, 2006)进一步证明了这个问题对于 k 来说是 W[1]-hard 的;也就是说,一个 (f(k)n^{{{,mathrm{mathcal {O}},}}(1)})-然而,我们仍有余地探索其在受限情况下的参数化复杂性,希望能克服一般情况下的参数化难解性。在本研究中,即使输入矩阵极其稀疏或秩很低,或者近似解是可以接受的,我们也会排除判定式最大化的固定参数可计算性。我们首先证明,即使输入矩阵是箭头矩阵(即由非零条目形成的底层图是星形的,这意味着结构稀疏性没有帮助),确定性最大化也是 NP-困难和 W[1]- 困难的。相比之下,已知确定性最大化可以在多项式时间内求解三对角矩阵(Al-Thani and Lee, in: LAGOS, 2021)。此后,我们证明了输入矩阵秩 r 的 W[1] 难度。我们的结果比库提斯的结果更强,因为任何 (k times k) 主子矩阵在 (k > r) 时都是奇异的。最后,我们给出证据证明,对于某个通用常数 (c > 0) 而言,在 (2^{-csqrt{k}}) 的范围内,以 k 为参数的确定性最大化近似是 W[1]-hard 的。我们的硬度结果是以 Lokshtanov 等人提出的参数化不可逼近假说(in: SODA, 2020)为条件的,该假说断言二元约束满足问题的缺口版本是 W[1]-hard 的。为了补充这一结果,我们开发了一种在 (varepsilon ^{-r^2} 内运行的 (varepsilon ^{-r^2}) -附加逼近算法。cdot r^{{{,mathrm{mathcal {O}},}}(r^3)} cdot n^{{{,mathrm{mathcal {O}},}}(1)}) time for the rank r of an input matrix, provided that the diagonal entries are bounded.
{"title":"On the Parameterized Intractability of Determinant Maximization","authors":"Naoto Ohsaka","doi":"10.1007/s00453-023-01205-0","DOIUrl":"10.1007/s00453-023-01205-0","url":null,"abstract":"<div><p>In the <span>Determinant Maximization</span> problem, given an <span>(n times n)</span> positive semi-definite matrix <span>({textbf {A}} )</span> in <span>(mathbb {Q}^{n times n})</span> and an integer <i>k</i>, we are required to find a <span>(k times k)</span> principal submatrix of <span>({textbf {A}} )</span> having the maximum determinant. This problem is known to be <span>NP</span>-hard and further proven to be <span>W</span>[1]-hard with respect to <i>k</i> by Koutis (Inf Process Lett 100:8–13, 2006); i.e., a <span>(f(k)n^{{{,mathrm{mathcal {O}},}}(1)})</span>-time algorithm is unlikely to exist for any computable function <i>f</i>. However, there is still room to explore its parameterized complexity in the <i>restricted case</i>, in the hope of overcoming the general-case parameterized intractability. In this study, we rule out the fixed-parameter tractability of <span>Determinant Maximization</span> even if an input matrix is extremely sparse or low rank, or an approximate solution is acceptable. We first prove that <span>Determinant Maximization</span> is <span>NP</span>-hard and <span>W</span>[1]-hard even if an input matrix is an <i>arrowhead matrix</i>; i.e., the underlying graph formed by nonzero entries is a star, implying that the structural sparsity is not helpful. By contrast, <span>Determinant Maximization</span> is known to be solvable in polynomial time on <i>tridiagonal matrices</i> (Al-Thani and Lee, in: LAGOS, 2021). Thereafter, we demonstrate the <span>W</span>[1]-hardness with respect to the <i>rank</i> <i>r</i> of an input matrix. Our result is stronger than Koutis’ result in the sense that any <span>(k times k)</span> principal submatrix is singular whenever <span>(k > r)</span>. We finally give evidence that it is <span>W</span>[1]-hard to approximate <span>Determinant Maximization</span> parameterized by <i>k</i> within a factor of <span>(2^{-csqrt{k}})</span> for some universal constant <span>(c > 0)</span>. Our hardness result is conditional on the <i>Parameterized Inapproximability Hypothesis</i> posed by Lokshtanov et al. (in: SODA, 2020), which asserts that a gap version of <span>Binary Constraint Satisfaction Problem</span> is <span>W</span>[1]-hard. To complement this result, we develop an <span>(varepsilon )</span>-additive approximation algorithm that runs in <span>(varepsilon ^{-r^2} cdot r^{{{,mathrm{mathcal {O}},}}(r^3)} cdot n^{{{,mathrm{mathcal {O}},}}(1)})</span> time for the rank <i>r</i> of an input matrix, provided that the diagonal entries are bounded.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"1731 - 1763"},"PeriodicalIF":0.9,"publicationDate":"2024-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-023-01205-0.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139678586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-29DOI: 10.1007/s00453-024-01207-6
Stefan Dobrev, Lata Narayanan, Jaroslav Opatrny, Denis Pankratov
We consider the problem of finding a “treasure” at an unknown point of an n-dimensional infinite grid, (nge 3), by initially collocated finite automaton (FA) agents. Recently, the problem has been well characterized for 2 dimensions for deterministic as well as randomized FA agents, both in synchronous and semi-synchronous models (Brandt et al. in Proceedings of 32nd International Symposium on Distributed Computing (DISC) LIPCS 121:13:1–13:17, 2018; Emek et al. in Theor Comput Sci 608:255–267, 2015). It has been conjectured that (n+1) randomized FA agents are necessary to solve this problem in the n-dimensional grid (Cohen et al. in Proceedings of the 28th SODA, SODA ’17, pp 207–224, 2017). In this paper we disprove the conjecture in a strong sense: we show that three randomized synchronous FA agents suffice to explore an n-dimensional grid for anyn. Our algorithm is optimal in terms of the number of the agents. Our key insight is that a constant number of FA agents can, by their positions and movements, implement a stack, which can store the path being explored. We also show how to implement our algorithm using: four randomized semi-synchronous FA agents; four deterministic synchronous FA agents; or five deterministic semi-synchronous FA agents. We give a different, no-stack algorithm that uses 4 deterministic semi-synchronous FA agents for the 3-dimensional grid. This is provably optimal in the number of agents and the exploration cost, and surprisingly, matches the result for 2 dimensions. For (nge 4), the time complexity of the stack-based algorithms mentioned above is exponential in distance D of the treasure from the starting point of the agents. We show that in the deterministic case, one additional finite automaton agent brings the time down to a polynomial. We also show that any algorithm using 3 synchronous deterministic FA agents in 3 dimensions must travel beyond (Omega (D^{3/2})) from the origin. Finally, we show that all the above algorithms can be generalized to unoriented grids. More specifically, six deterministic semi-synchronous FA agents are sufficient to locate the treasure in an unoriented n-dimensional grid.
摘要 我们考虑的问题是在一个 n 维的无限网格中,通过最初的有限自动机(FA)代理在一个未知点找到一个 "宝藏"。最近,对于确定性以及随机化的 FA 代理,该问题在同步和半同步模型中的两个维度都得到了很好的描述(Brandt 等人,发表于第 32 届分布式计算国际研讨会论文集(DISC)LIPCS 121:13:1-13:17, 2018;Emek 等人,发表于 Theor Comput Sci 608:255-267, 2015)。有人猜想,要在 n 维网格中解决这个问题,必须要有(n+1) 个随机 FA 代理(Cohen 等人,载于第 28 届 SODA 会议论文集,SODA '17, 第 207-224 页,2017 年)。在本文中,我们从强意义上反证了这一猜想:我们证明,对于任意 n,三个随机同步 FA 代理足以探索 n 维网格。我们的主要见解是,恒定数量的 FA 代理可以通过其位置和移动实现堆栈,从而存储正在探索的路径。我们还展示了如何使用以下方法实现我们的算法:四个随机半同步 FA 代理;四个确定性同步 FA 代理;或五个确定性半同步 FA 代理。我们给出了一种不同的无堆栈算法,即在三维网格中使用 4 个确定性半同步 FA 代理。这种算法在代理数量和探索成本上都是最优的,而且令人惊讶的是,它与二维网格的结果相吻合。对于 (nge 4) ,上述基于堆栈的算法的时间复杂度是宝藏与代理起点距离 D 的指数。我们证明,在确定性情况下,多一个有限自动机代理就能把时间降到多项式。我们还证明,任何在 3 维空间中使用 3 个同步确定性有限自动机代理的算法都必须从原点出发超过 (Omega (D^{3/2}))。最后,我们证明上述所有算法都可以推广到无定向网格。更具体地说,六个确定性半同步 FA 代理足以在无方向的 n 维网格中找到宝藏。
{"title":"Exploration of High-Dimensional Grids by Finite State Machines","authors":"Stefan Dobrev, Lata Narayanan, Jaroslav Opatrny, Denis Pankratov","doi":"10.1007/s00453-024-01207-6","DOIUrl":"10.1007/s00453-024-01207-6","url":null,"abstract":"<div><p>We consider the problem of finding a “treasure” at an unknown point of an <i>n</i>-dimensional infinite grid, <span>(nge 3)</span>, by initially collocated finite automaton (FA) agents. Recently, the problem has been well characterized for 2 dimensions for deterministic as well as randomized FA agents, both in synchronous and semi-synchronous models (Brandt et al. in Proceedings of 32nd International Symposium on Distributed Computing (DISC) LIPCS 121:13:1–13:17, 2018; Emek et al. in Theor Comput Sci 608:255–267, 2015). It has been conjectured that <span>(n+1)</span> randomized FA agents are necessary to solve this problem in the <i>n</i>-dimensional grid (Cohen et al. in Proceedings of the 28th SODA, SODA ’17, pp 207–224, 2017). In this paper we disprove the conjecture in a strong sense: we show that <i>three</i> randomized synchronous FA agents suffice to explore an <i>n</i>-dimensional grid for <i>any</i> <i>n</i>. Our algorithm is optimal in terms of the number of the agents. Our key insight is that a constant number of FA agents can, by their positions and movements, implement a stack, which can store the path being explored. We also show how to implement our algorithm using: four randomized semi-synchronous FA agents; four deterministic synchronous FA agents; or five deterministic semi-synchronous FA agents. We give a different, no-stack algorithm that uses 4 deterministic semi-synchronous FA agents for the 3-dimensional grid. This is provably optimal in the number of agents and the exploration cost, and surprisingly, matches the result for 2 dimensions. For <span>(nge 4)</span>, the time complexity of the stack-based algorithms mentioned above is exponential in distance <i>D</i> of the treasure from the starting point of the agents. We show that in the deterministic case, one additional finite automaton agent brings the time down to a polynomial. We also show that any algorithm using 3 synchronous deterministic FA agents in 3 dimensions must travel beyond <span>(Omega (D^{3/2}))</span> from the origin. Finally, we show that all the above algorithms can be generalized to unoriented grids. More specifically, six deterministic semi-synchronous FA agents are sufficient to locate the treasure in an unoriented <i>n</i>-dimensional grid.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 5","pages":"1700 - 1729"},"PeriodicalIF":0.9,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139589836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-01-27DOI: 10.1007/s00453-023-01206-z
Kishen N. Gowda, Aditya Lonkar, Fahad Panolan, Vraj Patel, Saket Saurabh
The Feedback Vertex Set problem is undoubtedly one of the most well-studied problems in Parameterized Complexity. In this problem, given an undirected graph G and a non-negative integer k, the objective is to test whether there exists a subset (Ssubseteq V(G)) of size at most k such that (G-S) is a forest. After a long line of improvement, recently, Li and Nederlof [TALG, 2022] designed a randomized algorithm for the problem running in time ({mathcal {O}}^{star }(2.7^k)^{*}). In the Parameterized Complexity literature, several problems around Feedback Vertex Set have been studied. Some of these include Independent Feedback Vertex Set (where the set S should be an independent set in G), Almost Forest Deletion and Pseudoforest Deletion. In Pseudoforest Deletion, each connected component in (G-S) has at most one cycle in it. However, in Almost Forest Deletion, the input is a graph G and non-negative integers (k,ell in {{mathbb {N}}}), and the objective is to test whether there exists a vertex subset S of size at most k, such that (G-S) is (ell ) edges away from a forest. In this paper, using the methodology of Li and Nederlof [TALG, 2022], we obtain the current fastest algorithms for all these problems. In particular we obtain the following randomized algorithms.