首页 > 最新文献

Algorithmica最新文献

英文 中文
Stable Matchings, One-Sided Ties, and Approximate Popularity 稳定配对、单边纽带和近似受欢迎程度
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-03-02 DOI: 10.1007/s00453-024-01215-6
Telikepalli Kavitha

We consider a matching problem in a bipartite graph (G = (A cup B, E)) where vertices in A rank their neighbors in a strict order of preference while vertices in B are allowed to have weak rankings, i.e., ties are allowed in their rankings. Stable matchings always exist in G and are easy to find, however popular matchings need not exist in G and it is NP-complete to decide if one exists. This motivates the “approximately popular” matching problem. A well-known measure of approximate popularity is low unpopularity factor. We show that when each tie in G has length at most k, there always exists a stable matching whose unpopularity factor is at most k and such a matching can be computed in polynomial time. Thus when ties have bounded length, there always exists a near-popular stable matching. This can be considered to be a generalization of Gärdenfors’ result (1975) which showed that when rankings are strict, every stable matching is popular. We then extend our result to the hospitals/residents setting, i.e., vertices in B have capacities. There are several applications where the size of the matching is its most important attribute. When ties are one-sided and of length at most k, we show a polynomial time algorithm to find a maximum matching whose unpopularity factor within the set of maximum matchings is at most 2k.

我们考虑的是(G = (A cup B, E))双瓣图中的匹配问题,其中 A 中的顶点按照严格的偏好顺序排列它们的邻居,而 B 中的顶点允许弱排序,即允许它们的排序出现平局。稳定匹配总是存在于 G 中,而且很容易找到,但是流行匹配不一定存在于 G 中,而且判断是否存在流行匹配是一个 NP 难点。这就产生了 "近似流行 "匹配问题。近似受欢迎程度的一个众所周知的衡量标准是低不受欢迎系数。我们的研究表明,当 G 中每条领带的长度最多为 k 时,总会存在一个不受欢迎系数最多为 k 的稳定匹配,而且这种匹配可以在多项式时间内计算出来。因此,当领带长度有界时,总是存在一个接近流行的稳定匹配。这可以看作是 Gärdenfors 结果(1975 年)的推广,Gärdenfors 的结果表明,当排名严格时,每个稳定匹配都是受欢迎的。然后,我们将结果扩展到医院/住院病人设置,即 B 中的顶点具有容量。在一些应用中,匹配的大小是其最重要的属性。当纽带是单边的且长度最多为 k 时,我们展示了一种多项式时间算法,可以找到最大匹配集合中不受欢迎系数最多为 2k 的最大匹配。
{"title":"Stable Matchings, One-Sided Ties, and Approximate Popularity","authors":"Telikepalli Kavitha","doi":"10.1007/s00453-024-01215-6","DOIUrl":"10.1007/s00453-024-01215-6","url":null,"abstract":"<div><p>We consider a matching problem in a bipartite graph <span>(G = (A cup B, E))</span> where vertices in <i>A</i> rank their neighbors in a strict order of preference while vertices in <i>B</i> are allowed to have <i>weak</i> rankings, i.e., ties are allowed in their rankings. Stable matchings always exist in <i>G</i> and are easy to find, however popular matchings need not exist in <i>G</i> and it is NP-complete to decide if one exists. This motivates the “approximately popular” matching problem. A well-known measure of approximate popularity is <i>low unpopularity factor</i>. We show that when each tie in <i>G</i> has length at most <i>k</i>, there always exists a stable matching whose unpopularity factor is at most <i>k</i> and such a matching can be computed in polynomial time. Thus when ties have bounded length, there always exists a <i>near-popular</i> stable matching. This can be considered to be a generalization of Gärdenfors’ result (1975) which showed that when rankings are strict, every stable matching is popular. We then extend our result to the hospitals/residents setting, i.e., vertices in <i>B</i> have capacities. There are several applications where the size of the matching is its most important attribute. When ties are one-sided and of length at most <i>k</i>, we show a polynomial time algorithm to find a maximum matching whose unpopularity factor <i>within</i> the set of maximum matchings is at most 2<i>k</i>.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"1888 - 1920"},"PeriodicalIF":0.9,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140016673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Editor’s Note: Special Issue with GECCO 2021 编者按:GECCO 2021 特刊
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-03-02 DOI: 10.1007/s00453-024-01217-4
{"title":"Editor’s Note: Special Issue with GECCO 2021","authors":"","doi":"10.1007/s00453-024-01217-4","DOIUrl":"10.1007/s00453-024-01217-4","url":null,"abstract":"","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"2067 - 2067"},"PeriodicalIF":0.9,"publicationDate":"2024-03-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142409442","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Minimal Roman Dominating Functions: Extensions and Enumeration 最小罗马支配函数:扩展与枚举
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-02-14 DOI: 10.1007/s00453-024-01211-w
Faisal N. Abu-Khzam, Henning Fernau, Kevin Mann

Roman domination is one of the many variants of domination that keeps most of the complexity features of the classical domination problem. We prove that Roman domination behaves differently in two aspects: enumeration and extension. We develop non-trivial enumeration algorithms for minimal Roman dominating functions with polynomial delay and polynomial space. Recall that the existence of a similar enumeration result for minimal dominating sets is open for decades. Our result is based on a polynomial-time algorithm for Extension Roman Domination: Given a graph (G=(V,E)) and a function (f:Vrightarrow {0,1,2}), is there a minimal Roman dominating function (tilde{f}) with (fle tilde{f})? Here, (le ) lifts (0< 1< 2) pointwise; minimality is understood in this order. Our enumeration algorithm is also analyzed from an input-sensitive viewpoint, leading to a run-time estimate of (mathcal {O}(1.9332^n)) for graphs of order n; this is complemented by a lower bound example of (Omega (1.7441^n)).

摘要 罗马支配法是支配法的众多变体之一,它保留了经典支配法问题的大部分复杂性特征。我们证明罗马支配在枚举和扩展两个方面表现不同。我们以多项式延迟和多项式空间为最小罗马支配函数开发了非难枚举算法。回想一下,类似的枚举结果对于最小支配集的存在已经有几十年的历史了。我们的结果基于 Extension Roman Domination 的多项式时间算法:给定一个图(G=(V,E))和一个函数(f:Vrightarrow {0,1,2}),是否存在一个最小罗马支配函数(tilde{f})与(fle tilde{f})?在这里,(le )点对点地提升(0< 1< 2); 最小性是按这个顺序理解的。我们的枚举算法还从输入敏感的角度进行了分析,从而得出了对于阶数为 n 的图,运行时间估计值为 (mathcal {O}(1.9332^n)) ;这一估计值还得到了 (Omega (1.7441^n)) 的下限实例的补充。
{"title":"Minimal Roman Dominating Functions: Extensions and Enumeration","authors":"Faisal N. Abu-Khzam,&nbsp;Henning Fernau,&nbsp;Kevin Mann","doi":"10.1007/s00453-024-01211-w","DOIUrl":"10.1007/s00453-024-01211-w","url":null,"abstract":"<div><p>Roman domination is one of the many variants of domination that keeps most of the complexity features of the classical domination problem. We prove that Roman domination behaves differently in two aspects: enumeration and extension. We develop non-trivial enumeration algorithms for minimal Roman dominating functions with polynomial delay and polynomial space. Recall that the existence of a similar enumeration result for minimal dominating sets is open for decades. Our result is based on a polynomial-time algorithm for <span>Extension Roman Domination</span>: Given a graph <span>(G=(V,E))</span> and a function <span>(f:Vrightarrow {0,1,2})</span>, is there a minimal Roman dominating function <span>(tilde{f})</span> with <span>(fle tilde{f})</span>? Here, <span>(le )</span> lifts <span>(0&lt; 1&lt; 2)</span> pointwise; minimality is understood in this order. Our enumeration algorithm is also analyzed from an input-sensitive viewpoint, leading to a run-time estimate of <span>(mathcal {O}(1.9332^n))</span> for graphs of order <i>n</i>; this is complemented by a lower bound example of <span>(Omega (1.7441^n))</span>.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"1862 - 1887"},"PeriodicalIF":0.9,"publicationDate":"2024-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01211-w.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139750959","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Time Complexity of Consensus Under Oblivious Message Adversaries 忽略信息对手情况下达成共识的时间复杂性
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-02-13 DOI: 10.1007/s00453-024-01209-4
Kyrill Winkler, Ami Paz, Hugo Rincon Galeana, Stefan Schmid, Ulrich Schmid

We study the problem of solving consensus in synchronous directed dynamic networks, in which communication is controlled by an oblivious message adversary that picks the communication graph to be used in a round from a fixed set of graphs (textbf{D}) arbitrarily. In this fundamental model, determining consensus solvability and designing efficient consensus algorithms is surprisingly difficult. Enabled by a decision procedure that is derived from a well-established previous consensus solvability characterization for a given set (textbf{D}), we study, for the first time, the time complexity of solving consensus in this model: We provide both upper and lower bounds for this time complexity, and also relate it to the number of iterations required by the decision procedure. Among other results, we find that reaching consensus under an oblivious message adversary can take exponentially longer than both deciding consensus solvability and broadcasting the input value of some unknown process to all other processes.

我们研究的是同步有向动态网络中的共识求解问题,在这种网络中,通信是由一个遗忘信息对抗者控制的,对抗者会从一组固定的图(textbf{D})中任意挑选一轮中要使用的通信图。在这个基本模型中,确定共识可解性和设计高效共识算法的难度之大令人吃惊。我们从之前针对给定集合 (textbf{D})建立的共识可解性表征中推导出了一个决策程序,在这个决策程序的帮助下,我们首次研究了在这个模型中求解共识的时间复杂度:我们提供了时间复杂度的上限和下限,并将其与决策程序所需的迭代次数联系起来。除其他结果外,我们还发现,与决定共识可解性和向所有其他进程广播某些未知进程的输入值相比,在遗忘信息对抗下达成共识所需的时间可能会呈指数级增长。
{"title":"The Time Complexity of Consensus Under Oblivious Message Adversaries","authors":"Kyrill Winkler,&nbsp;Ami Paz,&nbsp;Hugo Rincon Galeana,&nbsp;Stefan Schmid,&nbsp;Ulrich Schmid","doi":"10.1007/s00453-024-01209-4","DOIUrl":"10.1007/s00453-024-01209-4","url":null,"abstract":"<div><p>We study the problem of solving consensus in synchronous directed dynamic networks, in which communication is controlled by an oblivious message adversary that picks the communication graph to be used in a round from a fixed set of graphs <span>(textbf{D})</span> arbitrarily. In this fundamental model, determining consensus solvability and designing efficient consensus algorithms is surprisingly difficult. Enabled by a decision procedure that is derived from a well-established previous consensus solvability characterization for a given set <span>(textbf{D})</span>, we study, for the first time, the time complexity of solving consensus in this model: We provide both upper and lower bounds for this time complexity, and also relate it to the number of iterations required by the decision procedure. Among other results, we find that reaching consensus under an oblivious message adversary can take exponentially longer than both deciding consensus solvability and broadcasting the input value of some unknown process to all other processes.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"1830 - 1861"},"PeriodicalIF":0.9,"publicationDate":"2024-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-024-01209-4.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139750870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sublinear Time Eigenvalue Approximation via Random Sampling 通过随机抽样实现次线性时间特征值逼近
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-02-12 DOI: 10.1007/s00453-024-01208-5
Rajarshi Bhattacharjee, Gregory Dexter, Petros Drineas, Cameron Musco, Archan Ray

We study the problem of approximating the eigenspectrum of a symmetric matrix (textbf{A} in mathbb {R}^{n times n}) with bounded entries (i.e., (Vert textbf{A}Vert _{infty } le 1)). We present a simple sublinear time algorithm that approximates all eigenvalues of (textbf{A}) up to additive error (pm epsilon n) using those of a randomly sampled ({tilde{O}}left( frac{log ^3 n}{epsilon ^3}right) times {{tilde{O}}}left( frac{log ^3 n}{epsilon ^3}right) ) principal submatrix. Our result can be viewed as a concentration bound on the complete eigenspectrum of a random submatrix, significantly extending known bounds on just the singular values (the magnitudes of the eigenvalues). We give improved error bounds of (pm epsilon sqrt{text {nnz}(textbf{A})}) and (pm epsilon Vert textbf{A}Vert _F) when the rows of (textbf{A}) can be sampled with probabilities proportional to their sparsities or their squared (ell _2) norms respectively. Here (text {nnz}(textbf{A})) is the number of non-zero entries in (textbf{A}) and (Vert textbf{A}Vert _F) is its Frobenius norm. Even for the strictly easier problems of approximating the singular values or testing the existence of large negative eigenvalues (Bakshi, Chepurko, and Jayaram, FOCS ’20), our results are the first that take advantage of non-uniform sampling to give improved error bounds. From a technical perspective, our results require several new eigenvalue concentration and perturbation bounds for matrices with bounded entries. Our non-uniform sampling bounds require a new algorithmic approach, which judiciously zeroes out entries of a randomly sampled submatrix to reduce variance, before computing the eigenvalues of that submatrix as estimates for those of (textbf{A}). We complement our theoretical results with numerical simulations, which demonstrate the effectiveness of our algorithms in practice.

我们研究的问题是近似具有有界条目(即 (Vert textbf{A}Vert _{infty } le 1)) 的对称矩阵 (textbf{A} in mathbb {R}^{n times n}) 的特征谱。我们提出了一种简单的亚线性时间算法,它可以用随机采样的times {{tilde{O}}}left(frac{log ^3 n}{epsilon ^3}right) 主子矩阵。我们的结果可以看作是对随机子矩阵完整特征谱的集中约束,极大地扩展了对奇异值(特征值的大小)的已知约束。当 (textbf{A}) 的行可以分别以与它们的稀疏度或它们的平方(ell _2)规范成比例的概率进行采样时,我们给出了 (pm epsilon sqrttext {nnz}(textbf{A})}) 和 (pm epsilon Vert textbf{A}Vert _F)的改进误差约束。这里,(text {nnz}(textbf{A}))是(textbf{A})中的非零条目数,(Vert textbf{A}Vert _F)是它的弗罗贝尼斯规范。即使对于近似奇异值或检验是否存在大负特征值这种严格意义上更容易的问题(Bakshi, Chepurko, and Jayaram, FOCS '20),我们的结果也是第一个利用非均匀采样给出改进误差边界的结果。从技术角度看,我们的结果要求对有界项的矩阵进行若干新的特征值集中和扰动约束。我们的非均匀抽样边界需要一种新的算法方法,即在计算该子矩阵的特征值作为 (textbf{A}) 的估计值之前,明智地将随机抽样子矩阵的条目清零以减少方差。我们用数值模拟补充了理论结果,证明了我们的算法在实践中的有效性。
{"title":"Sublinear Time Eigenvalue Approximation via Random Sampling","authors":"Rajarshi Bhattacharjee,&nbsp;Gregory Dexter,&nbsp;Petros Drineas,&nbsp;Cameron Musco,&nbsp;Archan Ray","doi":"10.1007/s00453-024-01208-5","DOIUrl":"10.1007/s00453-024-01208-5","url":null,"abstract":"<div><p>We study the problem of approximating the eigenspectrum of a symmetric matrix <span>(textbf{A} in mathbb {R}^{n times n})</span> with bounded entries (i.e., <span>(Vert textbf{A}Vert _{infty } le 1)</span>). We present a simple sublinear time algorithm that approximates all eigenvalues of <span>(textbf{A})</span> up to additive error <span>(pm epsilon n)</span> using those of a randomly sampled <span>({tilde{O}}left( frac{log ^3 n}{epsilon ^3}right) times {{tilde{O}}}left( frac{log ^3 n}{epsilon ^3}right) )</span> principal submatrix. Our result can be viewed as a concentration bound on the complete eigenspectrum of a random submatrix, significantly extending known bounds on just the singular values (the magnitudes of the eigenvalues). We give improved error bounds of <span>(pm epsilon sqrt{text {nnz}(textbf{A})})</span> and <span>(pm epsilon Vert textbf{A}Vert _F)</span> when the rows of <span>(textbf{A})</span> can be sampled with probabilities proportional to their sparsities or their squared <span>(ell _2)</span> norms respectively. Here <span>(text {nnz}(textbf{A}))</span> is the number of non-zero entries in <span>(textbf{A})</span> and <span>(Vert textbf{A}Vert _F)</span> is its Frobenius norm. Even for the strictly easier problems of approximating the singular values or testing the existence of large negative eigenvalues (Bakshi, Chepurko, and Jayaram, FOCS ’20), our results are the first that take advantage of non-uniform sampling to give improved error bounds. From a technical perspective, our results require several new eigenvalue concentration and perturbation bounds for matrices with bounded entries. Our non-uniform sampling bounds require a new algorithmic approach, which judiciously zeroes out entries of a randomly sampled submatrix to reduce variance, before computing the eigenvalues of that submatrix as estimates for those of <span>(textbf{A})</span>. We complement our theoretical results with numerical simulations, which demonstrate the effectiveness of our algorithms in practice.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"1764 - 1829"},"PeriodicalIF":0.9,"publicationDate":"2024-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139751014","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Parameterized Intractability of Determinant Maximization 论确定性最大化的参数化难解性
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-02-03 DOI: 10.1007/s00453-023-01205-0
Naoto Ohsaka

In the Determinant Maximization problem, given an (n times n) positive semi-definite matrix ({textbf {A}} ) in (mathbb {Q}^{n times n}) and an integer k, we are required to find a (k times k) principal submatrix of ({textbf {A}} ) having the maximum determinant. This problem is known to be NP-hard and further proven to be W[1]-hard with respect to k by Koutis (Inf Process Lett 100:8–13, 2006); i.e., a (f(k)n^{{{,mathrm{mathcal {O}},}}(1)})-time algorithm is unlikely to exist for any computable function f. However, there is still room to explore its parameterized complexity in the restricted case, in the hope of overcoming the general-case parameterized intractability. In this study, we rule out the fixed-parameter tractability of Determinant Maximization even if an input matrix is extremely sparse or low rank, or an approximate solution is acceptable. We first prove that Determinant Maximization is NP-hard and W[1]-hard even if an input matrix is an arrowhead matrix; i.e., the underlying graph formed by nonzero entries is a star, implying that the structural sparsity is not helpful. By contrast, Determinant Maximization is known to be solvable in polynomial time on tridiagonal matrices (Al-Thani and Lee, in: LAGOS, 2021). Thereafter, we demonstrate the W[1]-hardness with respect to the rank r of an input matrix. Our result is stronger than Koutis’ result in the sense that any (k times k) principal submatrix is singular whenever (k > r). We finally give evidence that it is W[1]-hard to approximate Determinant Maximization parameterized by k within a factor of (2^{-csqrt{k}}) for some universal constant (c > 0). Our hardness result is conditional on the Parameterized Inapproximability Hypothesis posed by Lokshtanov et al. (in: SODA, 2020), which asserts that a gap version of Binary Constraint Satisfaction Problem is W[1]-hard. To complement this result, we develop an (varepsilon )-additive approximation algorithm that runs in (varepsilon ^{-r^2} cdot r^{{{,mathrm{mathcal {O}},}}(r^3)} cdot n^{{{,mathrm{mathcal {O}},}}(1)}) time for the rank r of an input matrix, provided that the diagonal entries are bounded.

摘要 在行列式最大化问题中,给定一个在(mathbb {Q}^{n times n})中的正半有限矩阵({textbf {A}} )和一个整数k,我们需要找到一个具有最大行列式的({textbf {A}} )的(k times k) 主子矩阵。众所周知,这个问题是 NP-困难的,Koutis(Inf Process Lett 100:8-13, 2006)进一步证明了这个问题对于 k 来说是 W[1]-hard 的;也就是说,一个 (f(k)n^{{{,mathrm{mathcal {O}},}}(1)})-然而,我们仍有余地探索其在受限情况下的参数化复杂性,希望能克服一般情况下的参数化难解性。在本研究中,即使输入矩阵极其稀疏或秩很低,或者近似解是可以接受的,我们也会排除判定式最大化的固定参数可计算性。我们首先证明,即使输入矩阵是箭头矩阵(即由非零条目形成的底层图是星形的,这意味着结构稀疏性没有帮助),确定性最大化也是 NP-困难和 W[1]- 困难的。相比之下,已知确定性最大化可以在多项式时间内求解三对角矩阵(Al-Thani and Lee, in: LAGOS, 2021)。此后,我们证明了输入矩阵秩 r 的 W[1] 难度。我们的结果比库提斯的结果更强,因为任何 (k times k) 主子矩阵在 (k > r) 时都是奇异的。最后,我们给出证据证明,对于某个通用常数 (c > 0) 而言,在 (2^{-csqrt{k}}) 的范围内,以 k 为参数的确定性最大化近似是 W[1]-hard 的。我们的硬度结果是以 Lokshtanov 等人提出的参数化不可逼近假说(in: SODA, 2020)为条件的,该假说断言二元约束满足问题的缺口版本是 W[1]-hard 的。为了补充这一结果,我们开发了一种在 (varepsilon ^{-r^2} 内运行的 (varepsilon ^{-r^2}) -附加逼近算法。cdot r^{{{,mathrm{mathcal {O}},}}(r^3)} cdot n^{{{,mathrm{mathcal {O}},}}(1)}) time for the rank r of an input matrix, provided that the diagonal entries are bounded.
{"title":"On the Parameterized Intractability of Determinant Maximization","authors":"Naoto Ohsaka","doi":"10.1007/s00453-023-01205-0","DOIUrl":"10.1007/s00453-023-01205-0","url":null,"abstract":"<div><p>In the <span>Determinant Maximization</span> problem, given an <span>(n times n)</span> positive semi-definite matrix <span>({textbf {A}} )</span> in <span>(mathbb {Q}^{n times n})</span> and an integer <i>k</i>, we are required to find a <span>(k times k)</span> principal submatrix of <span>({textbf {A}} )</span> having the maximum determinant. This problem is known to be <span>NP</span>-hard and further proven to be <span>W</span>[1]-hard with respect to <i>k</i> by Koutis (Inf Process Lett 100:8–13, 2006); i.e., a <span>(f(k)n^{{{,mathrm{mathcal {O}},}}(1)})</span>-time algorithm is unlikely to exist for any computable function <i>f</i>. However, there is still room to explore its parameterized complexity in the <i>restricted case</i>, in the hope of overcoming the general-case parameterized intractability. In this study, we rule out the fixed-parameter tractability of <span>Determinant Maximization</span> even if an input matrix is extremely sparse or low rank, or an approximate solution is acceptable. We first prove that <span>Determinant Maximization</span> is <span>NP</span>-hard and <span>W</span>[1]-hard even if an input matrix is an <i>arrowhead matrix</i>; i.e., the underlying graph formed by nonzero entries is a star, implying that the structural sparsity is not helpful. By contrast, <span>Determinant Maximization</span> is known to be solvable in polynomial time on <i>tridiagonal matrices</i> (Al-Thani and Lee, in: LAGOS, 2021). Thereafter, we demonstrate the <span>W</span>[1]-hardness with respect to the <i>rank</i> <i>r</i> of an input matrix. Our result is stronger than Koutis’ result in the sense that any <span>(k times k)</span> principal submatrix is singular whenever <span>(k &gt; r)</span>. We finally give evidence that it is <span>W</span>[1]-hard to approximate <span>Determinant Maximization</span> parameterized by <i>k</i> within a factor of <span>(2^{-csqrt{k}})</span> for some universal constant <span>(c &gt; 0)</span>. Our hardness result is conditional on the <i>Parameterized Inapproximability Hypothesis</i> posed by Lokshtanov et al. (in: SODA, 2020), which asserts that a gap version of <span>Binary Constraint Satisfaction Problem</span> is <span>W</span>[1]-hard. To complement this result, we develop an <span>(varepsilon )</span>-additive approximation algorithm that runs in <span>(varepsilon ^{-r^2} cdot r^{{{,mathrm{mathcal {O}},}}(r^3)} cdot n^{{{,mathrm{mathcal {O}},}}(1)})</span> time for the rank <i>r</i> of an input matrix, provided that the diagonal entries are bounded.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"1731 - 1763"},"PeriodicalIF":0.9,"publicationDate":"2024-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-023-01205-0.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139678586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploration of High-Dimensional Grids by Finite State Machines 用有限状态机探索高维网格
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-01-29 DOI: 10.1007/s00453-024-01207-6
Stefan Dobrev, Lata Narayanan, Jaroslav Opatrny, Denis Pankratov

We consider the problem of finding a “treasure” at an unknown point of an n-dimensional infinite grid, (nge 3), by initially collocated finite automaton (FA) agents. Recently, the problem has been well characterized for 2 dimensions for deterministic as well as randomized FA agents, both in synchronous and semi-synchronous models (Brandt et al. in Proceedings of 32nd International Symposium on Distributed Computing (DISC) LIPCS 121:13:1–13:17, 2018; Emek et al. in Theor Comput Sci 608:255–267, 2015). It has been conjectured that (n+1) randomized FA agents are necessary to solve this problem in the n-dimensional grid (Cohen et al. in Proceedings of the 28th SODA, SODA ’17, pp 207–224, 2017). In this paper we disprove the conjecture in a strong sense: we show that three randomized synchronous FA agents suffice to explore an n-dimensional grid for any n. Our algorithm is optimal in terms of the number of the agents. Our key insight is that a constant number of FA agents can, by their positions and movements, implement a stack, which can store the path being explored. We also show how to implement our algorithm using: four randomized semi-synchronous FA agents; four deterministic synchronous FA agents; or five deterministic semi-synchronous FA agents. We give a different, no-stack algorithm that uses 4 deterministic semi-synchronous FA agents for the 3-dimensional grid. This is provably optimal in the number of agents and the exploration cost, and surprisingly, matches the result for 2 dimensions. For (nge 4), the time complexity of the stack-based algorithms mentioned above is exponential in distance D of the treasure from the starting point of the agents. We show that in the deterministic case, one additional finite automaton agent brings the time down to a polynomial. We also show that any algorithm using 3 synchronous deterministic FA agents in 3 dimensions must travel beyond (Omega (D^{3/2})) from the origin. Finally, we show that all the above algorithms can be generalized to unoriented grids. More specifically, six deterministic semi-synchronous FA agents are sufficient to locate the treasure in an unoriented n-dimensional grid.

摘要 我们考虑的问题是在一个 n 维的无限网格中,通过最初的有限自动机(FA)代理在一个未知点找到一个 "宝藏"。最近,对于确定性以及随机化的 FA 代理,该问题在同步和半同步模型中的两个维度都得到了很好的描述(Brandt 等人,发表于第 32 届分布式计算国际研讨会论文集(DISC)LIPCS 121:13:1-13:17, 2018;Emek 等人,发表于 Theor Comput Sci 608:255-267, 2015)。有人猜想,要在 n 维网格中解决这个问题,必须要有(n+1) 个随机 FA 代理(Cohen 等人,载于第 28 届 SODA 会议论文集,SODA '17, 第 207-224 页,2017 年)。在本文中,我们从强意义上反证了这一猜想:我们证明,对于任意 n,三个随机同步 FA 代理足以探索 n 维网格。我们的主要见解是,恒定数量的 FA 代理可以通过其位置和移动实现堆栈,从而存储正在探索的路径。我们还展示了如何使用以下方法实现我们的算法:四个随机半同步 FA 代理;四个确定性同步 FA 代理;或五个确定性半同步 FA 代理。我们给出了一种不同的无堆栈算法,即在三维网格中使用 4 个确定性半同步 FA 代理。这种算法在代理数量和探索成本上都是最优的,而且令人惊讶的是,它与二维网格的结果相吻合。对于 (nge 4) ,上述基于堆栈的算法的时间复杂度是宝藏与代理起点距离 D 的指数。我们证明,在确定性情况下,多一个有限自动机代理就能把时间降到多项式。我们还证明,任何在 3 维空间中使用 3 个同步确定性有限自动机代理的算法都必须从原点出发超过 (Omega (D^{3/2}))。最后,我们证明上述所有算法都可以推广到无定向网格。更具体地说,六个确定性半同步 FA 代理足以在无方向的 n 维网格中找到宝藏。
{"title":"Exploration of High-Dimensional Grids by Finite State Machines","authors":"Stefan Dobrev,&nbsp;Lata Narayanan,&nbsp;Jaroslav Opatrny,&nbsp;Denis Pankratov","doi":"10.1007/s00453-024-01207-6","DOIUrl":"10.1007/s00453-024-01207-6","url":null,"abstract":"<div><p>We consider the problem of finding a “treasure” at an unknown point of an <i>n</i>-dimensional infinite grid, <span>(nge 3)</span>, by initially collocated finite automaton (FA) agents. Recently, the problem has been well characterized for 2 dimensions for deterministic as well as randomized FA agents, both in synchronous and semi-synchronous models (Brandt et al. in Proceedings of 32nd International Symposium on Distributed Computing (DISC) LIPCS 121:13:1–13:17, 2018; Emek et al. in Theor Comput Sci 608:255–267, 2015). It has been conjectured that <span>(n+1)</span> randomized FA agents are necessary to solve this problem in the <i>n</i>-dimensional grid (Cohen et al. in Proceedings of the 28th SODA, SODA ’17, pp 207–224, 2017). In this paper we disprove the conjecture in a strong sense: we show that <i>three</i> randomized synchronous FA agents suffice to explore an <i>n</i>-dimensional grid for <i>any</i> <i>n</i>. Our algorithm is optimal in terms of the number of the agents. Our key insight is that a constant number of FA agents can, by their positions and movements, implement a stack, which can store the path being explored. We also show how to implement our algorithm using: four randomized semi-synchronous FA agents; four deterministic synchronous FA agents; or five deterministic semi-synchronous FA agents. We give a different, no-stack algorithm that uses 4 deterministic semi-synchronous FA agents for the 3-dimensional grid. This is provably optimal in the number of agents and the exploration cost, and surprisingly, matches the result for 2 dimensions. For <span>(nge 4)</span>, the time complexity of the stack-based algorithms mentioned above is exponential in distance <i>D</i> of the treasure from the starting point of the agents. We show that in the deterministic case, one additional finite automaton agent brings the time down to a polynomial. We also show that any algorithm using 3 synchronous deterministic FA agents in 3 dimensions must travel beyond <span>(Omega (D^{3/2}))</span> from the origin. Finally, we show that all the above algorithms can be generalized to unoriented grids. More specifically, six deterministic semi-synchronous FA agents are sufficient to locate the treasure in an unoriented <i>n</i>-dimensional grid.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 5","pages":"1700 - 1729"},"PeriodicalIF":0.9,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139589836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved FPT Algorithms for Deletion to Forest-Like Structures 改进的森林类结构删除 FPT 算法
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-01-27 DOI: 10.1007/s00453-023-01206-z
Kishen N. Gowda, Aditya Lonkar, Fahad Panolan, Vraj Patel, Saket Saurabh

The Feedback Vertex Set problem is undoubtedly one of the most well-studied problems in Parameterized Complexity. In this problem, given an undirected graph G and a non-negative integer k, the objective is to test whether there exists a subset (Ssubseteq V(G)) of size at most k such that (G-S) is a forest. After a long line of improvement, recently, Li and Nederlof [TALG, 2022] designed a randomized algorithm for the problem running in time ({mathcal {O}}^{star }(2.7^k)^{*}). In the Parameterized Complexity literature, several problems around Feedback Vertex Set have been studied. Some of these include Independent Feedback Vertex Set (where the set S should be an independent set in G), Almost Forest Deletion and Pseudoforest Deletion. In Pseudoforest Deletion, each connected component in (G-S) has at most one cycle in it. However, in Almost Forest Deletion, the input is a graph G and non-negative integers (k,ell in {{mathbb {N}}}), and the objective is to test whether there exists a vertex subset S of size at most k, such that (G-S) is (ell ) edges away from a forest. In this paper, using the methodology of Li and Nederlof [TALG, 2022], we obtain the current fastest algorithms for all these problems. In particular we obtain the following randomized algorithms.

  1. 1.

    Independent Feedback Vertex Set can be solved in time ({mathcal {O}}^{star }(2.7^k)).

  2. 2.

    Pseudo Forest Deletion can be solved in time ({mathcal {O}}^{star }(2.85^k)).

  3. 3.

    Almost Forest Deletion can be solved in time ({mathcal {O}}^{star }(min {2.85^k cdot 8.54^ell ,2.7^k cdot 36.61^ell ,3^k cdot 1.78^ell })).

反馈顶点集问题无疑是参数化复杂性中研究最深入的问题之一。在这个问题中,给定一个无向图 G 和一个非负整数 k,目标是测试是否存在一个大小至多为 k 的子集 (Ssubseteq V(G)) ,使得 (G-S) 是一个森林。经过长期的改进,最近,Li 和 Nederlof [TALG, 2022] 为这个问题设计了一种随机算法,运行时间为 ({mathcal {O}}^{star }(2.7^k)^{*}).在参数化复杂性文献中,围绕反馈顶点集研究了几个问题。其中包括独立反馈顶点集合(集合 S 应该是 G 中的一个独立集合)、几乎森林删除和伪森林删除。在 "伪森林删除"(Pseudoforest Deletion)中,G-S(G-S(G))中的每个连通分量中最多有一个循环。然而,在几乎森林删除(Almost Forest Deletion)中,输入是一个图 G 和非负整数 (k,ellin{{mathbb {N}}) ,目标是测试是否存在一个大小为至多 k 的顶点子集 S,使得 (G-S) 离森林有 (ell) 条边。本文使用 Li 和 Nederlof [TALG, 2022] 的方法,获得了所有这些问题的当前最快算法。具体来说,我们得到了以下随机算法。1.Independent Feedback Vertex Set 可以在 ({mathcal {O}}^{star }(2.7^k)).2.Pseudo Forest Deletion 可以在 ({mathcal {O}}^{star }(2. 85^k)).3.3.Almost Forest Deletion can be solved in time({mathcal {O}}^{star }(min {2.85^k cdot 8.54^ell ,2.7^k cdot 36.61^ell ,3^k cdot 1.78^ell })).
{"title":"Improved FPT Algorithms for Deletion to Forest-Like Structures","authors":"Kishen N. Gowda,&nbsp;Aditya Lonkar,&nbsp;Fahad Panolan,&nbsp;Vraj Patel,&nbsp;Saket Saurabh","doi":"10.1007/s00453-023-01206-z","DOIUrl":"10.1007/s00453-023-01206-z","url":null,"abstract":"<div><p>The <span>Feedback Vertex Set</span> problem is undoubtedly one of the most well-studied problems in Parameterized Complexity. In this problem, given an undirected graph <i>G</i> and a non-negative integer <i>k</i>, the objective is to test whether there exists a subset <span>(Ssubseteq V(G))</span> of size at most <i>k</i> such that <span>(G-S)</span> is a forest. After a long line of improvement, recently, Li and Nederlof [TALG, 2022] designed a randomized algorithm for the problem running in time <span>({mathcal {O}}^{star }(2.7^k)^{*})</span>. In the Parameterized Complexity literature, several problems around <span>Feedback Vertex Set</span> have been studied. \u0000Some of these include <span>Independent Feedback Vertex Set</span> (where the set <i>S</i> should be an independent set in <i>G</i>), <span>Almost Forest Deletion</span> and <span>Pseudoforest Deletion</span>. In <span>Pseudoforest Deletion</span>, each connected component in <span>(G-S)</span> has at most one cycle in it. However, in <span>Almost Forest Deletion</span>, the input is a graph <i>G</i> and non-negative integers <span>(k,ell in {{mathbb {N}}})</span>, and the objective is to test whether there exists a vertex subset <i>S</i> of size at most <i>k</i>, such that <span>(G-S)</span> is <span>(ell )</span> edges away from a forest. In this paper, using the methodology of Li and Nederlof [TALG, 2022], we obtain the current fastest algorithms for all these problems. In particular we obtain the following randomized algorithms. </p><ol>\u0000 <li>\u0000 <span>1.</span>\u0000 \u0000 <p><span>Independent Feedback Vertex Set</span> can be solved in time <span>({mathcal {O}}^{star }(2.7^k))</span>.</p>\u0000 \u0000 </li>\u0000 <li>\u0000 <span>2.</span>\u0000 \u0000 <p><span>Pseudo Forest Deletion</span> can be solved in time <span>({mathcal {O}}^{star }(2.85^k))</span>.</p>\u0000 \u0000 </li>\u0000 <li>\u0000 <span>3.</span>\u0000 \u0000 <p><span>Almost Forest Deletion</span> can be solved in time <span>({mathcal {O}}^{star }(min {2.85^k cdot 8.54^ell ,2.7^k cdot 36.61^ell ,3^k cdot 1.78^ell }))</span>.</p>\u0000 \u0000 </li>\u0000 </ol></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 5","pages":"1657 - 1699"},"PeriodicalIF":0.9,"publicationDate":"2024-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139589721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Algorithm for All-Pairs Bounded Edge Connectivity 全对有界边缘连接的高效算法
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-01-22 DOI: 10.1007/s00453-023-01203-2
Shyan Akmal, Ce Jin
<div><p>Our work concerns algorithms for a variant of <span>Maximum Flow</span> in unweighted graphs. In the <span>All-Pairs Connectivity (APC)</span> problem, we are given a graph <i>G</i> on <i>n</i> vertices and <i>m</i> edges, and are tasked with computing the maximum number of edge-disjoint paths from <i>s</i> to <i>t</i> (equivalently, the size of a minimum (<i>s</i>, <i>t</i>)-cut) in <i>G</i>, for all pairs of vertices (<i>s</i>, <i>t</i>). Significant algorithmic breakthroughs have recently shown that over undirected graphs, <span>APC</span> can be solved in <span>(n^{2+o(1)})</span> time, which is essentially optimal. In contrast, the true time complexity of <span>APC</span> over directed graphs remains open: this problem can be solved in <span>({tilde{O}}(m^omega ))</span> time, where <span>(omega in [2, 2.373))</span> is the exponent of matrix multiplication, but no matching conditional lower bound is known. Following [Abboud et al. In: 46th International colloquium on automata, languages, and programming, ICALP 2019, July 9-12, 2019, Patras, Greece, Schloss Dagstuhl-Leibniz-Zentrum für Informatik, 2019], we study a bounded version of <span>({{textsf {APC}}})</span> called the <i>k</i>-<span>Bounded All Pairs Connectivity</span> (<i>k</i>-<span>APC)</span> problem. In this variant of <span>APC</span>, we are given an integer <i>k</i> in addition to the graph <i>G</i>, and are now tasked with reporting the size of a minimum (<i>s</i>, <i>t</i>)-cut only for pairs (<i>s</i>, <i>t</i>) of vertices with min-cut value less than <i>k</i> (if the minimum (<i>s</i>, <i>t</i>)-cut has size at least <i>k</i>, we can just report it is “large” instead of computing the exact value). Our main result is an <span>({tilde{O}}((kn)^omega ))</span> time algorithm solving <i>k</i>-<span>APC</span> in directed graphs. This is the first algorithm which solves <i>k</i>-<span>APC</span> faster than simply solving the more general <span>APC</span> problem exactly, for all <span>(kge 3)</span>. This runtime is <span>({{tilde{O}}}(n^omega ))</span> for all <span>(kle {{,textrm{poly},}}(log n))</span>, which essentially matches the optimal runtime for the <span>(k=1)</span> case of <i>k</i>-<span>APC</span>, under popular conjectures from fine-grained complexity. Previously, this runtime was only achieved for <span>(kle 2)</span> in general directed graphs [Georgiadis et al. In: 44th international colloquium on automata, languages, and programming (ICALP 2017), volume 80 of Leibniz International Proceedings in Informatics (LIPIcs), Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, 2017], and for <span>(kle o(sqrt{log n}))</span> in the special case of directed acyclic graphs [Abboud et al. In: 46th international colloquium on automata, languages, and programming, ICALP 2019, July 9–12, 2019, Patras, Greece, Schloss Dagstuhl-Leibniz-Zentrum für Informatik, 2019]. Our result employs the same algebraic framework used in previous work, introduced by [Cheung et al. I
我们的研究涉及无权重图中最大流量(Maximum Flow)变体的算法。在全对连接(APC)问题中,我们给定了一个有 n 个顶点和 m 条边的图 G,任务是计算 G 中所有顶点对(s, t)从 s 到 t 的最大边交叉路径数(等价于最小(s, t)切口的大小)。最近的重大算法突破表明,在无向图上,APC 可以在 (n^{2+o(1)}) 时间内求解,这基本上是最优的。相比之下,有向图上 APC 的真正时间复杂度仍是未知数:这个问题可以在 ({tilde{O}}(m^omega )) 时间内解决,其中 (omega in [2, 2.373))是矩阵乘法的指数,但目前还不知道匹配的条件下限。继 [Abboud et al. In: 46th International colloquium on automata, languages, and programming, ICALP 2019, July 9-12, 2019, Patras, Greece, Schloss Dagstuhl-Leibniz-Zentrum für Informatik, 2019] 之后,我们研究了 ({{textsf {APC}}) 的有界版本,称为 k-Bounded All Pairs Connectivity (k-APC) 问题。在 APC 的这一变体中,除了图 G 之外,我们还得到了一个整数 k,现在的任务是只报告最小切割值小于 k 的顶点对 (s, t) 的最小 (s, t) 切割的大小(如果最小 (s, t) 切割的大小至少为 k,我们可以只报告它 "很大",而不用计算精确值)。我们的主要成果是一种解决有向图中 k-APC 的({tilde{O}}((kn)^omega ))时间算法。这是第一种算法,对于所有(kge 3 ),它解决 k-APC 的速度比精确解决更一般的 APC 问题更快。对于所有 kle {{,textrm{poly},}}(log n)),这个运行时间是 ({{tilde{O}}}(n^omega )),这基本上与k-APC的(k=1)情况下的最优运行时间相匹配,符合细粒度复杂性的流行猜想。在此之前,只有在一般有向图中的(kle 2) 情况下才能达到这个运行时间[Georgiadis et al.In: 44th international colloquium on automata, languages, and programming (ICALP 2017), volume 80 of Leibniz International Proceedings in Informatics (LIPIcs), Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, 2017], and for (kle o(sqrt{/log n})) in the special case of directed acyclic graphs [Abboud et al.In: 46th international colloquium on automata, languages, and programming, ICALP 2019, July 9-12, 2019, Patras, Greece, Schloss Dagstuhl-Leibniz-Zentrum für Informatik, 2019]。我们的结果采用了之前工作中使用的代数框架,该框架由 [Cheung et al. In: FOCS, 2011] 引入。这一框架的直接实现涉及到一个大型随机矩阵的反演。我们的新算法基于这样的见解,即要解决 k-APC 问题,只需反演一个低阶随机矩阵,而不是一般的随机矩阵。我们还获得了 k-APC 的一个变体--k-Bounded All-Pairs Vertex Connectivity(k-APVC)问题的新算法,现在我们的任务是为每一对顶点(s, t)报告从 s 到 t 的内部顶点相交(而非边缘相交)路径的最大数目,如果这个数目小于 k,则报告从 s 到 t 至少有 k 条内部顶点相交路径。我们的第二个成果是一种解决有向图中 k-APVC 的({tilde{O}}(k^2n^omega ))时间算法。之前的工作展示了如何在 ({{tilde{O}}((kn)^omega )) time 内解决一个更简单版本的 k-APVC 问题(其中只需要为图中不是边的顶点对(s, t)返回答案)[Abboud 等人,In: 46th International colloquium on automata, languages, and programming, ICALP 2019, July 9-12, 2019, Patras, Greece, Schloss Dagstuhl-Leibniz-Zentrum für Informatik, 2019]。相比之下,我们的算法可以解决完整的 k-APVC 问题,并且在 (omega > 2) 的情况下速度更快。
{"title":"An Efficient Algorithm for All-Pairs Bounded Edge Connectivity","authors":"Shyan Akmal,&nbsp;Ce Jin","doi":"10.1007/s00453-023-01203-2","DOIUrl":"10.1007/s00453-023-01203-2","url":null,"abstract":"&lt;div&gt;&lt;p&gt;Our work concerns algorithms for a variant of &lt;span&gt;Maximum Flow&lt;/span&gt; in unweighted graphs. In the &lt;span&gt;All-Pairs Connectivity (APC)&lt;/span&gt; problem, we are given a graph &lt;i&gt;G&lt;/i&gt; on &lt;i&gt;n&lt;/i&gt; vertices and &lt;i&gt;m&lt;/i&gt; edges, and are tasked with computing the maximum number of edge-disjoint paths from &lt;i&gt;s&lt;/i&gt; to &lt;i&gt;t&lt;/i&gt; (equivalently, the size of a minimum (&lt;i&gt;s&lt;/i&gt;, &lt;i&gt;t&lt;/i&gt;)-cut) in &lt;i&gt;G&lt;/i&gt;, for all pairs of vertices (&lt;i&gt;s&lt;/i&gt;, &lt;i&gt;t&lt;/i&gt;). Significant algorithmic breakthroughs have recently shown that over undirected graphs, &lt;span&gt;APC&lt;/span&gt; can be solved in &lt;span&gt;(n^{2+o(1)})&lt;/span&gt; time, which is essentially optimal. In contrast, the true time complexity of &lt;span&gt;APC&lt;/span&gt; over directed graphs remains open: this problem can be solved in &lt;span&gt;({tilde{O}}(m^omega ))&lt;/span&gt; time, where &lt;span&gt;(omega in [2, 2.373))&lt;/span&gt; is the exponent of matrix multiplication, but no matching conditional lower bound is known. Following [Abboud et al. In: 46th International colloquium on automata, languages, and programming, ICALP 2019, July 9-12, 2019, Patras, Greece, Schloss Dagstuhl-Leibniz-Zentrum für Informatik, 2019], we study a bounded version of &lt;span&gt;({{textsf {APC}}})&lt;/span&gt; called the &lt;i&gt;k&lt;/i&gt;-&lt;span&gt;Bounded All Pairs Connectivity&lt;/span&gt; (&lt;i&gt;k&lt;/i&gt;-&lt;span&gt;APC)&lt;/span&gt; problem. In this variant of &lt;span&gt;APC&lt;/span&gt;, we are given an integer &lt;i&gt;k&lt;/i&gt; in addition to the graph &lt;i&gt;G&lt;/i&gt;, and are now tasked with reporting the size of a minimum (&lt;i&gt;s&lt;/i&gt;, &lt;i&gt;t&lt;/i&gt;)-cut only for pairs (&lt;i&gt;s&lt;/i&gt;, &lt;i&gt;t&lt;/i&gt;) of vertices with min-cut value less than &lt;i&gt;k&lt;/i&gt; (if the minimum (&lt;i&gt;s&lt;/i&gt;, &lt;i&gt;t&lt;/i&gt;)-cut has size at least &lt;i&gt;k&lt;/i&gt;, we can just report it is “large” instead of computing the exact value). Our main result is an &lt;span&gt;({tilde{O}}((kn)^omega ))&lt;/span&gt; time algorithm solving &lt;i&gt;k&lt;/i&gt;-&lt;span&gt;APC&lt;/span&gt; in directed graphs. This is the first algorithm which solves &lt;i&gt;k&lt;/i&gt;-&lt;span&gt;APC&lt;/span&gt; faster than simply solving the more general &lt;span&gt;APC&lt;/span&gt; problem exactly, for all &lt;span&gt;(kge 3)&lt;/span&gt;. This runtime is &lt;span&gt;({{tilde{O}}}(n^omega ))&lt;/span&gt; for all &lt;span&gt;(kle {{,textrm{poly},}}(log n))&lt;/span&gt;, which essentially matches the optimal runtime for the &lt;span&gt;(k=1)&lt;/span&gt; case of &lt;i&gt;k&lt;/i&gt;-&lt;span&gt;APC&lt;/span&gt;, under popular conjectures from fine-grained complexity. Previously, this runtime was only achieved for &lt;span&gt;(kle 2)&lt;/span&gt; in general directed graphs [Georgiadis et al. In: 44th international colloquium on automata, languages, and programming (ICALP 2017), volume 80 of Leibniz International Proceedings in Informatics (LIPIcs), Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, 2017], and for &lt;span&gt;(kle o(sqrt{log n}))&lt;/span&gt; in the special case of directed acyclic graphs [Abboud et al. In: 46th international colloquium on automata, languages, and programming, ICALP 2019, July 9–12, 2019, Patras, Greece, Schloss Dagstuhl-Leibniz-Zentrum für Informatik, 2019]. Our result employs the same algebraic framework used in previous work, introduced by [Cheung et al. I","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 5","pages":"1623 - 1656"},"PeriodicalIF":0.9,"publicationDate":"2024-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-023-01203-2.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139554992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Truthful Matching with Online Items and Offline Agents 在线项目和离线代理的真实匹配
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-01-16 DOI: 10.1007/s00453-023-01202-3
Michal Feldman, Federico Fusco, Stefano Leonardi, Simon Mauras, Rebecca Reiffenhäuser

We study truthful mechanisms for welfare maximization in online bipartite matching. In our (multi-parameter) setting, every buyer is associated with a (possibly private) desired set of items, and has a private value for being assigned an item in her desired set. Unlike most online matching settings, where agents arrive online, in our setting the items arrive one by one in an adversarial order while the buyers are present for the entire duration of the process. This poses a significant challenge to the design of truthful mechanisms, due to the ability of buyers to strategize over future rounds. We provide an almost full picture of the competitive ratios in different scenarios, including myopic vs. non-myopic agents, tardy vs. prompt payments, and private vs. public desired sets. Among other results, we identify the frontier up to which the celebrated (e/(e-1)) competitive ratio for the vertex-weighted online matching of Karp, Vazirani and Vazirani extends to truthful agents and online items.

我们研究在线双向匹配中福利最大化的真实机制。在我们的(多参数)设置中,每个买方都与一组(可能是私人的)所需物品相关联,并且对被分配到其所需物品中的物品具有私人价值。与大多数在线匹配设置(代理在线到达)不同的是,在我们的设置中,物品按对抗顺序逐一到达,而买家在整个过程中都在场。由于买方有能力在未来几轮中制定策略,这对设计真实机制提出了巨大挑战。我们提供了不同情况下竞争比率的几乎全貌,包括近视代理与非近视代理、延迟付款与及时付款,以及私人期望集与公共期望集。在其他结果中,我们确定了卡普、瓦齐拉尼和瓦齐拉尼的顶点加权在线匹配的著名竞争比率(e/(e-1))扩展到真实代理和在线项目的边界。
{"title":"Truthful Matching with Online Items and Offline Agents","authors":"Michal Feldman,&nbsp;Federico Fusco,&nbsp;Stefano Leonardi,&nbsp;Simon Mauras,&nbsp;Rebecca Reiffenhäuser","doi":"10.1007/s00453-023-01202-3","DOIUrl":"10.1007/s00453-023-01202-3","url":null,"abstract":"<div><p>We study truthful mechanisms for welfare maximization in online bipartite matching. In our (multi-parameter) setting, every buyer is associated with a (possibly private) desired set of items, and has a private value for being assigned an item in her desired set. Unlike most online matching settings, where agents arrive online, in our setting the items arrive one by one in an adversarial order while the buyers are present for the entire duration of the process. This poses a significant challenge to the design of truthful mechanisms, due to the ability of buyers to strategize over future rounds. We provide an almost full picture of the competitive ratios in different scenarios, including myopic vs. non-myopic agents, tardy vs. prompt payments, and private vs. public desired sets. Among other results, we identify the frontier up to which the celebrated <span>(e/(e-1))</span> competitive ratio for the vertex-weighted online matching of Karp, Vazirani and Vazirani extends to truthful agents and online items.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 5","pages":"1600 - 1622"},"PeriodicalIF":0.9,"publicationDate":"2024-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-023-01202-3.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139482572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Algorithmica
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1