首页 > 最新文献

Algorithmica最新文献

英文 中文
On the Parameterized Intractability of Determinant Maximization 论确定性最大化的参数化难解性
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-02-03 DOI: 10.1007/s00453-023-01205-0
Naoto Ohsaka

In the Determinant Maximization problem, given an (n times n) positive semi-definite matrix ({textbf {A}} ) in (mathbb {Q}^{n times n}) and an integer k, we are required to find a (k times k) principal submatrix of ({textbf {A}} ) having the maximum determinant. This problem is known to be NP-hard and further proven to be W[1]-hard with respect to k by Koutis (Inf Process Lett 100:8–13, 2006); i.e., a (f(k)n^{{{,mathrm{mathcal {O}},}}(1)})-time algorithm is unlikely to exist for any computable function f. However, there is still room to explore its parameterized complexity in the restricted case, in the hope of overcoming the general-case parameterized intractability. In this study, we rule out the fixed-parameter tractability of Determinant Maximization even if an input matrix is extremely sparse or low rank, or an approximate solution is acceptable. We first prove that Determinant Maximization is NP-hard and W[1]-hard even if an input matrix is an arrowhead matrix; i.e., the underlying graph formed by nonzero entries is a star, implying that the structural sparsity is not helpful. By contrast, Determinant Maximization is known to be solvable in polynomial time on tridiagonal matrices (Al-Thani and Lee, in: LAGOS, 2021). Thereafter, we demonstrate the W[1]-hardness with respect to the rank r of an input matrix. Our result is stronger than Koutis’ result in the sense that any (k times k) principal submatrix is singular whenever (k > r). We finally give evidence that it is W[1]-hard to approximate Determinant Maximization parameterized by k within a factor of (2^{-csqrt{k}}) for some universal constant (c > 0). Our hardness result is conditional on the Parameterized Inapproximability Hypothesis posed by Lokshtanov et al. (in: SODA, 2020), which asserts that a gap version of Binary Constraint Satisfaction Problem is W[1]-hard. To complement this result, we develop an (varepsilon )-additive approximation algorithm that runs in (varepsilon ^{-r^2} cdot r^{{{,mathrm{mathcal {O}},}}(r^3)} cdot n^{{{,mathrm{mathcal {O}},}}(1)}) time for the rank r of an input matrix, provided that the diagonal entries are bounded.

摘要 在行列式最大化问题中,给定一个在(mathbb {Q}^{n times n})中的正半有限矩阵({textbf {A}} )和一个整数k,我们需要找到一个具有最大行列式的({textbf {A}} )的(k times k) 主子矩阵。众所周知,这个问题是 NP-困难的,Koutis(Inf Process Lett 100:8-13, 2006)进一步证明了这个问题对于 k 来说是 W[1]-hard 的;也就是说,一个 (f(k)n^{{{,mathrm{mathcal {O}},}}(1)})-然而,我们仍有余地探索其在受限情况下的参数化复杂性,希望能克服一般情况下的参数化难解性。在本研究中,即使输入矩阵极其稀疏或秩很低,或者近似解是可以接受的,我们也会排除判定式最大化的固定参数可计算性。我们首先证明,即使输入矩阵是箭头矩阵(即由非零条目形成的底层图是星形的,这意味着结构稀疏性没有帮助),确定性最大化也是 NP-困难和 W[1]- 困难的。相比之下,已知确定性最大化可以在多项式时间内求解三对角矩阵(Al-Thani and Lee, in: LAGOS, 2021)。此后,我们证明了输入矩阵秩 r 的 W[1] 难度。我们的结果比库提斯的结果更强,因为任何 (k times k) 主子矩阵在 (k > r) 时都是奇异的。最后,我们给出证据证明,对于某个通用常数 (c > 0) 而言,在 (2^{-csqrt{k}}) 的范围内,以 k 为参数的确定性最大化近似是 W[1]-hard 的。我们的硬度结果是以 Lokshtanov 等人提出的参数化不可逼近假说(in: SODA, 2020)为条件的,该假说断言二元约束满足问题的缺口版本是 W[1]-hard 的。为了补充这一结果,我们开发了一种在 (varepsilon ^{-r^2} 内运行的 (varepsilon ^{-r^2}) -附加逼近算法。cdot r^{{{,mathrm{mathcal {O}},}}(r^3)} cdot n^{{{,mathrm{mathcal {O}},}}(1)}) time for the rank r of an input matrix, provided that the diagonal entries are bounded.
{"title":"On the Parameterized Intractability of Determinant Maximization","authors":"Naoto Ohsaka","doi":"10.1007/s00453-023-01205-0","DOIUrl":"10.1007/s00453-023-01205-0","url":null,"abstract":"<div><p>In the <span>Determinant Maximization</span> problem, given an <span>(n times n)</span> positive semi-definite matrix <span>({textbf {A}} )</span> in <span>(mathbb {Q}^{n times n})</span> and an integer <i>k</i>, we are required to find a <span>(k times k)</span> principal submatrix of <span>({textbf {A}} )</span> having the maximum determinant. This problem is known to be <span>NP</span>-hard and further proven to be <span>W</span>[1]-hard with respect to <i>k</i> by Koutis (Inf Process Lett 100:8–13, 2006); i.e., a <span>(f(k)n^{{{,mathrm{mathcal {O}},}}(1)})</span>-time algorithm is unlikely to exist for any computable function <i>f</i>. However, there is still room to explore its parameterized complexity in the <i>restricted case</i>, in the hope of overcoming the general-case parameterized intractability. In this study, we rule out the fixed-parameter tractability of <span>Determinant Maximization</span> even if an input matrix is extremely sparse or low rank, or an approximate solution is acceptable. We first prove that <span>Determinant Maximization</span> is <span>NP</span>-hard and <span>W</span>[1]-hard even if an input matrix is an <i>arrowhead matrix</i>; i.e., the underlying graph formed by nonzero entries is a star, implying that the structural sparsity is not helpful. By contrast, <span>Determinant Maximization</span> is known to be solvable in polynomial time on <i>tridiagonal matrices</i> (Al-Thani and Lee, in: LAGOS, 2021). Thereafter, we demonstrate the <span>W</span>[1]-hardness with respect to the <i>rank</i> <i>r</i> of an input matrix. Our result is stronger than Koutis’ result in the sense that any <span>(k times k)</span> principal submatrix is singular whenever <span>(k &gt; r)</span>. We finally give evidence that it is <span>W</span>[1]-hard to approximate <span>Determinant Maximization</span> parameterized by <i>k</i> within a factor of <span>(2^{-csqrt{k}})</span> for some universal constant <span>(c &gt; 0)</span>. Our hardness result is conditional on the <i>Parameterized Inapproximability Hypothesis</i> posed by Lokshtanov et al. (in: SODA, 2020), which asserts that a gap version of <span>Binary Constraint Satisfaction Problem</span> is <span>W</span>[1]-hard. To complement this result, we develop an <span>(varepsilon )</span>-additive approximation algorithm that runs in <span>(varepsilon ^{-r^2} cdot r^{{{,mathrm{mathcal {O}},}}(r^3)} cdot n^{{{,mathrm{mathcal {O}},}}(1)})</span> time for the rank <i>r</i> of an input matrix, provided that the diagonal entries are bounded.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 6","pages":"1731 - 1763"},"PeriodicalIF":0.9,"publicationDate":"2024-02-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-023-01205-0.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139678586","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exploration of High-Dimensional Grids by Finite State Machines 用有限状态机探索高维网格
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-01-29 DOI: 10.1007/s00453-024-01207-6
Stefan Dobrev, Lata Narayanan, Jaroslav Opatrny, Denis Pankratov

We consider the problem of finding a “treasure” at an unknown point of an n-dimensional infinite grid, (nge 3), by initially collocated finite automaton (FA) agents. Recently, the problem has been well characterized for 2 dimensions for deterministic as well as randomized FA agents, both in synchronous and semi-synchronous models (Brandt et al. in Proceedings of 32nd International Symposium on Distributed Computing (DISC) LIPCS 121:13:1–13:17, 2018; Emek et al. in Theor Comput Sci 608:255–267, 2015). It has been conjectured that (n+1) randomized FA agents are necessary to solve this problem in the n-dimensional grid (Cohen et al. in Proceedings of the 28th SODA, SODA ’17, pp 207–224, 2017). In this paper we disprove the conjecture in a strong sense: we show that three randomized synchronous FA agents suffice to explore an n-dimensional grid for any n. Our algorithm is optimal in terms of the number of the agents. Our key insight is that a constant number of FA agents can, by their positions and movements, implement a stack, which can store the path being explored. We also show how to implement our algorithm using: four randomized semi-synchronous FA agents; four deterministic synchronous FA agents; or five deterministic semi-synchronous FA agents. We give a different, no-stack algorithm that uses 4 deterministic semi-synchronous FA agents for the 3-dimensional grid. This is provably optimal in the number of agents and the exploration cost, and surprisingly, matches the result for 2 dimensions. For (nge 4), the time complexity of the stack-based algorithms mentioned above is exponential in distance D of the treasure from the starting point of the agents. We show that in the deterministic case, one additional finite automaton agent brings the time down to a polynomial. We also show that any algorithm using 3 synchronous deterministic FA agents in 3 dimensions must travel beyond (Omega (D^{3/2})) from the origin. Finally, we show that all the above algorithms can be generalized to unoriented grids. More specifically, six deterministic semi-synchronous FA agents are sufficient to locate the treasure in an unoriented n-dimensional grid.

摘要 我们考虑的问题是在一个 n 维的无限网格中,通过最初的有限自动机(FA)代理在一个未知点找到一个 "宝藏"。最近,对于确定性以及随机化的 FA 代理,该问题在同步和半同步模型中的两个维度都得到了很好的描述(Brandt 等人,发表于第 32 届分布式计算国际研讨会论文集(DISC)LIPCS 121:13:1-13:17, 2018;Emek 等人,发表于 Theor Comput Sci 608:255-267, 2015)。有人猜想,要在 n 维网格中解决这个问题,必须要有(n+1) 个随机 FA 代理(Cohen 等人,载于第 28 届 SODA 会议论文集,SODA '17, 第 207-224 页,2017 年)。在本文中,我们从强意义上反证了这一猜想:我们证明,对于任意 n,三个随机同步 FA 代理足以探索 n 维网格。我们的主要见解是,恒定数量的 FA 代理可以通过其位置和移动实现堆栈,从而存储正在探索的路径。我们还展示了如何使用以下方法实现我们的算法:四个随机半同步 FA 代理;四个确定性同步 FA 代理;或五个确定性半同步 FA 代理。我们给出了一种不同的无堆栈算法,即在三维网格中使用 4 个确定性半同步 FA 代理。这种算法在代理数量和探索成本上都是最优的,而且令人惊讶的是,它与二维网格的结果相吻合。对于 (nge 4) ,上述基于堆栈的算法的时间复杂度是宝藏与代理起点距离 D 的指数。我们证明,在确定性情况下,多一个有限自动机代理就能把时间降到多项式。我们还证明,任何在 3 维空间中使用 3 个同步确定性有限自动机代理的算法都必须从原点出发超过 (Omega (D^{3/2}))。最后,我们证明上述所有算法都可以推广到无定向网格。更具体地说,六个确定性半同步 FA 代理足以在无方向的 n 维网格中找到宝藏。
{"title":"Exploration of High-Dimensional Grids by Finite State Machines","authors":"Stefan Dobrev,&nbsp;Lata Narayanan,&nbsp;Jaroslav Opatrny,&nbsp;Denis Pankratov","doi":"10.1007/s00453-024-01207-6","DOIUrl":"10.1007/s00453-024-01207-6","url":null,"abstract":"<div><p>We consider the problem of finding a “treasure” at an unknown point of an <i>n</i>-dimensional infinite grid, <span>(nge 3)</span>, by initially collocated finite automaton (FA) agents. Recently, the problem has been well characterized for 2 dimensions for deterministic as well as randomized FA agents, both in synchronous and semi-synchronous models (Brandt et al. in Proceedings of 32nd International Symposium on Distributed Computing (DISC) LIPCS 121:13:1–13:17, 2018; Emek et al. in Theor Comput Sci 608:255–267, 2015). It has been conjectured that <span>(n+1)</span> randomized FA agents are necessary to solve this problem in the <i>n</i>-dimensional grid (Cohen et al. in Proceedings of the 28th SODA, SODA ’17, pp 207–224, 2017). In this paper we disprove the conjecture in a strong sense: we show that <i>three</i> randomized synchronous FA agents suffice to explore an <i>n</i>-dimensional grid for <i>any</i> <i>n</i>. Our algorithm is optimal in terms of the number of the agents. Our key insight is that a constant number of FA agents can, by their positions and movements, implement a stack, which can store the path being explored. We also show how to implement our algorithm using: four randomized semi-synchronous FA agents; four deterministic synchronous FA agents; or five deterministic semi-synchronous FA agents. We give a different, no-stack algorithm that uses 4 deterministic semi-synchronous FA agents for the 3-dimensional grid. This is provably optimal in the number of agents and the exploration cost, and surprisingly, matches the result for 2 dimensions. For <span>(nge 4)</span>, the time complexity of the stack-based algorithms mentioned above is exponential in distance <i>D</i> of the treasure from the starting point of the agents. We show that in the deterministic case, one additional finite automaton agent brings the time down to a polynomial. We also show that any algorithm using 3 synchronous deterministic FA agents in 3 dimensions must travel beyond <span>(Omega (D^{3/2}))</span> from the origin. Finally, we show that all the above algorithms can be generalized to unoriented grids. More specifically, six deterministic semi-synchronous FA agents are sufficient to locate the treasure in an unoriented <i>n</i>-dimensional grid.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 5","pages":"1700 - 1729"},"PeriodicalIF":0.9,"publicationDate":"2024-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139589836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved FPT Algorithms for Deletion to Forest-Like Structures 改进的森林类结构删除 FPT 算法
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-01-27 DOI: 10.1007/s00453-023-01206-z
Kishen N. Gowda, Aditya Lonkar, Fahad Panolan, Vraj Patel, Saket Saurabh

The Feedback Vertex Set problem is undoubtedly one of the most well-studied problems in Parameterized Complexity. In this problem, given an undirected graph G and a non-negative integer k, the objective is to test whether there exists a subset (Ssubseteq V(G)) of size at most k such that (G-S) is a forest. After a long line of improvement, recently, Li and Nederlof [TALG, 2022] designed a randomized algorithm for the problem running in time ({mathcal {O}}^{star }(2.7^k)^{*}). In the Parameterized Complexity literature, several problems around Feedback Vertex Set have been studied. Some of these include Independent Feedback Vertex Set (where the set S should be an independent set in G), Almost Forest Deletion and Pseudoforest Deletion. In Pseudoforest Deletion, each connected component in (G-S) has at most one cycle in it. However, in Almost Forest Deletion, the input is a graph G and non-negative integers (k,ell in {{mathbb {N}}}), and the objective is to test whether there exists a vertex subset S of size at most k, such that (G-S) is (ell ) edges away from a forest. In this paper, using the methodology of Li and Nederlof [TALG, 2022], we obtain the current fastest algorithms for all these problems. In particular we obtain the following randomized algorithms.

  1. 1.

    Independent Feedback Vertex Set can be solved in time ({mathcal {O}}^{star }(2.7^k)).

  2. 2.

    Pseudo Forest Deletion can be solved in time ({mathcal {O}}^{star }(2.85^k)).

  3. 3.

    Almost Forest Deletion can be solved in time ({mathcal {O}}^{star }(min {2.85^k cdot 8.54^ell ,2.7^k cdot 36.61^ell ,3^k cdot 1.78^ell })).

反馈顶点集问题无疑是参数化复杂性中研究最深入的问题之一。在这个问题中,给定一个无向图 G 和一个非负整数 k,目标是测试是否存在一个大小至多为 k 的子集 (Ssubseteq V(G)) ,使得 (G-S) 是一个森林。经过长期的改进,最近,Li 和 Nederlof [TALG, 2022] 为这个问题设计了一种随机算法,运行时间为 ({mathcal {O}}^{star }(2.7^k)^{*}).在参数化复杂性文献中,围绕反馈顶点集研究了几个问题。其中包括独立反馈顶点集合(集合 S 应该是 G 中的一个独立集合)、几乎森林删除和伪森林删除。在 "伪森林删除"(Pseudoforest Deletion)中,G-S(G-S(G))中的每个连通分量中最多有一个循环。然而,在几乎森林删除(Almost Forest Deletion)中,输入是一个图 G 和非负整数 (k,ellin{{mathbb {N}}) ,目标是测试是否存在一个大小为至多 k 的顶点子集 S,使得 (G-S) 离森林有 (ell) 条边。本文使用 Li 和 Nederlof [TALG, 2022] 的方法,获得了所有这些问题的当前最快算法。具体来说,我们得到了以下随机算法。1.Independent Feedback Vertex Set 可以在 ({mathcal {O}}^{star }(2.7^k)).2.Pseudo Forest Deletion 可以在 ({mathcal {O}}^{star }(2. 85^k)).3.3.Almost Forest Deletion can be solved in time({mathcal {O}}^{star }(min {2.85^k cdot 8.54^ell ,2.7^k cdot 36.61^ell ,3^k cdot 1.78^ell })).
{"title":"Improved FPT Algorithms for Deletion to Forest-Like Structures","authors":"Kishen N. Gowda,&nbsp;Aditya Lonkar,&nbsp;Fahad Panolan,&nbsp;Vraj Patel,&nbsp;Saket Saurabh","doi":"10.1007/s00453-023-01206-z","DOIUrl":"10.1007/s00453-023-01206-z","url":null,"abstract":"<div><p>The <span>Feedback Vertex Set</span> problem is undoubtedly one of the most well-studied problems in Parameterized Complexity. In this problem, given an undirected graph <i>G</i> and a non-negative integer <i>k</i>, the objective is to test whether there exists a subset <span>(Ssubseteq V(G))</span> of size at most <i>k</i> such that <span>(G-S)</span> is a forest. After a long line of improvement, recently, Li and Nederlof [TALG, 2022] designed a randomized algorithm for the problem running in time <span>({mathcal {O}}^{star }(2.7^k)^{*})</span>. In the Parameterized Complexity literature, several problems around <span>Feedback Vertex Set</span> have been studied. \u0000Some of these include <span>Independent Feedback Vertex Set</span> (where the set <i>S</i> should be an independent set in <i>G</i>), <span>Almost Forest Deletion</span> and <span>Pseudoforest Deletion</span>. In <span>Pseudoforest Deletion</span>, each connected component in <span>(G-S)</span> has at most one cycle in it. However, in <span>Almost Forest Deletion</span>, the input is a graph <i>G</i> and non-negative integers <span>(k,ell in {{mathbb {N}}})</span>, and the objective is to test whether there exists a vertex subset <i>S</i> of size at most <i>k</i>, such that <span>(G-S)</span> is <span>(ell )</span> edges away from a forest. In this paper, using the methodology of Li and Nederlof [TALG, 2022], we obtain the current fastest algorithms for all these problems. In particular we obtain the following randomized algorithms. </p><ol>\u0000 <li>\u0000 <span>1.</span>\u0000 \u0000 <p><span>Independent Feedback Vertex Set</span> can be solved in time <span>({mathcal {O}}^{star }(2.7^k))</span>.</p>\u0000 \u0000 </li>\u0000 <li>\u0000 <span>2.</span>\u0000 \u0000 <p><span>Pseudo Forest Deletion</span> can be solved in time <span>({mathcal {O}}^{star }(2.85^k))</span>.</p>\u0000 \u0000 </li>\u0000 <li>\u0000 <span>3.</span>\u0000 \u0000 <p><span>Almost Forest Deletion</span> can be solved in time <span>({mathcal {O}}^{star }(min {2.85^k cdot 8.54^ell ,2.7^k cdot 36.61^ell ,3^k cdot 1.78^ell }))</span>.</p>\u0000 \u0000 </li>\u0000 </ol></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 5","pages":"1657 - 1699"},"PeriodicalIF":0.9,"publicationDate":"2024-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139589721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Efficient Algorithm for All-Pairs Bounded Edge Connectivity 全对有界边缘连接的高效算法
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-01-22 DOI: 10.1007/s00453-023-01203-2
Shyan Akmal, Ce Jin
<div><p>Our work concerns algorithms for a variant of <span>Maximum Flow</span> in unweighted graphs. In the <span>All-Pairs Connectivity (APC)</span> problem, we are given a graph <i>G</i> on <i>n</i> vertices and <i>m</i> edges, and are tasked with computing the maximum number of edge-disjoint paths from <i>s</i> to <i>t</i> (equivalently, the size of a minimum (<i>s</i>, <i>t</i>)-cut) in <i>G</i>, for all pairs of vertices (<i>s</i>, <i>t</i>). Significant algorithmic breakthroughs have recently shown that over undirected graphs, <span>APC</span> can be solved in <span>(n^{2+o(1)})</span> time, which is essentially optimal. In contrast, the true time complexity of <span>APC</span> over directed graphs remains open: this problem can be solved in <span>({tilde{O}}(m^omega ))</span> time, where <span>(omega in [2, 2.373))</span> is the exponent of matrix multiplication, but no matching conditional lower bound is known. Following [Abboud et al. In: 46th International colloquium on automata, languages, and programming, ICALP 2019, July 9-12, 2019, Patras, Greece, Schloss Dagstuhl-Leibniz-Zentrum für Informatik, 2019], we study a bounded version of <span>({{textsf {APC}}})</span> called the <i>k</i>-<span>Bounded All Pairs Connectivity</span> (<i>k</i>-<span>APC)</span> problem. In this variant of <span>APC</span>, we are given an integer <i>k</i> in addition to the graph <i>G</i>, and are now tasked with reporting the size of a minimum (<i>s</i>, <i>t</i>)-cut only for pairs (<i>s</i>, <i>t</i>) of vertices with min-cut value less than <i>k</i> (if the minimum (<i>s</i>, <i>t</i>)-cut has size at least <i>k</i>, we can just report it is “large” instead of computing the exact value). Our main result is an <span>({tilde{O}}((kn)^omega ))</span> time algorithm solving <i>k</i>-<span>APC</span> in directed graphs. This is the first algorithm which solves <i>k</i>-<span>APC</span> faster than simply solving the more general <span>APC</span> problem exactly, for all <span>(kge 3)</span>. This runtime is <span>({{tilde{O}}}(n^omega ))</span> for all <span>(kle {{,textrm{poly},}}(log n))</span>, which essentially matches the optimal runtime for the <span>(k=1)</span> case of <i>k</i>-<span>APC</span>, under popular conjectures from fine-grained complexity. Previously, this runtime was only achieved for <span>(kle 2)</span> in general directed graphs [Georgiadis et al. In: 44th international colloquium on automata, languages, and programming (ICALP 2017), volume 80 of Leibniz International Proceedings in Informatics (LIPIcs), Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, 2017], and for <span>(kle o(sqrt{log n}))</span> in the special case of directed acyclic graphs [Abboud et al. In: 46th international colloquium on automata, languages, and programming, ICALP 2019, July 9–12, 2019, Patras, Greece, Schloss Dagstuhl-Leibniz-Zentrum für Informatik, 2019]. Our result employs the same algebraic framework used in previous work, introduced by [Cheung et al. I
我们的研究涉及无权重图中最大流量(Maximum Flow)变体的算法。在全对连接(APC)问题中,我们给定了一个有 n 个顶点和 m 条边的图 G,任务是计算 G 中所有顶点对(s, t)从 s 到 t 的最大边交叉路径数(等价于最小(s, t)切口的大小)。最近的重大算法突破表明,在无向图上,APC 可以在 (n^{2+o(1)}) 时间内求解,这基本上是最优的。相比之下,有向图上 APC 的真正时间复杂度仍是未知数:这个问题可以在 ({tilde{O}}(m^omega )) 时间内解决,其中 (omega in [2, 2.373))是矩阵乘法的指数,但目前还不知道匹配的条件下限。继 [Abboud et al. In: 46th International colloquium on automata, languages, and programming, ICALP 2019, July 9-12, 2019, Patras, Greece, Schloss Dagstuhl-Leibniz-Zentrum für Informatik, 2019] 之后,我们研究了 ({{textsf {APC}}) 的有界版本,称为 k-Bounded All Pairs Connectivity (k-APC) 问题。在 APC 的这一变体中,除了图 G 之外,我们还得到了一个整数 k,现在的任务是只报告最小切割值小于 k 的顶点对 (s, t) 的最小 (s, t) 切割的大小(如果最小 (s, t) 切割的大小至少为 k,我们可以只报告它 "很大",而不用计算精确值)。我们的主要成果是一种解决有向图中 k-APC 的({tilde{O}}((kn)^omega ))时间算法。这是第一种算法,对于所有(kge 3 ),它解决 k-APC 的速度比精确解决更一般的 APC 问题更快。对于所有 kle {{,textrm{poly},}}(log n)),这个运行时间是 ({{tilde{O}}}(n^omega )),这基本上与k-APC的(k=1)情况下的最优运行时间相匹配,符合细粒度复杂性的流行猜想。在此之前,只有在一般有向图中的(kle 2) 情况下才能达到这个运行时间[Georgiadis et al.In: 44th international colloquium on automata, languages, and programming (ICALP 2017), volume 80 of Leibniz International Proceedings in Informatics (LIPIcs), Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, 2017], and for (kle o(sqrt{/log n})) in the special case of directed acyclic graphs [Abboud et al.In: 46th international colloquium on automata, languages, and programming, ICALP 2019, July 9-12, 2019, Patras, Greece, Schloss Dagstuhl-Leibniz-Zentrum für Informatik, 2019]。我们的结果采用了之前工作中使用的代数框架,该框架由 [Cheung et al. In: FOCS, 2011] 引入。这一框架的直接实现涉及到一个大型随机矩阵的反演。我们的新算法基于这样的见解,即要解决 k-APC 问题,只需反演一个低阶随机矩阵,而不是一般的随机矩阵。我们还获得了 k-APC 的一个变体--k-Bounded All-Pairs Vertex Connectivity(k-APVC)问题的新算法,现在我们的任务是为每一对顶点(s, t)报告从 s 到 t 的内部顶点相交(而非边缘相交)路径的最大数目,如果这个数目小于 k,则报告从 s 到 t 至少有 k 条内部顶点相交路径。我们的第二个成果是一种解决有向图中 k-APVC 的({tilde{O}}(k^2n^omega ))时间算法。之前的工作展示了如何在 ({{tilde{O}}((kn)^omega )) time 内解决一个更简单版本的 k-APVC 问题(其中只需要为图中不是边的顶点对(s, t)返回答案)[Abboud 等人,In: 46th International colloquium on automata, languages, and programming, ICALP 2019, July 9-12, 2019, Patras, Greece, Schloss Dagstuhl-Leibniz-Zentrum für Informatik, 2019]。相比之下,我们的算法可以解决完整的 k-APVC 问题,并且在 (omega > 2) 的情况下速度更快。
{"title":"An Efficient Algorithm for All-Pairs Bounded Edge Connectivity","authors":"Shyan Akmal,&nbsp;Ce Jin","doi":"10.1007/s00453-023-01203-2","DOIUrl":"10.1007/s00453-023-01203-2","url":null,"abstract":"&lt;div&gt;&lt;p&gt;Our work concerns algorithms for a variant of &lt;span&gt;Maximum Flow&lt;/span&gt; in unweighted graphs. In the &lt;span&gt;All-Pairs Connectivity (APC)&lt;/span&gt; problem, we are given a graph &lt;i&gt;G&lt;/i&gt; on &lt;i&gt;n&lt;/i&gt; vertices and &lt;i&gt;m&lt;/i&gt; edges, and are tasked with computing the maximum number of edge-disjoint paths from &lt;i&gt;s&lt;/i&gt; to &lt;i&gt;t&lt;/i&gt; (equivalently, the size of a minimum (&lt;i&gt;s&lt;/i&gt;, &lt;i&gt;t&lt;/i&gt;)-cut) in &lt;i&gt;G&lt;/i&gt;, for all pairs of vertices (&lt;i&gt;s&lt;/i&gt;, &lt;i&gt;t&lt;/i&gt;). Significant algorithmic breakthroughs have recently shown that over undirected graphs, &lt;span&gt;APC&lt;/span&gt; can be solved in &lt;span&gt;(n^{2+o(1)})&lt;/span&gt; time, which is essentially optimal. In contrast, the true time complexity of &lt;span&gt;APC&lt;/span&gt; over directed graphs remains open: this problem can be solved in &lt;span&gt;({tilde{O}}(m^omega ))&lt;/span&gt; time, where &lt;span&gt;(omega in [2, 2.373))&lt;/span&gt; is the exponent of matrix multiplication, but no matching conditional lower bound is known. Following [Abboud et al. In: 46th International colloquium on automata, languages, and programming, ICALP 2019, July 9-12, 2019, Patras, Greece, Schloss Dagstuhl-Leibniz-Zentrum für Informatik, 2019], we study a bounded version of &lt;span&gt;({{textsf {APC}}})&lt;/span&gt; called the &lt;i&gt;k&lt;/i&gt;-&lt;span&gt;Bounded All Pairs Connectivity&lt;/span&gt; (&lt;i&gt;k&lt;/i&gt;-&lt;span&gt;APC)&lt;/span&gt; problem. In this variant of &lt;span&gt;APC&lt;/span&gt;, we are given an integer &lt;i&gt;k&lt;/i&gt; in addition to the graph &lt;i&gt;G&lt;/i&gt;, and are now tasked with reporting the size of a minimum (&lt;i&gt;s&lt;/i&gt;, &lt;i&gt;t&lt;/i&gt;)-cut only for pairs (&lt;i&gt;s&lt;/i&gt;, &lt;i&gt;t&lt;/i&gt;) of vertices with min-cut value less than &lt;i&gt;k&lt;/i&gt; (if the minimum (&lt;i&gt;s&lt;/i&gt;, &lt;i&gt;t&lt;/i&gt;)-cut has size at least &lt;i&gt;k&lt;/i&gt;, we can just report it is “large” instead of computing the exact value). Our main result is an &lt;span&gt;({tilde{O}}((kn)^omega ))&lt;/span&gt; time algorithm solving &lt;i&gt;k&lt;/i&gt;-&lt;span&gt;APC&lt;/span&gt; in directed graphs. This is the first algorithm which solves &lt;i&gt;k&lt;/i&gt;-&lt;span&gt;APC&lt;/span&gt; faster than simply solving the more general &lt;span&gt;APC&lt;/span&gt; problem exactly, for all &lt;span&gt;(kge 3)&lt;/span&gt;. This runtime is &lt;span&gt;({{tilde{O}}}(n^omega ))&lt;/span&gt; for all &lt;span&gt;(kle {{,textrm{poly},}}(log n))&lt;/span&gt;, which essentially matches the optimal runtime for the &lt;span&gt;(k=1)&lt;/span&gt; case of &lt;i&gt;k&lt;/i&gt;-&lt;span&gt;APC&lt;/span&gt;, under popular conjectures from fine-grained complexity. Previously, this runtime was only achieved for &lt;span&gt;(kle 2)&lt;/span&gt; in general directed graphs [Georgiadis et al. In: 44th international colloquium on automata, languages, and programming (ICALP 2017), volume 80 of Leibniz International Proceedings in Informatics (LIPIcs), Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, 2017], and for &lt;span&gt;(kle o(sqrt{log n}))&lt;/span&gt; in the special case of directed acyclic graphs [Abboud et al. In: 46th international colloquium on automata, languages, and programming, ICALP 2019, July 9–12, 2019, Patras, Greece, Schloss Dagstuhl-Leibniz-Zentrum für Informatik, 2019]. Our result employs the same algebraic framework used in previous work, introduced by [Cheung et al. I","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 5","pages":"1623 - 1656"},"PeriodicalIF":0.9,"publicationDate":"2024-01-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-023-01203-2.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139554992","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Truthful Matching with Online Items and Offline Agents 在线项目和离线代理的真实匹配
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-01-16 DOI: 10.1007/s00453-023-01202-3
Michal Feldman, Federico Fusco, Stefano Leonardi, Simon Mauras, Rebecca Reiffenhäuser

We study truthful mechanisms for welfare maximization in online bipartite matching. In our (multi-parameter) setting, every buyer is associated with a (possibly private) desired set of items, and has a private value for being assigned an item in her desired set. Unlike most online matching settings, where agents arrive online, in our setting the items arrive one by one in an adversarial order while the buyers are present for the entire duration of the process. This poses a significant challenge to the design of truthful mechanisms, due to the ability of buyers to strategize over future rounds. We provide an almost full picture of the competitive ratios in different scenarios, including myopic vs. non-myopic agents, tardy vs. prompt payments, and private vs. public desired sets. Among other results, we identify the frontier up to which the celebrated (e/(e-1)) competitive ratio for the vertex-weighted online matching of Karp, Vazirani and Vazirani extends to truthful agents and online items.

我们研究在线双向匹配中福利最大化的真实机制。在我们的(多参数)设置中,每个买方都与一组(可能是私人的)所需物品相关联,并且对被分配到其所需物品中的物品具有私人价值。与大多数在线匹配设置(代理在线到达)不同的是,在我们的设置中,物品按对抗顺序逐一到达,而买家在整个过程中都在场。由于买方有能力在未来几轮中制定策略,这对设计真实机制提出了巨大挑战。我们提供了不同情况下竞争比率的几乎全貌,包括近视代理与非近视代理、延迟付款与及时付款,以及私人期望集与公共期望集。在其他结果中,我们确定了卡普、瓦齐拉尼和瓦齐拉尼的顶点加权在线匹配的著名竞争比率(e/(e-1))扩展到真实代理和在线项目的边界。
{"title":"Truthful Matching with Online Items and Offline Agents","authors":"Michal Feldman,&nbsp;Federico Fusco,&nbsp;Stefano Leonardi,&nbsp;Simon Mauras,&nbsp;Rebecca Reiffenhäuser","doi":"10.1007/s00453-023-01202-3","DOIUrl":"10.1007/s00453-023-01202-3","url":null,"abstract":"<div><p>We study truthful mechanisms for welfare maximization in online bipartite matching. In our (multi-parameter) setting, every buyer is associated with a (possibly private) desired set of items, and has a private value for being assigned an item in her desired set. Unlike most online matching settings, where agents arrive online, in our setting the items arrive one by one in an adversarial order while the buyers are present for the entire duration of the process. This poses a significant challenge to the design of truthful mechanisms, due to the ability of buyers to strategize over future rounds. We provide an almost full picture of the competitive ratios in different scenarios, including myopic vs. non-myopic agents, tardy vs. prompt payments, and private vs. public desired sets. Among other results, we identify the frontier up to which the celebrated <span>(e/(e-1))</span> competitive ratio for the vertex-weighted online matching of Karp, Vazirani and Vazirani extends to truthful agents and online items.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 5","pages":"1600 - 1622"},"PeriodicalIF":0.9,"publicationDate":"2024-01-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-023-01202-3.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139482572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Predecessor on the Ultra-Wide Word RAM 超宽字内存的前身
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-01-10 DOI: 10.1007/s00453-023-01193-1
Philip Bille, Inge Li Gørtz, Tord Stordalen

We consider the predecessor problem on the ultra-wide word RAM model of computation, which extends the word RAM model with ultrawords consisting of (w^2) bits (TAMC, 2015). The model supports arithmetic and boolean operations on ultrawords, in addition to scattered memory operations that access or modify w (potentially non-contiguous) memory addresses simultaneously. The ultra-wide word RAM model captures (and idealizes) modern vector processor architectures. Our main result is a simple, linear space data structure that supports predecessor in constant time and updates in amortized, expected constant time. This improves the space of the previous constant time solution that uses space in the order of the size of the universe. Our result holds even in a weaker model where ultrawords consist of (w^{1+epsilon }) bits for any (epsilon > 0 ). It is based on a new implementation of the classic x-fast trie data structure of Willard (Inform Process Lett 17(2):81–84, https://doi.org/10.1016/0020-0190(83)90075-3, 1983) combined with a new dictionary data structure that supports fast parallel lookups.

我们考虑的是超宽字 RAM 计算模型的前身问题,它扩展了字 RAM 模型,超字由 (w^2) 位组成(TAMC,2015 年)。该模型支持对超字进行算术和布尔操作,此外还支持同时访问或修改 w 个(可能是非连续的)内存地址的分散内存操作。超宽字 RAM 模型捕捉(并理想化)了现代矢量处理器架构。我们的主要成果是一种简单的线性空间数据结构,它能在恒定时间内支持前置操作,并在摊销后的预期恒定时间内支持更新。这改进了之前恒定时间解决方案的空间,恒定时间解决方案使用的空间与宇宙大小相当。我们的结果甚至在一个较弱的模型中也成立,在这个模型中,超字由任意(epsilon > 0 )的(w^{1+epsilon } )比特组成。它是基于威拉德(Inform Process Lett 17(2):81-84, https://doi.org/10.1016/0020-0190(83)90075-3,1983)的经典 x-fast trie 数据结构的新实现,结合了支持快速并行查找的新字典数据结构。
{"title":"Predecessor on the Ultra-Wide Word RAM","authors":"Philip Bille,&nbsp;Inge Li Gørtz,&nbsp;Tord Stordalen","doi":"10.1007/s00453-023-01193-1","DOIUrl":"10.1007/s00453-023-01193-1","url":null,"abstract":"<div><p>We consider the predecessor problem on the ultra-wide word RAM model of computation, which extends the word RAM model with <i>ultrawords</i> consisting of <span>(w^2)</span> bits (TAMC, 2015). The model supports arithmetic and boolean operations on ultrawords, in addition to <i>scattered</i> memory operations that access or modify <i>w</i> (potentially non-contiguous) memory addresses simultaneously. The ultra-wide word RAM model captures (and idealizes) modern vector processor architectures. Our main result is a simple, linear space data structure that supports predecessor in constant time and updates in amortized, expected constant time. This improves the space of the previous constant time solution that uses space in the order of the size of the universe. Our result holds even in a weaker model where ultrawords consist of <span>(w^{1+epsilon })</span> bits for any <span>(epsilon &gt; 0 )</span>. It is based on a new implementation of the classic <i>x</i>-fast trie data structure of Willard (Inform Process Lett 17(2):81–84, https://doi.org/10.1016/0020-0190(83)90075-3, 1983) combined with a new dictionary data structure that supports fast parallel lookups.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 5","pages":"1578 - 1599"},"PeriodicalIF":0.9,"publicationDate":"2024-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-023-01193-1.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139421172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximations for Throughput Maximization 吞吐量最大化的近似值
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-01-09 DOI: 10.1007/s00453-023-01201-4
Dylan Hyatt-Denesik, Mirmahdi Rahgoshay, Mohammad R. Salavatipour

In this paper we study the classical problem of throughput maximization. In this problem we have a collection J of n jobs, each having a release time (r_j), deadline (d_j), and processing time (p_j). They have to be scheduled non-preemptively on m identical parallel machines. The goal is to find a schedule which maximizes the number of jobs scheduled entirely in their ([r_j,d_j]) window. This problem has been studied extensively (even for the case of (m=1)). Several special cases of the problem remain open. Bar-Noy et al. (Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, May 1–4, 1999, Atlanta, Georgia, USA, pp. 622–631. ACM, 1999, https://doi.org/10.1145/301250.301420) presented an algorithm with ratio (1-1/(1+1/m)^m) for m machines, which approaches (1-1/e) as m increases. For (m=1), Chuzhoy et al. (42nd Annual Symposium on Foundations of Computer Science (FOCS) 2001, 14–17 October 2001, Las Vegas, Nevada, USA, pp. 348–356. IEEE Computer Society, 2001) presented an algorithm with approximation with ratio (1-frac{1}{e}-varepsilon ) (for any (varepsilon >0)). Recently Im et al. (SIAM J Discrete Math 34(3):1649–1669, 2020) presented an algorithm with ratio (1-1/e+varepsilon _0) for some absolute constant (varepsilon _0>0) for any fixed m. They also presented an algorithm with ratio (1-O(sqrt{log m/m})-varepsilon ) for general m which approaches 1 as m grows. The approximability of the problem for (m=O(1)) remains a major open question. Even for the case of (m=1) and (c=O(1)) distinct processing times the problem is open (Sgall in: Algorithms - ESA 2012 - 20th Annual European Symposium, Ljubljana, Slovenia, September 10–12, 2012. Proceedings, pp 2–11, 2012). In this paper we study the case of (m=O(1)) and show that if there are c distinct processing times, i.e. (p_j)’s come from a set of size c, then there is a randomized ((1-{varepsilon }))-approximation that runs in time (O(n^{mc^7{varepsilon }^{-6}}log T)), where T is the largest deadline. Therefore, for constant m and constant c this yields a PTAS. Our algorithm is based on proving structural properties for a near optimum solution that allows one to use a dynamic programming with pruning.

本文研究的是吞吐量最大化的经典问题。在这个问题中,我们有一个由 n 个作业组成的集合 J,每个作业都有发布时间 (r_j )、截止时间 (d_j )和处理时间 (p_j )。它们必须在 m 台相同的并行机器上进行非抢占式调度。我们的目标是找到一个计划表,它能最大限度地增加完全安排在其 ([r_j,d_j]) 窗口内的作业数量。这个问题已经被广泛地研究过了(即使是在(m=1)的情况下)。该问题的几个特例仍未解决。Bar-Noy et al. (Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, May 1-4, 1999, Atlanta, Georgia, USA, pp.ACM,1999,https://doi.org/10.1145/301250.301420)提出了一种算法,对于m台机器,其比率为(1-1/(1+1/m)^m),随着m的增加,该比率接近(1-1/e)。对于 (m=1), Chuzhoy 等人 (42nd Annual Symposium on Foundations of Computer Science (FOCS) 2001, 14-17 October 2001, Las Vegas, Nevada, USA, pp.IEEE Computer Society, 2001)提出了一种具有比率 (1-frac{1}{e}-varepsilon ) (对于任意 (varepsilon >0))的近似计算算法。最近,Im等人(SIAM J Discrete Math 34(3):1649-1669, 2020)提出了一种算法,对于任意固定的m,在某个绝对常数(varepsilon _0>0) 下,比率为(1-1/e+varepsilon _0)。对于 (m=O(1)) 问题的近似性仍然是一个重大的悬而未决的问题。即使对于 (m=1) 和 (c=O(1)) 不同处理时间的情况,这个问题也是悬而未决的(Sgall in:Algorithms - ESA 2012 - 20th Annual European Symposium, Ljubljana, Slovenia, September 10-12, 2012.论文集,第 2-11 页,2012 年)。在本文中,我们研究了 (m=O(1)) 的情况,并证明如果有 c 个不同的处理时间,即 (p_j) 来自大小为 c 的集合,那么有一个随机的 ((1-{varepsilon }))-approximation 可以在 (O(n^{mc^7{varepsilon }^{-6}}log T))的时间内运行,其中 T 是最大的截止日期。因此,对于常数 m 和常数 c,这就产生了一个 PTAS。我们的算法是基于证明近似最优解的结构特性,从而可以使用带剪枝的动态编程。
{"title":"Approximations for Throughput Maximization","authors":"Dylan Hyatt-Denesik,&nbsp;Mirmahdi Rahgoshay,&nbsp;Mohammad R. Salavatipour","doi":"10.1007/s00453-023-01201-4","DOIUrl":"10.1007/s00453-023-01201-4","url":null,"abstract":"<div><p>In this paper we study the classical problem of throughput maximization. In this problem we have a collection <i>J</i> of <i>n</i> jobs, each having a release time <span>(r_j)</span>, deadline <span>(d_j)</span>, and processing time <span>(p_j)</span>. They have to be scheduled non-preemptively on <i>m</i> identical parallel machines. The goal is to find a schedule which maximizes the number of jobs scheduled entirely in their <span>([r_j,d_j])</span> window. This problem has been studied extensively (even for the case of <span>(m=1)</span>). Several special cases of the problem remain open. Bar-Noy et al. (Proceedings of the Thirty-First Annual ACM Symposium on Theory of Computing, May 1–4, 1999, Atlanta, Georgia, USA, pp. 622–631. ACM, 1999, https://doi.org/10.1145/301250.301420) presented an algorithm with ratio <span>(1-1/(1+1/m)^m)</span> for <i>m</i> machines, which approaches <span>(1-1/e)</span> as <i>m</i> increases. For <span>(m=1)</span>, Chuzhoy et al. (42nd Annual Symposium on Foundations of Computer Science (FOCS) 2001, 14–17 October 2001, Las Vegas, Nevada, USA, pp. 348–356. IEEE Computer Society, 2001) presented an algorithm with approximation with ratio <span>(1-frac{1}{e}-varepsilon )</span> (for any <span>(varepsilon &gt;0)</span>). Recently Im et al. (SIAM J Discrete Math 34(3):1649–1669, 2020) presented an algorithm with ratio <span>(1-1/e+varepsilon _0)</span> for some absolute constant <span>(varepsilon _0&gt;0)</span> for any fixed <i>m</i>. They also presented an algorithm with ratio <span>(1-O(sqrt{log m/m})-varepsilon )</span> for general <i>m</i> which approaches 1 as <i>m</i> grows. The approximability of the problem for <span>(m=O(1))</span> remains a major open question. Even for the case of <span>(m=1)</span> and <span>(c=O(1))</span> distinct processing times the problem is open (Sgall in: Algorithms - ESA 2012 - 20th Annual European Symposium, Ljubljana, Slovenia, September 10–12, 2012. Proceedings, pp 2–11, 2012). In this paper we study the case of <span>(m=O(1))</span> and show that if there are <i>c</i> distinct processing times, i.e. <span>(p_j)</span>’s come from a set of size <i>c</i>, then there is a randomized <span>((1-{varepsilon }))</span>-approximation that runs in time <span>(O(n^{mc^7{varepsilon }^{-6}}log T))</span>, where <i>T</i> is the largest deadline. Therefore, for constant <i>m</i> and constant <i>c</i> this yields a PTAS. Our algorithm is based on proving structural properties for a near optimum solution that allows one to use a dynamic programming with pruning.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 5","pages":"1545 - 1577"},"PeriodicalIF":0.9,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139414997","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Structural Parameterizations of the Harmless Set Problem 论无害集问题的结构参数化
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-01-09 DOI: 10.1007/s00453-023-01199-9
Ajinkya Gaikwad, Soumen Maity

In this paper, we study the Harmless Set problem from a parameterized complexity perspective. Given a graph (G = (V,E)), a threshold function(~t~:~ V rightarrow {mathbb {N}}) and an integer k, we study Harmless Set, where the goal is to find a subset of vertices (S subseteq V) of size at least k such that every vertex (vin V) has fewer than t(v) neighbours in S. On the positive side, we obtain fixed-parameter algorithms for the problem when parameterized by the neighbourhood diversity, the twin-cover number and the vertex integrity of the input graph. We complement two of these results from the negative side. On dense graphs, we show that the problem is W[1]-hard parameterized by cluster vertex deletion number—a natural generalization of the twin-cover number. We show that the problem is W[1]-hard parameterized by a wide range of fairly restrictive structural parameters such as the feedback vertex set number, pathwidth, and treedepth—a natural generalization of the vertex integrity. We thereby resolve one open question stated by Bazgan and Chopin (Discrete Optim 14(C):170–182, 2014) concerning the complexity of Harmless Set parameterized by the treewidth of the input graph. We also show that Harmless Set for a special case where each vertex has the threshold set to half of its degree (the so-called Majority Harmless Set problem) is W[1]-hard when parameterized by the treewidth of the input graph. Given a graph G and an irredundant c-expression of G, we prove that Harmless Set can be solved in XP-time when parameterized by clique-width.

在本文中,我们从参数化复杂性的角度来研究无损集问题。给定一个图(G = (V,E))、一个阈值函数(~t~:~ V rightarrow {mathbb {N}} )和一个整数 k,我们研究无害集问题,其目标是找到一个大小至少为 k 的顶点子集(S subseteq V ),使得每个顶点 (vin V) 在 S 中的邻居少于 t(v)。从积极的一面来看,当以邻域多样性、孪生覆盖数和输入图的顶点完整性为参数时,我们得到了该问题的固定参数算法。我们从反面补充了其中两个结果。在稠密图上,我们证明了以簇顶点删除数--孪生覆盖数的自然概括--为参数的问题是 W[1]-hard 的。我们证明,以反馈顶点集数、路径宽度和树深度等一系列相当严格的结构参数为参数,该问题的难度为 W[1]-ard--顶点完整性的自然概括。因此,我们解决了 Bazgan 和 Chopin(《离散优化》14(C):170-182, 2014)提出的一个未决问题,即以输入图的树宽为参数的 Harmless Set 复杂性。我们还证明,当以输入图的树宽为参数时,对于每个顶点的阈值设为其度的一半的特殊情况(即所谓的多数无害集问题),无害集的复杂度为 W[1]-hard。给定一个图 G 和 G 的一个非冗余 c 表达式,我们证明当以簇宽为参数时,无害集问题可以在 XP 时间内求解。
{"title":"On Structural Parameterizations of the Harmless Set Problem","authors":"Ajinkya Gaikwad,&nbsp;Soumen Maity","doi":"10.1007/s00453-023-01199-9","DOIUrl":"10.1007/s00453-023-01199-9","url":null,"abstract":"<div><p>In this paper, we study the <span>Harmless Set</span> problem from a parameterized complexity perspective. Given a graph <span>(G = (V,E))</span>, a threshold function<span>(~t~:~ V rightarrow {mathbb {N}})</span> and an integer <i>k</i>, we study <span>Harmless Set</span>, where the goal is to find a subset of vertices <span>(S subseteq V)</span> of size at least <i>k</i> such that every vertex <span>(vin V)</span> has fewer than <i>t</i>(<i>v</i>) neighbours in <i>S</i>. On the positive side, we obtain fixed-parameter algorithms for the problem when parameterized by the neighbourhood diversity, the twin-cover number and the vertex integrity of the input graph. We complement two of these results from the negative side. On dense graphs, we show that the problem is W[1]-hard parameterized by cluster vertex deletion number—a natural generalization of the twin-cover number. We show that the problem is W[1]-hard parameterized by a wide range of fairly restrictive structural parameters such as the feedback vertex set number, pathwidth, and treedepth—a natural generalization of the vertex integrity. We thereby resolve one open question stated by Bazgan and Chopin (Discrete Optim 14(C):170–182, 2014) concerning the complexity of <span>Harmless Set</span> parameterized by the treewidth of the input graph. We also show that <span>Harmless Set</span> for a special case where each vertex has the threshold set to half of its degree (the so-called <span>Majority Harmless Set</span> problem) is W[1]-hard when parameterized by the treewidth of the input graph. Given a graph <i>G</i> and an irredundant <i>c</i>-expression of <i>G</i>, we prove that <span>Harmless Set</span> can be solved in XP-time when parameterized by clique-width.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 5","pages":"1475 - 1511"},"PeriodicalIF":0.9,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139414925","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Connectivity with Uncertainty Regions Given as Line Segments 以线段形式给出不确定区域的连接性
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2024-01-09 DOI: 10.1007/s00453-023-01200-5
Sergio Cabello, David Gajser

For a set ({mathcal {Q}}) of points in the plane and a real number (delta ge 0), let ({mathbb {G}}_delta ({mathcal {Q}})) be the graph defined on ({mathcal {Q}}) by connecting each pair of points at distance at most (delta ).We consider the connectivity of ({mathbb {G}}_delta ({mathcal {Q}})) in the best scenario when the location of a few of the points is uncertain, but we know for each uncertain point a line segment that contains it. More precisely, we consider the following optimization problem: given a set ({mathcal {P}}) of (n-k) points in the plane and a set ({mathcal {S}}) of k line segments in the plane, find the minimum (delta ge 0) with the property that we can select one point (p_sin s) for each segment (sin {mathcal {S}}) and the corresponding graph ({mathbb {G}}_delta ( {mathcal {P}}cup { p_smid sin {mathcal {S}}})) is connected. It is known that the problem is NP-hard. We provide an algorithm to exactly compute an optimal solution in ({{,mathrm{{mathcal {O}}},}}(f(k) n log n)) time, for a computable function (f(cdot )). This implies that the problem is FPT when parameterized by k. The best previous algorithm uses ({{,mathrm{{mathcal {O}}},}}((k!)^k k^{k+1}cdot n^{2k})) time and computes the solution up to fixed precision.

对于平面上的点集({mathcal {Q}})和实数(delta ge 0),让({mathbb {G}}_delta ({mathcal{Q}}))是在({mathcal {Q}})上定义的图形,它以至多(delta )的距离连接每一对点。我们考虑的是({mathbb {G}}_delta ({mathcal {Q}}))在最佳情况下的连通性,即少数几个点的位置不确定,但我们知道每个不确定的点都有一条线段包含它。更准确地说,我们考虑以下优化问题:给定一个由平面上的(n-k)个点组成的集合({mathcal {P}})和一个由平面上的 k 条线段组成的集合({mathcal {S}})、找到最小值(delta ge 0) ,其属性是我们可以为每条线段 (sin {mathcal {S}})选择一个点 (p_sin s) 并且相应的图({mathbb {G}}_delta ( {mathcal {P}}cup { p_smid sin {mathcal {S}}))是连通的。众所周知,这个问题很难解决。对于可计算函数 (f(cdot )), 我们提供了一种在 ({{,mathrm{{mathcal {O}}},}}(f(k) nlog n))时间内精确计算最优解的算法。之前的最佳算法用了 ({{,mathrm{{mathcal {O}},}}((k!)^k k^{k+1}cdot n^{2k})) 时间并计算出了固定精度的解。
{"title":"Connectivity with Uncertainty Regions Given as Line Segments","authors":"Sergio Cabello,&nbsp;David Gajser","doi":"10.1007/s00453-023-01200-5","DOIUrl":"10.1007/s00453-023-01200-5","url":null,"abstract":"<div><p>For a set <span>({mathcal {Q}})</span> of points in the plane and a real number <span>(delta ge 0)</span>, let <span>({mathbb {G}}_delta ({mathcal {Q}}))</span> be the graph defined on <span>({mathcal {Q}})</span> by connecting each pair of points at distance at most <span>(delta )</span>.We consider the connectivity of <span>({mathbb {G}}_delta ({mathcal {Q}}))</span> in the best scenario when the location of a few of the points is uncertain, but we know for each uncertain point a line segment that contains it. More precisely, we consider the following optimization problem: given a set <span>({mathcal {P}})</span> of <span>(n-k)</span> points in the plane and a set <span>({mathcal {S}})</span> of <i>k</i> line segments in the plane, find the minimum <span>(delta ge 0)</span> with the property that we can select one point <span>(p_sin s)</span> for each segment <span>(sin {mathcal {S}})</span> and the corresponding graph <span>({mathbb {G}}_delta ( {mathcal {P}}cup { p_smid sin {mathcal {S}}}))</span> is connected. It is known that the problem is NP-hard. We provide an algorithm to exactly compute an optimal solution in <span>({{,mathrm{{mathcal {O}}},}}(f(k) n log n))</span> time, for a computable function <span>(f(cdot ))</span>. This implies that the problem is FPT when parameterized by <i>k</i>. The best previous algorithm uses <span>({{,mathrm{{mathcal {O}}},}}((k!)^k k^{k+1}cdot n^{2k}))</span> time and computes the solution up to fixed precision.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 5","pages":"1512 - 1544"},"PeriodicalIF":0.9,"publicationDate":"2024-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-023-01200-5.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139414935","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Domination and Cut Problems on Chordal Graphs with Bounded Leafage 有界叶弦图上的支配和切割问题
IF 0.9 4区 计算机科学 Q4 COMPUTER SCIENCE, SOFTWARE ENGINEERING Pub Date : 2023-12-29 DOI: 10.1007/s00453-023-01196-y
Esther Galby, Dániel Marx, Philipp Schepper, Roohani Sharma, Prafullkumar Tale

The leafage of a chordal graph G is the minimum integer (ell ) such that G can be realized as an intersection graph of subtrees of a tree with (ell ) leaves. We consider structural parameterization by the leafage of classical domination and cut problems on chordal graphs. Fomin, Golovach, and Raymond [ESA 2018, Algorithmica 2020] proved, among other things, that Dominating Set on chordal graphs admits an algorithm running in time (2^{mathcal {O}(ell ^2)} cdot n^{mathcal {O}(1)}). We present a conceptually much simpler algorithm that runs in time (2^{mathcal {O}(ell )} cdot n^{mathcal {O}(1)}). We extend our approach to obtain similar results for Connected Dominating Set and Steiner Tree. We then consider the two classical cut problems MultiCut with Undeletable Terminals and Multiway Cut with Undeletable Terminals. We prove that the former is W[1]-hard when parameterized by the leafage and complement this result by presenting a simple (n^{mathcal {O}(ell )})-time algorithm. To our surprise, we find that Multiway Cut with Undeletable Terminals on chordal graphs can be solved, in contrast, in (n^{{{mathcal {O}}}(1)})-time.

弦图 G 的叶子数是最小整数(ell ),使得 G 可以实现为具有 (ell ) 个叶子的树的子树的交集图。我们考虑了弦图上经典支配和切割问题的叶子结构参数化。Fomin, Golovach 和 Raymond [ESA 2018, Algorithmica 2020]证明,除其他外,弦图上的支配集(Dominating Set)的算法运行时间为 (2^{mathcal {O}(ell ^2)} cdot n^{/mathcal{O}(1)}/)。我们提出了一种概念上简单得多的算法,运行时间为 (2^{mathcal {O}(ell )}cdot n^{mathcal {O}(1)}).我们将扩展我们的方法,以获得连通支配集和斯坦纳树的类似结果。然后,我们考虑两个经典切割问题:不可删除终端的多路切割(MultiCut with Undeletable Terminals)和不可删除终端的多路切割(Multiway Cut with Undeletable Terminals)。我们证明了前者在以叶子为参数时是 W[1]-hard 的,并提出了一个简单的 (n^{mathcal {O}(ell )})-time 算法来补充这一结果。令我们惊讶的是,我们发现在弦图上有不可删除终端的多向切割(Multiway Cut with Undeletable Terminals)可以在 (n^{{mathcal {O}}(1)})-time 内求解。
{"title":"Domination and Cut Problems on Chordal Graphs with Bounded Leafage","authors":"Esther Galby,&nbsp;Dániel Marx,&nbsp;Philipp Schepper,&nbsp;Roohani Sharma,&nbsp;Prafullkumar Tale","doi":"10.1007/s00453-023-01196-y","DOIUrl":"10.1007/s00453-023-01196-y","url":null,"abstract":"<div><p>The leafage of a chordal graph <i>G</i> is the minimum integer <span>(ell )</span> such that <i>G</i> can be realized as an intersection graph of subtrees of a tree with <span>(ell )</span> leaves. We consider structural parameterization by the leafage of classical domination and cut problems on chordal graphs. Fomin, Golovach, and Raymond [ESA 2018, Algorithmica 2020] proved, among other things, that <span>Dominating Set</span> on chordal graphs admits an algorithm running in time <span>(2^{mathcal {O}(ell ^2)} cdot n^{mathcal {O}(1)})</span>. We present a conceptually much simpler algorithm that runs in time <span>(2^{mathcal {O}(ell )} cdot n^{mathcal {O}(1)})</span>. We extend our approach to obtain similar results for <span>Connected Dominating Set</span> and <span>Steiner Tree</span>. We then consider the two classical cut problems <span>MultiCut with Undeletable Terminals</span> and <span>Multiway Cut with Undeletable Terminals</span>. We prove that the former is <span>W</span>[1]-hard when parameterized by the leafage and complement this result by presenting a simple <span>(n^{mathcal {O}(ell )})</span>-time algorithm. To our surprise, we find that <span>Multiway Cut with Undeletable Terminals</span> on chordal graphs can be solved, in contrast, in <span>(n^{{{mathcal {O}}}(1)})</span>-time.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 5","pages":"1428 - 1474"},"PeriodicalIF":0.9,"publicationDate":"2023-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-023-01196-y.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"139062325","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Algorithmica
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1