Pub Date : 2023-12-13DOI: 10.1007/s00453-023-01191-3
Liad Blumrosen, Shahar Dobzinski
We consider reallocation problems in settings where the initial endowment of each agent consists of a subset of the resources. The private information of the players is their value for every possible subset of the resources. The goal is to redistribute resources among agents to maximize efficiency. Monetary transfers are allowed, but participation is voluntary. We develop incentive-compatible, individually-rational and budget-balanced mechanisms for two settings in which agents have complex multi-parameter valuations, both settings include double auctions as a special case. The first setting is combinatorial exchanges, where we provide a mechanism that achieves a logarithmic approximation to the optimal efficiency when valuations are subadditive. The second setting is Arrow–Debreu markets for a single divisible good, where we present a constant approximation mechanism. The first result is given for a Bayesian setting, where the latter result is for prior-free environments.
{"title":"Combinatorial Reallocation Mechanisms","authors":"Liad Blumrosen, Shahar Dobzinski","doi":"10.1007/s00453-023-01191-3","DOIUrl":"10.1007/s00453-023-01191-3","url":null,"abstract":"<div><p>We consider reallocation problems in settings where the initial endowment of each agent consists of a subset of the resources. The private information of the players is their value for every possible subset of the resources. The goal is to redistribute resources among agents to maximize efficiency. Monetary transfers are allowed, but participation is voluntary. We develop incentive-compatible, individually-rational and budget-balanced mechanisms for two settings in which agents have complex multi-parameter valuations, both settings include double auctions as a special case. The first setting is combinatorial exchanges, where we provide a mechanism that achieves a logarithmic approximation to the optimal efficiency when valuations are subadditive. The second setting is Arrow–Debreu markets for a single divisible good, where we present a constant approximation mechanism. The first result is given for a Bayesian setting, where the latter result is for prior-free environments.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 4","pages":"1246 - 1262"},"PeriodicalIF":0.9,"publicationDate":"2023-12-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138581205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-12-10DOI: 10.1007/s00453-023-01189-x
Marten Maack, Friedhelm Meyer auf der Heide, Simon Pukrop
Consider a set of jobs connected to a directed acyclic task graph with a fixed source and sink. The edges of this graph model precedence constraints and the jobs have to be scheduled with respect to those. We introduce the server cloud scheduling problem, in which the jobs have to be processed either on a single local machine or on one of infinitely many cloud machines. For each job, processing times both on the server and in the cloud are given. Furthermore, for each edge in the task graph, a communication delay is included in the input and has to be taken into account if one of the two jobs is scheduled on the server and the other in the cloud. The server processes jobs sequentially, whereas the cloud can serve as many as needed in parallel, but induces costs. We consider both makespan and cost minimization. The main results are an FPTAS for the makespan objective for graphs with a constant source and sink dividing cut and strong hardness for the case with unit processing times and delays.
{"title":"Server Cloud Scheduling","authors":"Marten Maack, Friedhelm Meyer auf der Heide, Simon Pukrop","doi":"10.1007/s00453-023-01189-x","DOIUrl":"10.1007/s00453-023-01189-x","url":null,"abstract":"<div><p>Consider a set of jobs connected to a directed acyclic task graph with a fixed source and sink. The edges of this graph model precedence constraints and the jobs have to be scheduled with respect to those. We introduce the server cloud scheduling problem, in which the jobs have to be processed either on a single local machine or on one of infinitely many cloud machines. For each job, processing times both on the server and in the cloud are given. Furthermore, for each edge in the task graph, a communication delay is included in the input and has to be taken into account if one of the two jobs is scheduled on the server and the other in the cloud. The server processes jobs sequentially, whereas the cloud can serve as many as needed in parallel, but induces costs. We consider both makespan and cost minimization. The main results are an FPTAS for the makespan objective for graphs with a constant source and sink dividing cut and strong hardness for the case with unit processing times and delays.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 4","pages":"1210 - 1245"},"PeriodicalIF":0.9,"publicationDate":"2023-12-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-023-01189-x.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138566328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-28DOI: 10.1007/s00453-023-01190-4
Moran Feldman, Ariel Szarf
The problem of finding a maximum size matching in a graph (known as the maximum matching problem) is one of the most classical problems in computer science. Despite a significant body of work dedicated to the study of this problem in the data stream model, the state-of-the-art single-pass semi-streaming algorithm for it is still a simple greedy algorithm that computes a maximal matching, and this way obtains ({1}/{2})-approximation. Some previous works described two/three-pass algorithms that improve over this approximation ratio by using their second and third passes to improve the above mentioned maximal matching. One contribution of this paper continues this line of work by presenting new three-pass semi-streaming algorithms that work along these lines and obtain improved approximation ratios of 0.6111 and 0.5694 for triangle-free and general graphs, respectively. Unfortunately, a recent work Konrad and Naidu (Approximation, randomization, and combinatorial optimization. Algorithms and techniques, APPROX/RANDOM 2021, August 16–18, 2021. LIPIcs, vol 207, pp 19:1–19:18, 2021. https://doi.org/10.4230/LIPIcs.APPROX/RANDOM.2021.19) shows that the strategy of constructing a maximal matching in the first pass and then improving it in further passes has limitations. Additionally, this technique is unlikely to get us closer to single-pass semi-streaming algorithms obtaining a better than ({1}/{2})-approximation. Therefore, it is interesting to come up with algorithms that do something else with their first pass (we term such algorithms non-maximal-matching-first algorithms). No such algorithms were previously known, and the main contribution of this paper is describing such algorithms that obtain approximation ratios of 0.5384 and 0.5555 in two and three passes, respectively, for general graphs. The main significance of our results is not in the numerical improvements, but in demonstrating the potential of non-maximal-matching-first algorithms.
{"title":"Maximum Matching Sans Maximal Matching: A New Approach for Finding Maximum Matchings in the Data Stream Model","authors":"Moran Feldman, Ariel Szarf","doi":"10.1007/s00453-023-01190-4","DOIUrl":"10.1007/s00453-023-01190-4","url":null,"abstract":"<div><p>The problem of finding a maximum size matching in a graph (known as the <i>maximum matching</i> problem) is one of the most classical problems in computer science. Despite a significant body of work dedicated to the study of this problem in the data stream model, the state-of-the-art single-pass semi-streaming algorithm for it is still a simple greedy algorithm that computes a maximal matching, and this way obtains <span>({1}/{2})</span>-approximation. Some previous works described two/three-pass algorithms that improve over this approximation ratio by using their second and third passes to improve the above mentioned maximal matching. One contribution of this paper continues this line of work by presenting new three-pass semi-streaming algorithms that work along these lines and obtain improved approximation ratios of 0.6111 and 0.5694 for triangle-free and general graphs, respectively. Unfortunately, a recent work Konrad and Naidu (Approximation, randomization, and combinatorial optimization. Algorithms and techniques, APPROX/RANDOM 2021, August 16–18, 2021. LIPIcs, vol 207, pp 19:1–19:18, 2021. https://doi.org/10.4230/LIPIcs.APPROX/RANDOM.2021.19) shows that the strategy of constructing a maximal matching in the first pass and then improving it in further passes has limitations. Additionally, this technique is unlikely to get us closer to single-pass semi-streaming algorithms obtaining a better than <span>({1}/{2})</span>-approximation. Therefore, it is interesting to come up with algorithms that do something else with their first pass (we term such algorithms non-maximal-matching-first algorithms). No such algorithms were previously known, and the main contribution of this paper is describing such algorithms that obtain approximation ratios of 0.5384 and 0.5555 in two and three passes, respectively, for general graphs. The main significance of our results is not in the numerical improvements, but in demonstrating the potential of non-maximal-matching-first algorithms.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 4","pages":"1173 - 1209"},"PeriodicalIF":0.9,"publicationDate":"2023-11-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138537658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-27DOI: 10.1007/s00453-023-01192-2
Joanna Raczek
In this paper we study the computational complexity issues of the problem of secondary domination (known also as (1, 2)-domination) in several graph classes. We also study the computational complexity of the problem of determining whether the domination and secondary domination numbers are equal. In particular, we study the influence of triangles and vertices of degree 1 on these numbers. Also, an optimal algorithm for finding a minimum secondary dominating set in trees is presented.
{"title":"Complexity Issues on of Secondary Domination Number","authors":"Joanna Raczek","doi":"10.1007/s00453-023-01192-2","DOIUrl":"10.1007/s00453-023-01192-2","url":null,"abstract":"<div><p>In this paper we study the computational complexity issues of the problem of secondary domination (known also as (1, 2)-domination) in several graph classes. We also study the computational complexity of the problem of determining whether the domination and secondary domination numbers are equal. In particular, we study the influence of triangles and vertices of degree 1 on these numbers. Also, an optimal algorithm for finding a minimum secondary dominating set in trees is presented.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 4","pages":"1163 - 1172"},"PeriodicalIF":0.9,"publicationDate":"2023-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-023-01192-2.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138543430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-23DOI: 10.1007/s00453-023-01187-z
Liting Huang, Wei Yu, Zhaohui Liu
In this work, we introduce a multi-vehicle (or multi-postman) extension of the classical Mixed Rural Postman Problem, which we call the Min–Max Mixed Rural Postmen Cover Problem (MRPCP). The MRPCP is defined on a mixed graph (G=(V,E,A)), where V is the vertex set, E denotes the (undirected) edge set and A represents the (directed) arc set. Let (Fsubseteq E) ((Hsubseteq A)) be the set of required edges (required arcs). There is a nonnegative weight associated with each edge and arc. The objective is to determine no more than k closed walks to cover all the required edges in F and all the required arcs in H such that the weight of the maximum weight closed walk is minimized. By replacing closed walks with (open) walks in the MRPCP, we obtain the Min–Max Mixed Rural Postmen Walk Cover Problem (MRPWCP). The Min–Max Mixed Chinese Postmen Cover Problem (MCPCP) is a special case of the MRPCP where (F=E) and (H=A). The Min–Max Stacker Crane Cover Problem (SCCP) is another special case of the MRPCP where (F=emptyset ) and (H=A) For the MRPCP with the input graph satisfying the weakly symmetric condition, i.e., for each arc there exists a parallel edge whose weight is not greater than this arc, we devise a (frac{27}{4})-approximation algorithm. This algorithm achieves an approximation ratio of (frac{33}{5}) for the SCCP with the weakly symmetric condition. Moreover, we obtain the first 5-approximation algorithm (4-approximation algorithm) for the MRPWCP (MCPCP) with the weakly symmetric condition.
{"title":"Approximation Algorithms for the Min–Max Mixed Rural Postmen Cover Problem and Its Variants","authors":"Liting Huang, Wei Yu, Zhaohui Liu","doi":"10.1007/s00453-023-01187-z","DOIUrl":"10.1007/s00453-023-01187-z","url":null,"abstract":"<div><p>In this work, we introduce a multi-vehicle (or multi-postman) extension of the classical Mixed Rural Postman Problem, which we call the Min–Max Mixed Rural Postmen Cover Problem (MRPCP). The MRPCP is defined on a mixed graph <span>(G=(V,E,A))</span>, where <i>V</i> is the vertex set, <i>E</i> denotes the (undirected) edge set and <i>A</i> represents the (directed) arc set. Let <span>(Fsubseteq E)</span> (<span>(Hsubseteq A)</span>) be the set of required edges (required arcs). There is a nonnegative weight associated with each edge and arc. The objective is to determine no more than <i>k</i> closed walks to cover all the required edges in <i>F</i> and all the required arcs in <i>H</i> such that the weight of the maximum weight closed walk is minimized. By replacing closed walks with (open) walks in the MRPCP, we obtain the Min–Max Mixed Rural Postmen Walk Cover Problem (MRPWCP). The Min–Max Mixed Chinese Postmen Cover Problem (MCPCP) is a special case of the MRPCP where <span>(F=E)</span> and <span>(H=A)</span>. The Min–Max Stacker Crane Cover Problem (SCCP) is another special case of the MRPCP where <span>(F=emptyset )</span> and <span>(H=A)</span> For the MRPCP with the input graph satisfying the weakly symmetric condition, i.e., for each arc there exists a parallel edge whose weight is not greater than this arc, we devise a <span>(frac{27}{4})</span>-approximation algorithm. This algorithm achieves an approximation ratio of <span>(frac{33}{5})</span> for the SCCP with the weakly symmetric condition. Moreover, we obtain the first 5-approximation algorithm (4-approximation algorithm) for the MRPWCP (MCPCP) with the weakly symmetric condition.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 4","pages":"1135 - 1162"},"PeriodicalIF":0.9,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138537661","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-13DOI: 10.1007/s00453-023-01183-3
Benjamin Qi
We study the problem of Regularized Unconstrained SubmodularMaximization (RegularizedUSM) as defined by Bodek and Feldman (Maximizing sums of non-monotone submodular and linear functions: understanding the unconstrained case, arXiv:2204.03412, 2022): given query access to a non-negative submodular function (f:2^{{mathcal {N}}}rightarrow {mathbb {R}}_{ge 0}) and a linear function (ell :2^{{mathcal {N}}}rightarrow {mathbb {R}}) over the same ground set ({mathcal {N}}), output a set (Tsubseteq {mathcal {N}}) approximately maximizing the sum (f(T)+ell (T)). An algorithm is said to provide an ((alpha ,beta ))-approximation for RegularizedUSM if it outputs a set T such that ({mathbb {E}}[f(T)+ell (T)]ge max _{Ssubseteq {mathcal {N}}}[alpha cdot f(S)+beta cdot ell (S)]). We also consider the setting where S and T are constrained to be independent in a given matroid, which we refer to as RegularizedConstrainedSubmodular Maximization (RegularizedCSM). The special case of RegularizedCSM with monotone f has been extensively studied (Sviridenko et al. in Math Oper Res 42(4):1197–1218, 2017; Feldman in Algorithmica 83(3):853–878, 2021; Harshaw et al., in: International conference on machine learning, PMLR, 2634–2643, 2019), whereas we are aware of only one prior work that studies RegularizedCSM with non-monotone f (Lu et al. in Optimization 1–27, 2023), and that work constrains (ell ) to be non-positive. In this work, we provide improved ((alpha ,beta ))-approximation algorithms for both RegularizedUSM and RegularizedCSM with non-monotone f. Specifically, we are the first to provide nontrivial ((alpha ,beta ))-approximations for RegularizedCSM where the sign of (ell ) is unconstrained, and the (alpha ) we obtain for RegularizedUSM improves over (Bodek and Feldman in Maximizing sums of non-monotone submodular and linear functions: understanding the unconstrained case, arXiv:2204.03412, 2022) for all (beta in (0,1)). We also prove new inapproximability results for RegularizedUSM and RegularizedCSM, as well as 0.478-inapproximability for maximizing a submodular function where S and T are subject to a cardinality constraint, improving a 0.491-inapproximability result due to Oveis Gharan and Vondrak (in: Proceedings of the twenty-second annual ACM-SIAM symposium on discrete algorithms, SIAM, pp 1098–1116, 2011).
我们研究了 Bodek 和 Feldman 定义的 Regularized Unconstrained Submodular Maximization(RegularizedUSM)问题(Maximizing sums of non-monotone submodular and linear functions: understanding the unconstrained case, arXiv:2204.03412, 2022):给定查询访问一个非负亚模态函数 (f:2^{mathcal {N}}rightarrow {mathbb {R}}_{ge 0}) 和一个线性函数 (ell :2^{{{mathcal {N}}}rightarrow {mathbb {R}}) over the same ground set ({mathcal {N}}), output a set (Tsubseteq {mathcal {N}}) approximately maximizing the sum (f(T)+ell (T)).如果一个算法输出的集合T使得({mathbb {E}}[f(T)+ell (T)]gemax _{Ssubseteq {mathcal {N}}}[alpha cdot f(S)+beta cdot ell (S)])近似,那么就可以说它为RegularizedUSM提供了一个((alpha ,beta))近似值。我们还考虑了 S 和 T 在给定 matroid 中受限为独立的情况,我们将其称为正规化受限次模态最大化(RegularizedCSM)。对于具有单调性 f 的 RegularizedCSM 特例,已有大量研究(Sviridenko 等人,发表于 Math Oper Res 42(4):1197-1218, 2017;Feldman,发表于 Algorithmica 83(3):853-878, 2021;Harshaw et al:国际机器学习会议,PMLR,2634-2643,2019),而我们只知道之前有一项工作研究了具有非单调 f 的 RegularizedCSM(Lu 等人,载于 Optimization 1-27,2023),并且该工作约束 (ell ) 为非正值。在这项工作中,我们为具有非单调 f 的 RegularizedUSM 和 RegularizedCSM 提供了改进的 ((alpha ,beta ))-approximation 算法。具体来说,我们是第一个在 (ell ) 的符号不受约束的情况下为 RegularizedCSM 提供非rivial ((alpha ,beta ))-approximations 的人,而且我们为 RegularizedUSM 得到的 (alpha ) 比(Bodek 和 Feldman 在 Maximizing sums of non-monotone submodular and linear functions: understanding the unconstrained case, arXiv:2204.03412, 2022)。我们还证明了 RegularizedUSM 和 RegularizedCSM 的新的不可逼近性结果,以及 S 和 T 受 cardinality 约束的子模函数最大化的 0.478-inapproximability 结果,改进了 Oveis Gharan 和 Vondrak(in:第二十二届 ACM-SIAM 离散算法年度研讨会论文集》,SIAM,第 1098-1116 页,2011 年)。
{"title":"On Maximizing Sums of Non-monotone Submodular and Linear Functions","authors":"Benjamin Qi","doi":"10.1007/s00453-023-01183-3","DOIUrl":"10.1007/s00453-023-01183-3","url":null,"abstract":"<div><p>We study the problem of <span>Regularized Unconstrained Submodular</span> <span>Maximization</span> (<span>RegularizedUSM</span>) as defined by Bodek and Feldman (Maximizing sums of non-monotone submodular and linear functions: understanding the unconstrained case, arXiv:2204.03412, 2022): given query access to a non-negative submodular function <span>(f:2^{{mathcal {N}}}rightarrow {mathbb {R}}_{ge 0})</span> and a linear function <span>(ell :2^{{mathcal {N}}}rightarrow {mathbb {R}})</span> over the same ground set <span>({mathcal {N}})</span>, output a set <span>(Tsubseteq {mathcal {N}})</span> approximately maximizing the sum <span>(f(T)+ell (T))</span>. An algorithm is said to provide an <span>((alpha ,beta ))</span>-approximation for <span>RegularizedUSM</span> if it outputs a set <i>T</i> such that <span>({mathbb {E}}[f(T)+ell (T)]ge max _{Ssubseteq {mathcal {N}}}[alpha cdot f(S)+beta cdot ell (S)])</span>. We also consider the setting where <i>S</i> and <i>T</i> are constrained to be independent in a given matroid, which we refer to as <span>Regularized</span> <i>Constrained</i> <span>Submodular Maximization</span> (<span>RegularizedCSM</span>). The special case of <span>RegularizedCSM</span> with monotone <i>f</i> has been extensively studied (Sviridenko et al. in Math Oper Res 42(4):1197–1218, 2017; Feldman in Algorithmica 83(3):853–878, 2021; Harshaw et al., in: International conference on machine learning, PMLR, 2634–2643, 2019), whereas we are aware of only one prior work that studies <span>RegularizedCSM</span> with non-monotone <i>f</i> (Lu et al. in Optimization 1–27, 2023), and that work constrains <span>(ell )</span> to be non-positive. In this work, we provide improved <span>((alpha ,beta ))</span>-approximation algorithms for both <span>RegularizedUSM</span> and <span>RegularizedCSM</span> with non-monotone <i>f</i>. Specifically, we are the first to provide nontrivial <span>((alpha ,beta ))</span>-approximations for <span>RegularizedCSM</span> where the sign of <span>(ell )</span> is unconstrained, and the <span>(alpha )</span> we obtain for <span>RegularizedUSM</span> improves over (Bodek and Feldman in Maximizing sums of non-monotone submodular and linear functions: understanding the unconstrained case, arXiv:2204.03412, 2022) for all <span>(beta in (0,1))</span>. We also prove new inapproximability results for <span>RegularizedUSM</span> and <span>RegularizedCSM</span>, as well as 0.478-inapproximability for maximizing a submodular function where <i>S</i> and <i>T</i> are subject to a cardinality constraint, improving a 0.491-inapproximability result due to Oveis Gharan and Vondrak (in: Proceedings of the twenty-second annual ACM-SIAM symposium on discrete algorithms, SIAM, pp 1098–1116, 2011).</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 4","pages":"1080 - 1134"},"PeriodicalIF":0.9,"publicationDate":"2023-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-023-01183-3.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136346345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-06DOI: 10.1007/s00453-023-01186-0
Tomasz Kociumaka, Gonzalo Navarro, Francisco Olivares
Two recent lower bounds on the compressibility of repetitive sequences, (delta le gamma ), have received much attention. It has been shown that a length-n string S over an alphabet of size (sigma ) can be represented within the optimal (O(delta log tfrac{nlog sigma }{delta log n})) space, and further, that within that space one can find all the occ occurrences in S of any length-m pattern in time (O(mlog n + occ log ^epsilon n)) for any constant (epsilon >0). Instead, the near-optimal search time (O(m+({occ+1})log ^epsilon n)) has been achieved only within (O(gamma log frac{n}{gamma })) space. Both results are based on considerably different locally consistent parsing techniques. The question of whether the better search time could be supported within the (delta )-optimal space remained open. In this paper, we prove that both techniques can indeed be combined to obtain the best of both worlds: (O(m+({occ+1})log ^epsilon n)) search time within (O(delta log tfrac{nlog sigma }{delta log n})) space. Moreover, the number of occurrences can be computed in (O(m+log ^{2+epsilon }n)) time within (O(delta log tfrac{nlog sigma }{delta log n})) space. We also show that an extra sublogarithmic factor on top of this space enables optimal (O(m+occ)) search time, whereas an extra logarithmic factor enables optimal O(m) counting time.
{"title":"Near-Optimal Search Time in (delta )-Optimal Space, and Vice Versa","authors":"Tomasz Kociumaka, Gonzalo Navarro, Francisco Olivares","doi":"10.1007/s00453-023-01186-0","DOIUrl":"10.1007/s00453-023-01186-0","url":null,"abstract":"<div><p>Two recent lower bounds on the compressibility of repetitive sequences, <span>(delta le gamma )</span>, have received much attention. It has been shown that a length-<i>n</i> string <i>S</i> over an alphabet of size <span>(sigma )</span> can be represented within the optimal <span>(O(delta log tfrac{nlog sigma }{delta log n}))</span> space, and further, that within that space one can find all the <i>occ</i> occurrences in <i>S</i> of any length-<i>m</i> pattern in time <span>(O(mlog n + occ log ^epsilon n))</span> for any constant <span>(epsilon >0)</span>. Instead, the near-optimal search time <span>(O(m+({occ+1})log ^epsilon n))</span> has been achieved only within <span>(O(gamma log frac{n}{gamma }))</span> space. Both results are based on considerably different locally consistent parsing techniques. The question of whether the better search time could be supported within the <span>(delta )</span>-optimal space remained open. In this paper, we prove that both techniques can indeed be combined to obtain the best of both worlds: <span>(O(m+({occ+1})log ^epsilon n))</span> search time within <span>(O(delta log tfrac{nlog sigma }{delta log n}))</span> space. Moreover, the number of occurrences can be computed in <span>(O(m+log ^{2+epsilon }n))</span> time within <span>(O(delta log tfrac{nlog sigma }{delta log n}))</span> space. We also show that an extra sublogarithmic factor on top of this space enables optimal <span>(O(m+occ))</span> search time, whereas an extra logarithmic factor enables optimal <i>O</i>(<i>m</i>) counting time.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 4","pages":"1031 - 1056"},"PeriodicalIF":0.9,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135635197","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-06DOI: 10.1007/s00453-023-01184-2
Sumanta Ghosh, Rohit Gurjar, Roshan Raj
Given two matroids on the same ground set, the matroid intersection problem asks for a common base, i.e., a subset of the ground set that is a base in both the matroids. The weighted version of the problem asks for a common base with maximum weight. In the case of linearly representable matroids, the weighted version is known to have a randomized parallel (RNC) algorithm based on the isolation lemma, when the given weights are polynomially bounded (Narayanan et al. in SIAM J Comput 23(2): 387–397, 1994). Finding a deterministic parallel (NC) algorithm, even for the unweighted decision question, has been a long-standing open question. The above RNC algorithm can be viewed as a randomized reduction from weighted search to weighted decision, which works for arbitrary matroids. We derandomize this reduction, i.e., we give an NC algorithm for weighted matroid intersection search using oracle access to its decision version.
{"title":"A Deterministic Parallel Reduction from Weighted Matroid Intersection Search to Decision","authors":"Sumanta Ghosh, Rohit Gurjar, Roshan Raj","doi":"10.1007/s00453-023-01184-2","DOIUrl":"10.1007/s00453-023-01184-2","url":null,"abstract":"<div><p>Given two matroids on the same ground set, the matroid intersection problem asks for a common base, i.e., a subset of the ground set that is a base in both the matroids. The weighted version of the problem asks for a common base with maximum weight.\u0000 In the case of linearly representable matroids, the weighted version is known to have a randomized parallel (RNC) algorithm based on the isolation lemma, when the given weights are polynomially bounded (Narayanan et al. in SIAM J Comput 23(2): 387–397, 1994). Finding a deterministic parallel (NC) algorithm, even for the unweighted decision question, has been a long-standing open question. The above RNC algorithm can be viewed as a randomized reduction from weighted search to weighted decision, which works for arbitrary matroids. We derandomize this reduction, i.e., we give an NC algorithm for weighted matroid intersection search using oracle access to its decision version.</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 4","pages":"1057 - 1079"},"PeriodicalIF":0.9,"publicationDate":"2023-11-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135634097","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-04DOI: 10.1007/s00453-023-01179-z
Ishay Haviv
A subset of ([n] = {1,2,ldots ,n}) is called stable if it forms an independent set in the cycle on the vertex set [n]. In 1978, Schrijver proved via a topological argument that for all integers n and k with (n ge 2k), the family of stable k-subsets of [n] cannot be covered by (n-2k+1) intersecting families. We study two total search problems whose totality relies on this result. In the first problem, denoted by (textsc {Schrijver}(n,k,m)), we are given an access to a coloring of the stable k-subsets of [n] with (m = m(n,k)) colors, where (m le n-2k+1), and the goal is to find a pair of disjoint subsets that are assigned the same color. While for (m = n-2k+1) the problem is known to be (textsf{PPA})-complete, we prove that for (m < d cdot lfloor frac{n}{2k+d-2} rfloor ), with d being any fixed constant, the problem admits an efficient algorithm. For (m = lfloor n/2 rfloor -2k+1), we prove that the problem is efficiently reducible to the (textsc {Kneser}) problem. Motivated by the relation between the problems, we investigate the family of unstablek-subsets of [n], which might be of independent interest. In the second problem, called Unfair Independent Set in Cycle, we are given (ell ) subsets (V_1, ldots , V_ell ) of [n], where (ell le n-2k+1) and (|V_i| ge 2) for all (i in [ell ]), and the goal is to find a stable k-subset S of [n] satisfying the constraints (|S cap V_i| le |V_i|/2) for (i in [ell ]). We prove that the problem is (textsf{PPA})-complete and that its restriction to instances with (n=3k) is at least as hard as the Cycle plus Triangles problem, for which no efficient algorithm is known. On the contrary, we prove that there exists a constant c for which the restriction of the problem to instances with (n ge c cdot k) can be solved in polynomial time.
如果 ([n] = {1,2,ldots ,n})的一个子集在顶点集[n]的循环中形成了一个独立的集合,那么这个子集就叫做稳定子集。1978年,Schrijver通过拓扑论证证明,对于所有具有(n ge 2k)的整数n和k,[n]的稳定k子集的族不能被(n-2k+1)相交的族所覆盖。我们研究了两个全搜索问题,它们的整体性都依赖于这个结果。在第一个问题中,用 (textsc {Schrijver}(n,k,m) 表示,我们得到了[n]的稳定 k 子集的着色,有 (m = m(n,k)) 种颜色,其中 (m le n-2k+1),目标是找到一对被分配了相同颜色的不相交子集。虽然对于(m = n-2k+1)这个问题已知是(textsf{PPA})-不完全的,但是我们证明了对于(m < d cdot lfloor frac{n}{2k+d-2} rfloor ),d是任意固定的常数,这个问题允许一个有效的算法。对于(m = lfloor n/2 rfloor -2k+1),我们证明这个问题可以有效地还原为(textsc {Kneser})问题。受这两个问题之间关系的启发,我们研究了[n]的不稳定 k 子集族,这可能会引起我们的兴趣。第二个问题被称为循环中的不公平独立集(Unfair Independent Set in Cycle),我们给定了[n]的(V_1, ldots , V_ell )子集,其中(ell le n-2k+1)和(|V_i| ge 2)对于所有(i in [ell ])、我们的目标是找到[n]的一个稳定的k子集S,满足所有在[[ell]]中的(i)的约束条件(|(|S cap V_i| le |V_i|/2)。我们证明这个问题是(textsf{PPA})-完全的,并且它对具有(n=3k)的实例的限制至少和循环加三角形问题一样难,而对于循环加三角形问题还没有已知的高效算法。相反,我们证明了存在一个常数 c,对于这个常数,问题对 (n ge c cdot k) 的实例的限制可以在多项式时间内求解。
{"title":"On Finding Constrained Independent Sets in Cycles","authors":"Ishay Haviv","doi":"10.1007/s00453-023-01179-z","DOIUrl":"10.1007/s00453-023-01179-z","url":null,"abstract":"<div><p>A subset of <span>([n] = {1,2,ldots ,n})</span> is called stable if it forms an independent set in the cycle on the vertex set [<i>n</i>]. In 1978, Schrijver proved via a topological argument that for all integers <i>n</i> and <i>k</i> with <span>(n ge 2k)</span>, the family of stable <i>k</i>-subsets of [<i>n</i>] cannot be covered by <span>(n-2k+1)</span> intersecting families. We study two total search problems whose totality relies on this result. In the first problem, denoted by <span>(textsc {Schrijver}(n,k,m))</span>, we are given an access to a coloring of the stable <i>k</i>-subsets of [<i>n</i>] with <span>(m = m(n,k))</span> colors, where <span>(m le n-2k+1)</span>, and the goal is to find a pair of disjoint subsets that are assigned the same color. While for <span>(m = n-2k+1)</span> the problem is known to be <span>(textsf{PPA})</span>-complete, we prove that for <span>(m < d cdot lfloor frac{n}{2k+d-2} rfloor )</span>, with <i>d</i> being any fixed constant, the problem admits an efficient algorithm. For <span>(m = lfloor n/2 rfloor -2k+1)</span>, we prove that the problem is efficiently reducible to the <span>(textsc {Kneser})</span> problem. Motivated by the relation between the problems, we investigate the family of <i>unstable</i> <i>k</i>-subsets of [<i>n</i>], which might be of independent interest. In the second problem, called Unfair Independent Set in Cycle, we are given <span>(ell )</span> subsets <span>(V_1, ldots , V_ell )</span> of [<i>n</i>], where <span>(ell le n-2k+1)</span> and <span>(|V_i| ge 2)</span> for all <span>(i in [ell ])</span>, and the goal is to find a stable <i>k</i>-subset <i>S</i> of [<i>n</i>] satisfying the constraints <span>(|S cap V_i| le |V_i|/2)</span> for <span>(i in [ell ])</span>. We prove that the problem is <span>(textsf{PPA})</span>-complete and that its restriction to instances with <span>(n=3k)</span> is at least as hard as the Cycle plus Triangles problem, for which no efficient algorithm is known. On the contrary, we prove that there exists a constant <i>c</i> for which the restriction of the problem to instances with <span>(n ge c cdot k)</span> can be solved in polynomial time.\u0000</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 4","pages":"1006 - 1030"},"PeriodicalIF":0.9,"publicationDate":"2023-11-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135774563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2023-11-02DOI: 10.1007/s00453-023-01178-0
Leslie Ann Goldberg, Marc Roth
Given a class of graphs ({mathcal {H}}), the problem (oplus text {{Sub}}({mathcal {H}})) is defined as follows. The input is a graph (Hin {mathcal {H}}) together with an arbitrary graph G. The problem is to compute, modulo 2, the number of subgraphs of G that are isomorphic to H. The goal of this research is to determine for which classes ({mathcal {H}}) the problem (oplus text {{Sub}}({mathcal {H}})) is fixed-parameter tractable (FPT), i.e., solvable in time (f(|H|)cdot |G|^{O(1)}). Curticapean, Dell, and Husfeldt (ESA 2021) conjectured that (oplus text {{Sub}}({mathcal {H}})) is FPT if and only if the class of allowed patterns ({mathcal {H}}) is matching splittable, which means that for some fixed B, every (H in {mathcal {H}}) can be turned into a matching (a graph in which every vertex has degree at most 1) by removing at most B vertices. Assuming the randomised Exponential Time Hypothesis, we prove their conjecture for (I) all hereditary pattern classes ({mathcal {H}}), and (II) all tree pattern classes, i.e., all classes ({mathcal {H}}) such that every (Hin {mathcal {H}}) is a tree. We also establish almost tight fine-grained upper and lower bounds for the case of hereditary patterns (I).
给定一类图 ({mathcal {H}}),问题 (oplus text {{Sub}}({mathcal {H}}))定义如下。输入是一个图 (Hin {mathcal {H}})和一个任意图 G,问题是计算 G 中与 H 同构的子图的数量(模为 2)。本研究的目标是确定对于哪些类({mathcal {H}}),问题(oplus text {{Sub}}({mathcal {H}})是固定参数可处理的(FPT),即、(f(|H|)cdot|G|^{O(1)}/)内求解。Curticapean、Dell 和 Husfeldt(ESA 2021)猜想,当且仅当允许模式的类({mathcal {H}})是可匹配分裂的时候,(oplus text {{Sub}}({mathcal {H}}))才是 FPT、这意味着对于某个固定的 B,每一个({mathcal {H}} 中的 H)都可以通过移除最多 B 个顶点变成一个匹配图(其中每个顶点的度最多为 1)。假设随机指数时间假设成立,我们证明了他们的猜想:(I)所有遗传模式类(({mathcal {H}}) ,以及(II)所有树模式类,即所有类(({mathcal {H}}) ,使得每个(Hin {mathcal {H}}) 都是一棵树。我们还为遗传模式的情况(I)建立了几乎严密的细粒度上界和下界。
{"title":"Parameterised and Fine-Grained Subgraph Counting, Modulo 2","authors":"Leslie Ann Goldberg, Marc Roth","doi":"10.1007/s00453-023-01178-0","DOIUrl":"10.1007/s00453-023-01178-0","url":null,"abstract":"<div><p>Given a class of graphs <span>({mathcal {H}})</span>, the problem <span>(oplus text {{Sub}}({mathcal {H}}))</span> is defined as follows. The input is a graph <span>(Hin {mathcal {H}})</span> together with an arbitrary graph <i>G</i>. The problem is to compute, modulo 2, the number of subgraphs of <i>G</i> that are isomorphic to <i>H</i>. The goal of this research is to determine for which classes <span>({mathcal {H}})</span> the problem <span>(oplus text {{Sub}}({mathcal {H}}))</span> is fixed-parameter tractable (FPT), i.e., solvable in time <span>(f(|H|)cdot |G|^{O(1)})</span>. Curticapean, Dell, and Husfeldt (ESA 2021) conjectured that <span>(oplus text {{Sub}}({mathcal {H}}))</span> is FPT if and only if the class of allowed patterns <span>({mathcal {H}})</span> is <i>matching splittable</i>, which means that for some fixed <i>B</i>, every <span>(H in {mathcal {H}})</span> can be turned into a matching (a graph in which every vertex has degree at most 1) by removing at most <i>B</i> vertices. Assuming the randomised Exponential Time Hypothesis, we prove their conjecture for (I) all hereditary pattern classes <span>({mathcal {H}})</span>, and (II) all tree pattern classes, i.e., all classes <span>({mathcal {H}})</span> such that every <span>(Hin {mathcal {H}})</span> is a tree. We also establish almost tight fine-grained upper and lower bounds for the case of hereditary patterns (I).</p></div>","PeriodicalId":50824,"journal":{"name":"Algorithmica","volume":"86 4","pages":"944 - 1005"},"PeriodicalIF":0.9,"publicationDate":"2023-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00453-023-01178-0.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135936342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}