首页 > 最新文献

ACM Transactions on Algorithms最新文献

英文 中文
PTAS for Sparse General-valued CSPs 稀疏一般值csp的PTAS
IF 1.3 3区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-03-09 DOI: https://dl.acm.org/doi/10.1145/3569956
Balázs F. Mezei, Marcin Wrochna, stanislav Živný

We study polynomial-time approximation schemes (PTASes) for constraint satisfaction problems (CSPs) such as Maximum Independent Set or Minimum Vertex Cover on sparse graph classes.

Baker’s approach gives a PTAS on planar graphs, excluded-minor classes, and beyond. For Max-CSPs, and even more generally, maximisation finite-valued CSPs (where constraints are arbitrary non-negative functions), Romero, Wrochna, and Živný [SODA’21] showed that the Sherali-Adams LP relaxation gives a simple PTAS for all fractionally-treewidth-fragile classes, which is the most general “sparsity” condition for which a PTAS is known. We extend these results to general-valued CSPs, which include “crisp” (or “strict”) constraints that have to be satisfied by every feasible assignment. The only condition on the crisp constraints is that their domain contains an element that is at least as feasible as all the others (but possibly less valuable).

For minimisation general-valued CSPs with crisp constraints, we present a PTAS for all Baker graph classes—a definition by Dvořák [SODA’20] that encompasses all classes where Baker’s technique is known to work, except for fractionally-treewidth-fragile classes. While this is standard for problems satisfying a certain monotonicity condition on crisp constraints, we show this can be relaxed to diagonalisability—a property of relational structures connected to logics, statistical physics, and random CSPs.

本文研究了稀疏图类上最大独立集或最小顶点覆盖等约束满足问题的多项式时间逼近格式(PTASes)。Baker的方法给出了平面图、排除次要类以及其他的PTAS。对于max - csp,甚至更一般地,最大化有限值csp(其中约束是任意的非负函数),Romero, Wrochna和Živný [SODA ' 21]表明sherli - adams LP松弛给出了所有分数树宽脆弱类的简单PTAS,这是PTAS已知的最一般的“稀疏性”条件。我们将这些结果扩展到一般值csp,它包含了“清晰的”(或“严格的”)约束,每个可行的分配都必须满足这些约束。明确约束的唯一条件是,它们的领域包含的元素至少与所有其他元素一样可行(但可能不那么有价值)。为了最小化具有清晰约束的一般值csp,我们提出了所有Baker图类的PTAS -一个由Dvořák [SODA ' 20]定义的定义,它包含了除了分数树宽脆弱类之外,Baker技术已知有效的所有类。虽然这是在明确约束条件下满足一定单调性条件的问题的标准,但我们表明,这可以放宽为对角性——与逻辑、统计物理和随机csp相关的关系结构的属性。
{"title":"PTAS for Sparse General-valued CSPs","authors":"Balázs F. Mezei, Marcin Wrochna, stanislav Živný","doi":"https://dl.acm.org/doi/10.1145/3569956","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3569956","url":null,"abstract":"<p>We study polynomial-time approximation schemes (PTASes) for constraint satisfaction problems (CSPs) such as Maximum Independent Set or Minimum Vertex Cover on sparse graph classes. </p><p>Baker’s approach gives a PTAS on planar graphs, excluded-minor classes, and beyond. For Max-CSPs, and even more generally, maximisation finite-valued CSPs (where constraints are arbitrary non-negative functions), Romero, Wrochna, and Živný [SODA’21] showed that the Sherali-Adams LP relaxation gives a simple PTAS for all fractionally-treewidth-fragile classes, which is the most general “sparsity” condition for which a PTAS is known. We extend these results to general-valued CSPs, which include “crisp” (or “strict”) constraints that have to be satisfied by every feasible assignment. The only condition on the crisp constraints is that their domain contains an element that is at least as feasible as all the others (but possibly less valuable).</p><p>For minimisation general-valued CSPs with crisp constraints, we present a PTAS for all <i>Baker</i> graph classes—a definition by Dvořák [SODA’20] that encompasses all classes where Baker’s technique is known to work, except for fractionally-treewidth-fragile classes. While this is standard for problems satisfying a certain monotonicity condition on crisp constraints, we show this can be relaxed to <i>diagonalisability</i>—a property of relational structures connected to logics, statistical physics, and random CSPs.</p>","PeriodicalId":50922,"journal":{"name":"ACM Transactions on Algorithms","volume":"8 3","pages":""},"PeriodicalIF":1.3,"publicationDate":"2023-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138494890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximation Schemes for Capacitated Vehicle Routing on Graphs of Bounded Treewidth, Bounded Doubling, or Highway Dimension 有界树宽图、有界加倍图或公路维图上有能力车辆路线的近似方案
IF 1.3 3区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-03-09 DOI: https://dl.acm.org/doi/10.1145/3582500
Aditya Jayaprakash, Mohammad R. Salavatipour

In this article, we present Approximation Schemes for Capacitated Vehicle Routing Problem (CVRP) on several classes of graphs. In CVRP, introduced by Dantzig and Ramser in 1959 [14], we are given a graph G=(V,E) with metric edges costs, a depot rV, and a vehicle of bounded capacity Q. The goal is to find a minimum cost collection of tours for the vehicle that returns to the depot, each visiting at most Q nodes, such that they cover all the nodes. This generalizes classic TSP and has been studied extensively. In the more general setting, each node v has a demand dv and the total demand of each tour must be no more than Q. Either the demand of each node must be served by one tour (unsplittable) or can be served by multiple tours (splittable). The best-known approximation algorithm for general graphs has ratio α +2(1-ε) (for the unsplittable) and α +1-ε (for the splittable) for some fixed (ε gt frac{1}{3000}), where α is the best approximation for TSP. Even for the case of trees, the best approximation ratio is 4/3 [5] and it has been an open question if there is an approximation scheme for this simple class of graphs. Das and Mathieu [15] presented an approximation scheme with time nlogO(1/ε)n for Euclidean plane ℝ2. No other approximation scheme is known for any other class of metrics (without further restrictions on Q). In this article, we make significant progress on this classic problem by presenting Quasi-Polynomial Time Approximation Schemes (QPTAS) for graphs of bounded treewidth, graphs of bounded highway dimensions, and graphs of bounded doubling dimensions. For comparison, our result implies an approximation scheme for the Euclidean plane with run time nO(log6n/ε5).

在这篇文章中,我们在几类图上给出了有能力车辆路径问题(CVRP)的近似格式。在Dantzig和Ramser于1959年引入的CVRP中[14],我们给出一个具有度量边成本的图G=(V,E),一个仓库r∈V,以及一辆容量Q有限的车辆,目标是为返回仓库的车辆找到一个最小成本集合,每次访问最多Q个节点,使它们覆盖所有节点。这是对经典TSP的推广,并得到了广泛的研究。在更一般的情况下,每个节点v都有一个需求dv,并且每次行程的总需求必须不超过q。每个节点的需求要么必须由一个行程来满足(不可分割),要么可以由多个行程来满足(可分割)。对于一些固定的(ε gt frac{1}{3000}),最著名的一般图的近似算法具有比值α +2(1-ε)(对于不可分)和α +1-ε(对于可分),其中α是TSP的最佳近似。即使对于树的情况,最好的近似比也是4/3[5],对于这类简单的图是否存在近似方案一直是一个悬而未决的问题。Das和Mathieu[15]给出了时间为nlogO(1/ε)n的欧几里得平面的近似格式。对于任何其他类型的度量(没有对Q的进一步限制),没有已知的其他近似方案。在本文中,我们通过提出有界树宽图、有界公路维图和有界加倍维图的拟多项式时间近似方案(QPTAS),在这个经典问题上取得了重大进展。为了比较,我们的结果暗示了运行时间为nO(log6n/ε5)的欧几里得平面的近似方案。
{"title":"Approximation Schemes for Capacitated Vehicle Routing on Graphs of Bounded Treewidth, Bounded Doubling, or Highway Dimension","authors":"Aditya Jayaprakash, Mohammad R. Salavatipour","doi":"https://dl.acm.org/doi/10.1145/3582500","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3582500","url":null,"abstract":"<p>In this article, we present Approximation Schemes for Capacitated Vehicle Routing Problem (CVRP) on several classes of graphs. In CVRP, introduced by Dantzig and Ramser in 1959 [14], we are given a graph <i>G=(V,E)</i> with metric edges costs, a depot <i>r</i> ∈ <i>V</i>, and a vehicle of bounded capacity <i>Q</i>. The goal is to find a minimum cost collection of tours for the vehicle that returns to the depot, each visiting at most <i>Q</i> nodes, such that they cover all the nodes. This generalizes classic TSP and has been studied extensively. In the more general setting, each node <i>v</i> has a demand <i>d<sub>v</sub></i> and the total demand of each tour must be no more than <i>Q</i>. Either the demand of each node must be served by one tour (unsplittable) or can be served by multiple tours (splittable). The best-known approximation algorithm for general graphs has ratio α +2(1-ε) (for the unsplittable) and α +1-ε (for the splittable) for some fixed (ε gt frac{1}{3000}), where α is the best approximation for TSP. Even for the case of trees, the best approximation ratio is 4/3 [5] and it has been an open question if there is an approximation scheme for this simple class of graphs. Das and Mathieu [15] presented an approximation scheme with time <i>n</i><sup>log<sup>O(1/ε)</sup>n</sup> for Euclidean plane ℝ<sup>2</sup>. No other approximation scheme is known for any other class of metrics (without further restrictions on <i>Q</i>). In this article, we make significant progress on this classic problem by presenting Quasi-Polynomial Time Approximation Schemes (QPTAS) for graphs of bounded treewidth, graphs of bounded highway dimensions, and graphs of bounded doubling dimensions. For comparison, our result implies an approximation scheme for the Euclidean plane with run time <i>n<sup>O(log<sup>6</sup>n/ε<sup>5</sup>)</sup></i>.</p>","PeriodicalId":50922,"journal":{"name":"ACM Transactions on Algorithms","volume":"8 8","pages":""},"PeriodicalIF":1.3,"publicationDate":"2023-03-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138494875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Approximating (k,ℓ)-Median Clustering for Polygonal Curves 多边形曲线的近似(k, r)-中位数聚类
IF 1.3 3区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-02-23 DOI: https://dl.acm.org/doi/10.1145/3559764
Maike Buchin, Anne Driemel, Dennis Rohde

In 2015, Driemel, Krivošija, and Sohler introduced the k,ℓ-median clustering problem for polygonal curves under the Fréchet distance. Given a set of input curves, the problem asks to find k median curves of at most ℓ vertices each that minimize the sum of Fréchet distances over all input curves to their closest median curve. A major shortcoming of their algorithm is that the input curves are restricted to lie on the real line. In this article, we present a randomized bicriteria-approximation algorithm that works for polygonal curves in ℝd and achieves approximation factor (1+ɛ) with respect to the clustering costs. The algorithm has worst-case running time linear in the number of curves, polynomial in the maximum number of vertices per curve (i.e., their complexity), and exponential in d, ℓ, 1/ɛ and 1/δ (i.e., the failure probability). We achieve this result through a shortcutting lemma, which guarantees the existence of a polygonal curve with similar cost as an optimal median curve of complexity ℓ, but of complexity at most 2ℓ -2, and whose vertices can be computed efficiently. We combine this lemma with the superset sampling technique by Kumar et al. to derive our clustering result. In doing so, we describe and analyze a generalization of the algorithm by Ackermann et al., which may be of independent interest.

2015年,Driemel, Krivošija, and Sohler提出了fr切距离下多边形曲线的k, r -中位数聚类问题。给定一组输入曲线,该问题要求找到k个最多有r个顶点的中值曲线,每个顶点使所有输入曲线到最近的中值曲线的距离之和最小。该算法的一个主要缺点是输入曲线被限制在实线上。在本文中,我们提出了一种随机双准则逼近算法,该算法适用于多项式曲线,并获得了关于聚类成本的近似因子(1+ æ)。该算法的最坏情况运行时间在曲线数量上呈线性,在每条曲线的最大顶点数上呈多项式(即它们的复杂性),在d, r, 1/ r和1/δ上呈指数(即失效概率)。我们通过一个捷径引理得到了这一结果,该引理保证存在一个多边形曲线,其代价与复杂度为l的最优中值曲线相似,但复杂度不超过2 l -2,并且其顶点可以有效地计算。我们将这个引理与Kumar等人的超集抽样技术结合起来,得出我们的聚类结果。在此过程中,我们描述和分析了Ackermann等人对算法的推广,这可能是独立的兴趣。
{"title":"Approximating (k,ℓ)-Median Clustering for Polygonal Curves","authors":"Maike Buchin, Anne Driemel, Dennis Rohde","doi":"https://dl.acm.org/doi/10.1145/3559764","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3559764","url":null,"abstract":"<p>In 2015, Driemel, Krivošija, and Sohler introduced the <i>k,ℓ</i>-median clustering problem for polygonal curves under the Fréchet distance. Given a set of input curves, the problem asks to find <i>k</i> median curves of at most ℓ vertices each that minimize the sum of Fréchet distances over all input curves to their closest median curve. A major shortcoming of their algorithm is that the input curves are restricted to lie on the real line. In this article, we present a randomized bicriteria-approximation algorithm that works for polygonal curves in ℝ<i><sup>d</sup></i> and achieves approximation factor (1+ɛ) with respect to the clustering costs. The algorithm has worst-case running time linear in the number of curves, polynomial in the maximum number of vertices per curve (i.e., their complexity), and exponential in <i>d</i>, ℓ, 1/ɛ and 1/δ (i.e., the failure probability). We achieve this result through a shortcutting lemma, which guarantees the existence of a polygonal curve with similar cost as an optimal median curve of complexity ℓ, but of complexity at most 2ℓ -2, and whose vertices can be computed efficiently. We combine this lemma with the superset sampling technique by Kumar et al. to derive our clustering result. In doing so, we describe and analyze a generalization of the algorithm by Ackermann et al., which may be of independent interest.</p>","PeriodicalId":50922,"journal":{"name":"ACM Transactions on Algorithms","volume":"8 9","pages":""},"PeriodicalIF":1.3,"publicationDate":"2023-02-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138494874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online Metric Algorithms with Untrusted Predictions 带有不可信预测的在线度量算法
IF 1.3 3区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-02-22 DOI: https://dl.acm.org/doi/10.1145/3582689
Antonios Antoniadis, Christian Coester, Marek Eliáš, Adam Polak, Bertrand Simon

Machine-learned predictors, although achieving very good results for inputs resembling training data, cannot possibly provide perfect predictions in all situations. Still, decision-making systems that are based on such predictors need not only benefit from good predictions, but should also achieve a decent performance when the predictions are inadequate. In this paper, we propose a prediction setup for arbitrary metrical task systems (MTS)(e.g., caching, k-server and convex body chasing) and online matching on the line. We utilize results from the theory of online algorithms to show how to make the setup robust. Specifically for caching, we present an algorithm whose performance, as a function of the prediction error, is exponentially better than what is achievable for general MTS. Finally, we present an empirical evaluation of our methods on real world datasets, which suggests practicality.

机器学习的预测器虽然在类似训练数据的输入上取得了很好的结果,但不可能在所有情况下都提供完美的预测。尽管如此,基于这些预测器的决策系统不仅需要从良好的预测中受益,而且在预测不足的情况下也应该取得不错的表现。在本文中,我们提出了一种任意测量任务系统(MTS)的预测设置。(缓存,k-server和凸体追踪)和在线匹配。我们利用在线算法理论的结果来说明如何使设置具有鲁棒性。特别是对于缓存,我们提出了一种算法,其性能(作为预测误差的函数)指数优于一般MTS。最后,我们在现实世界的数据集上对我们的方法进行了经验评估,这表明了实用性。
{"title":"Online Metric Algorithms with Untrusted Predictions","authors":"Antonios Antoniadis, Christian Coester, Marek Eliáš, Adam Polak, Bertrand Simon","doi":"https://dl.acm.org/doi/10.1145/3582689","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3582689","url":null,"abstract":"<p>Machine-learned predictors, although achieving very good results for inputs resembling training data, cannot possibly provide perfect predictions in all situations. Still, decision-making systems that are based on such predictors need not only benefit from good predictions, but should also achieve a decent performance when the predictions are inadequate. In this paper, we propose a prediction setup for arbitrary <i>metrical task systems (MTS)</i>\u0000(e.g., <i>caching</i>, <i><i>k</i>-server</i> and <i>convex body chasing</i>) and <i>online matching on the line</i>. We utilize results from the theory of online algorithms to show how to make the setup robust. Specifically for caching, we present an algorithm whose performance, as a function of the prediction error, is exponentially better than what is achievable for general MTS. Finally, we present an empirical evaluation of our methods on real world datasets, which suggests practicality.</p>","PeriodicalId":50922,"journal":{"name":"ACM Transactions on Algorithms","volume":"8 10","pages":""},"PeriodicalIF":1.3,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138494873","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Online Throughput Maximization on Unrelated Machines: Commitment is No Burden 无关机器上的在线吞吐量最大化:承诺是没有负担的
IF 1.3 3区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-02-20 DOI: https://dl.acm.org/doi/10.1145/3569582
Franziska Eberle, Nicole Megow, Kevin Schewior

We consider a fundamental online scheduling problem in which jobs with processing times and deadlines arrive online over time at their release dates. The task is to determine a feasible preemptive schedule on a single or multiple possibly unrelated machines that maximizes the number of jobs that complete before their deadline. Due to strong impossibility results for competitive analysis on a single machine, we require that jobs contain some slack ɛ > 0, which means that the feasible time window for scheduling a job is at least 1+ɛ times its processing time on each eligible machine. Our contribution is two-fold: (i) We give the first non-trivial online algorithms for throughput maximization on unrelated machines, and (ii), this is the main focus of our paper, we answer the question on how to handle commitment requirements which enforce that a scheduler has to guarantee at a certain point in time the completion of admitted jobs. This is very relevant, e.g., in providing cloud-computing services, and disallows last-minute rejections of critical tasks. We present an algorithm for unrelated machines that is (Theta (frac{1}{varepsilon }))-competitive when the scheduler must commit upon starting a job. Somewhat surprisingly, this is the same optimal performance bound (up to constants) as for scheduling without commitment on a single machine. If commitment decisions must be made before a job’s slack becomes less than a δ-fraction of its size, we prove a competitive ratio of (mathcal {O}(frac{1}{varepsilon - delta })) for 0 < δ < ɛ. This result nicely interpolates between commitment upon starting a job and commitment upon arrival. For the latter commitment model, it is known that no (randomized) online algorithm admits any bounded competitive ratio. While we mainly focus on scheduling without migration, our results also hold when comparing against a migratory optimal solution in case of identical machines.

我们考虑一个基本的在线调度问题,其中具有处理时间和截止日期的作业随着时间的推移在其发布日期在线到达。任务是在单个或多个可能不相关的机器上确定一个可行的抢占调度,以最大化在截止日期前完成的作业数量。由于在单台机器上进行竞争分析的结果非常不可能,我们要求作业中包含一些松弛系数&gt;0,这意味着调度作业的可行时间窗口至少是每台符合条件的机器上作业处理时间的1+ 1倍。我们的贡献是双重的:(i)我们给出了第一个非平凡的在线算法,用于在不相关的机器上实现吞吐量最大化,(ii),这是我们论文的主要焦点,我们回答了如何处理承诺要求的问题,这些要求强制调度程序必须保证在某个时间点完成所接受的工作。这是非常相关的,例如,在提供云计算服务时,不允许最后一刻拒绝关键任务。我们提出了一个不相关机器的算法,当调度程序必须在开始工作时提交时,该算法是(Theta (frac{1}{varepsilon }))竞争的。有点令人惊讶的是,这与在单个机器上进行无承诺调度的最佳性能界限(不超过常量)相同。如果必须在工作的闲置量小于其规模的δ-分数之前做出承诺决策,我们证明了0 &lt的竞争比为(mathcal {O}(frac{1}{varepsilon - delta }));δ &lt;[au:]这个结果很好地反映了开始工作时的承诺和到达工作岗位时的承诺。对于后一种承诺模型,我们知道没有(随机)在线算法允许有界竞争比。虽然我们主要关注的是不迁移的调度,但在相同机器的情况下,与迁移最优解决方案进行比较时,我们的结果也成立。
{"title":"Online Throughput Maximization on Unrelated Machines: Commitment is No Burden","authors":"Franziska Eberle, Nicole Megow, Kevin Schewior","doi":"https://dl.acm.org/doi/10.1145/3569582","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3569582","url":null,"abstract":"<p>We consider a fundamental online scheduling problem in which jobs with processing times and deadlines arrive online over time at their release dates. The task is to determine a feasible preemptive schedule on a single or multiple possibly unrelated machines that maximizes the number of jobs that complete before their deadline. Due to strong impossibility results for competitive analysis on a single machine, we require that jobs contain some <i>slack</i> ɛ &gt; 0, which means that the feasible time window for scheduling a job is at least 1+ɛ times its processing time on each eligible machine. Our contribution is two-fold: (i) We give the first non-trivial online algorithms for throughput maximization on unrelated machines, and (ii), this is the main focus of our paper, we answer the question on how to handle commitment requirements which enforce that a scheduler has to guarantee at a certain point in time the completion of admitted jobs. This is very relevant, e.g., in providing cloud-computing services, and disallows last-minute rejections of critical tasks. We present an algorithm for unrelated machines that is (Theta (frac{1}{varepsilon }))-competitive when the scheduler must commit upon starting a job. Somewhat surprisingly, this is the same optimal performance bound (up to constants) as for scheduling without commitment on a single machine. If commitment decisions must be made before a job’s slack becomes less than a δ-fraction of its size, we prove a competitive ratio of (mathcal {O}(frac{1}{varepsilon - delta })) for 0 &lt; δ &lt; ɛ. This result nicely interpolates between commitment upon starting a job and commitment upon arrival. For the latter commitment model, it is known that no (randomized) online algorithm admits any bounded competitive ratio. While we mainly focus on scheduling without migration, our results also hold when comparing against a migratory optimal solution in case of identical machines.</p>","PeriodicalId":50922,"journal":{"name":"ACM Transactions on Algorithms","volume":"1 4","pages":""},"PeriodicalIF":1.3,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138494869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Competitive Algorithms for Generalized k-Server in Uniform Metrics 统一度量下广义k-Server的竞争算法
IF 1.3 3区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-02-20 DOI: https://dl.acm.org/doi/10.1145/3568677
Nikhil Bansal, Marek Eliáš, Grigorios Koumoutsos, Jesper Nederlof

The generalized k-server problem is a far-reaching extension of the k-server problem with several applications. Here, each server si lies in its own metric space Mi. A request is a k-tuple r = (r1,r2,… ,rk, which is served by moving some server si to the point ri ∈ Mi, and the goal is to minimize the total distance traveled by the servers. Despite much work, no f(k)-competitive algorithm is known for the problem for k > 2 servers, even for special cases such as uniform metrics and lines.

Here, we consider the problem in uniform metrics and give the first f(k)-competitive algorithms for general k. In particular, we obtain deterministic and randomized algorithms with competitive ratio k · 2k and O(k3 log k), respectively. Our deterministic bound is based on a novel application of the polynomial method to online algorithms, and essentially matches the long-known lower bound of 2k-1. We also give a 22O(k)-competitive deterministic algorithm for weighted uniform metrics, which also essentially matches the recent doubly exponential lower bound for the problem.

广义k-服务器问题是k-服务器问题的延伸,具有多种应用。这里,每个服务器si都位于自己的度量空间Mi中。请求是一个k元组r = (r1,r2,…,rk,通过将一些服务器si移动到点ri∈Mi来提供服务,目标是最小化服务器走过的总距离。尽管做了很多工作,但对于k >的问题,没有已知的f(k)竞争算法;2个服务器,即使在特殊情况下,如统一的指标和线路。在这里,我们考虑了统一度量下的问题,并给出了一般k的第一个f(k)竞争算法。特别是,我们分别获得了竞争比为k·2k和O(k3 log k)的确定性和随机算法。我们的确定性界是基于多项式方法在在线算法中的新应用,并且基本上与长期已知的2k-1下界相匹配。我们还给出了一个22O(k)竞争的加权一致度量的确定性算法,它也基本上与最近的问题的双指数下界相匹配。
{"title":"Competitive Algorithms for Generalized k-Server in Uniform Metrics","authors":"Nikhil Bansal, Marek Eliáš, Grigorios Koumoutsos, Jesper Nederlof","doi":"https://dl.acm.org/doi/10.1145/3568677","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3568677","url":null,"abstract":"<p>The generalized <i>k</i>-server problem is a far-reaching extension of the <i>k</i>-server problem with several applications. Here, each server <i>s<sub>i</sub></i> lies in its own metric space <i>M<sub>i</sub></i>. A request is a <i>k</i>-tuple <i>r</i> = (<i>r</i><sub>1</sub>,<i>r</i><sub>2</sub>,… ,<i>r<sub>k</sub></i>, which is served by moving some server <i>s<sub>i</sub></i> to the point <i>r<sub>i</sub> ∈ M<sub>i</sub></i>, and the goal is to minimize the total distance traveled by the servers. Despite much work, no <i>f</i>(<i>k</i>)-competitive algorithm is known for the problem for <i>k</i> &gt; 2 servers, even for special cases such as uniform metrics and lines.</p><p>Here, we consider the problem in uniform metrics and give the first <i>f</i>(<i>k</i>)-competitive algorithms for general <i>k</i>. In particular, we obtain deterministic and randomized algorithms with competitive ratio <i>k</i> · 2<i><sup>k</sup></i> and <i>O</i>(<i>k</i><sup>3</sup> log <i>k</i>), respectively. Our deterministic bound is based on a novel application of the polynomial method to online algorithms, and essentially matches the long-known lower bound of 2<i><sup>k</sup></i>-1. We also give a 2<sup>2<sup><i>O(k)</i></sup></sup>-competitive deterministic algorithm for weighted uniform metrics, which also essentially matches the recent doubly exponential lower bound for the problem.</p>","PeriodicalId":50922,"journal":{"name":"ACM Transactions on Algorithms","volume":"1 3","pages":""},"PeriodicalIF":1.3,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138494870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Monotone Edge Flips to an Orientation of Maximum Edge-Connectivity à la Nash-Williams 单调边翻转到最大边连通性方向(la Nash-Williams)
IF 1.3 3区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-02-20 DOI: https://dl.acm.org/doi/10.1145/3561302
Takehiro Ito, Yuni Iwamasa, Naonori Kakimura, Naoyuki Kamiyama, Yusuke Kobayashi, Shun-Ichi Maezawa, Yuta Nozaki, Yoshio Okamoto, Kenta Ozeki

We initiate the study of k-edge-connected orientations of undirected graphs through edge flips for k ≥ 2. We prove that in every orientation of an undirected 2k-edge-connected graph, there exists a sequence of edges such that flipping their directions one by one does not decrease the edge connectivity, and the final orientation is k-edge connected. This yields an “edge-flip based” new proof of Nash-Williams’ theorem: A undirected graph G has a k-edge-connected orientation if and only if G is 2k-edge connected. As another consequence of the theorem, we prove that the edge-flip graph of k-edge-connected orientations of an undirected graph G is connected if G is (2k+2)-edge connected. This has been known to be true only when k=1.

研究了k≥2时无向图通过边翻转的k边连通方向。证明了在无向的2k边连通图的每一个方向上,存在一个边序列,使得逐个翻转它们的方向不降低边的连通性,最终的方向是k边连通的。这产生了一个“基于边翻转”的纳什-威廉姆斯定理的新证明:无向图G具有k边连通的方向当且仅当G是2k边连通的。作为定理的另一个结论,我们证明了无向图G的k边连通方向的边翻转图是连通的,如果G是(2k+2)-边连通。这只在k=1时成立。
{"title":"Monotone Edge Flips to an Orientation of Maximum Edge-Connectivity à la Nash-Williams","authors":"Takehiro Ito, Yuni Iwamasa, Naonori Kakimura, Naoyuki Kamiyama, Yusuke Kobayashi, Shun-Ichi Maezawa, Yuta Nozaki, Yoshio Okamoto, Kenta Ozeki","doi":"https://dl.acm.org/doi/10.1145/3561302","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3561302","url":null,"abstract":"<p>We initiate the study of <i>k</i>-edge-connected orientations of undirected graphs through edge flips for <i>k</i> ≥ 2. We prove that in every orientation of an undirected <i>2k</i>-edge-connected graph, there exists a sequence of edges such that flipping their directions one by one does not decrease the edge connectivity, and the final orientation is <i>k</i>-edge connected. This yields an “edge-flip based” new proof of Nash-Williams’ theorem: A undirected graph <i>G</i> has a <i>k</i>-edge-connected orientation if and only if <i>G</i> is <i>2k</i>-edge connected. As another consequence of the theorem, we prove that the edge-flip graph of <i>k</i>-edge-connected orientations of an undirected graph <i>G</i> is connected if <i>G</i> is <i>(2k+2)</i>-edge connected. This has been known to be true only when <i>k=1</i>.</p>","PeriodicalId":50922,"journal":{"name":"ACM Transactions on Algorithms","volume":"1 2","pages":""},"PeriodicalIF":1.3,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138494871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Linear-Time n0.4-Approximation for Longest Common Subsequence 最长公共子序列的线性时间n0.4逼近
IF 1.3 3区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-02-20 DOI: https://dl.acm.org/doi/10.1145/3568398
Karl Bringmann, Vincent Cohen-Addad, Debarati Das

We consider the classic problem of computing the Longest Common Subsequence (LCS) of two strings of length n. The 40-year-old quadratic-time dynamic programming algorithm has recently been shown to be near-optimal by Abboud, Backurs, and Vassilevska Williams [FOCS’15] and Bringmann and Künnemann [FOCS’15] assuming the Strong Exponential Time Hypothesis. This has led the community to look for subquadratic approximation algorithms for the problem.

Yet, unlike the edit distance problem for which a constant-factor approximation in almost-linear time is known, very little progress has been made on LCS, making it a notoriously difficult problem also in the realm of approximation. For the general setting, only a naive O(nɛ/2-approximation algorithm with running time (n2-ɛ has been known, for any constant 0 < ɛ ≤ 1. Recently, a breakthrough result by Hajiaghayi, Seddighin, Seddighin, and Sun [SODA’19] provided a linear-time algorithm that yields a O(n0.497956-approximation in expectation; improving upon the naive (O(sqrt {n}))-approximation for the first time.

In this paper, we provide an algorithm that in time O(n2-ɛ) computes an (n2ɛ/5-approximation with high probability, for any 0 < ɛ ≤ 1. Our result (1) gives an (n0.4-approximation in linear time, improving upon the bound of Hajiaghayi, Seddighin, Seddighin, and Sun, (2) provides an algorithm whose approximation scales with any subquadratic running time O(n2-ɛ), improving upon the naive bound of O(nɛ/2) for any ɛ, and (3) instead of only in expectation, succeeds with high probability.

我们考虑计算两个长度为n的字符串的最长公共子序列(LCS)的经典问题。Abboud, Backurs, and Vassilevska Williams [FOCS ' 15]和Bringmann and k nnemann [FOCS ' 15]最近证明了40年前的二次时间动态规划算法在强指数时间假设下是接近最优的。这使得社区开始寻找针对该问题的次二次逼近算法。然而,与编辑距离问题不同的是,在几乎线性时间内已知的常因子近似值,LCS几乎没有取得进展,这使得它在近似值领域也是一个众所周知的难题。对于一般设置,对于任意常数0 &lt,只有已知的运行时间为OŠ(n2- æ)的朴素O(n æ /2)近似算法;(1)最近,Hajiaghayi, Seddighin, Seddighin和Sun [SODA ' 19]的突破性成果提供了一种线性时间算法,该算法在期望上产生O(n0.497956)近似值;第一次改进了朴素的(O(sqrt {n})) -近似。在本文中,我们提供了一种算法,该算法在时间O(n2- æ)内对任意0 &lt,以高概率计算出OŠ(n2 æ /5)近似;(1)我们的结果(1)给出了线性时间内的OŠ(n0.4)近似,改进了Hajiaghayi, Seddighin, Seddighin和Sun的界;(2)提供了一个算法,其近似尺度为任意次二次运行时间O(n2- æ),改进了任意æ的O(n æ /2)的naive界;(3)而不是仅在期望中,以高概率成功。
{"title":"A Linear-Time n0.4-Approximation for Longest Common Subsequence","authors":"Karl Bringmann, Vincent Cohen-Addad, Debarati Das","doi":"https://dl.acm.org/doi/10.1145/3568398","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3568398","url":null,"abstract":"<p>We consider the classic problem of computing the <b>Longest Common Subsequence (LCS)</b> of two strings of length <i>n</i>. The 40-year-old quadratic-time dynamic programming algorithm has recently been shown to be near-optimal by Abboud, Backurs, and Vassilevska Williams [FOCS’15] and Bringmann and Künnemann [FOCS’15] assuming the Strong Exponential Time Hypothesis. This has led the community to look for subquadratic <i>approximation</i> algorithms for the problem.</p><p>Yet, unlike the edit distance problem for which a constant-factor approximation in almost-linear time is known, very little progress has been made on LCS, making it a notoriously difficult problem also in the realm of approximation. For the general setting, only a naive <i>O</i>(<i>n</i><sup>ɛ</sup>/2-approximation algorithm with running time <i>OŠ</i>(<i>n<sup>2-ɛ</sup></i> has been known, for any constant 0 &lt; ɛ ≤ 1. Recently, a breakthrough result by Hajiaghayi, Seddighin, Seddighin, and Sun [SODA’19] provided a linear-time algorithm that yields a <i>O</i>(<i>n</i><sup>0.497956</sup>-approximation in expectation; improving upon the naive (O(sqrt {n}))-approximation for the first time.</p><p>In this paper, we provide an algorithm that in time <i>O</i>(<i>n</i><sub>2-ɛ</sub>) computes an <i>OŠ</i>(<i>n<sup>2ɛ/5</sup></i>-approximation with high probability, for any 0 &lt; ɛ ≤ 1. Our result (1) gives an <i>OŠ</i>(<i>n</i><sup>0.4</sup>-approximation in linear time, improving upon the bound of Hajiaghayi, Seddighin, Seddighin, and Sun, (2) provides an algorithm whose approximation scales with any subquadratic running time <i>O</i>(<i>n</i><sup>2-ɛ</sup>), improving upon the naive bound of <i>O</i>(<i>n</i><sup>ɛ/2</sup>) for any ɛ, and (3) instead of only in expectation, succeeds with high probability.</p>","PeriodicalId":50922,"journal":{"name":"ACM Transactions on Algorithms","volume":"46 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138516990","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Counting Homomorphic Cycles in Degenerate Graphs 退化图中同态环的计数
IF 1.3 3区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-02-20 DOI: https://dl.acm.org/doi/10.1145/3560820
Lior Gishboliner, Yevgeny Levanzov, Asaf Shapira, Raphael Yuster

Since counting subgraphs in general graphs is, by and large, a computationally demanding problem, it is natural to try and design fast algorithms for restricted families of graphs. One such family that has been extensively studied is that of graphs of bounded degeneracy (e.g., planar graphs). This line of work, which started in the early 80’s, culminated in a recent work of Gishboliner et al., which highlighted the importance of the task of counting homomorphic copies of cycles (i.e., cyclic walks) in graphs of bounded degeneracy.

Our main result in this paper is a surprisingly tight relation between the above task and the well-studied problem of detecting (standard) copies of directed cycles in general directed graphs. More precisely, we prove the following:

  • One can compute the number of homomorphic copies of C2k and C2k+1 in n-vertex graphs of bounded degeneracy in time Õ(ndk), where the fastest known algorithm for detecting directed copies of Ck in general m-edge digraphs runs in time Õ(mdk).

  • Conversely, one can transform any O(nbk) algorithm for computing the number of homomorphic copies of C2k or of C2k+1 in n-vertex graphs of bounded degeneracy, into an Õ(mbk) time algorithm for detecting directed copies of Ck in general m-edge digraphs.

We emphasize that our first result does not use a black-box reduction (as opposed to the second result which does). Instead, we design an algorithm for computing the number of Ck-homomorphisms in degenerate graphs and show that one part of its analysis can be reduced to the analysis of the fastest known algorithm for detecting directed cycles in general digraphs, which was carried out in a recent breakthrough of Dalirrooyfard, Vuong and Vassilevska Williams. As a by-product of our algorithm, we obtain a new algorithm for detecting k-cycles in directed and undirected graphs of bounded degeneracy that is faster than all previously known algorithms for 7 ≤ k ≤ 11, and faster for all k ≥ 7 if the matrix multiplication exponent is 2.

由于一般图中的子图计数总体上是一个计算要求很高的问题,因此很自然地尝试为受限制的图族设计快速算法。有界简并图(如平面图)就是这样一个被广泛研究的族。这一行的工作,开始于80年代早期,在Gishboliner等人最近的工作中达到高潮,该工作强调了在有界简并图中计算循环的同态副本(即循环行走)的任务的重要性。我们在本文中的主要结果是上述任务与在一般有向图中检测有向环(标准)副本的问题之间有着惊人的紧密关系。更准确地说,我们证明了以下内容:我们可以计算有界退化的n顶点图中C2k和C2k+1的同态副本的数量Õ(ndk),其中在一般m边有向图中检测Ck的有向副本的已知最快算法运行时间Õ(mdk)。相反,我们可以将任何O(nbk)算法用于计算有界退化的n顶点图中C2k或C2k+1的同态副本的数量,转化为用于检测一般m边有向图中Ck的有向副本的Õ(mbk)时间算法。我们强调我们的第一个结果没有使用黑盒约简(与第二个结果相反)。相反,我们设计了一种计算退化图中ck同态数的算法,并表明其分析的一部分可以简化为对已知最快的一般有向图中有向环检测算法的分析,该算法在Dalirrooyfard, Vuong和Vassilevska Williams最近的突破中进行。作为该算法的副产品,我们得到了一种检测有界退化的有向图和无向图中k圈的新算法,该算法在7≤k≤11时比所有已知的算法都快,并且当矩阵乘法指数为2时,对于所有k≥7的算法都快。
{"title":"Counting Homomorphic Cycles in Degenerate Graphs","authors":"Lior Gishboliner, Yevgeny Levanzov, Asaf Shapira, Raphael Yuster","doi":"https://dl.acm.org/doi/10.1145/3560820","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3560820","url":null,"abstract":"<p>Since counting subgraphs in general graphs is, by and large, a computationally demanding problem, it is natural to try and design fast algorithms for restricted families of graphs. One such family that has been extensively studied is that of graphs of bounded degeneracy (e.g., planar graphs). This line of work, which started in the early 80’s, culminated in a recent work of Gishboliner et al., which highlighted the importance of the task of counting homomorphic copies of cycles (i.e., cyclic walks) in graphs of bounded degeneracy.</p><p>Our main result in this paper is a surprisingly tight relation between the above task and the well-studied problem of <i>detecting (standard) copies</i> of directed cycles in <i>general directed</i> graphs. More precisely, we prove the following:\u0000<p><ul><li><p>One can compute the number of homomorphic copies of <i>C<sub>2k</sub></i> and <i>C<sub>2k+1</sub></i> in <i>n</i>-vertex graphs of bounded degeneracy in time Õ(<i>n<sup>d<sub>k</sub></sup></i>), where the fastest <i>known</i> algorithm for detecting directed copies of <i>C<sub>k</sub></i> in general <i>m</i>-edge digraphs runs in time Õ(<i>m<sup>d<sub>k</sub></sup></i>).</p></li><li><p>Conversely, one can transform any <i>O(n<sup>b<sub>k</sub></sup>)</i> algorithm for computing the number of homomorphic copies of <i>C<sub>2k</sub></i> or of <i>C<sub>2k+1</sub></i> in <i>n</i>-vertex graphs of bounded degeneracy, into an Õ(<i>m<sup>b<sub>k</sub></sup></i>) time algorithm for detecting directed copies of <i>C<sub>k</sub></i> in general <i>m</i>-edge digraphs.</p></li></ul></p></p><p>We emphasize that our first result does not use a black-box reduction (as opposed to the second result which does). Instead, we design an algorithm for computing the number of <i>C<sub>k</sub></i>-homomorphisms in degenerate graphs and show that one part of its <i>analysis</i> can be reduced to the analysis of the fastest known algorithm for detecting directed cycles in general digraphs, which was carried out in a recent breakthrough of Dalirrooyfard, Vuong and Vassilevska Williams. As a by-product of our algorithm, we obtain a new algorithm for detecting <i>k</i>-cycles in directed and undirected graphs of bounded degeneracy that is faster than all previously known algorithms for 7 ≤ <i>k</i> ≤ 11, and faster for all <i>k</i> ≥ 7 if the matrix multiplication exponent is 2.</p>","PeriodicalId":50922,"journal":{"name":"ACM Transactions on Algorithms","volume":"1 1","pages":""},"PeriodicalIF":1.3,"publicationDate":"2023-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138494872","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Polynomial Kernel for Interval Vertex Deletion 区间顶点删除的多项式核
IF 1.3 3区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2023-01-19 DOI: https://dl.acm.org/doi/10.1145/3571075
Akanksha Agrawal, Daniel Lokshtanov, Pranabendu Misra, Saket Saurabh, Meirav Zehavi

Given a graph G and an integer k, the Interval Vertex Deletion (IVD) problem asks whether there exists a subset SV(G) of size at most k such that GS is an interval graph. This problem is known to be NP-complete [Yannakakis, STOC’78]. Originally in 2012, Cao and Marx showed that IVD is fixed parameter tractable: they exhibited an algorithm with running time (10^k n^{mathcal {O}(1)} ) [Cao and Marx, SODA’14]. The existence of a polynomial kernel for IVD remained a well-known open problem in Parameterized Complexity. In this paper, we settle this problem in the affirmative.

给定一个图G和一个整数k,区间顶点删除(IVD)问题问是否存在一个最大为k的子集S≠V(G),使得G−S是一个区间图。已知这个问题是np完全的[Yannakakis, STOC ' 78]。最初在2012年,Cao和Marx证明了IVD是固定参数可处理的:他们展示了一个具有运行时间(10^k n^{mathcal {O}(1)} )的算法[Cao和Marx, SODA ' 14]。IVD的多项式核是否存在是参数化复杂度中一个众所周知的开放性问题。本文对这一问题作了肯定的解决。
{"title":"Polynomial Kernel for Interval Vertex Deletion","authors":"Akanksha Agrawal, Daniel Lokshtanov, Pranabendu Misra, Saket Saurabh, Meirav Zehavi","doi":"https://dl.acm.org/doi/10.1145/3571075","DOIUrl":"https://doi.org/https://dl.acm.org/doi/10.1145/3571075","url":null,"abstract":"<p>Given a graph <i>G</i> and an integer <i>k</i>, the <span>Interval Vertex Deletion (IVD)</span> problem asks whether there exists a subset <i>S</i>⊆<i>V</i>(<i>G</i>) of size at most <i>k</i> such that <i>G</i> − <i>S</i> is an interval graph. This problem is known to be <sans-serif>NP</sans-serif>-complete [Yannakakis, STOC’78]. Originally in 2012, Cao and Marx showed that <span>IVD</span> is fixed parameter tractable: they exhibited an algorithm with running time (10^k n^{mathcal {O}(1)} ) [Cao and Marx, SODA’14]. The existence of a polynomial kernel for <span>IVD</span> remained a well-known open problem in Parameterized Complexity. In this paper, we settle this problem in the affirmative.</p>","PeriodicalId":50922,"journal":{"name":"ACM Transactions on Algorithms","volume":"1 5","pages":""},"PeriodicalIF":1.3,"publicationDate":"2023-01-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138494868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
ACM Transactions on Algorithms
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1