Pub Date : 2026-01-26DOI: 10.1016/j.ic.2026.105406
Yuxi Liu, Mingyu Xiao
The Co-Path/Cycle Packing problem (resp. The Co-Path Packing problem) asks whether we can delete at most k vertices from the input graph such that the remaining graph is a collection of induced paths and cycles (resp. induced paths). These two problems are fundamental graph problems that have important applications in bioinformatics. Although these two problems have been extensively studied in parameterized algorithms, it seems hard to break the running time bound . In 2015, Feng et al. provided an -time randomized algorithm for both of them. Recently, Tsur showed that they can be solved in time deterministically. In this paper, by combining several techniques such as path decomposition, dynamic programming, cut & count, and branch-and-search methods, we show that Co-Path/Cycle Packing can be solved in time deterministically and Co-Path Packing can be solved in time with failure probability . As a by-product, we also show that the Co-Path Packing problem can be solved in time with probability at least 2/3 if a path decomposition of width p is given.
{"title":"Solving Co-Path/Cycle Packing and Co-Path Packing faster than 3k","authors":"Yuxi Liu, Mingyu Xiao","doi":"10.1016/j.ic.2026.105406","DOIUrl":"10.1016/j.ic.2026.105406","url":null,"abstract":"<div><div>The <span>Co-Path/Cycle Packing</span> problem (resp. The <span>Co-Path Packing</span> problem) asks whether we can delete at most <em>k</em> vertices from the input graph such that the remaining graph is a collection of induced paths and cycles (resp. induced paths). These two problems are fundamental graph problems that have important applications in bioinformatics. Although these two problems have been extensively studied in parameterized algorithms, it seems hard to break the running time bound <span><math><msup><mrow><mn>3</mn></mrow><mrow><mi>k</mi></mrow></msup></math></span>. In 2015, Feng et al. provided an <span><math><msup><mrow><mi>O</mi></mrow><mrow><mo>⁎</mo></mrow></msup><mo>(</mo><msup><mrow><mn>3</mn></mrow><mrow><mi>k</mi></mrow></msup><mo>)</mo></math></span>-time randomized algorithm for both of them. Recently, Tsur showed that they can be solved in <span><math><msup><mrow><mi>O</mi></mrow><mrow><mo>⁎</mo></mrow></msup><mo>(</mo><msup><mrow><mn>3</mn></mrow><mrow><mi>k</mi></mrow></msup><mo>)</mo></math></span> time deterministically. In this paper, by combining several techniques such as path decomposition, dynamic programming, cut & count, and branch-and-search methods, we show that <span>Co-Path/Cycle Packing</span> can be solved in <span><math><msup><mrow><mi>O</mi></mrow><mrow><mo>⁎</mo></mrow></msup><mo>(</mo><msup><mrow><mn>2.8192</mn></mrow><mrow><mi>k</mi></mrow></msup><mo>)</mo></math></span> time deterministically and <span>Co-Path Packing</span> can be solved in <span><math><msup><mrow><mi>O</mi></mrow><mrow><mo>⁎</mo></mrow></msup><mo>(</mo><msup><mrow><mn>2.9241</mn></mrow><mrow><mi>k</mi></mrow></msup><mo>)</mo></math></span> time with failure probability <span><math><mo>≤</mo><mn>1</mn><mo>/</mo><mn>3</mn></math></span>. As a by-product, we also show that the <span>Co-Path Packing</span> problem can be solved in <span><math><msup><mrow><mi>O</mi></mrow><mrow><mo>⁎</mo></mrow></msup><mo>(</mo><msup><mrow><mn>5</mn></mrow><mrow><mi>p</mi></mrow></msup><mo>)</mo></math></span> time with probability at least 2/3 if a path decomposition of width <em>p</em> is given.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"309 ","pages":"Article 105406"},"PeriodicalIF":1.0,"publicationDate":"2026-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146057316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-01-26DOI: 10.1016/j.ic.2026.105407
Xiaolin Bu , Zihao Li , Shengxin Liu , Jiaxin Song , Biaoshuai Tao , Ziqi Yu
We study the fair division of indivisible items. Since an envy-free allocation may not exist, a standard relaxation is envy-freeness up to one item (EF1), where any envy can be eliminated by removing a single item from the envied agent's bundle. In many applications, however, it is desirable to designate a subset of prioritized agents for whom strict envy-freeness toward the remaining agents must be guaranteed, while the overall allocation remains EF1. Such agents may correspond to those who were envious in a previous EF1 allocation or to members of underrepresented groups. Motivated by this, we propose a new fairness notion named envy-freeness with prioritized agentsEFprior, and study the existence and the algorithmic aspects of computing an EFprior allocation. For additive valuations, the simple round-robin algorithm suffices to compute an EFprior allocation. In this paper, we mainly focus on general valuations. In particular, we present a polynomial-time algorithm that computes an EFprior allocation with most of the items allocated. When all the items need to be allocated, we also present polynomial-time algorithms for several well-motivated special cases. We finally extend the setting to a general prioritized ordering case, where we are given a full ordering of agents and each agent with a higher priority cannot envy an agent with a lower priority. We propose a generalized fairness notion named envy-freeness under rank r and present a polynomial-time algorithm with most of the items allocated.
{"title":"Fair division with prioritized agents","authors":"Xiaolin Bu , Zihao Li , Shengxin Liu , Jiaxin Song , Biaoshuai Tao , Ziqi Yu","doi":"10.1016/j.ic.2026.105407","DOIUrl":"10.1016/j.ic.2026.105407","url":null,"abstract":"<div><div>We study the fair division of indivisible items. Since an envy-free allocation may not exist, a standard relaxation is <em>envy-freeness up to one item (EF1)</em>, where any envy can be eliminated by removing a single item from the envied agent's bundle. In many applications, however, it is desirable to designate a subset of <em>prioritized agents</em> for whom strict envy-freeness toward the remaining agents must be guaranteed, while the overall allocation remains EF1. Such agents may correspond to those who were envious in a previous EF1 allocation or to members of underrepresented groups. Motivated by this, we propose a new fairness notion named <em>envy-freeness with prioritized agents</em> <span>EFprior</span>, and study the existence and the algorithmic aspects of computing an <span>EFprior</span> allocation. For additive valuations, the simple round-robin algorithm suffices to compute an <span>EFprior</span> allocation. In this paper, we mainly focus on general valuations. In particular, we present a polynomial-time algorithm that computes an <span>EFprior</span> allocation with most of the items allocated. When all the items need to be allocated, we also present polynomial-time algorithms for several well-motivated special cases. We finally extend the setting to a general prioritized ordering case, where we are given a full ordering of agents and each agent with a higher priority cannot envy an agent with a lower priority. We propose a generalized fairness notion named <em>envy-freeness under rank r</em> <span><math><msub><mrow><mi>EF</mi></mrow><mrow><mi>r</mi></mrow></msub></math></span> and present a polynomial-time algorithm with most of the items allocated.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"309 ","pages":"Article 105407"},"PeriodicalIF":1.0,"publicationDate":"2026-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146057594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-01-01DOI: 10.1016/j.ic.2026.105404
Jinshan Zhang , Hao Xu , Feng Wang , Meng Xi , Xiaotie Deng , Jianwei Yin
In this work, we investigate truthful mechanisms for the rank-maximal matching problem from an approximation standpoint. Our findings narrow the gap between the upper and lower bounds. We introduce a lexicographically truthful (LT) and nearly Pareto optimal (PO) randomized mechanism with an approximation ratio of , an improvement over the previous best result of 2. Key to our algorithm are preservation lemmas that enable us to leverage techniques from online algorithms to analyze the new approximation ratio. Furthermore, we present several hardness results across different settings to enhance our upper bound. Notably, we improve the lower bound for the approximation ratio of our LT and PO mechanism to . To our knowledge, this is the first instance of a lower bound being established using a linear programming approach in this field.
{"title":"Truthful approximation for rank-maximal matchings","authors":"Jinshan Zhang , Hao Xu , Feng Wang , Meng Xi , Xiaotie Deng , Jianwei Yin","doi":"10.1016/j.ic.2026.105404","DOIUrl":"10.1016/j.ic.2026.105404","url":null,"abstract":"<div><div>In this work, we investigate truthful mechanisms for the rank-maximal matching problem from an approximation standpoint. Our findings narrow the gap between the upper and lower bounds. We introduce a lexicographically truthful (LT) and nearly Pareto optimal (PO) randomized mechanism with an approximation ratio of <span><math><mfrac><mrow><mn>2</mn><msqrt><mrow><mi>e</mi></mrow></msqrt><mo>−</mo><mn>1</mn></mrow><mrow><mn>2</mn><msqrt><mrow><mi>e</mi></mrow></msqrt><mo>−</mo><mn>2</mn></mrow></mfrac><mo>≈</mo><mn>1.77</mn></math></span>, an improvement over the previous best result of 2. Key to our algorithm are preservation lemmas that enable us to leverage techniques from online algorithms to analyze the new approximation ratio. Furthermore, we present several hardness results across different settings to enhance our upper bound. Notably, we improve the lower bound for the approximation ratio of our LT and PO mechanism to <span><math><mn>18</mn><mo>/</mo><mn>13</mn><mo>≈</mo><mn>1.38</mn></math></span>. To our knowledge, this is the first instance of a lower bound being established using a linear programming approach in this field.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"308 ","pages":"Article 105404"},"PeriodicalIF":1.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145976646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-01-01DOI: 10.1016/j.ic.2026.105405
Jingyang Zhao, Mingyu Xiao
The Capacitated Vehicle Routing Problem (CVRP) is one of the most extensively studied problems in combinatorial optimization. Based on customer demand, we distinguish three variants of CVRP: unit-demand, splittable, and unsplittable. In this paper, we consider k-CVRP in general metrics and on general graphs, where k is the vehicle capacity. All three versions are APX-hard for any fixed . Based on an α-approximation algorithm for metric TSP, we propose new approximation algorithms. For , we obtain a -approximation algorithm for the splittable and unit-demand cases, and a -approximation algorithm for the unsplittable case. Our approximation ratio is better than the previous results when k is less than a fairly large value, approximately .
For small values of k, we design independent and elegant algorithms with further improvements. For the splittable and unit-demand cases, we improve the approximation ratio from 1.792 to 1.500 for , and from 1.750 to 1.500 for . For the unsplittable case, we improve the approximation ratio from 1.792 to 1.500 for , from 2.051 to 1.750 for , and from 2.249 to 2.157 for . The approximation ratio for surprisingly achieves the same value as in the splittable case. Our techniques, such as EX-ITP – an extension of the classic ITP method, have the potential to improve algorithms for other routing problems as well.
{"title":"Improved approximations for the capacitated vehicle routing problem with fixed capacity","authors":"Jingyang Zhao, Mingyu Xiao","doi":"10.1016/j.ic.2026.105405","DOIUrl":"10.1016/j.ic.2026.105405","url":null,"abstract":"<div><div>The Capacitated Vehicle Routing Problem (CVRP) is one of the most extensively studied problems in combinatorial optimization. Based on customer demand, we distinguish three variants of CVRP: unit-demand, splittable, and unsplittable. In this paper, we consider <em>k</em>-CVRP in general metrics and on general graphs, where <em>k</em> is the vehicle capacity. All three versions are APX-hard for any fixed <span><math><mi>k</mi><mo>≥</mo><mn>3</mn></math></span>. Based on an <em>α</em>-approximation algorithm for metric TSP, we propose new approximation algorithms. For <span><math><mi>α</mi><mo>=</mo><mfrac><mrow><mn>3</mn></mrow><mrow><mn>2</mn></mrow></mfrac></math></span>, we obtain a <span><math><mo>(</mo><mfrac><mrow><mn>5</mn></mrow><mrow><mn>2</mn></mrow></mfrac><mo>−</mo><mi>Θ</mi><mo>(</mo><mfrac><mrow><mn>1</mn></mrow><mrow><msqrt><mrow><mi>k</mi></mrow></msqrt></mrow></mfrac><mo>)</mo><mo>)</mo></math></span>-approximation algorithm for the splittable and unit-demand cases, and a <span><math><mo>(</mo><mfrac><mrow><mn>5</mn></mrow><mrow><mn>2</mn></mrow></mfrac><mo>+</mo><mi>ln</mi><mo></mo><mn>2</mn><mo>−</mo><mi>Θ</mi><mo>(</mo><mfrac><mrow><mn>1</mn></mrow><mrow><msqrt><mrow><mi>k</mi></mrow></msqrt></mrow></mfrac><mo>)</mo><mo>)</mo></math></span>-approximation algorithm for the unsplittable case. Our approximation ratio is better than the previous results when <em>k</em> is less than a fairly large value, approximately <span><math><mn>1.7</mn><mo>×</mo><msup><mrow><mn>10</mn></mrow><mrow><mn>7</mn></mrow></msup></math></span>.</div><div>For small values of <em>k</em>, we design independent and elegant algorithms with further improvements. For the splittable and unit-demand cases, we improve the approximation ratio from 1.792 to 1.500 for <span><math><mi>k</mi><mo>=</mo><mn>3</mn></math></span>, and from 1.750 to 1.500 for <span><math><mi>k</mi><mo>=</mo><mn>4</mn></math></span>. For the unsplittable case, we improve the approximation ratio from 1.792 to 1.500 for <span><math><mi>k</mi><mo>=</mo><mn>3</mn></math></span>, from 2.051 to 1.750 for <span><math><mi>k</mi><mo>=</mo><mn>4</mn></math></span>, and from 2.249 to 2.157 for <span><math><mi>k</mi><mo>=</mo><mn>5</mn></math></span>. The approximation ratio for <span><math><mi>k</mi><mo>=</mo><mn>3</mn></math></span> surprisingly achieves the same value as in the splittable case. Our techniques, such as EX-ITP – an extension of the classic ITP method, have the potential to improve algorithms for other routing problems as well.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"308 ","pages":"Article 105405"},"PeriodicalIF":1.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145976580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
This paper focuses on the embeddability of hypercubes in an important class of Cayley graphs, known as augmented cubes. An n-dimensional augmented cube is constructed by augmenting the n-dimensional hypercube with additional edges, thus making a spanning subgraph of . Dong and Wang (2019) first posed the problem of determining the number of -isomorphic subgraphs in , which still remains open. By exploiting the Cayley properties of , we establish a lower bound for this number. Furthermore, we develop a method for constructing pairs of -isomorphic subgraphs in with the minimum number of common edges. This is accomplished through the use of reciprocal perfect matchings, a technique that also relies on the Cayley property of . As an application, we prove that admits edge-disjoint Hamiltonian cycles when is odd and cycles when n is even, thereby confirming a conjecture by Hung (2015) that admits a Hamiltonian decomposition for odd n with .
本文主要研究一类重要的Cayley图的超立方体的可嵌入性,即增广立方体。通过在n维超立方体Qn上增加额外的边来构造n维增广立方体AQn,从而使Qn成为AQn的生成子图。Dong and Wang(2019)首先提出了确定AQn中qn -同构子图数量的问题,该问题仍然是开放的。通过利用AQn的Cayley性质,我们建立了这个数的下界。在此基础上,提出了一种构造具有最小公共边数的qn -同构子图对的方法。这是通过使用互反完美匹配来实现的,这种技术也依赖于AQn的Cayley性质。作为应用,我们证明了当n≥3为奇数时AQn允许n−1个边不相交的哈密顿循环,当n为偶数时n−2个循环,从而证实了Hung(2015)关于当n≥3时AQn允许奇数n的哈密顿分解的猜想。
{"title":"A perfect matching reciprocity method for embedding multiple hypercubes in an augmented cube: Application to Hamiltonian decomposition","authors":"Da-Wei Yang , Hongyang Zhang , Rong-Xia Hao , Sun-Yuan Hsieh","doi":"10.1016/j.ic.2025.105401","DOIUrl":"10.1016/j.ic.2025.105401","url":null,"abstract":"<div><div>This paper focuses on the embeddability of hypercubes in an important class of Cayley graphs, known as augmented cubes. An <em>n</em>-dimensional augmented cube <span><math><mi>A</mi><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span> is constructed by augmenting the <em>n</em>-dimensional hypercube <span><math><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span> with additional edges, thus making <span><math><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span> a spanning subgraph of <span><math><mi>A</mi><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>. Dong and Wang (2019) first posed the problem of determining the number of <span><math><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>-isomorphic subgraphs in <span><math><mi>A</mi><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>, which still remains open. By exploiting the Cayley properties of <span><math><mi>A</mi><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>, we establish a lower bound for this number. Furthermore, we develop a method for constructing pairs of <span><math><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>-isomorphic subgraphs in <span><math><mi>A</mi><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span> with the minimum number of common edges. This is accomplished through the use of reciprocal perfect matchings, a technique that also relies on the Cayley property of <span><math><mi>A</mi><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>. As an application, we prove that <span><math><mi>A</mi><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span> admits <span><math><mi>n</mi><mo>−</mo><mn>1</mn></math></span> edge-disjoint Hamiltonian cycles when <span><math><mi>n</mi><mo>≥</mo><mn>3</mn></math></span> is odd and <span><math><mi>n</mi><mo>−</mo><mn>2</mn></math></span> cycles when <em>n</em> is even, thereby confirming a conjecture by Hung (2015) that <span><math><mi>A</mi><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span> admits a Hamiltonian decomposition for odd <em>n</em> with <span><math><mi>n</mi><mo>≥</mo><mn>3</mn></math></span>.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"308 ","pages":"Article 105401"},"PeriodicalIF":1.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145884338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-01-01DOI: 10.1016/j.ic.2025.105400
Nikolay Vereshchagin
The fine approach to measure information dependence is based on the total conditional complexity , which is defined as the minimal length of a total program that outputs y on the input x. It is known that the total conditional complexity can be much larger than the plain conditional complexity. Such strings are defined by means of a diagonal argument and are not otherwise interesting. In this paper we investigate whether this happens also for some natural objects having some other interesting properties. More specifically, we consider the following objects: the number of strings of complexity less than n and the lex first string of length n and complexity ⩾n. It is known that they have negligible mutual conditional complexities. In this paper we prove that their mutual total conditional complexities may be large. This is the first example of interesting objects whose plain conditional complexity is much less than the total one.
{"title":"Total conditional complexity of certain objects","authors":"Nikolay Vereshchagin","doi":"10.1016/j.ic.2025.105400","DOIUrl":"10.1016/j.ic.2025.105400","url":null,"abstract":"<div><div>The fine approach to measure information dependence is based on the total conditional complexity <span><math><mtext>CT</mtext><mo>(</mo><mi>y</mi><mo>|</mo><mi>x</mi><mo>)</mo></math></span>, which is defined as the minimal length of a <em>total</em> program that outputs <em>y</em> on the input <em>x</em>. It is known that the total conditional complexity can be much larger than the plain conditional complexity. Such strings <span><math><mi>x</mi><mo>,</mo><mi>y</mi></math></span> are defined by means of a diagonal argument and are not otherwise interesting. In this paper we investigate whether this happens also for some natural objects having some other interesting properties. More specifically, we consider the following objects: the number of strings of complexity less than <em>n</em> and the lex first string of length <em>n</em> and complexity ⩾<em>n</em>. It is known that they have negligible mutual conditional complexities. In this paper we prove that their mutual total conditional complexities may be large. This is the first example of interesting objects whose plain conditional complexity is much less than the total one.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"308 ","pages":"Article 105400"},"PeriodicalIF":1.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145884336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-01-01DOI: 10.1016/j.ic.2026.105403
Martin Kutrib , Andreas Malcher , Carlo Mereghetti , Beatrice Palano , Priscilla Raucci , Matthias Wendlandt
The use of translucent input letters represents a way of implementing a discontinuous input processing in automata. In detail, a translucent automaton performs several sweeps from left to right on the input: according to the current state, some symbols are visible and can be processed, whereas some other symbols are invisible and may be processed in another sweep. We also distinguish between the returning and non-returning mode, which differ in the way the automaton behaves after reading a symbol: in the returning mode, a new sweep starts immediately, while in the non-returning mode, the device processes the next visible symbol.
Here, we investigate deterministic pushdown automata with translucent letters both in the returning and non-returning mode. We prove that the non-returning mode strictly outperforms the returning mode, and that the families of the languages accepted by these two types of devices can be ranked strictly between the deterministic context-free languages and the deterministic context-sensitive languages. Moreover, both families are shown to be incomparable to the families of context-free, growing context-sensitive, and Church-Rosser languages. The ability of accepting non-semilinear languages is also emphasized (addressing an open question in the literature). Finally, we study the closure properties of both language families under the Boolean operations, obtaining that they are both closed under complementation but not under union and intersection. Further non-closure results are pointed-out for returning devices.
{"title":"Deterministic pushdown automata with translucent input letters","authors":"Martin Kutrib , Andreas Malcher , Carlo Mereghetti , Beatrice Palano , Priscilla Raucci , Matthias Wendlandt","doi":"10.1016/j.ic.2026.105403","DOIUrl":"10.1016/j.ic.2026.105403","url":null,"abstract":"<div><div>The use of translucent input letters represents a way of implementing a discontinuous input processing in automata. In detail, a translucent automaton performs several sweeps from left to right on the input: according to the current state, some symbols are visible and can be processed, whereas some other symbols are invisible and may be processed in another sweep. We also distinguish between the returning and non-returning mode, which differ in the way the automaton behaves after reading a symbol: in the returning mode, a new sweep starts immediately, while in the non-returning mode, the device processes the next visible symbol.</div><div>Here, we investigate <em>deterministic pushdown automata with translucent letters</em> both in the returning and non-returning mode. We prove that the non-returning mode strictly outperforms the returning mode, and that the families of the languages accepted by these two types of devices can be ranked strictly between the deterministic context-free languages and the deterministic context-sensitive languages. Moreover, both families are shown to be incomparable to the families of context-free, growing context-sensitive, and Church-Rosser languages. The ability of accepting non-semilinear languages is also emphasized (addressing an open question in the literature). Finally, we study the closure properties of both language families under the Boolean operations, obtaining that they are both closed under complementation but not under union and intersection. Further non-closure results are pointed-out for returning devices.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"308 ","pages":"Article 105403"},"PeriodicalIF":1.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145976581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2026-01-01DOI: 10.1016/j.ic.2025.105402
Yusai Wu , Liqing Yu , Yu Yu
{"title":"Corrigendum to “On the equivalence of uniform key agreement and sequential composition insecurity” [Information and Computation 307 (2025) 105365]","authors":"Yusai Wu , Liqing Yu , Yu Yu","doi":"10.1016/j.ic.2025.105402","DOIUrl":"10.1016/j.ic.2025.105402","url":null,"abstract":"","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"308 ","pages":"Article 105402"},"PeriodicalIF":1.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145884337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-18DOI: 10.1016/j.ic.2025.105399
Yuzhen Zhao , Zhen Yang , Yueguo Luo , Hui Li , Wenke Zang
Spiking neural P systems (SNP systems) are parallel and distributed computational models mimicking the storage, processing, and transmission of spikes in the human brain nervous system. However, they do not consider the non-gated channels in human brain neurons, which would affect the storage and thus further affect the processing and transmission of spikes. To enhance the SNP systems' ability to process complex information and to make SNP systems more biologically plausible, this work constructs the SNP systems with non-gated channels (NGCSNP systems). In NGCSNP systems, when a neuron is not activated, the spikes in it slowly flow out into the environment through non-gated channels until a steady state is reached. That is, the number of spikes in a neuron nonlinearly varies automatically. In terms of computational power, this work proves the Turing universality of NGCSNP systems by simulating register machines. For the ADD/SUB/FIN/INPUT/deterministic ADD modules of the universal register machine, NGCSNP systems utilize only 7, 6, 3, 5, and 4 neurons, with each neuron containing a maximum of 2, 2, 2, 1, and 1 rules for module simulation, respectively. Compared to the other eight variants, NGCSNP systems use fewer computational resources. Also, this work proves the computational efficiency of NGCSNP systems by solving a classical NP-hard problem: Boolean Satisfiability Problems in linear time via a space-for-time strategy. NGCSNP systems introduce nonlinear features at the neuronal level, enhance the computational functionality as well as stability of the systems, save the computational resources, and provide clues for developing computational models that resemble the human brain.
{"title":"Spiking neural P systems with non-gated channels","authors":"Yuzhen Zhao , Zhen Yang , Yueguo Luo , Hui Li , Wenke Zang","doi":"10.1016/j.ic.2025.105399","DOIUrl":"10.1016/j.ic.2025.105399","url":null,"abstract":"<div><div>Spiking neural P systems (SNP systems) are parallel and distributed computational models mimicking the storage, processing, and transmission of spikes in the human brain nervous system. However, they do not consider the non-gated channels in human brain neurons, which would affect the storage and thus further affect the processing and transmission of spikes. To enhance the SNP systems' ability to process complex information and to make SNP systems more biologically plausible, this work constructs the SNP systems with non-gated channels (NGCSNP systems). In NGCSNP systems, when a neuron is not activated, the spikes in it slowly flow out into the environment through non-gated channels until a steady state is reached. That is, the number of spikes in a neuron nonlinearly varies automatically. In terms of computational power, this work proves the Turing universality of NGCSNP systems by simulating register machines. For the ADD/SUB/FIN/INPUT/deterministic ADD modules of the universal register machine, NGCSNP systems utilize only 7, 6, 3, 5, and 4 neurons, with each neuron containing a maximum of 2, 2, 2, 1, and 1 rules for module simulation, respectively. Compared to the other eight variants, NGCSNP systems use fewer computational resources. Also, this work proves the computational efficiency of NGCSNP systems by solving a classical NP-hard problem: Boolean Satisfiability Problems in linear time via a space-for-time strategy. NGCSNP systems introduce nonlinear features at the neuronal level, enhance the computational functionality as well as stability of the systems, save the computational resources, and provide clues for developing computational models that resemble the human brain.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"308 ","pages":"Article 105399"},"PeriodicalIF":1.0,"publicationDate":"2025-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145840783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-12-16DOI: 10.1016/j.ic.2025.105398
Marco Sälzer , Eric Alsmann , Florian Bruse , Martin Lange
Verifying properties and interpreting the behaviour of deep neural networks (DNN) is an important task given their ubiquitous use in applications, including safety-critical ones, and their black-box nature. We propose an automata-theoretic approach to tackling problems arising in DNN analysis. We show that the input-output behaviour of a DNN can be captured precisely by a (special) weak Büchi automaton and we show how these can be used to address common verification and interpretation tasks of DNN like adversarial robustness or minimum sufficient reasons.
{"title":"Verifying and interpreting neural networks using finite automata","authors":"Marco Sälzer , Eric Alsmann , Florian Bruse , Martin Lange","doi":"10.1016/j.ic.2025.105398","DOIUrl":"10.1016/j.ic.2025.105398","url":null,"abstract":"<div><div>Verifying properties and interpreting the behaviour of deep neural networks (DNN) is an important task given their ubiquitous use in applications, including safety-critical ones, and their black-box nature. We propose an automata-theoretic approach to tackling problems arising in DNN analysis. We show that the input-output behaviour of a DNN can be captured precisely by a (special) weak Büchi automaton and we show how these can be used to address common verification and interpretation tasks of DNN like adversarial robustness or minimum sufficient reasons.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"308 ","pages":"Article 105398"},"PeriodicalIF":1.0,"publicationDate":"2025-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145791115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}