首页 > 最新文献

Information and Computation最新文献

英文 中文
Solving Co-Path/Cycle Packing and Co-Path Packing faster than 3k 解决共径/循环包装和共径包装快于3k
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-26 DOI: 10.1016/j.ic.2026.105406
Yuxi Liu, Mingyu Xiao
The Co-Path/Cycle Packing problem (resp. The Co-Path Packing problem) asks whether we can delete at most k vertices from the input graph such that the remaining graph is a collection of induced paths and cycles (resp. induced paths). These two problems are fundamental graph problems that have important applications in bioinformatics. Although these two problems have been extensively studied in parameterized algorithms, it seems hard to break the running time bound 3k. In 2015, Feng et al. provided an O(3k)-time randomized algorithm for both of them. Recently, Tsur showed that they can be solved in O(3k) time deterministically. In this paper, by combining several techniques such as path decomposition, dynamic programming, cut & count, and branch-and-search methods, we show that Co-Path/Cycle Packing can be solved in O(2.8192k) time deterministically and Co-Path Packing can be solved in O(2.9241k) time with failure probability 1/3. As a by-product, we also show that the Co-Path Packing problem can be solved in O(5p) time with probability at least 2/3 if a path decomposition of width p is given.
共径/循环布局问题(参见。共径填充问题(Co-Path Packing problem)问我们是否可以从输入图中删除最多k个顶点,使得剩余的图是诱导路径和循环的集合。诱导路径)。这两个问题是在生物信息学中有重要应用的基本图问题。虽然这两个问题在参数化算法中已经得到了广泛的研究,但似乎很难突破运行时间限制3k。2015年,Feng等人提供了一种O (3k)时间随机化算法。最近,Tsur表明它们可以在O * (3k)时间内确定性地求解。本文结合路径分解、动态规划、cut & count、分支搜索等技术,证明了共径/循环填充可以在O oc (2.8192k)时间内确定性地求解,共径填充可以在O oc (2.9241k)时间内求解,且故障概率≤1/3。作为副产品,我们还证明了如果给出宽度为p的路径分解,则共径填充问题可以在O (5p)时间内以至少2/3的概率得到解决。
{"title":"Solving Co-Path/Cycle Packing and Co-Path Packing faster than 3k","authors":"Yuxi Liu,&nbsp;Mingyu Xiao","doi":"10.1016/j.ic.2026.105406","DOIUrl":"10.1016/j.ic.2026.105406","url":null,"abstract":"<div><div>The <span>Co-Path/Cycle Packing</span> problem (resp. The <span>Co-Path Packing</span> problem) asks whether we can delete at most <em>k</em> vertices from the input graph such that the remaining graph is a collection of induced paths and cycles (resp. induced paths). These two problems are fundamental graph problems that have important applications in bioinformatics. Although these two problems have been extensively studied in parameterized algorithms, it seems hard to break the running time bound <span><math><msup><mrow><mn>3</mn></mrow><mrow><mi>k</mi></mrow></msup></math></span>. In 2015, Feng et al. provided an <span><math><msup><mrow><mi>O</mi></mrow><mrow><mo>⁎</mo></mrow></msup><mo>(</mo><msup><mrow><mn>3</mn></mrow><mrow><mi>k</mi></mrow></msup><mo>)</mo></math></span>-time randomized algorithm for both of them. Recently, Tsur showed that they can be solved in <span><math><msup><mrow><mi>O</mi></mrow><mrow><mo>⁎</mo></mrow></msup><mo>(</mo><msup><mrow><mn>3</mn></mrow><mrow><mi>k</mi></mrow></msup><mo>)</mo></math></span> time deterministically. In this paper, by combining several techniques such as path decomposition, dynamic programming, cut &amp; count, and branch-and-search methods, we show that <span>Co-Path/Cycle Packing</span> can be solved in <span><math><msup><mrow><mi>O</mi></mrow><mrow><mo>⁎</mo></mrow></msup><mo>(</mo><msup><mrow><mn>2.8192</mn></mrow><mrow><mi>k</mi></mrow></msup><mo>)</mo></math></span> time deterministically and <span>Co-Path Packing</span> can be solved in <span><math><msup><mrow><mi>O</mi></mrow><mrow><mo>⁎</mo></mrow></msup><mo>(</mo><msup><mrow><mn>2.9241</mn></mrow><mrow><mi>k</mi></mrow></msup><mo>)</mo></math></span> time with failure probability <span><math><mo>≤</mo><mn>1</mn><mo>/</mo><mn>3</mn></math></span>. As a by-product, we also show that the <span>Co-Path Packing</span> problem can be solved in <span><math><msup><mrow><mi>O</mi></mrow><mrow><mo>⁎</mo></mrow></msup><mo>(</mo><msup><mrow><mn>5</mn></mrow><mrow><mi>p</mi></mrow></msup><mo>)</mo></math></span> time with probability at least 2/3 if a path decomposition of width <em>p</em> is given.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"309 ","pages":"Article 105406"},"PeriodicalIF":1.0,"publicationDate":"2026-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146057316","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fair division with prioritized agents 公平分配优先代理
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-26 DOI: 10.1016/j.ic.2026.105407
Xiaolin Bu , Zihao Li , Shengxin Liu , Jiaxin Song , Biaoshuai Tao , Ziqi Yu
We study the fair division of indivisible items. Since an envy-free allocation may not exist, a standard relaxation is envy-freeness up to one item (EF1), where any envy can be eliminated by removing a single item from the envied agent's bundle. In many applications, however, it is desirable to designate a subset of prioritized agents for whom strict envy-freeness toward the remaining agents must be guaranteed, while the overall allocation remains EF1. Such agents may correspond to those who were envious in a previous EF1 allocation or to members of underrepresented groups. Motivated by this, we propose a new fairness notion named envy-freeness with prioritized agents EFprior, and study the existence and the algorithmic aspects of computing an EFprior allocation. For additive valuations, the simple round-robin algorithm suffices to compute an EFprior allocation. In this paper, we mainly focus on general valuations. In particular, we present a polynomial-time algorithm that computes an EFprior allocation with most of the items allocated. When all the items need to be allocated, we also present polynomial-time algorithms for several well-motivated special cases. We finally extend the setting to a general prioritized ordering case, where we are given a full ordering of agents and each agent with a higher priority cannot envy an agent with a lower priority. We propose a generalized fairness notion named envy-freeness under rank r EFr and present a polynomial-time algorithm with most of the items allocated.
我们研究不可分割项的公平除法。由于没有嫉妒的分配可能不存在,标准的放松是没有嫉妒到一个项目(EF1),其中任何嫉妒都可以通过从被嫉妒的代理的捆绑包中删除一个项目来消除。然而,在许多应用程序中,我们希望指定一个优先级代理的子集,这些代理必须保证对其余代理的严格嫉妒自由,而总体分配仍然是EF1。这些代理人可能对应于那些在以前的EF1分配中嫉妒的人,或者对应于代表性不足的群体的成员。基于此,我们提出了一种新的公平概念——具有优先agent EFprior的嫉妒自由公平性,并研究了EFprior分配的存在性和计算算法。对于加性赋值,简单的轮循算法足以计算EFprior分配。在本文中,我们主要关注一般估值。特别是,我们提出了一个多项式时间算法,该算法计算了大多数项目分配的EFprior分配。当所有的项目都需要分配时,我们也给出了几个动机良好的特殊情况下的多项式时间算法。最后,我们将设置扩展到一般优先排序的情况,在这种情况下,我们给出了一个完整的代理排序,并且每个具有较高优先级的代理不能羡慕具有较低优先级的代理。在秩r EFr下,提出了一个广义的公平概念——嫉妒自由,并给出了一个分配大部分项目的多项式时间算法。
{"title":"Fair division with prioritized agents","authors":"Xiaolin Bu ,&nbsp;Zihao Li ,&nbsp;Shengxin Liu ,&nbsp;Jiaxin Song ,&nbsp;Biaoshuai Tao ,&nbsp;Ziqi Yu","doi":"10.1016/j.ic.2026.105407","DOIUrl":"10.1016/j.ic.2026.105407","url":null,"abstract":"<div><div>We study the fair division of indivisible items. Since an envy-free allocation may not exist, a standard relaxation is <em>envy-freeness up to one item (EF1)</em>, where any envy can be eliminated by removing a single item from the envied agent's bundle. In many applications, however, it is desirable to designate a subset of <em>prioritized agents</em> for whom strict envy-freeness toward the remaining agents must be guaranteed, while the overall allocation remains EF1. Such agents may correspond to those who were envious in a previous EF1 allocation or to members of underrepresented groups. Motivated by this, we propose a new fairness notion named <em>envy-freeness with prioritized agents</em> <span>EFprior</span>, and study the existence and the algorithmic aspects of computing an <span>EFprior</span> allocation. For additive valuations, the simple round-robin algorithm suffices to compute an <span>EFprior</span> allocation. In this paper, we mainly focus on general valuations. In particular, we present a polynomial-time algorithm that computes an <span>EFprior</span> allocation with most of the items allocated. When all the items need to be allocated, we also present polynomial-time algorithms for several well-motivated special cases. We finally extend the setting to a general prioritized ordering case, where we are given a full ordering of agents and each agent with a higher priority cannot envy an agent with a lower priority. We propose a generalized fairness notion named <em>envy-freeness under rank r</em> <span><math><msub><mrow><mi>EF</mi></mrow><mrow><mi>r</mi></mrow></msub></math></span> and present a polynomial-time algorithm with most of the items allocated.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"309 ","pages":"Article 105407"},"PeriodicalIF":1.0,"publicationDate":"2026-01-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"146057594","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Truthful approximation for rank-maximal matchings 秩最大匹配的真实逼近
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-01 DOI: 10.1016/j.ic.2026.105404
Jinshan Zhang , Hao Xu , Feng Wang , Meng Xi , Xiaotie Deng , Jianwei Yin
In this work, we investigate truthful mechanisms for the rank-maximal matching problem from an approximation standpoint. Our findings narrow the gap between the upper and lower bounds. We introduce a lexicographically truthful (LT) and nearly Pareto optimal (PO) randomized mechanism with an approximation ratio of 2e12e21.77, an improvement over the previous best result of 2. Key to our algorithm are preservation lemmas that enable us to leverage techniques from online algorithms to analyze the new approximation ratio. Furthermore, we present several hardness results across different settings to enhance our upper bound. Notably, we improve the lower bound for the approximation ratio of our LT and PO mechanism to 18/131.38. To our knowledge, this is the first instance of a lower bound being established using a linear programming approach in this field.
在这项工作中,我们从近似的角度研究了秩最大匹配问题的真实机制。我们的发现缩小了上限和下限之间的差距。我们引入了一个字典真实(LT)和近似帕累托最优(PO)随机化机制,其近似比为2e−12e−2≈1.77,比之前的最佳结果2有所改进。我们算法的关键是保留引理,它使我们能够利用在线算法中的技术来分析新的近似比。此外,我们提出了不同设置下的几个硬度结果,以增强我们的上界。值得注意的是,我们将我们的LT和PO机制的近似比率的下界提高到18/13≈1.38。据我们所知,这是在该领域中使用线性规划方法建立下界的第一个实例。
{"title":"Truthful approximation for rank-maximal matchings","authors":"Jinshan Zhang ,&nbsp;Hao Xu ,&nbsp;Feng Wang ,&nbsp;Meng Xi ,&nbsp;Xiaotie Deng ,&nbsp;Jianwei Yin","doi":"10.1016/j.ic.2026.105404","DOIUrl":"10.1016/j.ic.2026.105404","url":null,"abstract":"<div><div>In this work, we investigate truthful mechanisms for the rank-maximal matching problem from an approximation standpoint. Our findings narrow the gap between the upper and lower bounds. We introduce a lexicographically truthful (LT) and nearly Pareto optimal (PO) randomized mechanism with an approximation ratio of <span><math><mfrac><mrow><mn>2</mn><msqrt><mrow><mi>e</mi></mrow></msqrt><mo>−</mo><mn>1</mn></mrow><mrow><mn>2</mn><msqrt><mrow><mi>e</mi></mrow></msqrt><mo>−</mo><mn>2</mn></mrow></mfrac><mo>≈</mo><mn>1.77</mn></math></span>, an improvement over the previous best result of 2. Key to our algorithm are preservation lemmas that enable us to leverage techniques from online algorithms to analyze the new approximation ratio. Furthermore, we present several hardness results across different settings to enhance our upper bound. Notably, we improve the lower bound for the approximation ratio of our LT and PO mechanism to <span><math><mn>18</mn><mo>/</mo><mn>13</mn><mo>≈</mo><mn>1.38</mn></math></span>. To our knowledge, this is the first instance of a lower bound being established using a linear programming approach in this field.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"308 ","pages":"Article 105404"},"PeriodicalIF":1.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145976646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved approximations for the capacitated vehicle routing problem with fixed capacity 固定容量有容车辆路径问题的改进逼近
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-01 DOI: 10.1016/j.ic.2026.105405
Jingyang Zhao, Mingyu Xiao
The Capacitated Vehicle Routing Problem (CVRP) is one of the most extensively studied problems in combinatorial optimization. Based on customer demand, we distinguish three variants of CVRP: unit-demand, splittable, and unsplittable. In this paper, we consider k-CVRP in general metrics and on general graphs, where k is the vehicle capacity. All three versions are APX-hard for any fixed k3. Based on an α-approximation algorithm for metric TSP, we propose new approximation algorithms. For α=32, we obtain a (52Θ(1k))-approximation algorithm for the splittable and unit-demand cases, and a (52+ln2Θ(1k))-approximation algorithm for the unsplittable case. Our approximation ratio is better than the previous results when k is less than a fairly large value, approximately 1.7×107.
For small values of k, we design independent and elegant algorithms with further improvements. For the splittable and unit-demand cases, we improve the approximation ratio from 1.792 to 1.500 for k=3, and from 1.750 to 1.500 for k=4. For the unsplittable case, we improve the approximation ratio from 1.792 to 1.500 for k=3, from 2.051 to 1.750 for k=4, and from 2.249 to 2.157 for k=5. The approximation ratio for k=3 surprisingly achieves the same value as in the splittable case. Our techniques, such as EX-ITP – an extension of the classic ITP method, have the potential to improve algorithms for other routing problems as well.
有能力车辆路径问题(CVRP)是组合优化中研究最广泛的问题之一。基于客户需求,我们区分了CVRP的三种变体:单位需求、可分割和不可分割。在本文中,我们考虑一般度量和一般图上的k- cvrp,其中k为车辆容量。所有三个版本对于任何固定k≥3都是apx硬的。在度量TSP的α-近似算法的基础上,提出了新的近似算法。对于α=32,我们得到了可分和单位需求情况下的(52−Θ(1k))近似算法,以及不可分情况下的(52+ln²−Θ(1k))近似算法。当k小于一个相当大的值时,我们的近似比以前的结果要好,近似为1.7×107。对于较小的k值,我们设计了独立且优雅的算法,并进行了进一步改进。对于可分割和单位需求情况,我们将k=3时的近似比率从1.792提高到1.500,k=4时的近似比率从1.750提高到1.500。对于不可分割的情况,我们将k=3时的近似比率从1.792提高到1.500,k=4时从2.051提高到1.750,k=5时从2.249提高到2.157。令人惊讶的是,k=3的近似值与可分割情况下的近似值相同。我们的技术,如EX-ITP——经典ITP方法的扩展,也有可能改进其他路由问题的算法。
{"title":"Improved approximations for the capacitated vehicle routing problem with fixed capacity","authors":"Jingyang Zhao,&nbsp;Mingyu Xiao","doi":"10.1016/j.ic.2026.105405","DOIUrl":"10.1016/j.ic.2026.105405","url":null,"abstract":"<div><div>The Capacitated Vehicle Routing Problem (CVRP) is one of the most extensively studied problems in combinatorial optimization. Based on customer demand, we distinguish three variants of CVRP: unit-demand, splittable, and unsplittable. In this paper, we consider <em>k</em>-CVRP in general metrics and on general graphs, where <em>k</em> is the vehicle capacity. All three versions are APX-hard for any fixed <span><math><mi>k</mi><mo>≥</mo><mn>3</mn></math></span>. Based on an <em>α</em>-approximation algorithm for metric TSP, we propose new approximation algorithms. For <span><math><mi>α</mi><mo>=</mo><mfrac><mrow><mn>3</mn></mrow><mrow><mn>2</mn></mrow></mfrac></math></span>, we obtain a <span><math><mo>(</mo><mfrac><mrow><mn>5</mn></mrow><mrow><mn>2</mn></mrow></mfrac><mo>−</mo><mi>Θ</mi><mo>(</mo><mfrac><mrow><mn>1</mn></mrow><mrow><msqrt><mrow><mi>k</mi></mrow></msqrt></mrow></mfrac><mo>)</mo><mo>)</mo></math></span>-approximation algorithm for the splittable and unit-demand cases, and a <span><math><mo>(</mo><mfrac><mrow><mn>5</mn></mrow><mrow><mn>2</mn></mrow></mfrac><mo>+</mo><mi>ln</mi><mo>⁡</mo><mn>2</mn><mo>−</mo><mi>Θ</mi><mo>(</mo><mfrac><mrow><mn>1</mn></mrow><mrow><msqrt><mrow><mi>k</mi></mrow></msqrt></mrow></mfrac><mo>)</mo><mo>)</mo></math></span>-approximation algorithm for the unsplittable case. Our approximation ratio is better than the previous results when <em>k</em> is less than a fairly large value, approximately <span><math><mn>1.7</mn><mo>×</mo><msup><mrow><mn>10</mn></mrow><mrow><mn>7</mn></mrow></msup></math></span>.</div><div>For small values of <em>k</em>, we design independent and elegant algorithms with further improvements. For the splittable and unit-demand cases, we improve the approximation ratio from 1.792 to 1.500 for <span><math><mi>k</mi><mo>=</mo><mn>3</mn></math></span>, and from 1.750 to 1.500 for <span><math><mi>k</mi><mo>=</mo><mn>4</mn></math></span>. For the unsplittable case, we improve the approximation ratio from 1.792 to 1.500 for <span><math><mi>k</mi><mo>=</mo><mn>3</mn></math></span>, from 2.051 to 1.750 for <span><math><mi>k</mi><mo>=</mo><mn>4</mn></math></span>, and from 2.249 to 2.157 for <span><math><mi>k</mi><mo>=</mo><mn>5</mn></math></span>. The approximation ratio for <span><math><mi>k</mi><mo>=</mo><mn>3</mn></math></span> surprisingly achieves the same value as in the splittable case. Our techniques, such as EX-ITP – an extension of the classic ITP method, have the potential to improve algorithms for other routing problems as well.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"308 ","pages":"Article 105405"},"PeriodicalIF":1.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145976580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A perfect matching reciprocity method for embedding multiple hypercubes in an augmented cube: Application to Hamiltonian decomposition 在增广立方体中嵌入多个超立方体的一种完美匹配互易方法:在哈密顿分解中的应用
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-01 DOI: 10.1016/j.ic.2025.105401
Da-Wei Yang , Hongyang Zhang , Rong-Xia Hao , Sun-Yuan Hsieh
This paper focuses on the embeddability of hypercubes in an important class of Cayley graphs, known as augmented cubes. An n-dimensional augmented cube AQn is constructed by augmenting the n-dimensional hypercube Qn with additional edges, thus making Qn a spanning subgraph of AQn. Dong and Wang (2019) first posed the problem of determining the number of Qn-isomorphic subgraphs in AQn, which still remains open. By exploiting the Cayley properties of AQn, we establish a lower bound for this number. Furthermore, we develop a method for constructing pairs of Qn-isomorphic subgraphs in AQn with the minimum number of common edges. This is accomplished through the use of reciprocal perfect matchings, a technique that also relies on the Cayley property of AQn. As an application, we prove that AQn admits n1 edge-disjoint Hamiltonian cycles when n3 is odd and n2 cycles when n is even, thereby confirming a conjecture by Hung (2015) that AQn admits a Hamiltonian decomposition for odd n with n3.
本文主要研究一类重要的Cayley图的超立方体的可嵌入性,即增广立方体。通过在n维超立方体Qn上增加额外的边来构造n维增广立方体AQn,从而使Qn成为AQn的生成子图。Dong and Wang(2019)首先提出了确定AQn中qn -同构子图数量的问题,该问题仍然是开放的。通过利用AQn的Cayley性质,我们建立了这个数的下界。在此基础上,提出了一种构造具有最小公共边数的qn -同构子图对的方法。这是通过使用互反完美匹配来实现的,这种技术也依赖于AQn的Cayley性质。作为应用,我们证明了当n≥3为奇数时AQn允许n−1个边不相交的哈密顿循环,当n为偶数时n−2个循环,从而证实了Hung(2015)关于当n≥3时AQn允许奇数n的哈密顿分解的猜想。
{"title":"A perfect matching reciprocity method for embedding multiple hypercubes in an augmented cube: Application to Hamiltonian decomposition","authors":"Da-Wei Yang ,&nbsp;Hongyang Zhang ,&nbsp;Rong-Xia Hao ,&nbsp;Sun-Yuan Hsieh","doi":"10.1016/j.ic.2025.105401","DOIUrl":"10.1016/j.ic.2025.105401","url":null,"abstract":"<div><div>This paper focuses on the embeddability of hypercubes in an important class of Cayley graphs, known as augmented cubes. An <em>n</em>-dimensional augmented cube <span><math><mi>A</mi><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span> is constructed by augmenting the <em>n</em>-dimensional hypercube <span><math><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span> with additional edges, thus making <span><math><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span> a spanning subgraph of <span><math><mi>A</mi><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>. Dong and Wang (2019) first posed the problem of determining the number of <span><math><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>-isomorphic subgraphs in <span><math><mi>A</mi><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>, which still remains open. By exploiting the Cayley properties of <span><math><mi>A</mi><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>, we establish a lower bound for this number. Furthermore, we develop a method for constructing pairs of <span><math><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>-isomorphic subgraphs in <span><math><mi>A</mi><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span> with the minimum number of common edges. This is accomplished through the use of reciprocal perfect matchings, a technique that also relies on the Cayley property of <span><math><mi>A</mi><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>. As an application, we prove that <span><math><mi>A</mi><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span> admits <span><math><mi>n</mi><mo>−</mo><mn>1</mn></math></span> edge-disjoint Hamiltonian cycles when <span><math><mi>n</mi><mo>≥</mo><mn>3</mn></math></span> is odd and <span><math><mi>n</mi><mo>−</mo><mn>2</mn></math></span> cycles when <em>n</em> is even, thereby confirming a conjecture by Hung (2015) that <span><math><mi>A</mi><msub><mrow><mi>Q</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span> admits a Hamiltonian decomposition for odd <em>n</em> with <span><math><mi>n</mi><mo>≥</mo><mn>3</mn></math></span>.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"308 ","pages":"Article 105401"},"PeriodicalIF":1.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145884338","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Total conditional complexity of certain objects 某些对象的总条件复杂度
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-01 DOI: 10.1016/j.ic.2025.105400
Nikolay Vereshchagin
The fine approach to measure information dependence is based on the total conditional complexity CT(y|x), which is defined as the minimal length of a total program that outputs y on the input x. It is known that the total conditional complexity can be much larger than the plain conditional complexity. Such strings x,y are defined by means of a diagonal argument and are not otherwise interesting. In this paper we investigate whether this happens also for some natural objects having some other interesting properties. More specifically, we consider the following objects: the number of strings of complexity less than n and the lex first string of length n and complexity ⩾n. It is known that they have negligible mutual conditional complexities. In this paper we prove that their mutual total conditional complexities may be large. This is the first example of interesting objects whose plain conditional complexity is much less than the total one.
衡量信息依赖性的好方法是基于总条件复杂度CT(y|x),它被定义为输出y的输入x的总程序的最小长度。众所周知,总条件复杂度可以比普通条件复杂度大得多。这样的字符串x,y是通过对角参数定义的,否则就没什么意思了。在本文中,我们研究了对于一些具有其他有趣性质的自然物体是否也会发生这种情况。更具体地说,我们考虑以下对象:复杂度小于n的字符串的数量以及长度为n和复杂度大于或等于n的lex第一个字符串。众所周知,它们具有可忽略不计的相互条件复杂性。本文证明了它们的相互总条件复杂度可能很大。这是有趣对象的第一个例子,它的普通条件复杂性远低于总的条件复杂性。
{"title":"Total conditional complexity of certain objects","authors":"Nikolay Vereshchagin","doi":"10.1016/j.ic.2025.105400","DOIUrl":"10.1016/j.ic.2025.105400","url":null,"abstract":"<div><div>The fine approach to measure information dependence is based on the total conditional complexity <span><math><mtext>CT</mtext><mo>(</mo><mi>y</mi><mo>|</mo><mi>x</mi><mo>)</mo></math></span>, which is defined as the minimal length of a <em>total</em> program that outputs <em>y</em> on the input <em>x</em>. It is known that the total conditional complexity can be much larger than the plain conditional complexity. Such strings <span><math><mi>x</mi><mo>,</mo><mi>y</mi></math></span> are defined by means of a diagonal argument and are not otherwise interesting. In this paper we investigate whether this happens also for some natural objects having some other interesting properties. More specifically, we consider the following objects: the number of strings of complexity less than <em>n</em> and the lex first string of length <em>n</em> and complexity ⩾<em>n</em>. It is known that they have negligible mutual conditional complexities. In this paper we prove that their mutual total conditional complexities may be large. This is the first example of interesting objects whose plain conditional complexity is much less than the total one.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"308 ","pages":"Article 105400"},"PeriodicalIF":1.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145884336","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deterministic pushdown automata with translucent input letters 带有半透明输入字母的确定性下推自动机
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-01 DOI: 10.1016/j.ic.2026.105403
Martin Kutrib , Andreas Malcher , Carlo Mereghetti , Beatrice Palano , Priscilla Raucci , Matthias Wendlandt
The use of translucent input letters represents a way of implementing a discontinuous input processing in automata. In detail, a translucent automaton performs several sweeps from left to right on the input: according to the current state, some symbols are visible and can be processed, whereas some other symbols are invisible and may be processed in another sweep. We also distinguish between the returning and non-returning mode, which differ in the way the automaton behaves after reading a symbol: in the returning mode, a new sweep starts immediately, while in the non-returning mode, the device processes the next visible symbol.
Here, we investigate deterministic pushdown automata with translucent letters both in the returning and non-returning mode. We prove that the non-returning mode strictly outperforms the returning mode, and that the families of the languages accepted by these two types of devices can be ranked strictly between the deterministic context-free languages and the deterministic context-sensitive languages. Moreover, both families are shown to be incomparable to the families of context-free, growing context-sensitive, and Church-Rosser languages. The ability of accepting non-semilinear languages is also emphasized (addressing an open question in the literature). Finally, we study the closure properties of both language families under the Boolean operations, obtaining that they are both closed under complementation but not under union and intersection. Further non-closure results are pointed-out for returning devices.
半透明输入字母的使用代表了在自动机中实现不连续输入处理的一种方法。具体来说,一个半透明的自动机从左到右对输入执行几次扫描:根据当前状态,一些符号是可见的,可以处理,而另一些符号是不可见的,可以在另一次扫描中处理。我们还区分了返回模式和不返回模式,它们的不同之处在于自动机在读取符号后的行为方式:在返回模式下,立即开始新的扫描,而在不返回模式下,设备处理下一个可见符号。在这里,我们研究了半透明字母在返回和不返回模式下的确定性下推自动机。我们证明了不返回模式严格优于返回模式,并且这两种类型的设备所接受的语言族可以严格地排列在确定性上下文无关语言和确定性上下文敏感语言之间。此外,这两个家族都被证明是无法与上下文无关的、日益增长的上下文敏感的和Church-Rosser语言家族相比的。还强调了接受非非线性语言的能力(解决文献中的一个开放问题)。最后,我们研究了这两个语系在布尔运算下的闭包性质,得到了它们在补集下都是闭包的,而在并交下不闭包。进一步的非闭合结果指出了返回设备。
{"title":"Deterministic pushdown automata with translucent input letters","authors":"Martin Kutrib ,&nbsp;Andreas Malcher ,&nbsp;Carlo Mereghetti ,&nbsp;Beatrice Palano ,&nbsp;Priscilla Raucci ,&nbsp;Matthias Wendlandt","doi":"10.1016/j.ic.2026.105403","DOIUrl":"10.1016/j.ic.2026.105403","url":null,"abstract":"<div><div>The use of translucent input letters represents a way of implementing a discontinuous input processing in automata. In detail, a translucent automaton performs several sweeps from left to right on the input: according to the current state, some symbols are visible and can be processed, whereas some other symbols are invisible and may be processed in another sweep. We also distinguish between the returning and non-returning mode, which differ in the way the automaton behaves after reading a symbol: in the returning mode, a new sweep starts immediately, while in the non-returning mode, the device processes the next visible symbol.</div><div>Here, we investigate <em>deterministic pushdown automata with translucent letters</em> both in the returning and non-returning mode. We prove that the non-returning mode strictly outperforms the returning mode, and that the families of the languages accepted by these two types of devices can be ranked strictly between the deterministic context-free languages and the deterministic context-sensitive languages. Moreover, both families are shown to be incomparable to the families of context-free, growing context-sensitive, and Church-Rosser languages. The ability of accepting non-semilinear languages is also emphasized (addressing an open question in the literature). Finally, we study the closure properties of both language families under the Boolean operations, obtaining that they are both closed under complementation but not under union and intersection. Further non-closure results are pointed-out for returning devices.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"308 ","pages":"Article 105403"},"PeriodicalIF":1.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145976581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Corrigendum to “On the equivalence of uniform key agreement and sequential composition insecurity” [Information and Computation 307 (2025) 105365] “关于统一密钥一致性和顺序组合不安全性的等价性”的勘误表[信息与计算307 (2025)105365]
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2026-01-01 DOI: 10.1016/j.ic.2025.105402
Yusai Wu , Liqing Yu , Yu Yu
{"title":"Corrigendum to “On the equivalence of uniform key agreement and sequential composition insecurity” [Information and Computation 307 (2025) 105365]","authors":"Yusai Wu ,&nbsp;Liqing Yu ,&nbsp;Yu Yu","doi":"10.1016/j.ic.2025.105402","DOIUrl":"10.1016/j.ic.2025.105402","url":null,"abstract":"","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"308 ","pages":"Article 105402"},"PeriodicalIF":1.0,"publicationDate":"2026-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145884337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Spiking neural P systems with non-gated channels 非门控通道的脉冲神经P系统
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-18 DOI: 10.1016/j.ic.2025.105399
Yuzhen Zhao , Zhen Yang , Yueguo Luo , Hui Li , Wenke Zang
Spiking neural P systems (SNP systems) are parallel and distributed computational models mimicking the storage, processing, and transmission of spikes in the human brain nervous system. However, they do not consider the non-gated channels in human brain neurons, which would affect the storage and thus further affect the processing and transmission of spikes. To enhance the SNP systems' ability to process complex information and to make SNP systems more biologically plausible, this work constructs the SNP systems with non-gated channels (NGCSNP systems). In NGCSNP systems, when a neuron is not activated, the spikes in it slowly flow out into the environment through non-gated channels until a steady state is reached. That is, the number of spikes in a neuron nonlinearly varies automatically. In terms of computational power, this work proves the Turing universality of NGCSNP systems by simulating register machines. For the ADD/SUB/FIN/INPUT/deterministic ADD modules of the universal register machine, NGCSNP systems utilize only 7, 6, 3, 5, and 4 neurons, with each neuron containing a maximum of 2, 2, 2, 1, and 1 rules for module simulation, respectively. Compared to the other eight variants, NGCSNP systems use fewer computational resources. Also, this work proves the computational efficiency of NGCSNP systems by solving a classical NP-hard problem: Boolean Satisfiability Problems in linear time via a space-for-time strategy. NGCSNP systems introduce nonlinear features at the neuronal level, enhance the computational functionality as well as stability of the systems, save the computational resources, and provide clues for developing computational models that resemble the human brain.
尖峰神经P系统(SNP系统)是一种模拟人类脑神经系统中尖峰的存储、处理和传输的并行和分布式计算模型。然而,他们没有考虑人脑神经元中的非门控通道,这将影响存储,从而进一步影响峰值的处理和传输。为了增强SNP系统处理复杂信息的能力,并使SNP系统更具生物学合理性,本研究构建了具有非门控通道的SNP系统(NGCSNP系统)。在NGCSNP系统中,当一个神经元没有被激活时,它的尖峰会通过非门控通道缓慢地流入环境中,直到达到稳定状态。也就是说,一个神经元中的尖峰数是非线性自动变化的。在计算能力方面,本工作通过模拟寄存器机证明了NGCSNP系统的图灵通用性。对于通用寄存器机的ADD/SUB/FIN/INPUT/deterministic ADD模块,NGCSNP系统仅使用7、6、3、5和4个神经元,每个神经元最多分别包含2、2、2、1和1个模块仿真规则。与其他8种变体相比,NGCSNP系统使用的计算资源更少。此外,本文还通过空间换时间策略解决了一个经典的np困难问题:线性时间的布尔可满足性问题,证明了NGCSNP系统的计算效率。NGCSNP系统在神经元层面引入非线性特征,增强了系统的计算功能和稳定性,节省了计算资源,为开发类似人脑的计算模型提供了线索。
{"title":"Spiking neural P systems with non-gated channels","authors":"Yuzhen Zhao ,&nbsp;Zhen Yang ,&nbsp;Yueguo Luo ,&nbsp;Hui Li ,&nbsp;Wenke Zang","doi":"10.1016/j.ic.2025.105399","DOIUrl":"10.1016/j.ic.2025.105399","url":null,"abstract":"<div><div>Spiking neural P systems (SNP systems) are parallel and distributed computational models mimicking the storage, processing, and transmission of spikes in the human brain nervous system. However, they do not consider the non-gated channels in human brain neurons, which would affect the storage and thus further affect the processing and transmission of spikes. To enhance the SNP systems' ability to process complex information and to make SNP systems more biologically plausible, this work constructs the SNP systems with non-gated channels (NGCSNP systems). In NGCSNP systems, when a neuron is not activated, the spikes in it slowly flow out into the environment through non-gated channels until a steady state is reached. That is, the number of spikes in a neuron nonlinearly varies automatically. In terms of computational power, this work proves the Turing universality of NGCSNP systems by simulating register machines. For the ADD/SUB/FIN/INPUT/deterministic ADD modules of the universal register machine, NGCSNP systems utilize only 7, 6, 3, 5, and 4 neurons, with each neuron containing a maximum of 2, 2, 2, 1, and 1 rules for module simulation, respectively. Compared to the other eight variants, NGCSNP systems use fewer computational resources. Also, this work proves the computational efficiency of NGCSNP systems by solving a classical NP-hard problem: Boolean Satisfiability Problems in linear time via a space-for-time strategy. NGCSNP systems introduce nonlinear features at the neuronal level, enhance the computational functionality as well as stability of the systems, save the computational resources, and provide clues for developing computational models that resemble the human brain.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"308 ","pages":"Article 105399"},"PeriodicalIF":1.0,"publicationDate":"2025-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145840783","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Verifying and interpreting neural networks using finite automata 用有限自动机验证和解释神经网络
IF 1 4区 计算机科学 Q3 COMPUTER SCIENCE, THEORY & METHODS Pub Date : 2025-12-16 DOI: 10.1016/j.ic.2025.105398
Marco Sälzer , Eric Alsmann , Florian Bruse , Martin Lange
Verifying properties and interpreting the behaviour of deep neural networks (DNN) is an important task given their ubiquitous use in applications, including safety-critical ones, and their black-box nature. We propose an automata-theoretic approach to tackling problems arising in DNN analysis. We show that the input-output behaviour of a DNN can be captured precisely by a (special) weak Büchi automaton and we show how these can be used to address common verification and interpretation tasks of DNN like adversarial robustness or minimum sufficient reasons.
鉴于深度神经网络(DNN)在应用程序(包括安全关键应用程序)中的普遍应用以及它们的黑箱性质,验证属性和解释行为是一项重要的任务。我们提出了一种自动机理论方法来解决深度神经网络分析中出现的问题。我们展示了DNN的输入输出行为可以通过一个(特殊的)弱b chi自动机精确地捕获,我们展示了如何使用这些来解决DNN的常见验证和解释任务,如对抗鲁棒性或最小充分理由。
{"title":"Verifying and interpreting neural networks using finite automata","authors":"Marco Sälzer ,&nbsp;Eric Alsmann ,&nbsp;Florian Bruse ,&nbsp;Martin Lange","doi":"10.1016/j.ic.2025.105398","DOIUrl":"10.1016/j.ic.2025.105398","url":null,"abstract":"<div><div>Verifying properties and interpreting the behaviour of deep neural networks (DNN) is an important task given their ubiquitous use in applications, including safety-critical ones, and their black-box nature. We propose an automata-theoretic approach to tackling problems arising in DNN analysis. We show that the input-output behaviour of a DNN can be captured precisely by a (special) weak Büchi automaton and we show how these can be used to address common verification and interpretation tasks of DNN like adversarial robustness or minimum sufficient reasons.</div></div>","PeriodicalId":54985,"journal":{"name":"Information and Computation","volume":"308 ","pages":"Article 105398"},"PeriodicalIF":1.0,"publicationDate":"2025-12-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145791115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Information and Computation
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1