Pub Date : 2024-06-20DOI: 10.1016/j.ipl.2024.106518
Ting Lan, Huazhong Lü
The balanced hypercube , a variant of the hypercube, is a novel interconnection network topology for massive parallel systems. It is showed in [Theor. Comput. Sci. 947 (2023) 113708] that for any edge subset F of there exists a fault-free Hamiltonian cycle in for with if the degree of every vertex in is at least two and there exist no -cycles in . In this paper, we consider the existence of Hamiltonian cycles of when F is a matching (a set of disjoint edges), and show that each edge lies on a fault-free Hamiltonian cycle of with . The number of faulty edges in F can be up to , which is exponential to the dimension n.
{"title":"Hamiltonian cycles of balanced hypercube with disjoint faulty edges","authors":"Ting Lan, Huazhong Lü","doi":"10.1016/j.ipl.2024.106518","DOIUrl":"https://doi.org/10.1016/j.ipl.2024.106518","url":null,"abstract":"<div><p>The balanced hypercube <span><math><mi>B</mi><msub><mrow><mi>H</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>, a variant of the hypercube, is a novel interconnection network topology for massive parallel systems. It is showed in [Theor. Comput. Sci. 947 (2023) 113708] that for any edge subset <em>F</em> of <span><math><mi>B</mi><msub><mrow><mi>H</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span> there exists a fault-free Hamiltonian cycle in <span><math><mi>B</mi><msub><mrow><mi>H</mi></mrow><mrow><mi>n</mi></mrow></msub><mo>−</mo><mi>F</mi></math></span> for <span><math><mi>n</mi><mo>≥</mo><mn>2</mn></math></span> with <span><math><mrow><mo>|</mo><mi>F</mi><mo>|</mo></mrow><mo>≤</mo><mn>5</mn><mi>n</mi><mo>−</mo><mn>7</mn></math></span> if the degree of every vertex in <span><math><mi>B</mi><msub><mrow><mi>H</mi></mrow><mrow><mi>n</mi></mrow></msub><mo>−</mo><mi>F</mi></math></span> is at least two and there exist no <span><math><msub><mrow><mi>f</mi></mrow><mrow><mn>4</mn></mrow></msub></math></span>-cycles in <span><math><mi>B</mi><msub><mrow><mi>H</mi></mrow><mrow><mi>n</mi></mrow></msub><mo>−</mo><mi>F</mi></math></span>. In this paper, we consider the existence of Hamiltonian cycles of <span><math><mi>B</mi><msub><mrow><mi>H</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span> when <em>F</em> is a matching (a set of disjoint edges), and show that each edge <span><math><mi>e</mi><mo>∉</mo><mi>F</mi></math></span> lies on a fault-free Hamiltonian cycle of <span><math><mi>B</mi><msub><mrow><mi>H</mi></mrow><mrow><mi>n</mi></mrow></msub><mo>−</mo><mi>F</mi></math></span> with <span><math><mi>n</mi><mo>≥</mo><mn>2</mn></math></span>. The number of faulty edges in <em>F</em> can be up to <span><math><msup><mrow><mn>2</mn></mrow><mrow><mn>2</mn><mi>n</mi><mo>−</mo><mn>1</mn></mrow></msup></math></span>, which is exponential to the dimension <em>n</em>.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106518"},"PeriodicalIF":0.7,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141483423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The seminal work by Pagh [1] proposed a matrix multiplication algorithm for real-valued squared matrices called Compressed Matrix Multiplication (CMM) having a sparse matrix output product. The algorithm is based on a popular sketching technique called Count-Sketch [2] and Fast Fourier Transform (FFT). For input square matrices A and B of order n and the product matrix AB with Frobenius norm , the algorithm offers an unbiased estimate for each entry, i.e., of the product matrix AB with a variance bounded by , where b is the compressed bucket size. Thus, the variance will eventually become high for a small bucket size. In this work, we address the high variance problem of CMM with the help of a simple and practical technique based on classical variance reduction methods in statistics. Our techniques rely on the Control Variate (CV) method. We suggest rigorous theoretical analysis for variance reduction and complement it via supporting empirical evidence.
Pagh [1] 的开创性工作提出了一种实值平方矩阵的矩阵乘法算法,称为压缩矩阵乘法 (CMM),具有稀疏矩阵输出乘积。该算法基于一种名为 "计数草图"(Count-Sketch)[2] 的流行草图技术和快速傅立叶变换(FFT)。对于输入的 n 阶正方形矩阵 A 和 B 以及具有 Frobenius 准则 ||AB||F 的乘积矩阵 AB,该算法为乘积矩阵 AB 的每个条目(即 (AB)i,j)提供无偏估计,其方差以 ||AB||F2/b 为界,其中 b 是压缩桶大小。因此,对于较小的压缩桶大小,方差最终会变得很大。在这项工作中,我们以统计学中的经典方差缩小方法为基础,借助一种简单实用的技术来解决 CMM 的高方差问题。我们的技术依赖于控制变量(CV)方法。我们提出了减少方差的严格理论分析,并通过支持性的经验证据对其进行补充。
{"title":"Improving compressed matrix multiplication using control variate method","authors":"Bhisham Dev Verma , Punit Pankaj Dubey , Rameshwar Pratap , Manoj Thakur","doi":"10.1016/j.ipl.2024.106517","DOIUrl":"10.1016/j.ipl.2024.106517","url":null,"abstract":"<div><p>The seminal work by Pagh <span>[1]</span> proposed a matrix multiplication algorithm for real-valued squared matrices called Compressed Matrix Multiplication (CMM) having a sparse matrix output product. The algorithm is based on a popular sketching technique called Count-Sketch <span>[2]</span> and Fast Fourier Transform (FFT). For input square matrices <strong>A</strong> and <strong>B</strong> of order <em>n</em> and the product matrix <strong>AB</strong> with Frobenius norm <span><math><mo>|</mo><mo>|</mo><mrow><mi>AB</mi></mrow><mo>|</mo><msub><mrow><mo>|</mo></mrow><mrow><mi>F</mi></mrow></msub></math></span>, the algorithm offers an unbiased estimate for each entry, <em>i.e.</em>, <span><math><msub><mrow><mo>(</mo><mrow><mi>AB</mi></mrow><mo>)</mo></mrow><mrow><mi>i</mi><mo>,</mo><mi>j</mi></mrow></msub></math></span> of the product matrix <strong>AB</strong> with a variance bounded by <span><math><mo>|</mo><mo>|</mo><mrow><mi>AB</mi></mrow><mo>|</mo><msubsup><mrow><mo>|</mo></mrow><mrow><mi>F</mi></mrow><mrow><mn>2</mn></mrow></msubsup><mo>/</mo><mi>b</mi></math></span>, where <em>b</em> is the compressed bucket size. Thus, the variance will eventually become high for a small bucket size. In this work, we address the high variance problem of CMM with the help of a simple and practical technique based on classical variance reduction methods in statistics. Our techniques rely on the Control Variate (CV) method. We suggest rigorous theoretical analysis for variance reduction and complement it via supporting empirical evidence.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106517"},"PeriodicalIF":0.5,"publicationDate":"2024-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141402112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-12DOI: 10.1016/j.ipl.2024.106516
Michael Dillencourt , Michael T. Goodrich , Michael Mitzenmacher
In this paper, we derive parameterized Chernoff bounds and show their applications for simplifying the analysis of some well-known probabilistic algorithms and data structures. The parameterized Chernoff bounds we provide give probability bounds that are powers of two, with a clean formulation of the relation between the constant in the exponent and the relative distance from the mean. In addition, we provide new simplified analyses with these bounds for hash tables, randomized routing, and a simplified, non-recursive adaptation of the Floyd-Rivest selection algorithm.
{"title":"Leveraging parameterized Chernoff bounds for simplified algorithm analyses","authors":"Michael Dillencourt , Michael T. Goodrich , Michael Mitzenmacher","doi":"10.1016/j.ipl.2024.106516","DOIUrl":"https://doi.org/10.1016/j.ipl.2024.106516","url":null,"abstract":"<div><p>In this paper, we derive parameterized Chernoff bounds and show their applications for simplifying the analysis of some well-known probabilistic algorithms and data structures. The parameterized Chernoff bounds we provide give probability bounds that are powers of two, with a clean formulation of the relation between the constant in the exponent and the relative distance from the mean. In addition, we provide new simplified analyses with these bounds for hash tables, randomized routing, and a simplified, non-recursive adaptation of the Floyd-Rivest selection algorithm.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106516"},"PeriodicalIF":0.5,"publicationDate":"2024-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0020019024000462/pdfft?md5=67dfff867dbb54118accce695281b16f&pid=1-s2.0-S0020019024000462-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141323310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-03DOI: 10.1016/j.ipl.2024.106515
Jing-You Lin, Shi-Chun Tsai
Consider a set of demands, each taking length-k strings as input. The k-restriction problem is to construct a small set of length-m strings, such that given any k positions and any demand, there exists a string in the set satisfying the demand at these positions. The k-restriction problem relates to many problems, such as k-independent sets, covering arrays, and many other combinatorial applications. By considering the VC-dimension of demands, we prove bounds independent of the number of demands with the Lovász Local Lemma. As a result, we can prove better bounds for demands with finite VC-dimension.
考虑一组输入长度为 k 的字符串的需求。k 限制问题就是构造一个长度为 m 的字符串小集合,使得在任意 k 个位置和任意需求下,集合中都有一个字符串满足这些位置上的需求。k-restriction 问题与许多问题有关,如 k-independent 集、覆盖数组和许多其他组合应用。通过考虑需求的 VC 维度,我们利用 Lovász Local Lemma 证明了与需求数量无关的边界。因此,我们可以为具有有限 VC 维度的需求证明更好的边界。
{"title":"A note on the k-restriction problem","authors":"Jing-You Lin, Shi-Chun Tsai","doi":"10.1016/j.ipl.2024.106515","DOIUrl":"https://doi.org/10.1016/j.ipl.2024.106515","url":null,"abstract":"<div><p>Consider a set of demands, each taking length-<em>k</em> strings as input. The <em>k</em>-restriction problem is to construct a small set of length-<em>m</em> strings, such that given any <em>k</em> positions and any demand, there exists a string in the set satisfying the demand at these positions. The <em>k</em>-restriction problem relates to many problems, such as <em>k</em>-independent sets, covering arrays, and many other combinatorial applications. By considering the VC-dimension of demands, we prove bounds independent of the number of demands with the Lovász Local Lemma. As a result, we can prove better bounds for demands with finite VC-dimension.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106515"},"PeriodicalIF":0.5,"publicationDate":"2024-06-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141250243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-31DOI: 10.1016/j.ipl.2024.106514
Lixing Tan , Zhaohui Zhu , Jinjin Zhang
The labelling-based approach of abstract argumentation frameworks (AAFs) is beneficial for various applications requiring different levels of decisiveness. For labelling-based semantics, this paper provides an operator so-called reduced meet modulo an ultrafilter, which is inspired by its counterpart over extensions. All criteria involved in the definitions of fundamental labelling-based semantics in AAFs are shown to be closed under this operator. Based on this fact, this paper develops a simple and uniform way for exploring common properties of labelling-based semantics in AAFs, including the compactness of extensibility, the Dcpo and Lindenbaum properties, etc.
{"title":"Reduced meet over labelling-based semantics in abstract argumentation","authors":"Lixing Tan , Zhaohui Zhu , Jinjin Zhang","doi":"10.1016/j.ipl.2024.106514","DOIUrl":"https://doi.org/10.1016/j.ipl.2024.106514","url":null,"abstract":"<div><p>The labelling-based approach of <em>abstract argumentation frameworks</em> (AAFs) is beneficial for various applications requiring different levels of decisiveness. For labelling-based semantics, this paper provides an operator so-called reduced meet modulo an ultrafilter, which is inspired by its counterpart over extensions. All criteria involved in the definitions of fundamental labelling-based semantics in AAFs are shown to be closed under this operator. Based on this fact, this paper develops a simple and uniform way for exploring common properties of labelling-based semantics in AAFs, including the compactness of extensibility, the Dcpo and Lindenbaum properties, etc.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106514"},"PeriodicalIF":0.5,"publicationDate":"2024-05-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141250242","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-16DOI: 10.1016/j.ipl.2024.106513
Tsuri Farhana, Matthew J. Katz
We initiate the study of spanners under the Hausdorff and Fréchet distances. Let S be a set of points in and ε a non-negative real number. A subgraph H of the Euclidean graph over S is an ε-Hausdorff-spanner (resp., an ε-Fréchet-spanner) of S, if for any two points there exists a path in H between u and v, such that the Hausdorff distance (resp., the Fréchet distance) between and is at most ε. We show that any t-spanner of a planar point-set S is a -Hausdorff-spanner and a -Fréchet spanner. We also prove that for any , there exist a set of points S and an -Hausdorff-spanner of S and an -Fréchet-spanner of S, where and are constants, such that neither of them is a t-spanner.
我们开始研究豪斯多夫距离和弗雷谢特距离下的跨距。假设 S 是 Rd 中的一个点集,ε 是一个非负实数。如果对于任意两个点 u,v∈S 在 H 中存在一条 u 和 v 之间的路径 P(u,v),且 P(u,v) 之间的豪斯多夫距离(res、我们证明了平面点集 S 的任何 t-跨距都是 t2-12-Hausdorff 跨距和 min{t2,5t2-2t-34}-Fréchet 跨距。我们还证明,对于任意 t>1,存在一个点集 S 以及 S 的 ε1-Hausdorff 旋转器和 S 的 ε2-Fréchet 旋转器,其中 ε1 和 ε2 是常数,使得它们都不是 t 旋转器。
{"title":"Spanners under the Hausdorff and Fréchet distances","authors":"Tsuri Farhana, Matthew J. Katz","doi":"10.1016/j.ipl.2024.106513","DOIUrl":"10.1016/j.ipl.2024.106513","url":null,"abstract":"<div><p>We initiate the study of spanners under the Hausdorff and Fréchet distances. Let <em>S</em> be a set of points in <span><math><msup><mrow><mi>R</mi></mrow><mrow><mi>d</mi></mrow></msup></math></span> and <em>ε</em> a non-negative real number. A subgraph <em>H</em> of the Euclidean graph over <em>S</em> is an <em>ε-Hausdorff-spanner</em> (resp., an <em>ε-Fréchet-spanner</em>) of <em>S</em>, if for any two points <span><math><mi>u</mi><mo>,</mo><mi>v</mi><mo>∈</mo><mi>S</mi></math></span> there exists a path <span><math><mi>P</mi><mo>(</mo><mi>u</mi><mo>,</mo><mi>v</mi><mo>)</mo></math></span> in <em>H</em> between <em>u</em> and <em>v</em>, such that the Hausdorff distance (resp., the Fréchet distance) between <span><math><mi>P</mi><mo>(</mo><mi>u</mi><mo>,</mo><mi>v</mi><mo>)</mo></math></span> and <span><math><mover><mrow><mi>u</mi><mi>v</mi></mrow><mo>‾</mo></mover></math></span> is at most <em>ε</em>. We show that any <em>t</em>-spanner of a planar point-set <em>S</em> is a <span><math><mfrac><mrow><msqrt><mrow><msup><mrow><mi>t</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>−</mo><mn>1</mn></mrow></msqrt></mrow><mrow><mn>2</mn></mrow></mfrac></math></span>-Hausdorff-spanner and a <span><math><mi>min</mi><mo></mo><mo>{</mo><mfrac><mrow><mi>t</mi></mrow><mrow><mn>2</mn></mrow></mfrac><mo>,</mo><mfrac><mrow><msqrt><mrow><mn>5</mn><msup><mrow><mi>t</mi></mrow><mrow><mn>2</mn></mrow></msup><mo>−</mo><mn>2</mn><mi>t</mi><mo>−</mo><mn>3</mn></mrow></msqrt></mrow><mrow><mn>4</mn></mrow></mfrac><mo>}</mo></math></span>-Fréchet spanner. We also prove that for any <span><math><mi>t</mi><mo>></mo><mn>1</mn></math></span>, there exist a set of points <em>S</em> and an <span><math><msub><mrow><mi>ε</mi></mrow><mrow><mn>1</mn></mrow></msub></math></span>-Hausdorff-spanner of <em>S</em> and an <span><math><msub><mrow><mi>ε</mi></mrow><mrow><mn>2</mn></mrow></msub></math></span>-Fréchet-spanner of <em>S</em>, where <span><math><msub><mrow><mi>ε</mi></mrow><mrow><mn>1</mn></mrow></msub></math></span> and <span><math><msub><mrow><mi>ε</mi></mrow><mrow><mn>2</mn></mrow></msub></math></span> are constants, such that neither of them is a <em>t</em>-spanner.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106513"},"PeriodicalIF":0.5,"publicationDate":"2024-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141046033","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-10DOI: 10.1016/j.ipl.2024.106512
Fuki Ito
This article treats AND-OR tree computation in terms of query complexity. We are interested in the cases where assignments (inputs) or algorithms are randomized. For the former case, it is known that there is a unique randomized assignment achieving the distributional complexity of balanced trees. On the other hand, the dual problem has the opposite result; the optimal randomized algorithms for balanced trees are not unique. We extend the latter study on randomized algorithms to weakly-balanced trees, and see that the uniqueness still fails.
{"title":"Optimal randomized algorithms of weakly-balanced multi-branching AND-OR trees","authors":"Fuki Ito","doi":"10.1016/j.ipl.2024.106512","DOIUrl":"https://doi.org/10.1016/j.ipl.2024.106512","url":null,"abstract":"<div><p>This article treats AND-OR tree computation in terms of query complexity. We are interested in the cases where assignments (inputs) or algorithms are randomized. For the former case, it is known that there is a unique randomized assignment achieving the distributional complexity of balanced trees. On the other hand, the dual problem has the opposite result; the optimal randomized algorithms for balanced trees are not unique. We extend the latter study on randomized algorithms to weakly-balanced trees, and see that the uniqueness still fails.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106512"},"PeriodicalIF":0.5,"publicationDate":"2024-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140924529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-08DOI: 10.1016/j.ipl.2024.106501
Amir Hossein Ghodrati , Mohammad Ali Hosseinzadeh
In this paper, some lower and upper bounds for the subgraph centrality and communicability of a graph are proved. The expected value of the normalized total communicability of a random graph is also considered and asymptotically determined. Moreover, some computational results are presented to compare the bounds obtained in this paper with some other bounds in the literature.
{"title":"Lower and upper bounds on graph communicabilities","authors":"Amir Hossein Ghodrati , Mohammad Ali Hosseinzadeh","doi":"10.1016/j.ipl.2024.106501","DOIUrl":"https://doi.org/10.1016/j.ipl.2024.106501","url":null,"abstract":"<div><p>In this paper, some lower and upper bounds for the subgraph centrality and communicability of a graph are proved. The expected value of the normalized total communicability of a random <span><math><mi>G</mi><mo>(</mo><mi>n</mi><mo>,</mo><mi>p</mi><mo>)</mo></math></span> graph is also considered and asymptotically determined. Moreover, some computational results are presented to compare the bounds obtained in this paper with some other bounds in the literature.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106501"},"PeriodicalIF":0.5,"publicationDate":"2024-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140905396","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-08DOI: 10.1016/j.ipl.2024.106503
Johannes Rauch , Dieter Rautenbach , Uéverton S. Souza
One way to define the Matching Cut problem is: Given a graph G, is there an edge-cut M of G such that M is an independent set in the line graph of G? We propose the more general Conflict-Free Cut problem: Together with the graph G, we are given a so-called conflict graph on the edges of G, and we ask for an edge-cutset M of G that is independent in . Since conflict-free settings are popular generalizations of classical optimization problems and Conflict-Free Cut was not considered in the literature so far, we start the study of the problem. We show that the problem is -complete even when the maximum degree of G is 5 and is 1-regular. The same reduction implies an exponential lower bound on the solvability based on the Exponential Time Hypothesis. We also give parameterized complexity results: We show that the problem is fixed-parameter tractable with the vertex cover number of G as a parameter, and we show -hardness even when G has a feedback vertex set of size one, and the clique cover number of is the parameter. Since the clique cover number of is an upper bound on the independence number of and thus the solution size, this implies -hardness when parameterized by the cut size. We list polynomial-time solvable cases and interesting open problems. At last, we draw a connection to a symmetric variant of SAT.
定义匹配切割问题的一种方法是给定一个图 G,是否存在一个 G 的切边 M,使得 M 是 G 的线图中的一个独立集合?我们提出了更一般的无冲突剪切问题:在给定图 G 的同时,我们还给定了一个关于 G 边的所谓冲突图 Gˆ,我们要求 G 的边剪切集 M 在 Gˆ 中是独立的。由于无冲突设置是对经典优化问题的流行概括,而无冲突剪切在迄今为止的文献中还没有被考虑过,因此我们开始了对该问题的研究。我们的研究表明,即使 G 的最大度数为 5 且 Gˆ 为 1-regular 时,该问题也是 NP-完备的。基于指数时间假说,同样的还原意味着可解性的指数下限。我们还给出了参数化的复杂度结果:我们证明了以 G 的顶点覆盖数为参数的问题是固定参数可解的,而且即使 G 的反馈顶点集大小为 1,且以 Gˆ 的簇覆盖数为参数,我们也证明了问题的 W[1] 难度。由于 Gˆ 的簇覆盖数是 Gˆ 独立性数的上限,因此也是解大小的上限,这就意味着以切口大小为参数时的 W[1]-hardness 性。我们列出了多项式时间可解的情况和有趣的开放问题。最后,我们将其与 SAT 的对称变体联系起来。
{"title":"On conflict-free cuts: Algorithms and complexity","authors":"Johannes Rauch , Dieter Rautenbach , Uéverton S. Souza","doi":"10.1016/j.ipl.2024.106503","DOIUrl":"https://doi.org/10.1016/j.ipl.2024.106503","url":null,"abstract":"<div><p>One way to define the <span>Matching Cut</span> problem is: Given a graph <em>G</em>, is there an edge-cut <em>M</em> of <em>G</em> such that <em>M</em> is an independent set in the line graph of <em>G</em>? We propose the more general <span>Conflict-Free Cut</span> problem: Together with the graph <em>G</em>, we are given a so-called conflict graph <span><math><mover><mrow><mi>G</mi></mrow><mrow><mo>ˆ</mo></mrow></mover></math></span> on the edges of <em>G</em>, and we ask for an edge-cutset <em>M</em> of <em>G</em> that is independent in <span><math><mover><mrow><mi>G</mi></mrow><mrow><mo>ˆ</mo></mrow></mover></math></span>. Since conflict-free settings are popular generalizations of classical optimization problems and <span>Conflict-Free Cut</span> was not considered in the literature so far, we start the study of the problem. We show that the problem is <span><math><mi>NP</mi></math></span>-complete even when the maximum degree of <em>G</em> is 5 and <span><math><mover><mrow><mi>G</mi></mrow><mrow><mo>ˆ</mo></mrow></mover></math></span> is 1-regular. The same reduction implies an exponential lower bound on the solvability based on the Exponential Time Hypothesis. We also give parameterized complexity results: We show that the problem is fixed-parameter tractable with the vertex cover number of <em>G</em> as a parameter, and we show <span><math><mi>W</mi><mo>[</mo><mn>1</mn><mo>]</mo></math></span>-hardness even when <em>G</em> has a feedback vertex set of size one, and the clique cover number of <span><math><mover><mrow><mi>G</mi></mrow><mrow><mo>ˆ</mo></mrow></mover></math></span> is the parameter. Since the clique cover number of <span><math><mover><mrow><mi>G</mi></mrow><mrow><mo>ˆ</mo></mrow></mover></math></span> is an upper bound on the independence number of <span><math><mover><mrow><mi>G</mi></mrow><mrow><mo>ˆ</mo></mrow></mover></math></span> and thus the solution size, this implies <span><math><mi>W</mi><mo>[</mo><mn>1</mn><mo>]</mo></math></span>-hardness when parameterized by the cut size. We list polynomial-time solvable cases and interesting open problems. At last, we draw a connection to a symmetric variant of <span>SAT</span>.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106503"},"PeriodicalIF":0.5,"publicationDate":"2024-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0020019024000334/pdfft?md5=245b78d016a76de957fec713f0824a46&pid=1-s2.0-S0020019024000334-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140948679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-05-07DOI: 10.1016/j.ipl.2024.106502
Pasin Manurangsi
We consider the differentially private (DP) facility location problem in the so called super-set output setting proposed by Gupta et al. [13]. The current best known expected approximation ratio for an ϵ-DP algorithm is due to Cohen-Addad et al. [3] where n denote the size of the metric space, meanwhile the best known lower bound is [8].
In this short note, we give a lower bound of on the expected approximation ratio of any ϵ-DP algorithm, which is the first evidence that the approximation ratio has to grow with the size of the metric space.
我们考虑的是古普塔等人[13]提出的所谓超集输出环境下的差异化私有(DP)设施定位问题。Cohen-Addad 等人[3]提出的ϵ-DP 算法目前已知的最佳预期近似率是 O(lognϵ),其中 n 表示度量空间的大小,而已知的最佳下限是 Ω(1/ϵ) [8]。在这篇短文中,我们给出了任何ϵ-DP 算法的预期逼近率下限 Ω˜(min{logn,lognϵ}),这是逼近率必须随度量空间大小增长的第一个证据。
{"title":"Improved lower bound for differentially private facility location","authors":"Pasin Manurangsi","doi":"10.1016/j.ipl.2024.106502","DOIUrl":"https://doi.org/10.1016/j.ipl.2024.106502","url":null,"abstract":"<div><p>We consider the differentially private (DP) facility location problem in the so called <em>super-set output</em> setting proposed by Gupta et al. <span>[13]</span>. The current best known expected approximation ratio for an <em>ϵ</em>-DP algorithm is <span><math><mi>O</mi><mrow><mo>(</mo><mfrac><mrow><mi>log</mi><mo></mo><mi>n</mi></mrow><mrow><msqrt><mrow><mi>ϵ</mi></mrow></msqrt></mrow></mfrac><mo>)</mo></mrow></math></span> due to Cohen-Addad et al. <span>[3]</span> where <em>n</em> denote the size of the metric space, meanwhile the best known lower bound is <span><math><mi>Ω</mi><mo>(</mo><mn>1</mn><mo>/</mo><msqrt><mrow><mi>ϵ</mi></mrow></msqrt><mo>)</mo></math></span> <span>[8]</span>.</p><p>In this short note, we give a lower bound of <span><math><mover><mrow><mi>Ω</mi></mrow><mrow><mo>˜</mo></mrow></mover><mrow><mo>(</mo><mi>min</mi><mo></mo><mrow><mo>{</mo><mi>log</mi><mo></mo><mi>n</mi><mo>,</mo><msqrt><mrow><mfrac><mrow><mi>log</mi><mo></mo><mi>n</mi></mrow><mrow><mi>ϵ</mi></mrow></mfrac></mrow></msqrt><mo>}</mo></mrow><mo>)</mo></mrow></math></span> on the expected approximation ratio of any <em>ϵ</em>-DP algorithm, which is the first evidence that the approximation ratio has to grow with the size of the metric space.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106502"},"PeriodicalIF":0.5,"publicationDate":"2024-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"140880174","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}