Pub Date : 2024-08-13DOI: 10.1016/j.ipl.2024.106531
George Giakkoupis , Volker Turau , Isabella Ziccardi
We reconsider two well-known distributed randomized algorithms computing a maximal independent set, proposed in the seminal work of Luby (1986). We enhance these algorithms such that they become self-stabilizing without sacrificing their run-time, i.e., both stabilize in synchronous rounds with high probability on any n-node graph. The first algorithm gets along with three states, but needs to know an upper bound on the maximum degree. The second does not need any information about the graph, but uses a number of states that is linear in the node degree. Both algorithms use messages of logarithmic size.
我们重新考虑了卢比(Luby,1986 年)的开创性工作中提出的计算最大独立集的两种著名分布式随机算法。我们对这些算法进行了改进,使它们在不牺牲运行时间的情况下实现自稳定,也就是说,在任何 n 个节点图上,这两种算法都能在 O(logn) 同步轮中高概率地实现稳定。第一种算法有三种状态,但需要知道最大度的上限。第二种算法不需要任何有关图的信息,但使用的状态数与节点度呈线性关系。两种算法都使用对数大小的信息。
{"title":"Luby's MIS algorithms made self-stabilizing","authors":"George Giakkoupis , Volker Turau , Isabella Ziccardi","doi":"10.1016/j.ipl.2024.106531","DOIUrl":"10.1016/j.ipl.2024.106531","url":null,"abstract":"<div><p>We reconsider two well-known distributed randomized algorithms computing a maximal independent set, proposed in the seminal work of Luby (1986). We enhance these algorithms such that they become self-stabilizing without sacrificing their run-time, i.e., both stabilize in <span><math><mi>O</mi><mo>(</mo><mi>log</mi><mo></mo><mi>n</mi><mo>)</mo></math></span> synchronous rounds with high probability on any <em>n</em>-node graph. The first algorithm gets along with three states, but needs to know an upper bound on the maximum degree. The second does not need any information about the graph, but uses a number of states that is linear in the node degree. Both algorithms use messages of logarithmic size.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"188 ","pages":"Article 106531"},"PeriodicalIF":0.7,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0020019024000619/pdfft?md5=8797cfe630838abf367b5e1ac7c3484f&pid=1-s2.0-S0020019024000619-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141985068","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-13DOI: 10.1016/j.ipl.2024.106530
Dhanyamol Antony , Sagartanu Pal , R.B. Sandeep
For a class of graphs, the objective of Subgraph Complementation to is to find whether there exists a subset S of vertices of the input graph G such that modifying G by complementing the subgraph induced by S results in a graph in . We obtain a polynomial-time algorithm for the problem when is the class of graphs with minimum degree at least k, for a constant k, answering an open problem by Fomin et al. (Algorithmica, 2020). When is the class of graphs without any induced copies of the star graph on vertices (for any constant ) and diamond, we obtain a polynomial-time algorithm for the problem. This is in contrast with a result by Antony et al. (Algorithmica, 2022) that the problem is NP-complete and cannot be solved in subexponential-time (assuming the Exponential Time Hypothesis) when is the class of graphs without any induced copies of the star graph on vertices, for every constant .
对于一类图 G,子图补全 G 的目标是找到输入图 G 的顶点是否存在一个子集 S,从而通过补全 S 诱导的子图来修改 G,从而得到 G 中的一个图。当 G 是最小度至少为 k 的一类图时,对于常数 k,我们得到了该问题的多项式时间算法,回答了 Fomin 等人提出的一个开放问题(Algorithmica, 2020)。当 G 是 t+1 个顶点上没有星形图的任何诱导副本(对于任意常数 t≥3)和菱形的图类时,我们得到了该问题的多项式时间算法。这与 Antony 等人(Algorithmica,2022 年)的结果形成鲜明对比:当 G 是一类没有任何星形图在 t+1 个顶点上的诱导副本的图时,对于每个常数 t≥5,该问题是 NP-完全的,并且无法在亚指数时间内求解(假设指数时间假设)。
{"title":"Algorithms for subgraph complementation to some classes of graphs","authors":"Dhanyamol Antony , Sagartanu Pal , R.B. Sandeep","doi":"10.1016/j.ipl.2024.106530","DOIUrl":"10.1016/j.ipl.2024.106530","url":null,"abstract":"<div><p>For a class <span><math><mi>G</mi></math></span> of graphs, the objective of <span>Subgraph Complementation to</span> <span><math><mi>G</mi></math></span> is to find whether there exists a subset <em>S</em> of vertices of the input graph <em>G</em> such that modifying <em>G</em> by complementing the subgraph induced by <em>S</em> results in a graph in <span><math><mi>G</mi></math></span>. We obtain a polynomial-time algorithm for the problem when <span><math><mi>G</mi></math></span> is the class of graphs with minimum degree at least <em>k</em>, for a constant <em>k</em>, answering an open problem by Fomin et al. (Algorithmica, 2020). When <span><math><mi>G</mi></math></span> is the class of graphs without any induced copies of the star graph on <span><math><mi>t</mi><mo>+</mo><mn>1</mn></math></span> vertices (for any constant <span><math><mi>t</mi><mo>≥</mo><mn>3</mn></math></span>) and diamond, we obtain a polynomial-time algorithm for the problem. This is in contrast with a result by Antony et al. (Algorithmica, 2022) that the problem is NP-complete and cannot be solved in subexponential-time (assuming the Exponential Time Hypothesis) when <span><math><mi>G</mi></math></span> is the class of graphs without any induced copies of the star graph on <span><math><mi>t</mi><mo>+</mo><mn>1</mn></math></span> vertices, for every constant <span><math><mi>t</mi><mo>≥</mo><mn>5</mn></math></span>.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"188 ","pages":"Article 106530"},"PeriodicalIF":0.7,"publicationDate":"2024-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141985069","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-08DOI: 10.1016/j.ipl.2024.106523
Grzegorz Głuch, Krzysztof Loryś
The problem that we consider is the following: given an array A of positive numbers and a natural number p, find a tiling using at most p rectangles (which means that each array element must be covered by some rectangle and no two rectangles must overlap) that minimizes the maximum weight of any rectangle (the weight of a rectangle is the sum of elements which are covered by it). We prove that it is NP-hard to approximate this problem to within a factor of 1 (the previous best result was ).
{"title":"4/3 rectangle tiling lower bound","authors":"Grzegorz Głuch, Krzysztof Loryś","doi":"10.1016/j.ipl.2024.106523","DOIUrl":"10.1016/j.ipl.2024.106523","url":null,"abstract":"<div><p>The problem that we consider is the following: given an <span><math><mi>n</mi><mo>×</mo><mi>n</mi></math></span> array <em>A</em> of positive numbers and a natural number <em>p</em>, find a tiling using at most <em>p</em> rectangles (which means that each array element must be covered by some rectangle and no two rectangles must overlap) that minimizes the maximum weight of any rectangle (the weight of a rectangle is the sum of elements which are covered by it). We prove that it is NP-hard to approximate this problem to within a factor of <strong>1</strong><span><math><mfrac><mrow><mn>1</mn></mrow><mrow><mn>3</mn></mrow></mfrac></math></span> (the previous best result was <span><math><mn>1</mn><mfrac><mrow><mn>1</mn></mrow><mrow><mn>4</mn></mrow></mfrac></math></span>).</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"188 ","pages":"Article 106523"},"PeriodicalIF":0.7,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141940421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-08-08DOI: 10.1016/j.ipl.2024.106522
Martin Zimmermann
We robustify PCTL and PCTL⁎, the most important specification languages for probabilistic systems, and show that robustness does not increase the complexity of their model-checking problems.
{"title":"Robust probabilistic temporal logics","authors":"Martin Zimmermann","doi":"10.1016/j.ipl.2024.106522","DOIUrl":"10.1016/j.ipl.2024.106522","url":null,"abstract":"<div><p>We robustify PCTL and PCTL<sup>⁎</sup>, the most important specification languages for probabilistic systems, and show that robustness does not increase the complexity of their model-checking problems.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"188 ","pages":"Article 106522"},"PeriodicalIF":0.7,"publicationDate":"2024-08-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0020019024000528/pdfft?md5=a8b85e941455bedd212a2027c3c635b8&pid=1-s2.0-S0020019024000528-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141940422","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-14DOI: 10.1016/j.ipl.2024.106521
Jie Chen , Yi-Ping Liang , Cai-Xia Wang , Shou-Jun Xu
A subset S of the vertex set of a graph G is an -isolating set of G if does not contain a copy of a member of as a subgraph, where is a family of connected graphs and is the closed neighborhood of S. The -isolation number of G is the minimum cardinality of an -isolating set of G, denoted by . Given a graph G, -ISOLATION asks for the size of a smallest -isolating set of G for a fixed positive integer k, where is a path of order k. In this paper, we first show that the decision version of -ISOLATION is NP-complete for chordal graphs and planar graphs. Secondly, we propose a linear time algorithm to compute a smallest -isolating set of a tree. Finally, we solve the problem of characterizing the connected graphs G with , proposed by Zhang and Wu [Discrete Appl. Math. 304 (2021) 365-374].
如果 G-N[S] 不包含作为子图的 F 成员的副本,则图 G 的顶点集的子集 S 是 G 的 F 隔离集,其中 F 是连通图族,N[S] 是 S 的封闭邻域。G 的 F 隔离数是 G 的 F 隔离集的最小心性,用 ι(G,F) 表示。给定一个图 G,{Pk}-ISOLATION 会求解在固定正整数 k 条件下 G 的最小 {Pk} 隔离集的大小,其中 Pk 是阶数为 k 的路径。在本文中,我们首先证明对于弦图和平面图,{Pk}-ISOLATION 的判定版本是 NP-完全的。其次,我们提出了一种计算树的最小 {Pk} 隔离集的线性时间算法。最后,我们解决了张和吴提出的具有 ι(G,{P3})=27|V(G)| 的连通图 G 的特征问题[离散应用数学 304 (2021) 365-374]。
{"title":"Algorithmic aspects of {Pk}-isolation in graphs and extremal graphs for a {P3}-isolation bound","authors":"Jie Chen , Yi-Ping Liang , Cai-Xia Wang , Shou-Jun Xu","doi":"10.1016/j.ipl.2024.106521","DOIUrl":"10.1016/j.ipl.2024.106521","url":null,"abstract":"<div><p>A subset <em>S</em> of the vertex set of a graph <em>G</em> is an <span><math><mi>F</mi></math></span><em>-isolating set</em> of <em>G</em> if <span><math><mi>G</mi><mo>−</mo><mi>N</mi><mo>[</mo><mi>S</mi><mo>]</mo></math></span> does not contain a copy of a member of <span><math><mi>F</mi></math></span> as a subgraph, where <span><math><mi>F</mi></math></span> is a family of connected graphs and <span><math><mi>N</mi><mo>[</mo><mi>S</mi><mo>]</mo></math></span> is the closed neighborhood of <em>S</em>. The <span><math><mi>F</mi></math></span><em>-isolation number</em> of <em>G</em> is the minimum cardinality of an <span><math><mi>F</mi></math></span>-isolating set of <em>G</em>, denoted by <span><math><mi>ι</mi><mo>(</mo><mi>G</mi><mo>,</mo><mi>F</mi><mo>)</mo></math></span>. Given a graph <em>G</em>, <span><math><mo>{</mo><msub><mrow><mi>P</mi></mrow><mrow><mi>k</mi></mrow></msub><mo>}</mo></math></span>-ISOLATION asks for the size of a smallest <span><math><mo>{</mo><msub><mrow><mi>P</mi></mrow><mrow><mi>k</mi></mrow></msub><mo>}</mo></math></span>-isolating set of <em>G</em> for a fixed positive integer <em>k</em>, where <span><math><msub><mrow><mi>P</mi></mrow><mrow><mi>k</mi></mrow></msub></math></span> is a path of order <em>k</em>. In this paper, we first show that the decision version of <span><math><mo>{</mo><msub><mrow><mi>P</mi></mrow><mrow><mi>k</mi></mrow></msub><mo>}</mo></math></span>-ISOLATION is NP-complete for chordal graphs and planar graphs. Secondly, we propose a linear time algorithm to compute a smallest <span><math><mo>{</mo><msub><mrow><mi>P</mi></mrow><mrow><mi>k</mi></mrow></msub><mo>}</mo></math></span>-isolating set of a tree. Finally, we solve the problem of characterizing the connected graphs <em>G</em> with <span><math><mi>ι</mi><mo>(</mo><mi>G</mi><mo>,</mo><mo>{</mo><msub><mrow><mi>P</mi></mrow><mrow><mn>3</mn></mrow></msub><mo>}</mo><mo>)</mo><mo>=</mo><mfrac><mrow><mn>2</mn></mrow><mrow><mn>7</mn></mrow></mfrac><mo>|</mo><mi>V</mi><mo>(</mo><mi>G</mi><mo>)</mo><mo>|</mo></math></span>, proposed by Zhang and Wu [Discrete Appl. Math. 304 (2021) 365-374].</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106521"},"PeriodicalIF":0.7,"publicationDate":"2024-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141629965","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-07-01DOI: 10.1016/j.ipl.2024.106520
Michael C. Chavrimootoo
Using the notion of visibility representations, our paper establishes a new property of instances of the Nondeterministic Constraint Logic (NCL) problem (a PSPACE-complete problem that is very convenient to prove the PSPACE-hardness of reversible games with pushing blocks). Direct use of this property introduces an explosion in the number of gadgets needed to show PSPACE-hardness, but we show how to bring that number from 32 down to only three in the general case, and down to two in our specific case! We propose it as a step towards a broader and more general framework for studying games with irreversible gravity, and use this connection to guide an indirect polynomial-time many-one reduction from the NCL problem to the Hanano Puzzle—which is NP-hard—to prove it is PSPACE-complete.
{"title":"Defying gravity and gadget numerosity: The complexity of the Hanano Puzzle and beyond","authors":"Michael C. Chavrimootoo","doi":"10.1016/j.ipl.2024.106520","DOIUrl":"https://doi.org/10.1016/j.ipl.2024.106520","url":null,"abstract":"<div><p>Using the notion of visibility representations, our paper establishes a new property of instances of the Nondeterministic Constraint Logic (NCL) problem (a PSPACE-complete problem that is very convenient to prove the PSPACE-hardness of reversible games with pushing blocks). Direct use of this property introduces an explosion in the number of gadgets needed to show PSPACE-hardness, but we show how to bring that number from 32 down to only three in the general case, and down to two in our specific case! We propose it as a step towards a broader and more general framework for studying games with irreversible gravity, and use this connection to guide an indirect polynomial-time many-one reduction from the NCL problem to the Hanano Puzzle—which is NP-hard—to prove it is PSPACE-complete.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106520"},"PeriodicalIF":0.7,"publicationDate":"2024-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141605828","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-26DOI: 10.1016/j.ipl.2024.106519
Warut Suksompong
Fair division is a longstanding problem in economics and has recently received substantial interest in computer science. Several applications of fair division involve agents with unequal entitlements represented by weights. We review work on weighted fair division of indivisible items, discuss the range of weighted fairness notions that have been proposed, and highlight a number of open questions.
{"title":"Weighted fair division of indivisible items: A review","authors":"Warut Suksompong","doi":"10.1016/j.ipl.2024.106519","DOIUrl":"https://doi.org/10.1016/j.ipl.2024.106519","url":null,"abstract":"<div><p>Fair division is a longstanding problem in economics and has recently received substantial interest in computer science. Several applications of fair division involve agents with unequal entitlements represented by weights. We review work on weighted fair division of indivisible items, discuss the range of weighted fairness notions that have been proposed, and highlight a number of open questions.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106519"},"PeriodicalIF":0.7,"publicationDate":"2024-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0020019024000498/pdfft?md5=542bbcb05fc9701066d615985a892ca7&pid=1-s2.0-S0020019024000498-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141483424","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-20DOI: 10.1016/j.ipl.2024.106518
Ting Lan, Huazhong Lü
The balanced hypercube , a variant of the hypercube, is a novel interconnection network topology for massive parallel systems. It is showed in [Theor. Comput. Sci. 947 (2023) 113708] that for any edge subset F of there exists a fault-free Hamiltonian cycle in for with if the degree of every vertex in is at least two and there exist no -cycles in . In this paper, we consider the existence of Hamiltonian cycles of when F is a matching (a set of disjoint edges), and show that each edge lies on a fault-free Hamiltonian cycle of with . The number of faulty edges in F can be up to , which is exponential to the dimension n.
{"title":"Hamiltonian cycles of balanced hypercube with disjoint faulty edges","authors":"Ting Lan, Huazhong Lü","doi":"10.1016/j.ipl.2024.106518","DOIUrl":"https://doi.org/10.1016/j.ipl.2024.106518","url":null,"abstract":"<div><p>The balanced hypercube <span><math><mi>B</mi><msub><mrow><mi>H</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span>, a variant of the hypercube, is a novel interconnection network topology for massive parallel systems. It is showed in [Theor. Comput. Sci. 947 (2023) 113708] that for any edge subset <em>F</em> of <span><math><mi>B</mi><msub><mrow><mi>H</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span> there exists a fault-free Hamiltonian cycle in <span><math><mi>B</mi><msub><mrow><mi>H</mi></mrow><mrow><mi>n</mi></mrow></msub><mo>−</mo><mi>F</mi></math></span> for <span><math><mi>n</mi><mo>≥</mo><mn>2</mn></math></span> with <span><math><mrow><mo>|</mo><mi>F</mi><mo>|</mo></mrow><mo>≤</mo><mn>5</mn><mi>n</mi><mo>−</mo><mn>7</mn></math></span> if the degree of every vertex in <span><math><mi>B</mi><msub><mrow><mi>H</mi></mrow><mrow><mi>n</mi></mrow></msub><mo>−</mo><mi>F</mi></math></span> is at least two and there exist no <span><math><msub><mrow><mi>f</mi></mrow><mrow><mn>4</mn></mrow></msub></math></span>-cycles in <span><math><mi>B</mi><msub><mrow><mi>H</mi></mrow><mrow><mi>n</mi></mrow></msub><mo>−</mo><mi>F</mi></math></span>. In this paper, we consider the existence of Hamiltonian cycles of <span><math><mi>B</mi><msub><mrow><mi>H</mi></mrow><mrow><mi>n</mi></mrow></msub></math></span> when <em>F</em> is a matching (a set of disjoint edges), and show that each edge <span><math><mi>e</mi><mo>∉</mo><mi>F</mi></math></span> lies on a fault-free Hamiltonian cycle of <span><math><mi>B</mi><msub><mrow><mi>H</mi></mrow><mrow><mi>n</mi></mrow></msub><mo>−</mo><mi>F</mi></math></span> with <span><math><mi>n</mi><mo>≥</mo><mn>2</mn></math></span>. The number of faulty edges in <em>F</em> can be up to <span><math><msup><mrow><mn>2</mn></mrow><mrow><mn>2</mn><mi>n</mi><mo>−</mo><mn>1</mn></mrow></msup></math></span>, which is exponential to the dimension <em>n</em>.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106518"},"PeriodicalIF":0.7,"publicationDate":"2024-06-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141483423","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
The seminal work by Pagh [1] proposed a matrix multiplication algorithm for real-valued squared matrices called Compressed Matrix Multiplication (CMM) having a sparse matrix output product. The algorithm is based on a popular sketching technique called Count-Sketch [2] and Fast Fourier Transform (FFT). For input square matrices A and B of order n and the product matrix AB with Frobenius norm , the algorithm offers an unbiased estimate for each entry, i.e., of the product matrix AB with a variance bounded by , where b is the compressed bucket size. Thus, the variance will eventually become high for a small bucket size. In this work, we address the high variance problem of CMM with the help of a simple and practical technique based on classical variance reduction methods in statistics. Our techniques rely on the Control Variate (CV) method. We suggest rigorous theoretical analysis for variance reduction and complement it via supporting empirical evidence.
Pagh [1] 的开创性工作提出了一种实值平方矩阵的矩阵乘法算法,称为压缩矩阵乘法 (CMM),具有稀疏矩阵输出乘积。该算法基于一种名为 "计数草图"(Count-Sketch)[2] 的流行草图技术和快速傅立叶变换(FFT)。对于输入的 n 阶正方形矩阵 A 和 B 以及具有 Frobenius 准则 ||AB||F 的乘积矩阵 AB,该算法为乘积矩阵 AB 的每个条目(即 (AB)i,j)提供无偏估计,其方差以 ||AB||F2/b 为界,其中 b 是压缩桶大小。因此,对于较小的压缩桶大小,方差最终会变得很大。在这项工作中,我们以统计学中的经典方差缩小方法为基础,借助一种简单实用的技术来解决 CMM 的高方差问题。我们的技术依赖于控制变量(CV)方法。我们提出了减少方差的严格理论分析,并通过支持性的经验证据对其进行补充。
{"title":"Improving compressed matrix multiplication using control variate method","authors":"Bhisham Dev Verma , Punit Pankaj Dubey , Rameshwar Pratap , Manoj Thakur","doi":"10.1016/j.ipl.2024.106517","DOIUrl":"10.1016/j.ipl.2024.106517","url":null,"abstract":"<div><p>The seminal work by Pagh <span>[1]</span> proposed a matrix multiplication algorithm for real-valued squared matrices called Compressed Matrix Multiplication (CMM) having a sparse matrix output product. The algorithm is based on a popular sketching technique called Count-Sketch <span>[2]</span> and Fast Fourier Transform (FFT). For input square matrices <strong>A</strong> and <strong>B</strong> of order <em>n</em> and the product matrix <strong>AB</strong> with Frobenius norm <span><math><mo>|</mo><mo>|</mo><mrow><mi>AB</mi></mrow><mo>|</mo><msub><mrow><mo>|</mo></mrow><mrow><mi>F</mi></mrow></msub></math></span>, the algorithm offers an unbiased estimate for each entry, <em>i.e.</em>, <span><math><msub><mrow><mo>(</mo><mrow><mi>AB</mi></mrow><mo>)</mo></mrow><mrow><mi>i</mi><mo>,</mo><mi>j</mi></mrow></msub></math></span> of the product matrix <strong>AB</strong> with a variance bounded by <span><math><mo>|</mo><mo>|</mo><mrow><mi>AB</mi></mrow><mo>|</mo><msubsup><mrow><mo>|</mo></mrow><mrow><mi>F</mi></mrow><mrow><mn>2</mn></mrow></msubsup><mo>/</mo><mi>b</mi></math></span>, where <em>b</em> is the compressed bucket size. Thus, the variance will eventually become high for a small bucket size. In this work, we address the high variance problem of CMM with the help of a simple and practical technique based on classical variance reduction methods in statistics. Our techniques rely on the Control Variate (CV) method. We suggest rigorous theoretical analysis for variance reduction and complement it via supporting empirical evidence.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106517"},"PeriodicalIF":0.5,"publicationDate":"2024-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141402112","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-06-12DOI: 10.1016/j.ipl.2024.106516
Michael Dillencourt , Michael T. Goodrich , Michael Mitzenmacher
In this paper, we derive parameterized Chernoff bounds and show their applications for simplifying the analysis of some well-known probabilistic algorithms and data structures. The parameterized Chernoff bounds we provide give probability bounds that are powers of two, with a clean formulation of the relation between the constant in the exponent and the relative distance from the mean. In addition, we provide new simplified analyses with these bounds for hash tables, randomized routing, and a simplified, non-recursive adaptation of the Floyd-Rivest selection algorithm.
{"title":"Leveraging parameterized Chernoff bounds for simplified algorithm analyses","authors":"Michael Dillencourt , Michael T. Goodrich , Michael Mitzenmacher","doi":"10.1016/j.ipl.2024.106516","DOIUrl":"https://doi.org/10.1016/j.ipl.2024.106516","url":null,"abstract":"<div><p>In this paper, we derive parameterized Chernoff bounds and show their applications for simplifying the analysis of some well-known probabilistic algorithms and data structures. The parameterized Chernoff bounds we provide give probability bounds that are powers of two, with a clean formulation of the relation between the constant in the exponent and the relative distance from the mean. In addition, we provide new simplified analyses with these bounds for hash tables, randomized routing, and a simplified, non-recursive adaptation of the Floyd-Rivest selection algorithm.</p></div>","PeriodicalId":56290,"journal":{"name":"Information Processing Letters","volume":"187 ","pages":"Article 106516"},"PeriodicalIF":0.5,"publicationDate":"2024-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.sciencedirect.com/science/article/pii/S0020019024000462/pdfft?md5=67dfff867dbb54118accce695281b16f&pid=1-s2.0-S0020019024000462-main.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"141323310","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}