Pub Date : 2025-02-26DOI: 10.1007/s00236-025-00482-2
Sounaka Mishra
For (tge 3), (K_{1, t}) is called t-claw. A graph (G=(V, E)) is t-claw free if it does not contain t-claw as a vertex-induced subgraph. In minimum t-claw deletion problem (Min-t-Claw-Del), given a graph (G=(V, E)), it is required to find a vertex set S of minimum size such that (G[Vsetminus S]) is t-claw free. In a split graph, the vertex set is partitioned into two sets such that one forms a clique and the other forms an independent set. Every t-claw in a split graph has a center vertex in the clique partition. This observation motivates us to consider the minimum one-sided bipartite t-claw deletion problem (Min-t-OSBCD). Given a bipartite graph (G=(A cup B, E)), in Min-t-OSBCD it is asked to find a vertex set S of minimum size such that (G[(A cup B) {setminus } S]) has no t-claw with the center vertex in A. A primal-dual algorithm approximates Min-t-OSBCD within a factor of t. We prove that it is ({textsf{UGC}})-hard to approximate with a factor better than t. We also prove it is approximable within a factor of 2 for dense bipartite graphs. By using these results on Min-t-OSBCD, we prove that Min-t-Claw-Del is ({textsf{UGC}})-hard to approximate within a factor better than t, for split graphs. We also consider their complementary maximization problems and prove that they are ({textsf{APX}})-complete.
{"title":"On minimum t-claw deletion in split graphs","authors":"Sounaka Mishra","doi":"10.1007/s00236-025-00482-2","DOIUrl":"10.1007/s00236-025-00482-2","url":null,"abstract":"<div><p>For <span>(tge 3)</span>, <span>(K_{1, t})</span> is called <i>t</i>-claw. A graph <span>(G=(V, E))</span> is <i>t</i>-claw free if it does not contain <i>t</i>-claw as a vertex-induced subgraph. In minimum <i>t</i>-claw deletion problem (<span>Min-</span><i>t</i>-<span>Claw-Del</span>), given a graph <span>(G=(V, E))</span>, it is required to find a vertex set <i>S</i> of minimum size such that <span>(G[Vsetminus S])</span> is <i>t</i>-claw free. In a split graph, the vertex set is partitioned into two sets such that one forms a clique and the other forms an independent set. Every <i>t</i>-claw in a split graph has a center vertex in the clique partition. This observation motivates us to consider the minimum one-sided bipartite <i>t</i>-claw deletion problem (<span>Min-</span><i>t</i><span>-OSBCD</span>). Given a bipartite graph <span>(G=(A cup B, E))</span>, in <span>Min-</span><i>t</i><span>-OSBCD</span> it is asked to find a vertex set <i>S</i> of minimum size such that <span>(G[(A cup B) {setminus } S])</span> has no <i>t</i>-claw with the center vertex in <i>A</i>. A primal-dual algorithm approximates <span>Min-</span><i>t</i><span>-OSBCD</span> within a factor of <i>t</i>. We prove that it is <span>({textsf{UGC}})</span>-hard to approximate with a factor better than <i>t</i>. We also prove it is approximable within a factor of 2 for dense bipartite graphs. By using these results on <span>Min-</span><i>t</i><span>-OSBCD</span>, we prove that <span>Min-</span><i>t</i>-<span>Claw-Del</span> is <span>({textsf{UGC}})</span>-hard to approximate within a factor better than <i>t</i>, for split graphs. We also consider their complementary maximization problems and prove that they are <span>({textsf{APX}})</span>-complete.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2025-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143489619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-02-18DOI: 10.1007/s00236-025-00480-4
Philippe Schnoebelen, Isa Vialard
The piecewise complexity h(u) of a word is the minimal length of subwords needed to exactly characterise u. Its piecewise minimality index (rho (u)) is the smallest length k such that u is minimal among its order-k class ([u]_k) in Simon’s congruence. We initiate a study of these two descriptive complexity measures. Among other results, we provide efficient algorithms for computing h(u) and (rho (u)) for a given word u.
{"title":"On the piecewise complexity of words","authors":"Philippe Schnoebelen, Isa Vialard","doi":"10.1007/s00236-025-00480-4","DOIUrl":"10.1007/s00236-025-00480-4","url":null,"abstract":"<div><p>The piecewise complexity <i>h</i>(<i>u</i>) of a word is the minimal length of subwords needed to exactly characterise <i>u</i>. Its piecewise minimality index <span>(rho (u))</span> is the smallest length <i>k</i> such that <i>u</i> is minimal among its order-<i>k</i> class <span>([u]_k)</span> in Simon’s congruence. We initiate a study of these two descriptive complexity measures. Among other results, we provide efficient algorithms for computing <i>h</i>(<i>u</i>) and <span>(rho (u))</span> for a given word <i>u</i>.\u0000</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2025-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143431058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-02-13DOI: 10.1007/s00236-025-00481-3
Gonzalo Navarro, Francisco Olivares, Cristian Urbina
It was recently proved that any straight-line program (SLP) generating a given string can be transformed in linear time into an equivalent balanced SLP of the same asymptotic size. We generalize this proof to a general class of grammars we call generalized SLPs (GSLPs), which allow rules of the form (A rightarrow x) where x is any Turing-complete representation (of size |x|) of a sequence of symbols (potentially much longer than |x|). We then specialize GSLPs to so-called Iterated SLPs (ISLPs), which allow rules of the form (A rightarrow Pi _{i=k_1}^{k_2} B_1^{i^{c_1}}cdots B_t^{i^{c_t}}) of size (mathcal {O}(t)). We prove that ISLPs break, for some text families, the measure (delta ) based on substring complexity, a lower bound for most measures and compressors exploiting repetitiveness. Further, ISLPs can extract any substring of length (lambda ), from the represented text (T[1mathinner {.,.}n]), in time (mathcal {O}(lambda + log ^2 nlog log n)). This is the first compressed representation for repetitive texts breaking (delta ) while, at the same time, supporting direct access to arbitrary text symbols in polylogarithmic time. We also show how to compute some substring queries, like range minima and next/previous smaller value, in time (mathcal {O}(log ^2 n log log n)). Finally, we further specialize the grammars to run-length SLPs (RLSLPs), which restrict the rules allowed by ISLPs to the form (A rightarrow B^t). Apart from inheriting all the previous results with the term (log ^2 n log log n) reduced to the near-optimal (log n), we show that RLSLPs can exploit balancedness to efficiently compute a wide class of substring queries we call “composable”—i.e., (f(X cdot Y)) can be obtained from f(X) and f(Y). As an example, we show how to compute Karp-Rabin fingerprints of texts substrings in (mathcal {O}(log n)) time. While the results on RLSLPs were already known, ours are much simpler and require little precomputation time and extra data associated with the grammar.
{"title":"Generalized straight-line programs","authors":"Gonzalo Navarro, Francisco Olivares, Cristian Urbina","doi":"10.1007/s00236-025-00481-3","DOIUrl":"10.1007/s00236-025-00481-3","url":null,"abstract":"<div><p>It was recently proved that any straight-line program (SLP) generating a given string can be transformed in linear time into an equivalent balanced SLP of the same asymptotic size. We generalize this proof to a general class of grammars we call generalized SLPs (GSLPs), which allow rules of the form <span>(A rightarrow x)</span> where <i>x</i> is any Turing-complete representation (of size |<i>x</i>|) of a sequence of symbols (potentially much longer than |<i>x</i>|). We then specialize GSLPs to so-called Iterated SLPs (ISLPs), which allow rules of the form <span>(A rightarrow Pi _{i=k_1}^{k_2} B_1^{i^{c_1}}cdots B_t^{i^{c_t}})</span> of size <span>(mathcal {O}(t))</span>. We prove that ISLPs break, for some text families, the measure <span>(delta )</span> based on substring complexity, a lower bound for most measures and compressors exploiting repetitiveness. Further, ISLPs can extract any substring of length <span>(lambda )</span>, from the represented text <span>(T[1mathinner {.,.}n])</span>, in time <span>(mathcal {O}(lambda + log ^2 nlog log n))</span>. This is the first compressed representation for repetitive texts breaking <span>(delta )</span> while, at the same time, supporting direct access to arbitrary text symbols in polylogarithmic time. We also show how to compute some substring queries, like range minima and next/previous smaller value, in time <span>(mathcal {O}(log ^2 n log log n))</span>. Finally, we further specialize the grammars to run-length SLPs (RLSLPs), which restrict the rules allowed by ISLPs to the form <span>(A rightarrow B^t)</span>. Apart from inheriting all the previous results with the term <span>(log ^2 n log log n)</span> reduced to the near-optimal <span>(log n)</span>, we show that RLSLPs can exploit balancedness to efficiently compute a wide class of substring queries we call “composable”—i.e., <span>(f(X cdot Y))</span> can be obtained from <i>f</i>(<i>X</i>) and <i>f</i>(<i>Y</i>). As an example, we show how to compute Karp-Rabin fingerprints of texts substrings in <span>(mathcal {O}(log n))</span> time. While the results on RLSLPs were already known, ours are much simpler and require little precomputation time and extra data associated with the grammar.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2025-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143404243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-02-04DOI: 10.1007/s00236-025-00478-y
Hiroto Fujimaru, Yuto Nakashima, Shunsuke Inenaga
Compact directed acyclic word graphs (CDAWGs) (Blumer et al. in J ACM 34(3):578–595, 1987) are a fundamental data structure on strings with applications in text pattern searching, data compression, and pattern discovery. Intuitively, the CDAWG of a string T is obtained by merging isomorphic subtrees of the suffix tree (Weiner, in: Proceedings of the 14th annual symposium on switching and automata theory, pp 1–11, 1973) of the same string T, thus CDAWGs are a compact indexing structure. In this paper, we investigate the sensitivity of CDAWGs when a single character edit operation (insertion, deletion, or substitution) is performed at the left-end of the input string T, namely, we are interested in the worst-case increase in the size of the CDAWG after a left-end edit operation. We prove that if (textsf{e}) is the number of edges of the CDAWG for string T, then the number of new edges added to the CDAWG after a left-end edit operation on T does not exceed (textsf{e}). Further, we present a matching lower bound on the sensitivity of CDAWGs for left-end insertions, and almost matching lower bounds for left-end deletions and substitutions. We then generalize our lower-bound instance for left-end insertions to leftward online construction of the CDAWG, and show that it requires (Omega (n^2)) time for some string of length n.
{"title":"Tight bounds for the sensitivity of CDAWGs with left-end edits","authors":"Hiroto Fujimaru, Yuto Nakashima, Shunsuke Inenaga","doi":"10.1007/s00236-025-00478-y","DOIUrl":"10.1007/s00236-025-00478-y","url":null,"abstract":"<div><p><i>Compact directed acyclic word graphs</i> (<i>CDAWGs</i>) (Blumer et al. in J ACM 34(3):578–595, 1987) are a fundamental data structure on strings with applications in text pattern searching, data compression, and pattern discovery. Intuitively, the CDAWG of a string <i>T</i> is obtained by merging isomorphic subtrees of the suffix tree (Weiner, in: Proceedings of the 14th annual symposium on switching and automata theory, pp 1–11, 1973) of the same string <i>T</i>, thus CDAWGs are a compact indexing structure. In this paper, we investigate the sensitivity of CDAWGs when a single character edit operation (insertion, deletion, or substitution) is performed at the left-end of the input string <i>T</i>, namely, we are interested in the worst-case increase in the size of the CDAWG after a left-end edit operation. We prove that if <span>(textsf{e})</span> is the number of edges of the CDAWG for string <i>T</i>, then the number of new edges added to the CDAWG after a left-end edit operation on <i>T</i> does not exceed <span>(textsf{e})</span>. Further, we present a matching lower bound on the sensitivity of CDAWGs for left-end insertions, and almost matching lower bounds for left-end deletions and substitutions. We then generalize our lower-bound instance for left-end insertions to <i>leftward online construction</i> of the CDAWG, and show that it requires <span>(Omega (n^2))</span> time for some string of length <i>n</i>.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2025-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143108330","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-02-04DOI: 10.1007/s00236-025-00479-x
Bhisham Dev Verma, Rameshwar Pratap
Locality-sensitive hashing (LSH) is a fundamental algorithmic toolkit used by data scientists for approximate nearest neighbour search problems that have been used extensively in many large-scale data processing applications such as near-duplicate detection, nearest-neighbour search, clustering, etc. In this work, we aim to propose faster and space-efficient locality-sensitive hash functions for Euclidean distance and cosine similarity for tensor data. Typically, the naive approach for obtaining LSH for tensor data involves first reshaping the tensor into vectors, followed by applying existing LSH methods for vector data. However, this approach becomes impractical for higher-order tensors because the size of the reshaped vector becomes exponential in the order of the tensor. Consequently, the size of LSH’s parameters increases exponentially. To address this problem, we suggest two methods for LSH for Euclidean distance and cosine similarity, namely CP-E2LSH, TT-E2LSH, and CP-SRP, TT-SRP, respectively, building on CP and tensor train (TT) decompositions techniques. Our approaches are space-efficient and can be efficiently applied to low-rank CP or TT tensors. We provide a rigorous theoretical analysis of our proposal on their correctness and efficacy.
{"title":"Improving LSH via tensorized random projection","authors":"Bhisham Dev Verma, Rameshwar Pratap","doi":"10.1007/s00236-025-00479-x","DOIUrl":"10.1007/s00236-025-00479-x","url":null,"abstract":"<div><p>Locality-sensitive hashing (LSH) is a fundamental algorithmic toolkit used by data scientists for approximate nearest neighbour search problems that have been used extensively in many large-scale data processing applications such as near-duplicate detection, nearest-neighbour search, clustering, etc. In this work, we aim to propose faster and space-efficient locality-sensitive hash functions for Euclidean distance and cosine similarity for tensor data. Typically, the naive approach for obtaining LSH for tensor data involves first reshaping the tensor into vectors, followed by applying existing LSH methods for vector data. However, this approach becomes impractical for higher-order tensors because the size of the reshaped vector becomes exponential in the order of the tensor. Consequently, the size of LSH’s parameters increases exponentially. To address this problem, we suggest two methods for LSH for Euclidean distance and cosine similarity, namely CP-E2LSH, TT-E2LSH, and CP-SRP, TT-SRP, respectively, building on CP and tensor train (TT) decompositions techniques. Our approaches are space-efficient and can be efficiently applied to low-rank CP or TT tensors. We provide a rigorous theoretical analysis of our proposal on their correctness and efficacy.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2025-02-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143108328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-01-28DOI: 10.1007/s00236-024-00475-7
Markus Chimani, Max Ilsen
We introduce and discuss the Minimum Capacity-Preserving Subgraph (MCPS) problem: given a directed graph with edge capacities (textit{cap} ) and a retention ratio (alpha in (0,1)), find the smallest subgraph that, for each pair of vertices (u, v), preserves at least a fraction (alpha ) of a maximum u-v-flow’s value. This problem originates from the practical setting of reducing the power consumption in a computer network: it models turning off as many links as possible, while retaining the ability to transmit at least (alpha ) times the traffic compared to the original network. First we prove that MCPS is NP-hard already on a restricted set of directed acyclic graphs (DAGs) with unit edge capacities. Our reduction also shows that a closely related problem (which only considers the arguably most complicated core of the problem in the objective function) is NP-hard to approximate within a sublogarithmic factor already on DAGs. In terms of positive results, we present two algorithms that solve MCPS optimally on directed series-parallel graphs (DSPs): a simple linear-time algorithm for the special case of unit edge capacities and a cubic-time dynamic programming algorithm for the general case of non-uniform edge capacities. Further, we introduce the family of laminar series-parallel graphs (LSPs), a generalization of DSPs that also includes cyclic and very dense graphs. Their properties allow us to solve MCPS on LSPs by employing our DSP-algorithms as subroutines. In addition, we give a separate quadratic-time algorithm for MCPS on LSPs with unit edge capacities that also yields straightforward quadratic time algorithms for several related problems such as Minimum Equivalent Digraph and Directed Hamiltonian Cycle on LSPs.
{"title":"Directed capacity-preserving subgraphs: hardness and exact polynomial algorithms","authors":"Markus Chimani, Max Ilsen","doi":"10.1007/s00236-024-00475-7","DOIUrl":"10.1007/s00236-024-00475-7","url":null,"abstract":"<div><p>We introduce and discuss the <span>Minimum Capacity-Preserving Subgraph (MCPS)</span> problem: given a directed graph with edge capacities <span>(textit{cap} )</span> and a retention ratio <span>(alpha in (0,1))</span>, find the smallest subgraph that, for each pair of vertices (<i>u</i>, <i>v</i>), preserves at least a fraction <span>(alpha )</span> of a maximum <i>u</i>-<i>v</i>-flow’s value. This problem originates from the practical setting of reducing the power consumption in a computer network: it models turning off as many links as possible, while retaining the ability to transmit at least <span>(alpha )</span> times the traffic compared to the original network. First we prove that <span>MCPS</span> is NP-hard already on a restricted set of directed acyclic graphs (DAGs) with unit edge capacities. Our reduction also shows that a closely related problem (which only considers the arguably most complicated core of the problem in the objective function) is NP-hard to approximate within a sublogarithmic factor already on DAGs. In terms of positive results, we present two algorithms that solve <span>MCPS</span> optimally on directed series-parallel graphs (DSPs): a simple linear-time algorithm for the special case of unit edge capacities and a cubic-time dynamic programming algorithm for the general case of non-uniform edge capacities. Further, we introduce the family of laminar series-parallel graphs (LSPs), a generalization of DSPs that also includes cyclic and very dense graphs. Their properties allow us to solve <span>MCPS</span> on LSPs by employing our DSP-algorithms as subroutines. In addition, we give a separate quadratic-time algorithm for <span>MCPS</span> on LSPs with unit edge capacities that also yields straightforward quadratic time algorithms for several related problems such as <span>Minimum Equivalent Digraph</span> and <span>Directed Hamiltonian Cycle</span> on LSPs.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2025-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s00236-024-00475-7.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143109963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Let G be a connected graph. For an edge (e=xy in E(G)), e is monitored by a vertex v if (d_G(v, y)ne d_{G-e}(v, y)) or (d_G(v, x)ne d_{G-e}(v, x)). A set M of vertices of a graph G is distance-edge-monitoring (DEM for short) set if every edge e of G is monitored by some vertex of M. A DEM set X for a graph G is called fault-tolerant DEM set if (Xsetminus {v}) is also DEM set for each v in X. Denote (operatorname {dem}(G)) and (operatorname {Fdem}(G)) the smallest size of DEM set and fault-tolerant DEM sets, respectively. In this paper, we first study the relation between (operatorname {Fdem}(G)) and (operatorname {dem}(G)) for a graph G. Next, we show that (2 le operatorname {Fdem}(G) le n) for any graph G with order n. Furthermore, the extremal graphs attaining lower and upper bounds are characterized. In the end, the exact values for some networks are given. Furthermore, it is shown that for (2le s<tle n), there exists a graph G of order n such that (operatorname {dem}(G)=s) and (operatorname {Fdem}(G)=t).
设G是连通图。对于边(e=xy in E(G)),如果(d_G(v, y)ne d_{G-e}(v, y))或(d_G(v, x)ne d_{G-e}(v, x)), e由顶点v监视。如果图G的每条边e都受到M的某个顶点的监视,则图G的M个顶点集称为距离边监测集(distance-edge-monitoring,简称DEM)。如果(Xsetminus {v})也是X中每个v的DEM集,则图G的DEM集X称为容错DEM集,分别取DEM集和容错DEM集的最小大小(operatorname {dem}(G))和(operatorname {Fdem}(G))。本文首先研究了图G的(operatorname {Fdem}(G))与(operatorname {dem}(G))之间的关系,然后证明了任意n阶图G的(2 le operatorname {Fdem}(G) le n)与之间的关系,并进一步刻画了达到下界和上界的极值图。最后,给出了某些网络的精确值。进一步证明,对于(2le s<tle n),存在一个n阶的图G,使得(operatorname {dem}(G)=s)和(operatorname {Fdem}(G)=t)。
{"title":"Fault-tolerance in distance-edge-monitoring sets","authors":"Chenxu Yang, Yaping Mao, Ralf Klasing, Gang Yang, Yuzhi Xiao, Xiaoyan Zhang","doi":"10.1007/s00236-024-00476-6","DOIUrl":"10.1007/s00236-024-00476-6","url":null,"abstract":"<div><p>Let <i>G</i> be a connected graph. For an edge <span>(e=xy in E(G))</span>, <i>e</i> is monitored by a vertex <i>v</i> if <span>(d_G(v, y)ne d_{G-e}(v, y))</span> or <span>(d_G(v, x)ne d_{G-e}(v, x))</span>. A set <i>M</i> of vertices of a graph <i>G</i> is distance-edge-monitoring (DEM for short) set if every edge <i>e</i> of <i>G</i> is monitored by some vertex of <i>M</i>. A DEM set <i>X</i> for a graph <i>G</i> is called fault-tolerant DEM set if <span>(Xsetminus {v})</span> is also DEM set for each <i>v</i> in <i>X</i>. Denote <span>(operatorname {dem}(G))</span> and <span>(operatorname {Fdem}(G))</span> the smallest size of DEM set and fault-tolerant DEM sets, respectively. In this paper, we first study the relation between <span>(operatorname {Fdem}(G))</span> and <span>(operatorname {dem}(G))</span> for a graph <i>G</i>. Next, we show that <span>(2 le operatorname {Fdem}(G) le n)</span> for any graph <i>G</i> with order <i>n</i>. Furthermore, the extremal graphs attaining lower and upper bounds are characterized. In the end, the exact values for some networks are given. Furthermore, it is shown that for <span>(2le s<tle n)</span>, there exists a graph <i>G</i> of order <i>n</i> such that <span>(operatorname {dem}(G)=s)</span> and <span>(operatorname {Fdem}(G)=t)</span>.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2024-12-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142889663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-12-18DOI: 10.1007/s00236-024-00473-9
Shmuel T. Klein, Dana Shapira
The current study advances prior research on non-binary Fibonacci codes by introducing new families of universal codes. These codes demonstrate the advantage of accommodating a larger number of codewords for sufficiently large lengths. They retain the properties of instantaneous decipherability and robustness against transmission errors. This work presents these dense codes as a promising alternative for compressing extensive lists of very large integers, commonly encountered in cryptographic applications.
{"title":"Dense non-binary Fibonacci codes","authors":"Shmuel T. Klein, Dana Shapira","doi":"10.1007/s00236-024-00473-9","DOIUrl":"10.1007/s00236-024-00473-9","url":null,"abstract":"<div><p>The current study advances prior research on non-binary Fibonacci codes by introducing new families of universal codes. These codes demonstrate the advantage of accommodating a larger number of codewords for sufficiently large lengths. They retain the properties of instantaneous decipherability and robustness against transmission errors. This work presents these dense codes as a promising alternative for compressing extensive lists of very large integers, commonly encountered in cryptographic applications. \u0000</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2024-12-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142844846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2024-12-12DOI: 10.1007/s00236-024-00472-w
Shengyang Zhong
In this paper, we investigate a slightly simplified version of Birkhoff–von Neumann quantum logic enriched with entanglement quantifiers which is proposed in Ying (Birkhoff–von Neumann quantum logic as an assertion language for quantum programs, 2022. arXiv:2205.01959). The main result is a coincidence theorem, which says that every formula is interpreted by a closed subspace in the Hilbert space corresponding to the free variables of the formula. We also prove that many instances of semantic consequence, which are used in the proof of the prenex normal form theorem in first-order logic, also hold in this logic. The technical work is about the interplay among the three operations on density operators, namely, tensor product, support and partial trace.
{"title":"Birkhoff-von Neumann quantum logic as an assertion language for quantum programs","authors":"Shengyang Zhong","doi":"10.1007/s00236-024-00472-w","DOIUrl":"10.1007/s00236-024-00472-w","url":null,"abstract":"<div><p>In this paper, we investigate a slightly simplified version of Birkhoff–von Neumann quantum logic enriched with entanglement quantifiers which is proposed in Ying (Birkhoff–von Neumann quantum logic as an assertion language for quantum programs, 2022. arXiv:2205.01959). The main result is a coincidence theorem, which says that every formula is interpreted by a closed subspace in the Hilbert space corresponding to the free variables of the formula. We also prove that many instances of semantic consequence, which are used in the proof of the prenex normal form theorem in first-order logic, also hold in this logic. The technical work is about the interplay among the three operations on density operators, namely, tensor product, support and partial trace.</p></div>","PeriodicalId":7189,"journal":{"name":"Acta Informatica","volume":"62 1","pages":""},"PeriodicalIF":0.4,"publicationDate":"2024-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142811099","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}